Computer network

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.

Cisco Press has the only self-study guides approved by Cisco for the new CCENT and CCNA Routing and Switching certifications. The new edition of the best-selling two-book value priced CCNA Official Cert Guide Library includes updated content, new online practice exercises, more than 600 practice exam questions, and more than 2 hours of video training, plus the CCENT and CCNA Network Simulator Lite Editions with 43 free Network Simulator labs.


CCNA Routing and Switching 200-125 Official Cert Guide Library is a comprehensive review and practice package for the latest CCNA exams and is the only self-study resource approved by Cisco. The two books contained in this package, CCENT/CCNA ICND1 100-105 Official Cert Guide and CCNA Routing and Switching ICND2 200-105 Official Cert Guide, present complete reviews and more challenging and realistic preparation experiences. The books have been fully updated to refresh the content for the latest CCNA exam topics and to enhance certain key topics that are critical for exam success.


Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes

· A test-preparation routine proven to help you pass the exams

· "Do I Know This Already?" quizzes, which enable you to decide how much time you need to spend on each section

· Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly

· Troubleshooting sections, which help you master the complex scenarios you will face on the exam

· The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports

· A free copy of the CCNA ICND1 and ICND2 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches

· Links to a series of hands-on config labs developed by the author

· Online interactive practice exercises that help you hone your knowledge

· More than 2 hours of video mentoring from the author

· A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

· Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, these official study guides help you master the concepts and techniques that ensure your exam success.

These official study guides help you master all the topics on the CCNA exams, including

· Networking fundamentals

· Implementing basic Ethernet LANs

· Ethernet LANs: design, VLANs, and troubleshooting

· IPv4 addressing and subnetting

· Implementing IPv4

· IPv4 design and troubleshooting

· IPv4 services: ACLs, NAT, and QoS

· IPv4 routing protocols and routing

· Wide area networks

· IPv6

· Network management, SDN, and cloud computing

This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet.Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial on configuring important network services -- including DNS, Apache, sendmail, Samba, PPP, and DHCP -- as well as expanded chapters on troubleshooting and security. TCP/IP Network Administration is also a command and syntax reference for important packages such as gated, pppd, named, dhcpd, and sendmail.With coverage that includes Linux, Solaris, BSD, and System V TCP/IP implementations, the third edition contains:
  • Overview of TCP/IP
  • Delivering the data
  • Network services
  • Getting startedM
  • Basic configuration
  • Configuring the interface
  • Configuring routing
  • Configuring DNS
  • Configuring network servers
  • Configuring sendmail
  • Configuring Apache
  • Network security
  • Troubleshooting
  • Appendices include dip, ppd, and chat reference, a gated reference, a dhcpd reference, and a sendmail reference
This new edition includes ways of configuring Samba to provide file and print sharing on networks that integrate Unix and Windows, and a new chapter is dedicated to the important task of configuring the Apache web server. Coverage of network security now includes details on OpenSSH, stunnel, gpg, iptables, and the access control mechanism in xinetd. Plus, the book offers updated information about DNS, including details on BIND 8 and BIND 9, the role of classless IP addressing and network prefixes, and the changing role of registrars.Without a doubt, TCP/IP Network Administration, 3rd Edition is a must-have for all network administrators and anyone who deals with a network that transmits data over the Internet.
Here are all the CCNA-level Routing and Switching commands you need in one condensed, portable resource. The CCNA Routing and Switching Portable Command Guide, Third Edition, is filled with valuable, easy-to-access information and is portable enough for use whether you’re in the server room or the equipment closet.

The guide summarizes all CCNA certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Configuration examples throughout the book provide you with a better understanding of how these commands are used in simple network designs.

This book has been completely updated to cover topics in the ICND1 100-101, ICND2 200-101, and CCNA 200-120 exams. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA Routing and Switching certification exam.

The book is organized into these parts:

• Part I TCP/IP v4

• Part II Introduction to Cisco Devices

• Part III Configuring a Router

• Part IV Routing

• Part V Switching

• Part VI Layer 3 Redundancy

• Part VII IPv6

• Part VIII Network Administration and Troubleshooting

• Part IX Managing IP Services

• Part X WANs

• Part XI Network Security

  • Quick, offline access to all CCNA Routing and Switching commands for research and solutions
  • Logical how-to topic groupings for a one-stop resource
  • Great for review before CCNA Routing and Switching certification exams
  • Compact size makes it easy to carry with you, wherever you go
  • “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs
  • “What Do You Want to Do?” chart inside back cover helps you to quickly reference specific tasks

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment

“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI

Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”

  • Obstruct APTs and web-based meta-exploits
  • Defend against UNIX-based root access and buffer overflow hacks
  • Block SQL injection, spear phishing, and embedded-code attacks
  • Detect and terminate rootkits, Trojans, bots, worms, and malware
  • Lock down remote access using smartcards and hardware tokens
  • Protect 802.11 WLANs with multilayered encryption and gateways
  • Plug holes in VoIP, social networking, cloud, and Web 2.0 services
  • Learn about the latest iPhone and Android attacks and how to protect yourself
Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions.

This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data.

Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What’s Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises.

This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.

  • Completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, security, and applications
  • Increased focus on application layer issues where innovative and exciting research and design is currently the center of attention
  • Free downloadable network simulation software and lab experiments manual available
CCNP Routing and Switching Portable Command Guide

All ROUTE (300-101) and SWITCH (300-115) Commands in One Compact, Portable Resource

Preparing for the CCNP® ROUTE or CCNP SWITCH exam? Working as a network professional? Here are all the CCNP-level commands you’ll need, in one handy resource. The CCNP Routing and Switching Portable Command Guide is filled with valuable, easy-to-access information, and it’s portable enough to use whether you’re in the server room or the equipment closet.

This guide helps you memorize commands and concepts as you prepare to pass the CCNP ROUTE (300-101) or CCNP SWITCH (300-115) exams. It summarizes all CCNP certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, offering tips and examples for applying them in real-world environments. Throughout, configuration examples deepen your understanding of how these commands are used in actual network designs.

Whenever you’re researching routing or switching solutions, you won’t find a quicker, more useful offline resource.

--Logical “how-to” topic groupings inside the front and back covers provide one-stop research

--Compact size makes it easy to carry with you, wherever you go

--Helps you review important commands before taking the CCNP ROUTE or CCNP SWITCH certification exam

--“Create Your Own Journal” appendix with blank, lined pages enables you to personalize the book for your own needs

--“What Do You Want to Do?” chart inside front and back covers helps you to quickly reference specific tasks

This important text/reference presents a comprehensive guide to the field of computing and information security and assurance. The book takes a broad view of computer network security, encompassing online social networks, and wireless and mobile systems.

This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterprise systems alike.

Topics and features: introduces the fundamentals of traditional computer networks, the security threats they face, and the best practices currently in use; discusses the security challenges introduced by virtualization software, cloud computing and mobile systems; examines the security quagmire presented by the home computing environment and the growing number of home hotspots (NEW); raises important legislative, legal, social, technical and ethical security issues, including the tension between the needs of individual privacy and collective security; provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to lab exercises; supplies additional support material for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides.

This unique work is suitable as both a teaching and a reference tool for all those interested in learning about security in the evolving computing ecosystem. Computer network and data security personnel and policy makers will also find the guide to be a useful and unique source of ideas.
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

  • Master Cisco CCENT/CCNA ICND1 100-105 exam topics
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with exam preparation tasks

This is the eBook edition of the CCENT/CCNA ICND1 100-105 Official Cert Guide. This eBook does not include the companion CD-ROM with practice exam that comes with the print edition.

CCENT/CCNA ICND1 100-105 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

CCENT/CCNA ICND1 100-105 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

· A test-preparation routine proven to help you pass the exams

· Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section

· Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly

· Troubleshooting sections, which help you master the complex scenarios you will face on the exam

· A free copy of the CCENT ICND1 100-105 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches

· Links to a series of hands-on config labs developed by the author

· Online, interactive practice exercises that help you hone your knowledge

· More than 90 minutes of video mentoring from the author

· A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

· Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your exam success.

This official study guide helps you master all the topics on the CCENT/CCNA ICND1 exam, including

· Networking fundamentals

· Implementing basic Ethernet LANs

· Ethernet LANs: design, VLANs, and troubleshooting

· IPv4 addressing and subnetting

· Implementing IPv4

· IPv4 design and troubleshooting

· IPv4 services: ACLs and NAT

· IPv6

· Network device management

Objectives

The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability.

Audience

This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design.

This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process.

Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems.

Changes for the Third Edition

Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can’t even imagine that brilliant college students are busily creating in their dorm rooms.

As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design.

To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics:

¿ Network redundancy

¿ Modularity in network designs

¿ The Cisco SAFE security reference architecture

¿ The Rapid Spanning Tree Protocol (RSTP)

¿ Internet Protocol version 6 (IPv6)

¿ Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet

¿ Network design and management tools

A detailed examination of interior routing protocols -- completely updated in a new edition

  • A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols
  • A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers
  • Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies

    Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1, Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.

  • With 28 new chapters, the third edition of The Practice of System and Network Administration innovates yet again! Revised with thousands of updates and clarifications based on reader feedback, this new edition also incorporates DevOps strategies even for non-DevOps environments.

    Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protégé. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even experts through difficult projects.

    Other books tell you what commands to type. This book teaches you the cross-platform strategies that are timeless!

    • DevOps techniques: Apply DevOps principles to enterprise IT infrastructure, even in environments without developers
    • Game-changing strategies: New ways to deliver results faster with less stress
    • Fleet management: A comprehensive guide to managing your fleet of desktops, laptops, servers and mobile devices
    • Service management: How to design, launch, upgrade and migrate services
    • Measurable improvement: Assess your operational effectiveness; a forty-page, pain-free assessment system you can start using today to raise the quality of all services
    • Design guides: Best practices for networks, data centers, email, storage, monitoring, backups and more
    • Management skills: Organization design, communication, negotiation, ethics, hiring and firing, and more


    Have you ever had any of these problems?

    • Have you been surprised to discover your backup tapes are blank?
    • Ever spent a year launching a new service only to be told the users hate it?
    • Do you have more incoming support requests than you can handle?
    • Do you spend more time fixing problems than building the next awesome thing?
    • Have you suffered from a botched migration of thousands of users to a new service?
    • Does your company rely on a computer that, if it died, can’t be rebuilt?
    • Is your network a fragile mess that breaks any time you try to improve it?
    • Is there a periodic “hell month” that happens twice a year? Twelve times a year?
    • Do you find out about problems when your users call you to complain?
    • Does your corporate “Change Review Board” terrify you?
    • Does each division of your company have their own broken way of doing things?
    • Do you fear that automation will replace you, or break more than it fixes?
    • Are you underpaid and overworked?


    No vague “management speak” or empty platitudes. This comprehensive guide provides real solutions that prevent these problems and more!

    Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

    CCNA Routing and Switching ICND2 200-105 Official Cert Guide, Academic Editionis a comprehensive textbook and study package that provides you with a detailed overview of network configuration and troubleshooting. Best-selling author and expert instructor Wendell Odom shares study hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

    This complete study package includes

    · A test-preparation routine proven to help you pass the exams

    · "Do I Know This Already?" quizzes, which enable you to decide how much time you need to spend on each section

    · Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly

    · Troubleshooting sections, which help you master the complex scenarios you will face on the exam

    · A free copy of the eBook version of the text, available in PDF, EPUB, and Mobi (Kindle) formats

    · The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports

    · A free copy of the CCNA ICND2 200-105 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches

    · Links to a series of hands-on config labs developed by the author

    · Online interactive practice exercises that help you hone your knowledge

    · More than 50 minutes of video mentoring from the author

    · A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

    · Study plan suggestions and templates to help you organize and optimize your study time

    Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your success.

    This official study guide helps you master all the topics on the CCNA ICND2 exam, including

    · Ethernet LANs

    · IPv4 routing protocols

    · Wide area networks

    · IPv4 services: ACLs and QoS

    · IPv4 routing and troubleshooting

    · IPv6

    · Network management, SDN, and cloud computing

    Companion DVD

    The DVD contains more than 500 unique practice exam questions, ICND2 Network Simulator Lite software, online practice exercises, and 50+ minutes of video training.

    Includes Exclusive Offers For Up to 70% Off Video Training and Network Simulator Software

    Pearson IT Certification Practice Test minimum system requirements:

    Windows 10, Windows 8.1, Windows 7, or Vista (SP2), Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases

    In addition to the wealth of updated content, this new edition includes a series of free hands-on exercises to help you master several real-world con guration and troubleshooting activities. These exercises can be performed on the CCNA ICND2 200-105 Network Simulator Lite software included for free on the DVD or companion web page that accompanies this book. This software, which simulates the experience of working on actual Cisco routers and switches, contains the following 19 free lab exercises, covering all of the topics in Part II, the first hands-on configuration section of the book:

    1. EIGRP Serial Configuration I

    2. EIGRP Serial Configuration II

    3. EIGRP Serial Configuration III

    4. EIGRP Serial Configuration IV

    5. EIGRP Serial Configuration V

    6. EIGRP Serial Configuration VI

    7. EIGRP Route Tuning I

    8. EIGRP Route Tuning II

    9. EIGRP Route Tuning III

    10. EIGRP Route Tuning IV

    11. EIGRP Neighbors I

    12. EIGRP Neighbors II

    13. EIGRP Neighbors III

    14. EIGRP Auto-Summary Configuration Scenario

    15. EIGRP Configuration I Configuration Scenario

    16. EIGRP Metric Manipulation Configuration Scenario

    17. EIGRP Variance and Maximum Paths Configuration Scenario

    18. EIGRP Troubleshooting Scenario

    19. Path Troubleshooting Scenario IV

    If you are interested in exploring more hands-on labs and practicing con guration and troubleshooting with more router and switch commands, check out our full simulator product offerings at http://www.pearsonitcerti cation.com/networksimulator.

    CCNA ICND2 Network Simulator Lite minimum system requirements:

    Windows (Minimum)

    · Windows 10 (32/64-bit), Windows 8.1 (32/64-bit), or Windows 7 (32/64-bit)

    · 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor

    · 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)

    · 16 GB available hard disk space (32-bit) or 20 GB (64-bit)

    · DirectX 9 graphics device with WDDM 1.0 or higher driver

    · Adobe Acrobat Reader version 8 and above

    Mac (Minimum)

    · OS X 10.11, 10.10, 10.9, or 10.8

    · Intel core Duo 1.83 GHz

    · 512 MB RAM (1 GB recommended)

    · 1.5 GB hard disk space

    · 32-bit color depth at 1024x768 resolution

    · Adobe Acrobat Reader version 8 and above

    The fifth edition of Behrouz Forouzan's Data Communications and Networking presents a comprehensive and accessible approach to data communications and networking that has made this book a favorite with students and professionals alike. More than 830 figures and 150 tables accompany the text and provide a visual and intuitive opportunity for understanding the material. This unique approach minimizes the need for heavy math content, allowing normally complicated topics to unfold graphically and visually rather than through the presentation of complex formulas. The new edition has been reorganized to showcase recent developments in the field and minimize or eliminate coverage of deprecated topics. In addition to the updated material included in each chapter, the text now features a chapter on the peer-to-peer paradigm, a full chapter on quality of service (QoS), additional coverage of forward error correction, coverage of WiMAX, and material on socket-interface programming in Java. The end-of-chapter material has also been significantly enhanced and now includes more than 630 questions, 600 problems, many lab assignments, programming assignments, and online applets that allow students to see problems and protocols in action. Technologies related to data communications and networking are among the fastest growing in our culture today, and there is no better guide to this rapidly expanding field than Behrouz Forouzan, an author whose visual, student-friendly approach has become a hallmark in a computer science instruction.
    As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:
    • The importance of router security and where routers fit into an overall security plan
    • Different router configurations for various versions of Cisco?s IOS
    • Standard ways to access a Cisco router and the security implications of each
    • Password and privilege levels in Cisco routers
    • Authentication, Authorization, and Accounting (AAA) control
    • Router warning banner use (as recommended by the FBI)
    • Unnecessary protocols and services commonly run on Cisco routers
    • SNMP security
    • Anti-spoofing
    • Protocol security for RIP, OSPF, EIGRP, NTP, and BGP
    • Logging violations
    • Incident response
    • Physical security
    Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.
    This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.

    Appropriate for all introductory-to-intermediate courses in computer networking, the Internet, or Internet applications; readers need no background in networking, operating systems, or advanced mathematics.

    Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today’s Internet to support applications ranging from web browsing to telephony and multimedia. Comer begins by illuminating the applications and facilities offered by today’s Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, not mathematical proofs.

    Teaching and Learning Experience

    This program will provide a better teaching and learning experience—for you and your students.

    • Broad Coverage of Key Concepts and Principles, Presented in a Technology-independent Fashion: Comer focuses on imparting knowledge that students will need regardless of which technologies emerge or become obsolete.
    • Flexible Organization that Supports both Top-down and Bottom-up Teaching Approaches: Chapters may be sequenced to accommodate a wide variety of course needs and preferences.
    • An Accessible Presentation that Resonates with Students: Comer relies throughout on figures, drawings, examples, and analogies, not mathematical proofs.
    • Keep Your Course Current: Content is refreshed to provide the most up-to-date information on new technologies for your course.
    The core concepts and technologies of Windows networking

    Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

    This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.

    • Serves as an ideal resource for gaining a solid understanding of fundamental networking concepts and skills
    • Offers a straightforward and direct approach to networking basics and covers network management tools, TCP/IP, the name resolution process, and network protocols and topologies
    • Reviews all the topics you need to know for taking the MTA 98-366 exam
    • Provides an overview of networking components, discusses connecting computers to a network, and looks at connecting networks with routers

    If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Networking Essentials is essential reading.

    Packed with the latest information on TCP/IP standards and protocols

    TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for beginners as well as the perfect go-to resource for TCP/IP veterans.

    The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step instructions show you how to install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies, and much more.

    • Transmission Control Protocol / Internet Protocol (TCP/IP) is the de facto standard transmission medium worldwide for computer-to-computer communications; intranets, private internets, and the Internet are all built on TCP/IP
    • The book shows you how to install and configure TCP/IP and its applications on clients and servers; explains intranets, extranets, and virtual private networks (VPNs); provides step-by-step information on building and enforcing security; and covers all the newest protocols
    • You'll learn how to use encryption, authentication, digital certificates, and signatures to set up a secure Internet credit card transaction

    Find practical security tips, a Quick Start Security Guide, and still more in this practical guide.

    New York Times Bestseller

    A Summer Reading Pick for President Barack Obama, Bill Gates, and Mark Zuckerberg

    From a renowned historian comes a groundbreaking narrative of humanity’s creation and evolution—a #1 international bestseller—that explores the ways in which biology and history have defined us and enhanced our understanding of what it means to be “human.”

    One hundred thousand years ago, at least six different species of humans inhabited Earth. Yet today there is only one—homo sapiens. What happened to the others? And what may happen to us?

    Most books about the history of humanity pursue either a historical or a biological approach, but Dr. Yuval Noah Harari breaks the mold with this highly original book that begins about 70,000 years ago with the appearance of modern cognition. From examining the role evolving humans have played in the global ecosystem to charting the rise of empires, Sapiens integrates history and science to reconsider accepted narratives, connect past developments with contemporary concerns, and examine specific events within the context of larger ideas.

    Dr. Harari also compels us to look ahead, because over the last few decades humans have begun to bend laws of natural selection that have governed life for the past four billion years. We are acquiring the ability to design not only the world around us, but also ourselves. Where is this leading us, and what do we want to become?

    Featuring 27 photographs, 6 maps, and 25 illustrations/diagrams, this provocative and insightful work is sure to spark debate and is essential reading for aficionados of Jared Diamond, James Gleick, Matt Ridley, Robert Wright, and Sharon Moalem.

    Build a better defense against motivated, organized, professional attacks

    Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data—even from organizations without a direct Internet connection—this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.

    Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level—and this book shows you how to defend your high security network.

    • Use targeted social engineering pretexts to create the initial compromise
    • Leave a command and control structure in place for long-term access
    • Escalate privilege and breach networks, operating systems, and trust structures
    • Infiltrate further using harvested credentials while expanding control

    Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

    What once seemed nearly impossible has turned into reality. The number of available Internet addresses is now nearly exhausted, due mostly to the explosion of commercial websites and entries from an expanding number of countries. This growing shortage has effectively put the Internet community--and some of its most brilliant engineers--on alert for the last decade.Their solution was to create IPv6, a new Internet standard which will ultimately replace the current and antiquated IPv4. As the new backbone of the Internet, this new protocol would fix the most difficult problems that the Internet faces today--scalability and management. And even though IPv6's implementation has met with some resistance over the past few years, all signs are now pointing to its gradual worldwide adoption in the very near future. Sooner or later, all network administrators will need to understand IPv6, and now is a good time to get started.IPv6 Network Administration offers administrators the complete inside info on IPv6. This book reveals the many benefits as well as the potential downsides of this next-generation protocol. It also shows readers exactly how to set up and administer an IPv6 network.A must-have for network administrators everywhere, IPv6 Network Administration delivers an even-handed approach to what will be the most fundamental change to the Internet since its inception. Some of the other IPv6 assets that are covered include:
    • routing
    • integrated auto-configuration
    • quality-of-services (QoS)
    • enhanced mobility
    • end-to-end security
    IPv6 Network Administration explains what works, what doesn't, and most of all, what's practical when considering upgrading networks from the current protocol to IPv6.
    End-to-End QoS Network Design

    Quality of Service for Rich-Media & Cloud Networks Second Edition

    New best practices, technical strategies, and proven designs for maximizing QoS in complex networks

    This authoritative guide to deploying, managing, and optimizing QoS with Cisco technologies has been thoroughly revamped to reflect the newest applications, best practices, hardware, software, and tools for modern networks.

    This new edition focuses on complex traffic mixes with increased usage of mobile devices, wireless network access, advanced communications, and video. It reflects the growing heterogeneity of video traffic, including passive streaming video, interactive video, and immersive videoconferences. It also addresses shifting bandwidth constraints and congestion points; improved hardware, software, and tools; and emerging QoS applications in network security.

    The authors first introduce QoS technologies in high-to-mid-level technical detail, including protocols, tools, and relevant standards. They examine new QoS demands and requirements, identify reasons to reevaluate current QoS designs, and present new strategic design recommendations. Next, drawing on extensive experience, they offer deep technical detail on campus wired and wireless QoS design; next-generation wiring closets; QoS design for data centers, Internet edge, WAN edge, and branches; QoS for IPsec VPNs, and more.

    Tim Szigeti, CCIE No. 9794 is a Senior Technical Leader in the Cisco System Design Unit. He has specialized in QoS for the past 15 years and authored Cisco TelePresence Fundamentals.

    Robert Barton, CCIE No. 6660 (R&S and Security), CCDE No. 2013::6 is a Senior Systems Engineer in the Cisco Canada Public Sector Operation. A registered Professional Engineer (P. Eng), he has 15 years of IT experience and is primarily focused on wireless and security architectures.

    Christina Hattingh spent 13 years as Senior Member of Technical Staff in Unified Communications (UC) in Cisco’s Services Routing Technology Group (SRTG). There, she spoke at Cisco conferences, trained sales staff and partners, authored books, and advised customers.

    Kenneth Briley, Jr., CCIE No. 9754, is a Technical Lead in the Cisco Network Operating Systems Technology Group. With more than a decade of QoS design/implementation experience, he is currently focused on converging wired and wireless QoS.

    n Master a proven, step-by-step best-practice approach to successful QoS deployment

    n Implement Cisco-validated designs related to new and emerging applications

    n Apply best practices for classification, marking, policing, shaping, markdown, and congestion management/avoidance

    n Leverage the new Cisco Application Visibility and Control feature-set to perform deep-packet inspection to recognize more than 1000 different applications

    n Use Medianet architecture elements specific to QoS configuration, monitoring, and control

    n Optimize QoS in rich-media campus networks using the Cisco Catalyst 3750, Catalyst 4500, and Catalyst 6500

    n Design wireless networks to support voice and video using a Cisco centralized or converged access WLAN

    n Achieve zero packet loss in GE/10GE/40GE/100GE data center networks

    n Implement QoS virtual access data center designs with the Cisco Nexus 1000V

    n Optimize QoS at the enterprise customer edge

    n Achieve extraordinary levels of QoS in service provider edge networks

    n Utilize new industry standards and QoS technologies, including IETF RFC 4594, IEEE 802.1Q-2005, HQF, and NBAR2

    This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

    Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.
    Data Science gets thrown around in the press like it's magic. Major retailers are predicting everything from when their customers are pregnant to when they want a new pair of Chuck Taylors. It's a brave new world where seemingly meaningless data can be transformed into valuable insight to drive smart business decisions.

    But how does one exactly do data science? Do you have to hire one of these priests of the dark arts, the "data scientist," to extract this gold from your data? Nope.

    Data science is little more than using straight-forward steps to process raw data into actionable insight. And in Data Smart, author and data scientist John Foreman will show you how that's done within the familiar environment of a spreadsheet.

    Why a spreadsheet? It's comfortable! You get to look at the data every step of the way, building confidence as you learn the tricks of the trade. Plus, spreadsheets are a vendor-neutral place to learn data science without the hype.

    But don't let the Excel sheets fool you. This is a book for those serious about learning the analytic techniques, the math and the magic, behind big data.

    Each chapter will cover a different technique in a spreadsheet so you can follow along:

    • Mathematical optimization, including non-linear programming and genetic algorithms
    • Clustering via k-means, spherical k-means, and graph modularity
    • Data mining in graphs, such as outlier detection
    • Supervised AI through logistic regression, ensemble models, and bag-of-words models
    • Forecasting, seasonal adjustments, and prediction intervals through monte carlo simulation
    • Moving from spreadsheets into the R programming language

    You get your hands dirty as you work alongside John through each technique. But never fear, the topics are readily applicable and the author laces humor throughout. You'll even learn what a dead squirrel has to do with optimization modeling, which you no doubt are dying to know.

    Master Wireshark to solve real-world security problems

    If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment.

    Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples.

    Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material.

    Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark.

    By the end of the book you will gain the following:

    • Master the basics of Wireshark
    • Explore the virtual w4sp-lab environment that mimics a real-world network
    • Gain experience using the Debian-based Kali OS among other systems
    • Understand the technical details behind network attacks
    • Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark
    • Employ Lua to extend Wireshark features and create useful scripts

    To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

    ©2021 GoogleSite Terms of ServicePrivacyDevelopersAbout Google|Location: United StatesLanguage: English (United States)
    By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.