Имя:
Пароль:


a b c d e f g h i j k l m n o p q r s t u v w x y z    0 1 2 3 4 5 6 7 8 9 
а б в г д е ж з и й к л м н о п р с т у ф х ц ч ш щ ъ ы ь э ю я 

Скачать Cisco Router Firewall Security бесплатно


Cisco Router Firewall Security
Cisco Press | 2004-08-20 | ISBN 1587051753 | CHM | Pages 912 | 6 MB

Harden perimeter routers with Cisco firewall functionality and features to ensure network security

* Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques
* Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic
* Use router authentication to prevent spoofing and routing attacks
* Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms
* Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks
* Apply stateful filtering of traffic with CBAC, including dynamic port mapping
* Use Authentication Proxy (AP) for user authentication
* Perform address translation with NAT, PAT, load distribution, and other methods
* Implement stateful NAT (SNAT) for redundancy
* Use Intrusion Detection System (IDS) to protect against basic types of attacks
* Obtain how-to instructions on basic logging and learn to easily interpret results
* Apply IPSec to provide secure connectivity for site-to-site and remote access connections
* Read about many, many more features of the IOS firewall for mastery of router security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package.

Each chapter in Cisco Router Firewall Security addresses an important component of perimeter router security. Author Richard Deal explains the advantages and disadvantages of all key security features to help you understand when they should be used and includes examples from his personal consulting experience to illustrate critical issues and security pitfalls. A detailed case study is included at the end of the book, which illustrates best practices and specific information on how to implement Cisco router security features.

Whether you are looking to learn about firewall security or seeking how-to techniques to enhance security in your Cisco routers, Cisco Router Firewall Security is your complete reference for securing the perimeter of your network.

