PDF Ebook Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji
Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji. Someday, you will find a new experience as well as understanding by spending more money. Yet when? Do you believe that you require to obtain those all requirements when having much money? Why do not you aim to obtain something easy at first? That's something that will lead you to recognize even more regarding the world, journey, some places, history, enjoyment, as well as more? It is your very own time to proceed reviewing practice. One of guides you could appreciate now is Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji below.
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji
PDF Ebook Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji
Spend your time also for just couple of mins to read a book Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji Reviewing an e-book will never ever minimize and lose your time to be useless. Reading, for some people become a requirement that is to do daily such as spending quality time for consuming. Now, what regarding you? Do you want to read an e-book? Now, we will certainly show you a brand-new e-book entitled Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji that could be a brand-new method to check out the understanding. When reading this e-book, you could obtain something to constantly keep in mind in every reading time, also pointer by step.
Poses currently this Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji as one of your book collection! However, it is not in your bookcase collections. Why? This is guide Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji that is offered in soft file. You could download and install the soft documents of this magnificent book Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji now as well as in the link offered. Yeah, various with the other people that try to find book Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji outside, you could obtain easier to position this book. When some people still stroll right into the establishment and also search guide Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji, you are here just remain on your seat and also obtain the book Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji.
While the other people in the store, they are not exactly sure to discover this Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji directly. It may require even more times to go shop by store. This is why we mean you this website. We will provide the very best method as well as referral to obtain the book Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji Even this is soft file book, it will certainly be convenience to bring Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji anywhere or save in the house. The difference is that you could not require move guide Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji place to area. You might require just copy to the various other tools.
Now, reading this spectacular Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji will be easier unless you obtain download and install the soft data here. Merely below! By clicking the link to download and install Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji, you can begin to get guide for your personal. Be the initial owner of this soft file book Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji Make distinction for the others and also obtain the very first to advance for Network Security Technologies And Solutions (CCIE Professional Development Series), By Yusuf Bhaiji Present moment!
CCIE Professional Development Network Security Technologies and Solutions � A comprehensive, all-in-one reference for Cisco network security � Yusuf Bhaiji, CCIE No. 9305 � Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. � With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio.� The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. � With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. � “Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco � Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco. � Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication technology Implement identity-based network access control Apply the latest wireless LAN security solutions Enforce security policy compliance with Cisco NAC Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX � This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams. � Category: Network Security Covers: CCIE Security Exam
- Sales Rank: #1510319 in eBooks
- Published on: 2008-03-20
- Released on: 2008-03-20
- Format: Kindle eBook
From the Back Cover
CCIE Professional Development"Network Security Technologies and Solutions" A comprehensive, all-in-one reference for Cisco network security Yusuf Bhaiji, CCIE No. 9305 Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today's modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. "Yusuf's extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you're looking for a truly comprehensive guide to network security, this is the one! "-Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
- Filter traffic with access lists and implement security features on switches
- Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances
- Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques
- Secure management access with AAA
- Secure access control using multifactor authentication technology
- Implement identity-based network access control
- Apply the latest wireless LAN security solutions
- Enforce security policy compliance with Cisco NAC
- Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies
- Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation
- Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM
- Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX
About the Author
Yusuf Bhaiji,
CCIE No. 9305 (Routing and Switching and Security), has been with Cisco for seven years and is currently the program manager for the Cisco CCIE Security Certification and CCIE proctor in Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team. Yusuf’s passion for security technologies and solutions has played a dominant role in his 17 years of industry experience, from as far back as his initial master’s degree in computer science, and has since been reflected in his numerous certifications. Yusuf prides himself in his knowledge-sharing abilities, which are evident in the fact that he has mentored many successful candidates, as well as having designed and delivered a number of Network Security solutions around the globe. Yusuf is an advisory board member of several nonprofit organizations for the dissemination of technologies and promotion of indigenous excellence in the field of internetworking through academic and professional activities. Yusuf chairs the Networkers Society of Pakistan (NSP) and IPv6 Forum Pakistan chapter. Yusuf has also authored a Cisco Press publication titled CCIE Security Practice Labs (ISBN 1587051346), released in early 2004. He has been a technical reviewer for several Cisco Press publications and written articles, white papers, and presentations on various security technologies. He is a frequent lecturer and well-known speaker presenting in several conferences and seminars worldwide.
Excerpt. � Reprinted by permission. All rights reserved.
Introduction Introduction
The Internet was born in 1969 as the ARPANET, a project funded by the Advanced Research Projects Agency (ARPA) of the U.S. Department of Defense. The Internet is a worldwide collection of loosely connected networks that are accessible by individual computers in varied ways, such as gateways, routers, dial-up connections, and through Internet service providers (ISP). Anyone today can reach any device/computer via the Internet without the restriction of geographical boundaries.
As Dr. Vinton G. Cerf states, "The wonderful thing about the Internet is that you're connected to everyone else. The terrible thing about the Internet is that you're connected to everyone else."
The luxury of access to this wealth of information comes with its risks, with anyone on the Internet potentially being the stakeholder. The risks vary from information loss or corruption to information theft and much more. The number of security incidents is also growing dramatically.
With all this happening, a strong drive exists for network security implementations to improve security postures within every organization worldwide. Today's most complex networks require the most comprehensive and integrated security solutions.
Security has evolved over the past few years and is one of the fastest-growing areas in the industry. Information security is on top of the agenda for all organizations. Companies need to keep information secure, and there is an ever-growing demand for the IT professionals who know how to do this.
Point products are no longer sufficient for protecting the information and require system-level security solutions. Linking endpoint and network security is a vital ingredient in designing the modern networks coupled with proactive and adaptive security systems to defend against the new breed of day-zero attacks.
Security is no longer simply an enabling technology or a one-time affair; it has become an essential component of the network blueprint. Security technologies and solutions need to be fundamentally integrated into the infrastructure itself, woven into the fabric of the network. Security today requires comprehensive, end-to-end solutions.
Goals and MethodsCisco Network Security Technologies and Solutions is a comprehensive all-in-one reference book that covers all major Cisco Security products, technologies, and solutions. This book is a complete reference that helps networking professionals understand and implement current, state-of-the-art security technologies and solutions. The coverage is wide but deep enough to provide the audience with concepts, design, and implementation guidelines as well as basic configuration skills.
With an easy-to-understand approach, this invaluable resource will serve as a central warehouse of security knowledge to the security professionals with end-to-end security implementations.
The book makes no assumption of knowledge level, thereby ensuring that the readers have an explanation that will make sense and be comprehendible at the same time. It takes the reader from the fundamental level of each technology to more detailed descriptions and discussions of each subject.
With this definitive reference, the readers will possess a greater understanding of the solutions available and learn how to build integrated secure networks in today's modern, heterogeneous infrastructure.
This book is comprehensive in scope, including information about mature as well as emerging technologies, including the Adaptive Security Appliance (ASA) Firewall Software Release 8.0, Cisco Intrusion Prevention System (IPS) Sensor Software Release 6.0, Host IPS, Cisco Group Encrypted Transport VPN (GETVPN), MPLS VPN technology, Cisco Distributed Denial-of-Service (DDoS) Anomaly Detection and Mitigation Solutions, Cisco Security Monitoring, Analysis, and Response System (CS-MARS), and Security Framework, Standards and Regulatory Compliance, to name a few.
Who Should Read This BookWhether you are a network engineer or a security engineer, consultant, or andidate pursuing security certifications, this book will become your primary reference when designing and building a secure network.
Additionally, this book will serve as a valuable resource for candidates preparing for the CCIE Security certification exam that covers topics from the new blueprints.
The book will serve as a reference for any networking professional managing or considering exploring and implementing Cisco network security solutions and technologies.
How This Book Is OrganizedThis book is meant to complement the information already available on Cisco.com and in the Cisco security products documentation.
The book is divided into five parts, mapping Cisco security technologies and solutions into five key elements.
Part I, "Perimeter Security": This element provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network. Part I includes the following chapters:
-
Chapter 1, "Overview of Network Security," introduces principles of network security, security models, and a basic overview of security standards, policies, and the network security framework.
-
Chapter 2, "Access Control," describes the capability to perform traffic filtering using access control lists (ACL). It covers numerous types of ACL, such as standard and extended ACL, Lock-and-key, Reflexive, Time-based, Receive ACL, Infrastructure ACL, and Transit ACL. The chapter addresses traffic filtering based on RFC standards and best common practices.
-
Chapter 3, "Device Security," covers some of the most common techniques used for device hardening and securing management access for routers, firewall appliances, and the intrusion prevention system (IPS) appliance.
-
Chapter 4, "Security Features on Switches," provides a comprehensive set of security features available on the switches. The chapter covers port-level security controls at Layer 2 and security features and best practices available on the switch.
-
Chapter 5, "Cisco IOS Firewall," introduces the software-based IOS firewall features, including the legacy Context-Based Access Control (CBAC) and the newly introduced Zone-Based Policy Firewall (ZFW) feature available on the router.
-
Chapter 6, "Cisco Firewalls: Appliance and Module," covers the complete range of hardware-based Cisco firewall products, including Cisco PIX, Cisco ASA Firewall appliance, and Cisco Firewall Services Module (FWSM). The chapter provides comprehensive coverage of firewall operating systems (OS), software features, and capabilities.
-
Chapter 7, "Attack Vectors and Mitigation Techniques," is a uniquely positioned chapter covering details of common types of attacks, and providing details of how to characterize and classify various attacks. The chapter provides mitigation techniques for a wide range of attacks at Layer 2 and Layer 3.
Part II, "Identity Security and Access Management": Identity is the accurate and positive identification of network users, hosts, applications, services and resources. Part II includes the following chapters:
-
Chapter 8, "Securing Management Access," covers details of the authentication, authorization, and accounting (AAA) framework and implementation of AAA technology. The chapter covers implementing the two widely used security protocols in access management: RADIUS and TACACS+ protocols.
-
Chapter 9, "Cisco Secure ACS Software and Appliance," provides details of Cisco Secure Access Control Server (ACS) software that supports the AAA technology and security protocols covered in Chapter 8. The chapter highlights the commonly use ACS software functions and features.
-
Chapter 10, "Multifactor Authentication," describes the identification and authentication mechanism using the multifactor authentication system. The chapter introduces common two-factor mechanisms.
-
Chapter 11, "Layer 2 Access Control," covers the Cisco trust and identity management solution based on the Identity-Based Networking Services (IBNS) technique. The chapter provides details of implementing port-based authentication and controlling network access at Layer 2 using IEEE 802.1x technology.
-
Chapter 12, "Wireless LAN (WLAN) Security," provides an overview of wireless LAN (WLAN) and details of securing WLAN networks. The chapter covers various techniques available to protect WLAN and expands on the various EAP protocols, including EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, and Cisco LEAP. The chapter also provides coverage of common WLAN attacks and mitigation techniques.
-
Chapter 13, "Network Admission Control (NAC)" provides details of Cisco Self-Defending Network (SDN) solution using the Cisco Network Admission Control (NAC) appliance-based and framework-based solutions. The chapter covers implementing the Cisco NAC appliance solution as well as the NAC-L3-IP, NAC-L2-IP, and NAC-L2-802.1x solutions.
Part III, "Data Privacy": When information must be protected from eavesdropping, the capability to provide authenticated, confidential communication on demand is crucial. Employing security services at the network layer provides the best of both worlds. VPN solutions can secure communications using confidentiality, integrity, and authentication protocols between devices located anywhere on an untrusted or public network, particularly the Internet. Part III includes the following chapters:
-
Chapter 14, "Cryptography," lays the foundation of data privacy and how to secure communication using crypto methodology and cryptographic solutions. The chapter gives a basic overview of various cryptographic algorithms, including hash algorithms, symmetric key, and asymmetric key algorithms.
-
Chapter 15, "IPsec VPN," is a comprehensive chapter covering a wide range of IPsec VPN solutions. The chapter provides various types of VPN deployment with focus on IPsec VPN technology covering IPsec protocols, standards, IKE, ISAKMP, and IPsec profiles. The chapter provides comprehensive coverage of implementing IPsec VPN solutions using various methods.
