Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. In addition to acting as a key study aid for the CCSP SECUR 642-501 exam, this book will be an invaluable theory and configuration guide for years to come. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a Cisco authorized, self-paced learning tool that helps you gain mastery over all security techniques and technologies, including newer topics such as Cisco Easy VPN and Security Device Manager (SDM). Chapter overviews bring you quickly up to speed on technologies you can use to secure your network. Configuration examples are designed to show you how to make Cisco IOS devices secure, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with Cisco IOS security or a study guide for the 642-501 exam, CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is the reference you are looking for. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is part of a recommended learning path from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. This volume is in the Certification Self-Study Series offered by Cisco Press. Books in this series provide officially developed training solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations. 158705151603292004
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Prentice Hall版权所有
计算机网络
和美国西蒙与舒斯特国际出版公司合作出版
of widely separated networks , two “ half bridges ” are needed ( see Figures 14-6 and 14-7 , below ) . ... ( a ) Architecture tl , t8 User data t2 , t7 LLC - H User data t3 , t4 , 15 , to MAC - H LLC - H User data MAC - T ( b ) ...
The objective of this book is to provide an up-to-date survey of developments in computer security.
Internet and WWW 2: Internet Network Design, Implementation and Management
Companion CD-ROM The companion CD-ROM contains a test bank with over 200 practice questions and an electronic version of the text. This volume is part of the Exam Certification Guide Series from Cisco Press(r).
With link encryption, each vulnerable communications link is equipped on both ends with an encryption device.Thus,all traffic over all communications links is secured.Although this requires a lot of encryption devices in a large network ...