Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (18)
  • Indianapolis, Ind. : Cisco Press  (10)
  • Boston, MA : Safari  (8)
  • Computer networks ; Security measures  (13)
  • Economics  (5)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    ISBN: 9780133846096 , 0133846091
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Computer networks ; Security measures ; Electronic data processing personnel ; Certification ; Electronic books ; Electronic books ; local
    Abstract: CCIE Collaboration Quick Reference provides you with detailed information, highlighting the key topics on the latest CCIE Collaboration v1.0 exam. This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of important concepts. With this book as your guide, you will review and reinforce your knowledge of and experience with collaboration solutions integration and operation, configuration, and troubleshooting in complex networks. You will also review the challenges of video, mobility, and presence as the foundation for workplace collaboration solutions. Topics covered include Cisco collaboration infrastructure, telephony standards and protocols, Cisco Unified Communications Manager (CUCM), Cisco IOS UC applications and features, Quality of Service and Security in Cisco collaboration solutions, Cisco Unity Connection, Cisco Unified Contact Center Express, and Cisco Unified IM and Presence. This book provides a comprehensive final review for candidates taking the CCIE Collaboration v1.0 exam. It steps through exam objectives one-by-one, providing concise and accurate review for all topics. Using this book, exam candidates will be able to easily and effectively review test objectives without having to wade through numerous books and documents for relevant content for final review.
    Note: Description based on online resource; title from title page (Safari, viewed June 10, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (258 pages)
    Edition: 1st edition
    Keywords: Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local
    Abstract: Environmental finance is about creating the greatest environmental benefit for the largest number of people at the lowest possible cost. That is the first and most important principle listed in Finance Policy for Renewable Energy and a Sustainable Environment . Focusing on what the author considers to be the 23 principles of environmental finance, this text examines the key financial principles necessary to build strategies and adopt policies to deal effectively with environmental challenges. The text encourages making financial decisions based on science, not politics, and considers what it takes to design and execute environmental finance programs in the most cost-effective way possible. Providing a historical overview of how we got to where we are now, and outlining the 23 principles needed to establish a stronger foundation for the future, this text presents the basic financial tools required to understand the concepts presented. It discusses the proper roles of grants, loans and guaranties, the concept and proper use of affordability, understanding leverage, and generating revenue streams for environmental programs. It also examines subsidies, financial risk reduction strategies, and the challenges posed by alternative energy as well as the next generation of environmental programs. As it relates to how environmental projects and improvements are achieved, Finance Policy for Renewable Energy and a Sustainable Environment outlines the greatest benefits at the lowest possible cost to the public. This text is an ideal resource for upper-level undergraduate students in environmental engineering and business courses, as well as practicing environmental engineers.
    Note: Online resource; Title from title page (viewed March 18, 2014) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780415600361
    Language: English
    Pages: 1 online resource (712 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als
    DDC: 330.03
    Keywords: Economics Dictionaries ; Electronic books ; local ; Science économique ; Dictionnaires ; Economics ; Volkswirtschaftslehre ; Wirtschaftswissenschaften ; Englisch ; Dictionaries
    Abstract: The Routledge Dictionary of Economics, now in its third edition, provides the clearest, most authoritative definition of economic and financial terms available. The book is perfect for students and professionals interested in a broad range of disciplines including Business, Economics, Finance, and Accountancy and all additional subjects where a knowledge of these fields of essential. The dictionary has been updated to reflect the economic changes of the new Millennium including the emergence of experimental and behavioural economics, new political economy, the importance of institutions, globalization, environmental economics, financial crises and the economic emergence of China and India. It’s an international dictionary that includes succinctly explained A to Z entries and definitive explanations of the key terms, accompanied by a short bibliography and comprising supplementary online definitions. In a world where the reader is met with a barrage of conflicting and competing information, this book continues to provide a definitive guide to economics.
    Note: Online resource; Title from title page (viewed June 26, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781466562646 , 1466562641
    Language: English
    Pages: 1 online resource (295 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als
    Keywords: Forensic accounting ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Juricomptabilité ; États-Unis ; BUSINESS & ECONOMICS ; Infrastructure ; SOCIAL SCIENCE ; General ; Forensic accounting ; United States
    Abstract: Understanding the financial motivations behind white collar crime is often the key to the apprehension and successful prosecution of these individuals. Now in its second edition, Criminal Financial Investigations: The Use of Forensic Accounting Techniques and Indirect Methods of Proof provides direct instruction on the "how to" aspects of criminal financial investigations, taking readers through the different approaches used in gathering evidence and demonstrating how to present circumstantial evidence to a judge or jury in a simple and convincing manner. Simplifying how the financial pieces fit together, this text: Presents the logic and reasoning involved in constructing a financial criminal investigation Describes the requirements for legal acceptance of forensic accounting investigations Includes relevant examples of the step-by-step processes involved in financial investigations Explores the pitfalls—and how to avoid them—in financial investigating Contains two investigations with step-by-step procedures from initial inquiry to case completion—for use as term or topical assignments or to promote class discussion New Chapters in the Second Edition: What Is a Financial Investigation? Indirect Methods in Tax Investigations Unique Aspects of Criminal Tax Investigations Innovative Applications Written by a former Special Agent with the Criminal Investigation Division of the U.S. Internal Revenue Service, this volume sets out a successful methodology enabling readers to identify, pursue, and successfully prosecute financial white collar crime.
    Note: Online resource; Title from title page (viewed October 5, 2012) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    Language: English
    Pages: 1 online resource (xxi, 632 p.) , ill.
    Keywords: Computer networks ; Security measures ; Computer networks ; Security measures ; Examinations ; Study guides ; Computer technicians ; Certification ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. CCNP Security VPN 642-647 Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Master Cisco CCNP Security VPN 642-647 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions on the CD-ROM CCNP Security VPN 642-647 Official Cert Guide , focuses specifically on the objectives for the CCNP Security VPN exam. Cisco Certified Internetwork Expert (CCIE) Howard Hooper share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The companion CD-ROM contains a powerful Pearson IT Certification Practice Test engine that enables you to focus on individual topic areas or take a complete, timed exam. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Well-regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. The official study guide helps you master all the topics on the CCNP Security VPN exam, including: Configuring policies, inheritance, and attributes AnyConnect Remote Access VPN solution AAA and Dynamic Access Policies (DAP) High availability and performance Clientless VPN solutions SSL VPN with Cisco Secure Desktop Easy VPN solutions IPsec VPN clients and site-to-site VPNs CCNP Security VPN 642-647 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and...
    Note: Description based on resource description page (viewed July 6, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9780429251306 , 0429251300 , 9780511324840 , 0511324847 , 9781439869147 , 1439869146 , 9781466514157 , 1466514159 , 9781439869123
    Language: English
    Pages: 1 online resource (430 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als
    DDC: 363.25/968
    Keywords: Money laundering investigation ; Money laundering Prevention ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Blanchiment de l'argent ; Enquêtes ; États-Unis ; Money laundering investigation ; Money laundering ; Prevention ; United States
    Abstract: Many changes have occurred in the twenty-five years that have passed since the enactment of the Money Laundering Control Act of 1986. The law has been amended, new underlying crimes have been added, and court decisions have modified its scope. The Act remains an important tool in combating criminal activity. Now in its third edition, Money Laundering: A Guide for Criminal Investigators covers the basics of finding ill-gotten gains, linking them to the criminal, and seizing them. Providing a clear understanding of money laundering practices, it explains the investigative and legislative processes that are essential in detecting and circumventing this illegal and dangerous activity. Highlights of the Third Edition include Important court decisions and changes in federal law since the Second Edition New trends in crime and terrorism financing The rise of money laundering in connecting with major frauds, including the Bernie Madoff case Law and policy shifts related to terrorism and financing since the Obama administration New methods for financial intelligence and the filing of Suspicious Activity Reports How changes in technology have enabled launderers to move funds more easily and anonymously Knowledge of the techniques used to investigate these cases and a full understanding of the laws and regulations that serve as the government's weapons in this fight are essential for the criminal investigator. This volume arms those tasked with finding and tracing illegal proceeds with this critical knowledge, enabling them to thwart illegal profiteering by finding the paper trail.
    Note: Online resource; Title from title page (viewed December 19, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    ISBN: 9780132567145 , 0132567148
    Language: English
    Pages: 1 online resource (110 p.) , ill.
    Keywords: Computer networks ; Security measures ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. With this document as your guide, you will review topics on firewall basics, the ASA product family, ASA configuration with both the CLI and ASDM, ASA access control, ASA network integration, AAA configuration, and ASA HA. This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts. TOC Cisco Firewall and ASA Technology Basic Connectivity and Device Management ASA Access Control ASA Network Integration AAA Configuration on the Cisco ASA ASA High Availability About the author: Andrew G. Mason, CCIE No. 7144, CISSP, is a security consultant and co-founder of the UK based RandomStorm Limited. Andrew has 17 years experience in the IT industry, working in Internet security for the past several years. He is involved in the design and implementation of security deployments for numerous clients based upon Cisco technology. He is also a CHECK Team Leader and leads penetration tests for many UK and international clients. About the Technical Editor: Max Leitch, CCIE No. 20178, is a network and security architect/engineer and an independent consultant. He holds CCNP, CCDP, CCSP, and CCIE Security certifications.
    Note: Description based on resource description page (viewed Apr. 7, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (470 pages)
    Edition: 1st edition
    Keywords: Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local
    Abstract: Despite all the controversy and hype that climate change has generated, there now exists an overwhelming body of scientific evidence that the problem is real and that its effects are already being felt on a global scale. Part of what makes this a volatile and controversial issue is that it is not just confined to the realms of the scientific community, nor does it have just one simple, predefined solution—it has multifaceted dimensions involving economic, sociological, political, psychological, and personal issues, making this a topic that affects every person on earth now and in the future. Connecting the dots, Climate Management Issues: Economics, Sociology, and Politics is the first book to propose a truly comprehensive solution to effectively deal with climate change in both the short and long term. It reaches across diverse sectors of society to link issues in climate change management and offer new insights into the complex interrelationships. As the author emphasizes, climate change extends far beyond the physical sciences to affect lifestyles, cultural values, political systems, economics, and health. An overview of the physical science of climate change gives readers a firm understanding of the concepts they need for policy and decision making, sociological applications, and community leadership. The book then focuses on multifaceted aspects such as international cooperation, journalistic balance, human psychology, international policy, national security, socioeconomic impacts, agricultural conservation, healthcare, the economics of mitigation, climate modeling, and error amplification. This timely volume puts on center stage those crucial ideas that are usually overlooked, misunderstood, or lost in media sensationalism. Enlightening and empowering readers, it looks at the decisions that must be made to mitigate climate change problems before irreversible damage is done.
    Note: Online resource; Title from title page (viewed December 14, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    ISBN: 9780132582087 , 0132582082
    Language: English
    Pages: 1 online resource (62 p.) , ill.
    Keywords: Computer networks ; Security measures ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: As a final exam preparation tool, the CCNP Security IPS 642-627 Quick Reference provides a concise review of all objectives on the new CCNP Security IPS exam (642-627). This eBook provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. With this document as your guide, you will review topics on reducing risk to the IT infrastructure and applications using Cisco IPS features and providing detailed operations support for the Cisco IPS. This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts.
    Note: Cover title
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    ISBN: 9780132567176 , 0132567172
    Language: English
    Pages: 1 online resource (128 p.) , ill.
    Keywords: Computer networks ; Security measures ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: As a final exam preparation tool, the CCNP Security SECURE 642637 Quick Reference provides a concise review of all objectives on the new CCNP Security SECURE exam (642-637). This eBook provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. With this document as your guide, you will review topics on layer 2 security, Network Address Translation (NAT), Cisco IOS firewall, Cisco IOS IPS, VPNs, and Cisco network foundation protection. This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts.
    Note: Description based on resource description page (viewed Mar. 14, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    ISBN: 9780132567114 , 0132567113
    Language: English
    Pages: 1 online resource (190 p.) , ill.
    Keywords: Computer networks ; Security measures ; Computer networks ; Security measures ; Examinations ; Study guides ; Computer technicians ; Certification ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: As a final exam preparation tool, the CCNP Security VPN 642-647 Quick Reference provides a concise review of all objectives on the new CCNP Security VPN exam (642-647). This eBook provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. With this document as your guide, you will review topics on deploying Cisco ASA-based VPN solutions. This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts.
    Note: Description based on resource description page (viewed Jun. 7, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9781587141560 , 1587141566 , 9781587141447 , 1587141442
    Language: English
    Pages: 1 online resource (xxiii, 443 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Computers ; Access control ; Identification ; Authentication ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very frequently used by customers to provide secure access to devices and networks AAA solutions are difficult and confusing to implement even though they are almost mandatory Helps IT Pros choose the best identity management protocols and designs for their environments Covers AAA on Cisco routers, switches, access points, and firewalls This is the first complete, authoritative, single-source guide to implementing, configuring, and managing Authentication, Authorization and Accounting (AAA) identity management with CiscoSecure Access Control Server (ACS) 4 and 5. Written by three of Cisco's most experienced CiscoSecure product support experts, it covers all AAA solutions (except NAC) on Cisco routers, switches, access points, firewalls, and concentrators. It also thoroughly addresses both ACS configuration and troubleshooting, including the use of external databases supported by ACS. Each of this book's six sections focuses on specific Cisco devices and their AAA configuration with ACS. Each chapter covers configuration syntax and examples, debug outputs with explanations, and ACS screenshots. Drawing on the authors' experience with several thousand support cases in organizations of all kinds, AAA Identity Management Security presents pitfalls, warnings, and tips throughout. Each major topic concludes with a practical, hands-on lab scenario corresponding to a real-life solution that has been widely implemented by Cisco customers. This book brings together crucial information that was previously scattered across multiple sources. It will be indispensable to every professional running CiscoSecure ACS 4 or 5, as well as all candidates for CCSP and CCIE (Security or R and S) certification.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    ISBN: 0132491516 , 9780132491518
    Language: English
    Pages: 1 online resource (xx, 225 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Computer crimes ; Risk assessment ; Data recovery (Computer science) ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: Learn how to build a Security Incident Response team with guidance from a leading SIRT from Cisco Gain insight into the best practices of one of the foremost incident response teams Master your plan for building a SIRT (Security Incidence Response Team) with detailed guidelines and expert advice for incident handling and response Review legal issues from a variety of national perspectives, and consider practical aspects of coordination with other organizations Network Security Incident Response provides practical guidelines for building an SIRT team as well offering advice on responding to actual incidents. For many companies, incident response is new territory. Some companies do not have an incidence response team at all. Some would like to have one but need guidance to start and others would like to improve existing practices. Today, there are only a handful of organizations that do have mature and experienced teams. For that reason this book is structured to provide help in both creating and running an effective Security Incident Response Team. Organizations who are evaluating whether to invest in a SIRT or who are just getting started building one will find the information in this book to be invaluable in helping them understand the nature of the threats, justifying resources, and building effective IR (Incidence Response) teams. Established IR teams will also benefit from the best practices highlighted in building IR teams as well as information on the current state of incident response handling, incident coordination, and legal issues. Written by a leading SIRT (Security Incident Response Team) from Cisco, the expertise and guidance provided in this book will serve as the blueprint for successful incidence response planning for most any organization.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press
    ISBN: 9781587059407 , 1587059401
    Language: English
    Pages: 1 online resource , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach. Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products. This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company's security posture. Master the five pillars of security auditing: assessment, prevention, detection, reaction, and recovery. Recognize the foundational roles of security policies, procedures, and standards. Understand current laws related to hacking, cracking, fraud, intellectual property, spam, and reporting. Analyze security governance, including the roles of CXOs, security directors, administrators, users, and auditors. Evaluate people, processes, and technical security controls through a system-based approach. Audit security services enabled through Cisco products. Analyze security policy and compliance requirements for Cisco networks. Assess infrastructure security and intrusion prevention systems. Audit network access control and secure remote access systems. Review security in clients, hosts, and IP communications. Evaluate the performance of security monitoring and management systems. This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9781587141010 , 1587141019
    Language: English
    Pages: 1 online resource (xxv, 1119 p.) , ill.
    Edition: 2nd ed.
    Series Statement: Cisco Press networking technology series
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance , Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples. Readers will learn about the Cisco ASA Firewall solution and capabilities; secure configuration and troubleshooting of site-to-site and remote access VPNs; Intrusion Prevention System features built into Cisco ASA's Advanced Inspection and Prevention Security Services Module (AIP-SSM); and Anti-X features in the ASA Content Security and Control Security Services Module (CSC-SSM). This new edition has been updated with detailed information on the latest ASA models and features. Everything network professionals need to know to identify, mitigate, and respond to network attacks with Cisco ASA Includes detailed configuration examples, with screenshots and command line references Covers the ASA 8.2 release Presents complete troubleshooting methodologies and architectural references
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...