-
Chapter 16, "Dynamic Multipoint VPN (DMVPN),"�covers the dynamic multipoint VPN (DMVPN) solution architecture and describes the design, components, and how DMVPN works. The chapter provides coverage of implementing various types of DMVPN hub-and-spoke and spoke-to-spoke solutions.
-
Chapter 17, "Group Encrypted Transport VPN (GET VPN)," covers the innovative tunnel-less VPN approach to provide data security. The chapter describes the newly introduced GET VPN technology, solution architecture, components, and how GET VPN works.
-
Chapter 18, "Secure Sockets Layer VPN (SSL VPN)," describes the SSL-based VPN approach covering SSL VPN solution architecture and various types of SSL VPN. The chapter also covers the newly introduced Cisco AnyConnect VPN.
-
Chapter 19, "Multiprotocol Label Switching VPN (MPLS VPN)," provides coverage of Multiprotocol Label Switching (MPLS)-based VPN technology to provide data security across MPLS networks. The chapter provides MPLS VPN solution architecture and various types of MPLS VPN technologies available. The chapter covers implementing Layer 2 (L2VPN) and Layer 3 (L3VPN)–based MPLS VPN solutions.
Part IV, "Security Monitoring": To ensure that a network remains secure, it's important to regularly test and monitor the state of security preparation. Network vulnerability scanners can proactively identify areas of weakness, and intrusion detection systems can monitor and respond to security events as they occur. Using security monitoring solutions, organizations can obtain unprecedented visibility into both the network data stream and the security posture of the network. Part IV includes the following chapters:
-
Chapter 20, "Network Intrusion Prevention," covers network security monitoring using the network-based appliance sensor technology, Intrusion Prevention System (IPS). The chapter provides a comprehensive coverage of the sensor operating system (OS) software functions and features.
-
Chapter 21, "Host Intrusion Prevention," covers network security monitoring using the host-based technology, Host Intrusion Prevention System (HIPS). The chapter provides comprehensive details of Cisco Security Agent (CSA) technology providing solution architecture, components, and CSA deployment using CSA MC.
-
Chapter 22, "Anomaly Detection," provides coverage of anomaly-based security monitoring using Cisco Anomaly Detection and Mitigation Systems. The chapter covers Cisco Traffic Anomaly Detector and Cisco Guard products to provide DDoS mitigation.
-
Chapter 23, "Security Monitoring and Correlation," covers the innovative Security Monitoring, Analysis, and Response System (CS-MARS) based on the Security Threat Mitigation (STM) System. The chapter provides key concepts of CS-MARS and deployment guidelines.
Part V, "Security Management": As networks grow in size and complexity, the requirement for centralized policy management tools grow as well. Sophisticated tools that can analyze, interpret, configure, and monitor the state of security policy, with browser-based user interfaces, enhance the usability and effectiveness of network security solutions. Part V includes the following chapters:
-
Chapter 24, "Security and Policy Management," provides comprehensive coverage of the security management solutions using the Cisco Security Manager (CSM) software and various device manager xDM tools including SDM, ASDM, PDM, and IDM.
-
Chapter 25, "Security Framework and Regulatory Compliance," provides an overview of security standards, policy and regulatory compliance, and best practices frameworks. The chapter covers the two commonly used security frameworks: ISO/IEC 17799 and COBIT. The chapter covers regulatory compliance and legislative acts including GLBA, HIPAA, and SOX.
Network Security Technologies and Solutions is a complete reference book, like a security dictionary, an encyclopedia, and an administrator's guide—all in one.
� Copyright Pearson Education. All rights reserved.
Most helpful customer reviews
11 of 11 people found the following review helpful.
Title is Misleading
By TechEd
Depending on where you are in your career is how I'm going to rate this book. If you are somewhat new to security, especially in the Cisco world, this book is the book for you and deserves 5 stars. If you have been in the Cisco security world for several years, are looking to study for your CCSP or CCIE, this book is NOT for you and deserves 1 or 2 stars.
