You'll get a bound printed text.
Table of contents
Who Should Read This Book.
Why We Created This Book’s Second Edition.
Overview of the Book’s Contents.
I. THE ESSENTIALS OF NETWORK PERIMETER SECURITY.
1. Perimeter Security Fundamentals.
Terms of the Trade.
Intrusion Detection Systems.
Intrusion Prevention Systems.
Virtual Private Networks.
De-Militarized Zones and Screened Subnets.
Defense in Depth.
Components of Defense in Depth.
Case Study: Defense in Depth in Action.
2. Packet Filtering.
TCP/IP Primer: How Packet Filtering Works.
TCP and UDP Ports.
TCP’s Three-way Handshake.
The Cisco Router as a Packet Filter.
An Alternative Packet Filter: IPChains.
The Cisco ACL.
Cisco IOS Basics.
Effective Uses of Packet-Filtering Devices.
Filtering Based on Source Address: The Cisco Standard ACL.
Tracking Rejected Traffic.
Filtering by Port and Destination Address: The C
All the material you need to teach your courses.Discover teaching material