HostedDB - Dedicated UNIX Servers

index_159
UNCLASSIFIED Implementing Security on Cisco Routers  Version 1.0g  UNCLASSIFIED 159   4.7.  Collected References The list below describes the major references and sources of information for the material presented here in Section 4. 4.7.1.    Books and Manuals Cisco Systems, IOS 11.3 Configuration Fundamentals , Cisco Press, 1998. Basic configuration guide for IOS 11.3, includes basic information on using the IOS command interface, basic IOS commands, and much more.   Available in hardback form from Cisco Press, and on the Cisco Documentation CD. Cisco Systems, IOS 12.0 Configuration Fundamentals, Cisco Press, 1999. Basic configuration guide for IOS 11.3, includes basic information on using the IOS command interface, basic IOS commands, and much more.   Available in hardback form and on the Cisco Documentation CD. Cisco Systems, Cisco IOS Network Security , Cisco Press, 1998. This book is the security configuration manual and command reference for IOS 11.3.  It includes extensive coverage of access management, AAA, and related topics.  Also available on the Cisco Documentation CD as two separate documents: the “Security Configuration Guide” and the “Security Command Reference”. Cisco Systems, Cisco IOS 12.0 Network Security, Cisco Press, 1999. This book is the security configuration manual and command reference updated for IOS 12.0.  It includes extensive coverage of access management, AAA, IPSec, and related topics.  Also available on the Cisco Documentation CD as two separate documents: the “Security Configuration Guide” and the “Security Command Reference”. Held, G. and Hundley, K., Cisco Security Architectures, McGraw-Hill, 1999. This book includes excellent general advice about router and router-related network security, in addition to its Cisco-specific material. Held, G. and Hundley, K., Cisco Access List Field Guide, McGraw-Hill, 1999. Access lists are critical to most aspects of Cisco IOS security.  This modest book is an extremely detailed, practical guide to creating access lists, and understanding access lists created by others. Innokenty, R., Cisco Routers for IP Routing: Little Black Book , Coriolis Group, 1999.