Résumé
Increasingly, the best defenses come from the folks who probably helped you build your infrastructure: Cisco. Now there's a single resource for learning about all of them: Cisco Security Bible. The authors begin with essential techniques like Access Control Lists, which offer more flexibility and capability than many netadmins realize. For instance, you'll find detailed coverage of reflexive access lists, which filter IP packets based on upper-layer session information, and provide important security against spoofing and some DOS attacks.)
You'll walk through deploying and configuring the Cisco PIX firewall, configuring your network access server for AAA security, and securing your VPN using IPSec and Cisco Secure VPN clients. Next, the authors review a laundry list of Cisco security products, new and old, including CiscoWorks 2000 ACL, Cisco PIX Firewall Manager, and Cisco Secure Policy Manager, to name a few. If you're trying to secure a Cisco network, this book helps you even the odds. (Bill Camarda)
Contents
Foreword
Preface
Part I: Understanding Network Security
Chapter 1: Identifying Threats to Network Security
Chapter 2: Internet Protocol Network Security
Chapter 3: Detecting Intrusions
Part II: Securing Networks
Chapter 4: Securing the Network Infrastructure
Chapter 5: Securing Networks Using ACL
Chapter 6: Protecting Networks Using Cisco Perimeter
Routers
Chapter 7: Cisco Encryption Technology
Part III: Security Using Firewalls
Chapter 8: Cisco IOS Firewall
Chapter 9: Cisco PIX Firewall
Part IV: Understanding and Implementing AAA
Chapter 10: Cisco AAA Security Technology
Chapter 11: Configuring the Network Access Server for AAA
Security
Part V: Virtual Private Networks
Chapter 12:Fundamentals of Virtual Private
Networks
Chapter 13: Securing a Virtual Private Network
Part VI: Cisco Technologies and Security Products
Chapter 14: Cisco IOS IPSec
Chapter 15: Cisco's Network-Security Management
Products
Chapter 16: Cisco Firewall and VPN Management Products
Part VII: A Networking Primer
Chapter 17: Networking Basics
Chapter 18: OSI Model—An Overview
Appendix A:Assessment Questions
Appendix B: Lab Exercises
Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Rajesh Kumar Sharma |
Parution | 16/04/2002 |
Nb. de pages | 780 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 1190g |
Intérieur | Noir et Blanc |
EAN13 | 9780764548789 |
ISBN13 | 978-0-7645-4878-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet