skip to content
End-to-end network security : defense-in-depth Preview this item
ClosePreview this item
Checking...

End-to-end network security : defense-in-depth

Author: Omar Santos
Publisher: Indianapolis, Ind. : Cisco Press, ©2008.
Series: Cisco Press networking technology series.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
Master the popular techniques of this comprehensive security program that ensures network safety at all layers and in all devices. Gain an inside look at deploying, installing, configuring, troubleshooting, and maintaining Cisco security products and technologies.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Santos, Omar.
End-to-end network security.
Indianapolis, Ind. : Cisco Press, ©2008
(OCoLC)894800872
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Omar Santos
ISBN: 9781587053320 1587053322
OCLC Number: 154678349
Notes: Includes index.
Description: xxiii, 444 pages : illustrations ; 23 cm.
Contents: pt. I. Introduction to network security solutions --
Ch. 1. Overview of network security technologies --
pt. II. Security lifestyle : frameworks and methodologies --
Ch. 2. Preparation phase --
Ch. 3. Identifying and classifying security threats --
Ch. 4. Traceback --
Ch. 5. Reacting to security incidents --
Ch. 6. Postmortem and improvement --
Ch. 7. Proactive security framework --
pt. III. Defense-in-depth applied --
Ch. 8. Wireless security --
Ch. 9. IP telephony security --
Ch. 10. Data center security --
Ch. 11. IPv6 security --
pt. IV. Case studies --
Ch. 12. Case studies.
Series Title: Cisco Press networking technology series.
Responsibility: Omar Santos.
More information:

Abstract:

Starting with a review of network security technologies, this guide provides a comprehensive look at the mechanisms to counter threats to each part of a network. It then covers wireless network  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/154678349> # End-to-end network security : defense-in-depth
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "154678349" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/801792964#Place/indianapolis_ind> ; # Indianapolis, Ind.
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/801792964#Topic/systemes_informatiques_securite_mesures> ; # Systèmes informatiques--Sécurité--Mesures
   schema:about <http://experiment.worldcat.org/entity/work/data/801792964#Topic/securite_informatique> ; # Sécurité informatique
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/801792964#Topic/reseaux_d_ordinateurs_securite_mesures> ; # Réseaux d'ordinateurs--Sécurité--Mesures
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2008" ;
   schema:creator <http://viaf.org/viaf/275211079> ; # Omar Santos
   schema:datePublished "2008" ;
   schema:description "pt. I. Introduction to network security solutions -- Ch. 1. Overview of network security technologies -- pt. II. Security lifestyle : frameworks and methodologies -- Ch. 2. Preparation phase -- Ch. 3. Identifying and classifying security threats -- Ch. 4. Traceback -- Ch. 5. Reacting to security incidents -- Ch. 6. Postmortem and improvement -- Ch. 7. Proactive security framework -- pt. III. Defense-in-depth applied -- Ch. 8. Wireless security -- Ch. 9. IP telephony security -- Ch. 10. Data center security -- Ch. 11. IPv6 security -- pt. IV. Case studies -- Ch. 12. Case studies."@en ;
   schema:description "Master the popular techniques of this comprehensive security program that ensures network safety at all layers and in all devices. Gain an inside look at deploying, installing, configuring, troubleshooting, and maintaining Cisco security products and technologies."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/801792964> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/801792964#Series/cisco_press_networking_technology_series> ; # Cisco Press networking technology series.
   schema:isSimilarTo <http://www.worldcat.org/oclc/894800872> ;
   schema:name "End-to-end network security : defense-in-depth"@en ;
   schema:productID "154678349" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/154678349#PublicationEvent/indianapolis_ind_cisco_press_2008> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/801792964#Agent/cisco_press> ; # Cisco Press
   schema:url <http://catdir.loc.gov/catdir/toc/ecip0722/2007028287.html> ;
   schema:workExample <http://worldcat.org/isbn/9781587053320> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/154678349> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/801792964#Place/indianapolis_ind> # Indianapolis, Ind.
    a schema:Place ;
   schema:name "Indianapolis, Ind." ;
    .

<http://experiment.worldcat.org/entity/work/data/801792964#Series/cisco_press_networking_technology_series> # Cisco Press networking technology series.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/154678349> ; # End-to-end network security : defense-in-depth
   schema:name "Cisco Press networking technology series." ;
   schema:name "Cisco Press networking technology series" ;
    .

<http://experiment.worldcat.org/entity/work/data/801792964#Topic/reseaux_d_ordinateurs_securite_mesures> # Réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/801792964#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
   schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/801792964#Topic/systemes_informatiques_securite_mesures> # Systèmes informatiques--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Systèmes informatiques--Sécurité--Mesures"@fr ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/275211079> # Omar Santos
    a schema:Person ;
   schema:familyName "Santos" ;
   schema:givenName "Omar" ;
   schema:name "Omar Santos" ;
    .

<http://worldcat.org/isbn/9781587053320>
    a schema:ProductModel ;
   schema:isbn "1587053322" ;
   schema:isbn "9781587053320" ;
    .

<http://www.worldcat.org/oclc/894800872>
    a schema:CreativeWork ;
   rdfs:label "End-to-end network security." ;
   schema:description "Online version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/154678349> ; # End-to-end network security : defense-in-depth
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.