|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1042318729 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180707s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d IDB
|d NLE
|d UKMGB
|d OCLCQ
|d RDF
|d OCLCO
|d OCLCF
|d OCLCQ
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
016 |
7 |
|
|a 018923025
|2 Uk
|
020 |
|
|
|a 9781787124585
|
020 |
|
|
|a 1787124584
|
029 |
1 |
|
|a AU@
|b 000066229945
|
029 |
1 |
|
|a UKMGB
|b 018923025
|
035 |
|
|
|a (OCoLC)1042318729
|
037 |
|
|
|a 9781787124585
|b Packt Publishing
|
050 |
|
4 |
|a T57.85
|b .S564 2018eb
|
082 |
0 |
4 |
|a 658.4032
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Singh, Glen D.
|
245 |
1 |
0 |
|a CCNA Security 210-260 Certification Guide :
|b Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (509 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Exploring Security Threats; Important terms in network security; Threats; Vulnerability; Analyzing vulnerability; Introduction to an attack; Passive attacks; Active attacks; Spoofing attacks; Internet protocol -- the heart of internet communication; How is an IP datagram spoofed?; IP spoofing; Scanning; Hijacking an online session; Flooding; ARP spoofing attacks; Mitigating ARP spoofing attacks; The DHCP process; Why DHCP snooping?; Trusted and untrusted sources; Ping of Death.
|
505 |
8 |
|
|a TCP SYN flood attacksPassword attacks; Buffer overflow attacks; Malware; Network security tools; Wireshark; Metasploit; Kali Linux; Summary; Chapter 2: Delving into Security Toolkits; Firewall functions; Rules of a firewall; Types of firewall; Packet-filtering firewall/stateless firewall; Circuit-level gateway firewall/stateful firewall; Application-layer firewall; Zone-based firewall; Intrusion prevention system ; Intrusion detection system ; Virtual Private Network; Benefits of VPN; Site-to-site VPNs; Remote-access VPN; Content security; Content Security Policy.
|
505 |
8 |
|
|a Cisco Email Security ApplianceCisco IronPort Web Security Appliance; Endpoint security; Summary; Chapter 3: Understanding Security Policies; Need for a security policy; Five steps for a security policy; Security policy components ; Best example for a security policy -- a password policy; How to develop a policy; Risk; Risk analysis; Benefits of risk analysis; Quantitative risk; Qualitative risk; Vulnerability; Weakness in technology; Weakness in configuration; Weakness in a security policy; Threat; Threat consequence; Disclosure; Threat action -- exposure; Threat action -- interception.
|
505 |
8 |
|
|a Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).
|
505 |
8 |
|
|a Sarbanes-Oxley Act (SOX)Federal Information Security Management Act (FISMA); GLBA; PIPED Act; Data Protection Directive; Digital Millennium Copyright Act (DMCA); Safe Harbor Act; Summary; Chapter 4: Deep Diving into Cryptography; What is cryptography?; Objectives of cryptography; Confidentiality ; Data integrity; Authentication; Non-repudiation; Terminologies; Types of encryption; Symmetric encryption; Asymmetric encryption; Types of cipher; Substitution cipher; Transposition cipher; Block ciphers; Stream ciphers; Key; Encryption algorithms; Data Encryption Standard.
|
500 |
|
|
|a Triple Data Encryption Standard (3DES).
|
520 |
|
|
|a With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Network analysis (Planning)
|
650 |
|
6 |
|a Analyse de réseau (Planification)
|
650 |
|
7 |
|a Network analysis (Planning)
|2 fast
|
700 |
1 |
|
|a G, Michael Vinod.
|
700 |
1 |
|
|a Anandh, Vijay.
|
758 |
|
|
|i has work:
|a CCNA SECURITY 210-260 CERTIFICATION GUIDE;BUILD YOUR KNOWLEDGE OF NETWORK SECURITY AND PASS YOUR CCNA SECURITY EXAM (210-260) (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCXK878K4fJcqgG6CJ6XBMX
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Singh, Glen D.
|t CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).
|d Birmingham : Packt Publishing Ltd, ©2018
|z 9781787128873
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5434472
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5434472
|
994 |
|
|
|a 92
|b IZTAP
|