With lively lessons and surprising confessions, you'll get new insights into the art of persuasion -- as well as teaching, learning, and performance -- directly from a master of the trade.
Highlights include:Berkun's hard-won and simple philosophy, culled from years of lectures, teaching courses, and hours of appearances on NPR, MSNBC, and CNBCPractical advice, including how to work a tough room, the science of not boring people, how to survive the attack of the butterflies, and what to do when things go wrongThe inside scoop on who earns $30,000 for a one-hour lecture and whyThe worst -- and funniest -- disaster stories you've ever heard (plus countermoves you can use)
Filled with humorous and illuminating stories of thrilling performances and real-life disasters, Confessions of a Public Speaker is inspirational, devastatingly honest, and a blast to read.
The answer is time management. And not just any time management theory--you want Time Management for System Administrators, to be exact. With keen insights into the challenges you face as a sys admin, bestselling author Thomas Limoncelli has put together a collection of tips and techniques that will help you cultivate the time management skills you need to flourish as a system administrator.
Time Management for System Administrators understands that an Sys Admin often has competing goals: the concurrent responsibilities of working on large projects and taking care of a user's needs. That's why it focuses on strategies that help you work through daily tasks, yet still allow you to handle critical situations that inevitably arise.
Among other skills, you'll learn how to:Manage interruptionsEliminate timewastersKeep an effective calendarDevelop routines for things that occur regularlyUse your brain only for what you're currently working onPrioritize based on customer expectationsDocument and automate processes for faster execution
What's more, the book doesn't confine itself to just the work environment, either. It also offers tips on how to apply these time management tools to your social life. It's the first step to a more productive, happier you.
After reading this book, you will be able to design the overall architecture for functioning business intelligence systems with the supporting data warehousing and data-integration applications. You will have the information you need to get a project launched, developed, managed and delivered on time and on budget – turning the deluge of data into actionable information that fuels business knowledge. Finally, you’ll give your career a boost by demonstrating an essential knowledge that puts corporate BI projects on a fast-track to success.Provides practical guidelines for building successful BI, DW and data integration solutions. Explains underlying BI, DW and data integration design, architecture and processes in clear, accessible language.Includes the complete project development lifecycle that can be applied at large enterprises as well as at small to medium-sized businesses Describes best practices and pragmatic approaches so readers can put them into action. Companion website includes templates and examples, further discussion of key topics, instructor materials, and references to trusted industry sources.
Create and deliver data-rich reports across the enterprise using this complete server-based reporting solution. Written by a member of the original Reporting Services development team, Microsoft SQL Server 2008 Reporting Services covers the entire report-building and distribution process, including data extraction, integration with desktop and Web applications, and end-user access. The book explains how to maximize all of the powerful features, including the new Tablix data format, as well as enhanced performance, scalability, and visualization capabilities.Install, configure, and customize SQL Server 2008 Reporting Services Create SELECT queries to extract data Generate reports from the Report Wizard and from scratch Add charts, images, and gauges Build reusable report templates Use the new Tablix data format to create reports with any structure Export reports to Word, Excel, PDF, HTML, XML, and other formats Enable end-user access to reports via the Report Server and its Report Manager web interface
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Deliver meaningful business information to users anytime, anywhere, on any device, using Oracle Business Intelligence 11g. Written by Oracle ACE Director Mark Rittman, Oracle Business Intelligence 11g Developers Guide fully covers the latest BI report design and distribution techniques. Find out how to execute effective queries, build accurate models, use scorecards and KPIs, create dynamic reports, set up dashboards, and publish to smartphones and wireless devices. This Oracle Press guide contains comprehensive details on Oracle Exalytics In-Memory Machine, the best-in-class, preintegrated BI platform.Install or upgrade to Oracle Business Intelligence 11g Develop and manage custom Oracle Business Intelligence repositories Access relational, file, and multidimensional data sources Design print-quality reports with Oracle Business Intelligence Publisher Create web-enabled analyses, dashboards, and visualizations Integrate with other applications using Oracle Business Intelligence 11g Action Framework Employ authentication, authorization, and row-level security Configure and deploy Oracle Exalytics In-Memory Machine
