More New and Used
from Private Sellers
Only one copy
in stock at this price.
In Stock Usually Ships in 24 Hours.
Currently Available, Usually Ships in 24-48 Hours
Questions About This Book?
Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 1st edition with a publication date of 12/6/2007.
What is included with this book?
- The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
- The Used copy of this book is not guaranteed to inclue any supplemental materials. Typically, only the book itself is included.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters. Written to map to the Security Certified Network Specialist certification (SCO-451), this book includes coverage of network security threats and goals, advanced TCP/IP concepts, router security, intrusion detection, firewall design and configuration, IPSec and virtual private network (VPN) design, and wireless network design and security.
Table of Contents
|Network Defense Fundamentals|
|Advanced TCP/IP Router Fundamentals|
|Fundamentals of Cisco|
|Router Security Designing Firewalls|
|Managing Firewalls to Improve Security|
|Implementing IPSec and Virtual|
|Private Networks Designing Virtual|
|Private Networks Designing Intrusion|
|Detection Systems Configuring and Using Intrusion|
|Detection Systems Wireless|
|Securing Wireless Networks|
|Table of Contents provided by Publisher. All Rights Reserved.|