Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 14,99
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Facebook Twitter Pinterest
Hardening Cisco Routers von [Akin, Thomas]

Hardening Cisco Routers Kindle Edition

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 14,99

Länge: 190 Seiten Sprache: Englisch

Der lange Kindle-Lesesommer
Neu: Der lange Kindle-Lesesommer
Wir feiern die schönste Jahreszeit mit 30 Top-eBooks und einem Preisvorteil von mindestens 50%. Wir wünschen viel Freude mit Ihrer neuen Sommerlektüre. Jetzt entdecken


To harden a router is to render it more heavily defended and more difficult to attack. Because routers (by definition) serve as points of entry into your network, it makes sense to devote extra effort to their security. Hardening Cisco Routers shows how to make adjustments to the configurations of routers from Cisco Systems to improve their resistance to attack, particularly external attack. This is essentially a book of specialized Internetwork Operating System (IOS) commands, as well as explanations of their behavior. It'll appeal to the router administrator--employed either by an organization's internal network staff, an outside consultancy, or a service provider--who wants to know which IOS commands he or she should add to routers' configuration files to tighten their security without a lot of hassle.

The great thing about this book is that you can approach it in either of two ways. If you just want to clamp down on your routers' security weaknesses as soon as possible, you can begin with the checklists at the end of each chapter (each of which focuses on a particular area, like SMTP) or the big one in an appendix, which is comprehensive. These checklists include both "how" and "why" information, as exemplified by "Disable ICMP broadcasts with the no ip directed-broadcast command." If you want more information on the big picture, or want to prepare for a specific kind of attack, read the individual chapters for detailed advice on how to set IOS to behave as you want. --David Wall

Topics covered: Internetwork Operating System (IOS) commands you can use to protect Cisco Systems routers from a variety of attacks. Specialized sections deal with security assessment, auditing, access control, privileges, optional services, and the legal importance of your login banners' contents.


"This slim tome is a veritable gem of a book. It is written in a logical and clear style that permits reading from start to finish, but each specific section is complete in it's own right and as such it allows the reader to pick up the book and dip read satisfactorily. I learnt things from this book, and for me that is the best recommendation I can give." - Raza Rizvi, news@UK


  • Format: Kindle Edition
  • Dateigröße: 409 KB
  • Seitenzahl der Print-Ausgabe: 194 Seiten
  • Gleichzeitige Verwendung von Geräten: Keine Einschränkung
  • Verlag: O'Reilly Media; Auflage: 1 (21. Februar 2002)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B0026OR3MG
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Verbesserter Schriftsatz: Nicht aktiviert
  • Durchschnittliche Kundenbewertung: Schreiben Sie die erste Bewertung
  • Amazon Bestseller-Rang: #958.247 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf (beta) HASH(0x951c62f4) von 5 Sternen 19 Rezensionen
8 von 8 Kunden fanden die folgende Rezension hilfreich
HASH(0x9da7f260) von 5 Sternen "The facts Ma'am, just the fact". 2. Juni 2004
Von Daniel Ginensky - Veröffentlicht auf
Format: Taschenbuch
Intended audiences: network administrators, security advisors/auditors, system architects.
This book is, pound for pound, among the best in my technical library.
Having almost no previous knowledge in router hardening (although I was aware of the basics of Cisco routers) a few hours with this book enabled me to review the "hardening" plan submitted by a highly paid security consultant, and provide useful comments on improving the proposal.
No doubt this book is the beginning, not the end, of my education on this subject. But this fine book got me off to a quick and productive start, which is high praise when compared to what could be said about so many other technical titles. Highly recommended.
8 von 8 Kunden fanden die folgende Rezension hilfreich
HASH(0x97ecc438) von 5 Sternen No-nonsense reference for securing Cisco routers 31. Dezember 2002
Von Ein Kunde - Veröffentlicht auf
Format: Taschenbuch
This book is concise and well written. It covers most, if not all of the areas involved in locking down Cisco routers. And it does so in clearly defined chapters, making it very easy to navigate as a reference. In addition, each topic is accompanied by clear configuration examples.
I also found it very complete. Even covering information which I haven't yet come across in the various NSA guides and Cisco texts on the subject. As someone already mentioned, you'll no longer need to trawl the web and other sources for this info; Thomas Akin and O'Reilly's have done the hard work for you.
8 von 8 Kunden fanden die folgende Rezension hilfreich
HASH(0x97eca228) von 5 Sternen A Goldmine 24. Mai 2002
Von Edmund Bennett - Veröffentlicht auf
Format: Taschenbuch
This book is nothing short of a goldmine. I have read many infosec books, including plenty of Cisco security books, and this one packs twice as much quality information with twice as many topics in a tenth of the space. This one is cut in dry. The layout is perfect. The topic is stated, followed by the vulnerability and then the fix. A network admin's dream, without all of the filler.
5 von 5 Kunden fanden die folgende Rezension hilfreich
HASH(0x97eca60c) von 5 Sternen A TRUE Goldmine for Cisco admins 4. April 2002
Von Jim Fraiser - Veröffentlicht auf
Format: Taschenbuch
This book is a huge *must* for anyone who works with Cisco routers. I got it because as a network admin I needed a checklist on securing our routers. Showed it to our InfoSec director and he ordered all our routers nationwide to be secured according to the book's checklists!
4 von 4 Kunden fanden die folgende Rezension hilfreich
HASH(0x97eca6fc) von 5 Sternen Great compilation for hardening Cisco Routers 20. Juli 2002
Von Ein Kunde - Veröffentlicht auf
Format: Taschenbuch
Although the content of the book can be found in the Cisco web site, but why bother digging the web site for it?
Thomas Akin did a great job by providing all the basics (and more) that we should do to hardened Cisco Routers before putting it in a production network specially those routers providing internet access to users.
Danilo Castro Dy
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.
click to open popover