Create and distribute dynamic, feature-rich data visualizations and highly interactive BI dashboards—quickly and easily! Tableau 8: The Official Guide provides the hands-on instruction and best practices you need to meet your business intelligence objectives and drive better decision making. Discover how to work from the Tableau GUI, load BI from disparate sources, drag and drop to analyze data, set up custom visualizations, and build robust dashboards. This practical guide shows you, step by step, how to design and publish meaningful business communications to end users across your enterprise.Navigate the Tableau user interface and data window Connect to spreadsheets, databases, and other sources Select data fields and drag them to desired screen locations Work with pre-defined visualizations and sample workbooks Display background maps and perform geographic analysis Add calculated fields, graphs, charts, tables, and statistics Combine multiple data sources into real-time dashboards Export your visualizations to the Web or in various file formats
Electronic content includes:Videos that demonstrate the techniques presented in the book Sample Tableau workbooks
“Cindi has created, with her typical attention to details that matter, a contemporary forward-looking guide that organizations could use to evaluate existing or create a foundation for evolving business intelligence / analytics programs. The book touches on strategy, value, people, process, and technology, all of which must be considered for program success. Among other topics, the data, data warehousing, and ROI comments were spot on. The ‘technobabble’ chapter was brilliant!” —Bill Frank, Business Intelligence and Data Warehousing Program Manager, Johnson & Johnson
“If you want to be an analytical competitor, you’ve got to go well beyond business intelligence technology. Cindi Howson has wrapped up the needed advice on technology, organization, strategy, and even culture in a neat package. It’s required reading for quantitatively oriented strategists and the technologists who support them.” —Thomas H. Davenport, President’s Distinguished Professor, Babson College and co-author, Competing on Analytics
“Cindi has created an exceptional, authoritative description of the end-to-end business intelligence ecosystem. This is a great read for those who are just trying to better understand the business intelligence space, as well as for the seasoned BI practitioner.” —Sully McConnell, Vice President, Business Intelligence and Information Management, Time Warner Cable
“Cindi’s book succinctly yet completely lays out what it takes to deliver BI successfully. IT and business leaders will benefit from Cindi’s deep BI experience, which she shares through helpful, real-world definitions, frameworks, examples, and stories. This is a must-read for companies engaged in – or considering – BI.” —Barbara Wixom, PhD, Principal Research Scientist, MIT Sloan Center for Information Systems Research
Expanded to cover the latest advances in business intelligence such as big data, cloud, mobile, visual data discovery, and in-memory computing, this fully updated bestseller by BI guru Cindi Howson provides cutting-edge techniques to exploit BI for maximum value. Successful Business Intelligence: Unlock the Value of BI & Big Data, Second Edition describes best practices for an effective BI strategy. Find out how to:Garner executive support to foster an analytic culture Align the BI strategy with business goals Develop an analytic ecosystem to exploit data warehousing, analytic appliances, and Hadoop for the right BI workload Continuously improve the quality, breadth, and timeliness of data Find the relevance of BI for everyone in the company Use agile development processes to deliver BI capabilities and improvements at the pace of business change Select the right BI tools to meet user and business needs Measure success in multiple ways Embrace innovation, promote successes and applications, and invest in training Monitor your evolution and maturity across various factors for impact
Exclusive industry survey data and real-world case studies from Medtronic, Macy’s, 1-800 CONTACTS, The Dow Chemical Company, Netflix, Constant Contact, and other companies show successful BI initiatives in action.
From Moneyball to Nate Silver, BI and big data have permeated our cultural, political, and economic landscape. This timely, up-to-date guide reveals how to plan and deploy an agile, state-of-the-art BI solution that links insight to action and delivers a sustained competitive advantage.
The Qlik platform was designed to provide a fast and easy data analytics tool, and QlikView Your Business is your detailed, full-color, step-by-step guide to understanding Qlikview's powerful features and techniques so you can quickly start unlocking your data’s potential. This expert author team brings real-world insight together with practical business analytics, so you can approach, explore, and solve business intelligence problems using the robust Qlik toolset and clearly communicate your results to stakeholders using powerful visualization features in QlikView and Qlik Sense.
This book starts at the basic level and dives deep into the most advanced QlikView techniques, delivering tangible value and knowledge to new users and experienced developers alike. As an added benefit, every topic presented is enhanced with tips, tricks, and insightful recommendations that the authors accumulated through years of developing QlikView analytics.
This is the book for you:
The book covers three common business scenarios - Sales, Profitability, and Inventory Analysis. Each scenario contains four chapters, covering the four main disciplines of business analytics: Business Case, Data Modeling, Scripting, and Visualizations.
The material is organized by increasing levels of complexity. Following our comprehensive tutorial, you will learn simple and advanced QlikView and Qlik Sense concepts, including the following:
How to use the Data Load Script language for implementing data modeling techniques How to build and use the QVD data layer Building a multi-tier data architectures Using variables, loops, subroutines, and other script control statements Advanced scripting techniques for a variety of ETL solutions Building Insightful Visualizations in QlikView:
Introduction into QlikView sheet objects — List Boxes, Text Objects, Charts, and more Designing insightful Dashboards in QlikView Using advanced calculation techniques, such as Set Analysis and Advanced Aggregation Using variables for What-If Analysis, as well as using variables for storing calculations, colors, and selection filters Advanced visualization techniques - normalized and non-normalized Mekko charts, Waterfall charts, Whale Tail charts, and more
Building Insightful Visualizations in Qlik Sense:
Whether you are just starting out with QlikView or are ready to dive deeper, QlikView Your Business is your comprehensive guide to sharpening your QlikView skills and unleashing the power of QlikView in your organization.
Provide actionable business intelligence across the enterprise to enable informed decision-making and streamlined business processes. Oracle Business Intelligence Applications: Deliver Value Through Rapid Implementations shows how to justify, configure, customize, and extend this complete package of BI solutions. You'll get a technical walkthrough of Oracle Business Intelligence Applications architecture--from the dashboard to the data source--followed by best practices for maximizing the powerful features of each application. You will also find out about stakeholders critical to project approval and success.Optimize performance using Oracle Exalytics In-Memory Machine Deliver timely financial information to managers with Oracle Financial Analytics Enable a streamlined, demand-driven supply chain via Oracle Supply Chain and Order Management Analytics Provide end-to-end visibility into manufacturing operations with Oracle Manufacturing Analytics Optimize supply-side performance through Oracle Procurement and Spend Analytics Use Oracle Human Resources Analytics to provide key workforce information to managers and HR professionals Track the costs and labor required to maintain and operate assets with Oracle Enterprise Asset Management Analytics Maintain visibility into project performance via Oracle Project Analytics Provide actionable insight into sales opportunities using Oracle Sales Analytics Enable superior customer service with Oracle Service Analytics
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
Power Query for Power BI and Excel goes well beyond the surface of what Power Query can do. The book goes deep into the underlying M language, showing you how to do amazing things that aren’t going to be possible from just the GUI interface that is covered in most other books. You’ll have full command of the GUI, and you’ll be able to drop into the M language to go beyond what the GUI provides. The depth in this book makes it a must-have item for anyone who is pushing Power BI and Excel to their limits in the pursuit of business intelligence from data analysis.Teaches the basics of using Power Query to load data into ExcelHelps you solve common, data-related problems with Power QueryShows how to write your own solutions in the powerful M language
The purpose of this book is to provide a gentle and instructionally organized introduction to the field of data science and machine learning, with a focus on building and deploying predictive models.
The book also provides a thorough overview of the Microsoft Azure Machine Learning service using task oriented descriptions and concrete end-to-end examples, sufficient to ensure the reader can immediately begin using this important new service. It describes all aspects of the service from data ingress to applying machine learning and evaluating the resulting model, to deploying the resulting model as a machine learning web service. Finally, this book attempts to have minimal dependencies, so that you can fairly easily pick and choose chapters to read. When dependencies do exist, they are listed at the start and end of the chapter.The simplicity of this new service from Microsoft will help to take Data Science and Machine Learning to a much broader audience than existing products in this space. Learn how you can quickly build and deploy sophisticated predictive models as machine learning web services with the new Azure Machine Learning service from Microsoft.
Part one provides an introduction to quantum information processing using diamond, as well as its principles and fabrication techniques. Part two outlines experimental demonstrations of quantum information processing using diamond, and the emerging applications of diamond for quantum information science. It contains chapters on quantum key distribution, quantum microscopy, the hybridization of quantum systems, and building quantum optical devices. Part three outlines promising directions and future trends in diamond technologies for quantum information processing and sensing.
Quantum Information Processing with Diamond is a key reference for R&D managers in industrial sectors such as conventional electronics, communication engineering, computer science, biotechnology, quantum optics, quantum mechanics, quantum computing, quantum cryptology, and nanotechnology, as well as academics in physics, chemistry, biology, and engineering.Brings together the topics of diamond and quantum information processingLooks at applications such as quantum computing, neural circuits, and in vivo monitoring of processes at the molecular scale
Oracle's is possibly the most valuable dialect of SQL from a career standpoint. Oracle's database engine is widely used in corporate environments worldwide. It is also found in many government applications. Oracle SQL implements many features not found in competing products. No developer or DBA working with Oracle can afford to be without knowledge of these features and how they work, because of the performance and expressiveness they bring to the table.
Written in an easygoing and example-based style, Beginning Oracle SQL is the book that will get you started down the path to successfully writing SQL statements and getting results from Oracle Database.
Takes an example-based approach, with clear and authoritative explanations Introduces both SQL and the query tools used to execute SQL statements Shows how to create tables, populate them with data, and then query that data to generate business results
The important stuff you need to know:Go from novice to ace. Learn how to analyze your data, from writing your first formula to charting your results.Illustrate trends. Discover the clearest way to present your data using Excel’s new Quick Analysis feature.Broaden your analysis. Use pivot tables, slicers, and timelines to examine your data from different perspectives.Import data. Pull data from a variety of sources, including website data feeds and corporate databases.Work from the Web. Launch and manage your workbooks on the road, using the new Excel Web App.Share your worksheets. Store Excel files on SkyDrive and collaborate with colleagues on Facebook, Twitter, and LinkedIn.Master the new data model. Use PowerPivot to work with millions of rows of data.Make calculations. Review financial data, use math and scientific formulas, and perform statistical analyses.
This book includes more than 80 games to help you break down barriers, communicate better, and generate new ideas, insights, and strategies. The authors have identified tools and techniques from some of the world's most innovative professionals, whose teams collaborate and make great things happen. This book is the result: a unique collection of games that encourage engagement and creativity while bringing more structure and clarity to the workplace. Find out why -- and how -- with Gamestorming.Overcome conflict and increase engagement with team-oriented gamesImprove collaboration and communication in cross-disciplinary teams with visual-thinking techniquesImprove understanding by role-playing customer and user experiencesGenerate better ideas and more of them, faster than ever beforeShorten meetings and make them more productiveSimulate and explore complex systems, interactions, and dynamicsIdentify a problem's root cause, and find the paths that point toward a solution
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401) is filled with more than 800 realistic practice questions--including new performance-based questions--to prepare you for this challenging exam. To help you understand the material, in-depth explanations of both the correct and incorrect answers are included for every question. This practical guide covers all official objectives for Exam SY0-401 and is the perfect companion to CompTIA Security+ Certification Study Guide, Second Edition.
Covers all exam topics, including:
Networking Basics and Terminology * Security Terminology * Security Policies and Standards * Types of Attacks * System Security Threats * Mitigating Security Threats * Implementing System Security * Securing the Network Infrastructure * Wireless Networking and Security * Authentication * Access Control * Cryptography * Managing a Public Key Infrastructure * Physical Security * Risk Analysis * Disaster Recovery and Business Continuity * Computer Forensics * Security Assessments and Audits * Monitoring and Auditing
Electronic content includes:Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain PDF copy of the book for studying on the go
Get complete coverage of all the CompTIA Network+ exam objectives inside this comprehensive resource. Written by the leading expert on CompTIA certification and training, Mike Meyers, this authoritative guide covers exam N10-006 in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, scenarios, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.
CompTIA Network+ Certification All-in-One Exam Guide, Sixth Edition covers all exam topics, including:Network architectures Cabling and topology Ethernet basics Network installation TCP/IP applications and network protocols Routing Network naming Advanced networking devices IPv6 Remote connectivity Wireless networking Virtualization and cloud computing Network operations Managing risk Network security Network monitoring and troubleshooting
Electronic content includes:100+ practice exam questions in a customizable test engine 20+ lab simulations to help you prepare for the performance-based questions One hour of video training from Mike Meyers Mike’s favorite shareware and freeware networking tools and utilities
Whether you are populating databases, retrieving data from the Web, or performing complex calculations on large data sets, SSIS gives you the tools to get the job done. And this book gives you the knowledge to take advantage of everything SSIS offers.Helps you design and develop robust, efficient, scalable ETL solutions Walks you through using the built-in, stock components Shows how to programmatically extend the power of SSIS to cover any possible scenario
That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right.
Thoroughly revised and expanded, Cisco IOS Cookbook, 2nd Edition, adds sections on MPLS, Security, IPv6, and IP Mobility, and presents solutions to the most common configuration problems, including:Configuring interfaces of many types, from serial to ATM and Frame RelayConfiguring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP)Configuring authenticationConfiguring other services, including DHCP and NTPSetting up backup links, and using HSRP to configure backup routersManaging the router, including SNMP and other solutionsUsing access lists to control the traffic through the router
If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced--if you've just been given responsibility for managing a network with Cisco routers--this book could be a job-saver.
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security
Information Technology is supposed to enable business performance and innovation, improve service levels, manage change, and maintain quality and stability, all while steadily reducing operating costs. Yet when an enterprise begins a Lean transformation, too often the IT department is either left out or viewed as an obstacle. What is to be done? Winner of a 2011 Shingo Research and Professional Publication Award, this book shares practical tips, examples, and case studies to help you establish a culture of continuous improvement to deliver IT operational excellence and business value to your organization.
...will have a permanent place in my bookshelf.
—Gene Kim, Chief Technology Officer, Tripwire, Inc.
... provides an unprecedented look at the role that Lean IT will play in making this revolutionary shift and the critical steps for sustained success.
—Steve Castellanos, Lean Enterprise Director, Nike, Inc.
Twenty years from now the firms which dominate their industries will have fully embraced Lean strategies throughout their IT organizations.
—Scott W. Ambler, Chief Methodologist for Agile and Lean, IBM Rational
... a great survival manual for those needing nimble and adaptive systems.
—Dr. David Labby, MD, PhD, Medical Director and Director of Clinical Support and Innovation, CareOregon
... makes a major contribution in an often-ignored but much-needed area.
—John Bicheno, Program Director MS in Lean Operations, Cardiff University
... a comprehensive view into the world of Lean IT, a must read!
—Dave Wilson, Quality Management, Oregon Health & Science University
The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).
Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.
Topics include:What DNS does, how it works, and when you need to use itHow to find your own place in the Internet's namespaceSetting up name serversUsing MX records to route mailConfiguring hosts to use DNS name serversSubdividing domains (parenting)Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc.The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG)Mapping one name to several servers for load sharingDynamic updates, asynchronous notification of change to a zone, and incremental zone transfersTroubleshooting: using nslookup and dig, reading debugging output, common problemsDNS programming using the resolver library and Perl's Net::DNS module
This course describes the architecture, components, and operations of routers and switches in a small network. You learn how to configure a router and a switch for basic functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN routing in both IPv4 and IPv6 networks.
The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.
The book’s features help you focus on important concepts to succeed in this course:
Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary–Consult the comprehensive Glossary with more than 200 terms. Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
Routing and Switching Essentials Lab Manual
How To–Look for this icon to study the steps you need to learn to perform certain tasks.
Interactive Activities–Reinforce your understanding of topics by doing all the exercises from the online course identified throughout the book with this icon.
Videos–Watch the videos embedded within the online course.
Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.
Hands-on Labs–Work through all the course labs and additional Class Activities that are included in the course and published in the separate Lab Manual.
Topics include:An in-depth view of routers and routingSwitching, using Cisco Catalyst and Nexus switches as examplesSOHO VoIP and SOHO wireless access point design and configurationIntroduction to IPv6 with configuration examplesTelecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLSSecurity, firewall theory, and configuration, as well as ACL and authenticationQuality of Service (QoS), with an emphasis on low-latency queuing (LLQ)IP address allocation, Network Time Protocol (NTP), and device failures
Unleash the full potential of business intelligence with fact-based decisions, aligned to business goals, using reports and dashboards that lead from insight to action. SAP BusinessObjects BI 4.0: The Complete Reference offers completely updated coverage of the latest BI platform.
Find out how to work with the new Information Design Tool to create universes that access multiple data sources and SAP BW. See how to translate complex business questions into highly efficient Web Intelligence queries and publish your results to the BI Launchpad. Learn how to create dashboards from data sourced through a universe or spreadsheet. The most important concepts for universe designers, report and dashboard authors, and business analysts are fully explained and illustrated by screenshots, diagrams, and step-by-step instructions.Establish and evolve BI goals Maximize your BI investments by offering the right module to the right user Create robust universes with the Information Design Tool, leveraging multiple data sources, derived tables, aggregate awareness, and parameters Develop a security plan that is scalable and flexible Design Web Intelligence reports from basic to advanced Create sophisticated calculations and advanced formatting to highlight critical business trends Build powerful dashboards to embed in PowerPoint or the BI Launchpad Use Explorer to visually navigate large data sets and uncover patterns
New to this edition:How to develop business models and business process architecture How to integrate decision management models and business rulesNew material on service processes and on dynamic case managementLearn to integrate various approaches in a broad business process management approachExtensive revision and update addresses Business Process Management Systems, and the integration of process redesign and Six SigmaLearn how all the different process elements fit together in this best first book on business process, now completely updated Tailor the presented methodology, which is based on best practices, to your organization’s specific needs Understand the human aspects of process redesignBenefit from all new detailed case studies showing how these methods are implemented
Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crime Details the ways to conduct a computer forensics investigation Highlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witness Walks you through identifying, collecting, and preserving computer evidence Explains how to understand encryption and examine encryption files
Computer Forensics JumpStart is the resource you need to launch a career in computer forensics.
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields.
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner
The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.