Annotation<p>Gives hard-to-find answers to security queries posted to the Cisco USENET Group by thousands of users weekly. Strong focus on how to use Cisco Access lists and the Cisco PIX Firewall, two especially mystifying areas. Presents a proven troubleshooting methodology useful in every situatio
Cisco Security Architectures
โ Scribed by Gilbert Held, Kent Hundley
- Publisher
- McGraw-Hill Companies
- Year
- 1999
- Tongue
- English
- Leaves
- 331
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Gives hard-to-find answers to security queries posted to the Cisco USENET Group by thousands of users weekly. Strong focus on how to use Cisco Access lists and the Cisco PIX Firewall, two especially mystifying areas. Presents a proven troubleshooting methodology useful in every situation.
๐ SIMILAR VOLUMES
Gives hard-to-find answers to security queries posted to the Cisco USENET Group by thousands of users weekly. Strong focus on how to use Cisco Access lists and the Cisco PIX Firewall, two especially mystifying areas. Presents a proven troubleshooting methodology useful in every situation.
I bought this book becouse the reviews were good... Not enough reviews I think, the book itself is not a big thing. Just TCP/IP principles, access lists and something about pix configuration. Could be better. If you want principles, you got them, is easy reading...
<HTML>At present, no available publication deals with Internet security from a Cisco perspective utilizing the Cisco Secure product family. Cisco Secure Internet Security Solutions covers the basics of Internet security and then concentrates on each member of the Cisco Secure product family, providi
Cisco Systems strives to help customers build secure internetworks through network design featuring its Cisco Secure product family. Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a r