Cisco Firepower Threat Defense (FTD)
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Networking packages > Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and A(Networking Technology: Security)
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and A(Networking Technology: Security)

Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and A(Networking Technology: Security)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The authoritative visual guide to Cisco Firepower Threat Defense (FTD) This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances. Senior Cisco engineer Nazmul Rajib draws on unsurpassed experience supporting and training Cisco Firepower engineers worldwide, and presenting detailed knowledge of Cisco Firepower deployment, tuning, and troubleshooting. Writing for cybersecurity consultants, service providers, channel partners, and enterprise or government security professionals, he shows how to deploy the Cisco Firepower next-generation security technologies to protect your network from potential cyber threats, and how to use Firepower’s robust command-line tools to investigate a wide variety of technical issues. Each consistently organized chapter contains definitions of keywords, operational flowcharts, architectural diagrams, best practices, configuration steps (with detailed screenshots), verification tools, troubleshooting techniques, and FAQs drawn directly from issues raised by Cisco customers at the Global Technical Assistance Center (TAC). Covering key Firepower materials on the CCNA Security, CCNP Security, and CCIE Security exams, this guide also includes end-of-chapter quizzes to help candidates prepare. ·        Understand the operational architecture of the Cisco Firepower NGFW, NGIPS, and AMP technologies ·         Deploy FTD on ASA platform and Firepower appliance running FXOS ·         Configure and troubleshoot Firepower Management Center (FMC) ·         Plan and deploy FMC and FTD on VMware virtual appliance ·         Design and implement the Firepower management network on FMC and FTD ·         Understand and apply Firepower licenses, and register FTD with FMC ·         Deploy FTD in Routed, Transparent, Inline, Inline Tap, and Passive Modes ·         Manage traffic flow with detect-only, block, trust, and bypass operations ·         Implement rate limiting and analyze quality of service (QoS) ·         Blacklist suspicious IP addresses via Security Intelligence ·         Block DNS queries to the malicious domains ·         Filter URLs based on category, risk, and reputation ·         Discover a network and implement application visibility and control (AVC) ·         Control file transfers and block malicious files using advanced malware protection (AMP) ·         Halt cyber attacks using Snort-based intrusion rule ·         Masquerade an internal host’s original IP address using Network Address Translation (NAT) ·         Capture traffic and obtain troubleshooting files for advanced analysis ·         Use command-line tools to identify status, trace packet flows, analyze logs, and debug messages  

Table of Contents:
  Introduction xxv Part I Troubleshooting and Administration of Hardware Platform Chapter 1 Introduction to the Cisco Firepower Technology 1 History of Sourcefire 1     Evolution of Firepower 2     FirePOWER Versus Firepower 3 Firepower Threat Defense (FTD) 6     FirePOWER Service Versus Firepower Threat Defense (FTD) 6     Firepower System Software Components 7     Firepower System Hardware Platforms 9     Firepower Accessories 10 Summary 11 Chapter 2 FTD on ASA 5500-X Series Hardware 13 ASA Reimaging Essentials 13 Best Practices for FTD Installation on ASA Hardware 14 Installing and Configuring FTD 16     Fulfilling Prerequisites 16     Upgrading Firmware 18     Installing the Boot Image 26     Installing the System Software 32 Verification and Troubleshooting Tools 44     Navigating to the FTD CLI 44     Determining the Version of Installed Software 46     Determining the Free Disk Space on ASA Hardware 47     Deleting a File from a Storage Device 48     Determining the Availability of Any Storage Device or SSD 48     Determining the Version of the ROMMON Software or Firmware 50 Summary 52 Quiz 52 Chapter 3 FTD on the Firepower eXtensible Operating System (FXOS) 55 Firepower 9300 and 4100 Series Essentials 55     Architecture 57     Software Images 58         Firepower Extensible Operating System (FXOS) 59         FTD Software 60         Firmware 60     Web User Interfaces 61 Best Practices for FTD Installation on