|Listed in category:
EXTRA 15% OFF 3+ ITEMSSee all eligible items and terms
Have one to sell?

Securing Your Business with Cisco ASA and PIX Firewalls by Abelar, Greg

by Abelar, Greg | PB | Good
US $6.75
Condition:
Good
Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ... Read moreabout condition
Shipping:
Free Economy Shipping.
Estimated between Sat, Sep 28 and Tue, Oct 1 to 43230
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Located in: Aurora, Illinois, United States
Returns:
30 days returns. Seller pays for return shipping.
Payments:
      
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard

Shop with confidence

Top Rated Plus
Top rated seller, fast shipping, and free returns. Learn more- Top Rated Plus - opens in a new window or tab
eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:195462877025
Last updated on Aug 22, 2024 15:32:55 PDTView all revisionsView all revisions

Item specifics

Condition
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages. See the seller’s listing for full details and description of any imperfections. See all condition definitionsopens in a new window or tab
Seller Notes
“Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ...
Binding
Paperback
Weight
1 lbs
Product Group
Book
IsTextBook
No
ISBN
9781587052149
Subject Area
Computers
Publication Name
Securing Your Business with Cisco Asa and Pix Firewalls
Publisher
Cisco Press
Item Length
9.1 in
Subject
Networking / Vendor Specific, Security / General
Publication Year
2005
Series
Networking Technology Ser.
Type
Textbook
Format
Perfect
Language
English
Item Height
0.8 in
Author
Greg Abelar
Item Weight
17.1 Oz
Item Width
7.5 in
Number of Pages
288 Pages

About this product

Product Identifiers

Publisher
Cisco Press
ISBN-10
1587052148
ISBN-13
9781587052149
eBay Product ID (ePID)
45378565

Product Key Features

Number of Pages
288 Pages
Language
English
Publication Name
Securing Your Business with Cisco Asa and Pix Firewalls
Subject
Networking / Vendor Specific, Security / General
Publication Year
2005
Type
Textbook
Author
Greg Abelar
Subject Area
Computers
Series
Networking Technology Ser.
Format
Perfect

