𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cisco security architectures

✍ Scribed by Held, Gilbert; Hundley, Kent


Publisher
McGraw-Hill
Year
1999
Tongue
English
Leaves
289
Series
Cisco technical expert
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Annotation

Gives hard-to-find answers to security queries posted to the Cisco USENET Group by thousands of users weekly. Strong focus on how to use Cisco Access lists and the Cisco PIX Firewall, two especially mystifying areas. Presents a proven troubleshooting methodology useful in every situation.

Annotation.


Abstract:
A Cisco troubleshooting methodology. It includes coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; and the TCP/IP Protocol Β Read more...

✦ Table of Contents


Content: Ch. 1. Introduction --
Ch. 2. The TCP/IP Protocol Suite --
Ch. 3. The Internet Protocol --
Ch. 4. TCP and UDP --
Ch. 5. NetWare --
Ch. 6. Router Hardware and Software Overview --
Ch. 7. Cisco Router Access Lists --
Ch. 8. Advanced Cisco Router Security Features --
Ch. 9. Non-IP Access Lists --
Ch. 10. The Cisco PIX --
App. A. Determining Wildcard Mask Ranges --
App. B. Creating Access Lists --
App. C. Standard Access Lists --
App. D. Extended IP Access Lists.

✦ Subjects


Computer networks;Security measures;Computer network architectures;Réseaux d'ordinateurs;Mesures de suΜ‚reté;Architecture des réseaux d'ordinateurs


πŸ“œ SIMILAR VOLUMES


Cisco Security Architectures
✍ Gilbert Held, Kent Hundley πŸ“‚ Library πŸ“… 1999 πŸ› McGraw-Hill Companies 🌐 English

Gives hard-to-find answers to security queries posted to the Cisco USENET Group by thousands of users weekly. Strong focus on how to use Cisco Access lists and the Cisco PIX Firewall, two especially mystifying areas. Presents a proven troubleshooting methodology useful in every situation.

Cisco Security Architectures
✍ Gilbert Held, Kent Hundley πŸ“‚ Library πŸ“… 1999 πŸ› McGraw-Hill Companies 🌐 English

Gives hard-to-find answers to security queries posted to the Cisco USENET Group by thousands of users weekly. Strong focus on how to use Cisco Access lists and the Cisco PIX Firewall, two especially mystifying areas. Presents a proven troubleshooting methodology useful in every situation.

Cisco Security Architectures
✍ Gilbert Held, Kent Hundley πŸ“‚ Library πŸ“… 1999 πŸ› McGraw-Hill Companies 🌐 English

I bought this book becouse the reviews were good... Not enough reviews I think, the book itself is not a big thing. Just TCP/IP principles, access lists and something about pix configuration. Could be better. If you want principles, you got them, is easy reading...

Cisco Secure Internet Security Solutions
✍ Andrew Mason, Mark J. Newcomb πŸ“‚ Library πŸ“… 2001 πŸ› Cisco Press 🌐 English

<HTML>At present, no available publication deals with Internet security from a Cisco perspective utilizing the Cisco Secure product family. Cisco Secure Internet Security Solutions covers the basics of Internet security and then concentrates on each member of the Cisco Secure product family, providi

Cisco Secure Internet Security Solutions
✍ Andrew Mason; Mark J. Newcomb πŸ“‚ Library πŸ“… 2001 πŸ› Cisco Press 🌐 English

Cisco Systems strives to help customers build secure internetworks through network design featuring its Cisco Secure product family. Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a r