Register your product to gain access to bonus material or receive a coupon.
Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization
- Your Price: $51.19
- List Price: $63.99
- Estimated Release: Nov 1, 2018
- Includes EPUB, MOBI, and PDF
- About eBook Formats
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
- Copyright 2019
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 600
- Edition: 1st
- eBook (Watermarked)
- ISBN-10: 0-13-480762-6
- ISBN-13: 978-0-13-480762-1
Integrated Security Technologies and Solutions - Volume II is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction in security design, deployment, integration and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. A one-stop expert level guide for all aspects of Cisco Security, this guide will help security pros succeed in their day-to-day jobs as they get ready for their CCIE Security written and lab exams.
This guide has been written by a team of CCIEs who are world-class experts in their respective Cisco Security disciplines, including experts who were involved in creating the new CCIE Security 5.0 blueprint and possess unsurpassed understanding of its requirements. Each chapter starts with relevant theory, progresses through configuration examples and applications, and concludes with practical troubleshooting sections.
Volume 1 focuses on Identity, Context Sharing, Encryption, Secure Connectivity and Virtualization Security. With a strong focus on inter-product integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution.
Table of Contents
Part I: Knock, Knock! Who's There?
1. Who and What - AAA Basics
2. Network Access
3. Extending Network Access
4. pxGrid with the Identity Services Engine
5. Device Administration
6. Secure Connectivity
Part III: The Red Pill
7. Virtualization and Automation