Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Cisco Security Architectures

Cisco Security Architectures

List Price: $55.00
Your Price: $55.00
Product Info Reviews

<< 1 >>

Rating: 2 stars
Summary: Begginers Book
Review: I bought this book becouse the reviews were good... Not enough reviews I think, the book itself is not a big thing. Just TCP/IP principles, access lists and something about pix configuration. Could be better. If you want principles, you got them, is easy reading...

Rating: 4 stars
Summary: Excellent text on Cisco security for routers and PIX
Review: I bought this sight unseen and have found it to be delightfully easy to read and understand. Many examples are included to help with the principals and strategies articulated within the book. I'm not one of those that can read some of the Cisco press books cover to cover and get it. So I found it quite refreshing and helpful. Those Cisco techno geeks may be feel its too elementary, but it was just what I wanted. The price is very high, but, for me, it was worth it.

Rating: 5 stars
Summary: good
Review: the adfhe a fad; af df ajfd ; af d;fja; a;fdj;af dahd.faf

Rating: 0 stars
Summary: The one Stop Reference to Cisco Security!
Review: Tried and true Cisco troubleshooting methodology written by experienced networking professionals including coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; complete tutorial on the TCP/IP Protocol and its use with Cisco routers; complete explanation of a tested troubleshooting methodology that can be used in many situations. Security discussions include: public network and private network security threats and how to prevent them.

How firewalls and proxy servers can be used as a first line of defense; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; how to Firewall and the Centri firewall how to use the special security features built into Cisco Routers.

** Contents **

Part I: Introduction. Part II: The TCP/IP Protocol Suite. Part III: The Internet Protocol. Part IV: TCP and UDP. Part V: NetWare Overview. Part VI: Router Hardware and Software Overview. Part VII: Working with Access Lists. Part VIII: The PIX Firewall. Part IX: The Centri Firewall.


<< 1 >>

© 2004, ReviewFocus or its affiliates