|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn172622952 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070917s2007 inu o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d TXJ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCA
|d AU@
|d OCLCQ
|d UAB
|d CNCEN
|d OCLCQ
|d ERF
|d UKBTH
|d UHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1105792583
|a 1112558090
|a 1113121035
|a 1113160206
|
020 |
|
|
|a 9781587054570
|
020 |
|
|
|a 1587054574
|
024 |
8 |
|
|a 9781587054570
|
029 |
1 |
|
|a AU@
|b 000067111636
|
029 |
1 |
|
|a CHBIS
|b 006149440
|
029 |
1 |
|
|a CHVBK
|b 171355601
|
029 |
1 |
|
|a DEBSZ
|b 355440210
|
029 |
1 |
|
|a HEBIS
|b 291510671
|
029 |
1 |
|
|a NZ1
|b 12467678
|
029 |
1 |
|
|a NZ1
|b 13940871
|
035 |
|
|
|a (OCoLC)172622952
|z (OCoLC)1105792583
|z (OCoLC)1112558090
|z (OCoLC)1113121035
|z (OCoLC)1113160206
|
037 |
|
|
|a CL0500000013
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .H83 2007
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 22/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hucaby, Dave.
|
245 |
1 |
0 |
|a Cisco ASA, PIX, and FWSM firewall handbook /
|c David Hucaby.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco Press,
|c 2007.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Ch. 1. Firewall overview -- Ch. 2. Configuration fundamentals -- Ch. 3. Building connectivity -- Ch. 4. Firewall management -- Ch. 5. Managing firewall users -- Ch. 6. Controlling access through the firewall -- Ch. 7. Inspecting traffic -- Ch. 8. Increasing firewall availability with failover -- Ch. 9. Firewall load balancing overview -- Ch. 10. Firewall logging -- Ch. 11. Verifying firewall operation -- Ch. 12. ASA modules -- App. A. Well known protocol and port numbers -- App. B. Security appliance logging messages.
|
520 |
|
|
|a Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. "Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco."--Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th ...
|
542 |
|
|
|f Copyright © 2008 Cisco Systems, Inc.
|g 2008
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|
710 |
2 |
|
|a Cisco Systems, Inc.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781587054570/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|