Network Security Technologies and Solutions
Cisco Press | 2008-03-30 | ISBN: 1587052466 | 840 pages | PDF | 13,1 Mb
A comprehensive, all-in-one reference for Cisco network security
Yusuf Bhaiji, CCIE No. 9305
Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure.
With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures.
With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam.
“Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ”
–Steve Gordon, Vice President, Technical Services, Cisco
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
Filter traffic with access lists and implement security features on switches
Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances
Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques
Secure management access with AAA
Secure access control using multifactor authentication technology
Implement identity-based network access control
Apply the latest wireless LAN security solutions
Enforce security policy compliance with Cisco NAC
Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies
Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation
Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM
Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX
This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams.
Download:
http://depositfiles.com/files/4583101
http://w16.easy-share.com/1700066281.html
[Fast Download] Network Security Technologies and Solutions
Handbook of Mobile Data Privacy
Securing Applications on the Cloud
Gaining Access and Covering Your Tracks with Kali Linux
Internet of Things Security : Fundamentals, Techniques and Applications
Leveraging Advances in Social Network Thinking for National Security : Proceedings of a Workshop
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementatio
Hacking For Beginners: The Ultimate Guide To Becoming A Hacker
Series 7 Exam Practice Questions: Series 7 Practice Tests & Review for the General Securities Repres
Security without Obscurity: A Guide to Cryptographic Architectures
Cybercrime Risks and Responses
Information Systems Security
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Mastering Wireshark 2: Develop skills for (2330)
Head First Agile: A Brain-Friendly Guide t(2230)
Hands-On Penetration Testing on Windows(2085)
Blockchain 101: Distributed Ledger Technol(2058)
Hands-On Cybersecurity with Blockchain: Im(2035)
Cybersecurity - Attack and Defense Strateg(2020)
Tor Anonymity Network 101: An Introduction(1958)
How To Spy WhatsApp Without Getting Caught(1914)
Virtual Private Networks (VPNs): What Is a(1911)
Practical Cyber Intelligence : How Action-(1904)
Hacking For Beginners: The Ultimate Guide (1813)
The Manga Guide to Cryptography(1732)
Machine Learning and Security: Protecting (1731)
Digital Forensics with Kali Linux(1727)
