skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES). Preview this item
ClosePreview this item
Checking...

NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).

Author: YUSUF BHAIJI
Publisher: [Place of publication not identified] : CISCO Press, 2016.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: (OCoLC)987051010
Material Type: Document
Document Type: Book, Computer File
All Authors / Contributors: YUSUF BHAIJI
ISBN: 9780132796743 0132796740
OCLC Number: 1005201311
Description: 1 online resource
Contents: Introduction Part I: Perimeter Security Chapter 1: Overview of Network Security Chapter 2: Access Control Chapter 3: Device Security Chapter 4: Security Features on Switches Chapter 5: Cisco IOS Firewall Chapter 6: Cisco Firewalls - Appliance and Module Chapter 7: Attack Vectors and Mitigation Techniques Part 2: Identity Security and Access Management Chapter 8: Securing Management Access Chapter 9: Cisco Secure ACS Chapter 10: Multi-Factor Authentication Chapter 11: Layer 2 Access Control Chapter 12: Wireless LAN (WLAN) Security Chapter 13: Network Admission Control (NAC) Part 3: Data Privacy Chapter 14: Cryptography Chapter 15: IPSec VPN Chapter 16: Dynamic Multipoint VPN (DMVPN) Chapter 17: Group Encrypted Transport VPN (GET VPN) Chapter 18: Secure Sockets Layer VPN (SSL VPN) Chapter 19: MPLS VPN Part 4: Security Monitoring Chapter 20: Network Intrusion Prevention Chapter 21: Host Intrusion Prevention Chapter 22: Anomaly Detection Chapter 23: Security Monitoring, Analysis, and Response System using CS-MARS Part 5: Policy and Security Management Chapter 24: Cisco Security Management Applications Chapter 25: Business Governance / Regulatory Compliance Appendices

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1005201311<\/a>> # NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1005201311<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Place\/place_of_publication_not_identified<\/a>> ; # Place of publication not identified<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Person\/bhaiji_yusuf<\/a>> ; # YUSUF BHAIJI<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2016<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4528068603<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/987051010<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1005201311<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311#PublicationEvent\/place_of_publication_not_identified_cisco_press_2016<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Agent\/cisco_press<\/a>> ; # CISCO Press<\/span>\n\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780132796743<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Agent\/cisco_press<\/a>> # CISCO Press<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"CISCO Press<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Person\/bhaiji_yusuf<\/a>> # YUSUF BHAIJI<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"BHAIJI<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"YUSUF<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"YUSUF BHAIJI<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Place\/place_of_publication_not_identified<\/a>> # Place of publication not identified<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Place of publication not identified<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780132796743<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0132796740<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780132796743<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/987051010<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1005201311<\/a>> ; # NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1005201311<\/a>> ; # NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-02-13<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311#PublicationEvent\/place_of_publication_not_identified_cisco_press_2016<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Place\/place_of_publication_not_identified<\/a>> ; # Place of publication not identified<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Agent\/cisco_press<\/a>> ; # CISCO Press<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2016<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n