Articoli correlati a Designing Network Security

Kaeo, Merike Designing Network Security ISBN 13: 9781587142499

Designing Network Security - Brossura

 
9781587142499: Designing Network Security

Sinossi

A practical guide to creating a secure network infrastructure

  • Understand basic cryptography and security technologies
  • Identify the threats and common attacks to a network infrastructure
  • Learn how to create a security policy
  • Find out how to recover from a security breach
  • Study specific implementation scenarios for securing your network environment
  • Learn about advances in security technologies

Designing Network Security, Second Edition, is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.

You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment.

This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples.

This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sull?autore

Merike Kaeo, CCIE No. 1287, is currently a consultant focusing primarily on security-related products and network design solutions. She has been in the networking industry more than 15 years, starting out at the National Institutes of Health in Bethesda, MD, from 1988 to 1993, designing and implementing the original FDDI backbone for the NIH campus using Cisco routers. From 1993 to 2000, Merike was employed by Cisco Systems, Inc., where she worked primarily on technical issues relating to router performance, network routing protocols, network design, and network security. She was a lead member of the Cisco security initiative, has acted as a technical advisor for security startup companies, and has been an instructor and speaker in a variety of security-related conferences. Merike received her BSEE from Rutgers University in 1987 and completed her MSEE degree from George Washington University in 1998.

Dalla quarta di copertina

A practical guide to creating a secure network infrastructure

  • Understand basic cryptography and security technologies
  • Identify the threats and common attacks to a network infrastructure
  • Learn how to create a security policy
  • Find out how to recover from a security breach
  • Study specific implementation scenarios for securing your network environment
  • Learn about advances in security technologies

Designing Network Security, Second Edition, is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.

You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment.

This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples.

This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Compra usato

Condizioni: buono
A copy that has been read, remains...
Visualizza questo articolo

EUR 10,27 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

Altre edizioni note dello stesso titolo

9781587051173: Designing Network Security

Edizione in evidenza

ISBN 10:  1587051176 ISBN 13:  9781587051173
Casa editrice: Cisco Systems, 2003
Rilegato

Risultati della ricerca per Designing Network Security

Immagini fornite dal venditore

Kaeo, Merike
Editore: Cisco Systems, 2003
ISBN 10: 158714249X ISBN 13: 9781587142499
Antico o usato Brossura

Da: -OnTimeBooks-, Phoenix, AZ, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: good. A copy that has been read, remains in good condition. All pages are intact, and the cover is intact. The spine and cover show signs of wear. Pages can include notes and highlighting and show signs of wear, and the copy can include "From the library of" labels or previous owner inscriptions. 100% GUARANTEE! Shipped with delivery confirmation, if youâre not satisfied with purchase please return item for full refund. Ships via media mail. Codice articolo OTV.158714249X.G

Contatta il venditore

Compra usato

EUR 12,51
Convertire valuta
Spese di spedizione: EUR 10,27
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Kaeo, Merike
Editore: Cisco Press, 2003
ISBN 10: 158714249X ISBN 13: 9781587142499
Antico o usato Paperback

Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 2.9. Codice articolo G158714249XI5N00

Contatta il venditore

Compra usato

EUR 13,30
Convertire valuta
Spese di spedizione: EUR 18,65
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello