|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm58482010 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050316s2003 enka o 001 0 eng d |
010 |
|
|
|z 2001086635
|
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d VLB
|d OCLCQ
|d REB
|d CEF
|d MBB
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d COO
|d YDX
|d WYU
|d AU@
|d VT2
|d OCL
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA2-W1679
|
015 |
|
|
|a GBA2W1679
|2 bnb
|
016 |
7 |
|
|a 1587050250
|2 Uk
|
019 |
|
|
|a 144530046
|a 748108750
|a 1044203802
|a 1056375796
|a 1061016032
|a 1062896754
|a 1073070848
|a 1103279949
|a 1129337424
|a 1150853552
|
020 |
|
|
|z 1587050250
|
020 |
|
|
|a 9781587050251
|
020 |
|
|
|a 1587050250
|
029 |
1 |
|
|a HEBIS
|b 291462197
|
035 |
|
|
|a (OCoLC)58482010
|z (OCoLC)144530046
|z (OCoLC)748108750
|z (OCoLC)1044203802
|z (OCoLC)1056375796
|z (OCoLC)1061016032
|z (OCoLC)1062896754
|z (OCoLC)1073070848
|z (OCoLC)1103279949
|z (OCoLC)1129337424
|z (OCoLC)1150853552
|
050 |
|
4 |
|a TK5105.59
|b M365 2003
|
082 |
0 |
4 |
|a 005.8
|2 21
|
084 |
|
|
|a ST 273
|2 rvk
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Malik, Saadat.
|
245 |
1 |
0 |
|a Network security principles and practices /
|c Saadat Malik.
|
260 |
|
|
|a Indianapolis, Ind. ;
|a [Great Britain] :
|b Cisco,
|c 2003.
|
300 |
|
|
|a 1 online resource (xxvii, 774 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a CCIE professional development
|
505 |
0 |
|
|a Part I. Introduction to network security -- An introduction to network security -- Part II. Building security into the network -- Defining security zones -- Device security -- Secure routing -- Secure LAN switching -- Network address translation and security -- Part III. Firewalls -- What are firewalls? -- PIX firewall -- IOS firewall -- Part IV. Virtual private networks -- The concept of VPNs -- GRE -- L2TP -- IPSec -- Part V. Intrusion detection -- What is intrusion detection? -- Cisco secure intrusion detection -- Part VI. Network access control -- AAA -- TACACS+ -- RADIUS -- Special cases of using AAA for implementing security features -- Part VII. Service provider security -- Benefits and challenges of service provider security -- Using access control lists effectively -- Using NBAR to identify and control attacks -- Using CAR to control attacks -- Part VIII. Troubleshooting -- Troubleshooting network security implementations -- Part IX. Appendixes -- Appendix A. Answers to review questions -- Appendix B. SAFE: a security blueprint for Enterprise Networks white paper.
|
520 |
|
|
|a As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by the CCIE engineer who wrote the CCIE Security lab exam and who helped develop the CCIE Security written exam, Network Security Principles and Practices is the first book to help prepare candidates for the CCIE Security exams.
|
520 |
|
|
|a Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehensive treatment of VPNs and IPSec is presented in extensive packet-by-packet detail. The book takes a behind-the-scenes look at how the Cisco PIX(r) Firewall actually works, presenting many difficult-to-understand and new Cisco PIX Firewall and Cisco IOS(r) Firewall concepts. The book launches into a discussion of intrusion detection systems (IDS) by analyzing and breaking down modern-day network attacks, describing how an IDS deals with those threats in general, and elaborating on the Cisco implementation of IDS. The book also discusses AAA, RADIUS, and TACACS+ and their usage with some of the newer security implementations as VPNs and proxy authentication. A complete section devoted to service provider techniques for enhancing customer security and providing support in the event of an attack is also include. Finally the book concludes with a section dedicated to discussing tried-and-tested troubleshooting tools and techniques that are not only invaluable to candidates working toward their CCIE Security lab exam but also to the security network administrator running the operations of a network on a daily basis.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations
|2 fast
|
655 |
|
7 |
|a examination study guides.
|2 aat
|
655 |
|
7 |
|a Study guides
|2 fast
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
655 |
|
7 |
|a Guides de l'étudiant.
|2 rvmgf
|
776 |
0 |
8 |
|i Print version:
|z 1587050250
|w (DLC) 2001086635
|w (OCoLC)50177332
|
830 |
|
0 |
|a CCIE professional development.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587050250/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851711
|
938 |
|
|
|a Internet Archive
|b INAR
|n networksecurityp0000mali
|
994 |
|
|
|a 92
|b IZTAP
|