Securing and Controlling Cisco Routers
Autor Peter T. Davisen Limba Engleză Paperback – 15 mai 2002
At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 629.97 lei 6-8 săpt. | |
CRC Press – 15 mai 2002 | 629.97 lei 6-8 săpt. | |
Hardback (1) | 906.32 lei 6-8 săpt. | |
CRC Press – 27 iul 2017 | 906.32 lei 6-8 săpt. |
Preț: 629.97 lei
Preț vechi: 908.81 lei
-31% Nou
Puncte Express: 945
Preț estimativ în valută:
120.56€ • 127.50$ • 100.57£
120.56€ • 127.50$ • 100.57£
Carte tipărită la comandă
Livrare economică 31 decembrie 24 - 14 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849312908
ISBN-10: 0849312906
Pagini: 732
Ilustrații: 32 b/w images, 86 tables and 14 halftones
Dimensiuni: 178 x 254 x 37 mm
Greutate: 1.36 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849312906
Pagini: 732
Ilustrații: 32 b/w images, 86 tables and 14 halftones
Dimensiuni: 178 x 254 x 37 mm
Greutate: 1.36 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
ProfessionalCuprins
The Basics. Preventing Unauthorized Access: Networking Device. Preventing Unauthorized Access: Networking. Preventing Network Data Interception. Preventing Denial Of Service. Preventing Fraudulent Route Updates And Other Unauthorized Changes. Appendixes.
Descriere
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. In order to practice the material taught, the reader can log on to a real router and perform the commands.