- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Hardening Cisco Routersby Thomas Akin
Synopses & Reviews
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:
Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.
Network administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This text focuses on ways to secure Cisco routers, it is a reference for protecting the protectors.
This small, handy reference helps system administrators make sure their Cisco routers are secure. Includes Cisco Router Security checklists for quick reference and added value topics that incorporate the most current thinking about security.
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quic
About the Author
Akin is a Certified Information Systems Security Professional with a decade of experience in information security. He is the founding director of the Southeast Cybercrime Institute at Kennesaw State University.
Table of Contents
PrefaceChapter 1: Router SecurityChapter 2: IOS Version SecurityChapter 3: Basic Access ControlChapter 4: Passwords and Privilege LevelsChapter 5: AAA Access ControlChapter 6: Warning BannersChapter 7: Unnecessary Protocols and ServicesChapter 8: SNMP SecurityChapter 9: Secure Routing and AntispoofingChapter 10: NTPChapter 11: LoggingAppendix A: Checklist Quick ReferenceAppendix B: Physical SecurityAppendix C: Incident ResponseAppendix D: Configuration ExamplesAppendix E: ResourcesColophon
What Our Readers Are Saying
Other books you might like
Computers and Internet » Networking » Cisco