přejít na obsah
NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES). Náhled dokumentu
ZavřítNáhled dokumentu
Ověřování...

NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).

Autor YUSUF BHAIJI
Vydavatel: [Place of publication not identified] : CISCO Press, 2016.
Vydání/formát:   e-kniha : Document : EnglishZobrazit všechny vydání a formáty
Hodnocení:

(ještě nehodnoceno) 0 zobrazit recenze - Buďte první.

Vyhledat exemplář v knihovně

&AllPage.SpinnerRetrieving; Vyhledávání knihoven, které vlastní tento dokument...

Detaily

Doplňující formát: (OCoLC)987051010
Typ materiálu: Document
Typ dokumentu Kniha, Počítačový soubor
Všichni autoři/tvůrci: YUSUF BHAIJI
ISBN: 9780132796743 0132796740
OCLC číslo: 1005201311
Popis: 1 online resource
Obsahy: Introduction Part I: Perimeter Security Chapter 1: Overview of Network Security Chapter 2: Access Control Chapter 3: Device Security Chapter 4: Security Features on Switches Chapter 5: Cisco IOS Firewall Chapter 6: Cisco Firewalls - Appliance and Module Chapter 7: Attack Vectors and Mitigation Techniques Part 2: Identity Security and Access Management Chapter 8: Securing Management Access Chapter 9: Cisco Secure ACS Chapter 10: Multi-Factor Authentication Chapter 11: Layer 2 Access Control Chapter 12: Wireless LAN (WLAN) Security Chapter 13: Network Admission Control (NAC) Part 3: Data Privacy Chapter 14: Cryptography Chapter 15: IPSec VPN Chapter 16: Dynamic Multipoint VPN (DMVPN) Chapter 17: Group Encrypted Transport VPN (GET VPN) Chapter 18: Secure Sockets Layer VPN (SSL VPN) Chapter 19: MPLS VPN Part 4: Security Monitoring Chapter 20: Network Intrusion Prevention Chapter 21: Host Intrusion Prevention Chapter 22: Anomaly Detection Chapter 23: Security Monitoring, Analysis, and Response System using CS-MARS Part 5: Policy and Security Management Chapter 24: Cisco Security Management Applications Chapter 25: Business Governance / Regulatory Compliance Appendices

Recenze

Recenze vložené uživatelem
Nahrávání recenzí GoodReads...
Přebírání recenzí DOGO books...

Štítky

Buďte první.
Potvrdit tento požadavek

Tento dokument jste si již vyžádali. Prosím vyberte Ok pokud chcete přesto v žádance pokračovat.

Propojená data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1005201311<\/a>> # NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1005201311<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Place\/place_of_publication_not_identified<\/a>> ; # Place of publication not identified<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Person\/bhaiji_yusuf<\/a>> ; # YUSUF BHAIJI<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2016<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4528068603<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/987051010<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1005201311<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311#PublicationEvent\/place_of_publication_not_identified_cisco_press_2016<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Agent\/cisco_press<\/a>> ; # CISCO Press<\/span>\n\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780132796743<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Agent\/cisco_press<\/a>> # CISCO Press<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"CISCO Press<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Person\/bhaiji_yusuf<\/a>> # YUSUF BHAIJI<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"BHAIJI<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"YUSUF<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"YUSUF BHAIJI<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Place\/place_of_publication_not_identified<\/a>> # Place of publication not identified<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Place of publication not identified<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780132796743<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0132796740<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780132796743<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/987051010<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1005201311<\/a>> ; # NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1005201311<\/a>> ; # NETWORK SECURITY TECHNOLOGIES AND SOLUTIONS (CCIE PROFESSIONAL DEVELOPMENT SERIES).<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-02-13<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1005201311#PublicationEvent\/place_of_publication_not_identified_cisco_press_2016<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Place\/place_of_publication_not_identified<\/a>> ; # Place of publication not identified<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4528068603#Agent\/cisco_press<\/a>> ; # CISCO Press<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2016<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n