En savoir plus
Informationen zum Autor Author Rajesh, K.S. from NIIT is a Cisco expert on paper and in practice. He brings his Cisco security knowledge to Cisco Security Bible in the form of classroom study as well as leadership and hands-on configuration for several Cisco security network implementation projects. He is a true expert in the field. Klappentext Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security products.Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security products. Inhaltsverzeichnis Foreword.Preface.Part I: Understanding Network Security.Chapter 1: Identifying Threats to Network Security.Chapter 2: Internet Protocol Network Security.Chapter 3: Detecting Intrusions.Part II: Securing Networks.Chapter 4: Securing the Network Infrastructure.Chapter 5: Securing Networks Using ACL.Chapter 6: Protecting Networks Using Cisco Perimeter Routers.Chapter 7: Cisco Encryption Technology.Part III: Security Using Firewalls.Chapter 8: Cisco IOS Firewall.Chapter 9: Cisco PIX Firewall.Part IV: Understanding and Implementing AAA.Chapter 10: Cisco AAA Security Technology.Chapter 11: Configuring the Network Access Server for AAA Security.Part V: Virtual Private Networks.Chapter 12:Fundamentals of Virtual Private Networks.Chapter 13: Securing a Virtual Private Network.Part VI: Cisco Technologies and Security Products.Chapter 14: Cisco IOS IPSec.Chapter 15: Cisco's Network-Security Management Products.Chapter 16: Cisco Firewall and VPN Management Products.Part VII: A Networking Primer.Chapter 17: Networking Basics.Chapter 18: OSI Model-An Overview.Appendix A: Assessment Questions.Appendix B: Lab Exercises.Index. End-User License Agreement....
Table des matières
Foreword.
Preface.
Part I: Understanding Network Security.
Chapter 1: Identifying Threats to Network Security.
Chapter 2: Internet Protocol Network Security.
Chapter 3: Detecting Intrusions.
Part II: Securing Networks.
Chapter 4: Securing the Network Infrastructure.
Chapter 5: Securing Networks Using ACL.
Chapter 6: Protecting Networks Using Cisco Perimeter Routers.
Chapter 7: Cisco Encryption Technology.
Part III: Security Using Firewalls.
Chapter 8: Cisco IOS Firewall.
Chapter 9: Cisco PIX Firewall.
Part IV: Understanding and Implementing AAA.
Chapter 10: Cisco AAA Security Technology.
Chapter 11: Configuring the Network Access Server for AAA Security.
Part V: Virtual Private Networks.
Chapter 12:Fundamentals of Virtual Private Networks.
Chapter 13: Securing a Virtual Private Network.
Part VI: Cisco Technologies and Security Products.
Chapter 14: Cisco IOS IPSec.
Chapter 15: Cisco s Network-Security Management Products.
Chapter 16: Cisco Firewall and VPN Management Products.
Part VII: A Networking Primer.
Chapter 17: Networking Basics.
Chapter 18: OSI Model-An Overview.
Appendix A: Assessment Questions.
Appendix B: Lab Exercises.
Index. End-User License Agreement.