larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization

eBook (Watermarked)

  • This product currently is not for sale.
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Not for Sale
  • Description
  • Sample Content
  • Updates
  • Copyright 2019
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 600
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-480762-6
  • ISBN-13: 978-0-13-480762-1

Integrated Security Technologies and Solutions - Volume II is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction in security design, deployment, integration and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. A one-stop expert level guide for all aspects of Cisco Security, this guide will help security pros succeed in their day-to-day jobs as they get ready for their CCIE Security written and lab exams.

This guide has been written by a team of CCIEs who are world-class experts in their respective Cisco Security disciplines, including experts who were involved in creating the new CCIE Security 5.0 blueprint and possess unsurpassed understanding of its requirements. Each chapter starts with relevant theory, progresses through configuration examples and applications, and concludes with practical troubleshooting sections.

Volume 1 focuses on Identity, Context Sharing, Encryption, Secure Connectivity and Virtualization Security. With a strong focus on inter-product integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution.

Table of Contents

Part I: Knock, Knock! Who's There?
1. Who and What - AAA Basics
2. Network Access
3. Extending Network Access
4. pxGrid with the Identity Services Engine
5. Device Administration

Part II:
6. Secure Connectivity

Part III: The Red Pill
7. Virtualization and Automation

Unlimited one-month access with your purchase
Free Safari Membership