Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #76
    Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (REPOST)



    Jazib Frahim, Omar Santos, David White, "Cisco Network Admission Control, Volume II:
    NAC Deployment and Troubleshooting (Networking Technology)"

    Cisco Press | 2006-11-21 | ISBN: 1587052253 | 624 pages | PDF | 10.7 MB



    When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are fairly well understood and almost all companies utilize tools and technology to protect against those threats. In contrast, the threats from internal trusted employees or partners are often overlooked and much more difficult to protect against.

    Network Admission Control (NAC) is designed to prohibit or restrict access to the secured internal network from devices with a diminished security posture until they are patched or updated to meet the minimum corporate security requirements. A fundamental component of the Cisco® Self-Defending Network Initiative, NAC enables you to enforce host patch policies and to regulate network access permissions for noncompliant, vulnerable systems.

    Cisco Network Admission Control, Volume II, helps you understand how to deploy the NAC Framework solution and ultimately build a self-defending network. The book focuses on the key components that make up the NAC Framework, showing how you can successfully deploy and troubleshoot each component and the overall solution. Emphasis is placed on real-world deployment scenarios, and the book walks you step by step through individual component configurations. Along the way, the authors call out best practices and tell you which mistakes to avoid. Component-level and solution-level troubleshooting techniques are also presented. Three full-deployment scenarios walk you through application of NAC in a small business, medium-sized organization, and large enterprise.

    Details: amazon.com
    Code:
    http://rapidshare.com/files/194240330/b-628b01.zip
    Trần Mỹ Phúc
    tranmyphuc@hotmail.com
    Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

    Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

    Juniper Certs :
    JNCIP-ENT & JNCIP-SEC
    INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

    [version 4.0] Ôn tập CCNA


    Comment


    • #77
      CCSP Cisco Secure VPN Exam Certification Guide



      John Roland, Mark J. Newcomb, "CCSP Cisco Secure VPN Exam Certification Guide"
      Cisco Press | 2003-04-02 | ISBN: 1587200708 | 592 pages | PDF | 16.5 MB



      Official self-study test preparation guide for the Cisco 9E0-121 and 642-511 CSVPN exams

      Coverage of the CSVPN topics enables you to identify and fill your knowledge gaps before the exam date. You'll learn about:

      * Configuring Cisco VPN 3000 concentrators and VPN 3002 Hardware Clients for remote access
      * Enabling secure VPNs using IPSec technologies
      * Peer authentication using preshared keys and digital certificates
      * Using Network Address Translation (NAT) and Port Address Translation (PAT) over VPNs
      * Administering and monitoring VPN concentrators in remote-access and LAN-to-LAN networksUtilizing IPSec protocols and features
      * Configuring VPN Client personal firewall support through the VPN concentrator
      * Integrated unit and interactive user authentication through the Cisco VPN 3002 Hardware Client

      Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Installation and configuration of Cisco VPN 3000 Series concentrators and Cisco VPN 3002 Hardware Clients are critical tasks in today's network environments, especially as reliance on the public Internet as an extension of business networks increases. Whether you are seeking a Cisco VPN Specialist Certification or the full-fledged CCSP Certification, learning what you need to know to pass the CSVPN (Cisco Secure Virtual Private Networks) exam qualifies you to keep your company's network safe while meeting its business needs.

      CCSP Cisco Secure VPN Exam Certification Guide is a comprehensive study tool that enables you to master the concepts and technologies required for success on the CSVPN exam. Each chapter of the CCSP Cisco Secure VPN Exam Certification Guide tests your knowledge of the exam subjects through sections that detail exam topics to master and areas that highlight essential subjects for quick reference and review. Challenging chapter-ending review questions and exercises test your knowledge of the subject matter, reinforce key concepts, and provide you with the opportunity to apply what you've learned in the chapter. In addition, a final chapter of scenarios pulls together concepts from all the chapters to ensure you can apply your knowledge in a real-world environment. The companion CD-ROM testing engine enables you to take practice exams that mimic the real testing environment, focus on particular topic areas, and refer to the electronic text for review.

      Details: amazon.com

      Code:
      http://rapidshare.com/files/194240879/ebook.CCSP_Cisco_Secure_VPN_Exam_Certification_Guide_CSSP_Self-st_Ccsp_Self-Study.1587200708.zip
      Trần Mỹ Phúc
      tranmyphuc@hotmail.com
      Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

      Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

      Juniper Certs :
      JNCIP-ENT & JNCIP-SEC
      INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

      [version 4.0] Ôn tập CCNA


      Comment


      • #78
        CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide - 2nd Edition



        Greg Bastien, Christian Degu, Earl Carter, "CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide - 2nd Edition (CCSP Self-Study)"
        Cisco Press | 2004-10-12 | ISBN: 1587201232 | 816 pages | CHM | 11.5 MB



        It's a tough market these days for network consultants, but the one commodity there's lots of is fear. There's loads of stuff to be scared of. Which means that canny network experts can get some work by offering to protect computer networks from unauthorized access. It's best to earn a certification before you go touting yourself for work, though. Cisco Systems' Cisco Secure PIX Firewall Advanced (CSPFA) rating is a good vendor-specific one, and is sure to help get you in the door for security work at places with lots of Cisco equipment. CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide brings you up to speed on the PIX firewall line, with emphasis on the coverage of the CSPFA exam.

        Details: amazon.com

        Code:
        http://rapidshare.com/files/194241404/ebook.CSSP_Cisco_Secure_PIX_Firewall_Advanced_Exam_Certification_Guide._Mit_CD_CCSP.1587201232.zip
        Trần Mỹ Phúc
        tranmyphuc@hotmail.com
        Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

        Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

        Juniper Certs :
        JNCIP-ENT & JNCIP-SEC
        INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

        [version 4.0] Ôn tập CCNA


        Comment


        • #79
          Cisco Access Control Security: AAA Administration Services (REPOST)



          Brandon James Carroll, "Cisco Access Control Security: AAA Administration Services (Networking Technology)"
          Cisco Press | 2004-06-06 | ISBN: 1587051249 | 456 pages | PDF | 15.6 MB



          Hands-on techniques for enabling authentication, authorization, and accounting

          * Understand the security concepts behind the AAA framework
          * Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols
          * Configure and troubleshoot AAA on Cisco routers
          * Understand where to position and install the CSACS in your network
          * Explore and customize the CSACS interface
          * Configure CSACS user accounts, user groups, and shared profile components
          * Add AAA clients and manage network connections
          * Configure external databases and perform database replication and backup
          * Explore the various reports and logs available in CSACS
          * Learn how AAA models apply to service provider environments
          * Install and configure Cisco Access Registrar

          As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains.

          Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar.

          Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management.

          "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for system administrators looking to design or manage a reliable, scalable, and secure Access Control deployment for any size organization."
          -Jeremy Steiglitz, ACS Group Product Manager, Cisco Systems

          This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

          Details: amazon.com
          Code:
          http://rapidshare.com/files/194104112/ebook.Cisco_Access_Control_Security_AAA_Administration_Services.1587051249.zip
          Trần Mỹ Phúc
          tranmyphuc@hotmail.com
          Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

          Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

          Juniper Certs :
          JNCIP-ENT & JNCIP-SEC
          INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

          [version 4.0] Ôn tập CCNA


          Comment


          • #80
            SonicWALL Secure Wireless Network Integrated Solutions Guide




            Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Susan Weigand, Dave Parry, “SonicWALL Secure Wireless Network Integrated Solutions Guide”
            Syngress | 2008-05-30 | ISBN: 1597491934 | 448 pages | PDF | 36,4 MB

            Whether wireless capabilities are being added to an existing network or a wireless network is being built form the ground up, this guide provides the necessary information to achieve a secure wireless network. This is a comprehensive guide to wireless technologies from the the leading vendor of secure wireless technologies: SonicWALL.

            The SonicWALL Secure Wireless Network Integrated Solutions Guide provides SonicWALL-recommended deployment best practices and solutions based on actual SonicWALL customer deployments. This guide is a comprehensive SonicWALL Secure Wireless Network resource, including an introduction to Wireless LAN (WLAN) technology, WLAN design considerations, SonicWALL secure wireless architecture, deployment scenario-based WLAN solutions, instructions for central management of a WLAN using SonicWALL Global Management System (GMS), and overviews of SonicWALL secure wireless appliances. Whether wireless capabilities are being added to an existing network or a wireless network is being built form the ground up, this guide provides the necessary information to achieve a secure wireless network.

            *SonicWALL is the #3 best-selling firewall appliance in the world and there are no competing books
            *Syngress firewall books are consistent best sellers with market-leading books on ISA Server and Cisco PIX
            *SonicWALL is a recognized worldwide leader in secure wireless networking, making the SonicWALL Secure Wireless Network Integrated Solutions Guide an essential resource for wireless network users and administrators

            Code:
            http://rapidshare.com/files/198513768/SonicWALL_Wireless.rar
            Trần Mỹ Phúc
            tranmyphuc@hotmail.com
            Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

            Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

            Juniper Certs :
            JNCIP-ENT & JNCIP-SEC
            INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

            [version 4.0] Ôn tập CCNA


            Comment


            • #81
              Net Tools 5.0.70



              Net Tools 5.0.70 | 25.36MB



              1) IP Address Scanner
              2) IP Calculator
              3) IP Converter
              4) Port Listener
              5) Port Scanner
              6) Ping
              7) NetStat (2 ways)
              8)Trace Route (2 ways)
              9) TCP/IP Configuration
              10) Online - Offline Checker
              11) Resolve Host & IP
              12) Time Sync
              13) Whois & MX Lookup
              14) Connect0r
              15) Connection Analysator and protector
              16) Net Sender
              17) E-mail seeker
              18) Net Pager
              19) Active and Passive port scanner
              20) Spoofer
              21) Hack Trapper
              22) HTTP flooder (DoS)
              23) Mass Website Visiter
              24) Advanced Port Scanner
              25) Trojan Hunter (Multi IP)
              26) Port Connecter Tool
              27) Advanced Spoofer
              28) Advanced Anonymous E-mailer
              29) Simple Anonymous E-mailer
              30) Anonymous E-mailer with Attachment Support
              31) Mass E-mailer
              32) E-mail Bomber
              33) E-mail Spoofer
              34) Simple Port Scanner (fast)
              35) Advanced Netstat Monitoring
              36) X Pinger
              37) Web Page Scanner
              38) Fast Port Scanner
              39) Deep Port Scanner
              40) Fastest Host Scanner (UDP)
              41) Get Header
              42) Open Port Scanner
              43) Multi Port Scanner
              44) HTTP scanner (Open port 80 subnet scanner)
              45) Multi Ping for Cisco Routers
              46) TCP Packet Sniffer
              47) UDP flooder
              48) Resolve and Ping
              49) Multi IP ping
              50) File Dependency Sniffer
              51) EXE-joiner (bind 2 files)
              52) Encrypter
              53) Advanced Encryption
              54) File Difference Engine
              55) File Comparasion
              56) Mass File Renamer
              57) Add Bytes to EXE
              58) Variable Encryption
              59) Simple File Encryption
              60) ASCII to Binary (and Binary to ASCII)
              61) Enigma
              62) Password Unmasker
              63) Credit Card Number Validate and Generate
              64) Create Local HTTP Server
              65) eXtreme UDP Flooder
              66) Web Server Scanner
              67) Force Reboot
              68) Webpage Info Seeker
              69) Bouncer
              70) Advanced Packet Sniffer
              71) IRC server creater
              72) Connection Tester
              73) Fake Mail Sender
              74) Bandwidth Monitor
              75) Remote Desktop Protocol Scanner
              76) MX Query
              77) Messenger Packet Sniffer
              78) API Spy
              79) DHCP Restart
              80) File Merger
              81) E-mail Extractor (crawler / harvester bot)
              82) Open FTP Scanner
              83) Advanced System Locker
              84) Advanced System Information
              85) CPU Monitor
              86) Windows Startup Manager
              87) Process Checker
              88) IP String Collecter
              89) Mass Auto-Emailer (Database mailer; Spammer)
              90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
              91) Fishing Port Scanner (with named ports)
              92) Mouse Record / Play Automation (Macro Tool)
              93) Internet / LAN Messenger Chat (Server + Client)
              94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
              95) Hash MD5 Checker
              96) Port Connect - Listen tool
              97) Internet MAC Address Scanner (Multiple IP)
              98) Connection Manager / Monitor
              99) Direct Peer Connecter (Send/Receive files + chat)
              100) Force Application Termination (against Viruses and Spyware)
              101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
              102) COM Detect and Test
              103) Create Virtual Drives
              104) URL Encoder
              105) WEP/WPA Key Generator
              106) Sniffer.NET
              107) File Shredder
              108) Local Access Enumerater
              109) Steganographer (Art of hiding secret data in pictures)
              110) Subnet Calculater
              111) Domain to IP (DNS)
              112) Get SNMP Variables
              113) Internet Explorer Password Revealer
              114) Advanced Multi Port Scanner
              115) Port Identification List (+port scanner)
              116) Get Quick Net Info
              117) Get Remote MAC Address
              118) Share Add
              119) Net Wanderer
              120) WhoIs Console
              121) Cookies Analyser
              122) Hide Secret Data In Files
              123) Packet Generator
              124) Secure File Splitting
              125) My File Protection (Password Protect Files, File Injections)
              126) Dynamic Switch Port Mapper
              127) Internet Logger (Log URL)
              128) Get Whois Servers
              129) File Split&Merge
              130) Hide Drive
              131) Extract E-mails from Documents
              132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
              133) Hook Spy
              134) Software Uninstaller
              135) Tweak & Clean XP
              136) Steganographic Random Byte Encryption
              137) NetTools Notepad (encrypt your sensitive data)
              138) File Encrypter/Decrypter
              139) Quick Proxy Server
              140) Connection Redirector (HTTP, IRC, ... All protocols supported)
              141) Local E-mail Extractor
              142) Recursive E-mail Extractor
              143) Outlook Express E-mail Extractor
              144) Telnet Client
              145) Fast Ip Catcher
              146) Monitor Host IP
              147) FreeMAC (MAC Address Editor)
              148) QuickFTP Server (+user accounts support)
              149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
              150) Network Protocol Analyzer
              151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
              152) WebMirror (Website Ripper)
              153) GeoLocate IP
              154) Google PageRank Calculator
              155) Google Link Crawler (Web Result Grabber)
              156) Network Adapter Binder
              157) Remote LAN PC Lister
              158) Fast Sinusoidal Encryption
              159) Software Scanner
              160) Fast FTP Client
              161) Network Traffic Analysis
              162) Network Traffic Visualiser
              163) Internet Protocol Scanner
              164) Net Meter (Bandwidth Traffic Meter)
              165) Net Configuration Switcher
              166) Advanced System Hardware Info
              167) Live System Information
              168) Network Profiler
              169) Network Browser
              170) Quick Website Maker and Web Gallery Creator
              171) Remote PC Shutdown
              172) Serial Port Terminal
              173) Standard Encryptor
              174) Tray Minimizer
              175) Extra Tools (nmap console & win32 version)
              Code:
              http://rapidshare.com/files/190624696/Net_Tools_v5.0.70.rar
              Trần Mỹ Phúc
              tranmyphuc@hotmail.com
              Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

              Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

              Juniper Certs :
              JNCIP-ENT & JNCIP-SEC
              INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

              [version 4.0] Ôn tập CCNA


              Comment


              • #82
                Network Security Architectures (Networking Technology)


                Network Security Architectures (Networking Technology)
                Cisco Press | 2004-04-29 | ISBN 158705115X | CHM | Pages 792 | 4.93 MB

                Expert guidance on designing secure networks

                * Understand security best practices and how to take advantage of the networking gear you already have
                * Review designs for campus, edge, and teleworker networks of varying sizes
                * Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity
                * Understand security design considerations for common applications such as DNS, mail, and web
                * Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches
                * Learn 10 critical steps to designing a security system for your network
                * Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility
                * Try your hand at security design with three included case studies
                * Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint

                Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way.

                Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed designs that deal with today's threats through applying defense-in-depth techniques and work through case studies to find out how to modify the designs to address the unique considerations found in your network.

                Whether you are a network or security engineer, Network Security Architectures will become your primary reference for designing and building a secure network.

                This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
                Code:
                http://rapidshare.com/files/164211187/ebook.Network_Security_Architectures_Networking_Technology.158705115X.zip
                Trần Mỹ Phúc
                tranmyphuc@hotmail.com
                Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                Juniper Certs :
                JNCIP-ENT & JNCIP-SEC
                INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                [version 4.0] Ôn tập CCNA


                Comment


                • #83
                  MPLS VPN Security (Networking Technology) (Repost)



                  MPLS VPN Security (Networking Technology)
                  Cisco Press | June 8, 2005 | ISBN 1587051834 | CHM | Pages 312 | 5.29 MB

                  A practical guide to hardening MPLS networks

                  * Define "zones of trust" for your MPLS VPN environment
                  * Understand fundamental security principles and how MPLS VPNs work
                  * Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms
                  * Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons
                  * Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues
                  * Operate and maintain a secure MPLS core with industry best practices
                  * Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification
                  * Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS)
                  * Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents
                  Code:
                  http://rapidshare.com/files/164216043/ebook.Mpls_VPN_Security.1587051834.zip
                  Trần Mỹ Phúc
                  tranmyphuc@hotmail.com
                  Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                  Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                  Juniper Certs :
                  JNCIP-ENT & JNCIP-SEC
                  INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                  [version 4.0] Ôn tập CCNA


                  Comment


                  • #84
                    Cisco Press: Cisco Router Firewall Security (Repost)



                    Cisco Router Firewall Security
                    Cisco Press | 2004-08-20 | ISBN 1587051753 | CHM | Pages 912 | 5.8 MB

                    Harden perimeter routers with Cisco firewall functionality and features to ensure network security

                    * Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques
                    * Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic
                    * Use router authentication to prevent spoofing and routing attacks
                    * Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms
                    * Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks
                    * Apply stateful filtering of traffic with CBAC, including dynamic port mapping
                    * Use Authentication Proxy (AP) for user authentication
                    * Perform address translation with NAT, PAT, load distribution, and other methods
                    * Implement stateful NAT (SNAT) for redundancy
                    * Use Intrusion Detection System (IDS) to protect against basic types of attacks
                    * Obtain how-to instructions on basic logging and learn to easily interpret results
                    * Apply IPSec to provide secure connectivity for site-to-site and remote access connections
                    * Read about many, many more features of the IOS firewall for mastery of router security

                    The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package.

                    Each chapter in Cisco Router Firewall Security addresses an important component of perimeter router security. Author Richard Deal explains the advantages and disadvantages of all key security features to help you understand when they should be used and includes examples from his personal consulting experience to illustrate critical issues and security pitfalls. A detailed case study is included at the end of the book, which illustrates best practices and specific information on how to implement Cisco router security features.

                    Whether you are looking to learn about firewall security or seeking how-to techniques to enhance security in your Cisco routers, Cisco Router Firewall Security is your complete reference for securing the perimeter of your network.

