Network Security Architectures offers a comprehensive how-to guide to understanding and implementing the Cisco security blueprint. Written by the two authors of the Cisco Systems SAFE blueprint, it taps into the design strategies of the experts from Cisco. The book begins by discussing the whys and hows of security, identifying relevant lifecycle models and showing the history behind current architectures. Part II provides a broad overview of all of the important security considerations and moving parts to implementing a security plan, itemizing security threats, and listing the elements of security in a network systems. One chapter is dedicated to the concept of device hardening--an essential, element-specific guide to defending pieces of the network.
Solutions are the focus of Part III, addressing the technology decisions that confront a security design engineer, including IPSec VPN, ICMP, NAT, and DHCP. This section also delves into identity issues and options and gives specific information on the security design process. In Part IV, the vulnerable "edge" and the threats that surround it are explored, specifically addressing campus networks and remote security design. Part V explores network management and network scanning. This section also discusses other ways to keep on top of threats, including using honeypots and sinkholes. It makes the comprehensive security presentation complete by providing readers with end-to-end real-world migration examples
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Sean Convery, CCIE No. 4232, is a security architect at Cisco Systems. He has been with the company for six years and is best known as the principal architect of the original Cisco SAFE Security Blueprint, as well as an author of several of its white papers. During his time at Cisco Systems, Sean has presented secure network design to thousands of Cisco customers around the world and consulted with scores of customers on security designs both large and small.
Expert guidance on designing secure networks
Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way.
Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed designs that deal with today's threats through applying defense-in-depth techniques and work through case studies to find out how to modify the designs to address the unique considerations found in your network.
Whether you are a network or security engineer, Network Security Architectures will become your primary reference for designing and building a secure network.
This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 9,45 expédition depuis Etats-Unis vers France
Destinations, frais et délaisEUR 25,79 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : BooksRun, Philadelphia, PA, Etats-Unis
Paperback. Etat : Fair. 1. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. N° de réf. du vendeur 158714297X-7-1
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books: West, Reno, NV, Etats-Unis
Etat : Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. N° de réf. du vendeur 48697778-75
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books, Mishawaka, IN, Etats-Unis
Etat : Good. Used book that is in clean, average condition without any missing pages. N° de réf. du vendeur 18904695-6
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
Paperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.7. N° de réf. du vendeur G158714297XI4N00
Quantité disponible : 1 disponible(s)
Vendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
Paperback. Etat : Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. N° de réf. du vendeur GOR014428540
Quantité disponible : 1 disponible(s)
Vendeur : Lexington Books Inc, Idaho Falls, ID, Etats-Unis
paperback. Etat : Very Good. N° de réf. du vendeur 157131
Quantité disponible : 1 disponible(s)
Vendeur : Toscana Books, AUSTIN, TX, Etats-Unis
Paperback. Etat : new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. N° de réf. du vendeur Scanned158714297X
Quantité disponible : 1 disponible(s)