Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Fundamentals

Buy
Network Security Fundamentals, 9781587051678 (1587051672), Cisco Press, 2004

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions.

Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems.

Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies.

Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.

(HTML tags aren't allowed.)

A Grammatical View of Logic Programming (Logic Programming)
A Grammatical View of Logic Programming (Logic Programming)

Within the field of logic programming there have been numerous attempts to transform grammars into logic programs. This book describes a complementary approach that views logic programs as grammars and shows how this new presentation of the foundations of logic programming, based on the notion of proof trees, can enrich the field.
...

Antennas And Propagation for Body-Centric Wireless Communications
Antennas And Propagation for Body-Centric Wireless Communications
Get ready for the tidal wave of "body centric" electronic systems that will take mobile communications and computing to new heights! This first-of-its-kind book will help engineers pave the way with its definitive treatment of on-body antenna theory, design and applications. It coverers both the state-of-the-art in existing systems...
Mastering Windows Server 2016
Mastering Windows Server 2016
The IT pro's must-have guide to Windows Server 2016

Mastering Windows Server 2016 is a complete resource for IT professionals needing to get quickly up to date on the latest release. Designed to provide comprehensive information in the context of real-world usage, this book offers expert guidance through the new...


A Handbook of Software and Systems Engineering: Empirical Observations, Laws, and Theories
A Handbook of Software and Systems Engineering: Empirical Observations, Laws, and Theories
Computers are the most pervasive tools of modern society. Their deployment relies on advanced methods of software and systems engineering. Based on repeated and consistent observations, key lessons of these fields can now be formulated into rules or even laws, providing initial building blocks towards a theoretical foundation that is essential for...
Femtosecond Optical Frequency Comb: Principle, Operation and Applications
Femtosecond Optical Frequency Comb: Principle, Operation and Applications
This book provides an introductory description of mode-locked lasers, the connection between time and frequency descriptions of their output and the physical origins of the electric field dynamics, together with an overview of applications of femtosecond comb technology. Individual chapters go into more detail on mode-locked laser development,...
Linux Shell Scripting Essentials
Linux Shell Scripting Essentials

Learn shell scripting to solve complex shell-related problems and to efficiently automate your day-to-day tasks

About This Book

  • Familiarize yourself with the terminal by learning about powerful shell features
  • Automate tasks by writing shell scripts for repetitive work
  • ...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy