Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company  (11)
  • Safari, an O'Reilly Media Company.  (2)
  • [Erscheinungsort nicht ermittelbar] : Cisco Press  (13)
  • Electronic videos ; local  (13)
  • Computer programs
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: IP Subnetting Video and Practice Questions Kit Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; Title from title screen (viewed February 12, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 12 hr., 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Overview IP Subnetting from Beginning to Mastery
    Note: Online resource; Title from title screen (viewed February 9, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 56 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 6+ Hours of Video Instruction Overview Kubernetes in the Data Center LiveLessons focuses on using the fundamental Kubernetes components and learning how they are installed. The goal is to help you understand what the components are so when troubles arise you have the tools to be able to fix them. The course is primarily made up of instruction and demonstrations delivered by a seasoned expert, Vallard Benincosa. Vallard, who has experience working with Cisco and IBM, is currently a senior engineer at a small startup called Zenabi. He helped develop a Kubernetes certification for the Linux foundation and has been using Kubernetes since 2015. Kubernetes in the Data Center LiveLessons walks you through Kubernetes on prem, hardware, and Linux configurations, installation, applications storage, and networking. It also gets in to running Kubernetes, as well as monitoring and securing it. The course covers a wide gambit of technical areas and explores many of the exciting Kubernetes opensource add-ons to make your system more complete. This includes Kubernetes, Docker, Ubuntu Linux, Minio, Ceph, and many networking concepts such as overlay networks, service meshes, load balancing, ingress controllers, and proxies. About the Instructor Vallard Benincosa a senior engineer at a small startup called Zenabi. Prior to joining Zenabi in February 2019, he was a software solutions architect with Cisco for 7 years. Prior to Cisco, he started a company that specialized in bare-metal operating system installations for Linux clusters. He also has experience with IBM designing, implementing, and managing some of the largest bare-metal high-performance computing clusters in the world. He helped develop a Kubernetes certification for the Linux foundation and has been using Kubernetes since 2015. In his day job, he works on data ingest systems for analytics, advertising, and recommendation engines, using Kubernetes in the cloud and on prem. Skill Level Intermediate/Advanced Learn How To Architect a Kubernetes cluster on bare metal in the data center. Install Kubernetes on bare-metal servers. Pick and deploy the correct overlay network for your Kubernetes cluster. You will become familiar with several options and understand the trade-offs between different solutions. Understand and deploy distributed storage solutions with Kubernetes to offer persistent volumes. You will then use these to deploy stateful services. Monitor and troubleshoot your Kubernetes cluster. Run a...
    Note: Online resource; Title from title screen (viewed September 30, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Lesson 1: OSPF in Context Learning objectives 1.1 Routing Protocol Types 1.2 The Distance Vector Approach 1.3 The Link State Approach 1.4 Link State Adjacencies and the Collection of Link State Data 1.5 Dijkstra's SPF - An Introduction 1.6 Dijkstra's SPF - Some Complexities Lesson 2: OSPF Concepts Learning objectives 2.1 The Communication Blocks of OSPF 2.2 Establishing Relationships between OSPF Devices 2.3 Introducing the Different Types of Link State Information Blocks 2.4 Starting to Build the OSPF Link State Database 2.5 Lesson 2 Lab Lesson 3: OSPF Hierarchy (How Areas Function) 3.0 Learning objectives 3.1 Introduction to OSPF Areas 3.2 OSPF Route Types and the Initial Building of the Routing Table 3.3 Multi-area Link State Information Blocks 3.4 Discussing the Different Types of OSPF Area 3.5 Moving OSPF Concepts to Reality 3.6 Lesson 3 Lab Lesson 4: OSPF Security Considerations 4.0 Learning objectives 4.1 Discussing the Different Security Threat Vectors and Motivations 4.2 Reviewing the Methods that Enable Secure OSPF Communication and Interaction 4.3 Lesson 4 Lab Lesson 5: Optimizing OSPF Operations 5.0 Learning objectives 5.1 Accelerating OSPF Convergence 5.2 Controlling OSPF LSA Generation and Propagation 5.3 Altering Shortest Path First Behavior 5.4 Reducing the Size of the LSDB 5.5 Reducing the Effects of Restarts on OSPF 5.6 Lesson 5 Lab Summary
    Note: Online resource; Title from title screen (viewed November 29, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 33 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 6 Hours of Video Instruction Description Quickly gain a deep understanding of blockchain technology to drive revenue in your organization. Overview Architecting Blockchain Solutions LiveLessons covers blockchain basics, ledgers, and several use-case scenarios in detail. Learn the main technologies for supporting blockchain use cases and how these technologies work with other technologies. Joe Holbrook discusses use cases that cover financial, insurance, science, technology, and other industries that enable you to gain a full grasp of blockchain capabilities. This course starts out by covering blockchain fundamentals, including how a blockchain compares to traditional infrastructure and how Ethereum is used as a blockchain platform. It then discusses the important factors of blockchain architectures for which every organization should have a concise understanding, including blockchain nodes, blockchain networking, and layers. Holbrook demonstrates options for running blockchain on the various public cloud providers, including AWS, GCP, Azure, and IBM, and details numerous blockchain business models and best practices for software lifecycles. He covers significant blockchain development and planning as well as several blockchain development challenges. The course finishes with a discussion of providing blockchain solutions based on customer requirements. Topics include Lesson 1: Blockchain Basics Lesson 2: Understanding Ethereum Lesson 3: Blockchain Platform Architectures Lesson 4: Blockchain Business Models Lesson 5: Defining Business Models (B2B) Lesson 6: Defining Business Models (B2C) Lesson 7: Defining Business Models (G2C) Lesson 8: Blockchain Costing Lesson 9: Blockchain Solution Development Lesson 10: Blockchain Design Best Practices Lesson 11: SDLC Lesson 12: Building the Blockchain Lesson 13: Blockchain Pre-Sales Cycle Lesson 14: Blockchain Demand About the Instructor Joe Holbrook has been in the IT field since 1993, when he was exposed to several HPUX systems on board a U.S. Navy flagship. He has migrated from the UNIX world to storage area networking (SAN), enterprise virtualization, and cloud architectures, and now specializes in blockchain and cryptocurrency. He previously worked for numerous companies such as HDS, 3PAR, Brocade, HP, EMC, Northrup Grumman, ViON, Ibasis.net, Chematch.com, SAIC, and Siemens Nixdorf. Currently he works as a subject matter expert specializing in enterprise cloud and blockchain technologies. He is the o...
    Note: Online resource; Title from title screen (viewed August 21, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 17 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 6+ Hours of Video Instruction More than 6 hours of video instruction to help you understand, deploy, and manage, basic IP Multicast networks. Overview Fundamentals of IP Multicast provides the Network Engineer with a basic set of IP Multicast “survival tools” to go alone and unafraid into the world of IP Multicast and deal with much of what IP Multicast throws at them. Award-winning IP Multicast presenter, Beau Williamson, debunks the myth that IP Multicast is a scary and difficult-to-understand technology. Through network topology presentations, configuration scenarios, guidance through some common mistakes that network engineers make, deployment recommendations, and know-how, Beau paints IP Multicast as an approachable networking solution. About the Instructor Beau Williamson , CCIE Emeritus, (aka “Mr. Multicast”) is a Principle Network Engineer whose area of expertise is General IP Routing and IP Multicast. A patent holder and veteran in the computer and networking technology fields for well over 30 years, Beau has taught and consulted on IP Multicast all over the world as a Cisco Systems employee. He is the author of the highly acclaimed Cisco Press book, Developing IP Multicast Networks . Besides being an accomplished network engineer, Mr. Williamson prides himself at being able to translate, teach, and mentor other engineers on complex networking topics. In fact, many of Mr. Williamson’s presentations have been recorded and are used as technical speaker training material by Power Speaking, Inc. on how to give top-notch technical presentations. He has won numerous awards for speaking, including Five Time Cisco Networkers Top “Power Session” Presenter and Three Time Cisco Networkers Top “Breakout Session” Presenter. He is a CiscoLive Distinguished Speaker. Skill Level Intermediate Learn How To Map IPv4 MAC addresses Implement Multicast forwarding, routing, and tree building Comprehend the IGMPv3 protocol with a focus on joining, staying on, and leaving a source Multicast tree Configure and deploy Source Specific Multicast (SSM) in your network Understand and configure Bidirectional (BiDir) Multicast in your network Understand and configure Any-Source Multicast (ASM) in your network Comprehend Multiprotocol BGP (MP-BGP), Multicast Source Discovery Protocol (MSDP), and basic interdomain Multicast Forwarding Understand Cisco Auto-RP, IETF Bootstrap Router (BSR), Anycast-RP options Comprehend Bit-Indexed Explicit Replication (BIER) concep...
    Note: Online resource; Title from title screen (viewed October 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 17 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 8+ Hours of Video Instruction Overview TCP/IP Fundamentals LiveLessons provides more than 8 hours of video learning that encompasses an in-depth exploration of the foundational concepts of the TCP/IP protocols as used today in modern enterprise and cloud provider networking. This course is specifically geared toward younger adult learners as well as individuals who are transitioning into a new career in information It is a great first taste into networking and internetworking, and serves as a great prequel to any Network+ or CCNA-type course. The course offers a clear and easily digestible introduction and explanation of the protocols, services, and behaviors of the modern TCP/IP implementation. Michael Shannon uses slides, interactive board work, and whiteboards and provides several demonstrations of the technology on modern Windows, Linux, and Amazon Web Service environments. Michael J. Shannon has more than 25 years of IT and information system experience working as an employee, contractor, and consultant for companies like MCI, Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, Skillsoft, and of course Pearson. He is uniquely qualified to provide detailed explanations to help you understand exactly what is happening under the hood when accessing the Internet, whether it’s using a corporate PC, laptop, mobile device, or even your web-enabled alarm! This course is a great first step in the process for entry-level IT certifications such as CompTIA Network+, A+, Cisco CCNA, Juniper, PAN, and cloud services like Google Cloud Platform and Amazon Web Services. About the Instructor Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT he has worked as an employee, contractor, and consultant for numerous companies, including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, Pearson, and Skillsoft. Skill Level Beginner/entry-level What You Will Learn A complete overview of all TCP/IP fundamentals About ground-level Internet technology and general networking Who Should Take This Course The target audience for this course consists of anyone who wants to learn about the foundation of the Internet and the World Wide Web. It is a great introductory course and an excellen...
    Note: Online resource; Title from title screen (viewed December 26, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 26 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 5+ Hours of Video Instruction More than 5 hours of video instruction to help you perform ethical hacking, penetration testing, and security posture assessment through compromising, analyzing, and mitigating web application vulnerabilities. Hacking Web Applications (The Art of Hacking Series) LiveLessons provides step-by-step, real-life scenarios for performing security assessments (penetration testing) through web application vulnerabilities. This course shows you how to set up a penetration testing lab for web app pen testing where you will learn how to perform reconnaissance and profiling. After these initial steps, you will learn to exploit many vulnerabilities including authentication, session management, injection-based, cross-site scripting, cross-site request forgery, and cryptographic implementations. You will also learn how to assess and perform application programming interface (API) attacks, client-side attacks, and additional web application vulnerability attacks. The primary objective of this course is not to perform malicious attacks, but rather to provide you with step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment as it pertains to web applications. Through the skills explored throughout the course lessons, you will learn the various concepts associated with many different leading-edge offensive security skills in the industry. The course is full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, and cyber security veteran Omar Santos provides critical information for anyone interested in pursuing an ethical hacking career or simply keeping abreast of evolving threats to keep the web applications of your or your clients’ networks secure from vulnerabilities. Skill Level Intermediate networking and basic hacking knowledge Learn How To Assess everything you need to know to perform ethical hacking and penetration testing on web applications Understand web application protocols, HTTP Request/Response, session management and cookies, DevOps, cloud services, web application frameworks, and Docker containers to better assess web application vulnerabilities Build your own web application lab for penetration testing Profile and perform passive and active reconnaissance on web applications through several techniques and applications Exploit authentication and session management responsibilities Exploit and mitigate injection-based command, SQL...
    Note: Online resource; Title from title screen (viewed October 26, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 36 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: More than 3.5 hours of video instruction to help you learn the skills necessary to perform advanced penetration testing in an enterprise networking environment. Overview Enterprise Penetration Testing and Continuous Monitoring LiveLesson s , part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engineering, and network and vulnerability scanning. You also learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career or simply keeping abreast of evolving threats to keep your enterprise network secure from vulnerabilities. Topics include * Introduction to enterprise penetration testing and continuous monitoring * External and internal reconnaissance * Enterprise social engineering * Network and vulnerability scanning * Web app testing * Internal testing * Privilege escalation * Enterprise secrets, post exploitation, and data exfiltration * Cloud services * Reporting and continuous evaluation Learn How To * Plan, build, and run a Red Team to conduct enterprise hacking * Probe for enterprise vulnerabilities using passive/active reconnaissance, social engineering, and network and vulnerability scanning * Target hosts and deploy tools to compromise web apps * Infiltrate the network, scan vulnerable targets and open-source software, and host a “capture-the-flag” event to identify enterprise vulnerabilities * Escalate network access privilege using proven methods and tools * Perform password cracking, compromise network and user credentials, exfiltrate sensitive data, and cover your tracks in the process * Test cloud services for vulnerabilities * Conduct reports for penetration testing ev...
    Note: Online resource; Title from title screen (viewed May 8, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780134540221 , 0134540220
    Language: English
    Pages: 1 online resource (1 video file, approximately 55 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: The supplemental video for the product CCNA Routing and Switching ICND2 200-105 Official Cert Guide
    Note: Online resource; Title from title screen (viewed April 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780134540238 , 0134540239
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 24 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: The supplemental video for the product CCENT/CCNA ICND1 100-105 Official Cert Guide
    Note: Online resource; Title from title screen (viewed April 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 22 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Description About the Author: Author
    Note: Online resource; Title from title screen (viewed March 21, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780132984904
    Language: English
    Pages: 1 online resource (1 video file, approximately 52 min.)
    Edition: 3rd edition
    Keywords: Electronic videos ; local
    Abstract: The Safari version of the CCENT/CCNA 640-822 Official Cert Guide, Third Edition contains more than an hour of video training from the author on the subject of subnetting. The videos are divided into eight lessons: Part I: Finding the Subnet Number Video 1: Example 1 Video 2: Example 2 Video 3: Example 3 Part II: Finding the Broadcast and Range of Addresses Video 4: Example 1 Video 5: Example 2 Video 6: Example 3 Part III: Finding all Subnets Video 7: With Less Than Eight Subnet Bits Video 8: With More than Eight Subnet Bits
    Note: Online resource; Title from title screen (viewed October 11, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...