Managing energy usage via a company network allows you to create an energy management program that can be scaled company-wide, and this unique book shows you just how to do it. Through…
Tag: Security
Train Signal – Cisco CCNA Security 640-553:IINS raining
You cannot be a Cisco Network Administrator without knowing Cisco Security. Today, security knowledge is no longer a luxury, it is a necessity in nearly any IT position. Any job applicant, from…
Syngress – Managing and Securing a Cisco SWAN
This book is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features,…
CiscoPress – Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner’s guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and…
CiscoPress – Hacking Exposed Cisco Networks Cisco Security Secrets & Solutions
Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers…
Cisco Press – Cisco Wireless LAN Security
Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the…
Cisco Press – Cisco NAC Appliance-Enforcing Host Security with Clean Access
Cisco® Network Admission Control (NAC) Appliance, formerly known as Cisco Clean Access, provides a powerful host security policy inspection, enforcement, and remediation solution that is designed to meet these new challenges. Cisco…
CiscoPress – Cisco Security appliance Command Line Configuration Guide
The purpose of this guide is to help you configure the security appliance using the command-line interface. This guide does not cover every feature, but describes only the most common configuration scenarios….
CiscoPress – End-to-End Network Security: Defense-in-Depth
Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due…