We a good story
Quick delivery in the UK

Books in the Networking Technology: Security series

Filter
Filter
Sort bySort Series order
  • Save 11%
    - Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
    by Graham Bartlett
    £42.49

    IKEv2 IPsec Virtual Private Networks is the first plain English introduction to IKEv2: both a complete primer on this important new security protocol, and a practical guide to deploying it with Cisco's FlexVPN implementation. Cisco experts Graham Bartlett and Amjad Inamdar explain how IKEv2 can be used to perform mutual authentication, and to establish and maintaining security associations (SAs). Their insights into IKEv2's goals, theory, and underlying concepts will be invaluable to all network security professionals, whatever technologies or solutions they choose for implementation. Next, Bartlett and Inamdar thoroughly introduce FlexVPN, Cisco's high-value implementation of the IKEv2 standard. You'll discover FlexVPN's unified paradigm, and learn how its command-line interface can be used to manage IKEv2 in site-to-site, remote access, hub and spoke topology, and partial mesh (spoke to spoke direct) environments. The authors explain how FlexVPN's simple, modular framework relies on the tunnel interface paradigm while remaining compatible with legacy VPN implementations. They offer detailed guidance on configuring IKEv2 VPNs using FlexVPN in both Cisco IOS and IOS-XE environments, and show how FlexVPN unifies previous Cisco overlay solutions, including crypto maps, EasyVPN, DMVPN, and remote access. Their practical design examples and hands-on troubleshooting steps will help you gain real mastery of FlexVPN configuration and operations in any network environment.

  • Save 12%
    by Aaron Woland
    £45.99

    Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world. This edition of Cisco ISE for BYOD and Secure Unified Access contains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today's business case for identity solutions. Next, you walk through ISE foundational topics and ISE design. Then you explore how to build an access security policy using the building blocks of ISE. Next are the in-depth and advanced ISE configuration sections, followed by the troubleshooting and monitoring chapters. Finally, we go in depth on the new TACACS+ device administration solution that is new to ISE and to this second edition. With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture; learn about Cisco Secure Access solutions; and master advanced techniques for securing access to networks, from dynamic segmentation to guest access and everything in between.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.