Welcome to Air University Central Library and Fazaia Medical College Library. (Sign in with Your email. Your user name is the same as your student ID number or Employee ID number for password, please contact Circulation Staff)

Mpls vpn security (Record no. 7410)

MARC details
000 -LEADER
fixed length control field 03789nam a2200229 a 4500
001 - CONTROL NUMBER
control field ASIN1587051834
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190522131149.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141029s2005 xxu eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1587051834 (paperback)
Terms of availability $69.99
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781587051838 (paperback)
037 ## - SOURCE OF ACQUISITION
Terms of availability 385.00 IRS
040 ## - CATALOGING SOURCE
Transcribing agency Air University
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Behringer, Michael H.
9 (RLIN) 3287
245 10 - TITLE STATEMENT
Title Mpls vpn security
Statement of responsibility, etc. Michael H. Behringer, Monique J. Morrow.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. Cisco Press,
Date of publication, distribution, etc. 2006.
300 ## - PHYSICAL DESCRIPTION
Extent xxi; 286 p.
Dimensions 23 cm.
520 ## - SUMMARY, ETC.
Summary, etc. A practical guide to hardening MPLS networks�� Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network���s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents�� Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. Security is a major concern for companies migrating to MPLS VPNs from existing VPN technologies such as ATM. Organizations deploying MPLS VPNs need security best practices for protecting their networks, specifically for the more complex deployment models such as inter-provider networks and Internet provisioning on the network. �� MPLS VPN Security is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Divided into four parts, the book begins with an overview of security and VPN technology. A chapter on threats and attack points provides a foundation for the discussion in later chapters. Part II addresses overall security from various perspectives, including architectural, design, and operation components. Part III provides practical guidelines for implementing MPLS VPN security. Part IV presents real-world case studies that encompass details from all the previous chapters to provide examples of overall secure solutions. �� Drawing upon the authors��� considerable experience in attack mitigation and infrastructure security, MPLS VPN Security is your practical guide to understanding how to effectively secure communications in an MPLS environment. �� "The authors of this book, Michael Behringer and Monique Morrow, have a deep and rich understanding of security issues, such as denial-of-service attack prevention and infrastructure protection from network vulnerabilities. They offer a very practical perspective on the deployment scenarios, thereby demystifying a complex topic. I hope you enjoy their insights into the design of self-defending networks." ���Jayshree V. Ullal, Senior VP/GM Security Technology Group, Cisco
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Morrow
9 (RLIN) 3288
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Amazon.com
Uniform Resource Identifier <a href="http://www.amazon.com/exec/obidos/ASIN/1587051834/cho">http://www.amazon.com/exec/obidos/ASIN/1587051834/cho</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
    Dewey Decimal Classification       Air University Central Library Islamabad Air University Central Library Islamabad Computer Science 10/29/2014 Progressive International 39030752   005.8 BEH P8017 01/11/2017 01/11/2017 Book Program relevancy: BSCS; Course relevancy; Network and Information Security.
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631