000 | 05422cam a2200913 i 4500 | ||
---|---|---|---|
001 | on1018379859 | ||
003 | OCoLC | ||
005 | 20240523125540.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 180109s2018 inu o 000 0 eng d | ||
010 | _a 2017962360 | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dTEFOD _dYDX _dOCLCF _dDG1 _dMERER _dUAB _dUMI _dCOF _dOCLCO _dOCLCQ _dOCLCO _dOTZ _dRECBK _dOCLCQ _dU3W _dOCLCQ _dOCLCO _dCOO _dOCLCO _dDG1 _dUKAHL _dVT2 _dELBRO _dOCLCQ _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
015 |
_aGBB7L5575 _2bnb |
||
016 | 7 |
_a018608219 _2Uk |
|
019 |
_a1019614658 _a1031030136 _a1111219216 _a1228528583 |
||
020 |
_a9781119409915 _q(electronic bk.) |
||
020 |
_a1119409918 _q(electronic bk.) |
||
020 |
_a9781119409885 _q(electronic bk.) |
||
020 |
_a1119409888 _q(electronic bk.) |
||
020 |
_a9781119549505 _q(electronic bk. ; _qoBook) |
||
020 |
_a1119549507 _q(electronic bk. ; _qoBook) |
||
020 | _z9781119409939 | ||
020 | _z1119409934 | ||
029 | 1 |
_aAU@ _b000062186367 |
|
029 | 1 |
_aAU@ _b000065207917 |
|
029 | 1 |
_aAU@ _b000066769288 |
|
029 | 1 |
_aCHNEW _b001021026 |
|
029 | 1 |
_aCHVBK _b529703432 |
|
035 |
_a(OCoLC)1018379859 _z(OCoLC)1019614658 _z(OCoLC)1031030136 _z(OCoLC)1111219216 _z(OCoLC)1228528583 |
||
037 |
_aE326D80E-8129-4F63-9A66-D652F625D245 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8076 _223 |
049 | _aMAIN | ||
100 | 1 |
_aMcMillan, Troy, _eauthor. |
|
245 | 1 | 0 |
_aCCNA security study guide : _bexam 210-260 / _cTroy McMillan. |
264 | 1 |
_aIndianapolis, Indiana : _bSybex, a Wiley Brand, _c[2018] |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aUnderstanding Security Fundamentals -- Understanding Security Threats -- Understanding Cryptography -- Securing the Routing Process -- Understanding Layer 2 Attacks -- Preventing Layer 2 Attacks -- VLAN Security -- Securing Management Traffic -- Understanding 802.1x and AAA -- Securing a BYOD Initiative -- Understanding VPNs -- Configuring VPNs -- Understanding Firewalls -- Configuring NAT and Zone-Based Firewalls -- Configuring the Firewall on an ASA -- Intrusion Prevention -- Content and Endpoint Security -- Comprehensive Online Learning Environment. | |
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed January, 12, 2018). | |
520 | _a"Comprehensive preparation for Exam 210-260, with expert coverage of all exam objectives and a robust tool kit of learning aids. Providing explanation and insight into the installation, troubleshooting, and monitoring of secure networks, this guide helps candidates develop the technological competency they need to maintain the integrity, confidentiality, and availability of data and devices. Practical examples give you a real-world understanding of critical security issues, and access to the Sybex online interactive learning environment provides chapter tests, electronic flashcards, practice exams, and more to help you maximize your study time while building skills and confidence."--Page 4 of cover | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
630 | 0 | 0 | _aCisco IOS. |
630 | 0 | 7 |
_aCisco IOS _2fast |
650 | 0 |
_aRouting (Computer network management) _xExaminations _vStudy guides. |
|
650 | 0 |
_aTelecommunication _xSwitching systems _xExaminations _vStudy guides. |
|
650 | 0 |
_aTelecommunications engineers _xCertification. |
|
650 | 0 |
_aComputer networks _xSecurity measures _xExaminations _vStudy guides. |
|
650 | 6 |
_aRoutage (Gestion des r�eseaux d'ordinateurs) _xExamens _vGuides de l'�etudiant. |
|
650 | 6 |
_aT�el�ecommunications _xSyst�emes de commutation _xExamens _vGuides de l'�etudiant. |
|
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures _xExamens _vGuides de l'�etudiant. |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xOnline Safety & Privacy. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xNetworking. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures _xExaminations _2fast |
|
650 | 7 |
_aTelecommunication _xSwitching systems _xExaminations _2fast |
|
650 | 7 |
_aTelecommunications engineers _xCertification _2fast |
|
655 | 7 |
_aexamination study guides. _2aat |
|
655 | 7 |
_aStudy guides _2fast |
|
655 | 7 |
_aStudy guides. _2lcgft |
|
655 | 7 |
_aGuides de l'�etudiant. _2rvmgf |
|
758 |
_ihas work: _aCCNA security study guide (Text) _1https://id.oclc.org/worldcat/entity/E39PCH36bhkvYmBpGfJGJFFYRq _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aMcMillan, Troy. _tCCNA security study guide exam 210-260. _dIndianapolis, Indiana : John Wiley & Sons : Sybex, [2018] _z9781119409939 _z1119409934 _w(OCoLC)989967705 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119549505 |
938 |
_aAskews and Holts Library Services _bASKH _nAH32915618 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH32915617 |
||
938 |
_aEBSCOhost _bEBSC _n1679859 |
||
938 |
_aeLibro _bELBO _nELB177227 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00742434 |
||
938 |
_aYBP Library Services _bYANK _n15083779 |
||
938 |
_aYBP Library Services _bYANK _n15682280 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12493 _d12493 |