                    This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
                    Code:
                    http://depositfiles.com/files/vvhj66h3q
                    Trần Mỹ Phúc
                    tranmyphuc@hotmail.com
                    Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                    Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                    Juniper Certs :
                    JNCIP-ENT & JNCIP-SEC
                    INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                    [version 4.0] Ôn tập CCNA


                    Comment


                    • #85
                      Cisco PIX Firewalls: Configure, Manage, & Troubleshoot



                      Cisco PIX Firewalls: Configure, Manage, & Troubleshoot
                      Publisher: Syngress | ISBN: 1597490040 | edition 2005 | PDF | 544 pages | 10,6 mb

                      This completely updated bestseller covers Cisco PIX Security Appliance Software Version 7.0, as well as the entire family of Cisco PIX 500 Series Firewalls. The book clearly explains how to leverage the integrated remote access and site-to-site VPN capabilities found in PIX Firewalls. It also illustrates how to securely extend your network to tele-workers, remote and satellite offices, business partners, suppliers, and customers. The authors thoroughly document all enhancements to PIX 7.0, including virtual LAN (VLAN)-based virtual interfaces, OSPF Dynamic Routing over VPNs, Secure Hypertext Transfer Protocol (HTTPS) Authentication Proxy, Local User Authentication Database for Network and VPN Access, Advanced Encryption Standard (AES), Support for VPN Accelerator Card+ (VAC+), DHCP Server Support on Multiple Interfaces. Special attention is paid to intrusion protection configuration.
                      Code:
                      http://depositfiles.com/files/fq8k55s7o
                      Trần Mỹ Phúc
                      tranmyphuc@hotmail.com
                      Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                      Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                      Juniper Certs :
                      JNCIP-ENT & JNCIP-SEC
                      INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                      [version 4.0] Ôn tập CCNA


                      Comment


                      • #86
                        The Complete Cisco VPN Configuration Guide



                        Richard Deal, "The Complete Cisco VPN Configuration Guide (Networking Technology)"
                        Cisco Press | 2005-12-25 | ISBN: 1587052040 | 1032 pages | CHM | 14.4 MB



                        Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution

                        * A complete resource for understanding VPN components and VPN design issues
                        * Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients
                        * Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience
                        * Filled with relevant configurations you can use immediately in your own network

                        With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.

                        Part I, “VPNs,” introduces the topic of VPNs and discusses today’s main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, “Concentrators,” provides detail on today’s concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network.

                        This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

                        Details: amazon.com
                        Code:
                        http://rapidshare.com/files/192079482/ebook.The_Complete_Cisco_VPN_Configuration_Guide.1587052040.zip
                        Trần Mỹ Phúc
                        tranmyphuc@hotmail.com
                        Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                        Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                        Juniper Certs :
                        JNCIP-ENT & JNCIP-SEC
                        INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                        [version 4.0] Ôn tập CCNA


                        Comment


                        • #87
                          IT Essentials: PC Hardware and Software Labs and Study Guide



                          Patrick Regan ,"IT Essentials: PC Hardware and Software Labs and Study Guide ,3 Ed"
                          Cisco Press | 2008-01-26 | ISBN: 1587131986 | 456 Pages | PDF | 10,2 MB

                          The only Cisco authorized Lab Companion for the IT Essentials: PC Hardware and Software course from the Cisco Networking Academy Program
                          * New Labs and Study Guide format provides on-line labs from the Academy curriculum as well as challenge labs from the authors
                          * Study guide sections offer learning and practice exercises
                          * Alignment to A+ objectives prepares students for certification exam
                          The IT Essentials: PC Hardware and Software Labs and Study Guide is designed as a valuable teaching and learning tool for the Academy curriculum, incorporating new features to improve students' hands-on skills and reinforce the key topics of the course. The Labs sections feature the complete collection of the lab exercises specifically written for the ITE1 course in the Cisco Networking Academy Program, reviewed by instructors and formatted and edited by Cisco Press. The Study Guide sections are designed to provide additional exercises and activities to reinforce students' understanding of the course topics, preparing them for the course assessments and focusing on preparing for the associated certifications (A+ and EUCIP). Each chapter is customized to the learning needs of the material and includes some or all of the following types of exercises;
                          * Vocabulary Matching and Completion
                          * Skill Building Activities and Scenarios
                          * HelpDesk Scenarios
                          * Concept Questions
                          * Journal Entries
                          * Internet Research
                          The study guide is more than just "busy work" and fill-in-the-blank exercises. It contains thought-provoking concept and focus questions for essential review of course content prior to assessments.
                          Code:
                          http://rapidshare.com/files/192489554/IT_Essentials_PC_Hardware_and_Software_Labs_and_Study_Guide.rar
                          Trần Mỹ Phúc
                          tranmyphuc@hotmail.com
                          Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                          Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                          Juniper Certs :
                          JNCIP-ENT & JNCIP-SEC
                          INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                          [version 4.0] Ôn tập CCNA


