Picture 1 of 1
Picture 1 of 1
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) By Davi
US $20.17
ApproximatelyRM 84.81
Condition:
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear.
Postage:
Free USPS Media MailTM.
Located in: MD, United States
Delivery:
Estimated between Sat, 28 Sep and Thu, 3 Oct to 43230
Returns:
30 days return. Buyer pays for return shipping.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:334893210394
Item specifics
- Condition
- Title
- Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition)
- ISBN
- 9781587054570
- Subject Area
- Computers
- Publication Name
- Cisco Asa, Pix, and Fwsm Firewall
- Publisher
- Cisco Press
- Item Length
- 9.1 in
- Subject
- Networking / Vendor Specific, Security / General, Security / Networking
- Publication Year
- 2007
- Type
- Textbook
- Format
- Perfect
- Language
- English
- Item Height
- 1.8 in
- Item Weight
- 52.6 Oz
- Item Width
- 7.4 in
- Number of Pages
- 912 Pages
About this product
Product Identifiers
Publisher
Cisco Press
ISBN-10
1587054574
ISBN-13
9781587054570
eBay Product ID (ePID)
60721990
Product Key Features
Number of Pages
912 Pages
Publication Name
Cisco Asa, Pix, and Fwsm Firewall
Language
English
Subject
Networking / Vendor Specific, Security / General, Security / Networking
Publication Year
2007
Type
Textbook
Subject Area
Computers
Format
Perfect
Dimensions
Item Height
1.8 in
Item Weight
52.6 Oz
Item Length
9.1 in
Item Width
7.4 in
Additional Product Features
Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
2007-026067
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword Introduction Chapter 1 Firewall Chapter 2 Configuration Fundamentals Chapter 3 Building Connectivity Chapter 4 Firewall Management Chapter 5 Managing Firewall Users Chapter 6 Controlling Access Through the Firewall Chapter 7 Inspecting Traffic Chapter 8 Increasing Firewall Availability with Failover Chapter 9 Firewall Load Balancing Chapter 10 Firewall Chapter 11 Verifying Firewall Operation Chapter 12 ASA Modules Appendix A Well-Known Protocol and Port Numbers Appendix B Security Appliance Logging Messages
Synopsis
Cisco ASA, PIX, and FWSM Firewall Handbook , Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. "Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco." Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with the Modular Policy Framework Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls, "Cisco ASA, PIX, and FWSM Firewall Handbook," Second Edition, is a guide for the most commonly implemented features of the popular Cisco(r) firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX(r), and the Catalyst(r) Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco. Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE(r) No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with the Modular Policy Framework Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module This security book is part of the Cisco Press(r) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls ", Cisco ASA, PIX, and FWSM Firewall Handbook , Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. "Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco." --Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with the Modular Policy Framework Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls
LC Classification Number
TK5105.59.H83 2007
Item description from the seller
Business seller information
Value Added Tax Number:
- GB 724498118
Popular categories from this store
Seller feedback (520,975)
- 3***2 (2559)- Feedback left by buyer.Past monthVerified purchaseEverything great
- l***h (325)- Feedback left by buyer.Past monthVerified purchaseThis book is so meaningful. Thank you so so much!
- t***d (1479)- Feedback left by buyer.Past monthVerified purchaseFAST SHIPPING EASY TRANSACTION EXCELLENT SELLER THANKS !!!
More to explore :
- 1st Edition Lindsey Davis Antiquarian & Collectible Books,
- Mystery, Thriller 1st Edition Lindsey Davis Antiquarian & Collectible Books,
- 1st Edition Lindsey Davis Literature & Fiction Antiquarian & Collectible Books,
- Fiction Books & Jim Davis Fiction,
- Collector's Edition Magazines,
- 1st Edition Antiquarian & Collectible Books,
- Collector's Edition People Magazines,
- Limited Edition Antiquarian & Collectible Books,
- Easyriders 1st Edition Magazines,
- Maxim 1st Edition Magazines