This book does a great job on going over much of the Cisco security portfolio. It goes over the Cisco firewalls, AAA, NAC solutions, IPS, MARS, VPNs, etc. It gives some basic configurations for most of these. Again, I said basic and for a lot of these I would go as far as to say MINIMAL.
Again, if you are looking for study material for some of the CCSP exams or CCIE, this book wont get you close. Those exams dive WAY deeper into the different technologies than what this book offers.
My real issue with the book is the top line in the title "CCIE professional developement". If I see this and I see its 700+ pages, I'm thinking a Jeff Doyle TCP/IP Vol content book. Nope, not even close. If the authors wanted to cover all the different technologies that they did, but consider this book a "CCIE developement", they should of split this book into two books and expanded GREATLY on the different technologies.
4 of 4 people found the following review helpful.
All-In-One Cisco Security Guide
By John Gordon Ainsworth
During the first 7 chapters the author gives overviews of security vulnerabilities and attack mitigations in the current networking world. When finer points are confusing, there is detailed explanation to make the problem clear. For example distinguishing between MAC spoofing and ARP spoofing. Each threat is outlined with a description, background, problems, and mitigation techniques using Cisco configuration. This is not just a theory book but manages to fit in useful configuration examples in almost every turn of the page. This is not a quick read: you will want to have a lab setup to practice on while you read.
Unlike many security discussions that make much of vulnerabilites that are highly unlikely or virtually impossible to pull off, the author clearly states when an attack is improbable, and not worth the effort to consider.
The second unit of the book focuses on identity and access management. I found the sections on layer 2 access control most useful. Particularly the use of 802.1x protocol with a RADIUS server. Something I am currently trying to implement in a network.
Part 3 is all about privacy and encryption and covers many ways to tunnel, hide, and encrypt data packets. The last sections are about Intrusion Detection and Security Management.
Perhaps one of the most helpful setions in the book are the guidelines for establishing a security policy and making it work in a real world environment. Chapter 25 walks you through starting with a security model that gives you a foundation for fleshing out your companies standards, guidelines and procedures so you will be ready for your next audit as well as the real security threats of today.
0 of 0 people found the following review helpful.
An excellent all-around Cisco security reference!
By Rik Guyler
When I first selected this book, I was expecting material rather specific to CCIE Security preparation. What I found after reading it, however was that it not only covered CCIE Security preparation but CCIE R/S preparation as well as many real-world security topics.
Many authors attempt to cover a wide area of technologies and wind up losing organization of their presentation of the topics. I find Yusuf's organization to be excellent and flowed very well making this an easy read. In fact, considering how many topics this book covers I am amazed at just how well it is organized, which is better than many of the technology-specific books I have read over the years. I become very annoyed with having to go back to reference past topics time and again but I did not find that I had to do that with this book and was able to continue going forward along with the topics.
I also found that this book gets right to the point. Yusuf didn't pack a lot of fluff and filler into the material. Instead you get right into the meat of the topics. Keep in mind that if you are looking for a thorough reference to take you from the very beginning of a specific topic then this book is not for you. This book is part of the "CCIE Professional Development" series and as such assumes you have at least some pre-existing knowledge in these areas. With this in mind, I find this an excellent study guide as well as a real-world reference for various areas of Cisco security.
Perhaps one of the most unique and possibly useful chapters of this book is the non-Cisco material. For example the section covering security policies is invaluable. As a consultant I see client after client without a corporate security policy and in this day and age that's trouble waiting to happen. This section discusses the value of such a policy and how to begin developing it. Another area within this chapter contains information on various regulatory compliance mandates, such as HIPPA and SOX. While this info is readily available elsewhere, Yusuf neatly summarizes the various regulations, including who is mandated to comply, penalties for not doing so and the various Cisco solutions used for compliance.
I found this book to be excellent.
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji PDF
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji EPub
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji Doc
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji iBooks
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji rtf
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji Mobipocket
Network Security Technologies and Solutions (CCIE Professional Development Series), by Yusuf Bhaiji Kindle






0 komentar:
Posting Komentar