Cisco PIX Firewalls: Configure / Manage / Troubleshoot / Edition 2

Cisco PIX Firewalls: Configure / Manage / Troubleshoot / Edition 2

by Umer Khan
ISBN-10:
1597490040
ISBN-13:
9781597490047
Pub. Date:
04/26/2005
Publisher:
Elsevier Science
ISBN-10:
1597490040
ISBN-13:
9781597490047
Pub. Date:
04/26/2005
Publisher:
Elsevier Science
Cisco PIX Firewalls: Configure / Manage / Troubleshoot / Edition 2

Cisco PIX Firewalls: Configure / Manage / Troubleshoot / Edition 2

by Umer Khan

Paperback

$54.95
Current price is , Original price is $54.95. You
$54.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.


  • The Cisco Pix firewall is the #1 market leading firewall, owning 43% market share. Cisco is poised to release the newest, completely re-designed version 7 of the Pix operating system in the first quarter of 2004
  • "Cisco Pix Firewalls: configure | manage | troubleshoot" Covers all objectives on the new Cisco Pix certification exam, making this book the perfect study guide in addition to professional reference
  • Umer Khan's first book "Cisco Security Specialist's Guide to PIX Firewall" has been the #1 market leading Cisco Pix book since it was published in 2002

Product Details

ISBN-13: 9781597490047
Publisher: Elsevier Science
Publication date: 04/26/2005
Edition description: 2nd Edition
Pages: 576
Product dimensions: 7.00(w) x 9.00(h) x (d)

About the Author

Charles Riley has co-authored and edited several books including Routing and Configuring Cisco Voice over IP, Second Edition, and The Best Damn Cisco Internetworking Book Period (Syngress Publishing, ISBN: 1-931836-91-4). He has designed and implemented robust networking solutions for large Fortune 500 and privately held companies.  Charles started as an U.S. Army telecommunications specialist at Fort Huachuca, Arizona, eventually finishing his Army career as the network manager of the 7th Army Training Command in Grafenwoehr, Germany. Charles graduated from the University of Central Florida in 1989.

Michael Sweeney (CCNA, CCDA, CCNP, MCSE, SCP) is the owner of the Network Security consulting firm Packetattack.com.  Packetattack.com specialties are network design and troubleshooting, wireless network design, security and analysis. The Packetattack team uses such industry standard tools such as NAI Sniffer, AiroPeekNX and Airmagnet. Packetattack.com also provides digital forensic analysis services. Michael has been a contributing author for Syngress for the books Cisco Security Specialist Guide to PIX Firewalls, ISBN: 1-931836-63-9, Cisco Security Specialist Guide to Secure Intrusion Detection Systems, ISBN: 1-932266-69-0 and Building DMZs For Enterprise Networks, ISBN: 1-931836-88-4. Through PacketPress, Michael has also published Securing Your Network Using Linux, ISBN: 1411621778.

Brian Browne (CISSP) is the Principal Consultant with Edoxa, Inc., and provides both strategic and technical information security consulting.  He has 14 years of experience in the field of information security and is skilled in all phases, from security management through hands-on implementation.  His specific security experience includes Sarbanes-Oxley and HIPAA gap analysis and remediation, vulnerability assessments, network security, firewall architecture, virtual private networks (VPN), UNIX security, Windows Active Directory security, and public key infrastructure (PKI).  He also conducts application performance assessments and network capacity planning using Opnet IT Guru.

Daniel Kligerman (B.Sc, CCSE, CCIE #13999) is the Manager of the Data Diagnostic Centre at TELUS National Systems, responsible for the support and management of enterprise customers' data and VoIP networks.  Daniel is the technical editor of Check Point Next Generation with Application Intelligence Security Administration (Syngress, ISBN: 1-932266-89-5), and the contributing author of Building DMZs for Enterprise Networks (Syngress, ISBN: 1-931836-88-4), Check Point NG VPN-1/Firewall-1 Advanced Configuration and Troubleshooting (Syngress, ISBN: 1-931836-97-3), Nokia Network Security Solutions Handbook (Syngress, ISBN: 1-931836-70-1), and Check Point Next Generation Security Administration (Syngress, ISBN: 1-928994-74-1).

Thorsten Behrens (CCMSE, CCSE+, CCNA, CNE) is a Senior Security Engineer with Integralis' Managed Security Services Team. Thorsten’s specialties include Check Point FireWall-1, Cisco PIX, and ISS RealSecure. Thorsten is a German national who delights his neighbors in Springfield, MA with bagpipe practice sessions.

Ido Dubrawsky (CCNA, CCDA, SCSA, CISSP) is a Senior Security Consultant with SBC's Callisma consulting practice.  Previously Ido was a Network Security Architect working in the SAFE architecture group of Cisco Systems, Inc. His responsibilities include research into network security design and implementation. Previously, Ido was a member of Cisco's Secure Consulting Services in Austin, TX where he conducted security posture assessments and penetration tests for clients as well as provided technical consulting for security design reviews. Ido was one of the co-developers of the Secure Consulting Services wireless network assessment toolset.  His strengths include Cisco routers and switches, PIX firewalls, the Cisco Intrusion Detection System, and the Solaris operating system. His specific interests are in vulnerability assessments, penetration testing, freeware intrusion detection systems, and network performance monitoring. Ido holds a bachelor's and master's degree from the University of Texas at Austin in Aerospace Engineering and is a longtime member of USENIX and SAGE. He has written numerous articles covering Solaris security and network security for Sysadmin as well as the online SecurityFocus. He is a contributor to Hack Proofing Sun Solaris 8 (Syngress Publishing, ISBN: 1-928994-44-X) and Hack Proofing Your Network, Second Edition (Syngress, ISBN: 1-928994-70-9).

 Umer Khan (CCIE #7410, MCSE, SCSA, SCNA, CCA, SCE, CNX) is the Manager of Networking, Telecommunications, and Windows Infrastructure at Broadcom Corporation, where he enjoys the challenging and fast-paced IT environment. Umer's teams are responsible for the design, implementation, and support of a broad range of Broadcom’s global IT infrastructure, some of which include LAN, MAN, WAN, 802.11 wireless, PBX, VoIP, VPN, firewall, cellular, Windows server, Active Directory, Citrix, Microsoft Exchange, SQL, IIS, Biztalk, VMware, authentication, content load balancing, caching, audio/video conferencing, and audio/video distribution technologies. Umer has contributed towards several publications, including the Sun Certified System Administrator for Solaris 8 Study Guide (ISBN: 007-212369-9) and Sniffer Pro: Network Optimization and Troubleshooting Handbook (Syngress, ISBN: 193-183657-4). He was also the technical editor for Cisco Security Specialist’s Guide to PIX Firewalls (Syngress, ISBN: 1-931836-63-9).

Table of Contents

Introduction to Security and Firewalls ; Introduction to PIX Firewalls ; Passing Traffic ; Advanced PIX Configurations ; Configuring Authentication, Authorization, and Accouting ; Configuring System Management ; Configuring Virtual Private Networking ; Configuring Failover ; PIX Device Manager ; Troubleshooting and Performance Monitoring
From the B&N Reads Blog

Customer Reviews