HostedDB - Dedicated UNIX Servers

index_235
UNCLASSIFIED Additional Resources  Version 1.0g  UNCLASSIFIED 235   9. Additional Resources The references below can be useful in designing secure network configurations, and in understanding and maintaining router security. 9.1.  Bibliography The list below consists of books that are useful for router configuration and security, collected from the reference lists throughout this guide. Albritton, J. Cisco IOS Essentials, McGraw-Hill, 1999. An excellent introduction to basic usage and configuration of IOS routers. Ballew, S.M., Managing IP Networks with Cisco Routers, O’Reilly Associates, 1997. A practical introduction to the concepts and practices for using Cisco routers, with lots of pragmatic examples. Black, U.  IP Routing Protocols, Prentice Hall, 2000. A very good survey of routing protocols and the technologies behind them, with some discussion of applications. Buckley, A. ed. Cisco IOS 12.0 Configuration Fundamentals, Cisco Press, 1999. This is the reference manual and guide for basic configuration tasks in IOS 12.0.  Sections particularly relevant to Router Access Security include: IOS User Interfaces and File Management.   Chapman, D.B., Cooper, S., and Zwicky, E.D., Building Internet Firewalls, 2nd Edition, O’Reilly & Associates, 2000. A seminal overview of network boundary security concerns and techniques.   This revised edition includes all the sound background of the original, with extensive updates for newer technologies. Chappell, Laura, Editor, Advanced Cisco Router Configuration, Cisco Press, 1999. Great reference book for a variety of Cisco configuration topics, including routing and routing protocols.   Cisco IOS 12.0 Configuration Fundamentals, Cisco Press, 1999. The configuration fundamentals guide and reference in book form; handy to have, but the documentation CD is usually easier to use.