Firepower Hardware 62 Installing and Configuring FTD 64     Fulfilling Prerequisites 64         Deleting Any Existing Logical Devices 64         Upgrading the FXOS Software 65         Enabling Interfaces 67     Installing FTD 71         Uploading the FTD Software Image 72         Adding a Logical Device for FTD 73         Completing the Initialization of FTD 77 Verification and Troubleshooting Tools 79     Navigating to the FTD CLI 79     Verifying the FXOS Software 81     Verifying the Status of a Security Application 82     Verifying the Security Modules, Adapters, and Switch Fabric 84     Verifying the Hardware Chassis 87     Verifying the Power Supply Unit (PSU) Modules 90     Verifying the Fan Modules 92 Summary 94 Quiz 94 Chapter 4 Firepower Management Center (FMC) Hardware 97 FMC Component Essentials 97     On-Box Managers 98     Off-Box Managers 99     Cisco Integrated Management Controller (CIMC) 101     Internal USB Storage for the System_Restore Image 104     User Interfaces 104 Best Practices for FMC Reimage 105     Pre-installation Best Practices 105     Post-installation Best Practices 108 Installing and Configuring the FMC 109     Fulfilling Prerequisites 109     Configuration Steps 110         Step 1: Load the System_Restore Image 111         Step 2: Configure the Network Settings 114         Step 3: Choose a Transport Protocol 114         Step 4: Download and Mount an ISO File 116         Step 5: Run the Installation 117         Step 6: Initialize the System 120 Verification and Troubleshooting Tools 122     Identifying the FMC on a Rack 122     Determining the Hardware and Software Details of the FMC 124     Determining the RAID Battery Status 124     Determining the Status of a Power Supply Unit (PSU) 125         Checking Logs on the CLI 125         Enabling Alerts on the GUI 127         Performing a Complete Power Cycle 129         PSU Checklist 129     Verifying the Fans 129 Summary 132 Quiz 132 Chapter 5 Firepower System Virtual on VMware 135 FMC and FTD Virtual Essentials 135     Supported Virtual Environments 135     ESXi Versus VI 136     VMware Installation Package in a Tarball 136     Disk Provisioning Options 137 Best Practices for Firepower Virtual Appliance Deployment 138     Pre-deployment Best Practices 138     Post-deployment Best Practices 140 Installing and Configuring a Firepower Virtual Appliance 141     Fulfilling Prerequisites 142     Creating a Virtual Network 144         Creating a Network for FMC Virtual 145         Creating a Network for FTD Virtual 148         Using Promiscuous Mode 152     Deploying an OVF Template 154     Initializing an Appliance 160         Initializing an FMC Virtual Appliance 161         Initializing an FTD Virtual Appliance 162 Verification and Troubleshooting Tools 163     Determining the Status of Allocated Resources 164     Determining the Status of a Network Adapter 165     Upgrading a Network Adapter 166 Summary 170 Quiz 170 Part II Troubleshooting and Administration of Initial Deployment Chapter 6 The Firepower Management Network 173 Firepower System Management Network Essentials 173     The FTD Management Interface 173     Designing a Firepower Management Network 176 Best Practices for Management Interface Configuration 180     Configuring a Management Network on FMC Hardware 180     Configuration Options 180         Using the GUI During the First Login 180         Using the GUI On Demand 182         Using the Command-Line Interface 183     Verification and Troubleshooting Tools 184 Configuring a Management Network on ASA Hardware 186     Configuration 186     Verification and Troubleshooting Tools 187 Configuring a Management Network on a Firepower Security Appliance 190     Configuring the FXOS Management Interface 190     Verification of the FXOS Management Interface Configuration 191     Configuring the FTD Management Interface 192     Verification of the FTD Management Interface Configuration 194 Summary 197 Quiz 197 Chapter 7 Firepower Licensing and Registration 199 Licensing Essentials 199     The Smart Licensing Architecture 199         Cisco Smart Software Manager (CSSM) 200         CSSM Satellite 201     Firepower Licenses 202 Best Practices for Licensing and Registration 203 Licensing a Firepower System 203     Licensing Configuration 204         Evaluation Mode 205         Registering with the CSSM 206     Verifying a Smart License Issue 209 Registering a Firepower System 211     Registration Configuration 211         Setting Up FTD 211         Setting Up the FMC 212     Verifying the Registration and