Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP...
The Exam Cram Method of study focuses on exactly what you need to get certified now.
Welcome to CSPFA Exam Cram 2 (642-521)! Whether this is your 1st or 15th Exam Cram 2 series book, you'll find information here that will help ensure your success as you pursue knowledge, experience, and...
With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network...
By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either...
A concise reference to implementing the most popular PIX Firewall 7.0 and 6.3 features Learn how to configure the new PIX Firewall version 7.0 Understand, install, and support the most common features of the best-selling Cisco Systems® PIX and IOS firewall products Learn from configuration examples that graphically illustrate complex...
The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance
Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
Cisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.
In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes...