Cisco Security Bible - Rajesh Kumar Sharma - Librairie Eyrolles

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Cisco Security Bible
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Cisco Security Bible

Cisco Security Bible

Rajesh Kumar Sharma

780 pages, parution le 16/04/2002

Résumé

When you consider what netadmins and security professionals are up against, it almost sounds hopeless. The Internet makes it possible to attack your network from virtually anywhere, using any of billions of devices. Worst of all, some 90 percent of security attacks come from inside the organization. How're you going to overcome all that?

Increasingly, the best defenses come from the folks who probably helped you build your infrastructure: Cisco. Now there's a single resource for learning about all of them: Cisco Security Bible. The authors begin with essential techniques like Access Control Lists, which offer more flexibility and capability than many netadmins realize. For instance, you'll find detailed coverage of reflexive access lists, which filter IP packets based on upper-layer session information, and provide important security against spoofing and some DOS attacks.)

You'll walk through deploying and configuring the Cisco PIX firewall, configuring your network access server for AAA security, and securing your VPN using IPSec and Cisco Secure VPN clients. Next, the authors review a laundry list of Cisco security products, new and old, including CiscoWorks 2000 ACL, Cisco PIX Firewall Manager, and Cisco Secure Policy Manager, to name a few. If you're trying to secure a Cisco network, this book helps you even the odds. (Bill Camarda)

Contents

Foreword
Preface

Part I: Understanding Network Security

Chapter 1: Identifying Threats to Network Security
Chapter 2: Internet Protocol Network Security
Chapter 3: Detecting Intrusions

Part II: Securing Networks

Chapter 4: Securing the Network Infrastructure
Chapter 5: Securing Networks Using ACL
Chapter 6: Protecting Networks Using Cisco Perimeter Routers
Chapter 7: Cisco Encryption Technology

Part III: Security Using Firewalls

Chapter 8: Cisco IOS Firewall
Chapter 9: Cisco PIX Firewall

Part IV: Understanding and Implementing AAA

Chapter 10: Cisco AAA Security Technology
Chapter 11: Configuring the Network Access Server for AAA Security

Part V: Virtual Private Networks

Chapter 12:Fundamentals of Virtual Private Networks
Chapter 13: Securing a Virtual Private Network

Part VI: Cisco Technologies and Security Products

Chapter 14: Cisco IOS IPSec
Chapter 15: Cisco's Network-Security Management Products
Chapter 16: Cisco Firewall and VPN Management Products

Part VII: A Networking Primer

Chapter 17: Networking Basics
Chapter 18: OSI Model—An Overview

Appendix A:Assessment Questions
Appendix B: Lab Exercises

Index

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) Rajesh Kumar Sharma
Parution 16/04/2002
Nb. de pages 780
Format 18,5 x 23,5
Couverture Broché
Poids 1190g
Intérieur Noir et Blanc
EAN13 9780764548789
ISBN13 978-0-7645-4878-9

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription