Computer certification Books
Pearson Education CC Certified in Cybersecurity Cert Guide
Book SynopsisMari Galloway, a best-selling author of Securing Our Future and cyber professional, is the CEO and a founding board member for the Women's Society of Cyberjutsu (WSC), one of the fastest growing 501(c)3 nonprofit cybersecurity communities dedicated to bringing more women and girls to cyber. WSC provides its members with the resources and support required to enter and advance as cybersecurity professionals. Mari began her career with Accenture, where she excelled as a network engineer. Mari is also a 2023 Presidential Lifetime Award winner and the inaugural ISC2 Diversity Award winner for 2019. With over 15 years in IT and cybersecurity, her experience spans network design, security architecture, risk assessments, vulnerability management, incident response, and policy development across government and commercial industries. Mari holds a variety of technical and management certifications (CISSP, GIAC, CCNA, etc.) as well as a Bachelor of Busine
£29.99
John Wiley & Sons Inc AlcatelLucent Scalable IP Networks SelfStudy
Book SynopsisBy offering the new Service Routing Certification Program, Alcatel-Lucent is extending their reach and knowledge to networking professionals with a comprehensive demonstration of how to build smart, scalable networks. Serving as a ?course in a book? from Alcatel-Lucent?the world leader in designing and developing scalable systems?this resource pinpoints the pitfalls to avoid when building scalable networks, examines the most successful techniques available for engineers who are building and operating IP networks, and provides overviews of the Internet, IP routing and the IP layer, and the practice of opening the shortest path first.
£51.75
Pearson Education (US) vSphere 6 Foundations Exam Official Cert Guide
Book Synopsis Bill Ferguson, VCI 3, 4, 5, 6; VCP6-DCV, VCP6-NV; CCSI; and MCT Alumni has been in the computer industry for more than 20 years. Originally in technical sales and IT consulting with Sprint, he made his transition to Certified Technical Trainer in 1997 with ExecuTrain. He now runs his own company, Parallel Connections, as an independent contractor and consultant based in Birmingham, Alabama, working worldwide for most of the national training companies and some regional training companies. In addition, he has written and produced many technical training videos and books. Bill's aspiration is as follows: My job is to understand the material so well that I can make it easier for others to learn than it was for me to learn. Toward that end, I strive to provide an effective learning environment whether in person, in print, or online.
£34.02
Pearson Education (US) CompTIA Security SY0501 Exam Cram
Book SynopsisCompTIA''s Security+ is the #1 international vendor-neutral baseline security certification. In 2017, CompTIA is releasing a thoroughly revised certification exam. CompTIA Security+ Exam Cram, Fifth Edition has been thoroughly updated to prepare candidates for the new exam, using the proven Exam Cram method of study. As with all Exam Cram books, it includes: Chapters that map directly to the exam objectives Comprehensive foundational learning on all topics covered on the exam An extensive collection of practice questions Access to the Pearson Test Prep practice test software that provides real-time practice and feedback, online or offline The Cram Sheet tear-out card
£26.13
John Wiley & Sons Inc OCA Oracle Certified Associate Java SE 8
Book SynopsisFull coverage of functional programming and all OCA Java Programmer exam objectives OCA, Oracle Certified Associate Java SE 8 Programmer I Study Guide, Exam 1Z0-808 is a comprehensive study guide for those taking the Oracle Certified Associate Java SE 8 Programmer I exam (1Z0-808).Table of ContentsIntroduction xxi Assessment Test xxxi Chapter 1 Java Building Blocks 1 Understanding the Java Class Structure 2 Fields and Methods 2 Comments 4 Classes vs. Files 5 Writing a main() Method 6 Understanding Package Declarations and Imports 9 Wildcards 10 Redundant Imports 11 Naming Conflicts 12 Creating a New Package 13 Code Formatting on the Exam 16 Creating Objects 16 Constructors 17 Reading and Writing Object Fields 18 Instance Initializer Blocks 18 Order of Initialization 19 Distinguishing Between Object References and Primitives 20 Primitive Types 20 Reference Types 24 Key Differences 25 Declaring and Initializing Variables 25 Declaring Multiple Variables 26 Identifiers 27 Understanding Default Initialization of Variables 29 Local Variables 29 Instance and Class Variables 30 Understanding Variable Scope 31 Ordering Elements in a Class 34 Destroying Objects 36 Garbage Collection 36 finalize() 38 Benefits of Java 39 Summary 40 Exam Essentials 41 Review Questions 42 Chapter 2 Operators and Statements 51 Understanding Java Operators 52 Working with Binary Arithmetic Operators 53 Arithmetic Operators 53 Numeric Promotion 55 Working with Unary Operators 57 Logical Complement and Negation Operators 57 Increment and Decrement Operators 58 Using Additional Binary Operators 60 Assignment Operators 60 Compound Assignment Operators 62 Relational Operators 63 Logical Operators 64 Equality Operators 65 Understanding Java Statements 66 The if-then Statement 67 The if-then-else Statement 68 The switch Statement 72 The while Statement 76 The do-while Statement 78 The for Statement 80 Understanding Advanced Flow Control 86 Nested Loops 87 Adding Optional Labels 87 The break Statement 88 The continue Statement 90 Summary 92 Exam Essentials 92 Review Questions 94 Chapter 3 Core Java APIs 101 Creating and Manipulating Strings 102 Concatenation 102 Immutability 104 The String Pool 105 Important String Methods 105 Method Chaining 110 Using the StringBuilder Class 111 Mutability and Chaining 112 Creating a StringBuilder 113 Important StringBuilder Methods 114 StringBuilder vs. StringBuffer 117 Understanding Equality 117 Understanding Java Arrays 119 Creating an Array of Primitives 119 Creating an Array with Reference Variables 121 Using an Array 123 Sorting 124 Searching 125 Varargs 126 Multidimensional Arrays 126 Understanding an ArrayList 129 Creating an ArrayList 129 Using an ArrayList 130 Wrapper Classes 134 Autoboxing 136 Converting Between array and List 136 Sorting 138 Working with Dates and Times 138 Creating Dates and Times 138 Manipulating Dates and Times 142 Working with Periods 145 Formatting Dates and Times 148 Parsing Dates and Times 151 Summary 151 Exam Essentials 152 Review Questions 153 Chapter 4 Methods and Encapsulation 165 Designing Methods 166 Optional Specifiers 168 Return Type 169 Method Name 170 Parameter List 171 Optional Exception List 171 Method Body 171 Working with Varargs 172 Applying Access Modifiers 173 Private Access 173 Default (Package Private) Access 175 Protected Access 176 Public Access 180 Designing Static Methods and Fields 181 Calling a Static Variable or Method 182 Static vs. Instance 183 Static Variables 185 Static Initialization 186 Static Imports 187 Passing Data Among Methods 188 Overloading Methods 191 Creating Constructors 196 Default Constructor 197 Overloading Constructors 199 Final Fields 202 Order of Initialization 202 Encapsulating Data 205 Creating Immutable Classes 207 Writing Simple Lambdas 208 Lambda Example 209 Lambda Syntax 211 Predicates 214 Summary 215 Exam Essentials 216 Review Questions 218 Chapter 5 Class Design 233 Introducing Class Inheritance 234 Extending a Class 235 Applying Class Access Modifiers 237 Creating Java Objects 237 Defining Constructors 238 Calling Inherited Class Members 244 Inheriting Methods 246 Inheriting Variables 257 Creating Abstract Classes 259 Defining an Abstract Class 260 Creating a Concrete Class 262 Extending an Abstract Class 263 Implementing Interfaces 266 Defining an Interface 267 Inheriting an Interface 269 Interface Variables 273 Default Interface Methods 274 Static Interface Methods 278 Understanding Polymorphism 279 Object vs. Reference 281 Casting Objects 282 Virtual Methods 284 Polymorphic Parameters 285 Polymorphism and Method Overriding 287 Summary 288 Exam Essentials 289 Review Questions 291 Chapter 6 Exceptions 299 Understanding Exceptions 300 The Role of Exceptions 300 Understanding Exception Types 302 Throwing an Exception 304 Using a try Statement 305 Adding a finally Block 307 Catching Various Types of Exceptions 309 Throwing a Second Exception 311 Recognizing Common Exception Types 313 Runtime Exceptions 314 Checked Exceptions 317 Errors 317 Calling Methods That Throw Exceptions 318 Subclasses 319 Printing an Exception 321 Summary 323 Exam Essentials 324 Review Questions 325 Appendix A Answers to Review Questions 333 Chapter 1: Java Building Blocks 334 Chapter 2: Operators and Statements 336 Chapter 3: Core Java APIs 339 Chapter 4: Methods and Encapsulation 342 Chapter 5: Class Design 346 Chapter 6: Exceptions 349 Appendix B Study Tips 353 Studying for the Test 354 Creating a Study Plan 354 Creating and Running Sample Applications 355 Taking the Test 359 Understanding the Question 359 Applying Process of Elimination 362 Optimizing Your Time 364 Getting a Good Night’s Rest 366 Index 367
£37.50
John Wiley & Sons Inc CISA Certified Information Systems Auditor Study
Book SynopsisThe ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing.Table of ContentsIntroduction xix Assessment Test xlii Chapter 1 Secrets of a Successful Auditor 1 Understanding the Demand for IS Audits 2 Executive Misconduct 3 More Regulation Ahead 5 Basic Regulatory Objective 7 Governance is Leadership 8 Three Types of Data Target Different Uses 9 Audit Results Indicate the Truth 10 Understanding Policies, Standards, Guidelines, and Procedures 11 Understanding Professional Ethics 14 Following the ISACA Professional Code 14 Preventing Ethical Conflicts 16 Understanding the Purpose of an Audit 17 Classifying General Types of Audits 18 Determining Differences in Audit Approach 20 Understanding the Auditor’s Responsibility 21 Comparing Audits to Assessments 21 Differentiating between Auditor and Auditee Roles 22 Applying an Independence Test 23 Implementing Audit Standards 24 Where Do Audit Standards Come From? 25 Understanding the Various Auditing Standards 27 Specific Regulations Defining Best Practices 31 Audits to Prove Financial Integrity 34 Auditor is an Executive Position 35 Understanding the Importance of Auditor Confidentiality 35 Working with Lawyers 36 Working with Executives 37 Working with IT Professionals 37 Retaining Audit Documentation 38 Providing Good Communication and Integration 39 Understanding Leadership Duties 39 Planning and Setting Priorities 40 Providing Standard Terms of Reference 41 Dealing with Conflicts and Failures 42 Identifying the Value of Internal and External Auditors 43 Understanding the Evidence Rule 43 Stakeholders: Identifying Whom You Need to Interview 44 Understanding the Corporate Organizational Structure 45 Identifying Roles in a Corporate Organizational Structure 45 Identifying Roles in a Consulting Firm Organizational Structure 47 Summary 49 Exam Essentials 49 Review Questions 52 Chapter 2 Governance 57 Strategy Planning for Organizational Control 61 Overview of the IT Steering Committee 64 Using the Balanced Scorecard 69 IT Subset of the BSC 74 Decoding the IT Strategy 74 Specifying a Policy 77 Project Management 79 Implementation Planning of the IT Strategy 90 Using COBIT 94 Identifying Sourcing Locations 94 Conducting an Executive Performance Review 99 Understanding the Auditor’s Interest in the Strategy 100 Overview of Tactical Management 100 Planning and Performance 100 Management Control Methods 101 Risk Management 105 Implementing Standards 108 Human Resources 109 System Life‐Cycle Management 111 Continuity Planning 111 Insurance 112 Overview of Business Process Reengineering 112 Why Use Business Process Reengineering 113 BPR Methodology 114 Genius or Insanity? 114 Goal of BPR 114 Guiding Principles for BPR 115 Knowledge Requirements for BPR 116 BPR Techniques 116 BPR Application Steps 117 Role of IS in BPR 119 Business Process Documentation 119 BPR Data Management Techniques 120 Benchmarking as a BPR Tool 120 Using a Business Impact Analysis 121 BPR Project Risk Assessment 123 Practical Application of BPR 125 Practical Selection Methods for BPR 127 Troubleshooting BPR Problems 128 Understanding the Auditor’s Interest in Tactical Management 129 Operations Management 129 Sustaining Operations 130 Tracking Actual Performance 130 Controlling Change 131 Understanding the Auditor’s Interest in Operational Delivery 131 Summary 132 Exam Essentials 132 Review Questions 134 Chapter 3 Audit Process 139 Understanding the Audit Program 140 Audit Program Objectives and Scope 141 Audit Program Extent 143 Audit Program Responsibilities 144 Audit Program Resources 144 Audit Program Procedures 145 Audit Program Implementation 146 Audit Program Records 146 Audit Program Monitoring and Review 147 Planning Individual Audits 148 Establishing and Approving an Audit Charter 151 Role of the Audit Committee 151 Preplanning Specific Audits 153 Understanding the Variety of Audits 154 Identifying Restrictions on Scope 156 Gathering Detailed Audit Requirements 158 Using a Systematic Approach to Planning 159 Comparing Traditional Audits to Assessments and Self‐Assessments 161 Performing an Audit Risk Assessment 162 Determining Whether an Audit is Possible 163 Identifying the Risk Management Strategy 165 Determining Feasibility of Audit 167 Performing the Audit 167 Selecting the Audit Team 167 Determining Competence and Evaluating Auditors 168 Ensuring Audit Quality Control 170 Establishing Contact with the Auditee 171 Making Initial Contact with the Auditee 172 Using Data Collection Techniques 174 Conducting Document Review 176 Understanding the Hierarchy of Internal Controls 177 Reviewing Existing Controls 179 Preparing the Audit Plan 182 Assigning Work to the Audit Team 183 Preparing Working Documents 184 Conducting Onsite Audit Activities 185 Gathering Audit Evidence 186 Using Evidence to Prove a Point 186 Understanding Types of Evidence 187 Selecting Audit Samples 187 Recognizing Typical Evidence for IS Audits 188 Using Computer‐Assisted Audit Tools 189 Understanding Electronic Discovery 191 Grading of Evidence 193 Timing of Evidence 195 Following the Evidence Life Cycle 195 Conducting Audit Evidence Testing 198 Compliance Testing 198 Substantive Testing 199 Tolerable Error Rate 200 Recording Test Results 200 Generating Audit Findings 201 Detecting Irregularities and Illegal Acts 201 Indicators of Illegal or Irregular Activity 202 Responding to Irregular or Illegal Activity 202 Findings Outside of Audit Scope 203 Report Findings 203 Approving and Distributing the Audit Report 205 Identifying Omitted Procedures 205 Conducting Follow‐up (Closing Meeting) 205 Summary 206 Exam Essentials 207 Review Questions 210 Chapter 4 Networking Technology Basics 215 Understanding the Differences in Computer Architecture 217 Selecting the Best System 221 Identifying Various Operating Systems 221 Determining the Best Computer Class 224 Comparing Computer Capabilities 227 Ensuring System Control 228 Dealing with Data Storage 230 Using Interfaces and Ports 235 Introducing the Open Systems Interconnection Model 237 Layer 1: Physical Layer 240 Layer 2: Data‐Link Layer 240 Layer 3: Network Layer 242 Layer 4: Transport Layer 248 Layer 5: Session Layer 249 Layer 6: Presentation Layer 250 Layer 7: Application Layer 250 Understanding How Computers Communicate 251 Understanding Physical Network Design 252 Understanding Network Cable Topologies 253 Bus Topologies 254 Star Topologies 254 Ring Topologies 255 Meshed Networks 256 Differentiating Network Cable Types 258 Coaxial Cable 258 Unshielded Twisted‐Pair (UTP) Cable 259 Fiber‐Optic Cable 260 Connecting Network Devices 260 Using Network Services 263 Domain Name System 263 Dynamic Host Configuration Protocol 265 Expanding the Network 266 Using Telephone Circuits 268 Network Firewalls 271 Remote VPN Access 276 Using Wireless Access Solutions 280 Firewall Protection for Wireless Networks 284 Remote Dial‐Up Access 284 WLAN Transmission Security 284 Achieving 802.11i RSN Wireless Security 287 Intrusion Detection Systems 288 Summarizing the Various Area Networks 291 Using Software as a Service (SaaS) 292 Advantages 292 Disadvantages 293 Cloud Computing 294 The Basics of Managing the Network 295 Automated LAN Cable Tester 295 Protocol Analyzers 295 Remote Monitoring Protocol Version 2 297 Summary 298 Exam Essentials 298 Review Questions 301 Chapter 5 Information Systems Life Cycle 307 Governance in Software Development 308 Management of Software Quality 310 Capability Maturity Model 310 International Organization for Standardization 312 Typical Commercial Records Classification Method 316 Overview of the Executive Steering Committee 317 Identifying Critical Success Factors 318 Using the Scenario Approach 318 Aligning Software to Business Needs 319 Change Management 323 Management of the Software Project 323 Choosing an Approach 323 Using Traditional Project Management 324 Overview of the System Development Life Cycle 327 Phase 1: Feasibility Study 331 Phase 2: Requirements Definition 334 Phase 3: System Design 339 Phase 4: Development 343 Phase 5: Implementation 354 Phase 6: Postimplementation 361 Phase 7: Disposal 363 Overview of Data Architecture 364 Databases 364 Database Transaction Integrity 368 Decision Support Systems 369 Presenting Decision Support Data 370 Using Artificial Intelligence 370 Program Architecture 371 Centralization vs. Decentralization 372 Electronic Commerce 372 Summary 374 Exam Essentials 374 Review Questions 376 Chapter 6 System Implementation and Operations 381 Understanding the Nature of IT Services 383 Performing IT Operations Management 385 Meeting IT Functional Objectives 385 Using the IT Infrastructure Library 387 Supporting IT Goals 389 Understanding Personnel Roles and Responsibilities 389 Using Metrics 394 Evaluating the Help Desk 396 Performing Service‐Level Management 397 Outsourcing IT Functions 398 Performing Capacity Management 399 Using Administrative Protection 400 Information Security Management 401 IT Security Governance 401 Authority Roles over Data 402 Data Retention Requirements 403 Document Physical Access Paths 404 Personnel Management 405 Physical Asset Management 406 Compensating Controls 408 Performing Problem Management 409 Incident Handling 410 Digital Forensics 412 Monitoring the Status of Controls 414 System Monitoring 415 Document Logical Access Paths 416 System Access Controls 417 Data File Controls 420 Application Processing Controls 421 Log Management 423 Antivirus Software 424 Active Content and Mobile Software Code 424 Maintenance Controls 427 Implementing Physical Protection 430 Data Processing Locations 432 Environmental Controls 432 Safe Media Storage 440 Summary 442 Exam Essentials 442 Review Questions 444 Chapter 7 Protecting Information Assets 449 Understanding the Threat 450 Recognizing Types of Threats and Computer Crimes 452 Identifying the Perpetrators 454 Understanding Attack Methods 458 Implementing Administrative Protection 469 Using Technical Protection 472 Technical Control Classification 472 Application Software Controls 474 Authentication Methods 475 Network Access Protection 488 Encryption Methods 489 Public‐Key Infrastructure 496 Network Security Protocols 502 Telephone Security 507 Technical Security Testing 507 Summary 509 Exam Essentials 509 Review Questions 511 Chapter 8 Business Continuity and Disaster Recovery 517 Debunking the Myths 518 Myth 1: Facility Matters 519 Myth 2: IT Systems Matter 519 From Myth to Reality 519 Understanding the Five Conflicting Disciplines Called Business Continuity 520 Defining Disaster Recovery 521 Surviving Financial Challenges 522 Valuing Brand Names 522 Rebuilding after a Disaster 523 Defining the Purpose of Business Continuity 524 Uniting Other Plans with Business Continuity 527 Identifying Business Continuity Practices 527 Identifying the Management Approach 529 Following a Program Management Approach 531 Understanding the Five Phases of a Business Continuity Program 532 Phase 1: Setting Up the BC Program 532 Phase 2: The Discovery Process 535 Phase 4: Plan Implementation 560 Phase 5: Maintenance and Integration 562 Understanding the Auditor Interests in BC/DR Plans 563 Summary 564 Exam Essentials 564 Review Questions 566 Appendix Answers to Review Questions 571 Index 591
£43.50
John Wiley & Sons Inc MCSA Windows Server 2016 Study Guide Exam 70740
Book Synopsis The bestselling MCSA 70-740 study guide, updated for the latest exam MCSA Windows Server 2016 Study Guide is your ultimate resource for Exam 70-740. Covering 100% of all exam objectives, this study guide goes far beyond concept review with real-world scenarios containing expert insights, chapter review questions, hands-on practice exercises while the Sybex interactive learning environment provides additional last minute review through practice exams, electronic flashcards, and searchable glossary. This new edition has been fully updated to align with the Windows Server 2016 exam, featuring authoritative coverage of installation, configuration, server roles, Hyper-V, core network services, Active Directory, Group Policy, security, remote access, disaster recovery, and more. The vast majority of servers around the world use Windows Server, and the 2016 release includes a host of new features and updates. This study guide has been updated to prepare you forTable of ContentsIntroduction xxi Assessment Test xxxii Chapter 1 Installing Windows Server 2016 1 Features and Advantages of Windows Server 2016 2 Planning the Windows Server 2016 Installation 6 Server Roles in Windows Server 2016 6 Migrating Roles and Features to Windows Server 2016 10 Deciding Which Windows Server 2016 Versions to Use 11 Deciding on the Type of Installation 13 NIC Teaming 16 Installing Windows Server 2016 17 Activating and Servicing Windows 31 Key Management Service 32 Automatic Virtual Machine Activation 33 Active Directory–Based Activation 34 Servicing Windows Server 2016 34 Using Windows Deployment Services 35 Preparing the WDS Server 36 WDS Server Requirements 36 Network Services 37 Installing the WDS Server Components 37 Preparing the WDS Client 39 Understanding Features On Demand 39 Summary 41 Video Resources 41 Exam Essentials 41 Review Questions 42 Chapter 2 Installing in the Enterprise 45 Understanding Automated Deployment Options 46 An Overview of the Microsoft Deployment Toolkit 2013 Update 2 47 An Overview of Unattended Installation 55 An Overview of the System Preparation Tool and Disk Imaging 57 Overview of the Windows Assessment and Deployment Kit 61 Windows Imaging and Configuration Designer 62 Summary of Windows Server 2016 Deployment Options 62 Deploying Unattended Installations 64 Using the System Preparation Tool to Prepare an Installation for Imaging 65 Using Windows Imaging and Configuration Designer (Windows ICD) to Create a Disk Image 67 Installing from a Disk Image 69 Using the Deployment Image Servicing and Management Tool 70 Using Windows System Image Manager to Create Answer Files 73 Microsoft Assessment and Planning (MAP) Toolkit 75 Understanding Hyper-V 77 What Is Virtualization? 78 Linux and FreeBSD Image Deployments 78 Summary 79 Video Resources 80 Exam Essentials 80 Review Questions 81 Chapter 3 Configuring Storage and Replication 85 Understanding File Systems 86 Resilient File System (ReFS) 87 NTFS 88 Storage in Windows Server 2016 91 Initializing Disks 91 Configuring Basic and Dynamic Disks 92 Managing Volumes 94 Storage Spaces in Windows Server 2016 95 Redundant Array of Independent Disks 96 Mount Points 99 Microsoft MPIO 100 Configuring iSCSI Target 102 Internet Storage Name Service 103 Implement Thin Provisioning and Trim 105 Fibre Channel 106 Network Attached Storage 106 Virtual Disk Service 106 Understanding Data Center Bridging 108 Configuring Permissions 109 Understanding SMB 109 Understanding NTFS 110 Understanding Shared Permissions 112 How NTFS Security and Shared Permissions Work Together 114 Understanding NFS Shares 116 Configuring Disk Quotas 118 Windows PowerShell 120 Using Server Manager 125 Booting from a VHD 126 Understanding Data Deduplication 127 Backup and Restoring Deduplicated Volumes 128 Installing and Enabling Data Deduplication 129 Monitoring Data Deduplicated 132 Summary 132 Video Resources 133 Exam Essentials 133 Review Questions 135 Chapter 4 Understanding Hyper-V 137 Hyper-V Overview 139 What Is Virtualization? 139 Hyper-V Features 140 Hyper-V Architecture 145 Hyper-V Requirements 147 Hyper-V Installation and Configuration 148 Install the Hyper-V Role 148 Hyper-V in Server Manager 151 Using Hyper-V Manager 152 Configure Hyper-V Settings 153 Manage Virtual Switches 154 Managing Virtual Hard Disks 157 Configuring Virtual Machines 162 Creating and Managing Virtual Machines 162 Linux and FreeBSD Image Deployments 175 PowerShell Commands 179 Summary 182 Video Resources 183 Exam Essentials 183 Review Questions 185 Chapter 5 Configuring High Availability 187 Components of High Availability 188 Achieving High Availability 189 High Availability Foundation 190 Understanding Network Load Balancing 191 NLB Requirements 193 Installing NLB Nodes 193 Upgrading an NLB Cluster 198 PowerShell Commands for a NLB Cluster 199 Achieving High Availability with Hyper-V 200 Implementing a Hyper-V Replica 201 Understanding Live Migration 205 Implementing Storage Migration 208 PowerShell Commands for Hyper-V High Availability 210 Summary 211 Video Resources 212 Exam Essentials 212 Review Questions 213 Chapter 6 Understanding Clustering 215 Achieving High Availability with Failover Clustering 216 Failover Clustering Requirements 218 Workgroup and Multi-domain clusters 219 Site-Aware, Stretched, or Geographically Dispersed Clusters (Geoclustering) 220 Cluster Quorum 220 Validating a Cluster Configuration 223 Creating a Cluster 228 Clustered Application Settings 231 Resource Properties 233 Windows Server 2016 Clustering Features 236 PowerShell Commands for Clustering 239 Implementing Storage Spaces Direct 241 The Benefits of Storage Spaces Direct 243 Deployment options 243 Requirements to Set Up Storage Spaces Direct 244 Storage Spaces Direct using Windows PowerShell 245 Summary 247 Video Resources 247 Exam Essentials 247 Review Questions 248 Chapter 7 Configuring Windows Containers 251 Understanding Windows Containers 252 Container Terminology 253 Install and Configure Server Containers 253 Install and Configure Windows Containers 260 Tagging an Image 265 Uninstall an Operating System Image 265 Creating New Images Using Dockerfile 266 Understanding Hyper-V Containers 268 Managing Container Networking 269 Using Docker Hub Repository 270 Using Microsoft Azure for Images 271 Contents xvii Using PowerShell for Containers 271 Summary 273 Video Resources 274 Exam Essentials 274 Review Questions 275 Chapter 8 Maintaining Windows Server 277 Configuring Windows Server Updates 278 Windows Update 279 Using Windows Server Update Services 282 Understanding Backups 297 Overview of the Windows Server 2016 Backup Utility 298 Setting Up an Active Directory Backup 303 Restoring Active Directory 306 Active Directory Recycle Bin 308 Understanding the ntdsutil Utility 309 Wbadmin Command-Line Utility 310 Backing Up Virtual Machines 311 PowerShell Commands 312 Summary 314 Video Resources 315 Exam Essentials 315 Review Questions 316 Chapter 9 Understanding Monitoring 319 Overview of Windows Server 2016 Performance Monitoring 321 Using Windows Server 2016 Performance Tools 323 Introducing Performance Monitor 323 Using Other Monitoring Tools 332 Summary 347 Video Resources 348 Exam Essentials 348 Review Questions 349 Appendix Answers to the Review Questions 351 Chapter 1: Installing Windows Server 2016 352 Chapter 2: Installing in the Enterprise 352 Chapter 3: Configuring Storage and Replication 353 Chapter 4: Understanding Hyper-V 354 Chapter 5: Configuring High Availability 355 Chapter 6: Understanding Clustering 356 Chapter 7: Configuring Windows Containers 357 Chapter 8: Maintaining Windows Server 357 Chapter 9: Understanding Monitoring 358 Index 361
£24.79
John Wiley & Sons Inc LPIC1 Linux Professional Institute Certification
Book SynopsisThe bestselling study guide for the popular Linux Professional Institute Certification Level 1 (LPIC-1). The updated fifth edition of LPIC-1: Linux Professional Institute Certification Study Guide is a comprehensive, one-volume resource that covers 100% of all exam objectives. Building on the proven Sybex Study Guide approach, this essential resource offers a comprehensive suite of study and learning tools such as assessment tests, hands-on exercises, chapter review questions, and practical, real-world examples. This book, completely updated to reflect the latest 101-500 and 102-500 exams, contains clear, concise, and user-friendly information on all of the Linux administration topics you will encounter on test day. Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. Linux Servers currently have a Table of ContentsIntroduction xxi Assessment Test xxxix Part I Exam 101-500 1 Chapter 1 Exploring Linux Command-Line Tools 3 Understanding Command-Line Basics 4 Discussing Distributions 4 Reaching a Shell 5 Exploring Your Linux Shell Options 5 Using a Shell 7 Using Environment Variables 11 Getting Help 17 Editing Text Files 20 Looking at Text Editors 20 Understanding vim Modes 24 Exploring Basic Text-Editing Procedures 24 Saving Changes 27 Processing Text Using Filters 28 File-Combining Commands 28 File-Transforming Commands 31 File-Formatting Commands 33 File-Viewing Commands 36 File-Summarizing Commands 40 Using Regular Expressions 45 Using grep 45 Understanding Basic Regular Expressions 47 Understanding Extended Regular Expressions 50 Using Streams, Redirection, and Pipes 50 Redirecting Input and Output 51 Piping Data between Programs 55 Using sed 56 Generating Command Lines 60 Summary 61 Exam Essentials 61 Review Questions 62 Chapter 2 Managing Software and Processes 67 Looking at Package Concepts 68 Using RPM 69 RPM Distributions and Conventions 69 The rpm Command Set 71 Extracting Data from RPMs 77 Using YUM 78 Using ZYpp 83 Using Debian Packages 86 Debian Package File Conventions 87 The dpkg Command Set 87 Looking at the APT Suite 92 Using apt-cache 93 Using apt-get 94 Reconfiguring Packages 97 Managing Shared Libraries 98 Library Principles 98 Locating Library Files 99 Loading Dynamically 100 Library Management Commands 100 Managing Processes 102 Examining Process Lists 102 Employing Multiple Screens 109 Understanding Foreground and Background Processes 116 Managing Process Priorities 120 Sending Signals to Processes 121 Summary 126 Exam Essentials 127 Review Questions 129 Chapter 3 Configuring Hardware 133 Configuring the Firmware and Core Hardware 134 Understanding the Role of Firmware 134 Device Interfaces 136 The /dev Directory 138 The /proc Directory 139 The /sys Directory 143 Working with Devices 144 Hardware Modules 148 Storage Basics 154 Types of Drives 154 Drive Partitions 155 Automatic Drive Detection 155 Storage Alternatives 156 Multipath 156 Logical Volume Manager 157 Using RAID Technology 158 Partitioning Tools 158 Working with fdisk 158 Working with gdisk 161 The GNU parted Command 162 Graphical Tools 163 Understanding Filesystems 164 The Virtual Directory 164 Maneuvering Around the Filesystem 166 Formatting Filesystems 167 Common Filesystem Types 167 Creating Filesystems 169 Mounting Filesystems 170 Manually Mounting Devices 170 Automatically Mounting Devices 172 Managing Filesystems 173 Retrieving Filesystem Stats 173 Filesystem Tools 173 Summary 174 Exam Essentials 175 Review Questions 177 Chapter 4 Managing Files 181 Using File Management Commands 182 Naming and Listing Files 182 Exploring Wildcard Expansion Rules 186 Understanding the File Commands 189 Compressing File Commands 199 Archiving File Commands 202 Managing Links 213 Managing File Ownership 218 Assessing File Ownership 219 Changing a File’s Owner 219 Changing a File’s Group 220 Controlling Access to Files 221 Understanding Permissions 221 Changing a File’s Mode 223 Setting the Default Mode 226 Changing Special Access Modes 228 Locating Files 229 Getting to Know the FHS 229 Employing Tools to Locate Files 231 Summary 239 Exam Essentials 239 Review Questions 241 Chapter 5 Booting, Initializing, and Virtualizing Linux 245 Understanding the Boot Process 246 The Boot Process 246 Extracting Information about the Boot Process 247 Looking at Firmware 249 The BIOS Startup 249 The UEFI Startup 250 Looking at Boot Loaders 251 Boot Loader Principles 251 Using GRUB Legacy as the Boot Loader 251 Using GRUB 2 as the Boot Loader 255 Adding Kernel Boot Parameters 259 Using Alternative Boot Loaders 260 The Initialization Process 261 Using the systemd Initialization Process 262 Exploring Unit Files 263 Focusing on Service Unit Files 265 Focusing on Target Unit Files 268 Looking at systemctl 270 Examining Special systemd Commands 273 Using the SysV Initialization Process 276 Understanding Runlevels 277 Investigating SysVinit Commands 280 Stopping the System 283 Notifying the Users 284 Virtualizing Linux 286 Looking at Virtual Machines 287 Understanding Containers 291 Looking at Infrastructure as a Service 293 Summary 295 Exam Essentials 295 Review Questions 298 Part II Exam 102-500 303 Chapter 6 Configuring the GUI, Localization, and Printing 305 Understanding the GUI 306 Understanding the X11 Architecture 307 Examining X.Org 308 Figuring Out Wayland 309 Managing the GUI 311 Standard GUI Features 311 The X GUI Login System 313 Common Linux Desktop Environments 314 Providing Accessibility 323 Using X11 for Remote Access 325 Remote X11 Connections 326 Tunneling your X11 Connection 326 Using Remote Desktop Software 328 Viewing VNC 328 Grasping Xrdp 330 Exploring NX 332 Studying SPICE 332 Understanding Localization 333 Character Sets 333 Environment Variables 334 Setting Your Locale 335 Installation Locale Decisions 335 Changing Your Locale 336 Looking at Time 338 Working with Time Zones 338 Setting the Time and Date 339 Configuring Printing 343 Summary 345 Exam Essentials 346 Review Questions 348 Chapter 7 Administering the System 353 Managing Users and Groups 354 Understanding Users and Groups 354 Configuring User Accounts 355 Configuring Groups 371 Managing Email 375 Understanding Email 375 Choosing Email Software 376 Working with Email 377 Using Log and Journal Files 384 Examining the syslog Protocol 385 Viewing the History of Linux Logging 387 Logging Basics Using rsyslogd 387 Journaling with systemd-journaldd 394 Maintaining the System Time 403 Understanding Linux Time Concepts 403 Viewing and Setting Time 404 Understanding the Network Time Protocol 408 Using the NTP Daemon 411 Using the chrony Daemon 413 Summary 416 Exam Essentials 416 Review Questions 419 Chapter 8 Configuring Basic Networking 423 Networking Basics 424 The Physical Layer 424 The Network Layer 426 The Transport Layer 430 The Application Layer 431 Configuring Network Features 433 Network Configuration Files 433 Graphical Tools 436 Command-Line Tools 438 Getting Network Settings Automatically 445 Bonding Network Cards 445 Basic Network Troubleshooting 447 Sending Test Packets 447 Tracing Routes 448 Finding Host Information 449 Advanced Network Troubleshooting 452 The netstat Command 452 Examining Sockets 455 The netcat Utility 456 Summary 457 Exam Essentials 458 Review Questions 460 Chapter 9 Writing Scripts 465 Shell Variables 466 Global Environment Variables 466 Local Environment Variables 468 Setting Local Environment Variables 470 Setting Global Environment Variables 472 Locating System Environment Variables 472 Using Command Aliases 474 The Basics of Shell Scripting 475 Running Multiple Commands 475 Redirecting Output 476 Piping Data 477 The Shell Script Format 478 Running the Shell Script 479 Advanced Shell Scripting 481 Displaying Messages 481 Using Variables in Scripts 482 Command-Line Arguments 484 Getting User Input 484 The Exit Status 488 Writing Script Programs 489 Command Substitution 489 Performing Math 490 Logic Statements 492 Loops 496 Functions 498 Running Scripts in Background Mode 500 Running in the Background 501 Running Multiple Background Jobs 502 Running Scripts Without a Console 503 Sending Signals 504 Interrupting a Process 504 Pausing a Process 504 Job Control 506 Viewing Jobs 506 Restarting Stopped Jobs 508 Running Like Clockwork 509 Scheduling a Job Using the at Command 509 Scheduling Regular Scripts 513 Summary 515 Exam Essentials 516 Review Questions 518 Chapter 10 Securing Your System 523 Administering Network Security 524 Disabling Unused Services 524 Using Super Server Restrictions 534 Restricting via TCP Wrappers 538 Administering Local Security 539 Securing Passwords 539 Limiting root Access 543 Auditing User Access 547 Setting Login, Process, and Memory Limits 549 Locating SUID/SGID Files 551 Exploring Cryptography Concepts 553 Discovering Key Concepts 553 Securing Data 554 Signing Transmissions 555 Looking at SSH 555 Exploring Basic SSH Concepts 555 Configuring SSH 558 Generating SSH Keys 560 Authenticating with SSH Keys 561 Authenticating with the Authentication Agent 564 Tunneling 565 Using SSH Securely 567 Using GPG 567 Generating Keys 568 Importing Keys 569 Encrypting and Decrypting Data 570 Signing Messages and Verifying Signatures 571 Revoking a Key 573 Summary 574 Exam Essentials 575 Review Questions 577 Appendix Answers to Review Questions 583 Chapter 1: Exploring Linux Command-Line Tools 584 Chapter 2: Managing Software and Processes 587 Chapter 3: Configuring Hardware 590 Chapter 4: Managing Files 593 Chapter 5: Booting, Initializing, and Virtualizing Linux 597 Chapter 6: Configuring the GUI, Localization, and Printing 601 Chapter 7: Administering the System 605 Chapter 8: Configuring Basic Networking 608 Chapter 9: Writing Scripts 611 Chapter 10: Securing Your System 615 Index 619
£37.50
John Wiley & Sons Inc OCP Oracle Certified Professional Java SE 11
Book SynopsisThis OCP Oracle Certified Professional Java SE 11 Programmer I Study Guide: Exam 1Z0-815and theProgrammer II Study Guide: Exam 1Z0-816 were published before Oracle announced major changes to its OCP certification program and the release of the new Developer 1Z0-819 exam. No matter the changes, rest assured both of the Programmer I and II Study Guidescover everything you need to prepare for and take Exam 1Z0-819. If you've purchased one of the Programmer Study Guides, purchase the other one and you'll be all set. NOTE: The OCP Java SE 11 Programmer I Exam 1Z0-815 and Programmer II Exam 1Z0-816 have been retired (as of October 1, 2020), and Oracle has released a new Developer Exam 1Z0-819 to replace the previous exams.The Upgrade Exam 1Z0-817 remains the same. The comprehensive study aide for those preparing for the new Oracle Certified Professional Java SE Programmer I Exam 1Z0-815 Used primarTable of ContentsIntroduction xxi The Assessment Test xliii Chapter 1 Welcome to Java 1 Learning About the Java Environment 2 Major Components of Java 2 Downloading a JDK 3 Identifying Benefits of Java 4 Understanding the Java Class Structure 5 Fields and Methods 5 Comments 6 Classes vs. Files 8 Writing a main() Method 8 Creating a main() Method 9 Passing Parameters to a Java Program 10 Running a Program in One Line 12 Understanding Package Declarations and Imports 13 Wildcards 15 Redundant Imports 15 Naming Conflicts 16 Creating a New Package 18 Compiling and Running Code with Packages 19 Using an Alternate Directory 20 Compiling with JAR Files 22 Creating a JAR File 23 Running a Program in One Line with Packages 24 Ordering Elements in a Class 24 Code Formatting on the Exam 26 Summary 27 Exam Essentials 27 Review Questions 29 Chapter 2 Java Building Blocks 35 Creating Objects 36 Calling Constructors 36 Reading and Writing Member Fields 37 Executing Instance Initializer Blocks 38 Following Order of Initialization 39 Understanding Data Types 40 Using Primitive Types 40 Using Reference Types 44 Distinguishing between Primitives and Reference Types 45 Declaring Variables 46 Identifying Identifiers 46 Declaring Multiple Variables 49 Initializing Variables 50 Creating Local Variables 51 Passing Constructor and Method Parameters 52 Defining Instance and Class Variables 53 Introducing var 53 Managing Variable Scope 59 Limiting Scope 59 Nesting Scope 60 Tracing Scope 60 Applying Scope to Classes 61 Reviewing Scope 62 Destroying Objects 62 Understanding Garbage Collection 63 Tracing Eligibility 64 Summary 67 Exam Essentials 67 Review Questions 69 Chapter 3 Operators 79 Understanding Java Operators 80 Types of Operators 80 Operator Precedence 81 Applying Unary Operators 82 Logical Complement and Negation Operators 83 Increment and Decrement Operators 84 Working with Binary Arithmetic Operators 85 Arithmetic Operators 86 Numeric Promotion 88 Assigning Values 90 Assignment Operator 90 Casting Values 90 Compound Assignment Operators 93 Assignment Operator Return Value 94 Comparing Values 95 Equality Operators 95 Relational Operators 97 Logical Operators 99 Short-Circuit Operators 100 Making Decisions with the Ternary Operator 102 Summary 103 Exam Essentials 104 Review Questions 105 Chapter 4 Making Decisions 113 Creating Decision-Making Statements 114 Statements and Blocks 114 The if Statement 115 The else Statement 116 The switch Statement 119 Writing while Loops 126 The while Statement 126 The do/while Statement 127 Comparing while and do/while Loops 128 Infinite Loops 129 Constructing for Loops 130 The for Loop 131 The for-each Loop 136 Controlling Flow with Branching 141 Nested Loops 141 Adding Optional Labels 142 The break Statement 143 The continue Statement 145 The return Statement 147 Unreachable Code 148 Reviewing Branching 148 Summary 149 Exam Essentials 150 Review Questions 151 Chapter 5 Core Java APIs 161 Creating and Manipulating Strings 162 Concatenation 163 Immutability 164 Important String Methods 165 Method Chaining 171 Using the StringBuilder Class 172 Mutability and Chaining 173 Creating a StringBuilder 174 Important StringBuilder Methods 174 Understanding Equality 177 Comparing equals() and == 177 The String Pool 179 Understanding Java Arrays 180 Creating an Array of Primitives 181 Creating an Array with Reference Variables 183 Using an Array 185 Sorting 186 Searching 187 Comparing 188 Varargs 190 Multidimensional Arrays 190 Understanding an ArrayList 193 Creating an ArrayList 193 Using an ArrayList 195 Wrapper Classes 199 Autoboxing and Unboxing 201 Converting Between array and List 201 Using Varargs to Create a List 203 Sorting 204 Creating Sets and Maps 204 Introducing Sets 204 Introducing Maps 205 Calculating with Math APIs 206 min() and max() 206 round() 207 pow() 207 random() 208 Summary 208 Exam Essentials 209 Review Questions 210 Chapter 6 Lambdas and Functional Interfaces 221 Writing Simple Lambdas 222 Lambda Example 222 Lambda Syntax 225 Introducing Functional Interfaces 227 Predicate 228 Consumer 228 Supplier 229 Comparator 230 Working with Variables in Lambdas 231 Parameter List 231 Local Variables inside the Lambda Body 231 Variables Referenced from the Lambda Body 232 Calling APIs with Lambdas 234 removeIf() 234 sort() 235 forEach() 235 Summary 236 Exam Essentials 237 Review Questions 238 Chapter 7 Methods and Encapsulation 247 Designing Methods 248 Access Modifiers 249 Optional Specifiers 250 Return Type 251 Method Name 252 Parameter List 253 Optional Exception List 253 Method Body 254 Working with Varargs 254 Applying Access Modifiers 256 Private Access 256 Default (Package-Private) Access 257 Protected Access 259 Public Access 263 Applying the static Keyword 264 Designing static Methods and Fields 264 Accessing a static Variable or Method 265 Static vs. Instance 266 static Variables 268 Static Initialization 269 Static Imports 270 Passing Data among Methods 272 Overloading Methods 275 Varargs 277 Autoboxing 277 Reference Types 277 Primitives 279 Generics 279 Arrays 280 Putting It All Together 280 Encapsulating Data 281 Summary 283 Exam Essentials 284 Review Questions 285 Chapter 8 Class Design 295 Understanding Inheritance 296 Single vs. Multiple Inheritance 297 Inheriting Object 298 Creating Classes 299 Extending a Class 299 Applying Class Access Modifiers 301 Accessing the this Reference 302 Calling the super Reference 303 Declaring Constructors 305 Creating a Constructor 305 Default Constructor 306 Calling Overloaded Constructors with this() 308 Calling Parent Constructors with super() 310 Constructors and final Fields 314 Order of Initialization 316 Reviewing Constructor Rules 322 Inheriting Members 323 Calling Inherited Members 323 Inheriting Methods 324 Hiding Variables 336 Understanding Polymorphism 337 Object vs. Reference 339 Casting Objects 340 The instanceof Operator 341 Polymorphism and Method Overriding 342 Overriding vs. Hiding Members 344 Summary 346 Exam Essentials 347 Review Questions 349 Chapter 9 Advanced Class Design 363 Creating Abstract Classes 364 Introducing Abstract Classes 364 Defining Abstract Methods 366 Creating a Concrete Class 370 Reviewing Abstract Class Rules 372 Implementing Interfaces 373 Defining an Interface 373 Inserting Implicit Modifiers 377 Inheriting an Interface 380 Polymorphism and Interfaces 384 Reviewing Interface Rules 386 Introducing Inner Classes 388 Defining a Member Inner Class 388 Using a Member Inner Class 389 Summary 390 Exam Essentials 391 Review Questions 392 Chapter 10 Exceptions 401 Understanding Exceptions 402 The Role of Exceptions 402 Understanding Exception Types 404 Throwing an Exception 407 Recognizing Exception Classes 409 RuntimeException Classes 409 Checked Exception Classes 412 Error Classes 413 Handling Exceptions 414 Using try and catch Statements 414 Chaining catch Blocks 416 Applying a Multi-catch Block 418 Adding a finally Block 421 Finally Closing Resources 424 Throwing Additional Exceptions 430 Calling Methods That Throw Exceptions 432 Declaring and Overriding Methods with Exceptions 434 Printing an Exception 435 Summary 437 Exam Essentials 438 Review Questions 440 Chapter 11 Modules 451 Introducing Modules 452 Exploring a Module 453 Benefits of Modules 454 Creating and Running a Modular Program 456 Creating the Files 457 Compiling Our First Module 458 Running Our First Module 460 Packaging Our First Module 461 Updating Our Example for Multiple Modules 463 Updating the Feeding Module 463 Creating a Care Module 464 Creating the Talks Module 466 Creating the Staff Module 469 Diving into the module-info File 470 exports 470 requires transitive 472 provides, uses, and opens 474 Discovering Modules 475 The java Command 475 The jar Command 478 The jdeps Command 478 The jmod Command 480 Reviewing Command-Line Options 481 Summary 483 Exam Essentials 484 Review Questions 485 Appendix Answers to Review Questions 491 Chapter 1: Welcome to Java 492 Chapter 2: Java Building Blocks 494 Chapter 3: Operators 498 Chapter 4: Making Decisions 501 Chapter 5: Core Java APIs 505 Chapter 6: Lambdas and Functional Interfaces 509 Chapter 7: Methods and Encapsulation 511 Chapter 8: Class Design 513 Chapter 9: Advanced Class Design 518 Chapter 10: Exceptions 522 Chapter 11: Modules 526 Index 529
£38.00
John Wiley & Sons Inc MCA Modern Desktop Administrator Study Guide
Book SynopsisThe essential study guide for the new Microsoft 365 Certified Associate (MCA) Modern Desktop certificationcovers Exam MD-100: Windows 10! The new Microsoft 365 Certified Associate (MCA) Modern Desktop certification exam measures a candidate's ability to deploy Windows, manage devices and data, configure connectivity, and maintain Windows. MCA certification, sought by a growing number of employers, is an important part of any IT professional's resume. The MCA Modern Desktop Administrator Study Guide: Exam MD-100 is a must-have book for anyone preparing for certification. This clear and accurate study guide covers 100% of exam objectivesproviding hands-on exercises, challenging review questions, full explanations, and real-world examples. From the intricacies of Windows deployment to advanced security and enterprise capabilities, each chapter explains everything candidates need to know for passing the exam and earning MCA certification. This accurate, up-toTable of ContentsIntroduction xxi Assessment Test xxxi Part I Exam MD-100 1 Chapter 1 Windows 10 Installation 3 Understanding the Basics 4 Windows 10 Features 8 Windows 10 Architecture 10 Preparing to Install Windows 10 11 Windows 10 Home 11 Windows 10 Pro 12 Windows 10 Enterprise 13 Windows 10 Enterprise E3 and E5 14 Windows 10 Requirements 14 New Install or Upgrade? 17 Disk Partitioning 20 Language and Locale 21 Installing Windows 10 22 Performing a Clean Install of Windows 10 22 Performing an Upgrade to Windows 10 31 Troubleshooting Installation Problems 36 Supporting Multiple-Boot Options 38 Using Windows Activation 39 Understanding Automated Deployment Options 40 An Overview of the Microsoft Deployment Toolkit 41 An Overview of Unattended Installation 46 An Overview of Windows Deployment Services 48 An Overview of the System Preparation Tool and Disk Imaging 51 Overview of the Windows Assessment and Deployment Kit 55 Windows Configuration Designer 56 Summary of Windows 10 Deployment Options 56 Deploying Unattended Installations 57 Using the System Preparation Tool to Prepare an Installation for Imaging 59 Using Windows Configuration Designer to Create a Disk Image 61 Using the Deployment Image Servicing and Management Tool 63 Using Windows System Image Manager to Create Answer Files 65 Windows Update 66 The Update Process 66 Using Windows Update 68 Using Command-Line Options 69 Installing Windows Store Updates 70 Summary 71 Exam Essentials 72 Video Resources 73 Review Questions 74 Chapter 2 Configuring Users 77 Understanding User Accounts 78 Account Types 79 Built-In Accounts 80 Local and Domain User Accounts 81 Working with User Accounts 82 Using the Local Users and Groups Utility 82 Using the User Accounts Option in Control Panel 84 Creating New Users 85 Disabling User Accounts 90 Deleting User Accounts 91 Renaming User Accounts 93 Changing a User’s Password 94 Using Windows Hello, Pictures, and Biometrics 94 Using Device Guard 95 Understanding Credential Guard 98 Configuring Device Health Attestation 99 Managing User Properties 101 Managing User Group Membership 101 Setting Up User Profiles, Logon Scripts, and Home Folders 103 Troubleshooting User Account Authentication 109 Managing and Creating Groups 110 Using Built-In Groups 111 Creating Groups 115 Managing Group Membership 116 Deleting Groups 118 Managing Security Using GPOs and LGPOs 118 Understanding the GPO and LGPO Basics 118 Using the Group Policy Result Tool 120 Managing and Applying LGPOs 121 Configuring Local Security Policies 123 Using Account Policies 124 Using Local Policies 130 Configuring User Account Control 138 Privilege Elevation 138 Registry and File Virtualization 140 Understanding Smart Cards 140 Configuring Remote Management 143 Remote Assistance 143 Remote Desktop 148 Enabling PowerShell Remoting 150 Configuring a VPN Connection 151 Transparent Caching 153 Broadband Tethering 153 Using PowerShell 155 Summary 157 Exam Essentials 157 Video Resources 157 Review Questions 158 Chapter 3 Managing Data 161 Managing File and Folder Security 162 Folder Options 163 Understanding Dynamic Access Control 167 Securing Access to Files and Folders 168 Determining and Viewing Effective Permissions for NTFS 172 Determining NTFS Permissions for Copied or Moved Files 174 Managing Network Access 174 Creating and Managing Shared Folders 175 Configuring Share Permissions 176 Configuring OneDrive 178 Understanding Hardware Security 181 Using BitLocker Drive Encryption 182 Features of BitLocker 183 Windows 7 vs. Windows 10 185 Using the BitLocker Administration and Monitoring Utility 187 Understanding Smart Cards 188 Summary 188 Exam Essentials 189 Video Resources 189 Review Questions 190 Chapter 4 Managing the Windows 10 Environment 193 Managing Windows 194 Manipulating the Desktop Environment 195 Configuring Personalization 204 Using Control Panel 209 Using the Microsoft Management Console 218 Using the System Icon 219 Understanding the Settings Window 222 Using PowerShell 224 Configuring Mobility Options 225 Configuring Offline Files and Synchronization 225 Configuring Power Policies 227 Configuring Windows to Go 233 Managing Windows 10 Services 236 Configuring Internet Browsers 238 Cortana 239 Browser Controls 240 Pinning Sites to the Taskbar 240 Searchable Address Bar 240 Security and Privacy Enhancements 240 Using the Browser’s Compatibility View 240 Using Protected Mode for IE11 241 Using InPrivate Browsing 242 Configuring Windows Internet Explorer 11 Options 243 Summary 247 Exam Essentials 247 Video Resources 248 Review Questions 249 Chapter 5 Configuring Security and Devices 253 Understanding Filesystems 254 Filesystem Selection 255 Filesystem Conversion 257 Configuring NTFS 258 Configuring Hardware 259 Understanding Devices 259 Using Device Manager 261 Installing and Updating Device Drivers 265 Driver Signing 275 Managing I/O Devices 275 Configuring Removable Storage Devices 275 Managing Printers 278 Configuring Windows Defender Firewall 291 Understanding the Windows Defender Firewall Basics 292 Windows Defender Firewall with Advanced Security 292 Summary 297 Exam Essentials 297 Video Resources 298 Review Questions 299 Chapter 6 Configuring Network Connectivity 301 Understanding the Basics 302 Peer-to-Peer Networks 302 On-site Active Directory Networks 304 Cloud-Based Azure Active Directory 306 Other Microsoft Networking Terms and Roles 306 Configuring NIC Devices 309 Configuring a Network Adapter 310 Troubleshooting a Network Adapter 316 Configuring Wireless NIC Devices 316 Configuring Wi-Fi Direct 324 Understanding TCP/IP 326 Benefits and Features of TCP/IP 327 Basics of IP Addressing and Configuration 329 Using IPv6 Addresses 334 Configuring TCP/IP on Windows 10 344 Testing Your IP Configuration 346 Configuring Windows 10 on a Network 348 Summary 350 Exam Essentials 351 Video Resources 351 Review Questions 352 Chapter 7 Configuring Recovery 355 Understanding Recovery 357 Knowing the Startup/Boot Options 358 Starting in Safe Mode 359 Enabling Boot Logging 362 Using Other Startup Setting Options 364 Understanding System Restore 365 Using the System Image Recovery 366 Using the Startup Repair Tool 367 Maintaining Windows 10 with Backup and Restore 368 Creating a Backup 369 Restoring Files from a Backup 370 Recovering Files from OneDrive 371 Using the Wbadmin Command Utility 372 Using Advanced Backup Options 373 Using System Protection 375 Creating Restore Points 376 Restoring Restore Points 376 Cleaning Up Old Restore Points 377 Using the Recycle Bin 377 Monitoring Windows 378 Introducing Performance Monitor 379 Using Other Performance-Monitoring Tools 388 Summary 397 Exam Essentials 398 Video Resources 399 Review Questions 400 Appendix Answer to Review Questions 403 Chapter 1: Windows 10 Installation 404 Chapter 2: Configuring Users 404 Chapter 3: Managing Data 405 Chapter 4: Managing the Windows 10 Environment 406 Chapter 5: Configuring Security and Devices 407 Chapter 6: Configuring Network Connectivity 408 Chapter 7: Configuring Recovery 409 Index 411
£37.50
John Wiley & Sons Inc LPI Linux Essentials Study Guide
Book SynopsisTable of ContentsIntroduction xix Assessment Test xxix Chapter 1 Selecting an Operating System 1 What is an OS? 2 What is a Kernel? 2 What Else Identifies an OS? 3 Investigating User Interfaces 4 Using a Text-Mode User Interface 5 Using a Graphical User Interface 7 Where Does Linux Fit in the OS World? 9 Comparing Linux to Unix 9 Comparing Linux to macOS 11 Comparing Linux to Windows 12 What is a Distribution? 14 Creating a Complete Linux-Based OS 14 A Summary of Common Linux Distributions 15 Understanding Release Cycles 17 Embedded Linux Systems 18 Linux in the Cloud 19 What is Cloud Computing? 19 What Are the Cloud Services? 21 Summary 23 Exam Essentials 23 Review Questions 25 Chapter 2 Understanding Software Licensing 27 Investigating Software Licenses 28 Exploring Copyright Protection and Software 28 Using Licenses to Modify Copyright Terms 30 Looking at the Free Software Foundation 31 Understanding the FSF Philosophy 31 Examining Free Software and the GPL 32 Looking at the Open Source Initiative 33 Understanding the Open Source Philosophy 33 Defining Open Source Software 35 Looking at the Creative Commons 36 Using Open Source Licenses 36 Understanding Open Source Licenses 36 Understanding Open Source Business Models 38 Summary 39 Exam Essentials 40 Review Questions 41 Chapter 3 Investigating Linux’s Principles and Philosophy 43 Linux Through the Ages 44 Understanding Linux’s Origins 44 Seeing Today’s Linux World 47 Using Open Source Software 47 Understanding Basic Open Source Principles 47 Linux as a Software Integrator 49 Understanding OS Roles 50 Looking At Embedded Computers 50 Exploring Desktop and Laptop Computers 51 Investigating Server Computers 52 Summary 53 Exam Essentials 53 Review Questions 55 Chapter 4 Using Common Linux Programs 57 Using a Linux Desktop Environment 58 Choosing a Desktop Environment 58 Launching Programs 61 Using a File Manager 63 Working with Productivity Software 66 Finding the Right Tool for the Job 66 Using a Web Browser 67 Using Email Clients 68 Using Office Tools 68 Using Multimedia Applications 69 Using Linux for Cloud Computing 70 Using Mobile Applications 71 Using Server Programs 72 Identifying Common Server Protocols and Programs 72 Focusing on Web Servers 76 Installing and Launching Servers 76 Securing Servers 77 Managing Programming Languages 78 Choosing a Compiled vs. an Interpreted Language 78 Identifying Common Programming Languages 79 Handling Software Packages 81 Understanding Software Packages 81 Identifying Common Package Tools 81 Summary 82 Exam Essentials 83 Review Questions 84 Chapter 5 Getting to Know the Command Line 87 Starting a Command Line 88 Launching a Terminal 88 Logging into a Text-Mode Console 91 Running Programs 92 Understanding Text-Mode Program Syntax 93 Running Text-Mode Programs 94 Running GUI Programs 95 Running Programs in the Background 96 Using Shell Features 97 Using Command Completion 97 Using Command History 98 Getting Help Using Man Pages 99 Understanding the Purpose of Man Pages 100 Locating Man Pages by Section Number 100 Searching for a Man Page 102 Reading Man Pages 102 Using less 104 Getting Help Using Info Pages 106 Understanding the Purpose of Info Pages 106 Reading Info Pages 107 Finding Additional Documentation 109 Locating Program Documentation on Your Computer 109 Locating Program Documentation Online 112 Consulting Experts 112 Summary 114 Exam Essentials 114 Review Questions 116 Chapter 6 Managing Hardware 119 Learning About Your CPU 120 Understanding CPU Families 120 Identifying Your CPU 123 Identifying Motherboard Capabilities 123 Sizing Your Power Supply 125 Understanding Disk Issues 125 Disk Interfaces 126 Partitioning a Disk 127 Understanding Filesystem Issues 130 Using Removable and Optical Disks 133 Managing Displays 134 Understanding the Role of X 134 Using Common Display Hardware 136 Handling USB Devices 137 Managing Drivers 138 Understanding Types of Drivers 138 Locating and Installing Drivers 139 Summary 140 Exam Essentials 140 Review Questions 141 Chapter 7 Managing Files 143 Understanding Where Things Go 144 User Files vs. System Files 144 The Filesystem Hierarchy Standard 146 Important Directories and Their Contents 147 Exploring Files and Directories 149 Obtaining File Listings 149 Changing Directories 151 Using Absolute and Relative File References 152 Manipulating Files 154 Creating Files 154 Copying Files 155 Moving and Renaming Files 157 Using Links 157 Deleting Files 159 Using Wildcards 160 Understanding Case Sensitivity 160 Manipulating Directories 161 Creating Directories 161 Deleting Directories 162 Managing Directories 163 Summary 164 Exam Essentials 164 Review Questions 165 Chapter 8 Searching, Extracting, and Archiving Data 167 Using Regular Expressions 168 Searching For and Extracting Data 170 Using grep 170 Using find 172 Using wc 174 Using cut 175 Using sort 176 Using cat 177 Redirecting Input and Output 178 Using Basic Redirection Operators 178 Using Pipes 181 Generating Command Lines 182 Archiving Data 183 Using tar 183 Using Compression 187 Using zip 188 Summary 191 Exam Essentials 191 Review Questions 193 Chapter 9 Exploring Processes and Process Data 195 Understanding Package Management 196 Linux Package Management Principles 196 Understanding Package Systems 197 Managing Red Hat Systems 199 Managing Debian Systems 200 Understanding the Process Hierarchy 202 Identifying Running Processes 203 Using ps to Identify Processes 203 Using top to Identify Processes 205 Measuring Memory Use 207 Using Log Files 208 Locating Log Files 209 Producing More Verbose Log File Entries 210 Examining the Kernel Ring Buffer 211 Summary 211 Exam Essentials 212 Review Questions 213 Chapter 10 Editing Files 215 Understanding the Role of Text Files 216 Choosing an Editor 218 Editing Files with nano 219 Using Text Editor Conventions 221 Exploring Basic nano Text-Editing Procedures 221 Saving Your Changes from nano 223 Editing Files with vi 224 Understanding vi Modes 224 Exploring Basic vi Text-Editing Procedures 226 Saving Your Changes from vi 229 Summary 230 Exam Essentials 230 Review Questions 231 Chapter 11 Creating Scripts 233 Beginning a Shell Script 234 Using Commands 235 Using Arguments 237 Using Variables 238 Using Conditional Expressions 241 Using Loops 243 Using Functions 244 Setting the Script’s Exit Value 245 Summary 246 Exam Essentials 246 Review Questions 248 Chapter 12 Understanding Basic Security 251 Understanding Accounts 252 Understanding Account Features 253 Identifying Accounts 256 Understanding Groups 258 Using Account Tools 259 Discovering Your Own Identity 260 Learning Who’s Online 261 Working as root 263 Understanding User Types 263 Acquiring root Privileges 264 Using root Privileges Safely 266 Summary 268 Exam Essentials 268 Review Questions 270 Chapter 13 Creating Users and Groups 273 Creating New Accounts 274 Deciding on a Group Strategy 274 Selecting a Good Password 275 Creating Accounts Using GUI Tools 278 Creating Accounts from the Shell 280 Modifying Accounts 283 Deciding When to Modify Accounts 283 Checking for Logged-in Users 283 Modifying Accounts Using GUI Tools 284 Modifying Accounts from the Shell 286 Deleting Accounts 289 Avoiding Account Deletion Pitfalls 289 Deleting Accounts Using GUI Tools 290 Deleting Accounts from the Shell 291 Managing Groups 291 Managing Groups Using GUI Tools 291 Managing Groups from the Shell 294 Summary 295 Exam Essentials 295 Review Questions 297 Chapter 14 Setting Ownership and Permissions 299 Setting Ownership 300 Understanding Ownership 300 Setting Ownership in a File Manager 301 Setting Ownership in a Shell 302 Setting Permissions 304 Understanding Permissions 304 Setting Permissions in a File Manager 308 Setting Permissions in a Shell 309 Setting the umask 310 Using Special Permission Bits and File Features 310 Using Sticky Bits 311 Using Special Execute Permissions 313 Hiding Files from View 314 Viewing Directories 315 Summary 315 Exam Essentials 315 Review Questions 317 Chapter 15 Managing Network Connections 319 Configuring Network Features 320 Graphical Tools 321 Command-Line Tools 323 Basic Network Troubleshooting 329 Sending Test Packets 330 Finding Host Information 331 Advanced Network Troubleshooting 333 The netstat Command 334 Examining Sockets 337 Summary 337 Exam Essentials 338 Review Questions 339 Appendix A Answers to Review Questions 341 Chapter 1: Selecting an Operating System 342 Chapter 2: Understanding Software Licensing 343 Chapter 3: Investigating Linux’s Principles and Philosophy 344 Chapter 4: Using Common Linux Programs 346 Chapter 5: Getting to Know the Command Line 347 Chapter 6: Managing Hardware 348 Chapter 7: Managing Files 349 Chapter 8: Searching, Extracting, and Archiving Data 351 Chapter 9: Exploring Processes and Process Data 352 Chapter 10: Editing Files 353 Chapter 11: Creating Scripts 354 Chapter 12: Understanding Basic Security 356 Chapter 13: Creating Users and Groups 357 Chapter 14: Setting Ownership and Permissions 358 Chapter 15: Managing Network Connections 359 Appendix B Setting Up a Linux Environment 363 Index 365
£28.49
John Wiley & Sons Inc AWS Certified Security Study Guide
Book SynopsisGet prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guTable of ContentsProlog 9 1. Einleitung 15 Veränderung 17 Innovationsfähigkeit: Ohne Druck keine Bewegung 23 Vier historische technische Revolutionen und ihrWeg zur Akzeptanz innerhalb der Gesellschaft 28 Rückkehr zum eigenständigen, selbstermächtigten Menschen 31 Mitarbeitende werden immer essenzieller 33 Wissen verdoppelt sich, wenn man es teilt 35 2. Mit Netzwerkführung in die Zukunft 39 Unternehmerische Voraussetzungen für das Gelingen von Netzwerken 42 Führen in Netzwerken 48 Unternehmensnetzwerke 52 Inoffizielle Netzwerke 53 Unternehmensinterne Netzwerke 54 Unternehmensexterne Netzwerke 62 3. Was hat ein Perückenmacher mit strategischer Netzwerkführung zu tun? 67 Hierarchie und Eigenverantwortung 68 Der Purpose geht uns alle an 87 Serendipität 125 Innovative Vernetzungsformate 134 Mut zur Lücke 163 4. Wie kann aktiv aus Trends und Krisen gelernt werden? 167 Wie können Vorbehalte abgebaut werden? 171 Beispiel Corona – die Krise aktiv nutzen 172 Krisen nutzen, um Gewohnheiten zu ändern 175 5. Weiterbildung und Personalentwicklung als Beitrag zur Vernetzung 183 Disruption 1.0 derWeiterbildung 187 Die neue Rolle der Personalentwicklung 191 Mit dem TEAK®-Konfigurator auf Erfolgskurs 203 Was ist Ihr Beitrag? 236 6. Die unaufhaltsame Dynamik des Netzwerkes am Beispiel der Group Schumacher GmbH 239 7. Die neue Perspektive der Zukunft – Nachwort 249 Danksagung 253 Die Autorin 257 Literaturverzeichnis 259 Stichwortverzeichnis 269
£47.50
John Wiley & Sons Inc PMP Project Management Professional Exam Study
Book SynopsisPrepare for PMP certification exam success with this fully updated and comprehensive study guide This study guide serves as a comprehensive resource for those who plan on taking the Project Management Professional (PMP) certification exam administered by PMI. The book helps you prepare for the exam, and it will continue to serve project managers as an on-the-job reference book. The PMP Project Management Professional Exam Study Guide, Tenth Edition is fully updated to include recent changes to the exam. New content covers the integral role that Agile and other iterative practices have in project management. Updates also address the pivotal responsibilities of the project manager and the skill sets required for this position. The study guide was written to reflect the Project Management Process and Procedures found in the revisedA Guide to the Project Management Body of Knowledge -- PMBOK Guide, 6th Edition. Well-known author and expert Kim Heldman, PMP, helps to prepare you for the exam with in-depth coverage of topics, concepts, and key terms. Learn more about the three main domain areas of people, process, and business environment, plus the predictive, agile, and hybrid approaches to project management.This guide is an effective learning aid that will take your understanding to the next level. Provides comprehensive material, covering the complete exam outlineLists chapter objectives and offers detailed discussions of these objectivesReflects differences in project management environments and approachesEffectively presents real world scenarios, project application sidebars, and chapter review questions You'll also connect to a beneficial, on-the-go resource: an interactive online learning environment and test bank. This environment includes anassessment test, chapter tests, practice exams, electronic flashcards, and a glossary of key terms. A thorough review is the best prep for a challenging certification exam. So, get ready with this essential PMP study guide.Table of ContentsIntroduction xix Assessment Test xxix Answers to Assessment Test xlix Chapter 1 Building the Foundation 1 Establishing the Foundation 3 Projects vs. Operations 4 Project Characteristics 6 What Is Project Management? 7 Programs 8 Portfolios 8 Organizational Project Management 11 Project Management Offices 11 Understanding How Projects Come About 13 Needs and Demands and Other Factors That Lead to Project Creation 14 Skills Every Good Project Manager Needs 17 Technical Project Management Skills 18 Business Management and Strategic Skills 18 Communication Skills 19 Organizational and Planning Skills 19 Conflict Management Skills 20 Negotiation and Influencing Skills 20 Leadership Skills 21 Team-Building and Motivating Skills 21 Role of a Project Manager 22 Understanding Project Management Process Groups 22 Determining a Project Methodology or Approach 28 Life Cycle Categories 29 Predictive Life Cycle Methodology 30 Agile Methodologies 33 Hybrid 38 Project Life Cycles 38 Understanding How This Applies to Your Next Project 39 Summary 40 Exam Essentials 41 Review Questions 43 Chapter 2 Assessing Project Needs 49 Exploring the Project Management Knowledge Areas 51 Project Integration Management 53 Project Scope Management 56 Project Schedule Management 57 Project Cost Management 58 Project Quality Management 59 Project Resource Management 59 Project Communications Management 60 Project Risk Management 62 Project Procurement Management 62 Project Stakeholder Management 63 Assessing Project Viability 64 Using Project Selection Methods 65 Assessing Project Needs and Creating the Project Charter 73 Enterprise Environmental Factors 78 Organizational Process Assets 78 Tools and Techniques 81 Formalizing and Publishing the Project Charter 82 Pulling the Project Charter Together 83 Key Stakeholders 84 Project Charter Sign-Off 87 Maintaining Project Artifacts 88 Introducing the Kitchen Heaven Project Case Study 89 Understanding How This Applies to Your Next Project 93 Summary 94 Exam Essentials 96 Review Questions 98 Chapter 3 Delivering Business Value 103 Understanding Organizational Structures 106 Functional Organizations 108 Project-Oriented Organizations 112 Matrix Organizations 114 Other Organizational Structures 118 Pmo 118 PMO in an Agile Environment 119 Project-Based Organizations 121 Influences of Organizational Structure on Agile Methodologies 122 Identifying Stakeholders 123 Discovering Stakeholders 124 Stakeholder Analysis 126 Categorizing Stakeholders 127 Stakeholder Register 134 Stakeholders on an Agile Project 135 Six Sigma Adaptive Methodology 137 Delivering Business Value 140 Business Value Network 142 Assessing Business Value 143 Delivering Business Value Incrementally 145 Examining Business Value 147 Subdividing Project Tasks 148 Understanding How This Applies to Your Next Project 151 Summary 152 Exam Essentials 153 Review Questions 155 Chapter 4 Developing the Project Scope 161 Developing the Project Management Plan 164 Project Complexity 168 Data Gathering and Interpersonal Skills 168 Documenting the Project Management Plan 169 Documenting the Project Management Plan Using a Predictive Methodology 172 Plan Scope Management 173 Alternatives Analysis 175 Documenting the Scope Management Plan 177 Documenting the Requirements Management Plan 178 Collecting Requirements 178 Gathering Documents for the Collect Requirements Process 180 Gathering and Documenting Requirements 185 Finalizing Requirements 189 Defining Scope 192 Writing the Project Scope Statement 194 Managing the Product Backlog 199 Creating the Work Breakdown Structure 201 Decomposing the Deliverables 202 Constructing the WBS 203 Backlog 211 Finalizing the WBS 212 Understanding How This Applies to Your Next Project 216 Summary 218 Exam Essentials 219 Review Questions 221 Chapter 5 Creating the Project Schedule 229 Creating the Schedule Management Plan 232 Defining Activities 233 Creating the Activity List 234 Breaking Down User Stories 235 Understanding the Sequence Activities Process 237 Precedence Diagramming and Leads and Lags 238 Project Management Information System 243 Project Schedule Network Diagrams 243 Estimating Activity Resources 244 How to Estimate Activity Resources 245 Documenting Resource Requirements 246 Estimating Resources in an Adaptive Methodology 247 Estimating Activity Durations 247 Project Calendars and Other Considerations 248 Estimating Techniques 249 Duration Estimates 253 Estimating Activity Durations Using Adaptive Methodologies 255 Developing the Project Schedule 257 Gather Documents to Assist in Developing the Schedule 257 Developing the Project Schedule 258 Project Schedule and the Schedule Baseline 272 Using a Kanban Board and Scrum Board 277 Scrum Board 279 Combining Techniques 280 Agile Release Planning 281 Applying Process Groups in an Agile Approach 281 Understanding How This Applies to Your Next Project 286 Summary 287 Exam Essentials 289 Review Questions 291 Chapter 6 Developing the Project Budget and Engaging Stakeholders 297 Creating the Cost Management Plan 300 Performing Plan Cost Management 301 Creating the Cost Management Plan 302 Estimating Costs 303 Estimating Techniques 307 Estimating Costs for an Agile Project 308 Creating the Cost Estimates 309 Establishing the Cost Baseline 311 Techniques for Developing the Project Budget 313 Developing the Cost Baseline 314 Understanding Stakeholders 318 Analyzing Stakeholders 319 Stakeholder Engagement Plan 320 Mentoring Stakeholders 321 Engaging Stakeholders in an Adaptive Methodology 322 Communicating the Plan 323 Planning Communications 324 Determining Communication Needs 325 Documenting the Communications Management Plan 331 Communicating on an Agile Team 333 A Closer Look at Adaptive Methodologies 335 Other Methodologies 340 Combining Methodologies 345 Understanding How This Applies to Your Next Project 348 Summary 349 Exam Essentials 351 Review Questions 353 Chapter 7 Identifying Project Risks 359 Understanding Risk 361 Creating the Risk Management Plan 362 Risk Attitude 363 Conducting Risk Meetings 364 Documenting the Risk Management Plan 366 Identifying Potential Risks 372 Data Gathering and Data Analysis Techniques for Identifying Risks 374 Documenting the Risk Register 378 Identifying Risks Using an Agile Approach 380 Analyzing Risks Using Qualitative Techniques 381 Performing Qualitative Risk Analysis 382 Ranking Risks in the Risk Register 390 Quantifying Risk 391 Performing Quantitative Risk Analysis 392 Updating the Risk Report 397 Developing a Risk Response Plan 398 Strategies for Creating Risk Responses 399 Documenting the Risk Responses Plan 404 Assessing Risks Using an Agile Approach 407 Planning for Project Compliance 409 Understanding How This Applies to Your Next Project 413 Summary 414 Exam Essentials 415 Review Questions 417 Chapter 8 Planning and Procuring Resources 423 Procurement Planning 425 Gathering Documents for the Procurement Management Plan 427 Source Selection Criteria 433 Procurement Management Plan 435 Procurements in an Agile Environment 442 Developing the Resource Management Plan 445 Understanding Enterprise Environmental Factors 446 Using Data Representation Techniques for Plan Resource Management 448 Documenting the Resource Management Plan 451 Resources on an Agile Project 455 Quality Planning 456 Preparing for Quality 457 Developing the Quality Management Plan 458 Documenting the Quality Management Plan 466 Quality Planning for Agile Projects 468 Project Planning Using Agile Methodologies 469 Bringing It All Together 470 Choosing a Life Cycle Methodology 473 Understanding How This Applies to Your Next Project 480 Summary 481 Exam Essentials 482 Review Questions 485 Chapter 9 Developing the Project Team 491 Directing and Managing Project Work 494 Direct and Manage Project Work Inputs 496 Project Management Information System 499 Deliverables and Work Performance Data 499 Directing Project Work on Agile Projects 504 Executing Practices for Delivering Project Work 508 Acquiring the Project Team and Project Resources 510 The Resource Management Plan 510 Techniques for Acquiring Resources 511 Project Team Assignments 515 Developing the Project Team 517 Generational Diversity 518 Tools and Techniques to Develop the Team 520 Developing Agile Teams 536 Team Performance Assessments 539 Managing Project Teams 543 Emotional Intelligence and Other Tools for Managing Teams 543 Lessons Learned Managing Teams 545 Understanding How This Applies to Your Next Project 547 Summary 548 Exam Essentials 550 Review Questions 552 Chapter 10 Sharing Information 559 Implementing Risk Responses 563 Conducting Procurements 563 Evaluating Proposals 564 Creating Procurement Agreements 571 Conducting Procurements on Agile Projects 573 Laying Out Quality Assurance Procedures 574 Managing Quality with Data and Audits 575 Quality Reports and Test and Evaluation Documents 580 Conducting Quality Assessments on an Agile Project 581 Managing Project Knowledge 582 Knowledge Management 583 Information Management 583 Managing Project Artifacts 583 Managing Project Information 584 Communication and Conflict Resolution Skills 585 Project Communications and Elements of Communicating 594 Communicating on Agile Projects 596 Managing Stakeholder Engagement 597 Observing and Conversing 598 Agile Frameworks 599 Agile Methodologies or Frameworks 600 Scaling Frameworks 601 Understanding How This Applies to Your Next Project 606 Summary 607 Exam Essentials 608 Review Questions 611 Chapter 11 Measuring and Controlling Project Performance 619 Monitoring and Controlling Project Work 624 Forecasting Methods 625 Work Performance Reports 626 Controlling Procurements 627 Procurement Documents and Approved Change Requests 629 Monitoring Vendor Performance 631 Closing Out Procurements 632 Monitoring Communications 636 Documents to Help Monitor Communications 637 Monitoring Communications with Meetings 637 Work Performance Information 639 Performing Integrated Change Control 642 How Change Occurs 643 Change Control Concerns 644 Configuration Control 645 Change Control System 646 Approved Change Requests 650 Changes in the Business Environment 651 Monitoring Stakeholder Engagement 654 Controlling Resources 654 Utilizing Control Quality Techniques 655 Control Quality Tools and Techniques 656 Verifying Deliverables 664 Monitoring and Controlling Risk 664 Monitor Risks Analysis and Meetings 666 Monitor Risks Updates 667 Monitoring Project Management Integrations 668 Understanding How This Applies to Your Next Project 671 Summary 672 Exam Essentials 674 Review Questions 676 Chapter 12 Controlling Work Results and Closing Out the Project 683 Controlling Cost Changes 686 Earned Value Analysis 687 Variance Analysis 689 Trend Analysis 692 To-Complete Performance Index 697 Earned Value Measures on Agile Projects 700 Monitoring and Controlling Schedule Changes 702 Burndown and Burnup Charts 703 Performance Reviews 705 Changes to the Schedule 706 Validating Project Scope 707 Controlling Scope 708 Measuring Work Results on Agile Projects 710 Formulating Project Closeout 713 Characteristics of Closing 713 Project Endings 714 Closing Out the Project 717 Administrative Closure Procedures 718 Regression Analysis 719 Close Project or Phase Final Report 719 Closing Out the Procurements 723 Closing Out an Agile Project 724 Celebrate! 725 Releasing Project Team Members 725 Balancing Stakeholders’ Interests at Project Close 725 Competing Needs 726 Dealing with Issues and Problems 727 Balancing Constraints 727 Professional Responsibility 727 Responsibility 728 Respect 731 Fairness 734 Honesty 737 Role Delineation Study 739 Applying Professional Knowledge 739 Project Management Knowledge 740 Education Providers 740 Industry Knowledge 740 Understanding How This Applies to Your Next Project 746 Summary 748 Exam Essentials 750 Review Questions 752 Appendices 757 Appendix A Answers to Review Questions 759 Chapter 1: Building the Foundation 760 Chapter 2: Assessing Project Needs 761 Chapter 3: Delivering Business Value 763 Chapter 4: Developing the Project Scope 765 Chapter 5: Creating the Project Schedule 767 Chapter 6: Developing the Project Budget and Engaging Stakeholders 768 Chapter 7: Identifying Project Risks 770 Chapter 8: Planning and Procuring Resources 771 Chapter 9: Developing the Project Team 773 Chapter 10: Sharing Information 775 Chapter 11: Measuring and Controlling Project Performance 776 Chapter 12: Controlling Work Results and Closing Out the Project 778 Appendix B Process Inputs and Outputs 781 Initiating Processes 782 Planning Processes 784 Executing Processes 807 Monitoring and Controlling Processes 821 Closing Processes 836 Index 839
£43.12
John Wiley & Sons Inc MCA Microsoft Certified Associate Azure
Book SynopsisTable of ContentsIntroduction xxiii Assessment Test xxx Chapter 1 Identity: Azure Active Directory 1 Azure Active Directory 2 Benefits 2 Concepts 4 Azure AD vs. Active Directory Domain Services 4 Azure AD: Licensing 5 Custom Domains in Azure AD 7 Users and Groups 8 User Accounts 8 Group Accounts 26 Azure AD Roles 36 Azure AD Join 37 Benefits 37 Connection Options 38 Self- Service Password Reset 39 Enabling SSPR 39 Authentication Methods 40 Managing Multiple Directories 42 Summary 43 Exam Essentials 44 Review Questions 45 Chapter 2 Compliance and Cloud Governance 49 Azure Regions 50 Facts 51 Regional Pairs 52 Azure Accounts and Subscriptions 53 Azure Accounts 54 Azure Subscriptions 54 Azure Cost Management 57 Plan and Control Expenses 58 Cost Saving Techniques 59 Resource Groups 60 Management Groups 65 Azure Policy 68 Implementing Azure Policy 69 Implementing Initiatives 77 Role- Based Access Control 79 Concepts 80 Azure RBAC Roles 82 Custom RBAC Roles 84 Role Assignment 91 Resource Locks 95 Configuring Locks 97 Resource Tags 99 Use Cases 99 Applying Tags 100 Summary 102 Exam Essentials 102 Review Questions 104 Chapter 3 Virtual Networking 109 Virtual Networks 110 VNet Concepts 111 Address Space 111 Subnets 111 Regions 111 Subscription 112 IP Addressing 113 Static and Dynamic Addressing 113 Private IP Addresses 113 Public IP Address 116 Network Routes 118 System Routes 119 User- Defined Routes 119 Service Endpoints 125 Supported Services 127 Private Endpoint 127 Azure DNS 129 Record Management 131 Private DNS Zones 133 Network Security Groups 137 NSG Concepts 137 NSG Effective Rules 141 Azure Firewall 142 Azure Firewall Rules 142 Implementing Azure Firewall 144 Summary 145 Exam Essentials 146 Review Questions 148 Chapter 4 Intersite Connectivity 153 Azure-to-Azure Connectivity 154 Internet 155 Virtual Network Peering 156 VPN Gateway 165 Virtual Network Peering vs. VPN Gateway 177 Azure to On- Premises Connectivity 178 VPN Gateways 178 ExpressRoute Connections 189 Intersite Connectivity Architecture 193 Virtual WAN 196 Summary 197 Exam Essentials 198 Review Questions 199 Chapter 5 Network Traffic Management 203 Availability Options 204 Availability Sets 205 Availability Zones 207 Service Level Agreement 208 Azure Load Balancer 208 Types of Load Balancers 209 Load Balancer SKUs 212 Configuring Load Balancer 212 Implementing Azure Load Balancer 214 Azure Application Gateway 221 Request Handling Process 222 Routing Methods 223 Configuring Application Gateway 224 Implementing Application Gateway 226 Azure Front Door 235 Azure Traffic Manager 237 Comparing the Load Balancing Solutions 239 Summary 239 Exam Essentials 240 Review Questions 241 Chapter 6 Azure Storage 245 Azure Storage Account 246 Azure Storage Services 247 Azure Blob Storage 247 Azure Files 248 Azure Queues 249 Azure Tables 249 Azure Disks 249 Storage Replication 250 Locally Redundant Storage 250 Zone Redundant Storage 251 Georedundant Storage 252 Geo-zone-Redundant Storage 253 Storage Account Types 255 Storage Account Endpoints 256 Accessing Storage 256 Custom Domain Configuration 256 Securing Storage Endpoints 257 Azure Blob Storage 258 Blob Containers 259 Blob Access Tiers 259 Blob Lifecycle Management 260 Uploading Blobs 261 Storage Security 268 Authorization Options 268 Shared Access Signatures 269 Storage Service Encryption 275 Azure Files and File Sync 276 Azure Files vs. Azure Blobs 276 Managing File Shares 277 Mapping File Shares 279 File Share Snapshots 282 Azure File Sync 285 Managing Storage 288 Azure Storage Explorer 289 AzCopy 291 Import/Export Service 297 Summary 299 Exam Essentials 300 Review Questions 302 Chapter 7 Azure Virtual Machines 307 Virtual Machine Planning 309 Virtual Network 309 Name 309 Location and Pricing 310 Size 311 Storage 312 Operating System 315 Deploying Virtual Machines 315 Connecting to Virtual Machines 320 Windows Connections 320 Linux Connections 324 Azure Bastion 329 Availability of Virtual Machines 334 Scaling Concepts 335 Vertical Scaling 335 Horizontal Scaling 336 Virtual Machine Scale Sets 336 Implementing a Scale Set 337 Autoscaling 340 Summary 342 Exam Essentials 342 Review Questions 343 Chapter 8 Automation, Deployment, and Configuration of Resources 349 Azure Resource Manager 350 ARM Templates 352 Template Design 352 Template Modes 354 Template Sections 355 Composing Templates 361 Exporting Templates 370 Configuring Virtual Hard Disk Templates 374 Create a VM from a VHD 375 Virtual Machine Extensions 376 Custom Script Extension 378 Desired State Configuration 379 Summary 380 Exam Essentials 381 Review Questions 382 Chapter 9 PaaS Compute Options 387 Azure App Service Plans 388 Pricing Tiers 389 Scaling 391 Azure App Services 396 Continuous Deployment 400 Deployment Slots 402 Securing App Service 405 Custom Domains 408 Backup 409 Container Instances 411 Docker 412 Azure Container Instances 415 Container Groups 421 Azure Kubernetes Service 422 Terminology 424 Cluster Components 425 Networking 426 Storage 429 Cluster Upgrade 431 Scaling 432 Summary 438 Exam Essentials 439 Review Questions 440 Chapter 10 Data Protection 445 File and Folder Backups 446 Azure Backup 446 Creating Recovery Services Vault 447 Configuring a Recovery Services Vault 448 Virtual Machine Data Protection 451 Virtual Machine Snapshots 452 Azure Backup 453 Azure Backup Server 463 Azure Site Recovery 466 Summary 469 Exam Essentials 470 Review Questions 471 Chapter 11 Monitoring Resources 475 Azure Monitor 476 Metrics 477 Logs 478 Data Sources 479 Activity Log 480 Azure Alerts 482 Creating Alert Rules 483 Alert States 484 Action Groups 484 Log Analytics 492 Workspace 493 Data Sources 493 Agents Configuration 496 Query Language 497 Network Watcher 502 IP Flow Verify 503 Next Hop 503 Effective Security Rules 505 VPN Troubleshoot 505 Packet Capture 506 Connection Troubleshoot 506 NSG Flow Logs 507 Topology 509 Summary 509 Exam Essentials 510 Review Questions 511 Appendix Answers to the Review Questions 515 Chapter 1: Identity: Azure Active Directory 516 Chapter 2: Compliance and Cloud Governance 517 Chapter 3: Virtual Networking 519 Chapter 4: Intersite Connectivity 520 Chapter 5: Network Traffic Management 521 Chapter 6: Azure Storage 522 Chapter 7: Azure Virtual Machines 524 Chapter 8: Automation, Deployment, and Configuration of Resources 526 Chapter 9: PaaS Compute Options 528 Chapter 10: Data Protection 529 Chapter 11: Monitoring Resources 530 Index 533
£38.00
John Wiley & Sons Inc MCA Microsoft Office Specialist Office 365 and
Book SynopsisTable of ContentsIntroduction xv Assessment Test xix Chapter 1 Managing Worksheets and Workbooks 1 Importing Data into Workbooks 2 Bringing in Data from TXT Files 3 Importing Data from CSV Files 4 Navigating Within Workbooks 8 Searching for Data Within a Workbook 8 Navigating to Named Cells, Ranges, or Workbook Elements 10 Inserting and Removing Hyperlinks 12 Formatting Worksheets and Workbooks 20 Modifying Page Settings 20 Adjusting Row Height and Column Width 22 Customizing Headers and Footers 30 Customizing Options and Views 36 Customizing the Quick Access Toolbar 37 Displaying and Modifying Workbook Content in Different Views 41 Freezing Worksheet Rows and Columns 44 Changing Window Views 46 Modifying Basic Workbook Properties 48 Displaying Formulas 49 Configuring Content for Collaboration 52 Setting a Print Area 52 Saving Workbooks in Other File Formats 54 Configuring Print Settings 54 Inspecting Workbooks for Issues 55 Summary 59 Key Terms 59 Exam Essentials 59 Review Questions 61 Chapter 2 Using Data Cells and Ranges 63 Manipulating Data in Worksheets 64 Pasting Data by Using Special Paste Options 64 Filling Cells by Using Auto Filling 68 Inserting and Deleting Multiple Columns or Rows 70 Adding and Removing Cells 72 Formatting Cells and Ranges 75 Merging and Unmerging Cells 75 Modifying Cell Alignment, Orientation, and Indentation 76 Formatting Cells by Using Format Painter 79 Wrapping Text Within Cells 80 Using Number Formatting 82 Applying Cell Formatting from the Format Cells Dialog Box 83 Working with Cell Styles 84 Clearing Cell Formatting 86 Defining and Referencing Named Ranges 88 Defining a Named Range 88 Naming a Table 93 Summarizing Data Visually 95 Inserting Sparklines 95 Applying Built-In Conditional Formatting 99 Removing Conditional Formatting 101 Summary 105 Key Terms 105 Exam Essentials 105 Review Questions 107 Chapter 3 Working with Tables and Table Data 109 Creating and Formatting Tables 110 Creating Excel Tables from Cell Ranges 110 Applying Table Styles 112 Converting Tables to Cell Ranges 113 Modifying Tables 115 Adding or Remove Table Rows and Columns 115 Configuring Table Style Options 118 Inserting and Configuring Total Rows 119 Filtering and Sorting Table Data 122 Filtering Records 122 Sorting Data by Multiple Columns 126 Summary 128 Key Terms 129 Exam Essentials 129 Review Questions 130 Chapter 4 Performing Operations by Using Formulas and Functions 133 Inserting References 134 Inserting Relative, Absolute, and Mixed References 135 Referencing Named Ranges and Named Tables in Formulas 137 Calculating and Transforming Datas 140 Performing Calculations Using the AVERAGE(), MAX(), MIN(), and SUM() Functions 140 Perform Conditional Operations by Using the IF() Function 151 Formatting and Modifying Text 155 Formatting Text Using the RIGHT(), LEFT(), and MID() Functions 155 Formatting Text Using the UPPER(), LOWER(), and LEN() Functions 159 Formatting Text Using the CONCAT() and TEXTJOIN() Functions 163 Summary 166 Key Terms 167 Exam Essentials 167 Review Questions 168 Chapter 5 Managing Charts 171 Creating Charts 172 Building Charts 172 Working with Chart Sheets 174 Modifying Charts 178 Adding Data Series to Charts 178 Switching Between Rows and Columns in Source Data 181 Adding and Modifying Chart Elements 182 Formatting Charts 185 Using Chart Layouts 186 Applying Chart Styles 194 Adding Alternative Text to Charts for Accessibility 196 Summary 198 Key Terms 198 Exam Essentials 199 Review Questions 200 Appendix: Answers to Review Questions 203 Chapter 1: Managing Worksheets and Workbooks 204 Chapter 2: Using Data Cells and Ranges 204 Chapter 3: Working with Tables and Table Data 205 Chapter 4: Performing Operations by Using Formulas and Functions 206 Chapter 5: Managing Charts 206 Index 209
£16.14
John Wiley & Sons Inc CISM Certified Information Security Manager Study
Book SynopsisTable of ContentsIntroduction Assessment Test xxi Chapter 1 Today’s Information Security Manager 1 Information Security Objectives 2 Role of the Information Security Manager 3 Chief Information Security Officer 4 Lines of Authority 4 Organizing the Security Team 5 Roles and Responsibilities 7 Information Security Risks 8 The DAD Triad 8 Incident Impact 9 Building an Information Security Strategy 12 Threat Research 12 SWOT Analysis 13 Gap Analysis 13 Creating SMART Goals 16 Alignment with Business Strategy 16 Leadership Support 17 Internal and External Influences 17 Cybersecurity Responsibilities 18 Communication 19 Action Plans 19 Implementing Security Controls 20 Security Control Categories 21 Security Control Types 21 Data Protection 23 Summary 25 Exam Essentials 25 Review Questions 27 Chapter 2 Information Security Governance and Compliance 31 Governance 33 Corporate Governance 33 Governance, Risk, and Compliance Programs 35 Information Security Governance 35 Developing Business Cases 36 Third- Party Relationships 37 Understanding Policy Documents 38 Policies 38 Standards 40 Procedures 42 Guidelines 43 Exceptions and Compensating Controls 44 Developing Policies 45 Complying with Laws and Regulations 46 Adopting Standard Frameworks 47 Cobit 47 NIST Cybersecurity Framework 49 NIST Risk Management Framework 52 ISO Standards 53 Benchmarks and Secure Configuration Guides 54 Security Control Verification and Quality Control 56 Summary 57 Exam Essentials 57 Review Questions 59 Chapter 3 Information Risk Management 63 Analyzing Risk 65 Risk Identification 66 Risk Calculation 67 Risk Assessment 68 Risk Treatment and Response 72 Risk Mitigation 73 Risk Avoidance 74 Risk Transference 74 Risk Acceptance 75 Risk Analysis 75 Disaster Recovery Planning 78 Disaster Types 78 Business Impact Analysis 79 Privacy 79 Sensitive Information Inventory 80 Information Classification 80 Data Roles and Responsibilities 82 Information Lifecycle 83 Privacy- Enhancing Technologies 83 Privacy and Data Breach Notification 84 Summary 84 Exam Essentials 85 Review Questions 86 Chapter 4 Cybersecurity Threats 91 Chapter 5 Exploring Cybersecurity Threats 92 Classifying Cybersecurity Threats 92 Threat Actors 94 Threat Vectors 99 Threat Data and Intelligence 101 Open Source Intelligence 101 Proprietary and Closed Source Intelligence 104 Assessing Threat Intelligence 105 Threat Indicator Management and Exchange 107 Public and Private Information Sharing Centers 108 Conducting Your Own Research 108 Summary 109 Exam Essentials 109 Review Questions 111 Information Security Program Development and Management 115 Information Security Programs 117 Establishing a New Program 117 Maintaining an Existing Program 121 Security Awareness and Training 123 User Training 123 Role- Based Training 124 Ongoing Awareness Efforts 124 Managing the Information Security Team 125 Hiring Team Members 126 Developing the Security Team 126 Managing the Security Budget 127 Organizational Budgeting 127 Fiscal Years 127 Expense Types 128 Budget Monitoring 129 Integrating Security with Other Business Functions 130 Procurement 130 Accounting 133 Human Resources 133 Information Technology 135 Audit 138 Summary 139 Exam Essentials 139 Review Questions 141 Chapter 6 Security Assessment and Testing 145 Vulnerability Management 146 Identifying Scan Targets 146 Determining Scan Frequency 148 Configuring Vulnerability Scans 149 Scanner Maintenance 154 Vulnerability Scanning Tools 155 Reviewing and Interpreting Scan Reports 159 Validating Scan Results 160 Security Vulnerabilities 161 Patch Management 162 Legacy Platforms 163 Weak Configurations 164 Error Messages 164 Insecure Protocols 165 Weak Encryption 166 Penetration Testing 167 Adopting the Hacker Mindset 168 Reasons for Penetration Testing 169 Benefits of Penetration Testing 169 Penetration Test Types 170 Rules of Engagement 171 Reconnaissance 173 Running the Test 173 Cleaning Up 174 Training and Exercises 174 Summary 175 Exam Essentials 176 Review Questions 177 Chapter 7 Cybersecurity Technology 181 Endpoint Security 182 Malware Prevention 183 Endpoint Detection and Response 183 Data Loss Prevention 184 Change and Configuration Management 185 Patch Management 185 System Hardening 185 Network Security 186 Network Segmentation 186 Network Device Security 188 Network Security Tools 191 Cloud Computing Security 195 Benefits of the Cloud 196 Cloud Roles 198 Cloud Service Models 198 Cloud Deployment Models 202 Shared Responsibility Model 204 Cloud Standards and Guidelines 207 Cloud Security Issues 208 Cloud Security Controls 210 Cryptography 212 Goals of Cryptography 212 Symmetric Key Algorithms 214 Asymmetric Cryptography 215 Hash Functions 217 Digital Signatures 218 Digital Certificates 219 Certificate Generation and Destruction 220 Code Security 223 Software Development Life Cycle 223 Software Development Phases 224 Software Development Models 226 DevSecOps and DevOps 229 Code Review 230 Software Security Testing 232 Identity and Access Management 234 Identification, Authentication, and Authorization 234 Authentication Techniques 235 Authentication Errors 237 Single- Sign On and Federation 238 Provisioning and Deprovisioning 238 Account Monitoring 239 Summary 240 Exam Essentials 241 Review Questions 244 Chapter 8 Incident Response 249 Security Incidents 251 Phases of Incident Response 252 Preparation 253 Detection and Analysis 254 Containment, Eradication, and Recovery 255 Post- Incident Activity 267 Building the Incident Response Plan 269 Policy 269 Procedures and Playbooks 270 Documenting the Incident Response Plan 270 Creating an Incident Response Team 272 Incident Response Providers 273 CSIRT Scope of Control 273 Coordination and Information Sharing 273 Internal Communications 274 External Communications 274 Classifying Incidents 274 Threat Classification 275 Severity Classification 276 Conducting Investigations 279 Investigation Types 279 Evidence 282 Plan Training, Testing, and Evaluation 288 Summary 289 Exam Essentials 290 Review Questions 292 Chapter 9 Business Continuity and Disaster Recovery 297 Planning for Business Continuity 298 Project Scope and Planning 299 Organizational Review 300 BCP Team Selection 301 Resource Requirements 302 Legal and Regulatory Requirements 303 Business Impact Analysis 304 Identifying Priorities 305 Risk Identification 306 Likelihood Assessment 308 Impact Analysis 309 Resource Prioritization 310 Continuity Planning 310 Strategy Development 311 Provisions and Processes 311 Plan Approval and Implementation 313 Plan Approval 313 Plan Implementation 314 Training and Education 314 BCP Documentation 314 The Nature of Disaster 318 Natural Disasters 319 Human- Made Disasters 324 System Resilience, High Availability, and Fault Tolerance 327 Protecting Hard Drives 328 Protecting Servers 329 Protecting Power Sources 331 Recovery Strategy 331 Business Unit and Functional Priorities 332 Crisis Management 333 Emergency Communications 334 Workgroup Recovery 334 Alternate Processing Sites 334 Database Recovery 338 Recovery Plan Development 340 Emergency Response 341 Personnel and Communications 341 Assessment 342 Backups and Offsite Storage 342 Utilities 345 Logistics and Supplies 345 Training, Awareness, and Documentation 345 Testing and Maintenance 346 Read- Through Test 346 Structured Walk- Through 346 Simulation Test 347 Parallel Test 347 Full- Interruption Test 347 Lessons Learned 347 Maintenance 348 Summary 349 Exam Essentials 349 Review Questions 351 Appendix Answers to the Review Questions 357 Chapter 1: Today’s Information Security Manager 358 Chapter 2: Information Security Governance and Compliance 360 Chapter 3: Information Risk Management 362 Chapter 4: Cybersecurity Threats 363 Chapter 5: Information Security Program Development and Management 365 Chapter 6: Security Assessment and Testing 368 Chapter 7: Cybersecurity Technology 370 Chapter 8: Incident Response 372 Chapter 9: Business Continuity and Disaster Recovery 374 Index 377
£37.50
John Wiley & Sons Inc CEH v11 Certified Ethical Hacker Study Guide
Book SynopsisMaster CEH v11 and identify your weak spots As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. CEH v11 Certified Ethical Hacker Study Guide and Practice Tests Set provides you with all of the technical review you need of CEH skills PLUS SEVEN practice tests to prove your readiness for exam day. About the CEH v11 Certified Ethical Hacker Study Guide The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review q
£43.12
John Wiley & Sons Inc Google Cloud Certified Professional Cloud
Book SynopsisTable of ContentsIntroduction xxiii Assessment Test xxix Answers to the Assessment Test xxxv Chapter 1 Introduction to the Google Professional Cloud Architect Exam 1 Exam Objectives 2 Analyzing Business Requirements 3 Reducing Operational Expenses 3 Accelerating the Pace of Development 4 Reporting on Service- Level Objectives 5 Reducing Time to Recover from an Incident 5 Improving Compliance with Industry Regulations 6 Analyzing Technical Requirements 8 Functional Requirements 8 Exam Case Studies 11 EHR Healthcare 12 Helicopter Racing League 13 Mountkirk Games 14 TerramEarth 15 Summary 16 Exam Essentials 16 Review Questions 18 Chapter 2 Designing Solutions to Meet Business Requirements 23 Business Use Cases and Product Strategy 24 EHR Healthcare 25 Helicopter Racing League 26 Mountkirk Games Strategy 26 TerramEarth Strategy 27 Application Design and Cost Considerations 27 Managed Services 28 Reduced Levels of Services 30 Data Lifecycle Management 32 Systems Integration and Data Management 33 Systems Integration Business Requirements 33 Data Management Business Requirements 36 Compliance and Regulation 38 Privacy Regulations 38 Data Integrity Regulations 39 Security 39 Confidentiality 40 Integrity 40 Availability 41 Success Measures 41 Key Performance Indicators 41 Return on Investment 42 Summary 43 Exam Essentials 43 Review Questions 45 Chapter 3 Designing Solutions to Meet Technical Requirements 51 High Availability 52 Compute Availability 54 Storage Availability 56 Network Availability 60 Application Availability 60 Scalability 61 Scaling Compute Resources 62 Scaling Storage Resources 64 Network Design for Scalability 64 Reliability 65 Measuring Reliability 65 Reliability Engineering 65 Summary 66 Exam Essentials 66 Review Questions 68 Chapter 4 Designing Compute Systems 73 Compute Services and Use Cases 74 Compute Engine 75 App Engine 80 Cloud Functions 82 Cloud Run 84 Kubernetes Engine 84 Anthos 90 Overview of Anthos 91 Anthos Service Mesh 91 Anthos Multi Cluster Ingress 92 Anthos Deployment Options 92 AI and Machine Learning Services 93 Vertex AI 94 Cloud TPU 94 Data Flows and Pipelines 94 Cloud Pub/Sub Pipelines 95 Cloud Dataflow Pipelines 96 Cloud Dataproc 96 Cloud Workflows 96 Cloud Data Fusion 96 Cloud Composer 97 Compute System Provisioning 97 Additional Design Issues 97 Managing State in Distributed Systems 98 Synchronous and Asynchronous Operations 99 Summary 100 Exam Essentials 101 Review Questions 102 Chapter 5 Designing Storage Systems 107 Overview of Storage Services 108 Object Storage with Google Cloud Storage 109 Organizing Objects in a Namespace 109 Cloud Storage FUSE 110 Storage Tiers 110 Cloud Storage Use Cases 111 Network- Attached Storage with Google Cloud Filestore 112 Cloud Filestore Service Tiers 112 Cloud Filestore Networking 113 Cloud Filestore Access Controls 113 Databases 113 Relational Database Overview 114 Cloud SQL 115 Cloud Spanner 117 Analytical Database: BigQuery 117 NoSQL Databases 120 Caching with Cloud Memorystore 121 Data Retention and Lifecycle Management 122 Networking and Latency 123 Summary 124 Exam Essentials 125 Review Questions 127 Chapter 6 Designing Networks 131 IP Addressing, Firewall Rules, and Routers 133 IP Address Structure 133 Public vs. Private Addressing 134 Firewall Rules 134 Cloud Router 135 Cloud Armor 135 Virtual Private Clouds 136 VPC Subnets 136 Shared VPC 137 VPC Network Peering 137 Hybrid- Cloud Networking 138 Hybrid- Cloud Design Considerations 138 Hybrid- Cloud Implementation Options 139 Service- Centric Networking 141 Private Service Connect for Google APIs 141 Private Service Connect for Google APIs with Consumer Http(s) 142 Private Google Access 142 Private Google Access for On- Premises Hosts 142 Private Service Connect for Published Services 142 Private Service Access 142 Serverless VPC Access 142 Load Balancing 143 Regional Load Balancing 143 Global Load Balancing 144 Additional Network Services 145 Service Directory 145 Cloud CDN 145 Cloud DNS 145 Summary 146 Exam Essentials 146 Review Questions 148 Chapter 7 Designing for Security and Legal Compliance 153 Identity and Access Management and Related Access Control Services 154 Identities and Groups 154 Resources 155 Permissions 156 Roles 156 Policies 158 Cloud IAM Conditions 160 IAM Best Practices 160 Identity- Aware Proxy 161 Workload Identity Federation 161 Organization Constraints 162 Data Security 162 Encryption 163 Key Management 164 Cloud Storage Data Access 166 Security Evaluation 166 Penetration Testing 167 Auditing 167 Security Design Principles 168 Separation of Duties 168 Least Privilege 169 Defense in Depth 170 Major Regulations 171 Hipaa/hitech 171 General Data Protection Regulation 172 Sarbanes- Oxley Act 172 Children’s Online Privacy Protection Act 173 ITIL Framework 173 Summary 174 Exam Essentials 174 Review Questions 177 Chapter 8 Designing for Reliability 181 Improving Reliability with Cloud Operations Suite 182 Monitoring with Cloud Monitoring 183 Alerting with Cloud Monitoring 186 Logging with Cloud Logging 187 Open Source Observability Tools 188 Release Management 188 Continuous Delivery 189 Continuous Integration 192 Systems Reliability Engineering 193 Overload 193 Cascading Failures 196 Testing for Reliability 197 Incident Management and Post- Mortem Analysis 198 Summary 199 Exam Essentials 199 Review Questions 201 Chapter 9 Analyzing and Defining Technical Processes 205 Software Development Lifecycle Plan 206 Analysis 206 Design 208 Continuous Integration/Continuous Delivery 211 Business Drivers to Adopt CI/CD 211 CI/CD Building Blocks 212 Troubleshooting and Post- Mortem Analysis Culture 213 Incident Post- Mortems 214 Project Post- Mortems 215 IT Enterprise Processes 216 Business Continuity Planning and Disaster Recovery 217 Business Continuity Planning 217 Disaster Recovery 218 Summary 219 Exam Essentials 220 Review Questions 222 Chapter 10 Analyzing and Defining Business Processes 227 Stakeholder Management 228 Interests and Influence 228 Projects, Programs, and Portfolios 229 Stages of Stakeholder Management 230 Change Management 231 Reasons for Change 231 Change Management Methodologies 232 Team Skill Management 233 Customer Success Management 234 Cost Optimization/Resource Optimization 235 Summary 236 Exam Essentials 236 Review Questions 238 Chapter 11 Development and Operations 243 Application Development Methodologies 244 Waterfall 244 Spiral 245 Agile 246 Technical Debt 247 API Best Practices 248 Resources and Standard Methods 248 API Security 249 Testing Frameworks 251 Testing Framework Models 251 Automated Testing Tools 252 Data and System Migration Tooling 253 Types of Cloud Migrations 253 Migration Services and Tools 254 Interacting with Google Cloud Programmatically 255 Google Cloud SDK 256 Google Cloud Shell 256 Cloud Emulators 257 Summary 257 Exam Essentials 257 Review Questions 259 Chapter 12 Migration Planning 263 Integrating Cloud Services with Existing Systems 264 Migrating Systems and Data to Support a Solution 266 Planning for Systems Migrations 266 Planning for Data Migration 268 Software Licensing Mapping 269 Network Planning 271 Virtual Private Clouds 271 Network Access Controls 272 Scaling 273 Connectivity 273 Summary 273 Exam Essentials 274 Review Questions 276 Appendix Answers to the Review Questions 279 Chapter 1: Introduction to the Google Professional Cloud Architect Exam 280 Chapter 2: Designing Solutions to Meet Business Requirements 282 Chapter 3: Designing Solutions to Meet Technical Requirements 285 Chapter 4: Designing Compute Systems 287 Chapter 5: Designing Storage Systems 290 Chapter 6: Designing Networks 293 Chapter 7: Designing for Security and Legal Compliance 295 Chapter 8: Designing for Reliability 297 Chapter 9: Analyzing and Defining Technical Processes 298 Chapter 10: Analyzing and Defining Business Processes 301 Chapter 11: Development and Operations 303 Chapter 12: Migration Planning 305 Index 309
£39.00
John Wiley & Sons Inc ISC2 CCSP Certified Cloud Security Professional
Book SynopsisTable of ContentsIntroduction xv Chapter 1 Domain 1: Cloud Concepts, Architecture, and Design 1 Chapter 2 Domain 2: Architecture and Design 23 Chapter 3 Domain 3: Cloud Platform and Infrastructure Security 45 Chapter 4 Domain 4: Cloud Application Security 65 Chapter 5 Domain 5: Cloud Security Operations 85 Chapter 6 Domain 6: Legal, Risk, and Compliance 105 Chapter 7 Practice Test 1 125 Chapter 8 Practice Test 2 151 Appendix Answers to Review Questions 175 Chapter 1: Domain 1: Cloud Concepts, Architecture, and Design 176 Chapter 2: Domain 2: Architecture and Design 188 Chapter 3: Domain 3: Cloud Platform and Infrastructure Security 198 Chapter 4: Domain 4: Cloud Application Security 213 Chapter 5: Domain 5: Cloud Security Operations 223 Chapter 6: Domain 6: Legal, Risk, and Compliance 232 Chapter 7: Practice Test 1 245 Chapter 8: Practice Test 2 259 Index 273
£26.24
McGraw-Hill Education OCA Java SE 8 Programmer I Study Guide Exam
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The official study guide for the entry-level Oracle Certified Associate exam for Java Programmersâfully updated for Java SE 8Confidently prepare for the OCA Java SE 8 Programmer I exam with this thoroughly revised, up-to-date guide from Oracle Press. Featuring step-by-step exercises, comprehensive chapter self-tests, and a CD-ROM containing two complete practice exams, this volume provides an integrated, easy-to-follow study system based on a proven methodology.OCA Java SE 8 Programmer I Study Guide (Exam 1Z0-808) offers the most complete and in-depth coverage of all of the exam objectives, anTable of ContentsChapter 1: Packaging, Compiling, and Interpreting Java CodeChapter 2: Programming with Java StatementsChapter 3: Programming with Java Operators and StringsChapter 4: Working with Basic Classes and VariablesChapter 5: Understanding Methods and Variable ScopeChapter 6: Programming with ArraysChapter 7: Understanding Class InheritanceChapter 8: Understanding Polymorphism and CastsChapter 9: Handling ExceptionsChapter 10: Programming with the Date and Time APIChapter 11: Understanding Lambda ExpressionsAppendicesAppendix A: Class RelationshipsAppendix B: Java SE 8 PackagesAppendix C: Java KeywordsAppendix D: Bracket ConventionsAppendix E: Unicode StandardAppendix F: Pseudo-code AlgorithmsAppendix G: Unified Modeling LanguageAppendix H: Functional InterfacesAppendix I: About the CDGlossary
£27.64
McGraw-Hill Education SSCP Systems Security Certified Practitioner
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated study guide offers complete coverage of every topic on the latest version of the SSCP exam This thoroughly revised guide offers complete coverage of all the material on the Systems Security Certified Practitioner (SSCP) exam. Written by a leading IT security certification and training expert, this authoritative resource addresses all seven SSCP domains as developed by the International Information Systems Security Certification Consortium (ISC)2 , including updated exam objectives effective November 1, 2018. Youâll find lists of topics covered at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanationsTable of ContentsChapter 1: Security FundamentalsChapter 2: Access ControlsChapter 3: Basic Networking and CommunicationsChapter 4: Advanced Networking and CommunicationsChapter 5: AttacksChapter 6: Malicious Code and ActivityChapter 7: Risk, Response, and RecoveryChapter 8: Monitoring and AnalysisChapter 9: Controls and CountermeasuresChapter 10: AuditingChapter 11: Security OperationsChapter 12: Security Administration and PlanningChapter 13: Legal IssuesChapter 14: Cryptography
£47.19
McGraw-Hill Education CISSP Practice Exams Fifth Edition
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Donât Let the Real Test Be Your First Test! This fully updated self-study guide offers complete coverage of all eight Certified Information Systems Security Professional exam domains developed by the International Information Systems Security Certification Consortium (ISC)2 . To reinforce important skills and facilitate retention, every question is accompanied by in-depth explanations for both correct and incorrect answers. Designed to help you pass the test with ease, this book is the ideal companion to the bestselling CISSP All-in-One Exam GuideTable of ContentsChapter 1: Security and Risk ManagementChapter 2: Asset SecurityChapter 3: Security EngineeringChapter 4: Communication and Network SecurityChapter 5: Identity and Access ManagementChapter 6: Security Assessment and TestingChapter 7: Security OperationsChapter 8: Software Development Security
£23.39
McGraw-Hill Education PHRSPHR Professional in Human Resources
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Donât Let the Real Test Be Your First Test! Based on the HR Certification Instituteâs Professional and Senior Professional in Human Resources bodies of knowledge, this practical guide contains 600+ realistic practice exam questions to prepare you for the 2018 versions of these challenging certification exams. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment exam tests your readiness and identifies areas requiring further study. Designed to help you pass the exams, this is the perfect companion to PHR /SPHR Professional in Human Resour
£27.89
McGraw-Hill Education CompTIA Security Certification Study Guide Fourth
Book SynopsisThis fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ examWith hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+â Certification Study Guide, Fourth Edition covers what you need to knowâand shows you how to prepareâfor this challenging exam. 100% complete coverage of all official objectives for exam SY0-601 Exam Watch notes call attention to information about, and potential pitfalls in, the exam Inside the Exam sections in every chapter highlight key exam topics covered Two-Minute Drills for quick review at the end of every chapter Simulated exam questionsâincluding performance-based questionsâmatch the format, topics, and difficulty of the real exam Covers all exam topics, including:Networking Basics and Terminology â Security Terminology â Security Policies and Standards â Types of Attacks â VTable of Contents Networking Basics and Terminology Introduction to Security Terminology Security Policies and Standards Types of Attacks Vulnerabilities and Threats Mitigating Security Threats Implementing Host-based Security Securing the Network Infrastructure Wireless Networking and Security Authentication Authorization and Access Control Introduction to Cryptography Managing a Public Key Infrastructure Physical Security Application Attacks and Security Virtualization and Cloud Security Risk Analysis Disaster Recovery and Business Continuity Understanding Monitoring and Auditing Security Assessments and Audits Incident Response and Computer Forensics
£33.14
McGraw-Hill Education Mike Meyers CompTIA A Core 1 Certification
Book SynopsisAccelerated review of the 2022 version of the A+ Core 1 exam from CompTIAGet on the fast track to becoming CompTIA A+ certified with this affordable, portable study tool. Inside, certification training gurus Mike Meyers and Ron Gilster guide you on your exam preparation path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA A+ 220-1101 exam, this certification passport is your ticket to success on exam day.Inside: Quick-reference tables and illustrated laptop teardown enhance coverage of mobile devices (Exam 1101, Domain 1.0) Quick-reference tables help you master hardware troubleshooting (Exam 1101, Domain 5.0) Practice questions and content review after each objective prepare you for exam mastery Enhanced coverage of network laptop teardown, desktop hardware, and hardware and software troubleshooting Enhanced coverage of Windows 10/11, macO
£17.59
McGraw-Hill Education CompTIA Linux Certification AllinOne Exam Guide
Book SynopsisThis comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ examGet complete coverage of all the objectives included on CompTIA Linux+ exam XK0-005 from this up-to-date resource. Written by Linux experts and technology trainers, the book provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth answer explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including how to: Use the vi text editor Work with the Linux shell Manage Linux users, groups, files, and directories Administer ownership, permissions, and quotas Install Linux and manage the boot process Perform container operations and version control with Git Manage software and hardware Write shell scripts Manage network settings and s
£37.49
McGraw-Hill Education CC Certified in Cybersecurity AllinOne Exam Guide
Book SynopsisThis new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity examTake the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by a pair of cybersecurity experts and successful trainers, CC Certified in Cybersecurity All-in-One Exam Guide offers background material, detailed examples, and over 200 practice questions. Each exam domain is presented with information corresponding to the (ISC)2 certification exam outline. Using the trusted âœAll-in-Oneâ format, the book reviews every topic on the test and presents foundational knowledge and skills important for an entry-level cybersecurity role. You will get explanations and technical details on core concepts as well as stories, discussions, and anecdotes from real-world cybersecurity experts.Coverage includes: Security Principles Business Continuity (BC), Disaster Rec
£33.74
John Wiley & Sons Inc ISC2 CISSP Certified Information Systems Security
Book Synopsis
£49.50
Hodder Education Cambridge International A Level Information
Book SynopsisDevelop theoretical and practical IT skills with this comprehensive Student's Book written by experienced authors and examiners specially for the new Cambridge Assessment International Education AS & A Level IT syllabus (9626).
£38.08
O'Reilly Media Head First Java 3rd Edition
Book SynopsisWith this book, you'll learn the Java language with a unique method that goes beyond how-to manuals. Through puzzles, mysteries, and soul-searching interviews with famous Java objects, you'll quickly get up to speed on Java's fundamentals and advanced topics including lambdas, streams, generics, threading, networking, and the dreaded desktop GUI.
£47.99
SAP Press SAP Extension Suite Certification Guide
Book SynopsisPreparing for your SAP Extension Suite development associate exam? Make the grade with this certification study guide! From user interfaces to security, this guide will review the key technical knowledge you need to pass the test. Explore test methodology, key concepts for each topic area, and practice questions and answers. Your path to SAP Extension Suite certification begins here! Highlights include: 1) Exam C_CPE_13 2) SAP S/4HANA 3) SAP Extension Suite 4) SAP Integration Suite 5) SAP API Business Hub 6) SAP Business Application Studio 7) SAP Business Technology Platform (SAP BTP) 8) SAP Fiori 9) APIs 10) Continuous integration and continuous delivery (CI/CD) 11) Extensibility 12) Security
£72.76
Microsoft Press,U.S. Exam Ref 70-745 Implementing a Software-Defined
Book SynopsisPrepare for Microsoft Exam 70-745–and help demonstrate your real-world mastery of skills needed to build and manage software-defined infrastructure with Windows Server 2016 and System Center 2016 Virtual Machine Manager (SC VMM). Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSE level. Focus on the expertise measured by these objectives: • Plan and implement System Center Virtual Machine Manager (VMM) core infrastructure • Implement Software-Defined Networking (SDN) • Implement software-defined storage • Implement datacenter compute solutions with Virtual Machine Manager (VMM) • Secure your software-defined datacenter • Monitor and maintain the software-defined datacenter This Microsoft Exam Ref: • Organizes its coverage by exam objectives • Features strategic, what-if scenarios to challenge you • Assumes you have experience with System Center 2012 R2 Virtual Machine Manager and Windows Server 2016 networking, storage, Hyper-V, and Hyper-V Clusters About the Exam Exam 70-745 focuses on skills and knowledge for implementing a software-defined datacenter with Windows Server 2016 and Microsoft System Center 2016 Virtual Machine Manager (SCVMM). About Microsoft Certification Passing this exam earns you credit towards the Microsoft Certified Solutions Expert (MCSE): Cloud Platform and Infrastructure certification, validating that you have skills needed to run a highly efficient and modern data center, with expertise in cloud technologies, identity and systems management, virtualization, storage, and networking. See full details at: microsoft.com/learningTable of ContentsCHAPTER 1 Plan and implement System Center Virtual Machine Manager core infrastructure CHAPTER 2 Implement Software-Defined Networking (SDN) CHAPTER 3 Implement Software-Defined Storage CHAPTER 4 Implement Datacenter Compute Solutions with Virtual Machine Manager (VMM) CHAPTER 5 Secure your Software-Defined Datacenter CHAPTER 6 Monitor and maintain the Software-Defined Datacenter
£30.14
Microsoft Press,U.S. Exam Ref 70-533 Implementing Microsoft Azure
Book SynopsisPrepare for the newest versions of Microsoft Exam 70-533–and help demonstrate your real-world mastery of implementing Microsoft Azure Infrastructure as a Service (IaaS). Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Design and implement Azure App Service Apps Create and manage compute resources, and implement containers Design and implement a storage strategy, including storage encryption Implement virtual networks, including new techniques for hybrid connections Design and deploy ARM Templates Manage Azure security and Recovery Services Manage Azure operations, including automation and data analysis Manage identities with Azure AD Connect Health, Azure AD Domain Services, and Azure AD single sign on This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are an IT professional with experience implementing and monitoring cloud and hybrid solutions and/or supporting application lifecycle management This book covers the 533 objectives as of December 2017. If there are updates for this book, you will find them at https://aka.ms/examref5332E/errata. About the Exam Exam 70-533 focuses on skills and knowledge for provisioning and managing services in Microsoft Azure, including: implementing infrastructure components such as virtual networks, virtual machines, containers, web and mobile apps, and storage; planning and managing Azure AD, and configuring Azure AD integration with on-premises Active Directory domains. About Microsoft Certification Passing this exam helps qualify you for MCSA: Cloud Platform Microsoft Certified Solutions Associate certification, demonstrating your expertise in applying Microsoft cloud technologies to reduce costs and deliver value. To earn this certification, you must also pass any one of the following exams: 70-532 Developing Microsoft Azure Solutions, or 70-534 Architecting Microsoft Azure Solutions, or 70-535, Architecting Microsoft Azure Solutions, or 70-537: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack.Table of ContentsChapter 1 Design and implement Azure App Service Web Apps Skill 1.1: Deploy web apps Skill 1.2: Configure web apps Skill 1.3: Configure diagnostics, monitoring, and analytics Skill 1.4: Configure web apps for scale and resilience Chapter 2 Create and manage Compute Resources Skill 2.1: Deploy workloads on Azure Resource Manager (ARM) virtual machines (VMs) Skill 2.2: Perform configuration management Skill 2.3: Design and implement VM Storage Skill 2.4: Monitor ARM VMs Skill 2.5: Manage ARM VM availability Skill 2.6 Scale ARM VMs Skill 2.7 Manage containers with Azure Container Services (ACS) Chapter 3 Design and implement a storage strategy Skill 3.1: Implement Azure Storage blobs and files Skill 3.2: Manage access Skill 3.3: Configure diagnostics, monitoring, and analytics Skill 3.4: Implement storage encryption Chapter 4 Implement Virtual Networks Skill 4.1: Configure Virtual Networks Skill 4.2: Design and implement multi-site or hybrid network connectivity Skill 4.3: Configure ARM VM Networking Skill 4.4: Design and implement a communication strategy Chapter 5 Design and deploy ARM templates Skill 5.1: Implement ARM templates Skill 5.2: Control access Skill 5.3: Design role-based access control (RBAC) Chapter 6 Manage Azure Security and Recovery Services Skill 6.1: Manage data protection and security compliance Skill 6.2: Implement recovery services Chapter 7 Manage Azure Operations Skill 7.1: Enhance cloud management with automation Skill 7.2: Collect and analyze data generated by resources in cloud and on-premises environments Chapter 8 Manage Azure Identities Skill 8.1: Monitor On-Premises Identity Infrastructure and Synchronization Services with Azure AD Connect Health Skill 8.2: Manage Domains with Active Directory Domain Services Skill 8.3: Integrate with Azure Active Directory (Azure AD) Skill 8.4: Implement Azure AD B2C and Azure AD B2B
£30.14
MC Press, LLC DB2 9 for z/OS Database Administration:
Book SynopsisIn order to become an IBM Certified Database Administrator - DB2 9 DBA for z/OS, you must pass two exams: DB2 9 Fundamentals Exam (Exam 730), and DB2 9 Database Administrator for z/OS (Exam 732)—the primary focus focus of this book.Written by two members of the team who participated in the actual writing of the exam, this specialized study guide covers every topic that you will need to know to pass Exam 732, including database design and implementation, operation and recovery, security and auditing, performance, as well as installation and migration/upgrade. But that is only the beginning. It also covers the new features of DB2 9 for both database and application development.This comprehensive guide includes an extensive set of practice questions in each chapter that closely model the actual exam, along with an answer key with a description of why the answer is the correct one. No other source gives you this much help in passing the exam.Whether you plan to take Exam 732 or just want to master the skills needed to be an effective database administrator on z/OS systems, this is the only book you’ll need.With the DB2 9 for z/OS Database Administration Certification Study Guide, you will:• Discover the changes to DB2 9 that you’ll need to know in order to be successful when taking the exam • Learn how to effectively administer a DB2 database • Receive an explanation of every objective included on the test…by someone involved in the creation of the actual exam • Find 85 practice questions based on the actual exam’s format and approach, along with comprehensive answers to help you gain understandingPublisher’s Note: While this book covers much of the information needed to prepare for Exam 730, a far more in-depth review of topics specifically related to Exam 730 can be found in the MC Press companion book: DB2 9 Fundamentals Certification Study Guide by Roger E. Sanders.Table of ContentsDB2 Product Fundamentals Environment Access and Security Database Objects Retrieving and Manipulating Database Objects Advanced SQL Coding Maintaining Data Recovery and Restart Data Sharing Using SQL in an Application Pogram Binding an Application Program Application Program Features Stored Procedures Accessing Distributed Data Advanced Functionality Locking and Concurrency Performance Monitoring and Tuning
£54.15
MC Press, LLC DB2 9 for Linux, UNIX, and Windows Database
Book SynopsisIn DB2 9 for Linux, UNIX, and Windows Database Administration Upgrade Certification Study Guide , Roger E. Sanders--one of the world's leading DB2 authors and an active participant in the development of IBM's DB2 certification exams--covers everything a reader needs to know to pass the short--but notoriously challenging--DB2 9 for LUW DBA Certification Upgrade exam (Exam 736). This specialized study guide steps you through all of the topics that are covered on the exam, including server management, data placement, XML concepts, activity analysis, high availability, database security, and much more. Everything new to DB2 9 that you will need to know in order to successfully pass the exam is covered in this book. Taking and passing the DB2 9 for LUW DBA Certification Upgrade exam (Exam 736) provides validation that you have mastered DB2 9. Passing this exam also earns you the IBM Certified Database Administrator or Advanced Database Administrator certification. This concentrated guide includes an extensive set of practice questions in each chapter that closely models the actual exam, along with an answer key with a full description of why the answer is the correct one. No other source gives you this much help in passing the exam. With the DB2 9 for Linux, UNIX, and Windows Database Administration Upgrade Certification Study Guide , you will: Gain the knowledge necessary to pass the DB2 9 for LUW DBA Upgrade Certification exam (Exam 736) Discover the changes to DB2 9 that you'll need to know in order to be successful when taking the exam Receive an explanation of every topic included on the test...by someone involved in the creation of the actual exam Find 60 practice questions based on the actual exam's format and approach, along with comprehensive answers to the test questions to help you gain understandingTable of ContentsChapter 1: IBM DB2 9 Certification Chapter 2: Server Management Chapter 3: Data Placement Chapter 4: XML Concepts Chapter 5: Analyzing DB2 Activity Chapter 6: High Availability Chapter 7: Security
£29.40
Pearson Education (US) CCENT Practice and Study Guide: Exercises,
Book SynopsisCCENT Practice and Study Guide is designed with dozens of exercises to help you learn the concepts and configurations crucial to your success with the Interconnecting Cisco Networking Devices Part 1 (ICND1 100-101) exam. The author has mapped the chapters of this book to the first two Cisco Networking Academy courses in the CCNA Routing and Switching curricula, Introduction to Networks and Routing and Switching Essentials. These courses cover the objectives of the Cisco Certified Networking Entry Technician (CCENT) certification. Getting your CCENT certification means that you have the knowledge and skills required to successfully install, operate, and troubleshoot a small branch office network. As a Cisco Networking Academy student or someone taking CCENT-related classes from professional training organizations, or college- and university-level networking courses, you will gain a detailed understanding of routing by successfully completing all the exercises in this book.Each chapter is designed with a variety of exercises, activities, and scenarios to help you: · Review vocabulary · Strengthen troubleshooting skills · Boost configuration skills · Reinforce concepts · Research and analyze topicsTable of Contents Part I: Introduction to Networks CHAPTER 1 Exploring the Network 1 Globally Connected 1 Vocabulary Exercise: Matching 2 Completion Exercise 3 LANs, WANs, and the Internet 3 Completion Exercise 3 Classify and Identify Network Components 5 Compare LANs and WANs 6 Vocabulary Exercise: Matching 7 The Network as a Platform 8 Classify Network Architecture Requirements 8 The Changing Network Environment 10 Completion Exercise 10 Network Security Terminology 11 CHAPTER 2 Configuring a Network Operating System 13 IOS Bootcamp 13 Completion Exercise 13 Accessing a Cisco IOS Device 14 Navigating the IOS Matching Exercise 15 Basic Device Configuration 16 Applying a Basic Configuration 16 CHAPTER 3 Network Protocols and Communications 19 Rules of Communication 19 Vocabulary Exercise: Matching 20 Network Protocols and Standards 21 Protocol Definitions: Matching 21 Mapping the Protocols of the TCP/IP Suite 22 Explore the Purpose of Standards Organizations 22 OSI Reference Model Layers: Matching 24 TCP/IP Model Layers: Matching 24 Mapping the Layers of the OSI and TCP/IP Models 25 Moving Data in the Network 26 Data Encapsulation and the PDUs 26 The Role of Addressing in Network Communications 27 CHAPTER 4 Network Access 29 Physical Layer Protocols 29 Completion Exercise 29 Vocabulary Exercise: Matching 31 Network Media 32 Copper Cabling Completion Exercise 32 Compare UTP, STP, and Coaxial Characteristics 32 UTP Cabling Completion Exercise 33 UTP Cable Pinouts 34 Fiber-Optic Cabling Completion Exercise 34 Compare Single-Mode and Multimode Fiber 35 Wireless Media Completion Exercise 36 Data Link Layer Protocols 37 The Sublayers of the Data Link Layer 37 Label the Generic Frame Fields 37 Identify the Data Link Layer Standards Organization 37 Media Access Control 38 Topologies and Access Methods Completion Exercise 38 Label the Ethernet Frame Fields 39 Label the PPP Frame Fields 40 Label the 802.11 Wireless Frame Fields 40 CHAPTER 5 Ethernet 41 Ethernet Protocol 41 Ethernet Operation Completion Exercise 41 Identify the Ethernet Frame Attributes: Matching 42 Comparing Decimal, Binary, and Hexadecimal Digits 43 Address Resolution Protocol 43 Completion Exercise 43 Identify the MAC and IP Addresses 44 LAN Switches 45 Building the MAC Address Table 45 Switching Concepts Completion Exercise 46 Comparing Switch Forwarding Methods 47 Forward the Frame 47 Layer 3 Switching Concepts Completion Exercise 50 Layer 3 Switch Configuration 51 CHAPTER 6 Network Layer 53 Network Layer Protocols 53 The Processes of the Network Layer 53 Characteristics of the IP Protocol 53 Fields of the IPv4 Packet: Matching 55 Fields of the IPv6 Packet: Matching 55 Routing 56 How a Host Routes Packets Completion Exercise 56 Routing Table Entry: Matching 58 Routers 58 Identify Router Components 58 Router Boot Process Exercise 59 Interpreting the show version Command Exercise 60 Configuring a Cisco Router 60 Basic Router Configuration Exercise 60 Applying a Basic Configuration 62 Verifying Basic Router Configuration 63 CHAPTER 7 Transport Layer 65 Transport Layer Protocols 65 Transportation of Data Completion Exercise 65 Introducing TCP and UDP 66 TCP and UDP 66 TCP Communication 67 UDP Communication 69 TCP or UDP, That Is the Question 69 CHAPTER 8 IP Addressing 71 IPv4 Network Addresses 71 IPv4 Address Structure 71 IPv4 Subnet Mask 72 The Last Nonzero Octet 73 ANDing to Determine the Network Address 73 IPv4 Unicast, Broadcast, and Multicast 74 Types of IPv4 Addresses 74 IPv6 Network Addresses 75 Representing IPv6 Addresses 76 Identify IPv6 Address Types 77 IPv6 Unicast Addresses 80 The 3-1-4 Rule 80 Static Configuration of Global Unicast Addressing 81 Dynamic Configuration of Global Unicast Addressing 81 IPv6 Multicast Addresses 82 Connectivity Verification 83 ICMP Message Types 83 Testing the Path 83 CHAPTER 9 Subnetting IP Networks 85 Subnetting an IPv4 Network 85 Subnetting in Four Steps 85 Subnetting Example 85 Determine How Many Bits to Borrow 85 Determine the New Subnet Mask 86 Determine the Subnet Multiplier 86 List the Subnets, Host Ranges, and Broadcast Addresses 87 Subnetting Scenario 1 87 Subnetting Scenario 2 87 Subnetting Scenario 3 88 VLSM Addressing Schemes 88 VLSM Review 89 VLSM Addressing Design Exercises 90 Exercise 1 91 Exercise 2 92 Exercise 3 93 Exercise 4 93 Design Considerations for IPv6 94 Subnetting an IPv6 Network 95 IPv6 Subnetting Practice 95 IPv6 Subnetting Scenario 1 95 IPv6 Subnetting Scenario 2 96 IPv6 Subnetting Scenario 3 96 CHAPTER 10 Application Layer 97 Application Layer Protocols 97 OSI and TCP/IP Model Comparison 97 Application and Presentation Protocols and Standards 98 How Application Protocols Interact with End-User Applications 98 Well-Known Application Layer Protocols and Services 99 Web and Mail Services 99 IP Addressing Services 100 File Sharing Services 102 The Message Heard Around the World 103 CHAPTER 11 It’s a Network 105 Create and Grow 105 Devices in a Small Network 105 Protocols in a Small Network 106 Growing to Larger Networks 107 Keeping the Network Safe 107 Network Device Security Measures 107 Vulnerabilities and Network Attacks 108 Mitigating Network Attacks 109 Securing Devices 110 Basic Network Performance 110 Using the ping Command 111 Tracing a Route 111 show Commands 112 Managing IOS Configuration Files 114 Integrated Routing Services 116 Part II: Routing and Switching Essentials CHAPTER 12 Introduction to Switched Networks 117 LAN Design 117 LAN Design Principles 117 Selecting Switch Hardware 119 The Switched Environment 120 Frame Forwarding Methods and Terminology 120 Building the MAC Address Table 120 Collision and Broadcast Domains 122 CHAPTER 13 Basic Switching Concepts and Configuration 125 Basic Switch Configuration 125 Switch Boot Sequence 125 Half-Duplex, Full-Duplex, and Auto-MDIX 125 Configure a Switch with Initial Settings 126 Basic Configuration Tasks 127 Applying a Basic Configuration 127 Verifying Basic Switch Configuration 129 Switch Security: Management and Implementation 129 Configuring SSH 129 Common Security Attacks 131 Configuring Port Security 132 Configuring NTP 134 NTP Commands 134 CHAPTER 14 VLANs 135 VLAN Segmentation 135 Overview of VLANs 135 VLANs in a Multiswitched Environment 136 VLAN Implementations 137 VLAN Configuration Exercise 137 Practice VLAN Configuration 141 VLAN Trunk Configuration Exercise 141 Practice Trunk Configuration 142 Dynamic Trunking Protocol 143 Troubleshoot VLANs and Trunks 144 VLAN Security and Design 146 Switch Spoofing Attack 146 Double-Tagging Attack 147 PVLAN Edge 147 CHAPTER 15 Routing Concepts 149 Initial Configuration of a Router 149 Functions of a Router 149 External Router Features 152 Topology and Addressing Documentation 154 Configure and Verify Dual-Stack IPv4 and IPv6 Addressing 156 Routing Decisions 161 Path Determination 162 Concept of Administrative Distance Exercise 164 Switching Packets Between Networks 164 Router Operation 165 Analyze the Routing Table 165 Directly Connected, Static, and Dynamic Routes 167 CHAPTER 16 Inter-VLAN Routing 171 Inter-VLAN Routing Configuration 171 Types of Inter-VLAN Routing 171 Configuring Inter-VLAN Routing 172 Troubleshoot Inter-VLAN Routing 174 Inter-VLAN Troubleshooting Scenarios 174 Layer 3 Switching 176 Layer 3 Switching Operation 176 Configuring Static Routes on a Catalyst 2960 177 Layer 3 Switching Troubleshooting Scenarios 179 CHAPTER 17 Static Routing 183 Static Routing Implementation 183 Static Routing Overview 183 Identify Types of Static Routes 184 Configure Static and Default Routes 185 Configuring IPv4 Static and Default Routes 185 B1 and B2 Routing Strategy 186 Configuring IPv6 Static and Default Routes 187 B1 and B2 Routing Strategy 187 Review of CIDR and VLSM 188 Classful Addressing 189 CIDR and Route Summarization 189 Summary Route Calculation Scenario 1 190 Summary Route Calculation Scenario 2 191 Summary Route Calculation Scenario 3 191 Configure Summary and Floating Static Routes 191 Configure IPv4 Summary Routes 192 Configure IPv6 Summary Routes 192 Configure Floating Static Routes 194 Troubleshoot Static and Default Route Issues 195 IPv4 Static and Default Route Implementation 195 IPv6 Static and Default Route Implementation 195 CHAPTER 18 Routing Dynamically 197 Dynamic Routing Protocols 197 Dynamic Routing Protocol Operation 197 Compare Static and Dynamic Routing 197 From Cold Start to Convergence 198 Dynamic Routing Protocols Classification Chart 200 Routing Protocols Characteristics 201 Comparing Routing Protocol Characteristics 202 Distance Vector Dynamic Routing 202 Distance Vector Operation and Terminology 202 Comparing RIP and EIGRP 204 RIP and RIPng Routing 204 Configuring RIPv2 204 Configuring RIPng 206 Link-State Dynamic Routing 208 Link-State Routing Protocol Operation 208 Building the Link-State Database 210 Using Link-State Routing Protocols 214 The Routing Table 214 Identifying Elements of the Routing Table 214 Dynamically Learned IPv4 Routes 215 The IPv4 Route Lookup Process 217 Routing Table Lookup Chart 217 Routing Table Lookup Exercise 218 Analyze an IPv6 Routing Table 219 CHAPTER 19 Single-Area OSPF 221 Characteristics of OSPF 221 OSPF Terminology 222 OSPF Concepts 223 OSPF Operation 224 Configuring Single-Area OSPFv2 227 The Router ID 228 Single-Area OSPFv2 Basic Configuration Scenario 229 Adjusting OSPF Cost 231 The Reference Bandwidth 231 The Default Interface Bandwidth 232 Modifying the OSPF Cost Metric 232 Verify the OSPF Configuration 233 Configure Single-Area OSPFv3 233 Comparing OSPFv2 and OSPFv3 233 Configuring OSPFv3 234 Verifying OSPFv3 236 CHAPTER 20 Access Control Lists 237 IP ACL Operation 237 Standard Versus Extended IPv4 ACLs 237 Calculating Wildcard Masks 237 Wildcard Mask in Operation 238 Guidelines for ACL Creation 239 Guidelines for ACL Placement 240 Standard IPv4 ACLs 240 Configuring Standard IPv4 ACLs 241 Modifying IPv4 ACLs 244 Securing vty Ports with a Standard IPv4 ACL 245 Extended IPv4 ACLs 245 Configuring Extended IPv4 ACL Statements 245 Extended ACL Configuration Scenarios 246 Evaluating Extended IPv4 ACL Statements 247 Extended ACL Quiz 248 Troubleshoot ACLs 251 IPv6 ACLs 252 Comparing IPv4 and IPv6 ACLs 252 Configuring IPv6 ACLs 252 CHAPTER 21 DHCP 255 Dynamic Host Configuration Protocol v4 255 DHCPv4 Operation 255 Configuring a Cisco Device as a DHCPv4 Server 256 Configuring a Router to Relay DHCPv4 Requests 258 Configuring a Router as a DHCPv4 Client 259 Troubleshooting DHCPv4 259 Dynamic Host Configuration Protocol v6 260 SLAAC and DHCPv6 260 Configuring a Router as a Stateless DHCPv6 Server 262 Configuring a Router as a Stateful DHCPv6 Server 263 CHAPTER 22 Network Address Translation for IPv4 265 NAT Operation 265 NAT Characteristics 265 Configuring NAT 267 Configuring Static NAT 267 Configuring Dynamic NAT 268 Configuring Port Address Translation 269 A Word About Port Forwarding 272 Configuring NAT and IPv6 272 Troubleshooting NAT 273 9781587133459, TOC, 11/22/2013
£19.05
Pearson Education (US) CCNP SWITCH Lab Manual
Book SynopsisThe only authorized Lab Manual for the Cisco Networking Academy CCNP Version 7 SWITCH course A CCNP certification equips students with the knowledge and skills needed to plan, implement, secure, maintain, and troubleshoot converged enterprise networks. The CCNP certification requires candidates to pass three 120-minute exams–ROUTE 300-101, SWITCH 300-115, TSHOOT 300-135–that validate the key competencies of network engineers. The Cisco Networking Academy curriculum consists of three experience-oriented courses that employ industry-relevant instructional approaches to prepare students for professional-level jobs: CCNP ROUTE: Implementing IP Routing, CCNP SWITCH: Implementing IP Switching, and CCNP TSHOOT: Maintaining and Troubleshooting IP Networks. This course teaches students how to implement, monitor, and maintain switching in converged enterprise campus networks. Students will learn how to plan, configure, and verify the implementation of complex enterprise switching solutions. The course also covers the secure integration of VLANs, WLANs, voice, and video into campus networks. Comprehensive labs emphasize hands-on learning and practice to reinforce configuration skills. The 15 comprehensive labs in this manual emphasize hands-on learning and practice to reinforce configuration skills. Table of Contents Chapter 1: Fundamentals Review Lab 1-1 Preparing the Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Network Design Fundamentals No labs in this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Chapter 3: Campus Network Architecture Lab 3-1 Static VLANS, Trunking, and VTP. . . . . . . . . . . . . . . . . . . . . . . . . . 9 Lab 3-2 EtherChannel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Chapter 4: Spanning-tree In-depth Lab 4-1 Implement Spanning Tree Protocols . . . . . . . . . . . . . . . . . . . . . . . . 38 Lab 4-2 Multiple Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Chapter 5: InterVLAN Routing Lab 5-1 Inter-VLAN Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Lab 5-2 DHCP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . 81 Chapter 6: First Hop Redundancy Lab 6-1 First Hop Redundancy Protocols - HSRP and VRRP. . . . . . . . . . . . . . . . . . 88 Lab 6-2 Hot Standby Router Protocol for IPV6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Lab 6-3 Gateway Load Balancing Protocol (GLBP) . . . . . . . . . . . . . . . . . . . 118 Chapter 7: Network Management Lab 7-1 Synchronizing Campus Network Devices using Network Time Protocol (NTP). .. 138 Lab 7-2 Configure Campus Network Devices to Support Simple Network Management Protocol (SNMPv3). . . . . . . 151 Chapter 8: Switching Features and Technologies Lab 8-1 IP Service Level Agreements and Remote SPAN in a Campus Environment. . .. . 162 Chapter 9: High-Availability No labs in this chapter . . . . . . . . . . . . . 177 Chapter 10: Campus Network Security Lab 10-1 Securing Layer 2 Switches. . . . . . . . 178 Lab 10-2 Securing VLANs . . . . . . . . .. . . . . . . . . 201
£29.76
Pearson Education (US) Investigating the Cyber Breach: The Digital
Book SynopsisInvestigating the Cyber Breach The Digital Forensics Guide for the Network Engineer · Understand the realities of cybercrime and today’s attacks · Build a digital forensics lab to test tools and methods, and gain expertise · Take the right actions as soon as you discover a breach · Determine the full scope of an investigation and the role you’ll play · Properly collect, document, and preserve evidence and data · Collect and analyze data from PCs, Macs, IoT devices, and other endpoints · Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence · Analyze iOS and Android devices, and understand encryption-related obstacles to investigation · Investigate and trace email, and identify fraud or abuse · Use social media to investigate individuals or online identities · Gather, extract, and analyze breach data with Cisco tools and techniques · Walk through common breaches and responses from start to finish · Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.Table of ContentsIntroduction xix Chapter 1 Digital Forensics 1 Defining Digital Forensics 3 Engaging Forensics Services 4 Reporting Crime 7 Search Warrant and Law 9 Forensic Roles 13 Forensic Job Market 15 Forensic Training 16 Summary 23 References 24 Chapter 2 Cybercrime and Defenses 25 Crime in a Digital Age 27 Exploitation 31 Adversaries 34 Cyber Law 36 Summary 39 Reference 39 Chapter 3 Building a Digital Forensics Lab 41 Desktop Virtualization 42 VMware Fusion 43 VirtualBox 44 Installing Kali Linux 44 Attack Virtual Machines 52 Cuckoo Sandbox 56 Virtualization Software for Cuckoo 58 Installing TCPdump 58 Creating a User on VirtualBox for Cuckoo 59 Binwalk 60 The Sleuth Kit 61 Cisco Snort 62 Windows Tools 67 Physical Access Controls 68 Storing Your Forensics Evidence 71 Network Access Controls 72 Jump Bag 74 Summary 74 References 75 Chapter 4 Responding to a Breach 77 Why Organizations Fail at Incident Response 78 Preparing for a Cyber Incident 80 Defining Incident Response 81 Incident Response Plan 82 Assembling Your Incident Response Team 84 When to Engage the Incident Response Team 85 Outstanding Items that Often Get Missed with Incident Response 88 Phone Tree and Contact List 88 Facilities 89 Responding to an Incident 89 Assessing Incident Severity 91 Following Notification Procedures 92 Employing Post-Incident Actions and Procedures 93 Identifying Software Used to Assist in Responding to a Breach 93 Trend Analysis Software 94 Security Analytics Reference Architectures 94 Other Software Categories 97 Summary 97 References 98 Chapter 5 Investigations 99 Pre-Investigation 100 Opening a Case 102 First Responder 105 Device Power State 110 Search and Seizure 113 Chain of Custody 118 Network Investigations 121 Forensic Reports 127 Case Summary 129 Example 129 Acquisition and Exam Preparation 129 Example 129 Findings 130 Example 130 Conclusion 130 Example 131 List of Authors 131 Example 131 Closing the Case 132 Critiquing the Case 136 Summary 139 References 139 Chapter 6 Collecting and Preserving Evidence 141 First Responder 141 Evidence 144 Autopsy 145 Authorization 147 Hard Drives 148 Connections and Devices 150 RAID 152 Volatile Data 153 DumpIt 154 LiME 154 Volatility 156 Duplication 158 dd 161 dcfldd 161 ddrescue 162 Netcat 162 Guymager 163 Compression and Splitting 164 Hashing 166 MD5 and SHA Hashing 168 Hashing Challenges 169 Data Preservation 170 Summary 172 References 172 Chapter 7 Endpoint Forensics 173 File Systems 174 Locating Data 178 Unknown Files 180 Windows Registry 182 Deleted Files 185 Windows Recycle Bin 187 Shortcuts 189 Printer Spools 190 Slack Space and Corrupt Clusters 191 Alternate Data Streams 196 Mac OS X 198 OS X Artifacts 199 Log Analysis 202 IoT Forensics 207 Summary 210 References 211 Chapter 8 Network Forensics 213 Network Protocols 214 Security Tools 215 Firewall 219 Intrusion Detection and Prevention System 219 Content Filter 219 Network Access Control 220 Packet Capturing 223 NetFlow 224 Sandbox 225 Honeypot 226 Security Information and Event Manager (SIEM) 228 Threat Analytics and Feeds 229 Security Tool Summary 229 Security Logs 229 Network Baselines 233 Symptoms of Threats 235 Reconnaissance 235 Exploitation 238 Malicious Behavior 242 Beaconing 244 Brute Force 249 Exfiltration 250 Other Indicators 254 Summary 255 References 255 Chapter 9 Mobile Forensics 257 Mobile Devices 258 Investigation Challenges 258 iOS Architecture 259 iTunes Forensics 261 iOS Snapshots 263 How to Jailbreak the iPhone 265 Android 266 PIN Bypass 270 How to Brute Force Passcodes on the Lock Screen 271 Forensics with Commercial Tools 272 Call Logs and SMS Spoofing 274 Voicemail Bypass 275 How to Find Burner Phones 276 SIM Card Cloning 278 Summary 279 Reference 279 Chapter 10 Email and Social Media 281 A Message in a Bottle 281 Email Header 283 Social Media 288 People Search 288 Google Search 293 Facebook Search 297 Summary 304 References 305 Chapter 11 Cisco Forensic Capabilities 307 Cisco Security Architecture 307 Cisco Open Source 310 Cisco Firepower 312 Cisco Advanced Malware Protection (AMP) 313 Cisco Threat Grid 319 Cisco Web Security Appliance 322 Cisco CTA 323 Meraki 324 Email Security Appliance 326 Cisco Identity Services Engine 328 Cisco Stealthwatch 331 Cisco Tetration 335 Cisco Umbrella 337 Cisco Cloudlock 342 Cisco Network Technology 343 Summary 343 Reference 343 Chapter 12 Forensic Case Studies 345 Scenario 1: Investigating Network Communication 346 Pre-engagement 347 Investigation Strategy for Network Data 348 Investigation 350 Closing the Investigation 355 Scenario 2: Using Endpoint Forensics 357 Pre-engagement 357 Investigation Strategy for Endpoints 358 Investigation 359 Potential Steps to Take 360 Closing the Investigation 362 Scenario 3: Investigating Malware 364 Pre-engagement 364 Investigation Strategy for Rogue Files 365 Investigation 365 Closing the Investigation 369 Scenario 4: Investigating Volatile Data 370 Pre-engagement 371 Investigation Strategy for Volatile Data 372 Investigation 373 Closing the Investigation 375 Scenario 5: Acting as First Responder 377 Pre-engagement 377 First Responder Strategy 377 Closing the Investigation 379 Summary 381 References 382 Chapter 13 Forensic Tools 383 Tools 384 Slowloris DDOS Tool: Chapter 2 385 Low Orbit Ion Cannon 386 VMware Fusion: Chapter 3 386 VirtualBox: Chapter 3 387 Metasploit: Chapter 3 388 Cuckoo Sandbox: Chapter 3 389 Cisco Snort: Chapter 3 389 FTK Imager: Chapters 3, 9 390 FireEye Redline: Chapter 3 391 P2 eXplorer: Chapter 3 392 PlainSight: Chapter 3 392 Sysmon: Chapter 3 393 WebUtil: Chapter 3 393 ProDiscover Basics: Chapter 3 393 Solarwinds Trend Analysis Module: Chapter 4 394 Splunk: Chapter 4 394 RSA Security Analytics: Chapter 4 395 IBM’s QRadar: Chapter 4 396 HawkeyeAP: Chapter 4 396 WinHex: Chapters 6, 7 396 OSForensics: Chapter 6 397 Mount Image Pro: Chapter 6 397 DumpIt: Chapter 6 398 LiME: Chapter 6 398 TrIDENT: Chapter 7 398 PEiD: Chapter 7 399 Lnkanalyser: Chapter 7 399 Windows File Analyzer: Chapter 7 399 LECmd: Chapter 7 401 SplViewer: Chapter 7 401 PhotoRec: Chapter 7 402 Windows Event Log: Chapter 7 402 Log Parser Studio: Chapter 7 403 LogRhythm: Chapter 8 403 Mobile Devices 404 Elcomsoft: Chapter 9 404 Cellebrite: Chapter 9 404 iPhone Backup Extractor: Chapter 9 405 iPhone Backup Browser: Chapter 9 405 Pangu: Chapter 9 405 KingoRoot Application: Chapter 9 405 Kali Linux Tools 406 Fierce: Chapter 8 406 TCPdump: Chapter 3 406 Autopsy and Autopsy with the Sleuth Kit: Chapters 3, 6 406 Wireshark: Chapter 8 406 Exiftool: Chapter 7 407 DD: Chapter 6 407 Dcfldd: Chapter 6 408 Ddrescue: Chapter 6 408 Netcat: Chapter 6 408 Volatility: Chapter 6 408 Cisco Tools 408 Cisco AMP 408 Stealthwatch: Chapter 8 409 Cisco WebEx: Chapter 4 409 Snort: Chapter 11 409 ClamAV: Chapter 10 409 Razorback: Chapter 10 410 Daemonlogger: Chapter 10 410 Moflow Framework: Chapter 10 410 Firepower: Chapter 10 410 Threat Grid: Chapter 10 410 WSA: Chapter 10 410 Meraki: Chapter 10 411 Email Security: Chapter 10 411 ISE: Chapter 10 411 Cisco Tetration: Chapter 10 411 Umbrella: Chapter 10 411 Norton ConnectSafe: No Chapter 412 Cloudlock: Chapter 10 412 Forensic Software Packages 413 FTK Toolkit: Chapter 3 413 X-Ways Forensics: Chapter 3 413 OSforensics: Chapter 6 414 EnCase: Chapter 7 414 Digital Forensics Framework (DFF): Chapter 7 414 Useful Websites 414 Shodan: Chapter 1 414 Wayback Machine: Chapter 3 415 Robot.txt files: Chapter 2 415 Hidden Wiki: Chapter 2 415 NIST: Chapter 4 416 CVE: Chapter 4 416 Exploit-DB: Chapter 4 416 Pastebin: Chapters 4, 10 416 University of Pennsylvania Chain of Custody Form: Chapter 6 417 List of File Signatures: Chapter 9 417 Windows Registry Forensics Wiki: Chapter 7 417 Mac OS Forensics Wiki: Chapter 7 417 Miscellaneous Sites 417 Searchable FCC ID Database 418 Service Name and Transport Protocol Port Number Registry 418 NetFlow Version 9 Flow-Record Format 418 NMAP 418 Pwnable 418 Embedded Security CTF 419 CTF Learn 419 Reversing.Kr 419 Hax Tor 419 W3Challs 419 RingZer0 Team Online CTF 420 Hellbound Hackers 420 Over the Wire 420 Hack This Site 420 VulnHub 420 Application Security Challenge 421 iOS Technology Overview 421 Summary 421 9781587145025 TOC 1/10/2017
£33.29
Pearson Education (US) Implementing Cisco IP Routing (ROUTE) Foundation
Book SynopsisNow updated for Cisco’s new ROUTE 300-101 exam, Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide is your Cisco® authorized learning tool for CCNP® or CCDP® preparation. Part of the Cisco Press Foundation Learning Series, it teaches you how to plan, configure, maintain, and scale a modern routed network. Focusing on Cisco routers connected in LANs and WANs at medium-to-large network sites, the authors show how to select and implement Cisco IOS services for building scalable, routed networks. They examine basic network and routing protocol principles in detail; introduce both IPv4 and IPv6; fully review EIGRP, OSPF, and BGP; explore enterprise Internet connectivity; cover routing updates and path control; and present today’s router security best practices. Each chapter opens with a list of topics that clearly identifies its focus. Each chapter ends with a summary of key concepts for quick study, as well as review questions to assess and reinforce your understanding. Throughout, configuration and verification output examples illustrate critical issues in network operation and troubleshooting. This guide is ideal for all certification candidates who want to master all the topics covered on the ROUTE 300-101 exam. Serves as the official book for the newest version of the Cisco Networking Academy CCNP ROUTE course Includes all the content from the newest Learning@Cisco ROUTE course and information on each of the ROUTE exam topics Compares basic routing protocol features and limitations Examines RIPv2 and RIPng Covers EIGRP operation and implementation for both IPv4 and IPv6 Explores OSPFv2 implementation, and OSPFv3 for both IPv4 and IPv6 Discusses network performance optimization via routing updates Introduces path control with Cisco Express Forwarding (CEF) switching, policy-based routing (PBR), and service level agreements (SLAs) Addresses enterprise Internet connectivity via single or redundant ISP connections Explains BGP terminology, concepts, operation, configuration, verification, and troubleshooting Covers securing the management plane of Cisco routers using authentication and other recommended practices Presents self-assessment review questions, chapter objectives, and summaries to facilitate effective studying Table of ContentsIntroduction xxv Chapter 1 Basic Network and Routing Concepts 1 Differentiating Routing Protocols 2 Enterprise Network Infrastructure 2 Role of Dynamic Routing Protocols 3 Choosing a of Dynamic Routing Protocols 5 IGP versus EGP 5 Types of Routing Protocols 7 Convergence 8 Route Summarization 9 Route Protocol Scalability 10 Understanding Network Technologies 10 Traffic Types 11 IPv6 Address Types 13 ICMPv6 Neighbor Discovery 14 Network Types 15 NBMA Networks 16 Routing Over the Internet 18 Connecting Remote Locations with Headquarters 18 Principles of Static Routing 19 Configuring an IPv4 Static Route 20 Configuring a Static Default Route 22 Basic PPP Overview 23 PPP Authentication Overview 23 PPPoE 26 Basic Frame Relay Overview 28 VPN Connectivity Overview 31 MPLS-based VPNs 31 Tunneling VPNs 32 Hybrid VPNs 32 Routing Across MPLS VPNs 32 Routing Over GRE Tunnel 34 Dynamic Multipoint Virtual Private Network 35 Multipoint GRE 36 NHRP 37 IPsec 39 Routing and TCP/IP Operations 40 MSS, Fragmentation, and PMTUD 40 IPv4 Fragmentation and PMTUD 41 Bandwidth Delay Product 41 TCP Starvation 42 Latency 42 ICMP Redirect 42 Implementing RIPng 43 RIP Overview 43 RIPv2 Overview 45 Configuring RIPng 47 Basic RIPng Configuration 47 Propagating a Default Route 50 Investigating the RIPng Database 53 Summary 55 Review Questions 56 Chapter 2 EIGRP Implementation 59 Establishing EIGRP Neighbor Relationships 60 EIGRP Features 60 EIGRP Features 62 EIGRP Operation Overview 63 Configuring and Verifying Basic EIGRP for IPv4 64 Manipulating EIGRP Timers 73 EIGRP Neighbor Relationship over Frame Relay 74 Establishing EIGRP over Layer 3 MPLS VPN 74 Establishing EIGRP over Layer 2 MPLS VPN 75 Building the EIGRP Topology Table 76 Building and Examining the EIGRP Topology Table 77 Choosing the Best Path 80 Exchange of Routing Knowledge in EIGRP 88 EIGRP Metric 88 EIGRP Metric Calculation 89 EIGRP Wide Metrics 90 EIGRP Metric Calculation Example 90 EIGRP Metric Calculation Example 91 EIGRP Path Calculation Example 92 Optimizing EIGRP Behavior 94 EIGRP Queries 95 EIGRP Stub Routers 96 Configuring EIGRP Stub Routing 97 EIGRP Stub Options 100 Stuck in Active 108 Reducing Query Scope by Using Summary Routes 109 Configuring EIGRP Summarization 110 Determining the Summary Route 116 Obtaining Default Route 120 Load Balancing with EIGRP 123 Configuring EIGRP Load Balancing 123 EIGRP Load Balancing 124 EIGRP Load Balancing Across Unequal-Metric Paths 126 Configuring EIGRP for IPv6 128 Overview of EIGRP for IPv6 128 Configuring and Verifying EIGRP for IPv6 129 EIGRP for IPv6 Configuration 130 Determining the IPv6 Summary Route 134 Named EIGRP Configuration 136 Introduction to Named EIGRP Configuration 136 Configuring Named EIGRP 137 Address Families 139 EIGRP for IPv4 Address Family 139 EIGRP for IPv6 Address Family 142 Named EIGRP Configuration Modes 148 Classic Versus Named EIGRP Configuration 150 Summary 151 Review Questions 152 Chapter 3 OSPF Implementation 155 Establishing OSPF Neighbor Relationships 155 OSPF Features 156 OSPF Operation Overview 157 Hierarchical Structure of OSPF 158 Design Restrictions of OSPF 160 OSPF Message Types 160 Basic OSPF Configuration 161 Optimizing OSPF Adjacency Behavior 170 Using OSPF Priority in the DR/BDR Election 174 OSPF Behavior in NBMA Hub-and-Spoke Topology 175 The Importance of MTU 177 Manipulating OSPF Timers 179 OSPF Neighbor Relationship over Point-to-Point Links 182 OSPF Neighbor Relationship over Layer 3 MPLS VPN 182 OSPF Neighbor Relationship over Layer 2 MPLS VPN 184 OSPF Neighbor States 184 OSPF Network Types 186 Configuring Passive Interfaces 187 Building the Link-State Database 187 OSPF LSA Types 188 Examining the OSPF Link-State Database 189 OSPF Link-State Database 190 OSPF Type 2 Network LSA 196 OSPF Type 3 Summary LSA 197 OSPF Type 4 ASBR Summary LSA 199 OSPF Type 5 External LSA 201 Periodic OSPF Database Changes 203 Exchanging and Synchronizing LSDBs 204 Synchronizing the LSDB on Multiaccess Networks 206 Running the SPF Algorithm 207 Configuring OSPF Path Selection 208 OSPF Path Selection 208 OSPF Best Path Calculation 210 Default OSPF Costs 211 Calculating the Cost of Intra-Area Routes 214 Calculating the Cost of Interarea Routes 214 Selecting Between Intra-Area and Interarea Routes 215 Optimizing OSPF Behavior 215 OSPF Route Summarization 216 Benefits of Route Summarization 217 Configuring OSPF Route Summarization 218 Summarization on ABRs 223 Summarization on ASBRs 224 OSPF Virtual Links 225 Configuring OSPF Virtual Links 227 Configuring OSPF Stub Areas 229 OSPF Stub Areas 230 OSPF Totally Stubby Areas 234 Cost of the Default Route in a Stub Area 236 The default-information originate Command 237 Other Stubby Area Types 238 OSPFv3 239 Configuring OSPFv3 240 Implementing OSPFv3 241 OSPFv3 for IPv4 and IPv6 246 Configuring Advanced OSPFv3 260 OSPFv3 Caveats 261 Summary 262 Review Questions 263 Chapter 4 Manipulating Routing Updates 267 Using Multiple IP Routing Protocols on a Network 267 Why Run Multiple Routing Protocols? 269 Running Multiple Routing Protocols 269 Administrative Distance 269 Multiple Routing Protocols Solutions 270 Implementing Route Redistribution 270 Defining Route Redistribution 270 Planning to Redistribute Routes 271 Redistributing Routes 271 Seed Metrics 272 Default Seed Metrics 273 Configuring and Verifying Basic Redistribution in IPv4 and IPv6 275 Redistributing OSPFv2 Routes into the EIGRP Routing Domain 276 Redistributing OSPFv3 Routes into the EIGRP for IPv6 Routing Domain 279 Redistributing EIGRP Routes into the OSPFv2 Routing Domain 281 Redistributing EIGRP for IPv6 Routes into the OSPFv3 Routing Domain 285 Types of Redistribution Techniques 287 One-Point Redistribution 287 Multipoint Redistribution 288 Redistribution Problems 289 Preventing Routing Loops in a Redistribution Environment 291 Verifying Redistribution Operation 292 Controlling Routing Update Traffic 292 Why Filter Routes? 292 Route Filtering Methods 293 Using Distribute Lists 294 Configuring Distribute Lists 294 Distribute List and ACL Example 295 Using Prefix Lists 297 Prefix List Characteristics 297 Configuring Prefix Lists 298 Distribute List and Prefix List Example 299 Prefix List Examples 300 Verifying Prefix Lists 301 Manipulating Redistribution Using ACLs, Prefix Lists, and Distribute Lists 302 Using Route Maps 305 Understanding Route Maps 305 Route Map Applications 305 Configuring Route Maps 306 Route Map Match and Set Statements 308 Configuring Route Redistribution Using Route Maps 310 Using Route Maps with Redistribution 310 Manipulating Redistribution Using Route Maps 311 Mutual Redistribution without Route Filtering 312 Mutual Redistribution with Route Maps 313 Change Administrative Distance to Enable Optimal Routing 315 Manipulating Redistribution Using Route Tagging 318 Caveats of Redistribution 319 Summary 320 References 323 Review Questions 323 Chapter 5 Path Control Implementation 327 Using Cisco Express Forwarding Switching 327 Control and Data Plane 328 Cisco Switching Mechanisms 328 Process and Fast Switching 332 Cisco Express Forwarding 333 Analyzing Cisco Express Forwarding 335 Verify the Content of the CEF Tables 335 Enable and Disable CEF by Interface and Globally 341 Understanding Path Control 343 The Need for Path Control 343 Implementing Path Control Using Policy-Based Routing 344 PBR Features 344 Steps for Configuring PBR 345 Configuring PBR 346 Verifying PBR 348 Configuring PBR Example 348 Implementing Path Control Using Cisco IOS IP SLAs 354 PBR and IP SLA 354 IP SLA Features 354 Steps for Configuring IP SLAs 356 Verifying Path Control Using IOS IP SLAs 360 Configuring IP SLA Example 361 Configuring PBR and IP SLA Example 364 Summary 369 References 370 Review Questions 370 Chapter 6 Enterprise Internet Connectivity 373 Planning Enterprise Internet Connectivity 374 Connecting Enterprise Networks to an ISP 374 Enterprise Connectivity Requirements 374 ISP Redundancy 375 Public IP Address Assignment 376 The Internet Assigned Numbers Authority 376 Regional Internet Registries 377 Public IP Address Space 377 Autonomous System Numbers 378 Establishing Single-Homed IPv4 Internet Connectivity 381 Configuring a Provider-Assigned IPv4 Address 381 DHCP Operation 382 Obtaining a Provider-Assigned IPv4 Address with DHCP 383 Configuring a Router as a DHCP Server and DHCP Relay Agent 384 NAT 385 Configuring Static NAT 388 Configuring Dynamic NAT 389 Configuring PAT 390 Limitations of NAT 392 NAT Virtual Interface 393 Configuring NAT Virtual Interface 393 Verifying NAT Virtual Interface 396 Establishing Single-Homed IPv6 Internet Connectivity 398 Obtaining a Provider-Assigned IPv6 Address 398 Manual Assignment 399 Configuring Basic IPv6 Internet Connectivity 399 Stateless Address Autoconfiguration 401 DHCPv6 Operation 402 Stateless DCHPv6 403 Stateful DHCPv6 404 DHCPv6 Prefix Delegation 405 NAT for IPv6 405 NAT64 405 NPTv6 405 IPv6 ACLs 405 IPv6 ACL Characteristics 406 Configuring IPv6 ACLs 406 Securing IPv6 Internet Connectivity 409 Improving Internet Connectivity Resilience 410 Drawbacks of a Single-Homed Internet Connectivity 410 Dual-Homed Internet Connectivity 410 Dual-Homed Connectivity Options 411 Configuring Best Path for Dual-Homed Internet Connectivity 411 Multihomed Internet Connectivity 413 Summary 415 References 417 Review Questions 418 Chapter 7 BGP Implementation 423 BGP Terminology, Concepts, and Operation 424 BGP Use Between Autonomous Systems 424 Comparison with Other Scalable Routing Protocols 425 BGP Path Vector Characteristics 426 BGP Characteristics 428 BGP Tables 430 BGP Message Types 431 Open and Keepalive Messages 431 Update Messages 433 Notification Messages 433 When to Use BGP 433 When Not to Use BGP 434 Implementing Basic BGP 435 BGP Neighbor Relationships 435 External BGP Neighbors 436 Internal BGP Neighbors 437 iBGP on All Routers in a Transit Path 438 Basic BGP Configuration Requirements 442 Entering BGP Configuration Mode 442 Defining BGP Neighbors and Activating BGP Sessions 443 Basic BGP Configuration and Verification 444 Configuring and Verifying an eBGP Session 445 Configuring and Verifying an iBGP Session 449 Advertising Networks in BGP and Verifying That They Are Propagated 450 Using the Next-Hop-Self Feature 457 Understanding and Troubleshooting BGP Neighbor States 458 BGP Session Resilience 460 Sourcing BGP from Loopback Address 461 eBGP Multihop 463 Resetting BGP Sessions 464 BGP Attributes and the Path-Selection Process 467
£49.94
Manning Publications Acing the Certified Kubernetes Administrator Exam
Book SynopsisLearn the hands-on skills you need to ace the Kubernetes exam and boost your career by becoming a Certified Kubernetes Administrator (CKA). For readers who know the basics of containers and Linux admin. No Kubernetes experience is required. Acing the Certified Kubernetes Administrator Exam will provide you with content and practical exercises according to the unique CKA test environment. This practical book takes you hands-on with all the exam objectives, including deploying containerised applications to Kubernetes, accessing an application from an ingress resource, backup and restoring. You will learn how to: Administer an application running on Kubernetes Troubleshoot errors inside a Kubernetes cluster Authenticate users and machines to the Kubernetes API Create persistent storage in Kubernetes Add additional functionality to an existing Kubernetes cluster Plus! Essential exam tips and exercises help you work out your mental muscle memory. Acing the Certified Kubernetes Administrator Exam is your fast track to becoming a Certified Kubernetes Administrator! Your expert exam tutor is Chad Crowell, whose courses have helped thousands of developers to understand Kubernetes and earn the coveted CKA certification. About the technology The Certified Kubernetes Administrator (CKA) exam proves your skills as a Kubernetes administrator and is a serious test of your competency. There are no multiple-choice questions or essays: the whole test is conducted from the command line, with you performing solutions directly in the terminal. Administered by the Linux Foundation, the certification is recognised by employers worldwide as a proof of your ability to configure and manage production-grade Kubernetes clusters.
£41.39
Rocky Nook Software Testing Foundations, 5th Edition
Book SynopsisProfessional testing of software is an essential task that requires a profound knowledge of testing techniques. The International Software Testing Qualifications Board (ISTQB) has developed a universally accepted, international qualification scheme aimed at software and system testing professionals, and has created the Syllabi and Tests for the Certified Tester. Today, hundreds of thousands of people have taken the ISTQB certification exams. The authors of Software Testing Foundations, 5th Edition, are among the creators of the Certified Tester Syllabus and are currently active in the ISTQB. This thoroughly revised and updated fifth edition covers the Foundations Level (entry level) and teaches the most important methods of software testing. It is designed for self-study and provides the information necessary to pass the Certified Tester Foundations Level exam, as defined by the ISTQB. Also in this new edition, technical terms have been precisely stated according to the ISTQB glossary. Topics covered: Fundamentals of Testing Testing and the Software Lifecycle Static and Dynamic Testing Techniques Test Management Test Tools
£31.50
Velociteach Press All-in-One PMP Exam Prep Kit 6th Edition Plus
Book SynopsisThis all-inclusive, self-study guide for the PMI's Project Management Professional (PMP) certification exam provides all the information project managers need to thoroughly prepare for the test. It contains the book The PMP Exam: How to Pass on Your First Try ; flash card App to help with memorization of key points; a laminated quick reference guide; a limited access, trial version subscription to the PMP course in InSite (the top PMP e-learning site); and downloadable audio CDs featuring experts Andy Crowe, Bill Yates, and Louis Alderman discussing the main points and concepts for the exam. The included learning materials cover all the processes, inputs, tools, and outputs that will be tested, along with insider secrets, test tricks and tips, hundreds of sample questions, and exercises designed to strengthen mastery of key concepts to help you pass the exam with confidence.
£140.00
Packt Publishing Limited Certified Information Security Manager Exam Prep
Book SynopsisPass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey Features Pass the CISM exam confidently with this step-by-step guide Explore practical solutions that validate your knowledge and expertise in managing enterprise information security teams Enhance your cybersecurity skills with practice questions and mock tests Book DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market. CISM is one of the top-paying and most sought-after certifications by employers.This CISM Certification Guide comprises comprehensive self-study exam content for those who want to achieve CISM certification on the first attempt. This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios. You'll learn about the practical aspects of information security governance and information security risk management. As you advance through the chapters, you'll get to grips with information security program development and management. The book will also help you to gain a clear understanding of the procedural aspects of information security incident management.By the end of this CISM exam book, you'll have covered everything needed to pass the CISM certification exam and have a handy, on-the-job desktop reference guide.What you will learn Understand core exam objectives to pass the CISM exam with confidence Create and manage your organization's information security policies and procedures with ease Broaden your knowledge of the organization's security strategy designing Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives Find out how to monitor and control incident management procedures Discover how to monitor activity relating to data classification and data access Who this book is forIf you are an aspiring information security manager, IT auditor, chief information security officer (CISO), or risk management professional who wants to achieve certification in information security, then this book is for you. A minimum of two years' experience in the field of information technology is needed to make the most of this book. Experience in IT audit, information security, or related fields will be helpful.Table of ContentsTable of Contents Information Security Governance Practical Aspects of Information Security Governance Overview of Information Risk Management Practical Aspects of Information Risk Management Procedural Aspects of Information Risk Management Overview of Information Security Program Development Management Information Security Infrastructure and Architecture Practical Aspects of Information Security Program Development Management Information Security Monitoring Tools and Techniques Overview of Information Security Incident Manager Practical Aspects of Information Security Incident Management
£56.99
Packt Publishing Limited CISA – Certified Information Systems Auditor
Book SynopsisThis CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA’s latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questionsKey Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization’s security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.Table of ContentsTable of Contents Audit Planning Audit Execution IT Governance IT Management Information Systems Acquisition and Development Information Systems Implementation Information System Operations Business Resilience Information Asset Security and Control Network Security and Control Public Key Cryptography and Other Emerging Technologies Security Event Management
£31.49
podbooks.com, LLC Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
£30.91
podbooks.com, LLC Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
£64.95
Rocky Nook Expert Test Manager: Guide to the Istqb Expert
Book SynopsisThis book covers the ISTQB Expert Level Test Manager syllabus and is a complete, one-stop preparation guide for the reader who is otherwise qualified (based on experience as a test manager) to take the Expert Level Test Manager exam. Included are extensive hands-on exercises and sample exam questions that comply with ISTQB standards for Expert Level exams. The ISTQB certification program is the leading software tester certification program in the world. With more than 240,000 certificates issued and a global presence in 70 countries, you can be confident in the value and international stature that the ISTQB Expert Level certificate can offer you.
£31.50
Rocky Nook Advanced Software Testing V 2. 2e
Book SynopsisThis book teaches test managers what they need to know to achieve advanced skills in test estimation, test planning, test monitoring, and test control. Readers will learn how to define the overall testing goals and strategies for the systems being tested. This hands-on, exercise-rich book provides experience with planning, scheduling, and tracking these tasks. You'll be able to describe and organize the necessary activities as well as learn to select, acquire, and assign adequate resources for testing tasks. You'll learn how to form, organize, and lead testing teams, and master the organizing of communication among the members of the testing teams, and between the testing teams and all the other stakeholders. Additionally, you'll learn how to justify decisions and provide adequate reporting information where applicable. With over thirty years of software and systems engineering experience, author Rex Black is President of RBCS, is a leader in software, hardware, and systems testing, and is the most prolific author practicing in the field of software testing today. He has published a dozen books on testing that have sold tens of thousands of copies worldwide. He is past president of the International Software Testing Qualifications Board (ISTQB) and a director of the American Software Testing Qualifications Board (ASTQB). This book will help you prepare for the ISTQB Advanced Test Manager exam. Included are sample exam questions, at the appropriate level of difficulty, for most of the learning objectives covered by the ISTQB Advanced Level Syllabus. The ISTQB certification program is the leading software tester certification program in the world. With about 300,000 certificate holders and a global presence in over 50 countries, you can be confident in the value and international stature that the Advanced Test Manager certificate can offer you. This second edition has been thoroughly updated to reflect the new ISTQB Advanced Test Manager 2012 Syllabus, and the latest ISTQB Glossary. This edition reflects Rex Black's unique insights into these changes, as he was one of the main participants in the ISTQB Advanced Level Working Group.
£33.75