1. Working with the Command Interpreter. 2. Basic Access Lists. 3. Dynamic Access Lists. 4. Time Based Access Lists. 5. Reflexive Access Lists. 6. Context Based Access Lists.
Gilbert Held is an internationally recognized author and lecturer
who specializes in the application of computer and communications
technology. The author of over 40 books covering personal
computers, data communications, and business trade topics, he is
the only person to twice win the competitive Karp Interface Award.
A winner, as well, of the American Publishers Institute and
numerous other industry awards, Mr. Held was selected by Federal
Computer Week as one of the top 100 persons in government,
industry, and academia who has made a difference in the acquisition
and use of computer systems. Among his other books are Voice Over
Data Networks; Cisco Security Architecture; Cisco Router
Performance Field Guide; and Voice/Data Internetworking, all from
McGraw-Hill.
Kent Hundley, CCNA (Lexington, KY) is a Senior Network Engineer at
INS, Inc. where he specializes in network integration and
consulting. He is the co-author with Gil Held of Cisco Security
Architectures.
![]() |
Ask a Question About this Product More... |
![]() |