Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Fundamentals

Buy
Network Security Fundamentals, 9781587051678 (1587051672), Cisco Press, 2004

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions.

Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems.

Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies.

Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.

(HTML tags aren't allowed.)

Ambient Intelligence – Software and Applications –, 9th International Symposium on Ambient Intelligence (Advances in Intelligent Systems and Computing (806))
Ambient Intelligence – Software and Applications –, 9th International Symposium on Ambient Intelligence (Advances in Intelligent Systems and Computing (806))

The aim of the book is to introduce new developments in Ambient Intelligence from researchers of several countries. The book includes different works in the area of Ubiquitous Computing, e-Health, Ambient Assisted Living, Distributed Computing and Context Aware Computing that have been selected by an international committee. The...

Effective Project Management: Traditional, Adaptive, Extreme, Third Edition
Effective Project Management: Traditional, Adaptive, Extreme, Third Edition

In previous editions, this book has established itself as the definitive guide to effective project management. Now, with this major revision, it’s updated to reflect significant changes in project management practices over the last few years. Written again by Robert K. Wysocki and a new coauthor, Rudd McGary, this book covers traditional...

Build Mobile Apps with Ionic 2 and Firebase: Hybrid Mobile App Development
Build Mobile Apps with Ionic 2 and Firebase: Hybrid Mobile App Development
Learn to build hybrid mobile apps using Ionic and Firebase. You'll build a Hacker News client app, which can view top stories in Hacker News, view comments of a story, add stories to favorites, etc. 

This introductory guide covers the whole cycle of hybrid mobile apps development. It's organized around implementing
...

Remaking Transitional Justice in the United States: The Rhetorical Authorization of the Greensboro Truth and Reconciliation Commission
Remaking Transitional Justice in the United States: The Rhetorical Authorization of the Greensboro Truth and Reconciliation Commission

​Remaking Transitional Justice in the United States: The Rhetoric of the Greensboro Truth and Reconciliation Commission  explores rhetorical attempts to authorize the Greensboro Truth and Reconciliation Commission—a grassroots, U.S.-based truth commission created in 2004 toredress past injustices in the city. Through...

Teaching and Measuring Cognitive Readiness
Teaching and Measuring Cognitive Readiness

Teaching and Measuring Cognitive Readiness presents theoretical and empirical findings regarding cognitive readiness and assessments of their impact on adult learning. The term readiness is used in assessing student preparation for K-12 schools, while in the military and in industry, "readiness" denotes preparation to...

Practice Perfect: 42 Rules for Getting Better at Getting Better
Practice Perfect: 42 Rules for Getting Better at Getting Better

Rules for developing talent with disciplined, deliberate, intelligent practice

We live in a competition loving culture. We love the performance, the big win, the ticking seconds of the clock as the game comes down to the wire. We watch games and cheer, sometimes to the point of obsession, but if we really wanted to see...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy