Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing Network Security (2nd Edition) (Networking Technology)

Buy
Master the design of secure networks with the updated edition of this best-selling security guide

* Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
* Learn how to use new and legacy Cisco Systems equipment to secure your networks
* Understand how to design and build security services while also learning the legal and network accessibility impact of those services

Designing Network Security, Second Edition is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. In addition it provides a complete description of Cisco security products and useful implementation examples.

You will gain a thorough understanding of basic cryptography and the most widely deployed security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities, and understanding the steps required to perform a risk management assessment.

Examine underlying security technologies, the process of creating a security policy, the practical requirements necessary to implement a corporate security policy, the latest security technology enhancements, and recent legal issues. This book also allows you to view many of the new Cisco security products including Altiga, and the NetRanger intrusion detection system.

Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. In addition, practical scenarios dealing specifically with certain types of networks such as voice, storage, VPN, will translate theory into real-world situations.

About the Author

Merike Kaeo, CCIE No. 1287, is currently a consultant focusing primarily on security-related products and network design solutions. She has been in the networking industry more than 15 years, starting out at the National Institutes of Health in Bethesda, MD, from 1988 to 1993, designing and implementing the original FDDI backbone for the NIH campus using Cisco routers. From 1993 to 2000, Merike was employed by Cisco Systems, Inc., where she worked primarily on technical issues relating to router performance, network routing protocols, network design, and network security. She was a lead member of the Cisco security initiative, has acted as a technical advisor for security startup companies, and has been an instructor and speaker in a variety of security-related conferences. Merike received her BSEE from Rutgers University in 1987 and completed her MSEE degree from George Washington University in 1998.

(HTML tags aren't allowed.)

3D Images of Materials Structures: Processing and Analysis
3D Images of Materials Structures: Processing and Analysis

Taking and analyzing images of materials' microstructures is essential for quality control, choice and design of all kind of products. Today, the standard method still is to analyze 2D microscopy images. But, insight into the 3D geometry of the microstructure of materials and measuring its characteristics become more and more prerequisites in...

Mystic Microsoft: A Journey of Transformation in the Halls of High Technology
Mystic Microsoft: A Journey of Transformation in the Halls of High Technology
Where do you go to grow spiritually? A church? A monastery? India? Tibet? What about the heart of corporate multinationalism? Mystic Microsoft demonstrates that with sincerity and self-offering, God can (and will) guide one's inner growth in any setting, not just formal religious channels. Here, one of Microsoft's most visible technology experts...
Core JavaServer Faces (Sun Microsystems Press Java Series)
Core JavaServer Faces (Sun Microsystems Press Java Series)

JavaServer Faces promises to bring rapid user-interface development to server-side Java. It allows developers to painlessly write server-side applications without worrying about the complexities of dealing with browsers and Web servers. It also automates low-level, boring details like control flow and moving code between web...


Continuous Delivery with Visual Studio ALM  2015
Continuous Delivery with Visual Studio ALM 2015

This book is the authoritative source on implementing Continuous Delivery practices using Microsoft’s Visual Studio and TFS 2015. Microsoft MVP authors Mathias Olausson and Jakob Ehn translate the theory behind this methodology and show step by step how to implement Continuous Delivery in a real world environment.

Building...

Business Services Orchestration: The Hypertier of Information Technology
Business Services Orchestration: The Hypertier of Information Technology

Business Services Orchestration (BSO) is a new, unique, far-reaching industry technology encompassing the art of harmoniously organizing the interactions between business services. These business services may represent internal business processes of organizations. Integration of many of these internal legacy, custom, and COTS applications may,...

Direct3D Rendering Cookbook
Direct3D Rendering Cookbook

50 practical recipes to guide you through the advanced rendering techniques in Direct3D to help bring your 3D graphics project to life

About This Book

  • Learn and implement the advanced rendering techniques in Direct3D 11.2 and bring your 3D graphics project to life
  • Study the source code...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy