MONUMENTAL SAVINGS
Buy 1, Save 35% or Buy 2+, Save 55%*—use code PD2019. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI
The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF
The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI
The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF
The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.
Integrated Security Technologies and Solutions - Volume II is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction in security design, deployment, integration and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. A one-stop expert level guide for all aspects of Cisco Security, this guide will help security pros succeed in their day-to-day jobs as they get ready for their CCIE Security written and lab exams.
This guide has been written by a team of CCIEs who are world-class experts in their respective Cisco Security disciplines, including experts who were involved in creating the new CCIE Security 5.0 blueprint and possess unsurpassed understanding of its requirements. Each chapter starts with relevant theory, progresses through configuration examples and applications, and concludes with practical troubleshooting sections.
Volume 1 focuses on Identity, Context Sharing, Encryption, Secure Connectivity and Virtualization Security. With a strong focus on inter-product integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution.
Part I: Knock, Knock! Who's There?
1. Who and What - AAA Basics
2. Network Access
3. Extending Network Access
4. pxGrid with the Identity Services Engine
5. Device Administration
Part II:
6. Secure Connectivity
Part III: The Red Pill
7. Virtualization and Automation