[xebooks] Cisco Network Security First-Step 2nd Edition

seeders: 1
leechers: 0
Added on January 21, 2014 by Feldirin Books > Textbooks
Torrent verified.



[xebooks] Cisco Network Security First-Step 2nd Edition (Size: 28.27 MB)
 020 - The Process of an Attack.pdf940.25 KB
 021 - Where are Attacks Coming From.pdf327.52 KB
 024 - Network Security Organizations.pdf168.96 KB
 023 - Overview of Common Attacks and Exploits.pdf162.61 KB
 022 - Common Vulnerabilities, Threats, Risks.pdf162.5 KB
 018 - Targets of Opportunity.pdf159.13 KB
 019 - Targets of Choice.pdf129.62 KB
 016 - Essentials First Looking for a Target.pdf121.85 KB
 015 - There be Hackers Here.pdf107.84 KB
 017 - Hacking Motivations.pdf106.94 KB
 027 - Security Policies.pdf524.21 KB
 029 - Corporate Policies and Trust.pdf288.34 KB
 033 - Wireless Communication Policy.pdf201.26 KB
 030 - Acceptable Use Policy.pdf199.15 KB
 031 - Password Policy.pdf175.48 KB
 028 - Responsibilities and Expectations.pdf175.08 KB
 034 - Extranet Connection Policy.pdf160.62 KB
 032 - Virtual Private Network (VPN) Security Policy.pdf152.96 KB
 036 - Industry Standards.pdf148.79 KB
 035 - ISO Certification Policy.pdf134.42 KB
 040 - Security Advisories and Alerts Getting the Intel You Need to Stay Safe.pdf320.85 KB
 041 - Industry Best Practices.pdf182.51 KB
 039 - Processes and Procedures.pdf106.14 KB
 042 - Summary.pdf86.59 KB
 043 - Chapter Review and Questions.pdf81.4 KB
 049 - Microsoft Security.pdf328.53 KB
 047 - Cisco Best Practice Overview and Guidelines.pdf280.34 KB
 046 - Cisco Validated Design Program.pdf151.2 KB
 048 - NSA Security Configuration Guides.pdf141.81 KB
 044 - Network Security Standards and Guidelines.pdf109.81 KB
 051 - Chapter Link Toolbox Summary.pdf102.55 KB
 045 - Cisco SAFE2.0.pdf96.33 KB
 050 - Chapter Summary.pdf71.63 KB
 062 - Two-Factor Authentication - Multifactor Authentication.pdf1.71 MB
 053 - Security First Design Concepts.pdf1.03 MB
 060 - Reputation Based Security.pdf269.65 KB
 054 - Packet Filtering via ACLs.pdf262.63 KB
 056 - Network Adress Translation (NAT).pdf220.86 KB
 055 - Stateful Packet Inspection.pdf210.12 KB
 061 - AAA Technologies.pdf209.21 KB
 057 - Proxies and Application-Level Protection.pdf204.38 KB
 058 - Content Filters.pdf168.58 KB
 059 - Public Key Infrastructure.pdf149.37 KB
 073 - SNMP v3.pdf699.94 KB
 072 - Secure Shell (SSH).pdf658.29 KB
 071 - Layer 2 Tunneling Protocol (L2TP).pdf305.42 KB
 070 - Point-to-Point Tunneling Protocol (PPTP).pdf157.66 KB
 068 - Message Digest 5 Algorithm.pdf146.65 KB
 066 - Triple DES Encryption.pdf142.38 KB
 065 - Security Protocols.pdf133.05 KB
 069 - Secure Hash Algorithm (SHA Hash).pdf132.9 KB
 067 - Advanced Encryption Standard (AES).pdf103.89 KB
 075 - Chapter Review Questions.pdf76.26 KB
 074 - Chapter Summary.pdf71.03 KB
 080 - Firewall Operational Overview.pdf269.44 KB
 082 - Case Studies.pdf232.96 KB
 077 - Firewall Frequently Asked Questions.pdf213.9 KB
 078 - Firewalls are the Security Policy.pdf172.76 KB
 081 - Essentials First Life in the DMZ.pdf142.57 KB
 076 - Firewalls.pdf128.48 KB
 079 - We Do Not Have a Security Policy.pdf90.51 KB
 083 - Firewall Limitations.pdf82.48 KB
 084 - Chapter Summary.pdf79.25 KB
 085 - Chapter Review Questions.pdf73.59 KB
 090 - Secure IOS Templates.pdf357 KB
 087 - Edge Router as a Choke Point.pdf324.8 KB
 091 - Routing Protocol Security.pdf210.03 KB
 086 - Router Security.pdf205.86 KB
 088 - Routers Running Zone Based Firewall.pdf199.38 KB
 089 - Intrusion Detection With Cisco IOS.pdf198.76 KB
 092 - Chapter Summary.pdf108.66 KB
 093 - Chapter Review Questions.pdf75.97 KB
 097 - Overview of IPsec VPNs.pdf617.26 KB
 096 - VPN Overview.pdf299.58 KB
 103 - Remote-Access VPN Security Considerations.pdf262.82 KB
 098 - Router Configuration as VPN Peer.pdf233.73 KB
 099 - Firewall VPN Configuration for Client Access.pdf209.08 KB
 100 - SSL VPN Overview.pdf190.13 KB
 101 - Comparing SSL and IPsec VPNs.pdf186.56 KB
 095 - VPNs Securely Connect is LANds.pdf148.07 KB
 094 - IPsec Virtual Private Networks (VPN).pdf141.32 KB
 102 - Which to Deploy Choosing Between IPsec and SSL VPNs.pdf139.41 KB
 110 - Wireless Threats.pdf829.32 KB
 107 - Essentials First Wireless LANs.pdf559.38 KB
 113 - Essentials First Wireless Hacking Tools.pdf274.28 KB
 109 - WarGames Wirelessly.pdf241.53 KB
 108 - Wireless Networking.pdf194.78 KB
 111 - Extensible Authentication Protocol (EAP).pdf140.94 KB
 106 - Wireless Security.pdf131.07 KB
 112 - Essential Wireless Security.pdf127.5 KB
 114 - Chapter Summary.pdf92.26 KB
 115 - Chapter Review Questions.pdf73.92 KB
 118 - How are Intrusions Detected.pdf1000.79 KB
 117 - Essentials First Intrusion Detection.pdf465.48 KB
 119 - Essentials First Honeypots.pdf162.98 KB
 116 - Intrusion Detection and Honeypots.pdf140.09 KB
 121 - Chapter Review Questions.pdf73.71 KB
 120 - Chapter Summary.pdf66.93 KB
 125 - Security Scanners.pdf926.42 KB
 123 - Essentials First Vulnerability Analysis.pdf309.01 KB
 124 - Security Assessments and Penetration Testing.pdf186.94 KB
 126 - COREIMPACT Pro.pdf167.84 KB
 122 - Tools of the Trade.pdf142.9 KB
 128 - Chapter Review Questions.pdf72.11 KB
 127 - Chapter Summary.pdf69.94 KB
 130 - Index.pdf562.01 KB
 000 - Front Page.pdf269.07 KB
 008 - Contents.pdf249.73 KB
 129 - Appendix A - Answers to Review Questions.pdf221.93 KB
 002 - Authors.pdf114.31 KB
 014 - How This Book is Organized.pdf113.33 KB
 003 - About the Authors.pdf110.26 KB
 009 - Icons.pdf107.58 KB
 006 - Acknowledgements.pdf83.3 KB
 005 - Dedications.pdf82.54 KB
 004 - About the Technical Reviewers.pdf82.44 KB
 007 - Contents at a Glance.pdf75.2 KB
 013 - Who Should Read This Book.pdf75.05 KB
 010 - Command Syntax Conventions.pdf72.41 KB
 011 - Introduction.pdf72.29 KB
 001 - Authors.pdf70.03 KB
 012 - Goals and Methods.pdf69.57 KB

Description

Network Security first-step
Second Edition

Tom Thomas and Donald Stoddard

Your first step into the world of network security
No security experience required
Includes clear and easily understood explanations
Makes learning easy

Your first step to network security begins here!
Learn how hacker attacks work, from start to finish
Choose the right security solution for each type of risk
Create clear and enforceable security policies, and keep them up to date
Establish reliable processes for responding to security advisories
Use encryption effectively, and recognize its limitations
Secure your network with firewalls, routers, and other devices
Prevent attacks aimed at wireless networks

No security experience required!

Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.
Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you!

Sharing Widget


Download torrent
28.27 MB
seeders:1
leechers:0
[xebooks] Cisco Network Security First-Step 2nd Edition