Friday, 10 September 2010

[G417.Ebook] Download PDF Network Security Fundamentals, by Gert DeLaet, Gert Schauwers

Download PDF Network Security Fundamentals, by Gert DeLaet, Gert Schauwers

Well, publication Network Security Fundamentals, By Gert DeLaet, Gert Schauwers will certainly make you closer to exactly what you want. This Network Security Fundamentals, By Gert DeLaet, Gert Schauwers will certainly be always good buddy any type of time. You may not forcedly to constantly complete over reviewing an e-book simply put time. It will certainly be only when you have extra time and also investing few time to make you feel satisfaction with what you check out. So, you could obtain the significance of the message from each sentence in guide.

Network Security Fundamentals, by Gert DeLaet, Gert Schauwers

Network Security Fundamentals, by Gert DeLaet, Gert Schauwers



Network Security Fundamentals, by Gert DeLaet, Gert Schauwers

Download PDF Network Security Fundamentals, by Gert DeLaet, Gert Schauwers

Checking out an e-book Network Security Fundamentals, By Gert DeLaet, Gert Schauwers is kind of easy activity to do whenever you desire. Also reviewing whenever you desire, this activity will certainly not interrupt your other activities; lots of people typically review the books Network Security Fundamentals, By Gert DeLaet, Gert Schauwers when they are having the spare time. Just what regarding you? Just what do you do when having the downtime? Do not you spend for pointless things? This is why you should obtain the e-book Network Security Fundamentals, By Gert DeLaet, Gert Schauwers and also aim to have reading habit. Reading this publication Network Security Fundamentals, By Gert DeLaet, Gert Schauwers will not make you worthless. It will certainly give more benefits.

As one of guide collections to recommend, this Network Security Fundamentals, By Gert DeLaet, Gert Schauwers has some solid reasons for you to review. This publication is quite ideal with exactly what you require now. Besides, you will certainly additionally like this publication Network Security Fundamentals, By Gert DeLaet, Gert Schauwers to read due to the fact that this is among your referred publications to review. When getting something new based upon experience, amusement, and also other lesson, you can use this publication Network Security Fundamentals, By Gert DeLaet, Gert Schauwers as the bridge. Beginning to have reading routine can be undergone from different methods and from alternative types of publications

In reviewing Network Security Fundamentals, By Gert DeLaet, Gert Schauwers, now you might not likewise do traditionally. In this contemporary period, gizmo and also computer system will assist you a lot. This is the moment for you to open the gizmo as well as remain in this site. It is the best doing. You could see the link to download this Network Security Fundamentals, By Gert DeLaet, Gert Schauwers below, can not you? Merely click the link and also negotiate to download it. You can get to purchase the book Network Security Fundamentals, By Gert DeLaet, Gert Schauwers by on-line as well as ready to download and install. It is quite different with the standard method by gong to the book store around your city.

However, reviewing guide Network Security Fundamentals, By Gert DeLaet, Gert Schauwers in this website will lead you not to bring the published publication almost everywhere you go. Simply keep guide in MMC or computer disk and also they are offered to review whenever. The thriving heating and cooling unit by reading this soft file of the Network Security Fundamentals, By Gert DeLaet, Gert Schauwers can be leaded into something new practice. So currently, this is time to show if reading can enhance your life or otherwise. Make Network Security Fundamentals, By Gert DeLaet, Gert Schauwers it certainly work as well as obtain all advantages.

Network Security Fundamentals, by Gert DeLaet, Gert Schauwers

An introduction to the key tools and technologies used to secure network access

  • Examine common security vulnerabilities and the defenses used to protect network resources
  • Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates
  • Learn how to design, adopt, and enforce security policies
  • Evaluate the nuances of secure network design
  • Secure HTTP traffic by hardening operating systems, servers, and browsers
  • Protect routers through administrative access policies and services
  • Understand what firewalls do and how to implement them to maximum effect
  • Inspect and monitor network activity with IDS
  • Utilize VPNs for secure remote access
  • Learn about PKI technologies
  • Examine secure wireless design techniques
  • Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions.

Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems.

Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies.

Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.

  • Sales Rank: #413998 in Books
  • Published on: 2004-09-18
  • Released on: 2004-09-08
  • Ingredients: Example Ingredients
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.00" h x 1.20" w x 7.40" l,
  • Binding: Paperback
  • 480 pages

From the Back Cover

An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions.

"Network Security Fundamentals" introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems.

Divided into four parts, "Network Security Fundamentals" takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies.

Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.

About the Author

Gert De Laet, CCIE No. 2657, is a CCIE in both Routing and Switching and Security. Gert has more than 10 years of experience in internetworking and works in Brussels, Belgium, for the worldwide CCIE team as a product manager at Cisco Systems.

Gert Schauwers, CCIE No. 6942, has CCIE certifications in Security, Routing and Switching, and Communication and Services. He has six years of experience in internetworking. He is currently working for the CCIE team at Cisco in Brussels, Belgium, as a CCIE content engineer.

Most helpful customer reviews

6 of 7 people found the following review helpful.
A good start, but weak on Layer-2 defenses
By Jeremy NeeDLE
First of all, let me state that this review is primarily in context of Cisco's 642-552 exam, since as of this writing, this is really the only book on their Recommended Reading for this particular exam. There are no Exam Certification series from Cisco for this specific exam, which is the foundation of their CCSP and Security Specialization certifications.

What is good about this title is coverage of security policy, vpn's, ids, firewalls, wireless, and PKI. Good introduction, and decent configuration examples. Certainly enough to get even a neophyte up and running.

So what is this title missing?

#1 SDM [Security Device Manager] configuration examples & exercises. Chances are if you're a newbie, you're going to be much more comfortable using the Browser-based GUI rather than the IOS Command Line. Additionally ALL the simulations for the 552 exam are based around SDM configuration. I would recommend you download SDM documentation from Cisco's website if you're planning on taking the 642-552 exam.

#2 There is inadequate coverage of common Layer 2 attacks, and the defense mechanisms to subvert them. For example, no explanation or examples are given on configuring Port Security which protects against MAC Spoofing, MAC Flooding, ARP Spoofing, and flooding the CAM table. And that is BASIC SWITCH SECURITY that is relatively easy to implement. Furthermore, there should also be discussions of IP Source Guard, VLAN Hopping, and Dynamic ARP Inspection. I HIGHLY recommend you search on Cisco's site about these features & configuring them.

#3 CBAC explanation is fairly unclear. Students will be confused by the fact that they named the ip inspect rules as "BLOCK" and "ALLOW" and associate each one w/ a traffic direction [ingress/egress respectively], when really these names do not accurately describe the behavior of CBAC

#4 Pg 174 "A software based firewall is only as secure as the operating system it relies on...Appliance based firewalls, such as NetScreen or PIX, do not have that vulnerability" ARE YOU KIDDING ME? IOS is still SOFTWARE. All...ALL...software can be exploited. See Hacking Cisco. Certainly it is harder, yes, but it is STILL susceptible application-layer attacks and buffer overflows.

0 of 0 people found the following review helpful.
Don't bother buying it.
By Douglas P. Nguyen
So I bought this book and the authorized self-study guide to study for the CCNA Security 640-553 exam. The self-study guide already covered material, so buying this book is a bit redundant.

Pros - It was cheap used.
Cons - Dated.

For starters not familiar with Cisco I'd recommend reading one the Security+ books instead.

5 of 5 people found the following review helpful.
Picks up where "Network Security First-Step" left off!
By Mark G. Reyero
I picked up a copy of "Network Security Fundamentals" (ISBN 1587051672) by Gert De Laet and Gert Schauwers to add to my CCIE Security reading list. Network Security Fundamentals more or less picks up with Tom Thomas's "Network Security First-Step" (ISBN 1587200996). Whereas the Thomas book serves as an excellent introduction to securing your network, "Network Security Fundamentals" is an intermediate level network security book. It delves it more details not only network design essentials, but many other security topics such as Router Security, Firewalls, Intrusion Detection, VPNs, Remote Access, and Wireless.

I found the detailed coverage on Cryptography as well as securing Web Servers especially helpful and insightful. The book includes many device configuration examples, show commands, and debug outputs. I highly recommend this book to any Network Admin interested in securing his/her network as well as any potential CCIE Security candidates out there!

Mark Reyero

CCIE 12932

See all 7 customer reviews...

Network Security Fundamentals, by Gert DeLaet, Gert Schauwers PDF
Network Security Fundamentals, by Gert DeLaet, Gert Schauwers EPub
Network Security Fundamentals, by Gert DeLaet, Gert Schauwers Doc
Network Security Fundamentals, by Gert DeLaet, Gert Schauwers iBooks
Network Security Fundamentals, by Gert DeLaet, Gert Schauwers rtf
Network Security Fundamentals, by Gert DeLaet, Gert Schauwers Mobipocket
Network Security Fundamentals, by Gert DeLaet, Gert Schauwers Kindle

Network Security Fundamentals, by Gert DeLaet, Gert Schauwers PDF

Network Security Fundamentals, by Gert DeLaet, Gert Schauwers PDF

Network Security Fundamentals, by Gert DeLaet, Gert Schauwers PDF
Network Security Fundamentals, by Gert DeLaet, Gert Schauwers PDF

No comments:

Post a Comment