Cargando…

Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization /

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions - Volume II brings together more expert-level instruction in security design, deployment, integration,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Woland, Aaron T. (Autor), Santuka, Vivek (Autor), Sanbower, Jamie (Autor), Mitchell, Chad (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : Cisco Press, [2019]
Colección:CCIE professional development.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1089256288
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190306s2019 njua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d CZL  |d OCLCQ  |d OCLCO  |d YDX  |d UKAHL  |d OCLCQ  |d OCLCO 
020 |a 9780134807614 
020 |a 0134807618 
020 |z 9780134807638 
029 1 |a AU@  |b 000069030577 
035 |a (OCoLC)1089256288 
037 |a CL0501000031  |b Safari Books Online 
050 4 |a QA76.585 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Woland, Aaron T.,  |e author. 
245 1 0 |a Integrated security technologies and solutions.  |n Volume II,  |p Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization /  |c Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell. 
246 3 0 |a Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization 
264 1 |a Hoboken, NJ :  |b Cisco Press,  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a CCIE professional development 
588 0 |a Online resource; title from title page (Safari, viewed March 4, 2019). 
504 |a Includes bibliographical references. 
520 |a The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions - Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Firewalls (Computer security) 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Coupe-feu (Sécurité informatique) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Firewalls (Computer security)  |2 fast 
700 1 |a Santuka, Vivek,  |e author. 
700 1 |a Sanbower, Jamie,  |e author. 
700 1 |a Mitchell, Chad,  |e author. 
830 0 |a CCIE professional development. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780134807614/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37802802 
938 |a YBP Library Services  |b YANK  |n 18082096 
994 |a 92  |b IZTAP