More books for security specialists
Enjoy! :)
How.to.Cheat.at.Securing.SQL.Server.2005.Aug.2007.eBook-BBL
Securing_Optimizing_Linux
Securing.Windows.Server.2003.0596006853
Securing_Web_Services_with_WS-Security._2004
Securing_Exchange_Server_2003_&_Outlook_Web_Access._2004
Securing_IIS_6.0._2004
Securing_SCADA_Systems
Securing_Your_Business_with_Cisco_ASA_and_PIX_Firewalls
Windows.Vista.Security.Securing.Vista.Against.Malicious.Attacks.Jul.2007
How.to.Cheat.at.Securing.Linux.Sep.2007-BBL
Securing_Windows_Server_2008_Prevent_Attacks_from_Outside_and_Inside_Your_Organization
A.plus.Network.plus.Security.plus.Exams.in.a.Nutshell.Mar.2007.eBook-BBL
Ajax.Security.Dec.2007.eBook-BBL
Apache.Security
Digital.CCTV.A.Security.Professionals.Guide.Aug.2007.eBook-BBL
Expert.Web.Services.Security.in.the.dot.NET.Platform
Global.Advances.in.Enterprise.Information.Technology.Security.May.2007.eBook-BBL
InfoSecurity.2008.Threat.Analysis.Nov.2007.eBook-BBL
IT.Security.Interviews.Exposed.Jul.2007.eBook-BBL
Managing_Information_Security_Risks
Network.Security.Assessment.2nd.Edition.Nov.2007.eBook-BBL
Network.Security.Hacks.2nd.Edition.Oct.2006.eBook-BBL
Network_Security_Bible
Practical.Oracle.Security.Aug.2007.eBook-BBL
Real.World.Microsoft.Access.Database.Protection.and.Security.eBook-LiB
Simple.Computer.Security.Disinfect.Your.PC.Jan.2007.eBook-BBL
SQL.Server.Security.Distilled..2nd.edition
The.Best.Damn.IT.Security.Management.Book.Period.Oct.2007.eBook-BBL
WiMAX.Standards.and.Security.Sep.2007.eBook-BBL
AAA_and_Network_Security_for_Mobile_Access_-_Radius_Diameter_EAP_PKI_and_IP_Mobility._2005
Active_Defense._A_Comprehensive_Guide_to_Network_Security
Apache_Security.0596007248
Biometrics_for_Network_Security
Building_Open_Source_Network_Security_Tools._Components_And_Techniques
Bulletproof_wireless_security._GSM_UMTS_802.11_and_Ad_Hoc_Security
Cisco_Router_Firewall_Security
Cisco_Wireless_LAN_Security._2004
Enterprise_Java_Security_-_Building_Secure_J2EE_Applications._2004
Hacking_the_Code_-_ASP_.NET_Web_Application_Security
Hacknotes._Web_Security
HackNotes_Windows_Security_Portable_Reference
Information.Security.Dictionary-1402078897
Information_Security_-_Principles_and_Practice._2005
Information_Security_Fundamentals
Innocent_Code_A_Security_Wake_Up_Call_for_Web_Programmers
Inside_Java_2_Platform_Security._2nd_Edition
Inside_Network_Security_Assessment_-_Guarding_Your_IT_Infrastructure._2005
Internet_Security._Cryptographic_Principles_Algorithms_and_Protocols
Internet_Security_-_A_Jumpstart_for_Systems_Administrators_and_IT_Managers
Linux_and_Unix_Security_Portable_Reference
Linux_Server_Security._2nd_edition._2005
Managing_Security_with_Snort_and_IDS_Tools._2004
Mastering_Web_Services_Security
Maximum_Security._4th_edition
Microsoft_Encyclopedia_of_Security
Mission_Critical!_Internet_Security
Network_Perimeter_Security_-_Building_Defense_In-Depth
Network_Security_Foundations
Network_Security_Hacks
Network_Security_Tools.0596007949
Practical_Guide_Managing_Information_Security_.1580537022
Practical_Unix_And_Internet_Security._3rd_Ed
Practical_VoIP_Security
Programming_.NET_Security
Red_Hat_Linux_Security_and_Optimization
Securing_Web_Services_with_WS-Security._2004
Security_and_Usability._2005
Security_Configuration_in_a_TCP-IP_Sysplex_Environment
Security_In_Wireless_LANs_and_MANs
Security_Plus_Fast_Pass
SELinux_by_Example_-_Using_Security_Enhanced_Linux._2006
SQL_Server_Security_Distilled._2nd_Edition
The_Practice_Of_Network_Security._Deployment_Strategies_For_Production_Environments
Trojans_Worms_and_Spyware._A_Computer_Security_Professionals_Guide_to_Malicious_Code
Web_And_Information_Security._2005
Web_Security_Basics
Wi-Fi_Security
Windows_Server_2003_Security_Guide
Wireless_Security_and_Privacy_Best_Practices_and_Design_Techniques
Wireless_Security_Handbook._2005
XML_Security._2002
Administering.Windows.Vista.Security.Dec.2006.eBook-BBL.rar-0470108320
Applied_Cryptography_and_Network_Security
Hack_Attacks_Revealed._A_Complete_Reference_With_Custom_Security_Hacking_Toolkit
Holiday_and_Travel_Security_Handbook
Implementing.Homeland.Security.for.Enterprise.IT
Microsoft_Vista_for_IT_Security_Professionals_Syngress_Media.159749139X
Network_Security_Assessment.059600611X
Network_Security_with_OpenSSL
Security_Log_Management_-_Identifying_Patterns_in_the_Chaos
Security_Patterns_-_Integrating_Security_and_Systems_Engineering._2006
Social_Security_and_Development.1403999546
Software_Security_Building_Security_In.0321356705
Special_Ops._Host_and_Network_Security_for_Microsoft_UNIX_and_Oracle
User.Guide.for.Cisco.Security.MARS
Windows.Vista.Security.Securing.Vista.Against.Malicious.Attacks.Jul.2007
Active_Defense_-_A_Comprehensive_Guide_to_Network_Security
Algorithms, Architectures and Information Systems Security.9812836233
Building.Open.Source.Network.Security.Tools.Components.And.Techniques.iNT.eBook-
Cisco_Network_Security_Little_Black_Book
Computer_Security_in_the_21st_Century
Defeating_the_Hacker_A_Non-Technical_Guide_to_Computer_Security_A_Non-techni.0470025557
Hacking_the_Code_-_ASP.NET_Web_Application_Security_Cookbook__2004__
HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU
HackNotes.Network.Security.Portable.Reference.eBook-DDU
HackNotes.Web.Security.Portable.Reference.eBook-DDU
HackNotes.Windows.Security.Portable.Reference.eBook-DDU
Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit
Improving.Web.Application.Security.-.Threats.and.Countermeasures..2003
InfoSecurity.2008.Threat.Analysis.Nov.2007-BBL
Internet.Security
IPSec_-_The_New_Security_Standard_for_the_Internet_Intranets_and_VPN_-_2nd_Edition
Maximum_Security_4th_Edition
Media.Web_Security_Privacy_and_Commerce.2nd_Edition
Perl_Scripting_for_Windows_Security_Live_Response_Forensic_Analysis_and_Mon.159749173X
Practical.Oracle.Security.Aug.2007-BBL
Professional.ASP.NET.2.0.Security.Membership.and.Role.Management..2006
Security_Power_Tools.0596009631
The_Practice_Of_Network_Security_Deployment_Strategies_For_Production_Environments
Windows_Server_2008_Security_Resource_Kit_PRO_-_Resource_Kit.0735625042


Download from HotFile
or
Download from Depositfiles
or
Download from Megaupload

No Mirrors below, please! Follow Rules!

More serious and useful books! (Checked. Removed duplicates):
Vol.1. 2000 ebooks, 27 Gb ### Vol.2. 2000 ebooks, 8 Gb
Vol.3. 2000 ebooks, 27 Gb ### Vol.4. 1700 ebooks, 20 Gb [is adding files...]
Welcome to My BLOG!

=======================
AIO BookReaders Pack (10 Mb)!: (PDF: Foxit Reader Pro v3.1; PDB: iSilo v5.05; DjVu: WinDjView v1.0.3)
Download: DF or SM or HF or MU

Информация

Посетители, находящиеся в группе Гости, не могут оставлять комментарии в данной новости.
]