                          Comment


                          • #88
                            802.11 Wireless LAN Fundamentals (REPOST)



                            Pejman Roshan, Jonathan Leary, "802.11 Wireless LAN Fundamentals"
                            Cisco Press | 2004-01-02 | ISBN: 1587050773 | 312 pages | PDF | 4.7 MB



                            Master the basics in designing, building, and managing a Cisco Aironet WLAN.

                            * Master the basics of Wireless LANs with this concise design and deployment guide
                            * Understand implementation issues for a variety of environments including vertical, SOHO, and enterprise networks
                            * Learn design and troubleshooting advice from real-world case studies

                            802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations.

                            Wireless LANs connect computer networks via radio transmissions instead of traditional phone lines or cables. Benefits to these systems go well beyond getting rid of all the cables and wires. Campus networks can grow geographically larger while still retaining all their efficiency and speed. Additionally, cost savings can be realized when third-party phone lines are no longer necessary, saving the cost of line rental and equipment upkeep. Finally, flexibility in campus network design increases significantly for the networking professional, while the network accessibility and usefulness increases for the individual users.

                            802.11 Wireless LAN Fundamentals helps networking professionals realize these benefits by helping them understand how to design, build, and maintain these networks, as well as how to justify their value within organizations.
                            Code:
                            http://www.megaupload.com/?d=TRC41F9M
                            Trần Mỹ Phúc
                            tranmyphuc@hotmail.com
                            Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                            Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                            Juniper Certs :
                            JNCIP-ENT & JNCIP-SEC
                            INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                            [version 4.0] Ôn tập CCNA


                            Comment


                            • #89
                              Deploying Voice over Wireless LANs



                              Jim Geier, "Deploying Voice over Wireless LANs"
                              Cisco Press | 2007-03-24 | ISBN:1587052318 | CHM | 264 pages | 2,1 Mb

                              Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly wired telephone and video surveillance systems and dramatically reducing support costs. However, today’s new voice over WLAN (VoWLAN) technologies require fundamentally different skills and techniques from those used in traditional voice and video systems. Now, there’s a complete guide to every facet of VoWLAN deployment: planning, design, installation, security, maintenance, and troubleshooting.

                              Authored by wireless industry expert and leader Jim Geier, Deploying Voice over Wireless LANs draws on Geier’s extensive experience with real-world VoWLAN deployments. Geier brings together state-of-the-art insights into VoWLAN technologies, standards, products, services, implementation strategies, and much more.

                              Geier begins by introducing key components of today’s VoWLAN systems, including phones, client software, and voice encoders/decoders, as well as VoWLAN signaling essentials such as analog-to-digital (A/D) conversion and compression. Using examples drawn from actual enterprise settings, you’ll learn exactly how VoWLAN products integrate with existing IP infrastructure.

                              Next, he introduces crucial emerging 802.11 standards for effective VoWLAN deployment, including 802.11e quality of service (QoS) standards, 802.11r to minimize packet loss between access points, and 802.11k network discovery. He carefully reviews the security implications of VoWLAN voice, systematically covering both risks and countermeasures. Finally, Geier walks through implementation from start to finish, thoroughly covering analysis, design, installation, configuration, testing, and support.

                              Whatever your role in planning, delivering, managing, or creating wireless voice and video solutions, Deploying Voice over Wireless LANs is your most comprehensive, authoritative resource.

                              Jim Geier founded Wireless-Nets, Ltd., and serves as its principal consultant. His 25 years of experience includes the analysis, design, software development, installation, and support of numerous wireless networking systems. He has been active within the Wi-Fi Alliance and the IEEE 802.11 Working Group and helped develop international standards for WLANs. His books include Wireless Networks First Step (Cisco Press), Wireless LANs (Sams), Wireless Networking Handbook (MTP), and Network Reengineering.

                              * Understand VoWLAN components, applications, and benefits
                              * See VoWLAN at work in actual enterprise environments
                              * Master VoWLAN signaling, including voice signal characteristics, A/D conversion, and compression
                              * Discover the latest 802.11 VoWLAN standards, including 802.11e, 802.11r, and 802.11k
                              * Secure IP-based VoWLAN systems against intrusion and compromise
                              * Analyze your organization’s requirements and design an optimal VoWLAN solution
                              * Plan for capacity, roaming, and integration with cellular systems
                              * Install, configure, test, verify, and validate your VoWLAN system
                              * Plan for operational support and implement appropriate administration tools and methods
                              * Includes a complete VoWLAN glossary

                              Code:
                              http://rapidshare.com/files/190824832/1587052318.rar
                              Trần Mỹ Phúc
                              tranmyphuc@hotmail.com
                              Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                              Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                              Juniper Certs :
                              JNCIP-ENT & JNCIP-SEC
                              INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                              [version 4.0] Ôn tập CCNA


                              Comment


                              • #90
                                IT Essentials: PC Hardware and Software Companion Guide,3 Ed



                                David Anfinson, Kenneth Quamme, "IT Essentials: PC Hardware and Software Companion Guide,3 Ed"
                                Cisco Press | 2008-01-28 | ISBN: 1587131994 | 672 pages | PDF | 25 MB

                                The only Cisco authorized textbook that for the IT Essentials: PC Hardware and Software course from the Cisco Networking Academy Program
                                New Companion Guide format complements the online curriculum with insight and instruction from Academy instructors
                                A portable reference that supports all the topics in the new course, aligning 1:1 with course modules
                                Features improved readability, enhanced topic explanations, real-world examples, and all new graphical presentations
                                Alignment to A+ objectives
                                The IT Essentials: PC Hardware and Software Companion Guide supplements and complements the IT Essentials I: PC Hardware and Software v4.0 online curriculum offered by the Cisco Networking Academy Program.
                                The Companion Guide is designed as a supplemental textbook for the Networking Academy course, offering students a portable desk reference of the course content to use anytime anywhere as a study aid. The chapter content aligns 1:1 to the online course module topics, but does not merely mimic the content word-for-word. The authors present the course material in the Companion Guide in a comprehensive manner, providing their own examples where necessary to augment a student's understanding of the course material.
                                Chapter Objectives as stated as questions at beginning of each chapter
                                Key terms listed in the Chapter openers
                                Enhanced readability for younger student comprehension
                                How To Feature provides step-by-step tasks for common activities
                                Key concept recaps, Check Your Understanding Questions, and next chapter previews are in a concise summary at the end of each chapter
                                The Companion Guide serves as an additional instructional tool for the instructor to assign take-home reading or give vocabulary quizzes to better prepare the students for in-class lab assignments.
                                Code:
                                http://rapidshare.com/files/193642457/ITEssen.rar
                                Trần Mỹ Phúc
                                tranmyphuc@hotmail.com
                                Hãy add nick để có thông tin đề thi mới nhất :tranmyphuc (Hỗ trợ tối đa cho các bạn tự học)

                                Cisco Certs : CCNP (Passed TSHOOT 1000/1000)

                                Juniper Certs :
                                JNCIP-ENT & JNCIP-SEC
                                INSTRUCTORS (No Fee) : CISCO (Professional) , JUNIPER (Professional) , Microsoft ...

                                [version 4.0] Ôn tập CCNA


                                Comment

                                Working...
                                X