Expert solutions for securing network infrastructures and VPNs.
Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments
Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts
Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec
Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques
Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them
Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols
Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks
Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios
As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by the CCIE engineer who wrote the CCIE Security lab exam and who helped develop the CCIE Security written exam, Network Security Principles and Practices is the first book to help prepare candidates for the CCIE Security exams.
Explorations in Information Space: Knowledge, Actor, and Firms As humankind seeks to extend its spatiotemporal reach both on and beyond its planet, it is constantly being forced by a recalcitrant nature to renegotiate the terms of its covenant with her. In some cases, the bargaining gets tough and nature takes offence, gradually revealing her anger with the terms that humanity seeks to impose on her through... Enterprise Java with UML
This work is a comprehensive guide to using UML (Unified Modelling Language) in model Java applications. The book presents strategies for developing enterprise systems using Java and related technologies - XML, Servlets, Enterprise JavaBeans, Swing Components, CORBA, RMI, and others. The authors explain how UML is used as a modelling tool for...
Network Security Bible If you need a solid foundation in network security, this is it
Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how...
Bring Me Home! Cats Make Great Pets
The book to bring home before you bring home a kitten or a cat!
At last--a practical, hands-on guide to help you determine if your family is ready for a kitten or a cat. Cats are usually fairly selfsufficient and wonderfully entertaining, but they do require some attention and care. With loads of information and a fun,...