Skip to content

Network Security Technologies and Solutions A Comprehensive, All-in-One Reference for Cisco Network Security

Best in textbook rentals since 2012!

ISBN-10: 1587052466

ISBN-13: 9781587052460

Edition: 2008

Authors: Yusuf Bhaiji

List price: $82.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

A comprehensive, all-in-one reference for Cisco network security A valuable single source reference for any network professionals interested in learning about cutting edge network security technologies Learn from the comprehensive, end-to-end approach to securing network infrastructures Use the design and deployment guidelines to optimize network security performance Full coverage of the latest CCIE Security exam objectives Network Security Technologies and Solutionsis a comprehensive reference to the most cutting edge network security products and methodologies. This book helps networking professionals understand and implement current, state-of-the-art network security technologies to…    
Customers also bought

Book details

List price: $82.99
Copyright year: 2008
Publisher: Cisco Press
Publication date: 3/20/2008
Binding: Hardcover
Pages: 840
Size: 7.75" wide x 9.50" long x 2.00" tall
Weight: 3.322
Language: English

Perimeter Security
Overview of Network Security
Fundamental Questions for Network Security
Transformation of the Security Paradigm
Principles of Security The CIA Model
Confidentiality
Integrity
Availability
Policies, Standards, Procedures, Baselines, Guidelines
Security Policy
Examples of Security Policies
Standards
Procedures
Baselines
Guidelines
Security Models
Perimeter Security
Is Perimeter Security Disappearing?
The Difficulty of Defining Perimeter
A Solid Perimeter Security Solution
Security in Layers
Multilayer Perimeter Solution
The Domino Effect
Security Wheel
Summary
References
Access Control
Traffic Filtering Using ACLs
ACL Overview
ACL Applications
When to Configure ACLs
IP Address Overview
Classes of IP Addresses
Understanding IP Address Classes
Private IP Address (RFC
Subnet Mask Versus Inverse Mask Overview
Subnet Mask
Inverse Mask
ACL Configuration
Creating an ACL
Assigning a Unique Name or Number to Each ACL
Applying an ACL to an Interface
Direction of the ACL
Understanding ACL Processing
Inbound ACL
Outbound ACL