PDF) Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory | Annals of Emerging Technologies in Computing (AETiC) and Maaruf Ali - Academia.edu
Project: DMZ and Network Hardening Tutorial with Packet Tracer - Cybr