Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
 Windows 8
 Adobe CS6
 CCNA 2012
 CCNP 2012
 Web Design
 Project Management
 Mobile Devices
 Windows Server 2012
 SQL Server 2012
Economics and Business
 Business Information Systems
 Human Resources

Designing Network Security, 2nd Edition

by: Kaeo

Notify me when in stock

On-line Price: $71.96 (includes GST)

Paperback package 768

20%Off Retail Price

You save: $17.99

Usually ships within 4 - 5 business days.

Retail Price: $89.95

Publisher: CISCO PRESS,24.05.10

Category: Cisco Level:

ISBN: 158714249X
ISBN13: 9781587142499

Add to Shopping Cart

Master the design of secure networks with the updated edition of this best-selling security guide

  Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs

  Learn how to use new and legacy Cisco Systems equipment to secure your networks

  Understand how to design and build security services while also learning the legal and network accessibility impact of those services

Table of Contents



1. Basic Cryptography.

Cryptography. Authentication and Authorization. Namespace. Key Management. Key Escrow. Summary. Review Questions.

2. Security Technologies.

Identity Technologies. Application Layer Security Protocols. Transport Layer Security Protocols. Network Layer Security. Link-Layer Security Technologies. Public Key Infrastructure and Distribution Models. Summary. Review Questions.

3. Applying Security Technologies to Real Networks.

Virtual Private Networks (VPNs). Wireless Networks. Voice over IP (VoIP) Networks. Summary. Review Questions.

4. Routing Protocol Security.

Routing Basics. Routing Protocol Security Details. Summary. Review Questions.

5. Threats in an Enterprise Network.

Types of Threats. Motivation of Threat. Common Protocol Vulnerabilities. Common Network Scenario Threats and Vulnerabilities. Routing Protocols. Social Engineering. Summary. Review Questions.

6. Considerations for a Site Security Policy.

Where to Begin. Risk Management. A Security Policy Framework. Summary. Review Questions.

7. Design and Implementation of the Corporate Security Policy.

Physical Security Controls. Logical Security Controls. Infrastructure and Data Integrity. Data Confidentiality. Security Policy Verification and Monitoring. Policies and Procedures for Staff. Security Awareness Training. Summary. Review Questions.

8. Incident Handling.

Building an Incident Response Team. Detecting an Incident. Handling an Incident. Incident Vulnerability Mitigation. Responding to the Incident. Recovering from an Incident. Summary. Review Questions.

9. Securing the Corporate Network Infrastructure.

Identity - Controlling Network Device Access. Integrity. Data Confidentiality. Network Availability. Audit. Implementation Examples. Summary. Review Questions.

10. Securing Internet Access.

Internet Access Architecture. External Screening Router Architecture. Advanced Firewall Architecture. Implementation Examples. Summary. Review Questions.

11. Securing Remote Dial-In Access.

Dial-In Security Concerns. Authenticating Dial-In Users and Devices. Authorization. Accounting and Billing. Using AAA with Specific Features. Encryption for Virtual Dial-In Environments. Summary. Review Questions.

12. Securing VPN, Wireless, and VoIP Networks.

Virtual Private Networks. Wireless Networks. Voice over IP Networks. Summary. Review Questions.

Appendix A: Sources of Technical Information.

Appendix B: Reporting and Prevention Guidelines: Industrial Espionage and Network Intrusions.

Appendix C: Port Numbers.

Appendix D: Mitigating Distributed Denial-of-Service Attacks.

Appendix E: Answers to Review Questions.



About the Authors


Merike Kaeo, CCIE No. 1287, is currently a consultant focusing primarily on security-related products and network design solutions. She has been in the networking industry more than 15 years, starting out at the National Institutes of Health in Bethesda, MD, from 1988 to 1993, designing and implementing the original FDDI backbone for the NIH campus using Cisco routers. From 1993 to 2000, Merike was employed by Cisco Systems, Inc., where she worked primarily on technical issues relating to router performance, network routing protocols, network design, and network security. She was a lead member of the Cisco security initiative, has acted as a technical advisor for security startup companies, and has been an instructor and speaker in a variety of security-related conferences. Merike received her BSEE from Rutgers University in 1987 and completed her MSEE degree from George Washington University in 1998.