Don't wait until it's too late to find out you have security holes in your Cisco network. As security threats to enterprise networks continue to mount, it is critical that network managers know how to properly deploy and configure the Cisco Secure family of products. This book describes in detail how to detect network security incidents, measure vulnerability and policy compliance, and manage security policy across an extended organization. Readers will find coverage of the following security products which make up the Cisco Secure line:Cisco Secure PIX FirewallCisco Secure Access Control ServerCisco Secure Integrated SoftwareCisco Secure ScannerCisco Secure Integrated VPN SoftwareCisco Secure Intrusion Detection SystemCisco Secure VPN ClientCisco Secure Policy Manager
Ссылка удалена правообладателем ---- The book removed at the request of the copyright holder.