Network Security Architectures

ISBN-10: 158705115X
ISBN-13: 9781587051159
Edition: 2nd 2004
Authors: Sean Convery
List price: $65.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Network Security Architectures offers a comprehensive how-to guide to understanding and implementing the Cisco security blueprint. Written by the two authors of the Cisco Systems SAFE blueprint, it taps into the design strategies of the experts from  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Italian Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
Portuguese Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
Spanish Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
German Grammar Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $65.00
Edition: 2nd
Copyright year: 2004
Publisher: Cisco Press
Publication date: 4/19/2004
Binding: Hardcover
Pages: 792
Size: 7.50" wide x 9.25" long x 2.00" tall
Weight: 3.278
Language: English

Network Security Architectures offers a comprehensive how-to guide to understanding and implementing the Cisco security blueprint. Written by the two authors of the Cisco Systems SAFE blueprint, it taps into the design strategies of the experts from Cisco. The book begins by discussing the whys and hows of security, identifying relevant lifecycle models and showing the history behind current architectures. Part II provides a broad overview of all of the important security considerations and moving parts to implementing a security plan, itemizing security threats, and listing the elements of security in a network systems. One chapter is dedicated to the concept of device hardening--an essential, element-specific guide to defending pieces of the network.Solutions are the focus of Part III, addressing the technology decisions that confront a security design engineer, including IPSec VPN, ICMP, NAT, and DHCP. This section also delves into identity issues and options and gives specific information on the security design process. In Part IV, the vulnerable "edge" and the threats that surround it are explored, specifically addressing campus networks and remote security design. Part V explores network management and network scanning. This section also discusses other ways to keep on top of threats, including using honeypots and sinkholes. It makes the comprehensive security presentation complete by providing readers with end-to-end real-world migration examples.

Foreword
Preface
Network Security Foundations
Network Security Axioms
Network Security Is a System
Business Priorities Must Come First
Network Security Promotes Good Network Design
Everything Is a Target
Everything Is a Weapon
Strive for Operational Simplicity
Good Network Security Is Predictable
Avoid Security Through Obscurity
Confidentiality and Security Are Not the Same
Summary
Reference
Applied Knowledge Questions
Security Policy and Operations Life Cycle
You Can't Buy Network Security
What Is a Security Policy? Security System Development and Operations Overview
Summary
References
Applied Knowledge Questions
Secure Networking Threats
The Attack Process
Attacker Types
Vulnerability Types
Attack Results
Attack Taxonomy
Summary
References
Applied Knowledge Questions
Network Security Technologies
The Difficulties of Secure Networking
Security Technologies
Emerging Security Technologies
Summary
References
Applied Knowledge Questions
Designing Secure Networks
Device Hardening
Components of a Hardening Strategy
Network Devices
Host Operating Systems
Applications
Appliance-Based Network Services
Rogue Device Detection
Summary
References
Applied Knowledge Questions
General Design Considerations
Physical Security Issues
Layer 2 Security Considerations
IP Addressing Design Considerations
ICMP Design Considerations
Routing Considerations
Transport Protocol Design Considerations
DoS Design Considerations
Summary
References
Applied Knowledge Questions
Network Security Platform Options and Best Deployment Practices
Network Security Platform Options
Network Security Device Best Practices
Summary
Reference
Applied Knowledge Questions
Common Application Design Considerations
E-Mail
DNS. HTTP/HTTPS. FTP. Instant Messaging
Application Evaluation
Summary
References
Applied Knowledge Questions
Identity Design Considerations
Basic Foundation Identity Concepts
Types of Identity
Factors in Identity
Role of Identity in Secure Networking
Identity Technology Guidelines
Identity Deployment Recommendations
Summary
References
Applied Knowledge Questions
IPsec VPN Design Considerations
VPN Basics
Types of IPsec VPNs
IPsec Modes of Operation and Security Options
Topology Considerations
Design Considerations
Site-to-Site Deployment Examples
IPsec Outsourcing
Summary
References
Applied Knowledge Questions
Supporting-Technology Design Considerations
Content
Load Balancing
Wireless LANs
IP Telephony
Summary
References
Applied Knowledge Questions
Designing Your Security System
Network Design Refresher
Security System Concepts
Impact of Network Security on the Entire Design
Ten Steps to Designing Your Security System
Summary
Applied Knowledge Questio

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×