|Listed in category:
Have one to sell?

Cisco Asa, Pix, and Fwsm Firewall Handbook by Hucaby, Dave

by Hucaby, Dave | PB | Good
US $7.52
Condition:
Good
Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ... Read moreabout condition
Shipping:
Free Economy Shipping.
Estimated between Sat, Sep 28 and Tue, Oct 1 to 43230
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Located in: Aurora, Illinois, United States
Returns:
30 days returns. Seller pays for return shipping.
Payments:
      
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard

Shop with confidence

Top Rated Plus
Top rated seller, fast shipping, and free returns. Learn more- Top Rated Plus - opens in a new window or tab
eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:374312843880
Last updated on Sep 24, 2024 09:10:46 PDTView all revisionsView all revisions

Item specifics

Condition
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages. See the seller’s listing for full details and description of any imperfections. See all condition definitionsopens in a new window or tab
Seller Notes
“Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ...
Binding
Paperback
Weight
3 lbs
Product Group
Book
IsTextBook
Yes
ISBN
9781587054570
Subject Area
Computers
Publication Name
Cisco Asa, Pix, and Fwsm Firewall
Publisher
Cisco Press
Item Length
9.1 in
Subject
Networking / Vendor Specific, Security / General, Security / Networking
Publication Year
2007
Type
Textbook
Format
Perfect
Language
English
Item Height
1.8 in
Author
David Hucaby
Item Weight
52.6 Oz
Item Width
7.4 in
Number of Pages
912 Pages

About this product

Product Identifiers

Publisher
Cisco Press
ISBN-10
1587054574
ISBN-13
9781587054570
eBay Product ID (ePID)
60721990

Product Key Features

Number of Pages
912 Pages
Publication Name
Cisco Asa, Pix, and Fwsm Firewall
Language
English
Subject
Networking / Vendor Specific, Security / General, Security / Networking
Publication Year
2007
Type
Textbook
Subject Area
Computers
Author
David Hucaby
Format
Perfect

Dimensions

Item Height
1.8 in
Item Weight
52.6 Oz
Item Length
9.1 in
Item Width
7.4 in

Additional Product Features

Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
2007-026067
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword Introduction Chapter 1 Firewall Chapter 2 Configuration Fundamentals Chapter 3 Building Connectivity Chapter 4 Firewall Management Chapter 5 Managing Firewall Users Chapter 6 Controlling Access Through the Firewall Chapter 7 Inspecting Traffic Chapter 8 Increasing Firewall Availability with Failover Chapter 9 Firewall Load Balancing Chapter 10 Firewall Chapter 11 Verifying Firewall Operation Chapter 12 ASA Modules Appendix A Well-Known Protocol and Port Numbers Appendix B Security Appliance Logging Messages
Synopsis
Cisco ASA, PIX, and FWSM Firewall Handbook , Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. "Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco." Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with the Modular Policy Framework Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls, "Cisco ASA, PIX, and FWSM Firewall Handbook," Second Edition, is a guide for the most commonly implemented features of the popular Cisco(r) firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX(r), and the Catalyst(r) Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco. Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE(r) No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software. Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with the Modular Policy Framework Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module This security book is part of the Cisco Press(r) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls ", Cisco ASA, PIX, and FWSM Firewall Handbook , Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM).   Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation.   Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components.   Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources.   "Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco." --Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco   David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.   Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with the Modular Policy Framework Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module   This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.   Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls  
LC Classification Number
TK5105.59.H83 2007

Item description from the seller

ThriftBooks

ThriftBooks

99% positive feedback
18.3M items sold
Joined Mar 2015
Usually responds within 24 hours
ThriftBooks is a fully independent seller of used books, having sold more than 160 million used and new books since we started in 2003. Each quality used book is sorted, graded, shelved and shipped by ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
4.9

Seller feedback (5,354,652)

  • u***0 (272)- Feedback left by buyer.
    Past month
    Verified purchase
    Outstanding seller. Fair prices that are more than reasonable.. The product is in better condition than described, a true value for my money. Packaged and shipped well shows seller has concern for the products sold to arrive in excellent condition. The seller communicated timely with progress. Highly recommend this seller & will do business again. Thank you!
  • o***o (835)- Feedback left by buyer.
    Past month
    Verified purchase
    Outstanding seller. Fair prices that are more than reasonable.. The product is in better condition than described, a true value for my money. Packaged and shipped well shows seller has concern for the products sold to arrive in excellent condition. The seller communicated timely with progress. Highly recommend this seller & will do business again. Thank you!
  • w***o (1140)- Feedback left by buyer.
    Past month
    Verified purchase
    thrift.books is an awesome place to purchase books! excellent communication! often the books arrive in better condition than described. ships very fast & the books arrive quickly! carefully packaged! +AAAAAAAAAA ebay sellers. i highly recommend thrift.books for people wanting to purchase books! reasonable prices and free shipping!

Product ratings and reviews

2.0
1 product ratings
  • 0 users rated this 5 out of 5 stars
  • 0 users rated this 4 out of 5 stars
  • 0 users rated this 3 out of 5 stars
  • 1 users rated this 2 out of 5 stars
  • 0 users rated this 1 out of 5 stars

Would recommend

Good value

Compelling content

Most relevant reviews

  • ambigious tcp/ip ACL flow re FWSM

    It's considered a trade secret now, however you'll want to do some PoC testing prior to using ACL's on input and ACL's on output. I'd say more, but it cost me a week+ of re-coding an ACL audit tool. We had great pleasure smashing up the FWSM because it was EOL anyway.

    Condition: Pre-OwnedSold by: betterworldbooks