Securing and Controlling Cisco Routers
Seiten
2002
Auerbach (Verlag)
978-0-8493-1290-8 (ISBN)
Auerbach (Verlag)
978-0-8493-1290-8 (ISBN)
Demonstrates techniques for strengthening network security. The book provides an introduction to Cisco technology and the TCP/IP protocol suite, and covers subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA).
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.
At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.
At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Peter T. Davis
The Basics. Preventing Unauthorized Access: Networking Device. Preventing Unauthorized Access: Networking. Preventing Network Data Interception. Preventing Denial Of Service. Preventing Fraudulent Route Updates And Other Unauthorized Changes. Appendixes.
Erscheint lt. Verlag | 15.5.2002 |
---|---|
Zusatzinfo | 86 Tables, black and white; 14 Halftones, black and white; 32 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 178 x 254 mm |
Gewicht | 1360 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Office Programme ► Outlook | |
ISBN-10 | 0-8493-1290-6 / 0849312906 |
ISBN-13 | 978-0-8493-1290-8 / 9780849312908 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
eine Cyberstaatsanwältin ermittelt
Buch | Hardcover (2024)
Murmann Publishers (Verlag)
25,00 €