• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Router security strategies

پدید آورنده

موضوع
Computer networks , Security measures,Routers (Computer networks) , Security measures,TCP/IP (Computer network protocol) , Security measures

رده
E-BOOK

کتابخانه
Central Library, Center of Documentation and Supply of Scientific Resources

محل استقرار
استان: East Azarbaijan ـ شهر:

Central Library, Center of Documentation and Supply of Scientific Resources

تماس با کتابخانه : 04133443834

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
978-1-58705-336-8

NATIONAL BIBLIOGRAPHY NUMBER

Country Code
IR
Number
EN-56179

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

COUNTRY OF PUBLICATION OR PRODUCTlON

Country of publication
IR

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Router security strategies
General Material Designation
[Book]
Other Title Information
:securing IP network traffic plane

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Indianapolis
Name of Publisher, Distributor, etc.
: Cisco Press
Date of Publication, Distribution, etc.
, 2008.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
650 blz.

NOTES PERTAINING TO PUBLICATION, DISTRIBUTION, ETC.

Text of Note
Electronic

CONTENTS NOTE

Text of Note
This includes the data, control, management, and services planes that provide tile infrastructure for IP networking."--BOOK JACKET.
Text of Note
This book details the distinct traffic planes of IF networks and the advanced techniques necessary to operationally secure them.
Text of Note
"Router Security Strategies: Securing IP Network Traffic Planes provides a comprehensive approach to understand and implement IP traffic plane separation and protection on IP routers.
Text of Note
Index 608
Text of Note
App. D Security Incident Handling 597
Text of Note
App. C Cisco IOS to IOS XR Security Transition 557
Text of Note
App. B IF Protocol Headers 497
Text of Note
App. A Answers to Chapter Review Questions 487
Text of Note
Pt. IV Appendixes 485
Text of Note
Ch. 9 Service Provider Network Case Studies 443
Text of Note
Ch. 8 Enterprise Network Case Studies 405
Text of Note
Pt. III Case Studies 403
Text of Note
Ch. 7 IP Services Plane Security 347
Text of Note
Ch. 6 IF Management Plane Security 299
Text of Note
Ch. 5 IF Control Plane Security 219
Text of Note
Ch. 4 IF Data Plane Security 147
Text of Note
Pt. II Security Techniques for Protecting IP TrafficPlanes 145
Text of Note
Ch. 3 IP Network Traffic Plane Security Concepts 117
Text of Note
Ch. 2 Threat Models for IF Networks 65
Text of Note
Ch. 1 Internet Protocol Operations Fundamentals 5
Text of Note
Pt. I IF Network and Traffic Plane Security Fundamentals 3

TOPICAL NAME USED AS SUBJECT

Computer networks , Security measures
Routers (Computer networks) , Security measures
TCP/IP (Computer network protocol) , Security measures

LIBRARY OF CONGRESS CLASSIFICATION

Class number
E-BOOK

PERSONAL NAME - PRIMARY RESPONSIBILITY

Schudel, Gregg

PERSONAL NAME - SECONDARY RESPONSIBILITY

Smith, David J

ORIGINATING SOURCE

Country
ایران

ELECTRONIC LOCATION AND ACCESS

Host name
9781587053368.pdf
Access number
عادی
Compression information
عادی
Date and Hour of Consultation and Access
9781587053368.pdf
Electronic Format Type
متن

old catalog

e

BL
1

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival