undrgrnd Cliquez ici Toys NEWNEEEW nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici FIFA16 Shop Fire HD 6 Shop Kindle Paperwhite cliquez_ici Jeux Vidéo Bijoux Montres Montres
Designing Network Security (2nd Edition) et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
Habituellement expédié sous 10 à 14 jours.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Designing Network Securit... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Comme neuf | Détails
Vendu par Books Squared USA
État: D'occasion: Comme neuf
Commentaire: Ships from USA. Please allow 2 to 3 weeks for delivery. Book appears to be new. Book selection as BIG as Texas.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Designing Network Security (Anglais) Relié – 30 octobre 2003


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Relié
"Veuillez réessayer"
EUR 63,58
EUR 63,28 EUR 7,53

Livres anglais et étrangers
Lisez en version originale. Cliquez ici

Offres spéciales et liens associés


Descriptions du produit

Quatrième de couverture

A practical guide to creating a secure network infrastructure

  • Understand basic cryptography and security technologies
  • Identify the threats and common attacks to a network infrastructure
  • Learn how to create a security policy
  • Find out how to recover from a security breach
  • Study specific implementation scenarios for securing your network environment

Designing Network Security is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.

You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and some emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the dial-in environment.

Merike Kaeo, CCIE No. 1287, has been in the networking industry for more than 15 years. As a member of the IEEE and IETF, she brings a wealth of technical and practical knowledge to the community, helping professionals to understand complex networking concepts. Merike was employed with Cisco Systems, Inc., beginning in June 1993, where she worked primarily on technical issues relating to router performance, network routing protocols, network design, and network security. From 1988 to 1993, Merike worked at the National Institutes of Health in Bethesda, MD, designing and implementing the original FDDI backbone for the NIH campus using Cisco routers. She received her BSEE degree from Rutgers University in 1987 and completed her MSEE degree from George Washington University in 1998.

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

--Ce texte fait référence à l'édition Relié .

Biographie de l'auteur

Merike Kaeo, CCIE No. 1287, is currently a consultant focusing primarily on security-related products and network design solutions. She has been in the networking industry more than 15 years, starting out at the National Institutes of Health in Bethesda, MD, from 1988 to 1993, designing and implementing the original FDDI backbone for the NIH campus using Cisco routers. From 1993 to 2000, Merike was employed by Cisco Systems, Inc., where she worked primarily on technical issues relating to router performance, network routing protocols, network design, and network security. She was a lead member of the Cisco security initiative, has acted as a technical advisor for security startup companies, and has been an instructor and speaker in a variety of security-related conferences. Merike received her BSEE from Rutgers University in 1987 and completed her MSEE degree from George Washington University in 1998.




Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 17 commentaires
14 internautes sur 14 ont trouvé ce commentaire utile 
Good Book to prepare for the MCNS examination 12 septembre 1999
Par Un client - Publié sur Amazon.com
Format: Relié
Exam 640-442 is the Security Specialistization for people who have attained their CCNP certification. Excellent coverage of AAA, TACACS+, RADIUS, PIX, 3DES, DMZ as well as IPSEC and CBAC. This is alot of material to be discussed in one book. Cisco provides a CD ROM with this same material for $250.00, this is a much better deal. If you want to enhance your knowledge of access-lists, reflexive access-lists etc. this is the book for you. Merike did her homework on this material, I completed many of the configurations presented in the book, they were accurate.
14 internautes sur 14 ont trouvé ce commentaire utile 
Strong on Security - Weak on Cisco 8 janvier 2000
Par John B. Harlow - Publié sur Amazon.com
Format: Relié
Excellent overview of network security issues. Covers almost all threats, protocols and safeguards in a concise manner. One of the books that should be read for CISSP preparation.
Bogs down when it gets to Cisco specific configurations. As a CCIE, even I find that books of this type provide only the tip of the iceberg when it comes to the complexity of Cisco configurations.
11 internautes sur 11 ont trouvé ce commentaire utile 
Mixed Bag 30 octobre 2000
Par Fruitcake - Publié sur Amazon.com
Format: Relié Achat vérifié
Up through Chapter 7, this book presents a fairly good overview of information security in general, network security basics, cryptography, and a good measure of "security philosophy" as well. It reads pretty well and there are relatively few inconsistencies, until...
From Chapter 8 onwards, there are lots of mistakes (my personal favorite is a botched explanation of TCP proxies on page 248) and many cases of examples not matching the explanatory text. And when it comes to enabling TACACS+ on routers, some sections of this book directly contradict Cisco's "IOS 12 Network Security" book.
All in all, a decent reference for Cisco routers & firewalls, but you might want to supplement it with something more substantial. The O'Reilly books and Cheswick/Bellovin come to mind...
3 internautes sur 3 ont trouvé ce commentaire utile 
A complete survey of network security and more 12 mai 2004
Par Stephen Northcutt - Publié sur Amazon.com
Format: Relié
This is a big book, 745 pages, a bit about almost every topic in information security. The advantage of a book like this is that if you want to know three paragraphs about a security term that you are not familiar with, you can find it. The disadvantage of these survey type books is that they do not usually give you enough information to do anything.
Though there are some spots especially in the first few chapters where this happens, Merike Kaeo, the author, quickly succeeds in making this a book that goes beyond telling the reader about things and begins to share how to do things on Cisco equipment which is far more valuable. If you are a Cisco network engineer or administrator and are interested in learning more about information security this is probably a good book for you. I think this book would also benefit a manager or someone with purely theoretical information security knowledge that wants to be able ask technical people pragmatic questions.
The Voice over IP chapter was one of the clearest explanations I have seen, however a bit more of a warning about security, changing standards and interoperability would have been appreciated.
When work begins on 3rd edition, I would suggest more focus on using routing and switching technology to segment the internal network so a worm infection does not take down the entire facility. In general user VLANS to not need to talk to other user VLANS, they only need to communicate with servers.
My favorite part of the book is Appendix D, somehow I had never seen Rob Thomas paper on DDOS.
3 internautes sur 3 ont trouvé ce commentaire utile 
Best book I've read on Security 10 août 1999
Par Un client - Publié sur Amazon.com
Format: Relié
I really enjoyed reading this book. Lot's of information pertaining to PIX, Access-lists, Distribute Lists, IPsec. Every angle was covered, I compared to the Cisco 12.0 Ios Network Security book, this one had more detail. Which is difficult considering how much is covered with Cisco documentation. If you've read the articles pertaining to Cisco's investment in the Security market, you've got to have this book. This book is the security what Halibi's book is to BGP.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?