<< 1 >>
Rating:  Summary: Begginers Book Review: I bought this book becouse the reviews were good... Not enough reviews I think, the book itself is not a big thing. Just TCP/IP principles, access lists and something about pix configuration. Could be better. If you want principles, you got them, is easy reading...
Rating:  Summary: Excellent text on Cisco security for routers and PIX Review: I bought this sight unseen and have found it to be delightfully easy to read and understand. Many examples are included to help with the principals and strategies articulated within the book. I'm not one of those that can read some of the Cisco press books cover to cover and get it. So I found it quite refreshing and helpful. Those Cisco techno geeks may be feel its too elementary, but it was just what I wanted. The price is very high, but, for me, it was worth it.
Rating:  Summary: good Review: the adfhe a fad; af df ajfd ; af d;fja; a;fdj;af dahd.faf
Rating:  Summary: The one Stop Reference to Cisco Security! Review: Tried and true Cisco troubleshooting methodology written by experienced networking professionals including coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; complete tutorial on the TCP/IP Protocol and its use with Cisco routers; complete explanation of a tested troubleshooting methodology that can be used in many situations. Security discussions include: public network and private network security threats and how to prevent them. How firewalls and proxy servers can be used as a first line of defense; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; how to Firewall and the Centri firewall how to use the special security features built into Cisco Routers. ** Contents ** Part I: Introduction. Part II: The TCP/IP Protocol Suite. Part III: The Internet Protocol. Part IV: TCP and UDP. Part V: NetWare Overview. Part VI: Router Hardware and Software Overview. Part VII: Working with Access Lists. Part VIII: The PIX Firewall. Part IX: The Centri Firewall.
<< 1 >>
|