FileMood

Download [xebooks] Cisco Network Security First-Step 2nd Edition

Xebooks Cisco Network Security First Step 2nd Edition

Name

[xebooks] Cisco Network Security First-Step 2nd Edition

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

29.6 MB

Total Files

131

Hash

F0085F2018682502BB08B80AA58929DB4B327B07

/01 - There Be Hackers Here/

020 - The Process of an Attack.pdf

962.8 KB

021 - Where are Attacks Coming From.pdf

335.4 KB

024 - Network Security Organizations.pdf

173.0 KB

023 - Overview of Common Attacks and Exploits.pdf

166.5 KB

022 - Common Vulnerabilities, Threats, Risks.pdf

166.4 KB

018 - Targets of Opportunity.pdf

163.0 KB

019 - Targets of Choice.pdf

132.7 KB

016 - Essentials First Looking for a Target.pdf

124.8 KB

015 - There be Hackers Here.pdf

110.4 KB

017 - Hacking Motivations.pdf

109.5 KB

026 - Chapter Review.pdf

84.2 KB

025 - Chapter Summary.pdf

74.6 KB

/02 - Security Policies/

027 - Security Policies.pdf

536.8 KB

029 - Corporate Policies and Trust.pdf

295.3 KB

033 - Wireless Communication Policy.pdf

206.1 KB

030 - Acceptable Use Policy.pdf

203.9 KB

031 - Password Policy.pdf

179.7 KB

028 - Responsibilities and Expectations.pdf

179.3 KB

034 - Extranet Connection Policy.pdf

164.5 KB

032 - Virtual Private Network (VPN) Security Policy.pdf

156.6 KB

036 - Industry Standards.pdf

152.4 KB

035 - ISO Certification Policy.pdf

137.6 KB

038 - Chapter Review.pdf

101.1 KB

037 - Chapter Summary.pdf

76.5 KB

/03 - Processes and Procedures/

040 - Security Advisories and Alerts Getting the Intel You Need to Stay Safe.pdf

328.6 KB

041 - Industry Best Practices.pdf

186.9 KB

039 - Processes and Procedures.pdf

108.7 KB

042 - Summary.pdf

88.7 KB

043 - Chapter Review and Questions.pdf

83.4 KB

/04 - Network Security Standards and Guidelines/

049 - Microsoft Security.pdf

336.4 KB

047 - Cisco Best Practice Overview and Guidelines.pdf

287.1 KB

046 - Cisco Validated Design Program.pdf

154.8 KB

048 - NSA Security Configuration Guides.pdf

145.2 KB

044 - Network Security Standards and Guidelines.pdf

112.5 KB

051 - Chapter Link Toolbox Summary.pdf

105.0 KB

045 - Cisco SAFE2.0.pdf

98.6 KB

050 - Chapter Summary.pdf

73.4 KB

/05 - Overview of Security Technologies/

062 - Two-Factor Authentication - Multifactor Authentication.pdf

1.8 MB

053 - Security First Design Concepts.pdf

1.1 MB

060 - Reputation Based Security.pdf

276.1 KB

054 - Packet Filtering via ACLs.pdf

268.9 KB

056 - Network Adress Translation (NAT).pdf

226.2 KB

055 - Stateful Packet Inspection.pdf

215.2 KB

061 - AAA Technologies.pdf

214.2 KB

057 - Proxies and Application-Level Protection.pdf

209.3 KB

058 - Content Filters.pdf

172.6 KB

059 - Public Key Infrastructure.pdf

153.0 KB

052 - Overview of Security Technologies.pdf

109.0 KB

064 - Chapter Review Questions.pdf

79.5 KB

063 - Chapter Summary.pdf

74.4 KB

/06 - Security Protocols/

073 - SNMP v3.pdf

716.7 KB

072 - Secure Shell (SSH).pdf

674.1 KB

071 - Layer 2 Tunneling Protocol (L2TP).pdf

312.7 KB

070 - Point-to-Point Tunneling Protocol (PPTP).pdf

161.4 KB

068 - Message Digest 5 Algorithm.pdf

150.2 KB

066 - Triple DES Encryption.pdf

145.8 KB

065 - Security Protocols.pdf

136.2 KB

069 - Secure Hash Algorithm (SHA Hash).pdf

136.1 KB

067 - Advanced Encryption Standard (AES).pdf

106.4 KB

075 - Chapter Review Questions.pdf

78.1 KB

074 - Chapter Summary.pdf

72.7 KB

/07 - Firewalls/

080 - Firewall Operational Overview.pdf

275.9 KB

082 - Case Studies.pdf

238.6 KB

077 - Firewall Frequently Asked Questions.pdf

219.0 KB

078 - Firewalls are the Security Policy.pdf

176.9 KB

081 - Essentials First Life in the DMZ.pdf

146.0 KB

076 - Firewalls.pdf

131.6 KB

079 - We Do Not Have a Security Policy.pdf

92.7 KB

083 - Firewall Limitations.pdf

84.5 KB

084 - Chapter Summary.pdf

81.2 KB

085 - Chapter Review Questions.pdf

75.4 KB

/08 - Router Security/

090 - Secure IOS Templates.pdf

365.6 KB

087 - Edge Router as a Choke Point.pdf

332.6 KB

091 - Routing Protocol Security.pdf

215.1 KB

086 - Router Security.pdf

210.8 KB

088 - Routers Running Zone Based Firewall.pdf

204.2 KB

089 - Intrusion Detection With Cisco IOS.pdf

203.5 KB

092 - Chapter Summary.pdf

111.3 KB

093 - Chapter Review Questions.pdf

77.8 KB

/09 - IPsec Virtual Private Networks (VPN)/

097 - Overview of IPsec VPNs.pdf

632.1 KB

096 - VPN Overview.pdf

306.8 KB

103 - Remote-Access VPN Security Considerations.pdf

269.1 KB

098 - Router Configuration as VPN Peer.pdf

239.3 KB

099 - Firewall VPN Configuration for Client Access.pdf

214.1 KB

100 - SSL VPN Overview.pdf

194.7 KB

101 - Comparing SSL and IPsec VPNs.pdf

191.0 KB

095 - VPNs Securely Connect is LANds.pdf

151.6 KB

094 - IPsec Virtual Private Networks (VPN).pdf

144.7 KB

102 - Which to Deploy Choosing Between IPsec and SSL VPNs.pdf

142.8 KB

105 - Chapter Review Questions.pdf

78.5 KB

104 - Chapter Summary.pdf

73.2 KB

/10 - Wireless Security/

110 - Wireless Threats.pdf

849.2 KB

107 - Essentials First Wireless LANs.pdf

572.8 KB

113 - Essentials First Wireless Hacking Tools.pdf

280.9 KB

109 - WarGames Wirelessly.pdf

247.3 KB

108 - Wireless Networking.pdf

199.5 KB

111 - Extensible Authentication Protocol (EAP).pdf

144.3 KB

106 - Wireless Security.pdf

134.2 KB

112 - Essential Wireless Security.pdf

130.6 KB

114 - Chapter Summary.pdf

94.5 KB

115 - Chapter Review Questions.pdf

75.7 KB

/11 - Intrusion Detection and Honeypots/

118 - How are Intrusions Detected.pdf

1.0 MB

117 - Essentials First Intrusion Detection.pdf

476.7 KB

119 - Essentials First Honeypots.pdf

166.9 KB

116 - Intrusion Detection and Honeypots.pdf

143.5 KB

121 - Chapter Review Questions.pdf

75.5 KB

120 - Chapter Summary.pdf

68.5 KB

/12 - Tools of the Trade/

125 - Security Scanners.pdf

948.7 KB

123 - Essentials First Vulnerability Analysis.pdf

316.4 KB

124 - Security Assessments and Penetration Testing.pdf

191.4 KB

126 - COREIMPACT Pro.pdf

171.9 KB

122 - Tools of the Trade.pdf

146.3 KB

128 - Chapter Review Questions.pdf

73.8 KB

127 - Chapter Summary.pdf

71.6 KB

/

130 - Index.pdf

575.5 KB

000 - Front Page.pdf

275.5 KB

008 - Contents.pdf

255.7 KB

129 - Appendix A - Answers to Review Questions.pdf

227.3 KB

002 - Authors.pdf

117.1 KB

014 - How This Book is Organized.pdf

116.0 KB

003 - About the Authors.pdf

112.9 KB

009 - Icons.pdf

110.2 KB

006 - Acknowledgements.pdf

85.3 KB

005 - Dedications.pdf

84.5 KB

004 - About the Technical Reviewers.pdf

84.4 KB

007 - Contents at a Glance.pdf

77.0 KB

013 - Who Should Read This Book.pdf

76.9 KB

010 - Command Syntax Conventions.pdf

74.2 KB

011 - Introduction.pdf

74.0 KB

001 - Authors.pdf

71.7 KB

012 - Goals and Methods.pdf

71.2 KB

 

Total files 131


Copyright © 2025 FileMood.com