Securing and Controlling Cisco Routers

Author:   Peter T. Davis
Publisher:   Taylor & Francis Ltd
ISBN:  

9780849312908


Pages:   732
Publication Date:   15 May 2002
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $284.63 Quantity:  
Add to Cart

Share |

Securing and Controlling Cisco Routers


Add your own review!

Overview

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Full Product Details

Author:   Peter T. Davis
Publisher:   Taylor & Francis Ltd
Imprint:   Auerbach
Dimensions:   Width: 17.80cm , Height: 3.70cm , Length: 25.40cm
Weight:   1.360kg
ISBN:  

9780849312908


ISBN 10:   0849312906
Pages:   732
Publication Date:   15 May 2002
Audience:   Professional and scholarly ,  Professional and scholarly ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

The Basics. Preventing Unauthorized Access: Networking Device. Preventing Unauthorized Access: Networking. Preventing Network Data Interception. Preventing Denial Of Service. Preventing Fraudulent Route Updates And Other Unauthorized Changes. Appendixes.

Reviews

Author Information

Peter T. Davis

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List