MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Cisco IOS network security / Cisco Systems.

Contributor(s): Cisco Systems, Inc.
Material type: materialTypeLabelBookSeries: Cisco IOS reference library.Publisher: Indianapolis, IN : Cisco Press, 1998Description: xvii, 542 p. ; 24 cm. + hbk.ISBN: 1578700574.Subject(s): Computer networks -- Security measuresDDC classification: 005.8
Contents:
Security Overview -- Part I: Authentication, Authorization and Accounting (AAA) -- AAA Overview -- Configuring Authentication -- Authentication Commands -- Configuring Authorization -- Authorization Commands -- Configuring Accounting -- Accounting Commands -- Part II: Security Server Protocols -- Configuring RADIUS -- RADIUS Commands -- Configuring TACACS+ -- Configuring TACACS and Extended TACACS -- TACACS, Extended TACACS and TACACS+ Commands -- Configuring Kerberos -- Kerberos Commands -- Part III: Traffic Filtering -- Access Control lists: Overview and Guidelines -- Configuring lock-and-key Security (Dynamic Access Lists) -- Lock-and-key Commands -- Configuring IP Session Filtering (Reflexive Access Lists) -- Reflexive Access List Commands -- Configuring TCP Intercept (Prevent Denial-of-Service Attacks) -- TCP Intercept Commands -- Part IV: Network Data Encryption -- Configuring Network Data Encryption -- Network Data Encryption Commands -- Part V: Other Security Features -- Configuring Passwords and Privileges -- Passwords and Privileges Commands -- Neighbor Router Authentication: Overview and Guidelines -- Configuring IP Security Options -- IP Security Options Commands.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Store Item 005.8 (Browse shelf(Opens below)) 1 Available 00069080
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00080696
Total holds: 0

Enhanced descriptions from Syndetics:

Every superintendent wants a high performing school district, but orchestrating this accomplishment can be daunting. Responding effectively to this type of challenge requires that superintendents build a partnership with their school principals. Principals, in turn, face the same challenges and most learn quickly that their effectiveness is tied directly to their relationship with their superintendent.

This insightful resource shows superintendents and principals how to develop the communication and strong collaboration that are essential for mutually supportive professional relationships. The authors detail how secure relationships combined with a team approach can significantly strengthen an administrator's leadership performance.

In Leadership Teaming: The Superintendent-Principal Relationship, superintendents and principals will find research-supported concepts, novel strategies, and vivid examples that point the way towards productive, successful, and enduring professional relationships.

"Cisco documentation" -- Cover.
Includes index.

Security Overview -- Part I: Authentication, Authorization and Accounting (AAA) -- AAA Overview -- Configuring Authentication -- Authentication Commands -- Configuring Authorization -- Authorization Commands -- Configuring Accounting -- Accounting Commands -- Part II: Security Server Protocols -- Configuring RADIUS -- RADIUS Commands -- Configuring TACACS+ -- Configuring TACACS and Extended TACACS -- TACACS, Extended TACACS and TACACS+ Commands -- Configuring Kerberos -- Kerberos Commands -- Part III: Traffic Filtering -- Access Control lists: Overview and Guidelines -- Configuring lock-and-key Security (Dynamic Access Lists) -- Lock-and-key Commands -- Configuring IP Session Filtering (Reflexive Access Lists) -- Reflexive Access List Commands -- Configuring TCP Intercept (Prevent Denial-of-Service Attacks) -- TCP Intercept Commands -- Part IV: Network Data Encryption -- Configuring Network Data Encryption -- Network Data Encryption Commands -- Part V: Other Security Features -- Configuring Passwords and Privileges -- Passwords and Privileges Commands -- Neighbor Router Authentication: Overview and Guidelines -- Configuring IP Security Options -- IP Security Options Commands.

Powered by Koha