Connection 215     Analyzing the Encrypted SFTunnel 221 Summary 229 Quiz 230 Chapter 8 Firepower Deployment in Routed Mode 231 Routed Mode Essentials 231 Best Practices for Routed Mode Configuration 233 Configuring Routed Mode 233     Fulfilling Prerequisites 234     Configuring the Firewall Mode 234     Configuring the Routed Interface 235         Configuring an Interface with a Static IP Address 235         DHCP Services 238     FTD as a DHCP Server 240     FTD as a DHCP Client 241 Verification and Troubleshooting Tools 243     Verifying the Interface Configuration 243     Verifying DHCP Settings 246 Summary 249 Quiz 249 Chapter 9 Firepower Deployment in Transparent Mode 251 Transparent Mode Essentials 251 Best Practices for Transparent Mode 252 Configuring Transparent Mode 253     Fulfilling Prerequisites 254     Changing the Firewall Mode 254     Deploying Transparent Mode in a Layer 2 Network 255         Configuring the Physical and Virtual Interfaces 256         Verifying the Interface Status 261         Verifying Basic Connectivity and Operations 264     Deploying an FTD Device Between Layer 3 Networks 267         Selecting the Default Action 268         Adding an Access Rule 269     Creating an Access Rule for SSH 272         Verifying Access Control Lists 274 Summary 276 Quiz 276 Part III Troubleshooting and Administration of Traffic Control Chapter 10 Capturing Traffic for Advanced Analysis 277 Traffic Capture Essentials 277 Best Practices for Capturing Traffic 278 Configuring Firepower System for Traffic Analysis 278     Capturing Traffic from a Firepower Engine 279         tcpdump Options 280         Downloading a .pcap File Generated by Firepower Engine 285     Capturing Traffic from the Firewall Engine 288         Downloading a .pcap File Generated by Firewall Engine 291         Enabling HTTP Service in FTD 293     Capturing Traffic from the FMC 298         Downloading a .pcap File Generated by FMC 299 Verification and Troubleshooting Tools 302     Adding an Access Rule to Block ICMP Traffic 302     Analyzing the Traffic Flow by Using a Block Rule 303     Packet Processing by an Interface 306 Summary 309 Quiz 309 Chapter 11 Blocking Traffic Using Inline Interface Mode 311 Inline Mode Essentials 311     Inline Mode Versus Passive Mode 312     Inline Mode Versus Transparent Mode 314     Tracing a Packet Drop 314 Best Practices for Inline Mode Configuration 316 Configuring Inline Mode 316     Fulfilling Prerequisites 317     Creating an Inline Set 317         Verifying the Configuration 321         Verifying Packet Flow by Using packet-tracer 324         Verifying Packet Flow by Using Real Packet Capture 328     Enabling Fault Tolerance Features 333         Configuring Fault Tolerance Features 334         Verifying Fault Tolerance Features 335     Blocking a Specific Port 336         Configuring Blocking a Specific Port 337         Verifying Blocking of a Specific Port 339         Analyzing a Packet Drop by Using a Simulated Packet 340         Analyzing a Packet Drop by Using a Real Packet 342 Summary 344 Quiz 345 Chapter 12 Inspecting Traffic Without Blocking It 347 Traffic Inspection Essentials 347     Passive Monitoring Technology 347     Inline Versus Inline Tap Versus Passive 350 Best Practices for Detection-Only Deployment 352 Fulfilling Prerequisites 352 Inline Tap Mode 352     Configuring Inline Tap Mode 353     Verifying an Inline Tap Mode Configuration 354 Passive Interface Mode 357     Configuring Passive Interface Mode 357         Configuring Passive Interface Mode on an FTD Device 357         Configuring a SPAN Port on a Switch 359     Verifying a Passive Interface Mode Configuration 359 Analyzing Traffic Inspection Operation 362     Analyzing a Connection Event with a Block Action 362         Analyzing Live Traffic 362         Analyzing a Simulated Packet 364     Analyzing an Intrusion Event with an Inline Result 366 Summary 370 Quiz 371 Chapter 13 Handling Encapsulated Traffic 373 Encapsulation and Prefilter Policy Essentials 373 Best Practices for Adding a Prefilter Rule 375 Fulfilling Prerequisites 375     Transferring and Capturing Traffic on the Firewall Engine 377 Scenario 1: Analyzing Encapsulated Traffic 379     Configuring Policies to Analyze Encapsulated Traffic 379         Prefilter Policy Settings 379         Access Control Policy Settings 381     Verifying the Configuration and Connection 382     Analyzing Packet Flows 385 Scenario 2: Blocking Encapsulated Traffic 391     Configuring Policies to Block Encapsulated Traffic 391     Verifying the Configuration and Connection 392     Analyzing Packet Flows 395 Scenario 3: Bypassing Inspection 397     Configuring Policies to Bypass Inspection 397         Custom Prefilter Policy 397         Access Control Policy Settings 401     Verifying the Configuration and Connection 403     Analyzing Packet Flows 405 Summary 407 Quiz 407 Chapter 14 Bypassing Inspection and Trusting Traffic 409 Bypassing Inspection and Trusting Traffic Essentials 409     The Fastpath Rule 409     The Trust Rule 410 Best Practices for Bypassing Inspection 412 Fulfilling Prerequisites 412 Implementing Fastpath Through a Prefilter Policy 413     Configuring Traffic Bypassing 413         Configuring a Prefilter Policy 413         Invoking a Prefilter Policy in an Access Control Policy 418     Verifying the Prefilter Rule Configuration 420     Enabling Tools for Advanced Analysis 421     Analyzing the Fastpath Action 422 Establishing Trust Through an Access Policy 427     Configuring Trust with an Access Policy 427     Verifying the Trust Rule Configuration 429     Enabling Tools for Advanced Analysis 430     Analyzing the Trust Action 432     Using the Allow Action for Comparison 440 Summary 442 Quiz 442 Chapter 15 Rate Limiting Traffic 445 Rate Limiting Essentials 445 Best Practices for QoS Rules 447 Fulfilling Prerequisites 448 Configuring Rate Limiting 449 Verifying the Rate Limit of a File Transfer 454 Analyzing QoS Events and Statistics 458 Summary 462 Quiz 462 Part IV Troubleshooting and Administration of Next-Generation Security Features Chapter 16 Blacklisting Suspicious Addresses by Using Security Intelligence 463 Security Intelligence Essentials 463     Input Methods 466 Best Practices for Blacklisting 468 Fulfilling Prerequisites 468 Configuring Blacklisting 468     Automatic Blacklist Using Cisco Intelligence Feed 468     Manual Blacklisting Using a Custom Intelligence List 472     Immediate Blacklisting Using a Connection Event 477         Adding an Address to a Blacklist 477         Deleting an Address from a Blacklist 479     Monitoring a Blacklist 480     Bypassing a Blacklist 482         Adding an Address to a Whitelist 483         Deleting an Address from a Whitelist 484 Verification and Troubleshooting Tools 485     Verifying the Download of the Latest Files 486     Verifying the Loading of Addresses into Memory 489     Finding a Specific Address in a List 491     Verifying URL-Based Security Intelligence Rules 491 Summary 494 Quiz 494 Chapter 17 Blocking a Domain Name System (DNS) Query 497 Firepower DNS Policy Essentials 497     Domain Name System (DNS) 497     Blocking of a DNS Query Using a Firepower System 499     DNS Rule Actions 500         Actions That Can Interrupt a DNS Query 500         Actions That Allow a DNS Query 502     Sources of Intelligence 504 Best Practices for Blocking DNS Query 506 Fulfilling Prerequisites 507 Configuring DNS Query Blocking 508     Adding a New DNS Rule 508     Invoking a DNS Policy 510 Verification and Troubleshooting Tools 511     Verifying the Configuration of a DNS Policy 511     Verifying the Operation of a DNS Policy 515 Summary 520 Quiz 520 Chapter 18 Filtering URLs Based on Category, Risk, and Reputation 523 URL Filtering Essentials 523     Reputation Index 523     Operational Architecture 525 Fulfilling Prerequisites 526 Best Practices for URL Filtering Configuration 529 Blocking URLs of a Certain Category 532     Configuring an Access Rule for URL Filtering 532     Verification and Troubleshooting Tools 534 Allowing a Specific URL 537     Configuring FTD to Allow a Specific URL 538     Verification and Troubleshooting Tools 540 Querying the Cloud for Uncategorized URLs 543     Configuring FMC to Perform a Query 544     Verification and Troubleshooting Tools 546 Summary 550 Quiz 550 Chapter 19 Discovering Network Applications and Controlling Application Traffic 553 Application Discovery Essentials 553     Application Detectors 553     Operational Architecture 555 Best Practices for Network Discovery Configuration 557 Fulfilling Prerequisites 558 Discovering Applications 560     Configuring a Network Discovery Policy 561     Verification and Troubleshooting Tools 564         Analyzing Application Discovery 564         Analyzing Host Discovery 566         Undiscovered New Hosts 567 Blocking Applications 570     Configuring Blocking of Applications 570     Verification and Troubleshooting Tools 572 Summary 575 Quiz 576 Chapter 20 Controlling File Transfer and Blocking the Spread of Malware 577 File Policy Essentials 577     File Type Detection Technology 579     