Register your product to gain access to bonus material or receive a coupon.
CCIE Professional Development
Network Security Technologies and Solutions
A comprehensive, all-in-one reference for Cisco network security
Yusuf Bhaiji, CCIE No. 9305
Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure.
With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures.
With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam.
“Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ”
–Steve Gordon, Vice President, Technical Services, Cisco
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams.
Category: Network Security
Covers: CCIE Security Exam
|
6 of 6 people found the following review helpful
By TechEd (USA) - See all my reviews
Amazon Verified Purchase(What's this?)
This review is from: Network Security Technologies and Solutions (CCIE Professional Development Series) (Hardcover)
Depending on where you are in your career is how I'm going to rate this book. If you are somewhat new to security, especially in the Cisco world, this book is the book for you and deserves 5 stars. If you have been in the Cisco security world for several years, are looking to study for your CCSP or CCIE, this book is NOT for you and deserves 1 or 2 stars.This book does a great job on going over much of the Cisco security portfolio. It goes over the Cisco firewalls, AAA, NAC solutions, IPS, MARS, VPNs, etc. It gives some basic configurations for most of these. Again, I said basic and for a lot of these I would go as far as to say MINIMAL. Again, if you are looking for study material for some of the CCSP exams or CCIE, this book wont get you close. Those exams dive WAY deeper into the different technologies than what this book offers. My real issue with the book is the top line in the title "CCIE professional developement". If I see this and I see... Read more
3 of 3 people found the following review helpful
By
This review is from: Network Security Technologies and Solutions (CCIE Professional Development Series) (Hardcover)
During the first 7 chapters the author gives overviews of security vulnerabilities and attack mitigations in the current networking world. When finer points are confusing, there is detailed explanation to make the problem clear. For example distinguishing between MAC spoofing and ARP spoofing. Each threat is outlined with a description, background, problems, and mitigation techniques using Cisco configuration. This is not just a theory book but manages to fit in useful configuration examples in almost every turn of the page. This is not a quick read: you will want to have a lab setup to practice on while you read.Unlike many security discussions that make much of vulnerabilites that are highly unlikely or virtually impossible to pull off, the author clearly states when an attack is improbable, and not worth the effort to consider. The second unit of the book focuses on identity and access management. I found the sections on layer 2 access control most... Read more
1 of 1 people found the following review helpful
By
This review is from: Network Security Technologies and Solutions (CCIE Professional Development Series) (Hardcover)
The book is surely a good reference and deals with many security topics,and is up to date.Unfortunately many links provided are not working. However it takes far more research on Internet to prepare for CCIE Security, and in some cases (such as Transparent Firewall or Multiple Contexts) to understand better, since they are very important and somehow too shortly addressed. |
Download the sample pages (includes Chapter 4 and Index)
Table of Contents
Introduction
Part I: Perimeter Security
Chapter 1: Overview of Network Security
Chapter 2: Access Control
Chapter 3: Device Security
Chapter 4: Security Features on Switches
Chapter 5: Cisco IOS Firewall
Chapter 6: Cisco Firewalls - Appliance and Module
Chapter 7: Attack Vectors and Mitigation Techniques
Part 2: Identity Security and Access Management
Chapter 8: Securing Management Access
Chapter 9: Cisco Secure ACS
Chapter 10: Multi-Factor Authentication
Chapter 11: Layer 2 Access Control
Chapter 12: Wireless LAN (WLAN) Security
Chapter 13: Network Admission Control (NAC)
Part 3: Data Privacy
Chapter 14: Cryptography
Chapter 15: IPSec VPN
Chapter 16: Dynamic Multipoint VPN (DMVPN)
Chapter 17: Group Encrypted Transport VPN (GET VPN)
Chapter 18: Secure Sockets Layer VPN (SSL VPN)
Chapter 19: MPLS VPN
Part 4: Security Monitoring
Chapter 20: Network Intrusion Prevention
Chapter 21: Host Intrusion Prevention
Chapter 22: Anomaly Detection
Chapter 23: Security Monitoring, Analysis, and Response System using CS-MARS
Part 5: Policy and Security Management
Chapter 24: Cisco Security Management Applications
Chapter 25: Business Governance / Regulatory Compliance
Appendices

This book includes free shipping!
This book includes free shipping!
eBook (Watermarked)
$66.99
$53.59
Includes EPUB, MOBI, and PDF
About Watermarked eBooks
This eBook includes the following formats, accessible from your Account page after purchase:
EPUBThe open industry format known for its reflowable content and usability on supported mobile devices.
MOBIThe eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDFThe popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.