Dimensions

Item Height
0.8 in
Item Weight
17.1 Oz
Item Length
9.1 in
Item Width
7.5 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2004-111842
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Table of Contents Foreword Introduction Part I Network Security and the ASA/PIX Security Appliance Chapter 1 Internet Security 101 Network Attacks: A Serious Problem Rising Security Incidents Hacking Tools Assessing Your Vulnerability to Network Attacks Attack Impact Tangible Costs Intangible Costs Government Network Security Regulations Attackers Motivation for Attacks Anatomy of a Computer Attack Choosing Victims Protecting Yourself and Your Business Developing a Security Policy Summary Chapter 2 Principles of Network Defense Understanding Defense in Depth Stopping a Computer Attack Defense-in-Depth Implementation Details Authentication, Authorization, and Accounting Perimeter Security Network Intrusion Prevention Host Intrusion Prevention Additional Security Best Practices Remote-Access Defense Security Management of the ASA/PIX Security Appliance Summary Chapter 3 Getting Started with the ASA/PIX Security Appliance Cisco ASA/PIX Security Appliance Overview Denial-of-Service Protection Traffic Filtering Interface Isolation (DMZ Deployment) Stateful Traffic Inspection Application Inspection User Authentication Intrusion Prevention Secure Management Event Logging Models PIX 515E PIX 525 PIX 535 Cisco ASA 5510 Security Appliance Cisco ASA 5520 Security Appliance Cisco ASA 5540 Security Appliance Installing the ASA/PIX Security Appliance Understanding the ASA/PIX Hardware Ports Installing Power Booting the ASA/PIX Security Appliance Troubleshooting Installing the ASA/PIX Software Manual ASA/PIX Version 7 Installation ASA/PIX Licenses Installing the PIX License Key Summary Chapter 4 Exploring the Adaptive Security Device Manager Exploring the GUI Exploring the Pull-Down Menus Exploring the Navigation Bar Summary Part II Securing Network Infrastructures with ASDM Chapter 5 Deploying Secure Internet Connectivity Introducing the ASDM Startup Wizard Basic Network Topology Understanding the Elements of Your Network Using the ASDM Startup Wizard Connecting to the ASA/PIX Security Appliance with ASDM Using the ASDM Startup Wizard to Configure the ASA/PIXSecurity Appliance Summary Chapter 6 Deploying Web and Mail Services Review of Your Current Network Topology Designing the Network Topology to Include Web and Mail Services Logical Placement of the Servers Defining Inside and Outside Server Addresses Defining Services New Topology Use the ASDM Startup Wizard to Deploy Web and Mail Services Connect the New Servers to the ASA/PIX Security Appliance Configure Your ASA/PIX Security Using ASDM Summary Chapter 7 Deploying Authentication Defining Authentication The Purpose of Authentication Implementing Authentication Securing Access to the Security Appliance Monitoring Security Appliance Access AAA Authentication Access Authentication for Inbound and Outbound Services Outbound URL Filtering for Public Services VPN Authentication Summary Chapter 8 Deploying Perimeter Protection Perimeter Protocol Enforcement Customizing Protocol Inspections Perimeter Traffic Filtering Perimeter Denial-of-Service Protection Mitigating Network Bandwidth DoS Attacks
Synopsis
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent  Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security.   Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network.   Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network.   "Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today''s open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place." --Martin E. Hellman, professor emeritus of Electrical Engineering, Stanford University and co-inventor of public key cryptography   This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. , Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a black-box-voodoo technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. "Securing Your Business with Cisco ASA and PIX Firewalls "is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco(r) ASA and PIX(r) version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. " Securing Your Business with Cisco ASA and PIX Firewalls "provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network. "Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today s open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place." Martin E. Hellman, professor emeritus of Electrical Engineering, Stanford University and co-inventor of public key cryptography This security book is part of the Cisco Press(r) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.", Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. "Securing Your Business with Cisco ASA and PIX Firewalls "is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploya defense-in-depth solution featuring the newly released Cisco(R) ASA and PIX(R) version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network." Securing Your Business with Cisco ASA and PIX Firewalls "provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network. "Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today's open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place." --Martin E. Hellman, professor emeritus of Electrical Engineering, Stanford University and co-inventor of public key cryptography This security book is part of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionalssecure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks., Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco ASA and PIX version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cisco ASA and PIX Firewalls provides you with complete step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure that your security posture is strong enough to stand up against any network or host attack whether sourced from the Internet or from inside your own network. "Firewalls are a critical part of any integrated network security strategy, and books such as this will help raise awareness of both the threats inherent in today's open, heterogeneous internetworking environments and the solutions that can be applied to make the Internet a safer place." Martin E. Hellman, professor emeritus of Electrical Engineering, Stanford University and co-inventor of public key cryptography This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
LC Classification Number
TK5105.59

Item description from the seller

ThriftBooks

ThriftBooks

99% positive feedback
18.3M items sold
Joined Mar 2015
Usually responds within 24 hours
ThriftBooks is a fully independent seller of used books, having sold more than 160 million used and new books since we started in 2003. Each quality used book is sorted, graded, shelved and shipped by ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
4.9

Seller feedback (5,354,413)

  • u***0 (272)- Feedback left by buyer.
    Past month
    Verified purchase
    Outstanding seller. Fair prices that are more than reasonable.. The product is in better condition than described, a true value for my money. Packaged and shipped well shows seller has concern for the products sold to arrive in excellent condition. The seller communicated timely with progress. Highly recommend this seller & will do business again. Thank you!
  • o***o (835)- Feedback left by buyer.
    Past month
    Verified purchase
    Outstanding seller. Fair prices that are more than reasonable.. The product is in better condition than described, a true value for my money. Packaged and shipped well shows seller has concern for the products sold to arrive in excellent condition. The seller communicated timely with progress. Highly recommend this seller & will do business again. Thank you!
  • w***o (1140)- Feedback left by buyer.
    Past month
    Verified purchase
    thrift.books is an awesome place to purchase books! excellent communication! often the books arrive in better condition than described. ships very fast & the books arrive quickly! carefully packaged! +AAAAAAAAAA ebay sellers. i highly recommend thrift.books for people wanting to purchase books! reasonable prices and free shipping!

Product ratings and reviews

No ratings or reviews yet
Be the first to write the review.