|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn297576680 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090109s2008 inua ob 001 0 eng d |
010 |
|
|
|z 2007042606
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d C6I
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCQ
|d YDX
|d OCLCQ
|d OCLCF
|d AU@
|d OCLCQ
|d WYU
|d UAB
|d VT2
|d OCLCQ
|d LDP
|d HS0
|d OCLCO
|d OCLCQ
|d UKAHL
|d OCLCQ
|d INARC
|
019 |
|
|
|a 1044284223
|a 1056341844
|a 1060807073
|a 1064060408
|a 1074324949
|a 1103278872
|a 1129364812
|a 1153018173
|a 1156830678
|a 1180298288
|a 1192328822
|a 1240530642
|a 1392124050
|
020 |
|
|
|a 9781587053368
|
020 |
|
|
|a 1587053365
|
020 |
|
|
|a 0132796732
|
020 |
|
|
|a 9780132796736
|
029 |
1 |
|
|a CHBIS
|b 006151509
|
029 |
1 |
|
|a CHVBK
|b 17115164X
|
029 |
1 |
|
|a DEBSZ
|b 355440180
|
029 |
1 |
|
|a HEBIS
|b 291510647
|
029 |
1 |
|
|a AU@
|b 000073551858
|
035 |
|
|
|a (OCoLC)297576680
|z (OCoLC)1044284223
|z (OCoLC)1056341844
|z (OCoLC)1060807073
|z (OCoLC)1064060408
|z (OCoLC)1074324949
|z (OCoLC)1103278872
|z (OCoLC)1129364812
|z (OCoLC)1153018173
|z (OCoLC)1156830678
|z (OCoLC)1180298288
|z (OCoLC)1192328822
|z (OCoLC)1240530642
|z (OCoLC)1392124050
|
037 |
|
|
|a CL0500000030
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.543
|b .S38 2008
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Schudel, Gregg.
|
245 |
1 |
0 |
|a Router security strategies :
|b securing IP network traffic planes /
|c Gregg Schudel, David J. Smith.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco Press,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xxiii, 650 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. I. IF Network and Traffic Plane Security Fundamentals -- Ch. 1. Internet Protocol Operations Fundamentals -- Ch. 2. Threat Models for IF Networks -- Ch. 3. IP Network Traffic Plane Security Concepts -- pt. II. Security Techniques for Protecting IP TrafficPlanes -- Ch. 4. IF Data Plane Security -- Ch. 5. IF Control Plane Security -- Ch. 6. IF Management Plane Security -- Ch. 7. IP Services Plane Security -- pt. III. Case Studies -- Ch. 8. Enterprise Network Case Studies -- Ch. 9. Service Provider Network Case Studies -- pt. IV. Appendixes -- App. A. Answers to Chapter Review Questions -- App. B. IF Protocol Headers -- App. C. Cisco IOS to IOS XR Security Transition -- App. D. Security Incident Handling.
|
520 |
1 |
|
|a "Router Security Strategies: Securing IP Network Traffic Planes provides a comprehensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IF networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide tile infrastructure for IP networking."--Jacket
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Routers (Computer networks)
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a TCP/IP (Computer network protocol)
|x Security measures.
|
650 |
|
6 |
|a Routeurs (Réseaux d'ordinateurs)
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a TCP/IP (Protocole de réseaux d'ordinateurs)
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Routers (Computer networks)
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a TCP/IP (Computer network protocol)
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Smith, David J.
|c (Computer engineer)
|
776 |
0 |
8 |
|i Print version:
|a Schudel, Gregg.
|t Router security strategies.
|d Indianapolis, Ind. : Cisco Press, ©2008
|w (DLC) 2007042606
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781587053368/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37818535
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37808126
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851092
|
938 |
|
|
|a Internet Archive
|b INAR
|n routersecurityst0000schu
|
994 |
|
|
|a 92
|b IZTAP
|