• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Securing and Controlling Cisco Routers Ology, and Profits » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Securing and Controlling Cisco Routers Ology, and Profits

ISBN-13: 9780849312908 / Angielski / Miękka / 2002 / 736 str.

Peter T. Davis
Securing and Controlling Cisco Routers Ology, and Profits Davis, Peter T. 9780849312908 Auerbach Publications - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Securing and Controlling Cisco Routers Ology, and Profits

ISBN-13: 9780849312908 / Angielski / Miękka / 2002 / 736 str.

Peter T. Davis
cena 560,94 zł
(netto: 534,23 VAT:  5%)

Najniższa cena z 30 dni: 554,12 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.
At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Kategorie:
Informatyka, Sieci komputerowe
Kategorie BISAC:
Computers > Networking - Hardware
Computers > Security - General
Technology & Engineering > Data Transmission Systems - General
Wydawca:
Auerbach Publications
Język:
Angielski
ISBN-13:
9780849312908
Rok wydania:
2002
Ilość stron:
736
Waga:
1.26 kg
Wymiary:
25.5 x 17.98 x 3.71
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Glosariusz/słownik
Wydanie ilustrowane

THE BASICS
The Need for Security
The New Reality
Designing the Security Infrastructure
Identifying Security Risks and Threats
Practice Session
Security and Audit Checklist
Conclusion
Understanding OSI and TCP/IP
The OSI Model
TCP/IP Overview
Practice Session
Security and Audit Checklist
Conclusion
Routed and Routing Protocols
Routing Activities
Routable Protocols
Routing Protocols
Routing Protocol Basics
Practice Session
Security and Audit Checklist
Conclusion
Understanding Router Basics
Router Overview
Router Modes
Router Components
Router Status
Practice Session
Security and Audit Checklist
Conclusion
Router Management
Router Setup
Updating the IOS
Troubleshooting
Logging
Recording Access List Violations
Log Processing
Simple Network Management Protocol (SNMP)
Cisco Discovery Protocol
Last Word on Management
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING UNAUTHORIZED ACCESS: NETWORKING DEVICE
Implementing Non-AAA Authentication
Authentication
Using Router Passwords
Configuring Line Password Protection
Setting TACACS Passwords for Privileged EXEC Mode
Establishing Username Authentication
Enabling CHAP or PAP Authentication
Configuring TACACS and Extended TACACS Password Protection
General Interactive Access
Warning Banners and Router Identification
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Security Services
Accessing the Network
Defining AAA
Selecting Security Servers
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Authentication
Using Method Lists
AAA Authentication Methods
Configuring Login Authentication
Configuring PPP Authentication
Configuring ARA Authentication
Configuring NASI Authentication
Specifying the Amount of Time for Login Input
Enabling Password Protection at the Privileged Level
Changing the Text Displayed at the Password Prompt
Configuring Message Banners for AAA Authentication
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Authorization
Starting with AAA Authorization
Understanding AAA Authorization
Disabling Authorization for Global Configuration Commands
Authorization for Reverse Telnet
Authorization Attribute-Value Pairs
Practice Session
Security and Audit Checklist
Conclusion
Implementing AAA Accounting
Starting with Accounting
Configuring Accounting
Understanding AAA Accounting Types
Applying a Named List
Suppress Generation of Accounting Records for Null Username Sessions
Generating Interim Accounting Records
Monitoring Accounting
Practice Session
Security and Audit Checklist
Conclusion
Configuring TACACS and Extended TACACS
Breaking Down the Protocols
Understanding the TACACS Protocols
Configuring TACACS and Extended TACACS
Setting TACACS Password Protection at the User Level
Setting TACACS Password Protection at the Privileged Level
Enabling TACACS and XTACACS for Use
Practice Session
Security and Audit Checklist
Conclusion
Configuring TACACS+
Understanding the TACACS+ Protocol
Comparing TACACS+ and RADIUS
Understanding TACACS+ Operation
TACACS+ Configuration Task List
Configuring TACACS+
Practice Session
Security and Audit Checklist
Conclusion
Configuring RADIUS
RADIUS Overview
Understanding RADIUS Operation
RADIUS Configuration Task List
Configuring RADIUS
Practice Session
Security and Audit Checklist
Conclusion
Configuring Kerberos
Kerberos Overview
Supporting Kerberos Client
Configuring the Router to Use the Kerberos Protocol
Telneting to the Router
Monitoring and Maintaining Kerberos
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING UNAUTHORIZED ACCESS: NETWORKING
Basic Traffic Filtering I
Access List Overview
Understanding Access List Configuration
Comparing Basic and Advanced Access Lists
Creating Access Lists
Applying Access Lists to Interfaces
Creating and Editing Access List Statements on a TFTP Server
Practice Session
Security and Audit Checklist
Conclusion
Basic Traffic Filtering II
Extended IP Access Lists
Named Access Lists
Implementing Routing Policies
Monitoring and Verifying Access and Prefix Lists
Practice Session
Security and Audit Checklist
Conclusion
Advanced Traffic Filtering I
Using Time Ranges
Configuring Time-Based Access
Using Lock-and-Key
Configuring Lock-and-Key
Lock-and-Key Configuration Tips
Verifying and Maintaining Lock-and-Key Configuration
Practice Session
Security and Audit Checklist
Conclusion
Advanced Traffic Filtering II
About Reflexive Access Lists
Configuring Reflexive Access Lists
Example Reflexive Access Lists Configurations
About Context-Based Access Control
Understanding CBAC
How CBAC Works
Configuring Context-Based Access Control
Practice Session
Security and Audit Checklist
Conclusion

Preventing Network Dat Interception
Using Encryption and IKE
Code Wars
Cisco Encryption Technology
CA Interoperability Overview
Overview of Certification Authorities
Configuring Certification Authority Interoperability
Understanding Internet Key Exchange
Troubleshooting CA Interoperability and IKE
Practice Session
Security and Audit Checklist
Conclusion
Configuring IPSec
IPSec Network Security
Understanding IPSec
Configuring IPSec
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING DENIAL OF SERVICE
Configuring Denial of Service Security Features
Understanding Denial of Service
Controlling the Hostile Environment
About TCP Intercept
Configuring TCP Intercept
Monitoring and Maintaining TCP Intercept
About Network Address Translation
Configuring and Deploying NAT
Queuing and Traffic Policing
Detecting Unauthorized Configuration Changes
Resolving Names
Practice Session
Security and Audit Checklist
Conclusion

PREVENTING FRAUDULENT ROUTE UPDATES AND OTHER UNAUTHORIZED CHANGES
Configuring Neighbor Authentication and Other Security Features
Using Neighbor Authentication
Understanding Neighbor Authentication
Removing Unnecessary Services
Configuring Secure Shell
Some Final Guidelines for Configuring a Router
Practice Session
Security and Audit Checklist
Conclusion

APPENDICES

Appendix A IP Addressing
Appendix B Subnetting
Appendix C IP Protocol Numbers
Appendix D Well-Known Ports and Services
Appendix E Hacker, Cracker, Malware and Trojan Horse Ports
Appendix F ICMP Types and Codes
Appendix G Determining Wildcard Mask Ranges
Appendix H Logical Operations
Appendix I Helpful Resources
Appendix J Bibliography
Appendix K Acronyms and Abbreviations
Appendix L Glossary

Peter T. Davis

Davis, Peter T. Kevin Beaver, CISSP, is a 16-year specialist in se... więcej >


Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia