Computer certification Books
Pearson Education Cisco SoftwareDefined Wide Area Networks
Book SynopsisJason Gooley, CCIE No. 38759 (RS and SP), is a very enthusiastic and spontaneous person who has more than 25 years of experience in the industry. Currently, Jason works as a Technical Evangelist for the Worldwide Enterprise Networking Sales team at Cisco Systems. Jason is very passionate about helping others in the industry succeed. In addition to being a Cisco Press author, Jason is a distinguished speaker at Cisco Live, contributes to the development of the Cisco CCIE and DevNet exams, provides training for Learning@Cisco, is an active CCIE mentor, is a committee member for the Cisco Continuing Education Program (CE), and is a program committee member of the Chicago Network Operators Group (CHI-NOG), www.chinog.org. Jason also hosts a show called MetalDevOps. Dana Yanch, CCIE No. 25567 (RS,DC) CCDE No. 20130071, at the time of writing content for this book was a Global Technical Solutions Architect at Cisco focused on designing and deploying SD-WAN solutions for large enterprises around the world. Prior to spending the last six years working with Viptela and other SD-WAN technologies, Dana had a focus on fabric-based data center technologies. Dana has presented at several Cisco Live Events worldwide and has a passion for public speaking and mentorship. Dana can now be found at Aviatrix, the multi-cloud networking platform, designing cloud connectivity architectures every single day. Dustin Schuemann, CCIE No. 59235 (R&S), is a Technical Solutions Architect at Cisco Systems. Within the Demo CoE organization, Dustin is a subject matter expert on all things SD-WAN, including development of SD-WAN demo offerings and CPOC labs for some of Cisco's largest customers. He has been a distinguished speaker at Cisco Live multiple times, where he has presented on multiple topics around Cisco SD-WAN. Dustin has more than 17 years of experience in the network engineering field, and before Cisco he was a network architect for multiple firms within the manufacturing and financial industries. He is very passionate about giving back to the IT community and helping to mentor other network engineers. Dustin currently resides in Raleigh, North Carolina. John Curran is a Technical Solutions Architect with Cisco's Global Virtual Engineering team, where he assists customers and partners with the design of their next-generation networks. John is a subject matter expert in routing and SD-WAN and is excited to spend time teaching and training on these topics. John presents regularly at Cisco Live events around the world and has been repeatedly recognized as a Distinguished Speaker. In his prior role at Cisco, John worked as a Network Consulting Engineer for Cisco's Advanced Services team, supporting government and education customers. John holds a Bachelor of Science degree in Computer Engineering Technology from the University of Cincinnati.
£44.97
Pearson Education (US) CCNP Collaboration Call Control and Mobility
Book SynopsisKyzer Davis, CCIE Collaboration No. 54735, is an escalation point for various worldwide cloud and collaboration teams within Cisco Systems. He is the focal point for supporting, troubleshooting, and resolving complex, solution-level problems involving voice, video, cloud, and security portions of the Cisco Unified collaboration product portfolio. In addition to his work on this book, Kyzer has authored and presented numerous technical white papers on Cisco collaboration configuration, architecture, protocol design, and security topics, many of which are leveraged by Cisco partners, Cisco exam instructors, and Cisco employees for training and education. Prior to writing this book, Kyzer co-authored the Cisco Press publication Understanding Session Border Controllers: Comprehensive Guide to Designing, Deploying, Troubleshooting, and Maintaining Cisco Unified Border Element (CUBE) Solutions. In addition, he works with Learning@Cisco on strategy and
£45.98
Pearson Education CCNP Security Cisco Secure Firewall and Intrusion
Book SynopsisNazmul Rajib is a senior product marketing manager of Cisco Systems, Inc. He leads Cisco's global initiatives on cybersecurity enablement, focusing on the firewall and intrusion prevention technologies. As a senior member of the Security Business Group (SBG), Nazmul regularly advises Cisco on security product roadmaps, content strategies, and technical communications. He develops training programs for the Global Security Sales Organization (GSSO) and worldwide channel partners. Nazmul also worked as a technical marketing engineer in the product management organization, where he was responsible for validating security designs, researching best practices, publishing white papers, and presenting new security capabilities. Prior to joining Cisco's core business group, Nazmul served as a senior information security consultant in the Cisco advanced services organization. With more than a decade of experience, Nazmul assisted many Fortune 500 companies, gove
£45.98
Pearson Education (US) CCNP Collaboration Cloud and Edge Solutions CLCEI
Book SynopsisAnyone who has worked with Jason Ball or has sat in one of his classes knows that his enthusiasm for collaboration is matched only by his engaging zeal for teaching. Jason's current position as a solution readiness engineer in Collaboration for Cisco awards him with the opportunity to create and provide training to Cisco partners on new, innovative collaboration solutions as Cisco releases them. He has been operating as a collaboration engineer for more than 11 years and holds 19 different certifications, including a CCNP Collaboration certification and a Cisco Certified Systems Instructor (CCSI) certification. He has been teaching Cisco Voice, Video, and Collaboration certification courses for as many years as he has been involved with Cisco. Some of the accomplishments that Jason has achieved include serving as a subject matter expert (SME) for two certification courses Cisco has developed: the TVS Advanced Services Course and the CIVND2 certification cours
£54.10
Pearson Education (US) Exam Ref PL900 Microsoft Power Platform
Book SynopsisCraig Zacker is the author or coauthor of dozens of books, manuals, articles, and websites on computer and networking topics. He has also been an English professor, a technical and copy editor, a network administrator, a webmaster, a corporate trainer, a technical support engineer, a minicomputer operator, a literature and philosophy student, a library clerk, a photographic darkroom technician, a shipping clerk, and a newspaper boy.Table of ContentsChapter 1 Describe the business value of Power Platform Skill 1.1: Describe the business value of Power Platform services Skill 1.2: Describe the business value of extending business solutions by using Power Platform Skill 1.3: Understand Power Platform administration and security Chapter 2 Identify the core components of Power Platform Skill 2.1: Describe Common Data Service Skill 2.2: Describe connectors Skill 2.3: Describe AI Builder Chapter 3 Describe the business value of Power BI Skill 3.1: Identify common Power BI components Skill 3.2: Connect to and consume data Skill 3.3: Build a basic dashboard using Power BI Chapter 4 Demonstrate the capabilities of Power Apps Skill 4.1: Identify common Power Apps components Skill 4.2: Build a basic canvas app Skill 4.3: Describe Power Apps portals Skill 4.4: Build a basic model-driven app Chapter 5 Demonstrate the capabilities of Power Automate Skill 5.1: Identify common Power Automate components Skill 5.2: Build a basic flow Chapter 6 Demonstrate the capabilities of Power Virtual Agents Skill 6.1: Describe Power Virtual Agents capabilities Skill 6.2: Build and publish a basic chatbot
£22.49
Pearson Education (US) CCNP Enterprise
Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.Table of ContentsIPv4/IPv6 Addressing and Routing Review 1 1.1.2 Lab - Troubleshoot IPv4 and IPv6 Addressing Issues 1 Topology 1 Addressing Table 1 Objectives 1 Background/Scenario 1 Required Resources 2 Instructions 2 Router Interface Summary Table 4 Device Config Final – Notes 4 1.1.3 Lab - Troubleshoot IPv4 and IPv6 Static Routing 7 Topology 7 Addressing Table 7 Objectives 8 Background/Scenario 8 Required Resources 8 Instructions 8 Router Interface Summary Table 10 Device Config Final – Notes 10 Chapter 2 EIGRP 13 2.1.2 Lab - Implement EIGRP for IPv4 13 Topology 13 Addressing Table 13 Objectives 14 Background/Scenario 14 Required Resources 14 Router Interface Summary Table 28 Device Config Final – Notes 28 Chapter 3 Advanced EIGRP 31 3.1.2 Lab - Implement Advanced EIGRP for IPv4 Features 31 Topology 31 Addressing Table 31 Objectives 32 Background/Scenario 32 Required Resources 32 Instructions 32 Router Interface Summary Table 42 Device Config Final – Notes 42 Chapter 4 Troubleshooting EIGRP for IPv4 45 4.1.2 Lab - Troubleshoot EIGRP for IPv4 45 Topology 45 Addressing Table 45 Objectives 45 Background/Scenario 46 Required Resources 46 Instructions 46 Topology Update 48 Addressing Table Update 48 Router Interface Summary Table 49 Device Config Final – Notes 50 Chapter 5 EIGRPv6 53 5.1.2 Lab - Implement EIGRP for IPv6 53 Topology 53 Addressing Table 53 Objectives 54 Background/Scenario 54 Required Resources 54 Instructions 54 Router Interface Summary Table 72 Device Config Final – Notes 73 5.1.3 Lab - Troubleshoot EIGRP for IPv6 75 Topology 75 Addressing Table 75 Objectives 76 Background/Scenario 76 Required Resources 76 Instructions 76 Router Interface Summary Table 77 Device Config Final – Notes 78 Chapter 6 OSPF 81 6.1.2 Lab - Implement Single-Area OSPFv2 81 Topology 81 Addressing Table 81 Objectives 82 Background/Scenario 82 Required Resources 82 Instructions 82 Router Interface Summary Table 100 Device Config Final – Notes 100 Chapter 7 Advanced OSPF 103 7.1.2 Lab - Implement Multiarea OSPFv2 103 Topology 103 Addressing Table 103 Objectives 104 Background/Scenario 104 Required Resources 104 Instructions 105 Router Interface Summary Table 129 Device Config Final – Notes 129 7.1.3 Lab - OSPFv2 Route Summarization and Filtering 132 Topology 132 Addressing Table 132 Objectives 133 Background/Scenario 133 Required Resources 134 Instructions 134 Router Interface Summary Table 149 Device Config Final – Notes 150 Chapter 8 Troubleshooting OSPFv2 153 8.1.2 Lab - Troubleshoot OSPFv2 153 Topology 153 Addressing Table 153 Objectives 154 Background/Scenario 154 Required Resources 155 Instructions 155 Topology Update: 157 Addressing Table Update: 157 Router Interface Summary Table 159 Device Config Final – Notes 159 Chapter 9 OSPFv3 163 9.1.2 Lab - Implement Multiarea OSPFv3 163 Topology 163 Addressing Table 163 Objectives 164 Background/Scenario 164 Required Resources 164 Instructions 164 Router Interface Summary Table 181 Device Config Final – Notes 182 Chapter 10 Troubleshooting OSPFv3 185 10.1.2 Lab - Troubleshoot OSPFv3 185 Topology 185 Addressing Table 185 Objectives 186 Background/Scenario 186 Required Resources 187 Instructions 187 Device Config Final – Notes 189 Chapter 11 BGP 193 11.1.2 Lab - Implement eBGP for IPv4 193 Topology 193 Addressing Table 193 Objectives 194 Background/Scenario 194 Required Resources 194 Instructions 194 Router Interface Summary Table 208 Device Config Final – Notes 209 11.1.3 Lab - Implement MP-BGP 211 Topology 211 Addressing Table 211 Objectives 211 Background/Scenario 212 Required Resources 212 Instructions 212 Router Interface Summary Table 225 Device Config Final – Notes 225 Chapter 12 Advanced BGP 229 12.1.2 Lab - Implement BGP Path Manipulation 229 Topology 229 Addressing Table 229 Objectives 230 Background/Scenario 230 Required Resources 230 Instructions 230 Router Interface Summary Table 242 Device Config Final – Notes 242 Chapter 13 BGP Path Selection 245 13.1.2 Lab - Implement BGP Communities 245 Topology 245 Addressing Table 245 Objectives 246 Background/Scenario 246 Required Resources 246 Instructions 246 Reflection Questions 259 Router Interface Summary Table 259 Device Config Final – Notes 259 Chapter 14 Troubleshooting BGP 263 14.1.2 Lab - Troubleshoot BGP 263 Topology 263 Addressing Table 263 Objectives 265 Background/Scenario 265 Required Resources 266 Router Interface Summary Table 268 Device Config Final – Notes 268 Chapter 15 Route Maps and Conditional Forwarding 271 15.1.2 Lab - Control Routing Updates 271 Topology 271 Addressing Table 271 Objectives 272 Background/Scenario 272 Required Resources 272 Instructions 273 ACL 280 Router Interface Summary Table 286 Device Config Final – Notes 286 15.1.3 Lab - Path Control Using PBR 289 Topology 289 Addressing Table 289 Objectives 290 Background/Scenario 290 Required Resources 290 Instructions 291 Router Interface Summary Table 302 Device Config Final – Notes 302 15.1.4 Lab - Troubleshoot Route Maps and PBR 305 Topology 305 Addressing Table 305 Objectives 306 Background/Scenario 306 Required Resources 306 Instructions 306 Router Interface Summary Table 309 Device Config Final – Notes 309 Chapter 16 Route Redistribution 313 16.1.2 Lab - Configure Route Redistribution Between EIGRP and OSPF 313 Topology 313 Addressing Table 313 Objectives 314 Background/Scenario 314 Required Resources 314 Instructions 315 Reflection Questions 327 Router Interface Summary Table 328 Device Config Final – Notes 328 16.1.3 Lab - Configure Route Redistribution Within the Same Interior Gateway Protocol 331 Topology 331 Addressing Table 331 Objectives 332 Background/Scenario 332 Required Resources 332 Instructions 332 Prefix List 340 Reflection Questions 341 Router Interface Summary Table 342 Device Config Final – Notes 342 16.1.4 Lab - Implement Route Redistribution Between Multiple Protocols 345 Topology 345 Addressing Table 345 Objectives 346 Background/Scenario 346 Required Resources 346 Instructions 347 Reflection Questions 356 Router Interface Summary Table 356 Device Config Final – Notes 357 Chapter 17 Troubleshooting Redistribution 361 17.1.2 Lab - Troubleshoot Redistribution 361 Objectives 361 Background/Scenario 361 Required Resources 361 Instructions 362 Addressing Table 365 Scenario 366 Router Interface Summary Table 366 Device Config Final – Notes 367 Chapter 18 VRF, MPLS, and MPLS Layer 3 VPNs 369 18.1.2 Lab - Implement VRF-Lite 369 Topology 369 Addressing Table 369 Objectives 370 Background/Scenario 370 Required Resources 370 Router Interface Summary Table 380 Device Config Final – Notes 381 Chapter 19 DMVPN Tunnels 383 19.1.2 Lab - Implement a GRE Tunnel 383 Topology 383 Addressing Table 383 Objectives 383 Background/Scenario 384 Required Resources 384 Instructions 384 Router Interface Summary Table 395 Device Config Final – Notes 395 19.1.3 Lab - Implement a DMVPN Phase 1 Hub-to-Spoke Topology 398 Topology 398 Addressing Table 398 Objectives 398 Background/Scenario 399 Required Resources 400 Instructions 400 Router Interface Summary Table 410 Device Config Final – Notes 411 19.1.4 Lab - Implement a DMVPN Phase 3 Spoke-to-Spoke Topology 413 Topology 413 Addressing Table 413 Objectives 413 Background/Scenario 414 Required Resources 415 Instructions 415 Router Interface Summary Table 421 Device Config Final – Notes 422 19.1.5 Lab - Implement an IPv6 DMVPN Phase 3 Spoke-to-Spoke Topology 424 Topology 424 Addressing Table 424 Objectives 424 Background/Scenario 425 Required Resources 425 Instructions 425 Router Interface Summary Table 437 Device Config Final – Notes 438 Chapter 20 Securing DMVPN Tunnels 441 20.1.2 Lab - Configure Secure DMVPN Tunnels 441 Topology 441 Addressing Table 441 Objectives 441 Background/Scenario 442 Required Resources 442 Instructions 442 Router Interface Summary Table 451 Device Config Final – Notes 451 Chapter 21 Troubleshooting ACLs and Prefix Lists 455 21.1.2 Lab - Troubleshoot IPv4 ACLs 455 Topology 455 Addressing Table 455 Objectives 455 Background/Scenario 456 Required Resources 456 Instructions 456 Router Interface Summary Table 458 Device Config Final – Notes 459 21.1.3 Lab - Troubleshoot IPv6 ACLs 461 Topology 461 Addressing Table 461 Objectives 461 Background/Scenario 461 Required Resources 462 Router Interface Summary Table 464 Device Config Final – Notes 465 21.1.4 Lab - Troubleshoot Prefix Lists 467 Topology 467 Addressing Table 467 Objectives 467 Background/Scenario 467 Required Resources 468 Router Interface Summary Table 470 Device Config Final – Notes 470 Chapter 22 Infrastructure Security 473 22.1.2 Lab - Troubleshoot IOS AAA Authentication 473 Topology 473 Addressing Table 473 Objectives 473 Background/Scenario 474 Required Resources 474 Instructions 474 Router Interface Summary Table 476 Device Config Final – Notes 476 22.1.3 Lab - Troubleshoot uRPF 479 Topology 479 Addressing Table 479 Objectives 479 Background/Scenario 479 Required Resources 480 Instructions 480 Router Interface Summary Table 481 Device Config Final – Notes 481 22.1.4 Lab - Troubleshoot Control Plane Policing (CoPP) 484 Topology 484 Addressing Table 484 Objectives 484 Background/Scenario 484 Required Resources 485 Instructions 485 Router Interface Summary Table 487 Device Config Final – Notes 487 Chapter 23 Device Management and Management Tools Troubleshooting 491 23.1.2 Lab - Troubleshoot Device Access and File Transfer 491 Topology 491 Addressing Table 491 Objectives 491 Background/Scenario 492 Required Resources 492 Instructions 492 Router Interface Summary Table 494 Device Config Final – Notes 495 23.1.3 Lab - Troubleshoot SNMP and Logging Issues 497 Topology 497 Addressing Table 497 Objectives 497 Background/Scenario 497 Required Resources 498 Router Interface Summary Table 500 Device Config Final – Notes 500 23.1.4 Lab - Troubleshoot IP SLA and Netflow 503 Topology 503 Addressing Table 503 Objectives 504 Background/Scenario 504 Required Resources 504 Instructions 505 Router Interface Summary Table 507 Device Config Final – Notes 508 TOC, 9780136870937
£52.78
Pearson Education (US) 31 Days Before Your CCNP and CCIE Enterprise Core
Book SynopsisPatrick Gargano has been an educator since 1996, a Cisco Networking Academy Instructor since 2000, and a Certified Cisco Systems Instructor (CCSI) since 2005. He is currently working for Cisco as a Content Engineer on the Enterprise Technical Education team within DevCX. Until recently, he was based in Australia, where he worked as a Content Development Engineer at Skyline ATS, responsible for CCNP Enterprise course development with Learning@Cisco. He previously led the Networking Academy program at Collège La Cité in Ottawa, Canada, where he taught CCNA/CCNP-level courses, and he has also worked for Cisco Learning Partners NterOne and Fast Lane UK. In 2018 Patrick was awarded the Networking Academy Above and Beyond Instructor award for leading CCNA CyberOps early adoption and instructor training in Quebec, Canada. Patrick has also twice led the Cisco Networking Academy Dream Team at Cisco Live US. His previous Cisco Press publications include CCNP and CCIE Enterprise Core & CCNTable of Contents Introduction xxx Day 31: Enterprise Network Architecture 1 ENCOR 350-401 Exam Topics 1 Key Topics 1 Hierarchical LAN Design Model 1 Enterprise Network Architecture Options 4 Study Resources 13 Day 30: Packet Switching and Forwarding 15 ENCOR 350-401 Exam Topics 15 Key Topics 15 Layer 2 Switch Operation 15 Layer 3 Switch Operation 17 Forwarding Mechanisms 19 Study Resources 32 Day 29: LAN Connectivity 33 ENCOR 350-401 Exam Topics 33 Key Topics 33 VLAN Overview 33 Access Ports 35 802.1Q Trunk Ports 38 Dynamic Trunking Protocol 44 VLAN Trunking Protocol 46 Inter-VLAN Routing 50 Study Resources 54 Day 28: Spanning Tree Protocol 55 ENCOR 350-401 Exam Topics 55 Key Topics 55 IEEE 802.1D STP Overview 55 Rapid Spanning Tree Protocol 64 RSTP Rapid Transition to Forwarding State 66 RSTP Synchronization 66 RSTP Topology Change 67 STP and RSTP Configuration and Verification 68 STP Stability Mechanisms 77 Multiple Spanning Tree Protocol 83 Study Resources 90 Day 27: Port Aggregation 91 ENCOR 350-401 Exam Topics 91 Key Topics 91 Need for EtherChannel 91 EtherChannel Mode Interactions 93 EtherChannel Configuration Guidelines 95 EtherChannel Load Balancing Options 96 EtherChannel Configuration and Verification 97 Advanced EtherChannel Tuning 101 Study Resources 104 Day 26: EIGRP 105 ENCOR 350-401 Exam Topics 105 Key Topics 105 EIGRP Features 105 EIGRP Reliable Transport Protocol 106 Establishing EIGRP Neighbor Adjacency 109 EIGRP Metrics 110 EIGRP Path Selection 115 EIGRP Load Balancing and Sharing 117 Study Resources 119 Day 25: OSPFv2 121 ENCOR 350-401 Exam Topics 121 Key Topics 121 OSPF Characteristics 121 OSPF Process 123 OSPF Neighbor Adjacencies 125 Building a Link-State Database 127 OSPF Neighbor States 127 OSPF Packet Types 129 OSPF LSA Types 130 Single-Area and Multiarea OSPF 131 OSPF Area Structure 132 OSPF Network Types 133 OSPF DR and BDR Election 134 OSPF Timers 136 Multiarea OSPF Configuration 137 Verifying OSPF Functionality 138 Study Resources 141 Day 24: Advanced OSPFv2 and OSPFv3 143 ENCOR 350-401 Exam Topics 143 Key Topics 143 OSPF Cost 143 OSPF Passive Interfaces 145 OSPF Default Routing 146 OSPF Route Summarization 147 OSPF Route Filtering Tools 151 Distribute Lists 151 OSPF Filtering Options 152 OSPFv3 155 OSPFv3 Configuration 157 Study Resources 162 Day 23: BGP 163 ENCOR 350-401 Exam Topics 163 Key Topics 163 BGP Interdomain Routing 163 BGP Multihoming 167 BGP Operations 169 BGP Neighbor States 171 BGP Neighbor Relationships 172 BGP Path Selection 173 BGP Path Attributes 175 BGP Configuration 176 Study Resources 182 Day 22: First-Hop Redundancy Protocols 183 ENCOR 350-401 Exam Topics 183 Key Topics 183 Default Gateway Redundancy 183 First Hop Redundancy Protocol 184 VRRP 199 Study Resources 203 Day 21: Network Services 205 ENCOR 350-401 Exam Topics 205 Key Topics 205 Network Address Translation 205 Network Time Protocol 218 Study Resources 226 Day 20: GRE and IPsec 227 ENCOR 350-401 Exam Topics 227 Key Topics 227 Generic Routing Encapsulation 227 IP Security (IPsec) 232 IPsec: IKE 240 IPsec Site-to-Site VPN Configuration 242 Study Resources 250 Day 19: LISP and VXLAN 251 ENCOR 350-401 Exam Topics 251 Key Topics 251 Locator/ID Separation Protocol 251 Virtual Extensible LAN (VXLAN) 262 Study Resources 268 Day 18: SD-Access 269 ENCOR 350-401 Exam Topics 269 Key Topics 269 Software-Defined Access 269 Cisco SD-Access Fabric Data Plane and Control Plane 275 Cisco SD-Access Fabric Policy Plane 275 Cisco SD-Access Fabric Components 277 Shared Services in Cisco SD-Access 281 Study Resources 283 Day 17: SD-WAN 285 ENCOR 350-401 Exam Topics 285 Key Topics 285 Software-Defined WAN 285 Cisco SD-WAN Solution Example 295 Cisco SD-WAN Routing 299 Study Resources 301 Day 16: Multicast 303 ENCOR 350-401 Exam Topics 303 Key Topics 303 Multicast Overview 303 Internet Group Management Protocol 311 Multicast Distribution Trees 313 IP Multicast Routing 315 Study Resources 321 Day 15: QoS 323 ENCOR 350-401 Exam Topics 323 Key Topics 323 Quality of Service 323 QoS Models 327 QoS Mechanisms Overview 329 Study Resources 348 Day 14: Network Assurance, Part 1 349 ENCOR 350-401 Exam Topics 349 Key Topics 349 Troubleshooting Concepts 349 Network Diagnostic Tools 352 Cisco IOS IP SLAs 360 Switched Port Analyzer Overview 365 Study Resources 372 Day 13: Network Assurance, Part 2 373 ENCOR 350-401 Exam Topics 373 Key Topics 373 Logging Services 373 Understanding Syslog 374 Simple Network Management Protocol 376 NetFlow 378 Study Resources 387 Day 12: Wireless Concepts 389 ENCOR 350-401 Exam Topics 389 Key Topics 389 Explain RF Principles 389 IEEE Wireless Standards 399 Study Resources 406 Day 11: Wireless Deployment 407 ENCOR 350-401 Exam Topics 407 Key Topics 407 Wireless Deployment Overview 407 Wireless AP Operation 422 Antenna Characteristics 428 Study Resources 431 Day 10: Wireless Client Roaming and Authentication 433 ENCOR 350-401 Exam Topics 433 Key Topics 433 Wireless Roaming 434 Wireless Location Services 442 Wireless Client Authentication 445 Study Resources 463 Day 9: Secure Network Access 465 ENCOR 350-401 Exam Topics 465 Key Topics 465 Network Security Threatscape 465 Network Security Components 468 Endpoint Security 471 Firewall Concepts 476 TrustSec 478 MACsec 483 Identity Management 484 Study Resources 490 Day 8: Infrastructure Security 491 ENCOR 350-401 Exam Topics 491 Key Topics 491 Secure Access Control 491 Access Control Lists 504 Control Plane Policing 513 Study Resources 516 Day 7: Virtualization 517 ENCOR 350-401 Exam Topics 517 Key Topics 517 Server Virtualization 517 Network Function Virtualization 523 Network Path Isolation 527 Study Resources 532 Day 6: Cisco DNA Center 533 ENCOR 350-401 Exam Topics 533 Key Topics 533 Need for Digital Transformation 533 Cisco Digital Network Architecture 535 Cisco Intent-Based Networking 537 Cisco DNA Center Features 539 Cisco DNA Assurance Workflow 548 Study Resources 554 Day 5: Network Programmability 555 ENCOR 350-401 Exam Topics 555 Key Topics 555 Python Concepts 555 Device Management and Network Programmability 565 Study Resources 582 Day 4: REST APIs 583 ENCOR 350-401 Exam Topics 583 Key Topics 583 Application Programming Interfaces 583 Southbound APIs 584 Northbound APIs 584 REST API Response Codes and Results 585 REST APIs in Cisco DNA Center 587 REST APIs in Cisco vManage 590 Cisco SD-WAN API Library and Documentation 592 Study Resources 598 Day 3: Network Automation 599 ENCOR 350-401 Exam Topics 599 Key Topics 599 Configuration Management Tools 599 Embedded Events Manager 615 Study Resources 620 Day 2: Review Lab 1 621 Objective 621 Day 1: Review Lab 2 633 Objective 633 9780136965220, TOC, 10/2/2020
£29.69
Pearson Education (US) Exam Ref DP900 Microsoft Azure Data Fundamentals
Book SynopsisDaniel A. Seara is an experienced software developer. He has more than 20 years' experience as a technical instructor, developer, and development consultant. Daniel has worked as a software consultant in a wide range of companies in Argentina, Spain, and Peru. He has been asked by Peruvian Microsoft Consulting Services to help several companies in their migration path to .NET Framework development. Daniel was Argentina's Microsoft Regional Director for 4 years and was the first nominated Global Regional Director, a position he held for two years. He was also the manager of the Desarrollador Cinco Estrellas I (Five-Star Developer) program, one of the most successful training projects in Latin America. Daniel held a Visual Basic MVP status for more than 10 years, as well as a SharePoint Server MVP status from 2008 until 2014. Additionally, Daniel is the founder and Dean of Universidad .NET, the most visited Spanish language site on which to learn .NET. In 2005,Table of ContentsIntroduction CHAPTER 1 Describe core data concepts CHAPTER 2 Describe how to work with relational data on Azure CHAPTER 3 Describe how to work with non-relational data on Azure CHAPTER 4 Describe an analytics workload on Azure
£26.99
Pearson Education (US) Exam Ref AZ304 Microsoft Azure Architect Design
Book SynopsisASHISH AGRAWAL is a qualified technocrat, offering two decades of multifaceted experience as a technology leader, trusted advisor, and Enterprise Cloud Architect (Infra, Apps, Data, and Security). He drives a profound influence in the cloud technology landscape with provocative thought leadership and communicates his ideas with clarity and passion. Ashish has delivered numerous successful cloud engagements for global fortune 500 companies in cloud advisory, consulting, architecture, leadership, and delivery execution roles throughout his career and is considered an Azure subject matter expert since 2010. He is a change leader with transforming teams' experience to adopt and innovate best practices leading to critical customer impacting results. AVINASH BHAVSAR is a Microsoft certified Azure Professional with about 18 years of hands-on experience in all facets of cloud computing, such as discovery, assessment, cloud foundation build, datacenter transformation, cloud-native appTable of Contents1. Design monitoring 2. Design identity and security 3. Design data storage 4. Design business continuity 5. Design infrastructure
£30.59
Pearson Education (US) CompTIA Advanced Security Practitioner CASP
Book SynopsisTroy McMillan, CASP, is a product developer and technical editor for CyberVista as well as a full-time trainer. He became a professional trainer more than 20 years ago, teaching Cisco, Microsoft, CompTIA, and wireless classes. His recent work includes* Author of CompTIA CySA+ CS0-002 Cert Guide (Pearson IT Certification) * Author of CompTIA A+ Complete Review Guide (Sybex) * Author of CompTIA Server + Study Guide (Sybex) * Contributing subject matter expert for CCNA Cisco Certified Network Associate Certification Exam Preparation Guide (Kaplan) * Prep test question writer for Network+ Study Guide (Sybex) * Technical editor for Windows 7 Study Guide (Sybex) * Contributing author for CCNA-Wireless Study Guide (Sybex) * Technical editor for CCNA Study Guide, Revision 7 (Sybex) * Author of VCP VMware Certified Professional on vSphere 4 Review Guide: Exam VCP-4
£39.79
Pearson Education CompTIA Network N10008 Cert Guide
Book SynopsisAnthony Sequeira (CCIE No. 15626) began his IT career in 1994 with IBM in Tampa, Florida. He quickly formed his own computer consultancy, Computer Solutions, and then discovered his true passion: teaching and writing about networking technologies. Anthony lectured to massive audiences around the world while working for Mastering Computers. Anthony has never been happier in his career than he is now, as a senior technical instructor for Splunk. He is an avid tennis player, a private pilot, and a semi-professional poker player, and he loves anything at all to do with technology.
£33.60
Pearson Education (US) CCDE v3 Practice Labs
Book SynopsisMartin J. Duggan, CCDE#2016::6 and CCIE#7942, is a Principal Network Architect designing network solutions for global financial accounts at Systal Technology Solutions. He is one of Systal's key technical leadership resources, helping Systal to be a dynamic and innovative services integrator and provider that offers fast, agile, and tailored support to meet business aspirations and challenges. Martin gained his Routing & Switching CCIE in 2001 and has been passionate about Cisco qualifications and mentoring ever since. He wrote the CCIE Routing & Switching Practice Labs series for Cisco Press and was keen to do the same for the CCDE program after completing his CCDE. He resides in the UK, where he draws inspiration for his CCDE scenarios from his successful career in the communications industry. Martin enjoys gliding, cycling, snowboarding, and karate when not designing networks, and he creates content for multiple Cisco exam tracks. Follow Martin on TTable of Contents Foreword xx Introduction: A License to Design xxi Chapter 1 CCDE Practice Lab 1: Jacobs 1 Practice Lab Navigation 1 Practice Lab 1 Summary 114 Chapter 2 CCDE Practice Lab 2: Squid Energy 115 Practice Lab Navigation 115 Practice Lab 116 Summary 382 Chapter 3 CCDE Practice Lab 3: Bank of Jersey 229 Practice Lab Navigation 229 Practice Lab 230 Summary 382 9780137499854, TOC, 6/17/2022
£75.64
Pearson Education CISSP Cert Guide
Book SynopsisRobin M. Abernathy has been working in the IT certification preparation industry for more than 20 years. She has written and edited certification preparation materials for many (ISC)2, Microsoft, CompTIA, PMI, ITIL, ISACA, and GIAC certifications and holds multiple IT certifications from these vendors. Robin provides training on computer hardware and software, networking, security, and project management. Over the past decade, she has ventured into the traditional publishing industry by technically editing several publications and co-authoring Pearson's CISSP Cert Guide and CASP+ Cert Guide and authoring Pearson's Project+ Cert Guide. She presents at technical conferences and hosts webinars on IT certification topics. Dr. Darren R. Hayes has close to 20 years of academic and professional experience in computer security and digital forensics. He has authored numerous publications in these fields, including
£45.98
Pearson Education AWS Certified SysOps Administrator Associate
Book SynopsisMarko Sluga has more than 20 years of experience in IT and has had the benefit of witnessing the rise of cloud computing. Marko has worked on a variety of cloud-related projects, from the early stages of SOC, corporate virtualization, and open-source API offerings to modern, fully automated, intelligent, serverless, and cloud-native solutions. Marko has been working with Amazon Web Services (AWS) since the start of the 2010s and holds three associate, two professional, and three specialty AWS certifications. Marko performs training and advising on cloud technologies and strategies, DevOps, and IT system and process optimization to clients from a wide range of companies, including startups, SMBs, enterprise businesses, and Fortune 500 companies. Marko runs his own cloud training, coaching, and consulting practice under the markocloud.com brand. He is the author of the AWS Certified Developer -Associate (DVA-C01) Cert Guide. Rick Crisci<
£35.36
Pearson Education (US) Exam Ref SC200 Microsoft Security Operations
Book SynopsisYuri Diogenes, MsC is a Master of science in cybersecurity intelligence and forensics investigation (UTICA College), and a Principal Program Manager in the Microsoft CxE ASC Team, where he primarily helps customers onboard and deploy Azure Security Center and Azure Defender as part of their security operations/incident response. Yuri has been working for Microsoft since 2006 in different positions. He spent five years as senior support escalation engineer on the CSS Forefront Edge Team, and from 2011 to 2017, he worked on the content development team, where he also helped create the Azure Security Center content experience since its GA launch in 2016. Yuri has published a total of 26 books, mostly covering information security and Microsoft technologies. Yuri also holds an MBA and many IT/Security industry certifications, such as CISSP, ECND, ECEH, ECSA, ECHFI, CompTIA Security+, CySA+, ClouTable of Contents1. Mitigate Threats Using Microsoft 365 Defender 2. Mitigate Threats Using Microsoft Defender for Cloud 3. Mitigate Threats Using Microsoft Sentinel
£30.59
Pearson Education (US) Exam Ref MS700 Managing Microsoft Teams
Book SynopsisED FISHER is a Principal Technical Specialist at Microsoft, currently covering Microsoft Teams. He's been with Microsoft for over 10 years, in various roles, all covering some aspect of Microsoft 365. A former bean counter, in 1997 he figured out that IT is way more interesting than balance sheets and has been a self-professed geek ever since. You can reach out at https://aka.ms/edfisher.Table of Contents1. Plan and configure a Microsoft Teams environment 2. Manage chat, calling, and meetings 3. Manage Teams and app policies
£26.99
Pearson Education CompTIA Network N10008 Cert Guide Deluxe Edition
Book SynopsisAnthony Sequeira (CCIE No. 15626) began his IT career in 1994 with IBM in Tampa, Florida. He quickly formed his own computer consultancy, Computer Solutions, and then discovered his true passion: teaching and writing about networking technologies. Anthony lectured to massive audiences around the world while working for Mastering Computers. Anthony has never been happier in his career than he is now, as a senior technical instructor for Splunk. He is an avid tennis player, a private pilot, and a semi-professional poker player, and he loves anything at all to do with technology.
£58.08
Pearson Education Cisco Certified Design Expert CCDE 400007
Book SynopsisZig Zsiga, CCDE 2016::32, CCIE #44883, has been in the networking industry for 20 years. He is currently a principal architect supporting the Cisco CX US public sector business and customers. Zig holds an active CCDE and two CCIE certifications, one in Routing and Switching and the second in Service Provider. He also holds a bachelor of science in computer science from Park University. He is a father, a husband, a United States Marine, a gamer, a nerd, a geek, and a big soccer fan. Zig loves all technology and can usually be found in the lab learning and teaching others. This is his second published book, and he is also the host of the Zigbits Network Design Podcast (ZNDP), where he interviews leading industry experts about network design. All of Zig's content is located at https://zigbits.tech. Zig lives in Upstate New York, USA, with his wife, Julie, and their son, Gunnar.
£53.05
Pearson Education (US) CompTIA Linux XK0005 Pearson uCertify Course
Book Synopsis
£100.08
Pearson Education CC Certified in Cybersecurity Cert Guide
Book SynopsisMari Galloway, a best-selling author of Securing Our Future and cyber professional, is the CEO and a founding board member for the Women's Society of Cyberjutsu (WSC), one of the fastest growing 501(c)3 nonprofit cybersecurity communities dedicated to bringing more women and girls to cyber. WSC provides its members with the resources and support required to enter and advance as cybersecurity professionals. Mari began her career with Accenture, where she excelled as a network engineer. Mari is also a 2023 Presidential Lifetime Award winner and the inaugural ISC2 Diversity Award winner for 2019. With over 15 years in IT and cybersecurity, her experience spans network design, security architecture, risk assessments, vulnerability management, incident response, and policy development across government and commercial industries. Mari holds a variety of technical and management certifications (CISSP, GIAC, CCNA, etc.) as well as a Bachelor of Busine
£29.99
Pearson Education Cisco Certified Support Technician CCST
Book SynopsisShane Sexton has spent years learning and teaching all things IT. He holds CCNP Security, CND, CySA+, CCNA CyberOps, and numerous other certifications and has prepared thousands of students to take these exams. Shane earned bachelor's degrees in technology management and liberal studies (and wishes he'd taken fewer philosophy classes). He currently works as a network and system administrator at an MSP, where every day brings new learning opportunities. When he's not tackling IT emergencies, Shane practices piano, reads anything nonfiction, and expertly avoids family members with printer issues. He currently resides in Phoenix, Arizona, with three cats who have no respect for his property or the rule of law. Raymond Lacoste has dedicated his career to developing the skills of those interested in IT. In 2001, he began to mentor hundreds of IT professionals pursuing their Cisco certification dreams. This role led to teaching Cisco courses full t
£33.60
Pearson Education (US) CCNP Enterprise Design ENSLD 300420 Official Cert
Book SynopsisAnthony Bruno, CCIE No. 2738, is an enterprise architect with British Telecom (BT) with more than 30 years of experience in the internetworking field. Previously, he worked for International Network Services (INS) and Lucent Technologies, and he was a captain in the U.S. Air Force. He has consulted for many enterprise and service provider customers in the design, implementation, and optimization of large-scale networks. Anthony leads architecture and design teams in building next-generation networks for customers. Anthony completed a master of science degree in electrical engineering at the University of MissouriRolla in 1994 and a bachelor of science in electrical engineering at the University of Puerto RicoMayaguez in 1990. For the past 23 years, he has coauthored CCNP Enterprise Design ENSLD 300-420 Official Cert Guide: Designing Cisco Enterprise Networks and five editions of the CCDA Official Cert Guide for Cisco Press. Outside woTable of ContentsIntroduction xxxi Chapter 1 Internet Protocol Version 4 (IPv4) Design 2 “Do I Know This Already?” Quiz 2 Foundation Topics 4 IPv4 Header 5 ToS 7 IPv4 Fragmentation 10 IPv4 Addressing 11 IPv4 Address Classes 12 Class A Addresses 12 Class B Addresses 13 Class C Addresses 13 Class D Addresses 13 Class E Addresses 13 IPv4 Address Types 13 IPv4 Private Addresses 14 NAT 14 IPv4 Address Subnets 17 Mask Nomenclature 17 IP Address Subnet Design Example 18 Determining the Network Portion of an IP Address 19 Variable-Length Subnet Masking 19 VLSM Address Assignment: Example 1 20 Loopback Addresses 21 IP Telephony Networks 22 VLSM Address Assignment: Example 2 22 IPv4 Addressing Design 24 Goals of IPv4 Address Design 24 Planning for Future Use of IPv4 Addresses 24 Performing Route Summarization 24 Planning for a Hierarchical IP Address Network 25 Private and Public IP Address and NAT Guidelines 26 Steps for Creating an IPv4 Address Plan 27 Case Study: IP Address Subnet Allocation 28 Address Assignment and Name Resolution 29 Recommended Practices of IP Address Assignment 30 BOOTP 30 DHCP 30 DNS 32 ARP 34 References and Recommended Readings 35 Exam Preparation Tasks 37 Chapter 2 Internet Protocol Version 6 (IPv6) Design 44 “Do I Know This Already?” Quiz 44 Foundation Topics 47 Introduction to IPv6 47 IPv6 Header 48 IPv6 Address Representation 50 IPv4-Mapped IPv6 Addresses 51 IPv6 Prefix Representation 51 IPv6 Address Scope Types and Address Allocations 52 IPv6 Address Allocations 52 IPv6 Unicast Addresses 53 Global Unicast Addresses 53 Link-Local Addresses 54 Unique Local IPv6 Address 54 Global Aggregatable IPv6 Address 55 IPv4-Compatible IPv6 Addresses 55 IPv4-Mapped IPv6 Addresses 55 IPv6 Anycast Addresses 55 IPv6 Multicast Addresses 56 IPv6 Mechanisms 58 ICMPv6 58 IPv6 Neighbor Discovery Protocol 59 IPv6 Name Resolution 60 Path MTU Discovery 61 IPv6 Address-Assignment Strategies 61 Manual Configuration 61 SLAAC of Link-Local Address 61 SLAAC of Globally Unique IPv6 Address 62 DHCPv6 63 DHCPv6 Lite 63 IPv6 Security 63 IPv6 Routing Protocols 64 RIPng 64 EIGRP for IPv6 64 OSPFv3 64 IS-IS for IPv6 64 BGP4 Multiprotocol Extensions (MP-BGP) for IPv6 65 IPv6 Addressing Design 65 Planning for Addressing with IPv6 65 Route Summarization with IPv6 65 IPv6 Private Addressing 66 IPv6 for the Enterprise 66 IPv6 Address Allocation 66 Partly Linked IPv4 Address into IPv6 67 Whole IPv4 Address Linked to IPv6 67 IPv6 Addresses Allocated per Location and/or Type 67 IPv4-to-IPv6 Migration Strategies and Deployment Models 68 Dual-Stack Migration Strategy 68 IPv6 over IPv4 Tunneling Strategy 69 Manual Configured Tunnels and GRE Tunnels 69 Automatic Tunnel Mechanisms 69 6to4 Tunnels 69 6RD Tunnels 70 IPv6 ISATAP Tunnels 70 IPv6/IPv4 Translation Strategy 71 DNS64 71 NAT64 71 Stateless NAT64 71 Stateful NAT64 71 IPv6 Deployment Models 73 Dual-Stack Model 73 Hybrid Model 74 Service Block Model 75 IPv6 Deployment Model Comparison 76 IPv6 Comparison with IPv4 76 References and Recommended Readings 77 Exam Preparation Tasks 80 Chapter 3 Routing Protocol Characteristics, EIGRP, and IS-IS 90 “Do I Know This Already?” Quiz 90 Foundation Topics 92 Routing Protocol Characteristics 92 Static Versus Dynamic Route Assignment 93 Interior Versus Exterior Routing Protocols 94 Distance-Vector Routing Protocols 95 EIGRP 96 Link-State Routing Protocols 96 Distance-Vector Routing Protocols Versus Link-State Protocols 96 Hierarchical Versus Flat Routing Protocols 97 Classless Versus Classful Routing Protocols 97 IPv4 Versus IPv6 Routing Protocols 98 Administrative Distance 99 Routing Protocol Metrics and Loop Prevention 100 Hop Count 100 Bandwidth 101 Cost 101 Load 102 Delay 103 Reliability 103 Maximum Transmission Unit 103 Routing Loop-Prevention Schemes 104 Split Horizon 104 Poison Reverse 104 Counting to Infinity 105 Triggered Updates 105 Summarization 105 EIGRP 105 EIGRP Components 106 Protocol-Dependent Modules 106 Neighbor Discovery and Recovery 106 RTP 107 DUAL 107 EIGRP Timers 109 EIGRP Metrics 109 EIGRP Packet Types 110 EIGRP Design 111 EIGRP Scaling Techniques 111 EIGRP Stub Routers 112 EIGRP Variance Command 113 EIGRP for IPv4 Summary 113 EIGRP for IPv6 (EIGRPv6) Networks 114 EIGRP for IPv6 Design 114 EIGRP in the Data Center 115 EIGRP for IPv6 Summary 115 IS-IS 116 IS-IS Metrics 116 IS-IS Operation and Design 117 IS-IS NET Addressing 117 IS-IS DRs 117 IS-IS Interface Types 117 IS-IS Area Design 118 IS-IS Authentication 119 IS-IS for IPv6 120 IS-IS Summary 121 References and Recommended Readings 121 Exam Preparation Tasks 122 Chapter 4 OSPF, BGP, and Route Manipulation 132 “Do I Know This Already?” Quiz 132 Foundation Topics 134 OSPFv2 134 OSPFv2 Metric 135 OSPFv2 Adjacencies and Hello Timers 135 OSPF Message Types 136 OSPFv2 Areas 137 OSPF Area Design Considerations 137 OSPF Router Types 138 OSPF DRs 140 LSA Types 140 Autonomous System External Path Types 141 OSPF Stub Area Types 142 Stub Areas 142 Totally Stubby Areas 142 NSSAs 143 Virtual Links 143 OSPFv2 Router Authentication 143 OSPFv2 Summary 144 OSPFv3 144 OSPFv3 Changes from OSPFv2 145 OSPFv3 Areas and Router Types 145 OSPFv3 LSAs 146 OSPFv3 Summary 148 BGP 148 BGP Neighbors 149 eBGP 149 iBGP 150 Route Reflectors 151 Confederations 152 BGP Administrative Distance 154 BGP Attributes, Weight, and the BGP Decision Process 154 BGP Path Attributes 154 Next-Hop Attribute 154 Local Preference Attribute 154 Origin Attribute 155 Autonomous System Path (AS_Path) Attribute 155 MED Attribute 156 Community Attribute 157 Atomic Aggregate and Aggregator Attributes 157 Weight Attribute 157 BGP Decision Process 158 eBGP Multihop 161 BGP Multipath 161 BGP Summary 161 Route Manipulation 161 PBR 162 Route Summarization 162 Route Redistribution 164 Default Metric 167 OSPF Redistribution 167 Route Filtering 167 Transit Traffic 168 Bidirectional Forwarding Detection (BFD) 168 Graceful Restart and Non-Stop Routing 169 Virtual Routing and Forwarding (VRF) 169 References and Recommended Readings 169 Exam Preparation Tasks 170 Chapter 5 IP Multicast and Network Management 180 “Do I Know This Already?” Quiz 180 Foundation Topics 182 IP Multicast Review 182 Multicast Addresses 182 Layer 3 to Layer 2 Mapping 183 IGMP 184 IGMPv1 184 IGMPv2 184 IGMPv3 185 CGMP 185 IGMP Snooping 186 Sparse Versus Dense Multicast 186 Multicast Source and Shared Trees 187 PIM 187 PIM-SM 187 PIM DR 188 Auto-RP 188 BIDIR-PIM 188 PIM-SSM 189 MSDP 189 Summary of Multicast Protocols 189 IPv6 Multicast Addresses 190 Network Management Design 190 SNMP 191 SNMP Components 191 Network Management Design Considerations 192 In-Band Versus Out-of-Band Network Management 192 Network Management Traffic Prioritization 192 MIB 192 SNMP Versions 194 SNMPv1 194 SNMPv2 194 SNMPv3 195 Other Network Management Technologies 196 RMON 196 RMON2 197 NetFlow 197 NetFlow Compared to RMON and SNMP 200 CDP 201 LLDP 202 Syslog 202 References and Recommended Readings 203 Exam Preparation Tasks 205 Chapter 6 Enterprise LAN Design and Technologies 214 “Do I Know This Already?” Quiz 214 Foundation Topics 216 Hierarchical Network Models 216 Benefits of the Hierarchical Model 216 Hierarchical Network Design 217 Core Layer 218 Distribution Layer 218 Access Layer 219 Hierarchical Model Examples 221 VSS 222 Hub-and-Spoke Design 222 Collapsed Core Design 223 Building Triangles and Redundant Links 224 Local Versus End-to-End VLAN Design Models 225 LAN Media 225 Ethernet Design Rules 226 100 Mbps Fast Ethernet Design Rules 226 Gigabit Ethernet Design Rules 227 1000BASE-LX Long-Wavelength Gigabit Ethernet 228 1000BASE-SX Short-Wavelength Gigabit Ethernet 228 1000BASE-CX Gigabit Ethernet over Coaxial Cable 228 1000BASE-T Gigabit Ethernet over UTP 228 10 Gigabit Ethernet Design Rules 229 10 Gigabit Ethernet Media Types 229 EtherChannel 230 Port Aggregation Considerations 231 Comparison of Campus Media 231 Power over Ethernet (PoE) 232 Spanning Tree Protocol and Layer 2 Security Design Considerations 232 Spanning Tree Protocol Metrics 233 PVST+ 234 Rapid PVST+ 234 Alignment of Spanning Tree Protocol with FHRP 234 MST 234 Cisco Spanning Tree Protocol Toolkit 235 PortFast 235 UplinkFast 235 BackboneFast 235 Loop Guard 236 Root Guard 236 BPDU Guard 236 BPDU Filter 236 Unidirectional Link Detection (UDLD) Protocol 237 Layer 2 Security 238 References and Recommended Readings 239 Exam Preparation Tasks 240 Chapter 7 Advanced Enterprise Campus Design 250 “Do I Know This Already?” Quiz 250 Foundation Topics 251 Campus LAN Design and Best Practices 252 Network Requirements for Applications 252 Best Practices for Hierarchical Layers 253 Access Layer Best Practices 253 Distribution Layer Best Practices 257 Core Layer Best Practices 258 Campus Layer Best Practices 258 VTP Considerations 260 High Availability Network Services 260 Redundancy Models 260 First-Hop Redundancy for LAN High Availability 261 Server Redundancy 264 Route Redundancy 264 Link Media Redundancy 266 Redundancy Models Summary 267 Large-Building LANs 267 Enterprise Campus LANs 268 Small and Medium Campus Design Options 270 Campus LAN QoS Considerations 270 References and Recommended Readings 272 Exam Preparation Tasks 272 Chapter 8 WAN for the Enterprise 280 “Do I Know This Already?” Quiz 280 Foundation Topics 282 WAN Overview 282 WAN Defined 282 WAN Edge Module 284 Enterprise Edge Modules 284 WAN Transport Technologies 285 Layer 2 VPN 286 MPLS Layer 3 VPN 286 Metro Ethernet 287 SONET/SDH 287 Dense Wavelength-Division Multiplexing 289 Dark Fiber 289 Wireless: 4G/5G 289 SD-WAN Customer Edge 291 WAN Link Categories 292 Ordering WAN Technology 293 WAN Connectivity Options Summary 293 Site-to-Site VPN Design 294 VPN Benefits 294 IPsec 296 IPsec Direct Encapsulation 296 DMVPN 297 Service Provider VPNs: Layer 2 Versus Layer 3 298 Virtual Private Wire Services 299 VPWS Layer 2 VPN Considerations 299 Virtual Private LAN Service 299 VPLS Layer 2 VPN Considerations 300 MPLS Layer 3 VPNs 300 MPLS Layer 3 Design Overview 300 MPLS Layer 3 VPN Considerations 301 Generic Routing Encapsulation 301 GETVPN 301 Cloud-Based Services 301 References and Recommended Readings 302 Exam Preparation Tasks 303 Chapter 9 WAN Availability and QoS 310 “Do I Know This Already?” Quiz 310 Foundation Topics 312 WAN Design Methodologies 312 Response Time 314 Throughput 314 Reliability 314 Bandwidth Considerations 314 Design for High Availability 315 Defining Availability 315 Deployment Models 316 Redundancy Options 316 Single-Homed Versus Multi-Homed WANs 317 Single-Homed MPLS WANs 317 Multi-Homed MPLS WANs 318 Hybrid WANs: Layer 3 VPN with Internet Tunnels 318 Internet Connectivity 319 Internet for Remote Sites 320 High Availability for the Internet Edge 321 Backup Connectivity 321 Failover 322 QoS Strategies 322 Best-Effort QoS 323 DiffServ 323 IntServ 324 Designing End-to-End QoS Policies 324 Classification and Marking 324 Shaping 324 Policing 325 Queuing 325 Congestion Management 325 Priority Queuing 326 Custom Queuing 326 Weighted Fair Queuing 326 Class-Based Weighted Fair Queuing 326 Low-Latency Queuing 326 Link Efficiency 327 Window Size 327 References and Recommended Readings 327 Exam Preparation Tasks 328 Chapter 10 SD-Access Design 334 “Do I Know This Already?” Quiz 334 Foundation Topics 336 SD-Access Architecture 336 SD-Access Fabric 337 Underlay 337 Overlay 338 Control Plane 339 Data Plane 340 Automation 340 Wireless 341 Security and ISE 343 SD-Access Fabric Design Considerations for Wired and Wireless Access 344 Overlay Design 344 Fabric Design 345 Control Plane Design 345 Border Design 346 Segmentation 346 Virtual Networks 347 Scalability 348 Very Small Site Design Considerations 349 Small Site Design Considerations 349 Medium Site Design Considerations 350 Large Site Design Considerations 350 Over-the-Top 351 Fabric Wireless 351 Multicast 352 References and Recommended Readings 352 Exam Preparation Tasks 353 Chapter 11 SD-WAN Design 360 “Do I Know This Already?” Quiz 360 Foundation Topics 361 SD-WAN Architecture 362 Orchestration Plane 363 Management Plane 363 Control Plane 364 Data Plane 364 vEdge Color Attributes 364 Overlay Management Protocol 364 Onboarding and Provisioning 366 Zero Touch Provisioning (ZTP) 366 Onboarding a vEdge Router via Manual Configuration 367 Onboarding Cisco IOS XE SD-WAN Routers 367 SD-WAN Security 367 SD-WAN Design Considerations 368 Control Plane Design 368 Scalability 369 High Availability and Redundancy 369 Site Redundancy 370 Transport Redundancy 370 Network/Headend Redundancy 370 Controller Redundancy 371 LAN Design 371 vEdge DHCP Server 373 Direct Internet Access (DIA) 373 Security Design 373 VPN Segmentation 373 VPN Topology Design 374 Access Control Lists (ACLs) 375 SD-WAN Migration Strategy 375 QoS in SD-WAN 376 Bidirectional Forwarding Detection (BFD) 376 Policies 376 Application-Aware Routing 377 vEdge Interface Queues 377 Multicast over SD-WAN 378 Cisco SD-WAN Cloud OnRamp 379 Benefits of Cisco SD-WAN Cloud OnRamp 379 Cisco SD-WAN Cloud OnRamp Solutions 379 References and Recommended Readings 380 Exam Preparation Tasks 381 Chapter 12 Automation 390 “Do I Know This Already?” Quiz 390 Foundation Topics 392 Introduction to Network APIs and Protocols 392 Network APIs and Protocol Concepts 393 Evolution of Programmability 393 Data Encoding Formats 394 JSON 394 XML 395 Data Models 395 Model-Driven Programmability Stack 395 REST 396 YANG, NETCONF, and RESTCONF Explored 397 YANG Concepts 397 NETCONF Concepts 399 RESTCONF Concepts 401 NETCONF and RESTCONF Compared 402 IETF, OpenConfig, and Cisco YANG Models 403 IETF 403 OpenConfig 404 Cisco YANG Models 404 Model-Driven Telemetry 404 Streaming Telemetry Data 404 Model-Driven Telemetry Concepts 405 Subscription Explained 406 Periodic Publication 406 On-Change Publication 407 Defining GRPC and GNMI 407 Dial-In Approaches 408 Dial-Out Approaches 408 References and Recommended Readings 409 Exam Preparation Tasks 409 Chapter 13 Final Preparation 416 Getting Ready 416 Tools for Final Preparation 417 Pearson Cert Practice Test Engine and Questions on the Website 417 Accessing the Pearson Test Prep Software Online 417 Accessing the Pearson Test Prep Software Offline 418 Customizing Your Exams 418 Updating Your Exams 419 Premium Edition 420 Chapter-Ending Review Tools 420 Suggested Plan for Final Review/Study 420 Summary 420 Chapter 14 CCNP Enterprise Design ENSLD 300-420 Official Cert Guide Exam Updates 422 The Purpose of This Chapter 422 About Possible Exam Updates 422 Impact on You and Your Study Plan 423 News About the Next Exam Release 424 Updated Technical Content 424 Appendix A Answers to the “Do I Know This Already?” Quiz Questions Q&A Questions 426 Appendix B OSI Model, TCP/IP Architecture, and Numeric Conversion 452 Glossary 466 Online Elements Appendix C Memory Tables Appendix D Memory Tables Answer Key Appendix E Study Planner Glossary 9780138247263 TOC 12/6/2023
£53.99
Pearson Education AWS Certified Cloud Practitioner CLFC02 Cert
Book SynopsisAnthony Sequeira, CCIE No. 15626, is a seasoned trainer and author regarding various levels and tracks of Cisco, Microsoft, and AWS certifications. Anthony formally began his career in the information technology industry in 1994 with IBM in Tampa, Florida. He quickly formed his own computer consultancy, Computer Solutions, and then discovered his true passionteaching and writing about information technologies. Anthony joined Mastering Computers in 1996 and lectured to massive audiences around the world about the latest in computer technologies. Mastering Computers became the revolutionary online training company KnowledgeNet, and Anthony trained there for many years. Anthony is currently a full-time instructor with ACI Learning. ACI Learning is a leader in audit, cybersecurity, and IT professional training.
£37.99
John Wiley & Sons Inc AlcatelLucent Scalable IP Networks SelfStudy
Book SynopsisBy offering the new Service Routing Certification Program, Alcatel-Lucent is extending their reach and knowledge to networking professionals with a comprehensive demonstration of how to build smart, scalable networks. Serving as a ?course in a book? from Alcatel-Lucent?the world leader in designing and developing scalable systems?this resource pinpoints the pitfalls to avoid when building scalable networks, examines the most successful techniques available for engineers who are building and operating IP networks, and provides overviews of the Internet, IP routing and the IP layer, and the practice of opening the shortest path first.
£51.75
Pearson Education (US) vSphere 6 Foundations Exam Official Cert Guide
Book Synopsis Bill Ferguson, VCI 3, 4, 5, 6; VCP6-DCV, VCP6-NV; CCSI; and MCT Alumni has been in the computer industry for more than 20 years. Originally in technical sales and IT consulting with Sprint, he made his transition to Certified Technical Trainer in 1997 with ExecuTrain. He now runs his own company, Parallel Connections, as an independent contractor and consultant based in Birmingham, Alabama, working worldwide for most of the national training companies and some regional training companies. In addition, he has written and produced many technical training videos and books. Bill's aspiration is as follows: My job is to understand the material so well that I can make it easier for others to learn than it was for me to learn. Toward that end, I strive to provide an effective learning environment whether in person, in print, or online.
£34.02
Pearson Education CompTIA Linux LPIC1 Pearson uCertify Course and
Book Synopsis
£137.14
Pearson Education CompTIA Security SY0501 Cert Guide
Book SynopsisDavid L. Prowse is an author, technologist, and technical trainer. He has penned a dozen books for Pearson Education, including the well-received CompTIA A+ Exam Cram. He also develops video content, including the CompTIA A+ LiveLessons video course. Over the past two decades he has taught CompTIA A+, Network+, and Security+ certification courses, both in the classroom and via the Internet. David has 20 years of experience in the IT field and loves to share that experience with his readers, watchers, and students. He runs the website www.davidlprowse.com in support of his books and videos.
£33.96
Pearson Education (US) CompTIA Security SY0501 Exam Cram
Book SynopsisCompTIA''s Security+ is the #1 international vendor-neutral baseline security certification. In 2017, CompTIA is releasing a thoroughly revised certification exam. CompTIA Security+ Exam Cram, Fifth Edition has been thoroughly updated to prepare candidates for the new exam, using the proven Exam Cram method of study. As with all Exam Cram books, it includes: Chapters that map directly to the exam objectives Comprehensive foundational learning on all topics covered on the exam An extensive collection of practice questions Access to the Pearson Test Prep practice test software that provides real-time practice and feedback, online or offline The Cram Sheet tear-out card
£26.13
Pearson Education Cissp Pearson Ucertify Course and Labs Access
Book Synopsis
£126.00
John Wiley & Sons Inc OCA Oracle Certified Associate Java SE 8
Book SynopsisFull coverage of functional programming and all OCA Java Programmer exam objectives OCA, Oracle Certified Associate Java SE 8 Programmer I Study Guide, Exam 1Z0-808 is a comprehensive study guide for those taking the Oracle Certified Associate Java SE 8 Programmer I exam (1Z0-808).Table of ContentsIntroduction xxi Assessment Test xxxi Chapter 1 Java Building Blocks 1 Understanding the Java Class Structure 2 Fields and Methods 2 Comments 4 Classes vs. Files 5 Writing a main() Method 6 Understanding Package Declarations and Imports 9 Wildcards 10 Redundant Imports 11 Naming Conflicts 12 Creating a New Package 13 Code Formatting on the Exam 16 Creating Objects 16 Constructors 17 Reading and Writing Object Fields 18 Instance Initializer Blocks 18 Order of Initialization 19 Distinguishing Between Object References and Primitives 20 Primitive Types 20 Reference Types 24 Key Differences 25 Declaring and Initializing Variables 25 Declaring Multiple Variables 26 Identifiers 27 Understanding Default Initialization of Variables 29 Local Variables 29 Instance and Class Variables 30 Understanding Variable Scope 31 Ordering Elements in a Class 34 Destroying Objects 36 Garbage Collection 36 finalize() 38 Benefits of Java 39 Summary 40 Exam Essentials 41 Review Questions 42 Chapter 2 Operators and Statements 51 Understanding Java Operators 52 Working with Binary Arithmetic Operators 53 Arithmetic Operators 53 Numeric Promotion 55 Working with Unary Operators 57 Logical Complement and Negation Operators 57 Increment and Decrement Operators 58 Using Additional Binary Operators 60 Assignment Operators 60 Compound Assignment Operators 62 Relational Operators 63 Logical Operators 64 Equality Operators 65 Understanding Java Statements 66 The if-then Statement 67 The if-then-else Statement 68 The switch Statement 72 The while Statement 76 The do-while Statement 78 The for Statement 80 Understanding Advanced Flow Control 86 Nested Loops 87 Adding Optional Labels 87 The break Statement 88 The continue Statement 90 Summary 92 Exam Essentials 92 Review Questions 94 Chapter 3 Core Java APIs 101 Creating and Manipulating Strings 102 Concatenation 102 Immutability 104 The String Pool 105 Important String Methods 105 Method Chaining 110 Using the StringBuilder Class 111 Mutability and Chaining 112 Creating a StringBuilder 113 Important StringBuilder Methods 114 StringBuilder vs. StringBuffer 117 Understanding Equality 117 Understanding Java Arrays 119 Creating an Array of Primitives 119 Creating an Array with Reference Variables 121 Using an Array 123 Sorting 124 Searching 125 Varargs 126 Multidimensional Arrays 126 Understanding an ArrayList 129 Creating an ArrayList 129 Using an ArrayList 130 Wrapper Classes 134 Autoboxing 136 Converting Between array and List 136 Sorting 138 Working with Dates and Times 138 Creating Dates and Times 138 Manipulating Dates and Times 142 Working with Periods 145 Formatting Dates and Times 148 Parsing Dates and Times 151 Summary 151 Exam Essentials 152 Review Questions 153 Chapter 4 Methods and Encapsulation 165 Designing Methods 166 Optional Specifiers 168 Return Type 169 Method Name 170 Parameter List 171 Optional Exception List 171 Method Body 171 Working with Varargs 172 Applying Access Modifiers 173 Private Access 173 Default (Package Private) Access 175 Protected Access 176 Public Access 180 Designing Static Methods and Fields 181 Calling a Static Variable or Method 182 Static vs. Instance 183 Static Variables 185 Static Initialization 186 Static Imports 187 Passing Data Among Methods 188 Overloading Methods 191 Creating Constructors 196 Default Constructor 197 Overloading Constructors 199 Final Fields 202 Order of Initialization 202 Encapsulating Data 205 Creating Immutable Classes 207 Writing Simple Lambdas 208 Lambda Example 209 Lambda Syntax 211 Predicates 214 Summary 215 Exam Essentials 216 Review Questions 218 Chapter 5 Class Design 233 Introducing Class Inheritance 234 Extending a Class 235 Applying Class Access Modifiers 237 Creating Java Objects 237 Defining Constructors 238 Calling Inherited Class Members 244 Inheriting Methods 246 Inheriting Variables 257 Creating Abstract Classes 259 Defining an Abstract Class 260 Creating a Concrete Class 262 Extending an Abstract Class 263 Implementing Interfaces 266 Defining an Interface 267 Inheriting an Interface 269 Interface Variables 273 Default Interface Methods 274 Static Interface Methods 278 Understanding Polymorphism 279 Object vs. Reference 281 Casting Objects 282 Virtual Methods 284 Polymorphic Parameters 285 Polymorphism and Method Overriding 287 Summary 288 Exam Essentials 289 Review Questions 291 Chapter 6 Exceptions 299 Understanding Exceptions 300 The Role of Exceptions 300 Understanding Exception Types 302 Throwing an Exception 304 Using a try Statement 305 Adding a finally Block 307 Catching Various Types of Exceptions 309 Throwing a Second Exception 311 Recognizing Common Exception Types 313 Runtime Exceptions 314 Checked Exceptions 317 Errors 317 Calling Methods That Throw Exceptions 318 Subclasses 319 Printing an Exception 321 Summary 323 Exam Essentials 324 Review Questions 325 Appendix A Answers to Review Questions 333 Chapter 1: Java Building Blocks 334 Chapter 2: Operators and Statements 336 Chapter 3: Core Java APIs 339 Chapter 4: Methods and Encapsulation 342 Chapter 5: Class Design 346 Chapter 6: Exceptions 349 Appendix B Study Tips 353 Studying for the Test 354 Creating a Study Plan 354 Creating and Running Sample Applications 355 Taking the Test 359 Understanding the Question 359 Applying Process of Elimination 362 Optimizing Your Time 364 Getting a Good Night’s Rest 366 Index 367
£37.50
John Wiley & Sons Inc CISA Certified Information Systems Auditor Study
Book SynopsisThe ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing.Table of ContentsIntroduction xix Assessment Test xlii Chapter 1 Secrets of a Successful Auditor 1 Understanding the Demand for IS Audits 2 Executive Misconduct 3 More Regulation Ahead 5 Basic Regulatory Objective 7 Governance is Leadership 8 Three Types of Data Target Different Uses 9 Audit Results Indicate the Truth 10 Understanding Policies, Standards, Guidelines, and Procedures 11 Understanding Professional Ethics 14 Following the ISACA Professional Code 14 Preventing Ethical Conflicts 16 Understanding the Purpose of an Audit 17 Classifying General Types of Audits 18 Determining Differences in Audit Approach 20 Understanding the Auditor’s Responsibility 21 Comparing Audits to Assessments 21 Differentiating between Auditor and Auditee Roles 22 Applying an Independence Test 23 Implementing Audit Standards 24 Where Do Audit Standards Come From? 25 Understanding the Various Auditing Standards 27 Specific Regulations Defining Best Practices 31 Audits to Prove Financial Integrity 34 Auditor is an Executive Position 35 Understanding the Importance of Auditor Confidentiality 35 Working with Lawyers 36 Working with Executives 37 Working with IT Professionals 37 Retaining Audit Documentation 38 Providing Good Communication and Integration 39 Understanding Leadership Duties 39 Planning and Setting Priorities 40 Providing Standard Terms of Reference 41 Dealing with Conflicts and Failures 42 Identifying the Value of Internal and External Auditors 43 Understanding the Evidence Rule 43 Stakeholders: Identifying Whom You Need to Interview 44 Understanding the Corporate Organizational Structure 45 Identifying Roles in a Corporate Organizational Structure 45 Identifying Roles in a Consulting Firm Organizational Structure 47 Summary 49 Exam Essentials 49 Review Questions 52 Chapter 2 Governance 57 Strategy Planning for Organizational Control 61 Overview of the IT Steering Committee 64 Using the Balanced Scorecard 69 IT Subset of the BSC 74 Decoding the IT Strategy 74 Specifying a Policy 77 Project Management 79 Implementation Planning of the IT Strategy 90 Using COBIT 94 Identifying Sourcing Locations 94 Conducting an Executive Performance Review 99 Understanding the Auditor’s Interest in the Strategy 100 Overview of Tactical Management 100 Planning and Performance 100 Management Control Methods 101 Risk Management 105 Implementing Standards 108 Human Resources 109 System Life‐Cycle Management 111 Continuity Planning 111 Insurance 112 Overview of Business Process Reengineering 112 Why Use Business Process Reengineering 113 BPR Methodology 114 Genius or Insanity? 114 Goal of BPR 114 Guiding Principles for BPR 115 Knowledge Requirements for BPR 116 BPR Techniques 116 BPR Application Steps 117 Role of IS in BPR 119 Business Process Documentation 119 BPR Data Management Techniques 120 Benchmarking as a BPR Tool 120 Using a Business Impact Analysis 121 BPR Project Risk Assessment 123 Practical Application of BPR 125 Practical Selection Methods for BPR 127 Troubleshooting BPR Problems 128 Understanding the Auditor’s Interest in Tactical Management 129 Operations Management 129 Sustaining Operations 130 Tracking Actual Performance 130 Controlling Change 131 Understanding the Auditor’s Interest in Operational Delivery 131 Summary 132 Exam Essentials 132 Review Questions 134 Chapter 3 Audit Process 139 Understanding the Audit Program 140 Audit Program Objectives and Scope 141 Audit Program Extent 143 Audit Program Responsibilities 144 Audit Program Resources 144 Audit Program Procedures 145 Audit Program Implementation 146 Audit Program Records 146 Audit Program Monitoring and Review 147 Planning Individual Audits 148 Establishing and Approving an Audit Charter 151 Role of the Audit Committee 151 Preplanning Specific Audits 153 Understanding the Variety of Audits 154 Identifying Restrictions on Scope 156 Gathering Detailed Audit Requirements 158 Using a Systematic Approach to Planning 159 Comparing Traditional Audits to Assessments and Self‐Assessments 161 Performing an Audit Risk Assessment 162 Determining Whether an Audit is Possible 163 Identifying the Risk Management Strategy 165 Determining Feasibility of Audit 167 Performing the Audit 167 Selecting the Audit Team 167 Determining Competence and Evaluating Auditors 168 Ensuring Audit Quality Control 170 Establishing Contact with the Auditee 171 Making Initial Contact with the Auditee 172 Using Data Collection Techniques 174 Conducting Document Review 176 Understanding the Hierarchy of Internal Controls 177 Reviewing Existing Controls 179 Preparing the Audit Plan 182 Assigning Work to the Audit Team 183 Preparing Working Documents 184 Conducting Onsite Audit Activities 185 Gathering Audit Evidence 186 Using Evidence to Prove a Point 186 Understanding Types of Evidence 187 Selecting Audit Samples 187 Recognizing Typical Evidence for IS Audits 188 Using Computer‐Assisted Audit Tools 189 Understanding Electronic Discovery 191 Grading of Evidence 193 Timing of Evidence 195 Following the Evidence Life Cycle 195 Conducting Audit Evidence Testing 198 Compliance Testing 198 Substantive Testing 199 Tolerable Error Rate 200 Recording Test Results 200 Generating Audit Findings 201 Detecting Irregularities and Illegal Acts 201 Indicators of Illegal or Irregular Activity 202 Responding to Irregular or Illegal Activity 202 Findings Outside of Audit Scope 203 Report Findings 203 Approving and Distributing the Audit Report 205 Identifying Omitted Procedures 205 Conducting Follow‐up (Closing Meeting) 205 Summary 206 Exam Essentials 207 Review Questions 210 Chapter 4 Networking Technology Basics 215 Understanding the Differences in Computer Architecture 217 Selecting the Best System 221 Identifying Various Operating Systems 221 Determining the Best Computer Class 224 Comparing Computer Capabilities 227 Ensuring System Control 228 Dealing with Data Storage 230 Using Interfaces and Ports 235 Introducing the Open Systems Interconnection Model 237 Layer 1: Physical Layer 240 Layer 2: Data‐Link Layer 240 Layer 3: Network Layer 242 Layer 4: Transport Layer 248 Layer 5: Session Layer 249 Layer 6: Presentation Layer 250 Layer 7: Application Layer 250 Understanding How Computers Communicate 251 Understanding Physical Network Design 252 Understanding Network Cable Topologies 253 Bus Topologies 254 Star Topologies 254 Ring Topologies 255 Meshed Networks 256 Differentiating Network Cable Types 258 Coaxial Cable 258 Unshielded Twisted‐Pair (UTP) Cable 259 Fiber‐Optic Cable 260 Connecting Network Devices 260 Using Network Services 263 Domain Name System 263 Dynamic Host Configuration Protocol 265 Expanding the Network 266 Using Telephone Circuits 268 Network Firewalls 271 Remote VPN Access 276 Using Wireless Access Solutions 280 Firewall Protection for Wireless Networks 284 Remote Dial‐Up Access 284 WLAN Transmission Security 284 Achieving 802.11i RSN Wireless Security 287 Intrusion Detection Systems 288 Summarizing the Various Area Networks 291 Using Software as a Service (SaaS) 292 Advantages 292 Disadvantages 293 Cloud Computing 294 The Basics of Managing the Network 295 Automated LAN Cable Tester 295 Protocol Analyzers 295 Remote Monitoring Protocol Version 2 297 Summary 298 Exam Essentials 298 Review Questions 301 Chapter 5 Information Systems Life Cycle 307 Governance in Software Development 308 Management of Software Quality 310 Capability Maturity Model 310 International Organization for Standardization 312 Typical Commercial Records Classification Method 316 Overview of the Executive Steering Committee 317 Identifying Critical Success Factors 318 Using the Scenario Approach 318 Aligning Software to Business Needs 319 Change Management 323 Management of the Software Project 323 Choosing an Approach 323 Using Traditional Project Management 324 Overview of the System Development Life Cycle 327 Phase 1: Feasibility Study 331 Phase 2: Requirements Definition 334 Phase 3: System Design 339 Phase 4: Development 343 Phase 5: Implementation 354 Phase 6: Postimplementation 361 Phase 7: Disposal 363 Overview of Data Architecture 364 Databases 364 Database Transaction Integrity 368 Decision Support Systems 369 Presenting Decision Support Data 370 Using Artificial Intelligence 370 Program Architecture 371 Centralization vs. Decentralization 372 Electronic Commerce 372 Summary 374 Exam Essentials 374 Review Questions 376 Chapter 6 System Implementation and Operations 381 Understanding the Nature of IT Services 383 Performing IT Operations Management 385 Meeting IT Functional Objectives 385 Using the IT Infrastructure Library 387 Supporting IT Goals 389 Understanding Personnel Roles and Responsibilities 389 Using Metrics 394 Evaluating the Help Desk 396 Performing Service‐Level Management 397 Outsourcing IT Functions 398 Performing Capacity Management 399 Using Administrative Protection 400 Information Security Management 401 IT Security Governance 401 Authority Roles over Data 402 Data Retention Requirements 403 Document Physical Access Paths 404 Personnel Management 405 Physical Asset Management 406 Compensating Controls 408 Performing Problem Management 409 Incident Handling 410 Digital Forensics 412 Monitoring the Status of Controls 414 System Monitoring 415 Document Logical Access Paths 416 System Access Controls 417 Data File Controls 420 Application Processing Controls 421 Log Management 423 Antivirus Software 424 Active Content and Mobile Software Code 424 Maintenance Controls 427 Implementing Physical Protection 430 Data Processing Locations 432 Environmental Controls 432 Safe Media Storage 440 Summary 442 Exam Essentials 442 Review Questions 444 Chapter 7 Protecting Information Assets 449 Understanding the Threat 450 Recognizing Types of Threats and Computer Crimes 452 Identifying the Perpetrators 454 Understanding Attack Methods 458 Implementing Administrative Protection 469 Using Technical Protection 472 Technical Control Classification 472 Application Software Controls 474 Authentication Methods 475 Network Access Protection 488 Encryption Methods 489 Public‐Key Infrastructure 496 Network Security Protocols 502 Telephone Security 507 Technical Security Testing 507 Summary 509 Exam Essentials 509 Review Questions 511 Chapter 8 Business Continuity and Disaster Recovery 517 Debunking the Myths 518 Myth 1: Facility Matters 519 Myth 2: IT Systems Matter 519 From Myth to Reality 519 Understanding the Five Conflicting Disciplines Called Business Continuity 520 Defining Disaster Recovery 521 Surviving Financial Challenges 522 Valuing Brand Names 522 Rebuilding after a Disaster 523 Defining the Purpose of Business Continuity 524 Uniting Other Plans with Business Continuity 527 Identifying Business Continuity Practices 527 Identifying the Management Approach 529 Following a Program Management Approach 531 Understanding the Five Phases of a Business Continuity Program 532 Phase 1: Setting Up the BC Program 532 Phase 2: The Discovery Process 535 Phase 4: Plan Implementation 560 Phase 5: Maintenance and Integration 562 Understanding the Auditor Interests in BC/DR Plans 563 Summary 564 Exam Essentials 564 Review Questions 566 Appendix Answers to Review Questions 571 Index 591
£43.50
John Wiley & Sons Inc MCSA Windows Server 2016 Study Guide Exam 70740
Book Synopsis The bestselling MCSA 70-740 study guide, updated for the latest exam MCSA Windows Server 2016 Study Guide is your ultimate resource for Exam 70-740. Covering 100% of all exam objectives, this study guide goes far beyond concept review with real-world scenarios containing expert insights, chapter review questions, hands-on practice exercises while the Sybex interactive learning environment provides additional last minute review through practice exams, electronic flashcards, and searchable glossary. This new edition has been fully updated to align with the Windows Server 2016 exam, featuring authoritative coverage of installation, configuration, server roles, Hyper-V, core network services, Active Directory, Group Policy, security, remote access, disaster recovery, and more. The vast majority of servers around the world use Windows Server, and the 2016 release includes a host of new features and updates. This study guide has been updated to prepare you forTable of ContentsIntroduction xxi Assessment Test xxxii Chapter 1 Installing Windows Server 2016 1 Features and Advantages of Windows Server 2016 2 Planning the Windows Server 2016 Installation 6 Server Roles in Windows Server 2016 6 Migrating Roles and Features to Windows Server 2016 10 Deciding Which Windows Server 2016 Versions to Use 11 Deciding on the Type of Installation 13 NIC Teaming 16 Installing Windows Server 2016 17 Activating and Servicing Windows 31 Key Management Service 32 Automatic Virtual Machine Activation 33 Active Directory–Based Activation 34 Servicing Windows Server 2016 34 Using Windows Deployment Services 35 Preparing the WDS Server 36 WDS Server Requirements 36 Network Services 37 Installing the WDS Server Components 37 Preparing the WDS Client 39 Understanding Features On Demand 39 Summary 41 Video Resources 41 Exam Essentials 41 Review Questions 42 Chapter 2 Installing in the Enterprise 45 Understanding Automated Deployment Options 46 An Overview of the Microsoft Deployment Toolkit 2013 Update 2 47 An Overview of Unattended Installation 55 An Overview of the System Preparation Tool and Disk Imaging 57 Overview of the Windows Assessment and Deployment Kit 61 Windows Imaging and Configuration Designer 62 Summary of Windows Server 2016 Deployment Options 62 Deploying Unattended Installations 64 Using the System Preparation Tool to Prepare an Installation for Imaging 65 Using Windows Imaging and Configuration Designer (Windows ICD) to Create a Disk Image 67 Installing from a Disk Image 69 Using the Deployment Image Servicing and Management Tool 70 Using Windows System Image Manager to Create Answer Files 73 Microsoft Assessment and Planning (MAP) Toolkit 75 Understanding Hyper-V 77 What Is Virtualization? 78 Linux and FreeBSD Image Deployments 78 Summary 79 Video Resources 80 Exam Essentials 80 Review Questions 81 Chapter 3 Configuring Storage and Replication 85 Understanding File Systems 86 Resilient File System (ReFS) 87 NTFS 88 Storage in Windows Server 2016 91 Initializing Disks 91 Configuring Basic and Dynamic Disks 92 Managing Volumes 94 Storage Spaces in Windows Server 2016 95 Redundant Array of Independent Disks 96 Mount Points 99 Microsoft MPIO 100 Configuring iSCSI Target 102 Internet Storage Name Service 103 Implement Thin Provisioning and Trim 105 Fibre Channel 106 Network Attached Storage 106 Virtual Disk Service 106 Understanding Data Center Bridging 108 Configuring Permissions 109 Understanding SMB 109 Understanding NTFS 110 Understanding Shared Permissions 112 How NTFS Security and Shared Permissions Work Together 114 Understanding NFS Shares 116 Configuring Disk Quotas 118 Windows PowerShell 120 Using Server Manager 125 Booting from a VHD 126 Understanding Data Deduplication 127 Backup and Restoring Deduplicated Volumes 128 Installing and Enabling Data Deduplication 129 Monitoring Data Deduplicated 132 Summary 132 Video Resources 133 Exam Essentials 133 Review Questions 135 Chapter 4 Understanding Hyper-V 137 Hyper-V Overview 139 What Is Virtualization? 139 Hyper-V Features 140 Hyper-V Architecture 145 Hyper-V Requirements 147 Hyper-V Installation and Configuration 148 Install the Hyper-V Role 148 Hyper-V in Server Manager 151 Using Hyper-V Manager 152 Configure Hyper-V Settings 153 Manage Virtual Switches 154 Managing Virtual Hard Disks 157 Configuring Virtual Machines 162 Creating and Managing Virtual Machines 162 Linux and FreeBSD Image Deployments 175 PowerShell Commands 179 Summary 182 Video Resources 183 Exam Essentials 183 Review Questions 185 Chapter 5 Configuring High Availability 187 Components of High Availability 188 Achieving High Availability 189 High Availability Foundation 190 Understanding Network Load Balancing 191 NLB Requirements 193 Installing NLB Nodes 193 Upgrading an NLB Cluster 198 PowerShell Commands for a NLB Cluster 199 Achieving High Availability with Hyper-V 200 Implementing a Hyper-V Replica 201 Understanding Live Migration 205 Implementing Storage Migration 208 PowerShell Commands for Hyper-V High Availability 210 Summary 211 Video Resources 212 Exam Essentials 212 Review Questions 213 Chapter 6 Understanding Clustering 215 Achieving High Availability with Failover Clustering 216 Failover Clustering Requirements 218 Workgroup and Multi-domain clusters 219 Site-Aware, Stretched, or Geographically Dispersed Clusters (Geoclustering) 220 Cluster Quorum 220 Validating a Cluster Configuration 223 Creating a Cluster 228 Clustered Application Settings 231 Resource Properties 233 Windows Server 2016 Clustering Features 236 PowerShell Commands for Clustering 239 Implementing Storage Spaces Direct 241 The Benefits of Storage Spaces Direct 243 Deployment options 243 Requirements to Set Up Storage Spaces Direct 244 Storage Spaces Direct using Windows PowerShell 245 Summary 247 Video Resources 247 Exam Essentials 247 Review Questions 248 Chapter 7 Configuring Windows Containers 251 Understanding Windows Containers 252 Container Terminology 253 Install and Configure Server Containers 253 Install and Configure Windows Containers 260 Tagging an Image 265 Uninstall an Operating System Image 265 Creating New Images Using Dockerfile 266 Understanding Hyper-V Containers 268 Managing Container Networking 269 Using Docker Hub Repository 270 Using Microsoft Azure for Images 271 Contents xvii Using PowerShell for Containers 271 Summary 273 Video Resources 274 Exam Essentials 274 Review Questions 275 Chapter 8 Maintaining Windows Server 277 Configuring Windows Server Updates 278 Windows Update 279 Using Windows Server Update Services 282 Understanding Backups 297 Overview of the Windows Server 2016 Backup Utility 298 Setting Up an Active Directory Backup 303 Restoring Active Directory 306 Active Directory Recycle Bin 308 Understanding the ntdsutil Utility 309 Wbadmin Command-Line Utility 310 Backing Up Virtual Machines 311 PowerShell Commands 312 Summary 314 Video Resources 315 Exam Essentials 315 Review Questions 316 Chapter 9 Understanding Monitoring 319 Overview of Windows Server 2016 Performance Monitoring 321 Using Windows Server 2016 Performance Tools 323 Introducing Performance Monitor 323 Using Other Monitoring Tools 332 Summary 347 Video Resources 348 Exam Essentials 348 Review Questions 349 Appendix Answers to the Review Questions 351 Chapter 1: Installing Windows Server 2016 352 Chapter 2: Installing in the Enterprise 352 Chapter 3: Configuring Storage and Replication 353 Chapter 4: Understanding Hyper-V 354 Chapter 5: Configuring High Availability 355 Chapter 6: Understanding Clustering 356 Chapter 7: Configuring Windows Containers 357 Chapter 8: Maintaining Windows Server 357 Chapter 9: Understanding Monitoring 358 Index 361
£24.79
John Wiley & Sons Inc LPIC1 Linux Professional Institute Certification
Book SynopsisThe bestselling study guide for the popular Linux Professional Institute Certification Level 1 (LPIC-1). The updated fifth edition of LPIC-1: Linux Professional Institute Certification Study Guide is a comprehensive, one-volume resource that covers 100% of all exam objectives. Building on the proven Sybex Study Guide approach, this essential resource offers a comprehensive suite of study and learning tools such as assessment tests, hands-on exercises, chapter review questions, and practical, real-world examples. This book, completely updated to reflect the latest 101-500 and 102-500 exams, contains clear, concise, and user-friendly information on all of the Linux administration topics you will encounter on test day. Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. Linux Servers currently have a Table of ContentsIntroduction xxi Assessment Test xxxix Part I Exam 101-500 1 Chapter 1 Exploring Linux Command-Line Tools 3 Understanding Command-Line Basics 4 Discussing Distributions 4 Reaching a Shell 5 Exploring Your Linux Shell Options 5 Using a Shell 7 Using Environment Variables 11 Getting Help 17 Editing Text Files 20 Looking at Text Editors 20 Understanding vim Modes 24 Exploring Basic Text-Editing Procedures 24 Saving Changes 27 Processing Text Using Filters 28 File-Combining Commands 28 File-Transforming Commands 31 File-Formatting Commands 33 File-Viewing Commands 36 File-Summarizing Commands 40 Using Regular Expressions 45 Using grep 45 Understanding Basic Regular Expressions 47 Understanding Extended Regular Expressions 50 Using Streams, Redirection, and Pipes 50 Redirecting Input and Output 51 Piping Data between Programs 55 Using sed 56 Generating Command Lines 60 Summary 61 Exam Essentials 61 Review Questions 62 Chapter 2 Managing Software and Processes 67 Looking at Package Concepts 68 Using RPM 69 RPM Distributions and Conventions 69 The rpm Command Set 71 Extracting Data from RPMs 77 Using YUM 78 Using ZYpp 83 Using Debian Packages 86 Debian Package File Conventions 87 The dpkg Command Set 87 Looking at the APT Suite 92 Using apt-cache 93 Using apt-get 94 Reconfiguring Packages 97 Managing Shared Libraries 98 Library Principles 98 Locating Library Files 99 Loading Dynamically 100 Library Management Commands 100 Managing Processes 102 Examining Process Lists 102 Employing Multiple Screens 109 Understanding Foreground and Background Processes 116 Managing Process Priorities 120 Sending Signals to Processes 121 Summary 126 Exam Essentials 127 Review Questions 129 Chapter 3 Configuring Hardware 133 Configuring the Firmware and Core Hardware 134 Understanding the Role of Firmware 134 Device Interfaces 136 The /dev Directory 138 The /proc Directory 139 The /sys Directory 143 Working with Devices 144 Hardware Modules 148 Storage Basics 154 Types of Drives 154 Drive Partitions 155 Automatic Drive Detection 155 Storage Alternatives 156 Multipath 156 Logical Volume Manager 157 Using RAID Technology 158 Partitioning Tools 158 Working with fdisk 158 Working with gdisk 161 The GNU parted Command 162 Graphical Tools 163 Understanding Filesystems 164 The Virtual Directory 164 Maneuvering Around the Filesystem 166 Formatting Filesystems 167 Common Filesystem Types 167 Creating Filesystems 169 Mounting Filesystems 170 Manually Mounting Devices 170 Automatically Mounting Devices 172 Managing Filesystems 173 Retrieving Filesystem Stats 173 Filesystem Tools 173 Summary 174 Exam Essentials 175 Review Questions 177 Chapter 4 Managing Files 181 Using File Management Commands 182 Naming and Listing Files 182 Exploring Wildcard Expansion Rules 186 Understanding the File Commands 189 Compressing File Commands 199 Archiving File Commands 202 Managing Links 213 Managing File Ownership 218 Assessing File Ownership 219 Changing a File’s Owner 219 Changing a File’s Group 220 Controlling Access to Files 221 Understanding Permissions 221 Changing a File’s Mode 223 Setting the Default Mode 226 Changing Special Access Modes 228 Locating Files 229 Getting to Know the FHS 229 Employing Tools to Locate Files 231 Summary 239 Exam Essentials 239 Review Questions 241 Chapter 5 Booting, Initializing, and Virtualizing Linux 245 Understanding the Boot Process 246 The Boot Process 246 Extracting Information about the Boot Process 247 Looking at Firmware 249 The BIOS Startup 249 The UEFI Startup 250 Looking at Boot Loaders 251 Boot Loader Principles 251 Using GRUB Legacy as the Boot Loader 251 Using GRUB 2 as the Boot Loader 255 Adding Kernel Boot Parameters 259 Using Alternative Boot Loaders 260 The Initialization Process 261 Using the systemd Initialization Process 262 Exploring Unit Files 263 Focusing on Service Unit Files 265 Focusing on Target Unit Files 268 Looking at systemctl 270 Examining Special systemd Commands 273 Using the SysV Initialization Process 276 Understanding Runlevels 277 Investigating SysVinit Commands 280 Stopping the System 283 Notifying the Users 284 Virtualizing Linux 286 Looking at Virtual Machines 287 Understanding Containers 291 Looking at Infrastructure as a Service 293 Summary 295 Exam Essentials 295 Review Questions 298 Part II Exam 102-500 303 Chapter 6 Configuring the GUI, Localization, and Printing 305 Understanding the GUI 306 Understanding the X11 Architecture 307 Examining X.Org 308 Figuring Out Wayland 309 Managing the GUI 311 Standard GUI Features 311 The X GUI Login System 313 Common Linux Desktop Environments 314 Providing Accessibility 323 Using X11 for Remote Access 325 Remote X11 Connections 326 Tunneling your X11 Connection 326 Using Remote Desktop Software 328 Viewing VNC 328 Grasping Xrdp 330 Exploring NX 332 Studying SPICE 332 Understanding Localization 333 Character Sets 333 Environment Variables 334 Setting Your Locale 335 Installation Locale Decisions 335 Changing Your Locale 336 Looking at Time 338 Working with Time Zones 338 Setting the Time and Date 339 Configuring Printing 343 Summary 345 Exam Essentials 346 Review Questions 348 Chapter 7 Administering the System 353 Managing Users and Groups 354 Understanding Users and Groups 354 Configuring User Accounts 355 Configuring Groups 371 Managing Email 375 Understanding Email 375 Choosing Email Software 376 Working with Email 377 Using Log and Journal Files 384 Examining the syslog Protocol 385 Viewing the History of Linux Logging 387 Logging Basics Using rsyslogd 387 Journaling with systemd-journaldd 394 Maintaining the System Time 403 Understanding Linux Time Concepts 403 Viewing and Setting Time 404 Understanding the Network Time Protocol 408 Using the NTP Daemon 411 Using the chrony Daemon 413 Summary 416 Exam Essentials 416 Review Questions 419 Chapter 8 Configuring Basic Networking 423 Networking Basics 424 The Physical Layer 424 The Network Layer 426 The Transport Layer 430 The Application Layer 431 Configuring Network Features 433 Network Configuration Files 433 Graphical Tools 436 Command-Line Tools 438 Getting Network Settings Automatically 445 Bonding Network Cards 445 Basic Network Troubleshooting 447 Sending Test Packets 447 Tracing Routes 448 Finding Host Information 449 Advanced Network Troubleshooting 452 The netstat Command 452 Examining Sockets 455 The netcat Utility 456 Summary 457 Exam Essentials 458 Review Questions 460 Chapter 9 Writing Scripts 465 Shell Variables 466 Global Environment Variables 466 Local Environment Variables 468 Setting Local Environment Variables 470 Setting Global Environment Variables 472 Locating System Environment Variables 472 Using Command Aliases 474 The Basics of Shell Scripting 475 Running Multiple Commands 475 Redirecting Output 476 Piping Data 477 The Shell Script Format 478 Running the Shell Script 479 Advanced Shell Scripting 481 Displaying Messages 481 Using Variables in Scripts 482 Command-Line Arguments 484 Getting User Input 484 The Exit Status 488 Writing Script Programs 489 Command Substitution 489 Performing Math 490 Logic Statements 492 Loops 496 Functions 498 Running Scripts in Background Mode 500 Running in the Background 501 Running Multiple Background Jobs 502 Running Scripts Without a Console 503 Sending Signals 504 Interrupting a Process 504 Pausing a Process 504 Job Control 506 Viewing Jobs 506 Restarting Stopped Jobs 508 Running Like Clockwork 509 Scheduling a Job Using the at Command 509 Scheduling Regular Scripts 513 Summary 515 Exam Essentials 516 Review Questions 518 Chapter 10 Securing Your System 523 Administering Network Security 524 Disabling Unused Services 524 Using Super Server Restrictions 534 Restricting via TCP Wrappers 538 Administering Local Security 539 Securing Passwords 539 Limiting root Access 543 Auditing User Access 547 Setting Login, Process, and Memory Limits 549 Locating SUID/SGID Files 551 Exploring Cryptography Concepts 553 Discovering Key Concepts 553 Securing Data 554 Signing Transmissions 555 Looking at SSH 555 Exploring Basic SSH Concepts 555 Configuring SSH 558 Generating SSH Keys 560 Authenticating with SSH Keys 561 Authenticating with the Authentication Agent 564 Tunneling 565 Using SSH Securely 567 Using GPG 567 Generating Keys 568 Importing Keys 569 Encrypting and Decrypting Data 570 Signing Messages and Verifying Signatures 571 Revoking a Key 573 Summary 574 Exam Essentials 575 Review Questions 577 Appendix Answers to Review Questions 583 Chapter 1: Exploring Linux Command-Line Tools 584 Chapter 2: Managing Software and Processes 587 Chapter 3: Configuring Hardware 590 Chapter 4: Managing Files 593 Chapter 5: Booting, Initializing, and Virtualizing Linux 597 Chapter 6: Configuring the GUI, Localization, and Printing 601 Chapter 7: Administering the System 605 Chapter 8: Configuring Basic Networking 608 Chapter 9: Writing Scripts 611 Chapter 10: Securing Your System 615 Index 619
£37.50
John Wiley & Sons Inc OCP Oracle Certified Professional Java SE 11
Book SynopsisThis OCP Oracle Certified Professional Java SE 11 Programmer I Study Guide: Exam 1Z0-815and theProgrammer II Study Guide: Exam 1Z0-816 were published before Oracle announced major changes to its OCP certification program and the release of the new Developer 1Z0-819 exam. No matter the changes, rest assured both of the Programmer I and II Study Guidescover everything you need to prepare for and take Exam 1Z0-819. If you've purchased one of the Programmer Study Guides, purchase the other one and you'll be all set. NOTE: The OCP Java SE 11 Programmer I Exam 1Z0-815 and Programmer II Exam 1Z0-816 have been retired (as of October 1, 2020), and Oracle has released a new Developer Exam 1Z0-819 to replace the previous exams.The Upgrade Exam 1Z0-817 remains the same. The comprehensive study aide for those preparing for the new Oracle Certified Professional Java SE Programmer I Exam 1Z0-815 Used primarTable of ContentsIntroduction xxi The Assessment Test xliii Chapter 1 Welcome to Java 1 Learning About the Java Environment 2 Major Components of Java 2 Downloading a JDK 3 Identifying Benefits of Java 4 Understanding the Java Class Structure 5 Fields and Methods 5 Comments 6 Classes vs. Files 8 Writing a main() Method 8 Creating a main() Method 9 Passing Parameters to a Java Program 10 Running a Program in One Line 12 Understanding Package Declarations and Imports 13 Wildcards 15 Redundant Imports 15 Naming Conflicts 16 Creating a New Package 18 Compiling and Running Code with Packages 19 Using an Alternate Directory 20 Compiling with JAR Files 22 Creating a JAR File 23 Running a Program in One Line with Packages 24 Ordering Elements in a Class 24 Code Formatting on the Exam 26 Summary 27 Exam Essentials 27 Review Questions 29 Chapter 2 Java Building Blocks 35 Creating Objects 36 Calling Constructors 36 Reading and Writing Member Fields 37 Executing Instance Initializer Blocks 38 Following Order of Initialization 39 Understanding Data Types 40 Using Primitive Types 40 Using Reference Types 44 Distinguishing between Primitives and Reference Types 45 Declaring Variables 46 Identifying Identifiers 46 Declaring Multiple Variables 49 Initializing Variables 50 Creating Local Variables 51 Passing Constructor and Method Parameters 52 Defining Instance and Class Variables 53 Introducing var 53 Managing Variable Scope 59 Limiting Scope 59 Nesting Scope 60 Tracing Scope 60 Applying Scope to Classes 61 Reviewing Scope 62 Destroying Objects 62 Understanding Garbage Collection 63 Tracing Eligibility 64 Summary 67 Exam Essentials 67 Review Questions 69 Chapter 3 Operators 79 Understanding Java Operators 80 Types of Operators 80 Operator Precedence 81 Applying Unary Operators 82 Logical Complement and Negation Operators 83 Increment and Decrement Operators 84 Working with Binary Arithmetic Operators 85 Arithmetic Operators 86 Numeric Promotion 88 Assigning Values 90 Assignment Operator 90 Casting Values 90 Compound Assignment Operators 93 Assignment Operator Return Value 94 Comparing Values 95 Equality Operators 95 Relational Operators 97 Logical Operators 99 Short-Circuit Operators 100 Making Decisions with the Ternary Operator 102 Summary 103 Exam Essentials 104 Review Questions 105 Chapter 4 Making Decisions 113 Creating Decision-Making Statements 114 Statements and Blocks 114 The if Statement 115 The else Statement 116 The switch Statement 119 Writing while Loops 126 The while Statement 126 The do/while Statement 127 Comparing while and do/while Loops 128 Infinite Loops 129 Constructing for Loops 130 The for Loop 131 The for-each Loop 136 Controlling Flow with Branching 141 Nested Loops 141 Adding Optional Labels 142 The break Statement 143 The continue Statement 145 The return Statement 147 Unreachable Code 148 Reviewing Branching 148 Summary 149 Exam Essentials 150 Review Questions 151 Chapter 5 Core Java APIs 161 Creating and Manipulating Strings 162 Concatenation 163 Immutability 164 Important String Methods 165 Method Chaining 171 Using the StringBuilder Class 172 Mutability and Chaining 173 Creating a StringBuilder 174 Important StringBuilder Methods 174 Understanding Equality 177 Comparing equals() and == 177 The String Pool 179 Understanding Java Arrays 180 Creating an Array of Primitives 181 Creating an Array with Reference Variables 183 Using an Array 185 Sorting 186 Searching 187 Comparing 188 Varargs 190 Multidimensional Arrays 190 Understanding an ArrayList 193 Creating an ArrayList 193 Using an ArrayList 195 Wrapper Classes 199 Autoboxing and Unboxing 201 Converting Between array and List 201 Using Varargs to Create a List 203 Sorting 204 Creating Sets and Maps 204 Introducing Sets 204 Introducing Maps 205 Calculating with Math APIs 206 min() and max() 206 round() 207 pow() 207 random() 208 Summary 208 Exam Essentials 209 Review Questions 210 Chapter 6 Lambdas and Functional Interfaces 221 Writing Simple Lambdas 222 Lambda Example 222 Lambda Syntax 225 Introducing Functional Interfaces 227 Predicate 228 Consumer 228 Supplier 229 Comparator 230 Working with Variables in Lambdas 231 Parameter List 231 Local Variables inside the Lambda Body 231 Variables Referenced from the Lambda Body 232 Calling APIs with Lambdas 234 removeIf() 234 sort() 235 forEach() 235 Summary 236 Exam Essentials 237 Review Questions 238 Chapter 7 Methods and Encapsulation 247 Designing Methods 248 Access Modifiers 249 Optional Specifiers 250 Return Type 251 Method Name 252 Parameter List 253 Optional Exception List 253 Method Body 254 Working with Varargs 254 Applying Access Modifiers 256 Private Access 256 Default (Package-Private) Access 257 Protected Access 259 Public Access 263 Applying the static Keyword 264 Designing static Methods and Fields 264 Accessing a static Variable or Method 265 Static vs. Instance 266 static Variables 268 Static Initialization 269 Static Imports 270 Passing Data among Methods 272 Overloading Methods 275 Varargs 277 Autoboxing 277 Reference Types 277 Primitives 279 Generics 279 Arrays 280 Putting It All Together 280 Encapsulating Data 281 Summary 283 Exam Essentials 284 Review Questions 285 Chapter 8 Class Design 295 Understanding Inheritance 296 Single vs. Multiple Inheritance 297 Inheriting Object 298 Creating Classes 299 Extending a Class 299 Applying Class Access Modifiers 301 Accessing the this Reference 302 Calling the super Reference 303 Declaring Constructors 305 Creating a Constructor 305 Default Constructor 306 Calling Overloaded Constructors with this() 308 Calling Parent Constructors with super() 310 Constructors and final Fields 314 Order of Initialization 316 Reviewing Constructor Rules 322 Inheriting Members 323 Calling Inherited Members 323 Inheriting Methods 324 Hiding Variables 336 Understanding Polymorphism 337 Object vs. Reference 339 Casting Objects 340 The instanceof Operator 341 Polymorphism and Method Overriding 342 Overriding vs. Hiding Members 344 Summary 346 Exam Essentials 347 Review Questions 349 Chapter 9 Advanced Class Design 363 Creating Abstract Classes 364 Introducing Abstract Classes 364 Defining Abstract Methods 366 Creating a Concrete Class 370 Reviewing Abstract Class Rules 372 Implementing Interfaces 373 Defining an Interface 373 Inserting Implicit Modifiers 377 Inheriting an Interface 380 Polymorphism and Interfaces 384 Reviewing Interface Rules 386 Introducing Inner Classes 388 Defining a Member Inner Class 388 Using a Member Inner Class 389 Summary 390 Exam Essentials 391 Review Questions 392 Chapter 10 Exceptions 401 Understanding Exceptions 402 The Role of Exceptions 402 Understanding Exception Types 404 Throwing an Exception 407 Recognizing Exception Classes 409 RuntimeException Classes 409 Checked Exception Classes 412 Error Classes 413 Handling Exceptions 414 Using try and catch Statements 414 Chaining catch Blocks 416 Applying a Multi-catch Block 418 Adding a finally Block 421 Finally Closing Resources 424 Throwing Additional Exceptions 430 Calling Methods That Throw Exceptions 432 Declaring and Overriding Methods with Exceptions 434 Printing an Exception 435 Summary 437 Exam Essentials 438 Review Questions 440 Chapter 11 Modules 451 Introducing Modules 452 Exploring a Module 453 Benefits of Modules 454 Creating and Running a Modular Program 456 Creating the Files 457 Compiling Our First Module 458 Running Our First Module 460 Packaging Our First Module 461 Updating Our Example for Multiple Modules 463 Updating the Feeding Module 463 Creating a Care Module 464 Creating the Talks Module 466 Creating the Staff Module 469 Diving into the module-info File 470 exports 470 requires transitive 472 provides, uses, and opens 474 Discovering Modules 475 The java Command 475 The jar Command 478 The jdeps Command 478 The jmod Command 480 Reviewing Command-Line Options 481 Summary 483 Exam Essentials 484 Review Questions 485 Appendix Answers to Review Questions 491 Chapter 1: Welcome to Java 492 Chapter 2: Java Building Blocks 494 Chapter 3: Operators 498 Chapter 4: Making Decisions 501 Chapter 5: Core Java APIs 505 Chapter 6: Lambdas and Functional Interfaces 509 Chapter 7: Methods and Encapsulation 511 Chapter 8: Class Design 513 Chapter 9: Advanced Class Design 518 Chapter 10: Exceptions 522 Chapter 11: Modules 526 Index 529
£38.00
John Wiley & Sons Inc MCA Modern Desktop Administrator Study Guide
Book SynopsisThe essential study guide for the new Microsoft 365 Certified Associate (MCA) Modern Desktop certificationcovers Exam MD-100: Windows 10! The new Microsoft 365 Certified Associate (MCA) Modern Desktop certification exam measures a candidate's ability to deploy Windows, manage devices and data, configure connectivity, and maintain Windows. MCA certification, sought by a growing number of employers, is an important part of any IT professional's resume. The MCA Modern Desktop Administrator Study Guide: Exam MD-100 is a must-have book for anyone preparing for certification. This clear and accurate study guide covers 100% of exam objectivesproviding hands-on exercises, challenging review questions, full explanations, and real-world examples. From the intricacies of Windows deployment to advanced security and enterprise capabilities, each chapter explains everything candidates need to know for passing the exam and earning MCA certification. This accurate, up-toTable of ContentsIntroduction xxi Assessment Test xxxi Part I Exam MD-100 1 Chapter 1 Windows 10 Installation 3 Understanding the Basics 4 Windows 10 Features 8 Windows 10 Architecture 10 Preparing to Install Windows 10 11 Windows 10 Home 11 Windows 10 Pro 12 Windows 10 Enterprise 13 Windows 10 Enterprise E3 and E5 14 Windows 10 Requirements 14 New Install or Upgrade? 17 Disk Partitioning 20 Language and Locale 21 Installing Windows 10 22 Performing a Clean Install of Windows 10 22 Performing an Upgrade to Windows 10 31 Troubleshooting Installation Problems 36 Supporting Multiple-Boot Options 38 Using Windows Activation 39 Understanding Automated Deployment Options 40 An Overview of the Microsoft Deployment Toolkit 41 An Overview of Unattended Installation 46 An Overview of Windows Deployment Services 48 An Overview of the System Preparation Tool and Disk Imaging 51 Overview of the Windows Assessment and Deployment Kit 55 Windows Configuration Designer 56 Summary of Windows 10 Deployment Options 56 Deploying Unattended Installations 57 Using the System Preparation Tool to Prepare an Installation for Imaging 59 Using Windows Configuration Designer to Create a Disk Image 61 Using the Deployment Image Servicing and Management Tool 63 Using Windows System Image Manager to Create Answer Files 65 Windows Update 66 The Update Process 66 Using Windows Update 68 Using Command-Line Options 69 Installing Windows Store Updates 70 Summary 71 Exam Essentials 72 Video Resources 73 Review Questions 74 Chapter 2 Configuring Users 77 Understanding User Accounts 78 Account Types 79 Built-In Accounts 80 Local and Domain User Accounts 81 Working with User Accounts 82 Using the Local Users and Groups Utility 82 Using the User Accounts Option in Control Panel 84 Creating New Users 85 Disabling User Accounts 90 Deleting User Accounts 91 Renaming User Accounts 93 Changing a User’s Password 94 Using Windows Hello, Pictures, and Biometrics 94 Using Device Guard 95 Understanding Credential Guard 98 Configuring Device Health Attestation 99 Managing User Properties 101 Managing User Group Membership 101 Setting Up User Profiles, Logon Scripts, and Home Folders 103 Troubleshooting User Account Authentication 109 Managing and Creating Groups 110 Using Built-In Groups 111 Creating Groups 115 Managing Group Membership 116 Deleting Groups 118 Managing Security Using GPOs and LGPOs 118 Understanding the GPO and LGPO Basics 118 Using the Group Policy Result Tool 120 Managing and Applying LGPOs 121 Configuring Local Security Policies 123 Using Account Policies 124 Using Local Policies 130 Configuring User Account Control 138 Privilege Elevation 138 Registry and File Virtualization 140 Understanding Smart Cards 140 Configuring Remote Management 143 Remote Assistance 143 Remote Desktop 148 Enabling PowerShell Remoting 150 Configuring a VPN Connection 151 Transparent Caching 153 Broadband Tethering 153 Using PowerShell 155 Summary 157 Exam Essentials 157 Video Resources 157 Review Questions 158 Chapter 3 Managing Data 161 Managing File and Folder Security 162 Folder Options 163 Understanding Dynamic Access Control 167 Securing Access to Files and Folders 168 Determining and Viewing Effective Permissions for NTFS 172 Determining NTFS Permissions for Copied or Moved Files 174 Managing Network Access 174 Creating and Managing Shared Folders 175 Configuring Share Permissions 176 Configuring OneDrive 178 Understanding Hardware Security 181 Using BitLocker Drive Encryption 182 Features of BitLocker 183 Windows 7 vs. Windows 10 185 Using the BitLocker Administration and Monitoring Utility 187 Understanding Smart Cards 188 Summary 188 Exam Essentials 189 Video Resources 189 Review Questions 190 Chapter 4 Managing the Windows 10 Environment 193 Managing Windows 194 Manipulating the Desktop Environment 195 Configuring Personalization 204 Using Control Panel 209 Using the Microsoft Management Console 218 Using the System Icon 219 Understanding the Settings Window 222 Using PowerShell 224 Configuring Mobility Options 225 Configuring Offline Files and Synchronization 225 Configuring Power Policies 227 Configuring Windows to Go 233 Managing Windows 10 Services 236 Configuring Internet Browsers 238 Cortana 239 Browser Controls 240 Pinning Sites to the Taskbar 240 Searchable Address Bar 240 Security and Privacy Enhancements 240 Using the Browser’s Compatibility View 240 Using Protected Mode for IE11 241 Using InPrivate Browsing 242 Configuring Windows Internet Explorer 11 Options 243 Summary 247 Exam Essentials 247 Video Resources 248 Review Questions 249 Chapter 5 Configuring Security and Devices 253 Understanding Filesystems 254 Filesystem Selection 255 Filesystem Conversion 257 Configuring NTFS 258 Configuring Hardware 259 Understanding Devices 259 Using Device Manager 261 Installing and Updating Device Drivers 265 Driver Signing 275 Managing I/O Devices 275 Configuring Removable Storage Devices 275 Managing Printers 278 Configuring Windows Defender Firewall 291 Understanding the Windows Defender Firewall Basics 292 Windows Defender Firewall with Advanced Security 292 Summary 297 Exam Essentials 297 Video Resources 298 Review Questions 299 Chapter 6 Configuring Network Connectivity 301 Understanding the Basics 302 Peer-to-Peer Networks 302 On-site Active Directory Networks 304 Cloud-Based Azure Active Directory 306 Other Microsoft Networking Terms and Roles 306 Configuring NIC Devices 309 Configuring a Network Adapter 310 Troubleshooting a Network Adapter 316 Configuring Wireless NIC Devices 316 Configuring Wi-Fi Direct 324 Understanding TCP/IP 326 Benefits and Features of TCP/IP 327 Basics of IP Addressing and Configuration 329 Using IPv6 Addresses 334 Configuring TCP/IP on Windows 10 344 Testing Your IP Configuration 346 Configuring Windows 10 on a Network 348 Summary 350 Exam Essentials 351 Video Resources 351 Review Questions 352 Chapter 7 Configuring Recovery 355 Understanding Recovery 357 Knowing the Startup/Boot Options 358 Starting in Safe Mode 359 Enabling Boot Logging 362 Using Other Startup Setting Options 364 Understanding System Restore 365 Using the System Image Recovery 366 Using the Startup Repair Tool 367 Maintaining Windows 10 with Backup and Restore 368 Creating a Backup 369 Restoring Files from a Backup 370 Recovering Files from OneDrive 371 Using the Wbadmin Command Utility 372 Using Advanced Backup Options 373 Using System Protection 375 Creating Restore Points 376 Restoring Restore Points 376 Cleaning Up Old Restore Points 377 Using the Recycle Bin 377 Monitoring Windows 378 Introducing Performance Monitor 379 Using Other Performance-Monitoring Tools 388 Summary 397 Exam Essentials 398 Video Resources 399 Review Questions 400 Appendix Answer to Review Questions 403 Chapter 1: Windows 10 Installation 404 Chapter 2: Configuring Users 404 Chapter 3: Managing Data 405 Chapter 4: Managing the Windows 10 Environment 406 Chapter 5: Configuring Security and Devices 407 Chapter 6: Configuring Network Connectivity 408 Chapter 7: Configuring Recovery 409 Index 411
£37.50
John Wiley & Sons Inc CCSP For Dummies with Online Practice
Book SynopsisSecure your CSSP certification CCSP is the world's leading Cloud Security certification. It covers the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures. If you're a cloud security professional seeking your CSSP certification, this book is a perfect way to prepare for the exam. Covering in detail all six domains, the expert advice in this book gives you key information you'll need to pass the exam. In addition to the information covered on the exam, you'll get tips on setting up a study plan, tips for exam day, and access to an online test bank of questions. Key information for all six exam domainsTest -taking and exam day tips and tricksFree online practice questions and flashcardsCoverage of the core concepts From getting familiar with the core concepts to establishing a study plan, this book is all you need to hang your hat on that certification!Table of ContentsIntroduction 1 Part 1: Starting Your CCSP Journey 7 Chapter 1: Familiarizing Yourself with (ISC) 2 and the CCSP Certification 9 Chapter 2: Identifying Information Security Fundamentals 25 Part 2: Exploring the CCSP Certification Domains 41 Chapter 3: Domain 1: Cloud Concepts, Architecture and Design 43 Chapter 4: Domain 2: Cloud Data Security 91 Chapter 5: Domain 3: Cloud Platform and Infrastructure Security 129 Chapter 6: Domain 4: Cloud Application Security 173 Chapter 7: Domain 5: Cloud Security Operations 213 Chapter 8: Domain 6: Legal, Risk and Compliance 253 Part 3: The Part of Tens 295 Chapter 9: Ten (or So) Tips to Help You Prepare for the CCSP Exam 297 Chapter 10: Ten Keys to Success on Exam Day 303 Part 4: Appendixes 307 Appendix A: Glossary 309 Appendix B: Helpful Resources 329 Index 333
£33.29
John Wiley & Sons Inc LPI Linux Essentials Study Guide
Book SynopsisTable of ContentsIntroduction xix Assessment Test xxix Chapter 1 Selecting an Operating System 1 What is an OS? 2 What is a Kernel? 2 What Else Identifies an OS? 3 Investigating User Interfaces 4 Using a Text-Mode User Interface 5 Using a Graphical User Interface 7 Where Does Linux Fit in the OS World? 9 Comparing Linux to Unix 9 Comparing Linux to macOS 11 Comparing Linux to Windows 12 What is a Distribution? 14 Creating a Complete Linux-Based OS 14 A Summary of Common Linux Distributions 15 Understanding Release Cycles 17 Embedded Linux Systems 18 Linux in the Cloud 19 What is Cloud Computing? 19 What Are the Cloud Services? 21 Summary 23 Exam Essentials 23 Review Questions 25 Chapter 2 Understanding Software Licensing 27 Investigating Software Licenses 28 Exploring Copyright Protection and Software 28 Using Licenses to Modify Copyright Terms 30 Looking at the Free Software Foundation 31 Understanding the FSF Philosophy 31 Examining Free Software and the GPL 32 Looking at the Open Source Initiative 33 Understanding the Open Source Philosophy 33 Defining Open Source Software 35 Looking at the Creative Commons 36 Using Open Source Licenses 36 Understanding Open Source Licenses 36 Understanding Open Source Business Models 38 Summary 39 Exam Essentials 40 Review Questions 41 Chapter 3 Investigating Linux’s Principles and Philosophy 43 Linux Through the Ages 44 Understanding Linux’s Origins 44 Seeing Today’s Linux World 47 Using Open Source Software 47 Understanding Basic Open Source Principles 47 Linux as a Software Integrator 49 Understanding OS Roles 50 Looking At Embedded Computers 50 Exploring Desktop and Laptop Computers 51 Investigating Server Computers 52 Summary 53 Exam Essentials 53 Review Questions 55 Chapter 4 Using Common Linux Programs 57 Using a Linux Desktop Environment 58 Choosing a Desktop Environment 58 Launching Programs 61 Using a File Manager 63 Working with Productivity Software 66 Finding the Right Tool for the Job 66 Using a Web Browser 67 Using Email Clients 68 Using Office Tools 68 Using Multimedia Applications 69 Using Linux for Cloud Computing 70 Using Mobile Applications 71 Using Server Programs 72 Identifying Common Server Protocols and Programs 72 Focusing on Web Servers 76 Installing and Launching Servers 76 Securing Servers 77 Managing Programming Languages 78 Choosing a Compiled vs. an Interpreted Language 78 Identifying Common Programming Languages 79 Handling Software Packages 81 Understanding Software Packages 81 Identifying Common Package Tools 81 Summary 82 Exam Essentials 83 Review Questions 84 Chapter 5 Getting to Know the Command Line 87 Starting a Command Line 88 Launching a Terminal 88 Logging into a Text-Mode Console 91 Running Programs 92 Understanding Text-Mode Program Syntax 93 Running Text-Mode Programs 94 Running GUI Programs 95 Running Programs in the Background 96 Using Shell Features 97 Using Command Completion 97 Using Command History 98 Getting Help Using Man Pages 99 Understanding the Purpose of Man Pages 100 Locating Man Pages by Section Number 100 Searching for a Man Page 102 Reading Man Pages 102 Using less 104 Getting Help Using Info Pages 106 Understanding the Purpose of Info Pages 106 Reading Info Pages 107 Finding Additional Documentation 109 Locating Program Documentation on Your Computer 109 Locating Program Documentation Online 112 Consulting Experts 112 Summary 114 Exam Essentials 114 Review Questions 116 Chapter 6 Managing Hardware 119 Learning About Your CPU 120 Understanding CPU Families 120 Identifying Your CPU 123 Identifying Motherboard Capabilities 123 Sizing Your Power Supply 125 Understanding Disk Issues 125 Disk Interfaces 126 Partitioning a Disk 127 Understanding Filesystem Issues 130 Using Removable and Optical Disks 133 Managing Displays 134 Understanding the Role of X 134 Using Common Display Hardware 136 Handling USB Devices 137 Managing Drivers 138 Understanding Types of Drivers 138 Locating and Installing Drivers 139 Summary 140 Exam Essentials 140 Review Questions 141 Chapter 7 Managing Files 143 Understanding Where Things Go 144 User Files vs. System Files 144 The Filesystem Hierarchy Standard 146 Important Directories and Their Contents 147 Exploring Files and Directories 149 Obtaining File Listings 149 Changing Directories 151 Using Absolute and Relative File References 152 Manipulating Files 154 Creating Files 154 Copying Files 155 Moving and Renaming Files 157 Using Links 157 Deleting Files 159 Using Wildcards 160 Understanding Case Sensitivity 160 Manipulating Directories 161 Creating Directories 161 Deleting Directories 162 Managing Directories 163 Summary 164 Exam Essentials 164 Review Questions 165 Chapter 8 Searching, Extracting, and Archiving Data 167 Using Regular Expressions 168 Searching For and Extracting Data 170 Using grep 170 Using find 172 Using wc 174 Using cut 175 Using sort 176 Using cat 177 Redirecting Input and Output 178 Using Basic Redirection Operators 178 Using Pipes 181 Generating Command Lines 182 Archiving Data 183 Using tar 183 Using Compression 187 Using zip 188 Summary 191 Exam Essentials 191 Review Questions 193 Chapter 9 Exploring Processes and Process Data 195 Understanding Package Management 196 Linux Package Management Principles 196 Understanding Package Systems 197 Managing Red Hat Systems 199 Managing Debian Systems 200 Understanding the Process Hierarchy 202 Identifying Running Processes 203 Using ps to Identify Processes 203 Using top to Identify Processes 205 Measuring Memory Use 207 Using Log Files 208 Locating Log Files 209 Producing More Verbose Log File Entries 210 Examining the Kernel Ring Buffer 211 Summary 211 Exam Essentials 212 Review Questions 213 Chapter 10 Editing Files 215 Understanding the Role of Text Files 216 Choosing an Editor 218 Editing Files with nano 219 Using Text Editor Conventions 221 Exploring Basic nano Text-Editing Procedures 221 Saving Your Changes from nano 223 Editing Files with vi 224 Understanding vi Modes 224 Exploring Basic vi Text-Editing Procedures 226 Saving Your Changes from vi 229 Summary 230 Exam Essentials 230 Review Questions 231 Chapter 11 Creating Scripts 233 Beginning a Shell Script 234 Using Commands 235 Using Arguments 237 Using Variables 238 Using Conditional Expressions 241 Using Loops 243 Using Functions 244 Setting the Script’s Exit Value 245 Summary 246 Exam Essentials 246 Review Questions 248 Chapter 12 Understanding Basic Security 251 Understanding Accounts 252 Understanding Account Features 253 Identifying Accounts 256 Understanding Groups 258 Using Account Tools 259 Discovering Your Own Identity 260 Learning Who’s Online 261 Working as root 263 Understanding User Types 263 Acquiring root Privileges 264 Using root Privileges Safely 266 Summary 268 Exam Essentials 268 Review Questions 270 Chapter 13 Creating Users and Groups 273 Creating New Accounts 274 Deciding on a Group Strategy 274 Selecting a Good Password 275 Creating Accounts Using GUI Tools 278 Creating Accounts from the Shell 280 Modifying Accounts 283 Deciding When to Modify Accounts 283 Checking for Logged-in Users 283 Modifying Accounts Using GUI Tools 284 Modifying Accounts from the Shell 286 Deleting Accounts 289 Avoiding Account Deletion Pitfalls 289 Deleting Accounts Using GUI Tools 290 Deleting Accounts from the Shell 291 Managing Groups 291 Managing Groups Using GUI Tools 291 Managing Groups from the Shell 294 Summary 295 Exam Essentials 295 Review Questions 297 Chapter 14 Setting Ownership and Permissions 299 Setting Ownership 300 Understanding Ownership 300 Setting Ownership in a File Manager 301 Setting Ownership in a Shell 302 Setting Permissions 304 Understanding Permissions 304 Setting Permissions in a File Manager 308 Setting Permissions in a Shell 309 Setting the umask 310 Using Special Permission Bits and File Features 310 Using Sticky Bits 311 Using Special Execute Permissions 313 Hiding Files from View 314 Viewing Directories 315 Summary 315 Exam Essentials 315 Review Questions 317 Chapter 15 Managing Network Connections 319 Configuring Network Features 320 Graphical Tools 321 Command-Line Tools 323 Basic Network Troubleshooting 329 Sending Test Packets 330 Finding Host Information 331 Advanced Network Troubleshooting 333 The netstat Command 334 Examining Sockets 337 Summary 337 Exam Essentials 338 Review Questions 339 Appendix A Answers to Review Questions 341 Chapter 1: Selecting an Operating System 342 Chapter 2: Understanding Software Licensing 343 Chapter 3: Investigating Linux’s Principles and Philosophy 344 Chapter 4: Using Common Linux Programs 346 Chapter 5: Getting to Know the Command Line 347 Chapter 6: Managing Hardware 348 Chapter 7: Managing Files 349 Chapter 8: Searching, Extracting, and Archiving Data 351 Chapter 9: Exploring Processes and Process Data 352 Chapter 10: Editing Files 353 Chapter 11: Creating Scripts 354 Chapter 12: Understanding Basic Security 356 Chapter 13: Creating Users and Groups 357 Chapter 14: Setting Ownership and Permissions 358 Chapter 15: Managing Network Connections 359 Appendix B Setting Up a Linux Environment 363 Index 365
£28.49
John Wiley & Sons Inc AWS Certified Security Study Guide
Book SynopsisGet prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guTable of ContentsProlog 9 1. Einleitung 15 Veränderung 17 Innovationsfähigkeit: Ohne Druck keine Bewegung 23 Vier historische technische Revolutionen und ihrWeg zur Akzeptanz innerhalb der Gesellschaft 28 Rückkehr zum eigenständigen, selbstermächtigten Menschen 31 Mitarbeitende werden immer essenzieller 33 Wissen verdoppelt sich, wenn man es teilt 35 2. Mit Netzwerkführung in die Zukunft 39 Unternehmerische Voraussetzungen für das Gelingen von Netzwerken 42 Führen in Netzwerken 48 Unternehmensnetzwerke 52 Inoffizielle Netzwerke 53 Unternehmensinterne Netzwerke 54 Unternehmensexterne Netzwerke 62 3. Was hat ein Perückenmacher mit strategischer Netzwerkführung zu tun? 67 Hierarchie und Eigenverantwortung 68 Der Purpose geht uns alle an 87 Serendipität 125 Innovative Vernetzungsformate 134 Mut zur Lücke 163 4. Wie kann aktiv aus Trends und Krisen gelernt werden? 167 Wie können Vorbehalte abgebaut werden? 171 Beispiel Corona – die Krise aktiv nutzen 172 Krisen nutzen, um Gewohnheiten zu ändern 175 5. Weiterbildung und Personalentwicklung als Beitrag zur Vernetzung 183 Disruption 1.0 derWeiterbildung 187 Die neue Rolle der Personalentwicklung 191 Mit dem TEAK®-Konfigurator auf Erfolgskurs 203 Was ist Ihr Beitrag? 236 6. Die unaufhaltsame Dynamik des Netzwerkes am Beispiel der Group Schumacher GmbH 239 7. Die neue Perspektive der Zukunft – Nachwort 249 Danksagung 253 Die Autorin 257 Literaturverzeichnis 259 Stichwortverzeichnis 269
£47.50
John Wiley & Sons Inc PMP Project Management Professional Exam Study
Book SynopsisPrepare for PMP certification exam success with this fully updated and comprehensive study guide This study guide serves as a comprehensive resource for those who plan on taking the Project Management Professional (PMP) certification exam administered by PMI. The book helps you prepare for the exam, and it will continue to serve project managers as an on-the-job reference book. The PMP Project Management Professional Exam Study Guide, Tenth Edition is fully updated to include recent changes to the exam. New content covers the integral role that Agile and other iterative practices have in project management. Updates also address the pivotal responsibilities of the project manager and the skill sets required for this position. The study guide was written to reflect the Project Management Process and Procedures found in the revisedA Guide to the Project Management Body of Knowledge -- PMBOK Guide, 6th Edition. Well-known author and expert Kim Heldman, PMP, helps to prepare you for the exam with in-depth coverage of topics, concepts, and key terms. Learn more about the three main domain areas of people, process, and business environment, plus the predictive, agile, and hybrid approaches to project management.This guide is an effective learning aid that will take your understanding to the next level. Provides comprehensive material, covering the complete exam outlineLists chapter objectives and offers detailed discussions of these objectivesReflects differences in project management environments and approachesEffectively presents real world scenarios, project application sidebars, and chapter review questions You'll also connect to a beneficial, on-the-go resource: an interactive online learning environment and test bank. This environment includes anassessment test, chapter tests, practice exams, electronic flashcards, and a glossary of key terms. A thorough review is the best prep for a challenging certification exam. So, get ready with this essential PMP study guide.Table of ContentsIntroduction xix Assessment Test xxix Answers to Assessment Test xlix Chapter 1 Building the Foundation 1 Establishing the Foundation 3 Projects vs. Operations 4 Project Characteristics 6 What Is Project Management? 7 Programs 8 Portfolios 8 Organizational Project Management 11 Project Management Offices 11 Understanding How Projects Come About 13 Needs and Demands and Other Factors That Lead to Project Creation 14 Skills Every Good Project Manager Needs 17 Technical Project Management Skills 18 Business Management and Strategic Skills 18 Communication Skills 19 Organizational and Planning Skills 19 Conflict Management Skills 20 Negotiation and Influencing Skills 20 Leadership Skills 21 Team-Building and Motivating Skills 21 Role of a Project Manager 22 Understanding Project Management Process Groups 22 Determining a Project Methodology or Approach 28 Life Cycle Categories 29 Predictive Life Cycle Methodology 30 Agile Methodologies 33 Hybrid 38 Project Life Cycles 38 Understanding How This Applies to Your Next Project 39 Summary 40 Exam Essentials 41 Review Questions 43 Chapter 2 Assessing Project Needs 49 Exploring the Project Management Knowledge Areas 51 Project Integration Management 53 Project Scope Management 56 Project Schedule Management 57 Project Cost Management 58 Project Quality Management 59 Project Resource Management 59 Project Communications Management 60 Project Risk Management 62 Project Procurement Management 62 Project Stakeholder Management 63 Assessing Project Viability 64 Using Project Selection Methods 65 Assessing Project Needs and Creating the Project Charter 73 Enterprise Environmental Factors 78 Organizational Process Assets 78 Tools and Techniques 81 Formalizing and Publishing the Project Charter 82 Pulling the Project Charter Together 83 Key Stakeholders 84 Project Charter Sign-Off 87 Maintaining Project Artifacts 88 Introducing the Kitchen Heaven Project Case Study 89 Understanding How This Applies to Your Next Project 93 Summary 94 Exam Essentials 96 Review Questions 98 Chapter 3 Delivering Business Value 103 Understanding Organizational Structures 106 Functional Organizations 108 Project-Oriented Organizations 112 Matrix Organizations 114 Other Organizational Structures 118 Pmo 118 PMO in an Agile Environment 119 Project-Based Organizations 121 Influences of Organizational Structure on Agile Methodologies 122 Identifying Stakeholders 123 Discovering Stakeholders 124 Stakeholder Analysis 126 Categorizing Stakeholders 127 Stakeholder Register 134 Stakeholders on an Agile Project 135 Six Sigma Adaptive Methodology 137 Delivering Business Value 140 Business Value Network 142 Assessing Business Value 143 Delivering Business Value Incrementally 145 Examining Business Value 147 Subdividing Project Tasks 148 Understanding How This Applies to Your Next Project 151 Summary 152 Exam Essentials 153 Review Questions 155 Chapter 4 Developing the Project Scope 161 Developing the Project Management Plan 164 Project Complexity 168 Data Gathering and Interpersonal Skills 168 Documenting the Project Management Plan 169 Documenting the Project Management Plan Using a Predictive Methodology 172 Plan Scope Management 173 Alternatives Analysis 175 Documenting the Scope Management Plan 177 Documenting the Requirements Management Plan 178 Collecting Requirements 178 Gathering Documents for the Collect Requirements Process 180 Gathering and Documenting Requirements 185 Finalizing Requirements 189 Defining Scope 192 Writing the Project Scope Statement 194 Managing the Product Backlog 199 Creating the Work Breakdown Structure 201 Decomposing the Deliverables 202 Constructing the WBS 203 Backlog 211 Finalizing the WBS 212 Understanding How This Applies to Your Next Project 216 Summary 218 Exam Essentials 219 Review Questions 221 Chapter 5 Creating the Project Schedule 229 Creating the Schedule Management Plan 232 Defining Activities 233 Creating the Activity List 234 Breaking Down User Stories 235 Understanding the Sequence Activities Process 237 Precedence Diagramming and Leads and Lags 238 Project Management Information System 243 Project Schedule Network Diagrams 243 Estimating Activity Resources 244 How to Estimate Activity Resources 245 Documenting Resource Requirements 246 Estimating Resources in an Adaptive Methodology 247 Estimating Activity Durations 247 Project Calendars and Other Considerations 248 Estimating Techniques 249 Duration Estimates 253 Estimating Activity Durations Using Adaptive Methodologies 255 Developing the Project Schedule 257 Gather Documents to Assist in Developing the Schedule 257 Developing the Project Schedule 258 Project Schedule and the Schedule Baseline 272 Using a Kanban Board and Scrum Board 277 Scrum Board 279 Combining Techniques 280 Agile Release Planning 281 Applying Process Groups in an Agile Approach 281 Understanding How This Applies to Your Next Project 286 Summary 287 Exam Essentials 289 Review Questions 291 Chapter 6 Developing the Project Budget and Engaging Stakeholders 297 Creating the Cost Management Plan 300 Performing Plan Cost Management 301 Creating the Cost Management Plan 302 Estimating Costs 303 Estimating Techniques 307 Estimating Costs for an Agile Project 308 Creating the Cost Estimates 309 Establishing the Cost Baseline 311 Techniques for Developing the Project Budget 313 Developing the Cost Baseline 314 Understanding Stakeholders 318 Analyzing Stakeholders 319 Stakeholder Engagement Plan 320 Mentoring Stakeholders 321 Engaging Stakeholders in an Adaptive Methodology 322 Communicating the Plan 323 Planning Communications 324 Determining Communication Needs 325 Documenting the Communications Management Plan 331 Communicating on an Agile Team 333 A Closer Look at Adaptive Methodologies 335 Other Methodologies 340 Combining Methodologies 345 Understanding How This Applies to Your Next Project 348 Summary 349 Exam Essentials 351 Review Questions 353 Chapter 7 Identifying Project Risks 359 Understanding Risk 361 Creating the Risk Management Plan 362 Risk Attitude 363 Conducting Risk Meetings 364 Documenting the Risk Management Plan 366 Identifying Potential Risks 372 Data Gathering and Data Analysis Techniques for Identifying Risks 374 Documenting the Risk Register 378 Identifying Risks Using an Agile Approach 380 Analyzing Risks Using Qualitative Techniques 381 Performing Qualitative Risk Analysis 382 Ranking Risks in the Risk Register 390 Quantifying Risk 391 Performing Quantitative Risk Analysis 392 Updating the Risk Report 397 Developing a Risk Response Plan 398 Strategies for Creating Risk Responses 399 Documenting the Risk Responses Plan 404 Assessing Risks Using an Agile Approach 407 Planning for Project Compliance 409 Understanding How This Applies to Your Next Project 413 Summary 414 Exam Essentials 415 Review Questions 417 Chapter 8 Planning and Procuring Resources 423 Procurement Planning 425 Gathering Documents for the Procurement Management Plan 427 Source Selection Criteria 433 Procurement Management Plan 435 Procurements in an Agile Environment 442 Developing the Resource Management Plan 445 Understanding Enterprise Environmental Factors 446 Using Data Representation Techniques for Plan Resource Management 448 Documenting the Resource Management Plan 451 Resources on an Agile Project 455 Quality Planning 456 Preparing for Quality 457 Developing the Quality Management Plan 458 Documenting the Quality Management Plan 466 Quality Planning for Agile Projects 468 Project Planning Using Agile Methodologies 469 Bringing It All Together 470 Choosing a Life Cycle Methodology 473 Understanding How This Applies to Your Next Project 480 Summary 481 Exam Essentials 482 Review Questions 485 Chapter 9 Developing the Project Team 491 Directing and Managing Project Work 494 Direct and Manage Project Work Inputs 496 Project Management Information System 499 Deliverables and Work Performance Data 499 Directing Project Work on Agile Projects 504 Executing Practices for Delivering Project Work 508 Acquiring the Project Team and Project Resources 510 The Resource Management Plan 510 Techniques for Acquiring Resources 511 Project Team Assignments 515 Developing the Project Team 517 Generational Diversity 518 Tools and Techniques to Develop the Team 520 Developing Agile Teams 536 Team Performance Assessments 539 Managing Project Teams 543 Emotional Intelligence and Other Tools for Managing Teams 543 Lessons Learned Managing Teams 545 Understanding How This Applies to Your Next Project 547 Summary 548 Exam Essentials 550 Review Questions 552 Chapter 10 Sharing Information 559 Implementing Risk Responses 563 Conducting Procurements 563 Evaluating Proposals 564 Creating Procurement Agreements 571 Conducting Procurements on Agile Projects 573 Laying Out Quality Assurance Procedures 574 Managing Quality with Data and Audits 575 Quality Reports and Test and Evaluation Documents 580 Conducting Quality Assessments on an Agile Project 581 Managing Project Knowledge 582 Knowledge Management 583 Information Management 583 Managing Project Artifacts 583 Managing Project Information 584 Communication and Conflict Resolution Skills 585 Project Communications and Elements of Communicating 594 Communicating on Agile Projects 596 Managing Stakeholder Engagement 597 Observing and Conversing 598 Agile Frameworks 599 Agile Methodologies or Frameworks 600 Scaling Frameworks 601 Understanding How This Applies to Your Next Project 606 Summary 607 Exam Essentials 608 Review Questions 611 Chapter 11 Measuring and Controlling Project Performance 619 Monitoring and Controlling Project Work 624 Forecasting Methods 625 Work Performance Reports 626 Controlling Procurements 627 Procurement Documents and Approved Change Requests 629 Monitoring Vendor Performance 631 Closing Out Procurements 632 Monitoring Communications 636 Documents to Help Monitor Communications 637 Monitoring Communications with Meetings 637 Work Performance Information 639 Performing Integrated Change Control 642 How Change Occurs 643 Change Control Concerns 644 Configuration Control 645 Change Control System 646 Approved Change Requests 650 Changes in the Business Environment 651 Monitoring Stakeholder Engagement 654 Controlling Resources 654 Utilizing Control Quality Techniques 655 Control Quality Tools and Techniques 656 Verifying Deliverables 664 Monitoring and Controlling Risk 664 Monitor Risks Analysis and Meetings 666 Monitor Risks Updates 667 Monitoring Project Management Integrations 668 Understanding How This Applies to Your Next Project 671 Summary 672 Exam Essentials 674 Review Questions 676 Chapter 12 Controlling Work Results and Closing Out the Project 683 Controlling Cost Changes 686 Earned Value Analysis 687 Variance Analysis 689 Trend Analysis 692 To-Complete Performance Index 697 Earned Value Measures on Agile Projects 700 Monitoring and Controlling Schedule Changes 702 Burndown and Burnup Charts 703 Performance Reviews 705 Changes to the Schedule 706 Validating Project Scope 707 Controlling Scope 708 Measuring Work Results on Agile Projects 710 Formulating Project Closeout 713 Characteristics of Closing 713 Project Endings 714 Closing Out the Project 717 Administrative Closure Procedures 718 Regression Analysis 719 Close Project or Phase Final Report 719 Closing Out the Procurements 723 Closing Out an Agile Project 724 Celebrate! 