Cargando…

Securing your business with CISCO ASA and PIX firewalls /

Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cis...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Abelar, Greg
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : London : Cisco ; Pearson Education [distributor], 2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocm61315616
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 050822s2005 inu fo 000 0 eng d
010 |a  2004111842 
040 |a OCL  |b eng  |e pn  |c OCL  |d OCLCQ  |d CSU  |d OCLCQ  |d OCLCF  |d IDEBK  |d OCLCO  |d OCLCQ  |d YDX  |d WYU  |d CEF  |d VT2  |d OCLCO  |d UKAHL  |d OCLCQ  |d OCLCO 
019 |a 1048094510  |a 1048391107  |a 1062854573  |a 1103255269  |a 1129363465 
020 |a 8131737748 
020 |a 9788131737743 
020 |z 1587052148 
020 |a 9781587052149 
020 |a 1587052148 
035 |a (OCoLC)61315616  |z (OCoLC)1048094510  |z (OCoLC)1048391107  |z (OCoLC)1062854573  |z (OCoLC)1103255269  |z (OCoLC)1129363465 
050 4 |a QA76.9.A25  |b .A1413 2005eb 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Abelar, Greg. 
245 1 0 |a Securing your business with CISCO ASA and PIX firewalls /  |c Greg Abelar. 
260 |a Indianapolis, Ind. :  |b Cisco ;  |a London :  |b Pearson Education [distributor],  |c 2005. 
300 |a 1 online resource (288 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis... 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Firewalls (Computer security) 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 6 |a Coupe-feu (Sécurité informatique) 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Firewalls (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Abelar, Greg.  |t Securing your business with CISCO ASA and PIX firewalls.  |d Indianapolis, Ind. : Cisco ; London : Pearson Education [distributor], 2005  |z 1587052148  |w (OCoLC)60371415 
856 4 0 |u https://learning.oreilly.com/library/view/~/1587052148/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37819375 
938 |a YBP Library Services  |b YANK  |n 14851745 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis23897572 
938 |a YBP Library Services  |b YANK  |n 15629063 
994 |a 92  |b IZTAP