Go back
Designing Network Security A Practical Guide To Creating A Secure Network Infrastructure(2nd Edition)
Authors:
Merike Kaeo
Cover Type:Hardcover
Condition:Used
In Stock
Include with your book
Free shipping: April 03, 2024Popular items with books
Access to 3 Million+ solutions
Free ✝
Ask 10 Questions from expert
200,000+ Expert answers
✝ 7 days-trial
Total Price:
$0
List Price: $7.98
Savings: $7.98(100%)
Book details
ISBN: 158714249X, 978-1587142499
Book publisher: Cisco Press
Get your hands on the best-selling book Designing Network Security A Practical Guide To Creating A Secure Network Infrastructure 2nd Edition for free. Feed your curiosity and let your imagination soar with the best stories coming out to you without hefty price tags. Browse SolutionInn to discover a treasure trove of fiction and non-fiction books where every page leads the reader to an undiscovered world. Start your literary adventure right away and also enjoy free shipping of these complimentary books to your door.
Designing Network Security A Practical Guide To Creating A Secure Network Infrastructure 2nd Edition Summary: A practical guide to creating a secure network infrastructureUnderstand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologiesDesigning Network Security, Second Edition, is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment.This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples.This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Customers also bought these books
Frequently Bought Together
Top Reviews for Books
Douglas Springer
( 4 )
"Delivery was considerably fast, and the book I received was in a good condition."