资源描述:
《Cisco Press - Network Security Principles and Practices.pdf》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、< DayDayUp > NetworkSecurityPrinciplesandPracticesBySaadat MalikPublisher:CiscoPressPubDate:November15,2002ISBN:1-58705-025-0Pages:800Tableof Contents IndexExpertsolutionsforsecuringnetworkinfrastructuresandVPNs.Buildsecurityintothenetworkbydefiningz
2、ones,implementingsecureroutingprotocoldesigns,andbuildingsafeLANswitchingenvironmentsUnderstandtheinnerworkingsoftheCiscoPIXFirewallandanalyzein-depthCiscoPIXFirewallandCiscoIOSFirewallfeaturesandconceptsUnderstandwhatVPNsareandhowtheyareimplementedw
3、ithprotocolssuchasGRE,L2TP,andIPSecGainapacket-levelunderstandingoftheIPSecsuiteofprotocols,itsassociatedencryptionandhashingfunctions,andauthenticationtechniquesLearnhownetworkattackscanbecategorizedandhowtheCiscoIDSisdesignedandcanbesetuptoprotecta
4、gainstthemControlnetworkaccessbylearninghowAAAfitsintotheCiscosecuritymodelandbyimplementingRADIUSandTACACS+protocolsProvisionserviceprovidersecurityusingACLs,NBAR,andCARtoidentifyandcontrolattacksIdentifyandresolvecommonimplementationfailuresbyevalu
5、atingreal-worldtroubleshootingscenariosAsorganizationsincreasetheirdependenceonnetworksforcorebusinessprocessesandincreaseaccesstoremotesitesandmobileworkersviavirtualprivatenetworks(VPNs),networksecuritybecomesmoreandmorecritical.Intoday'snetworkede
6、ra,informationisanorganization'smostvaluableresource.Lackofcustomer,partner,andemployeeaccesstoe-commerceanddataserverscanimpactbothrevenueandproductivity.Evenso,mostnetworksdonothavetheproperdegreeofsecurity.NetworkSecurityPrinciplesandPracticesprov
7、idesanin-depthunderstandingofthepolicies,products,andexpertisethatbringsorganizationtothisextremelycomplextopicandboostsyourconfidenceintheperformanceandintegrityofyournetworksystemsandservices.WrittenbytheCCIEengineerwhowrotetheCCIESecuritylabexaman
8、dwhohelpeddeveloptheCCIESecuritywrittenexam,NetworkSecurityPrinciplesandPracticesisthefirstbooktohelppreparecandidatesfortheCCIESecurityexams.NetworkSecurityPrinciplesandPracticesisacomprehensiveguidetonetworksecuritythreatsandthepoliciesandtoolsdeve