Biblioteca da Unifei Itabira
Network security architectures: expert guidance on designing secure networks
CONVERY, Sean. Network security architectures: expert guidance on designing secure networks. 2 reimpr. Indianápolis: Cisco Press, 2005. xxxix, 739 p. Inclui bibliografia e índice; Contém glossário de termos; il. tab. quad.; 25cm. ISBN 158705115X.
Download de recursos adicionais no site da editora
Notas de conteúdo:
1. Network Security Axioms
2. Security Policy and Operations Life Cycle
3. Secure Networking Threats
4. Network Security Technologies
5. Device Hardening
6. General Design Considerations
7. Network Security Platform Options and Best Deployment Practices
8. Common Application Design Considerations
9. Identity Design Considerations
10. IPsec VPN Design Considerations
11. Supporting-Technology Design Considerations
12. Designing Your Security System
13. Edge Security Design
14. Campus Security Design
15. Teleworker Security Design
16. Secure Network Management and Network Security Management
17. Case Studies
18. Conclusions
Appendix A: Glossary of Terms
Appendix B: Answers to Applied Knowledge Questions
Appendix C: Sample Security Policies
Palavras-chave:
REDES DE COMPUTADORES/Segurança.
CDU 004.7 / C832n / 2 reimpr.
Network security architectures: expert guidance on designing secure networks
CONVERY, Sean. Network security architectures: expert guidance on designing secure networks. 2 reimpr. Indianápolis: Cisco Press, 2005. xxxix, 739 p. Inclui bibliografia e índice; Contém glossário de termos; il. tab. quad.; 25cm. ISBN 158705115X.
Download de recursos adicionais no site da editora
Notas de conteúdo:
1. Network Security Axioms
2. Security Policy and Operations Life Cycle
3. Secure Networking Threats
4. Network Security Technologies
5. Device Hardening
6. General Design Considerations
7. Network Security Platform Options and Best Deployment Practices
8. Common Application Design Considerations
9. Identity Design Considerations
10. IPsec VPN Design Considerations
11. Supporting-Technology Design Considerations
12. Designing Your Security System
13. Edge Security Design
14. Campus Security Design
15. Teleworker Security Design
16. Secure Network Management and Network Security Management
17. Case Studies
18. Conclusions
Appendix A: Glossary of Terms
Appendix B: Answers to Applied Knowledge Questions
Appendix C: Sample Security Policies
Palavras-chave:
REDES DE COMPUTADORES/Segurança.
CDU 004.7 / C832n / 2 reimpr.