Designing Network Security, 2/e (Hardcover)

Merike Kaeo

  • 出版商: Cisco Press
  • 售價: $2,580
  • 貴賓價: 9.5$2,451
  • 語言: 英文
  • 頁數: 768
  • 裝訂: Hardcover
  • ISBN: 1587051176
  • ISBN-13: 9781587051173
  • 相關分類: 資訊安全
  • 已絕版

買這商品的人也買了...

商品描述

 

Summary

Master the design of secure networks with the updated edition of this best-selling security guide

  • Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
  • Learn how to use new and legacy Cisco Systems equipment to secure your networks
  • Understand how to design and build security services while also learning the legal and network accessibility impact of those services

Designing Network Security, Second Edition is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. In addition it provides a complete description of Cisco security products and useful implementation examples.

You will gain a thorough understanding of basic cryptography and the most widely deployed security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities, and understanding the steps required to perform a risk management assessment.

Examine underlying security technologies, the process of creating a security policy, the practical requirements necessary to implement a corporate security policy, the latest security technology enhancements, and recent legal issues. This book also allows you to view many of the new Cisco security products including Altiga, and the NetRanger intrusion detection system.

Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. In addition, practical scenarios dealing specifically with certain types of networks such as voice, storage, VPN, will translate theory into real-world situations.