Cisco Network Professional's Advanced Internetworking Guide (CCNP Series)

Sold by John Wiley & Sons
1
Free sample

Ideal for any IT professional who uses Cisco technologies on adaily basis, or anyone who is preparing for their Cisco CertifiedNetwork Professional (CCNP) certification.

The topics covered will be more in depth than otherintroductory-level books of similar topics, and will span fromlayer 2 technologies such as switching, STP, etherchannel, andtrunking, all the way to application layer security topics such asfirewall inspection and intrusion prevention systems. Items beingcovered in the middle will include all the common routing protocolsRIP, EIGRP, OSPF and BGP. Many other routing technologies and WANprotocols will be covered including Multicast, MPLS, Cable and DSL.Coverage of redundancy protocols such as HSRP, VRRP and GLBP willbe examined. A thorough coverage of convergence topics such as howvoice, video and wireless traffic affect the network, and what canbe done to improve the effects such as QOS and queuing.

This book is a key component for any IT professional preparingfor their CCNP certification, as it covers in-depth the topicstested on in all four CCNP exams:

  • Building Scalable Cisco Internetworks (642-901)
  • Building Cisco Multilayer Switched Networks (642-812)
  • Implementing Secure Converged Wide Area Networks (642-825)
  • Optimizing Converged Cisco Networks (642-485)

CD includes the exclusive Sybex Test Engine, with two PracticeCCNP exams, as well as author code files.

Note: CD-ROM/DVD and other supplementary materials arenot included as part of eBook file.

 

Read more

About the author

Patrick J. Conlan, CCNA, CCDA, CCNP, CCSP, is a senior staff instructor and consultant with GlobalNet Training, Inc. He focuses primarily on Cisco certification topics and also provides consulting services to large companies of all types. Patrick spent ten years in the U.S. Navy as a communications technician and IT instructor, where he taught numerous courses ranging from basic computer networking to advanced IP system integration and design. He also developed IT curriculum materials that the U.S. Navy still uses today.

Read more
5.0
1 total
Loading...

Additional Information

Publisher
John Wiley & Sons
Read more
Published on
Apr 20, 2009
Read more
Pages
750
Read more
ISBN
9780470522332
Read more
Read more
Best For
Read more
Language
English
Read more
Genres
Computers / Networking / General
Read more
Content Protection
This content is DRM protected.
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and documentaries. Since hisrelease from federal prison, in 1998, Mitnick has turned his lifearound and established himself as one of the most sought-aftercomputer security experts worldwide. Now, in The Art of Deception,the world's most notorious hacker gives new meaning to the oldadage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security,Mitnick explains why all the firewalls and encryption protocols inthe world will never be enough to stop a savvy grifter intent onrifling a corporate database or an irate employee determined tocrash a system. With the help of many fascinating true stories ofsuccessful attacks on business and government, he illustrates justhow susceptible even the most locked-down information systems areto a slick con artist impersonating an IRS agent. Narrating fromthe points of view of both the attacker and the victims, heexplains why each attack was so successful and how it could havebeen prevented in an engaging and highly readable style reminiscentof a true-crime novel. And, perhaps most importantly, Mitnickoffers advice for preventing these types of social engineeringhacks through security protocols, training programs, and manualsthat address the human element of security.
Hacker extraordinaire Kevin Mitnick delivers the explosiveencore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented fictionalizedcase studies that illustrated how savvy computer crackers use"social engineering" to compromise even the most technically securecomputer systems. Now, in his new book, Mitnick goes one stepfurther, offering hair-raising stories of real-life computerbreak-ins-and showing how the victims could have prevented them.Mitnick's reputation within the hacker community gave him uniquecredibility with the perpetrators of these crimes, who freelyshared their stories with him-and whose exploits Mitnick nowreveals in detail for the first time, including: A group of friends who won nearly a million dollars in LasVegas by reverse-engineering slot machinesTwo teenagers who were persuaded by terrorists to hack into theLockheed Martin computer systemsTwo convicts who joined forces to become hackers inside a TexasprisonA "Robin Hood" hacker who penetrated the computer systems ofmany prominent companies-andthen told them how he gainedaccessWith riveting "you are there" descriptions of real computerbreak-ins, indispensable tips on countermeasures securityprofessionals need to implement now, and Mitnick's own acerbiccommentary on the crimes he describes, this book is sure to reach awide audience-and attract the attention of both law enforcementagencies and the media.
YouTube is the world’s largest video sharing website. It was created in 2005 and was taken over by Google in 2006. Beginning in 2008, YouTube started a Korean language service. 

People around the world have access to enjoy YouTube with the exception of a few countries including China. There are three main components that constitute the YouTube ecosystem: the users who are the members of the YouTube communities and the consumers of YouTube videos; the creators who produce videos; and the advertisers who make the money flow within the YouTube ecosystem.

YouTube is open to anybody who wants to create and upload videos, and all users are equally eligible to become creators. YouTube is operating the YouTube partnership program to encourage users to become creators of videos.

This is YouTube reference book proofread by the person who is currently in charge of the YouTube partnership program. 

This book explains everything that you need to know about YouTube if you want to become a creator and manage your own channel; how to sign up to become a YouTuber; how to upload videos; how to manage your channel; how to monetize YouTube videos; and the knowhow to generate more profits. All lessons about basic YouTube features are accompanied by “Follow These Simple Steps,” where you are encouraged to practice what you have learned. 

The book also includes a “Special Page” section, where some of the popular YouTube channels are introduced by different categories, in addition to ways on how to use YouTube to promote businesses and to protect your copyrights.

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.

Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing

©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.