Bhaiji Y. - CCIE Professional Development Network Security Technologies and Solutions [2008, PDF, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям

<t>Оценка торрента</t>

Голосов нет
Голосов нет
Голосов нет
Голосов нет
Голосов нет
Всего голосов: 0

Торрент Сидеров Личеров Размер
0 0 19.56 МБ
Аватара пользователя
Сообщения: 14754
Зарегистрирован: 26 ноя 2011, 13:44

Bhaiji Y. - CCIE Professional Development Network Security Technologies and Solutions [2008, PDF, ENG]

Сообщение master » 09 июн 2012, 18:44

CCIE Professional Development Network Security Technologies and Solutions
Год выпуска: 2008
Автор: Yusuf Bhaiji
Издательство: CIscoPress
ISBN: 9780768681963
Формат: PDF
Качество: eBook (изначально компьютерное)
Количество страниц: 777
Описание: At the same time networks are growing exponentially, they are becoming complex and
mission critical, bringing new challenges to those who run and manage them. The need
for integrated network infrastructure comprising voice, video, and data (all-in-one)
services is evident, but these rapidly growing technologies introduce fresh security
concerns. Therefore, as network managers struggle to include the latest technology in their
network infrastructure, network security has become a pivotal function in building and
maintaining today's modern high-growth networks.
This chapter presents a broad description of network security in the context of today's
rapidly changing network environments. The security paradigm is changing, and security
solutions today are solution driven and designed to meet the business requirements of
business. To help you face the complexities of managing a modern network, this chapter
discusses the core principles of security—the CIA triad: Confidentiality, Integrity, and
In addition to discussing CIA, this chapter discusses security policies that are the heart of
all network security implementations. The discussion covers the following aspects of
security policies: standards, procedures, baselines, guidelines, and various security
The chapter takes a closer look at the perimeter security issue and the multilayered
perimeter approach. Last, the chapter concludes with Cisco's security wheel paradigm
involving five cyclical steps.
Доп. информация:

У вас нет необходимых прав для просмотра вложений в этом сообщении.