
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Science | >> | Cisco Secure Firewal... |
ISBN
:
9788131725276
Publisher
:
Pearson
Subject
:
Computer Science
Binding
:
Paperback
Pages
:
528
Year
:
2008
₹
575.0
₹
419.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Cisco Secure Firewall Services Module (FWSM) covers all aspects of the FWSM. The book provides a detailed look at how the FWSM processes information, as well as installation advice, configuration details, recommendations for network integration, and reviews of operation and management. This book provides you with a single source that comprehensively answers how and why the FWSM functions as it does. This information enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment. Practical examples throughout show you how other customers have successfully deployed the FWSM.For Sale in Indian subcontinent onlyFeaturesBest practices for securing networks with FWSM Understand the differences between PIX/ASA firewall and FWSM deployments Review practical design and configuration advice for FWSM deployments Maximize FWSM security features and reduce deployment time Learn from coverage of the latest features and common installation best practicesContentsPart I: Introduction Types of Firewalls Overview of the Firewall Services Module Examining Modes of Operation Understanding Security Levels Understanding Contexts Part II: Initial Configuration Configuring and Securing the 6500/7600 Chassis Configuring the FWSM Access Control Lists Configuring Routing Protocols AAA Overview Modular Policy Part III: Advanced Configuration Understanding Failover in FWSM Understanding Application Protocol Inspection Filtering Multicast Asymmetric Routing Firewall Load Balancing IP Version 6 Preventing Network Attacks Part IV: Design Guidelines and Configuration Examples Designinga Network Infrastructure Design Scenarios Part V: FWSM 4.x FWSM 4.x Performance and Scalability Improvements Understanding FWSM 4.x Routing and Feature Enhancements
Related Items
-
of
The CSSLP Prep Guide: Mastering The Certified Secure Software Lifecycle Professional (With CD)
Ronald L. Krutz
Starts At
615.0
699.0
12% OFF
Applied Oracle Security: Developing Secure Database and Middleware Environments
David C. Knox
Starts At
594.0
675.0
12% OFF
GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, Application Client modules, and Web services
Masoud Kalali
Starts At
695.0
799.0
13% OFF
Spring Security 3: Secure your web applications against malicious intruders with this easy to follow practical guide
Peter Mularien
Starts At
526.0
650.0
19% OFF
Least Privilege Security for Windows 7, Vista and XP: Secure desktops for regulatory compliance and business agility
Russell Smith
Starts At
1043.0
1199.0
13% OFF
Global Initiatives to Secure Cyberspace: An Emerging Landscape 1st Edition.2nd Printing. 2008th Edition
Starts At
13101.0
13647.0
4% OFF
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 1st Edition
Starts At
22927.0
23883.0
4% OFF
Engineering Secure Software and Systems: Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011, Proceedings
Starts At
14476.0
15908.0
9% OFF
Rational, Robust, and Secure Negotiations in Multi-Agent Systems (Studies in Computational Intelligence)
Takayuki Ito
Starts At
13101.0
13647.0
4% OFF
Secure Communications: Applications and Management
Roger J. Sutton
Starts At
14231.0
16548.0
14% OFF
Creating the Secure Managed Desktop: Using Group Policy, SoftGrid, Microsoft Deployment Toolkit, and Other Management Tools
Jeremy Moskowitz
Starts At
3667.0
4264.0
14% OFF
The CSSLP Prep Guide: Mastering the Certified Secure Software Lifecycle Professional [With CDROM]
Ronald L. Krutz
Starts At
4768.0
5545.0
14% OFF
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Ronald L. Krutz
Starts At
3664.0
4261.0
14% OFF
Host Identity Protocol (HIP): Towards the Secure Mobile Internet
Andrei Gurtov
Starts At
8843.0
10918.0
19% OFF
Neural Networks and Artificial Intelligence for Biomedical Engineering
Donna L. Hudson
Starts At
15918.0
18510.0
14% OFF
Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition
Douglas R. Hofstadter
Starts At
813.0
1099.0
26% OFF
Designing Concurrent, Distributed, and Real-Time Applications with UML
Hassan Gomaa
Starts At
6079.0
7999.0
24% OFF
Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)
Christopher G. Langton
Starts At
6602.0
7677.0
14% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary