Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Indianapolis, Ind.] : Que Pub. | Boston, Mass. :Safari Books Online,
    ISBN: 9780789737120 , 0789737124
    Language: English
    Pages: xiv, 528 p , ill. , 23 cm. +
    Edition: 3rd ed.
    Keywords: Electronic data processing personnel ; Certification ; Computer networks ; Examinations ; Study guides ; Electronic books ; local
    Abstract: CCNA® Exam Cram Third Edition Michael Valentine Andrew Whitaker Exam 640-802 The Smart Way to Study™ "The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an excellent guide that will definitely reinforce your knowledge of Cisco networking and prepare you for the CCNA." -Vincent Gov, CCNA In this book, you learn how to: Develop perfect fluency in subnetting Connect Cisco® equipment, make initial configurations, and connect to other devices to build a network Configure Cisco routers and back up and restore your Cisco IOS® Software configurations Explain the functions of Ethernet switching and the Spanning Tree Protocol (STP) Configure PPP and Frame Relay for WAN connectivity Understand and apply wireless LAN concepts Mitigate network security threats and secure network devices Build scalable routed systems using dynamic routing protocols including RIPv2, EIGRP, and OSPF Create VLANs and distribute VLAN information using the VLAN Trunking Protocol (VTP) Filter traffic from one network to another with access control lists (ACL) Understand and implement IPv6 Deploy Network Address Translation (NAT) WRITTEN BY CCNA Experts! Mike Valentine has been in the IT field for 12 years, focusing on network design and implementation. He is currently a Cisco trainer with Skyline Advanced Technology Services and specializes in Cisco Unified Communications instruction as well as CCNA® and CCNP® courses. Andrew Whitaker is the director of enterprise InfoSec and networking and senior training instructor for Training Camp. He has achieved several Cisco certifications and has written on several Cisco topics. CD features new simulation questions! This book includes a CD-ROM that features: Complete coverage of CCNA exam objectives Realistic exam questions for effective practice Detailed explanations of correct and incorrect answers Multiple exam modes Flash Card format An electronic copy of the book
    Note: Includes bibliographical references (p. [475]-477) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321620637 , 0321620631
    Language: English
    Pages: xix, 279 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Computer networks ; Security measures ; Computer hackers ; Electronic books ; local
    Abstract: The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's a book that brings together start-to-finish information about today's most widespread chained exploits-both how to perform them and how to prevent them. Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today's most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering. Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today's most effective countermeasures- both technical and human. Coverage includes: Constructing convincing new phishing attacks Discovering which sites other Web users are visiting Wreaking havoc on IT security via wireless networks Disrupting competitors' Web sites Performing-and preventing-corporate espionage Destroying secure files Gaining access to private healthcare records Attacking the viewers of social networking pages Creating entirely new exploits and more Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council's Instructor of Excellence Award. Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council's Instructor of Excellence Award. Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad. informit.com/aw Cover photograph © Corbis / Jupiter Images $49.99 US $59.99 CANADA
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781587141485 , 1587141485
    Language: English
    Pages: 1 online resource (xxii, 641 p.) , ill.
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    Keywords: Routers (Computer networks) ; Software configuration management ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: Fast answers and reliable solutions for all widely-used Cisco router features - all in one time-saving guide Organized for maximum efficiency: describes actual commands and options in the sequence they should be used Helps network pros eliminate time-consuming documentation searches Extensive updates: IPv6, MPLS, AutoQoS, SIP, MGCP, voice troubleshooting, VPNs, security, and more "At-a-glance" illustrations offer fast answers and easy double-checking Locating reliable Cisco router configuration command information can require extensive, time-consuming research. Cisco Router Configuration Handbook, 2/e , is the solution: a day-to-day reference to the most widely used Cisco router features and configurations. Straight from Cisco experts, it covers every facet of router configuration, including fundamentals, network protocols, packet processing, voice/telephony, security, and more. This book is organized for maximum efficiency. Related features are covered together, and features and options are covered in the sequence in which they are typically used. Shaded tabs mark each section for quick reference. Information on each feature, technology, or protocol is presented in a concise one- or two-page format, with sections presenting quick facts, configuration information, and step-by-step examples, including both required and optional commands. Simply put, this book brings together all the Cisco routing configuration information most network professionals will ever need - and organizes it more efficiently than any other resource.
    Note: Previous ed. published under title: Cisco field manual : router configuration, 2002. - Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que Pub. | Boston, Mass. :Safari Books Online,
    ISBN: 9780789737151 , 0789737159
    Language: English
    Pages: ix, 358 p , ill. , 23 cm. +
    Edition: 3rd ed.
    Keywords: Electronic data processing personnel ; Certification ; Computer networks ; Examinations ; Study guides ; Electronic books ; local
    Abstract: In this book, you learn how to: Develop perfect fluency in subnetting Understand the OSI model and the Cisco three-layer hierarchical model Connect Cisco equipment, make initial configurations, and connect to other devices to build a network Configure Cisco routers and back up and restore your Cisco IOS Software configurations Implement, verify, and troubleshoot a small, switched network Configure and verify a basic WAN serial connection Understand and apply wireless LAN (WLAN) concepts Mitigate network security threats and secure network devices Configure static routes and RIPv2 Connect a small office to the Internet WRITTEN BY CCNA/CCENT Experts! Michael Valentine has been in the IT field for 12 years, focusing on network design and implementation. He is currently a Cisco trainer with Skyline Advanced Technology Services and specializes in Cisco Unified Communications instruction as well as CCNA and CCNP courses. Andrew Whitaker is the director of enterprise InfoSec and networking and senior training instructor for Training Camp. He has achieved several Cisco certifications and has written on several Cisco topics. This book includes a CD-ROM that features: Complete coverage of CCENT exam objectives Realistic exam questions for effective practice Detailed explanations of correct and incorrect answers Multiple exam modes Flash Card format An electronic copy of the book
    Note: Includes bibliographical references (p. [323]-325) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...