Malware Analysis Technology 579     Licensing Capability 582 Best Practices for File Policy Deployment 583 Fulfilling Prerequisites 584 Configuring a File Policy 586     Creating a File Policy 586     Applying a File Policy 592 Verification and Troubleshooting Tools 593     Analyzing File Events 594     Analyzing Malware Events 599         The FMC Is Unable to Communicate with the Cloud 599         The FMC Performs a Cloud Lookup 603         FTD Blocks Malware 607     Overriding a Malware Disposition 610 Summary 615 Quiz 615 Chapter 21 Preventing Cyber Attacks by Blocking Intrusion Attempts 617 Firepower NGIPS Essentials 617     Network Analysis Policy and Preprocessor 619     Intrusion Policy and Snort Rules 621     System-Provided Variables 624     System-Provided Policies 626 Best Practices for Intrusion Policy Deployment 632 NGIPS Configuration 637     Configuring a Network Analysis Policy 637         Creating a New NAP with Default Settings 637         Modifying the Default Settings of a NAP 639     Configuring an Intrusion Policy 641         Creating a Policy with a Default Ruleset 641         Incorporating Firepower Recommendations 642         Enabling or Disabling an Intrusion Rule 646         Setting Up a Variable Set 648     Configuring an Access Control Policy 650 Verification and Troubleshooting Tools 654 Summary 665 Quiz 665 Chapter 22 Masquerading the Original IP Address of an Internal Network Host 667 NAT Essentials 667     NAT Techniques 669     NAT Rule Types 670 Best Practices for NAT Deployment 672 Fulfilling Prerequisites 673 Configuring NAT 676     Masquerading a Source Address (Source NAT for Outbound Connection) 676         Configuring a Dynamic NAT Rule 677         Verifying the Configuration 681         Verifying the Operation: Inside to Outside 683         Verifying the Operation: Outside to Inside 690     Connecting to a Masqueraded Destination (Destination NAT for Inbound Connection) 695         Configuring a Static NAT Rule 695         Verifying the Operation: Outside to DMZ 696 Summary 706 Quiz 706 Appendix A Answers to the Review Questions 707 Appendix B Generating and Collecting Troubleshooting Files Using the GUI 713 Generating Troubleshooting Files with the GUI 713 Appendix C Generating and Collecting Troubleshooting Files Using the CLI 717 Generating Troubleshooting Files at the FTD CLI 717     Downloading a File by Using the GUI 718     Copying a File by Using the CLI 719 Generating Troubleshooting Files at the FMC CLI 719     9781587144806    TOC    11/9/2017

About the Author :
Nazmul Rajib is a senior engineer and leader of the Cisco Global Technical Services organization focusing on next-generation security technologies. He leads cybersecurity training initiatives, develops internal training programs, and trains the current generation of Cisco engineers who support Cisco security solutions around the world. He also reviews design specifications, tests security software, and provides solutions to businesscritical networking issues. Nazmul has authored numerous technical publications at Cisco.com and in the Cisco support community. Nazmul is a veteran engineer of Sourcefire, Inc., which developed Snort–the most popular open-source intrusion prevention system in the world. He created and managed the global knowledge base for Sourcefire and designed Sourcefire security certifications for partner enablement. Nazmul trained security engineers from many managed security service providers (MSSP) in the United States. He supported the networks of numerous Fortune 500 companies and U.S. government agencies. Nazmul has a master of science degree in internetworking. He also holds many certifications in the areas of cybersecurity, information technology, and technical communication. He is a Sourcefire Certified Expert (SFCE) and Sourcefire Certified Security Engineer (SFCSE).


Best Sellers


Product Details
  • ISBN-13: 9780134679549
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Series Title: Networking Technology: Security
  • ISBN-10: 0134679547
  • Publisher Date: 21 Nov 2017
  • Binding: Digital download
  • No of Pages: 800
  • Sub Title: Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and A


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and A(Networking Technology: Security)
Pearson Education (US) -
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and A(Networking Technology: Security)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and A(Networking Technology: Security)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!