Our Privacy Policy has changed. By using this site, you agree to the Privacy Policy.

Network Security Technologies and Solutions A Comprehensive, All-in-One Reference for Cisco Network Security

ISBN-10: 1587052466
ISBN-13: 9781587052460
Edition: 2008
Authors: Yusuf Bhaiji
List price: $82.99
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: A comprehensive, all-in-one reference for Cisco network security A valuable single source reference for any network professionals interested in learning about cutting edge network security technologies Learn from the comprehensive, end-to-end  More...

what's this?
Rush Rewards U
Members Receive:
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Writing a Scientific Report Online content $4.95 $1.99

Customers also bought


Book details

List price: $82.99
Copyright year: 2008
Publisher: Cisco Press
Publication date: 3/20/2008
Binding: Hardcover
Pages: 840
Size: 7.75" wide x 9.50" long x 2.00" tall
Weight: 1.958
Language: English

A comprehensive, all-in-one reference for Cisco network security A valuable single source reference for any network professionals interested in learning about cutting edge network security technologies Learn from the comprehensive, end-to-end approach to securing network infrastructures Use the design and deployment guidelines to optimize network security performance Full coverage of the latest CCIE Security exam objectives Network Security Technologies and Solutionsis a comprehensive reference to the most cutting edge network security products and methodologies. This book helps networking professionals understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help network security engineers implement end-to-end security solutions. Divided into five parts, Network Security Technologies and Solutions takesnbsp;you from the fundamental level of each technology and progresses to more detailed descriptions and discussions of how to secure each part of the network infrastructure. Part 1 addresses perimeter security. Part 2 discusses identity. Part 3 examines data privacy. Part 4 covers security monitoring. Part 5 addresses policy management. With this definitive reference, younbsp;will gain a greater understanding of the solutions available and learn how to build integrated, secure networks in todays modern, heterogeneous networking environment. The book is comprehensive in scope, including information about mature as well as emerging technologies. Coverage is broad, but it will be deep enough to providenbsp;you with design and implementation guidelines as well as basic configuration skills.

Perimeter Security
Overview of Network Security
Fundamental Questions for Network Security
Transformation of the Security Paradigm
Principles of Security The CIA Model
Policies, Standards, Procedures, Baselines, Guidelines
Security Policy
Examples of Security Policies
Security Models
Perimeter Security
Is Perimeter Security Disappearing?
The Difficulty of Defining Perimeter
A Solid Perimeter Security Solution
Security in Layers
Multilayer Perimeter Solution
The Domino Effect
Security Wheel
Access Control
Traffic Filtering Using ACLs
ACL Overview
ACL Applications
When to Configure ACLs
IP Address Overview
Classes of IP Addresses
Understanding IP Address Classes
Private IP Address (RFC
Subnet Mask Versus Inverse Mask Overview
Subnet Mask
Inverse Mask
ACL Configuration
Creating an ACL
Assigning a Unique Name or Number to Each ACL
Applying an ACL to an Interface
Direction of the ACL
Understanding ACL Processing
Inbound ACL
Outbound ACL

Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.