725 Releasing Project Team Members 725 Balancing Stakeholders’ Interests at Project Close 725 Competing Needs 726 Dealing with Issues and Problems 727 Balancing Constraints 727 Professional Responsibility 727 Responsibility 728 Respect 731 Fairness 734 Honesty 737 Role Delineation Study 739 Applying Professional Knowledge 739 Project Management Knowledge 740 Education Providers 740 Industry Knowledge 740 Understanding How This Applies to Your Next Project 746 Summary 748 Exam Essentials 750 Review Questions 752 Appendices 757 Appendix A Answers to Review Questions 759 Chapter 1: Building the Foundation 760 Chapter 2: Assessing Project Needs 761 Chapter 3: Delivering Business Value 763 Chapter 4: Developing the Project Scope 765 Chapter 5: Creating the Project Schedule 767 Chapter 6: Developing the Project Budget and Engaging Stakeholders 768 Chapter 7: Identifying Project Risks 770 Chapter 8: Planning and Procuring Resources 771 Chapter 9: Developing the Project Team 773 Chapter 10: Sharing Information 775 Chapter 11: Measuring and Controlling Project Performance 776 Chapter 12: Controlling Work Results and Closing Out the Project 778 Appendix B Process Inputs and Outputs 781 Initiating Processes 782 Planning Processes 784 Executing Processes 807 Monitoring and Controlling Processes 821 Closing Processes 836 Index 839
£43.12
John Wiley & Sons Inc MCA Microsoft Certified Associate Azure
Book SynopsisTable of ContentsIntroduction xxiii Assessment Test xxx Chapter 1 Identity: Azure Active Directory 1 Azure Active Directory 2 Benefits 2 Concepts 4 Azure AD vs. Active Directory Domain Services 4 Azure AD: Licensing 5 Custom Domains in Azure AD 7 Users and Groups 8 User Accounts 8 Group Accounts 26 Azure AD Roles 36 Azure AD Join 37 Benefits 37 Connection Options 38 Self- Service Password Reset 39 Enabling SSPR 39 Authentication Methods 40 Managing Multiple Directories 42 Summary 43 Exam Essentials 44 Review Questions 45 Chapter 2 Compliance and Cloud Governance 49 Azure Regions 50 Facts 51 Regional Pairs 52 Azure Accounts and Subscriptions 53 Azure Accounts 54 Azure Subscriptions 54 Azure Cost Management 57 Plan and Control Expenses 58 Cost Saving Techniques 59 Resource Groups 60 Management Groups 65 Azure Policy 68 Implementing Azure Policy 69 Implementing Initiatives 77 Role- Based Access Control 79 Concepts 80 Azure RBAC Roles 82 Custom RBAC Roles 84 Role Assignment 91 Resource Locks 95 Configuring Locks 97 Resource Tags 99 Use Cases 99 Applying Tags 100 Summary 102 Exam Essentials 102 Review Questions 104 Chapter 3 Virtual Networking 109 Virtual Networks 110 VNet Concepts 111 Address Space 111 Subnets 111 Regions 111 Subscription 112 IP Addressing 113 Static and Dynamic Addressing 113 Private IP Addresses 113 Public IP Address 116 Network Routes 118 System Routes 119 User- Defined Routes 119 Service Endpoints 125 Supported Services 127 Private Endpoint 127 Azure DNS 129 Record Management 131 Private DNS Zones 133 Network Security Groups 137 NSG Concepts 137 NSG Effective Rules 141 Azure Firewall 142 Azure Firewall Rules 142 Implementing Azure Firewall 144 Summary 145 Exam Essentials 146 Review Questions 148 Chapter 4 Intersite Connectivity 153 Azure-to-Azure Connectivity 154 Internet 155 Virtual Network Peering 156 VPN Gateway 165 Virtual Network Peering vs. VPN Gateway 177 Azure to On- Premises Connectivity 178 VPN Gateways 178 ExpressRoute Connections 189 Intersite Connectivity Architecture 193 Virtual WAN 196 Summary 197 Exam Essentials 198 Review Questions 199 Chapter 5 Network Traffic Management 203 Availability Options 204 Availability Sets 205 Availability Zones 207 Service Level Agreement 208 Azure Load Balancer 208 Types of Load Balancers 209 Load Balancer SKUs 212 Configuring Load Balancer 212 Implementing Azure Load Balancer 214 Azure Application Gateway 221 Request Handling Process 222 Routing Methods 223 Configuring Application Gateway 224 Implementing Application Gateway 226 Azure Front Door 235 Azure Traffic Manager 237 Comparing the Load Balancing Solutions 239 Summary 239 Exam Essentials 240 Review Questions 241 Chapter 6 Azure Storage 245 Azure Storage Account 246 Azure Storage Services 247 Azure Blob Storage 247 Azure Files 248 Azure Queues 249 Azure Tables 249 Azure Disks 249 Storage Replication 250 Locally Redundant Storage 250 Zone Redundant Storage 251 Georedundant Storage 252 Geo-zone-Redundant Storage 253 Storage Account Types 255 Storage Account Endpoints 256 Accessing Storage 256 Custom Domain Configuration 256 Securing Storage Endpoints 257 Azure Blob Storage 258 Blob Containers 259 Blob Access Tiers 259 Blob Lifecycle Management 260 Uploading Blobs 261 Storage Security 268 Authorization Options 268 Shared Access Signatures 269 Storage Service Encryption 275 Azure Files and File Sync 276 Azure Files vs. Azure Blobs 276 Managing File Shares 277 Mapping File Shares 279 File Share Snapshots 282 Azure File Sync 285 Managing Storage 288 Azure Storage Explorer 289 AzCopy 291 Import/Export Service 297 Summary 299 Exam Essentials 300 Review Questions 302 Chapter 7 Azure Virtual Machines 307 Virtual Machine Planning 309 Virtual Network 309 Name 309 Location and Pricing 310 Size 311 Storage 312 Operating System 315 Deploying Virtual Machines 315 Connecting to Virtual Machines 320 Windows Connections 320 Linux Connections 324 Azure Bastion 329 Availability of Virtual Machines 334 Scaling Concepts 335 Vertical Scaling 335 Horizontal Scaling 336 Virtual Machine Scale Sets 336 Implementing a Scale Set 337 Autoscaling 340 Summary 342 Exam Essentials 342 Review Questions 343 Chapter 8 Automation, Deployment, and Configuration of Resources 349 Azure Resource Manager 350 ARM Templates 352 Template Design 352 Template Modes 354 Template Sections 355 Composing Templates 361 Exporting Templates 370 Configuring Virtual Hard Disk Templates 374 Create a VM from a VHD 375 Virtual Machine Extensions 376 Custom Script Extension 378 Desired State Configuration 379 Summary 380 Exam Essentials 381 Review Questions 382 Chapter 9 PaaS Compute Options 387 Azure App Service Plans 388 Pricing Tiers 389 Scaling 391 Azure App Services 396 Continuous Deployment 400 Deployment Slots 402 Securing App Service 405 Custom Domains 408 Backup 409 Container Instances 411 Docker 412 Azure Container Instances 415 Container Groups 421 Azure Kubernetes Service 422 Terminology 424 Cluster Components 425 Networking 426 Storage 429 Cluster Upgrade 431 Scaling 432 Summary 438 Exam Essentials 439 Review Questions 440 Chapter 10 Data Protection 445 File and Folder Backups 446 Azure Backup 446 Creating Recovery Services Vault 447 Configuring a Recovery Services Vault 448 Virtual Machine Data Protection 451 Virtual Machine Snapshots 452 Azure Backup 453 Azure Backup Server 463 Azure Site Recovery 466 Summary 469 Exam Essentials 470 Review Questions 471 Chapter 11 Monitoring Resources 475 Azure Monitor 476 Metrics 477 Logs 478 Data Sources 479 Activity Log 480 Azure Alerts 482 Creating Alert Rules 483 Alert States 484 Action Groups 484 Log Analytics 492 Workspace 493 Data Sources 493 Agents Configuration 496 Query Language 497 Network Watcher 502 IP Flow Verify 503 Next Hop 503 Effective Security Rules 505 VPN Troubleshoot 505 Packet Capture 506 Connection Troubleshoot 506 NSG Flow Logs 507 Topology 509 Summary 509 Exam Essentials 510 Review Questions 511 Appendix Answers to the Review Questions 515 Chapter 1: Identity: Azure Active Directory 516 Chapter 2: Compliance and Cloud Governance 517 Chapter 3: Virtual Networking 519 Chapter 4: Intersite Connectivity 520 Chapter 5: Network Traffic Management 521 Chapter 6: Azure Storage 522 Chapter 7: Azure Virtual Machines 524 Chapter 8: Automation, Deployment, and Configuration of Resources 526 Chapter 9: PaaS Compute Options 528 Chapter 10: Data Protection 529 Chapter 11: Monitoring Resources 530 Index 533
£38.00
John Wiley & Sons Inc MCA Microsoft Office Specialist Office 365 and
Book SynopsisTable of ContentsIntroduction xv Assessment Test xix Chapter 1 Managing Worksheets and Workbooks 1 Importing Data into Workbooks 2 Bringing in Data from TXT Files 3 Importing Data from CSV Files 4 Navigating Within Workbooks 8 Searching for Data Within a Workbook 8 Navigating to Named Cells, Ranges, or Workbook Elements 10 Inserting and Removing Hyperlinks 12 Formatting Worksheets and Workbooks 20 Modifying Page Settings 20 Adjusting Row Height and Column Width 22 Customizing Headers and Footers 30 Customizing Options and Views 36 Customizing the Quick Access Toolbar 37 Displaying and Modifying Workbook Content in Different Views 41 Freezing Worksheet Rows and Columns 44 Changing Window Views 46 Modifying Basic Workbook Properties 48 Displaying Formulas 49 Configuring Content for Collaboration 52 Setting a Print Area 52 Saving Workbooks in Other File Formats 54 Configuring Print Settings 54 Inspecting Workbooks for Issues 55 Summary 59 Key Terms 59 Exam Essentials 59 Review Questions 61 Chapter 2 Using Data Cells and Ranges 63 Manipulating Data in Worksheets 64 Pasting Data by Using Special Paste Options 64 Filling Cells by Using Auto Filling 68 Inserting and Deleting Multiple Columns or Rows 70 Adding and Removing Cells 72 Formatting Cells and Ranges 75 Merging and Unmerging Cells 75 Modifying Cell Alignment, Orientation, and Indentation 76 Formatting Cells by Using Format Painter 79 Wrapping Text Within Cells 80 Using Number Formatting 82 Applying Cell Formatting from the Format Cells Dialog Box 83 Working with Cell Styles 84 Clearing Cell Formatting 86 Defining and Referencing Named Ranges 88 Defining a Named Range 88 Naming a Table 93 Summarizing Data Visually 95 Inserting Sparklines 95 Applying Built-In Conditional Formatting 99 Removing Conditional Formatting 101 Summary 105 Key Terms 105 Exam Essentials 105 Review Questions 107 Chapter 3 Working with Tables and Table Data 109 Creating and Formatting Tables 110 Creating Excel Tables from Cell Ranges 110 Applying Table Styles 112 Converting Tables to Cell Ranges 113 Modifying Tables 115 Adding or Remove Table Rows and Columns 115 Configuring Table Style Options 118 Inserting and Configuring Total Rows 119 Filtering and Sorting Table Data 122 Filtering Records 122 Sorting Data by Multiple Columns 126 Summary 128 Key Terms 129 Exam Essentials 129 Review Questions 130 Chapter 4 Performing Operations by Using Formulas and Functions 133 Inserting References 134 Inserting Relative, Absolute, and Mixed References 135 Referencing Named Ranges and Named Tables in Formulas 137 Calculating and Transforming Datas 140 Performing Calculations Using the AVERAGE(), MAX(), MIN(), and SUM() Functions 140 Perform Conditional Operations by Using the IF() Function 151 Formatting and Modifying Text 155 Formatting Text Using the RIGHT(), LEFT(), and MID() Functions 155 Formatting Text Using the UPPER(), LOWER(), and LEN() Functions 159 Formatting Text Using the CONCAT() and TEXTJOIN() Functions 163 Summary 166 Key Terms 167 Exam Essentials 167 Review Questions 168 Chapter 5 Managing Charts 171 Creating Charts 172 Building Charts 172 Working with Chart Sheets 174 Modifying Charts 178 Adding Data Series to Charts 178 Switching Between Rows and Columns in Source Data 181 Adding and Modifying Chart Elements 182 Formatting Charts 185 Using Chart Layouts 186 Applying Chart Styles 194 Adding Alternative Text to Charts for Accessibility 196 Summary 198 Key Terms 198 Exam Essentials 199 Review Questions 200 Appendix: Answers to Review Questions 203 Chapter 1: Managing Worksheets and Workbooks 204 Chapter 2: Using Data Cells and Ranges 204 Chapter 3: Working with Tables and Table Data 205 Chapter 4: Performing Operations by Using Formulas and Functions 206 Chapter 5: Managing Charts 206 Index 209
£16.14
John Wiley & Sons Inc ISC2 CISSP Certified Information Systems Securit
Book SynopsisTable of ContentsIntroduction xxxvii Assessment Test lix Chapter 1 Security Governance Through Principles and Policies 1 Security 101 3 Understand and Apply Security Concepts 4 Confidentiality 5 Integrity 6 Availability 7 DAD, Overprotection, Authenticity, Non-repudiation, and AAA Services 7 Protection Mechanisms 11 Security Boundaries 13 Evaluate and Apply Security Governance Principles 14 Third-Party Governance 15 Documentation Review 15 Manage the Security Function 16 Alignment of Security Function to Business Strategy, Goals, Mission, and Objectives 17 Organizational Processes 19 Organizational Roles and Responsibilities 21 Security Control Frameworks 22 Due Diligence and Due Care 23 Security Policy, Standards, Procedures, and Guidelines 23 Security Policies 24 Security Standards, Baselines, and Guidelines 24 Security Procedures 25 Threat Modeling 26 Identifying Threats 26 Determining and Diagramming Potential Attacks 28 Performing Reduction Analysis 28 Prioritization and Response 30 Supply Chain Risk Management 31 Summary 33 Exam Essentials 33 Written Lab 36 Review Questions 37 Chapter 2 Personnel Security and Risk Management Concepts 43 Personnel Security Policies and Procedures 45 Job Descriptions and Responsibilities 45 Candidate Screening and Hiring 46 Onboarding: Employment Agreements and Policies 47 Employee Oversight 48 Offboarding, Transfers, and Termination Processes 49 Vendor, Consultant, and Contractor Agreements and Controls 52 Compliance Policy Requirements 53 Privacy Policy Requirements 54 Understand and Apply Risk Management Concepts 55 Risk Terminology and Concepts 56 Asset Valuation 58 Identify Threats and Vulnerabilities 60 Risk Assessment/Analysis 60 Risk Responses 66 Cost vs. Benefit of Security Controls 69 Countermeasure Selection and Implementation 72 Applicable Types of Controls 74 Security Control Assessment 76 Monitoring and Measurement 76 Risk Reporting and Documentation 77 Continuous Improvement 77 Risk Frameworks 79 Social Engineering 81 Social Engineering Principles 83 Eliciting Information 85 Prepending 85 Phishing 85 Spear Phishing 87 Whaling 87 Smishing 88 Vishing 88 Spam 89 Shoulder Surfing 90 Invoice Scams 90 Hoax 90 Impersonation and Masquerading 91 Tailgating and Piggybacking 91 Dumpster Diving 92 Identity Fraud 93 Typo Squatting 94 Influence Campaigns 94 Establish and Maintain a Security Awareness, Education, and Training Program 96 Awareness 97 Training 97 Education 98 Improvements 98 Effectiveness Evaluation 99 Summary 100 Exam Essentials 101 Written Lab 106 Review Questions 107 Chapter 3 Business Continuity Planning 113 Planning for Business Continuity 114 Project Scope and Planning 115 Organizational Review 116 BCP Team Selection 117 Resource Requirements 119 Legal and Regulatory Requirements 120 Business Impact Analysis 121 Identifying Priorities 122 Risk Identification 123 Likelihood Assessment 125 Impact Analysis 126 Resource Prioritization 128 Continuity Planning 128 Strategy Development 129 Provisions and Processes 129 Plan Approval and Implementation 131 Plan Approval 131 Plan Implementation 132 Training and Education 132 BCP Documentation 132 Summary 136 Exam Essentials 137 Written Lab 138 Review Questions 139 Chapter 4 Laws, Regulations, and Compliance 143 Categories of Laws 144 Criminal Law 144 Civil Law 146 Administrative Law 146 Laws 147 Computer Crime 147 Intellectual Property (IP) 152 Licensing 158 Import/Export 158 Privacy 160 State Privacy Laws 168 Compliance 169 Contracting and Procurement 171 Summary 171 Exam Essentials 172 Written Lab 173 Review Questions 174 Chapter 5 Protecting Security of Assets 179 Identifying and Classifying Information and Assets 180 Defining Sensitive Data 180 Defining Data Classifications 182 Defining Asset Classifications 185 Understanding Data States 185 Determining Compliance Requirements 186 Determining Data Security Controls 186 Establishing Information and Asset Handling Requirements 188 Data Maintenance 189 Data Loss Prevention 189 Marking Sensitive Data and Assets 190 Handling Sensitive Information and Assets 192 Data Collection Limitation 192 Data Location 193 Storing Sensitive Data 193 Data Destruction 194 Ensuring Appropriate Data and Asset Retention 197 Data Protection Methods 199 Digital Rights Management 199 Cloud Access Security Broker 200 Pseudonymization 200 Tokenization 201 Anonymization 202 Understanding Data Roles 204 Data Owners 204 Asset Owners 205 Business/Mission Owners 206 Data Processors and Data Controllers 206 Data Custodians 207 Administrators 207 Users and Subjects 208 Using Security Baselines 208 Comparing Tailoring and Scoping 209 Standards Selection 210 Summary 211 Exam Essentials 211 Written Lab 213 Review Questions 214 Chapter 6 Cryptography and Symmetric Key Algorithms 219 Cryptographic Foundations 220 Goals of Cryptography 220 Cryptography Concepts 223 Cryptographic Mathematics 224 Ciphers 230 Modern Cryptography 238 Cryptographic Keys 238 Symmetric Key Algorithms 239 Asymmetric Key Algorithms 241 Hashing Algorithms 244 Symmetric Cryptography 244 Cryptographic Modes of Operation 245 Data Encryption Standard 247 Triple DES 247 International Data Encryption Algorithm 248 Blowfish 249 Skipjack 249 Rivest Ciphers 249 Advanced Encryption Standard 250 CAST 250 Comparison of Symmetric Encryption Algorithms 251 Symmetric Key Management 252 Cryptographic Lifecycle 255 Summary 255 Exam Essentials 256 Written Lab 257 Review Questions 258 Chapter 7 PKI and Cryptographic Applications 263 Asymmetric Cryptography 264 Public and Private Keys 264 RSA 265 ElGamal 267 Elliptic Curve 268 Diffie–Hellman Key Exchange 269 Quantum Cryptography 270 Hash Functions 271 SHA 272 MD5 273 RIPEMD 273 Comparison of Hash Algorithm Value Lengths 274 Digital Signatures 275 HMAC 276 Digital Signature Standard 277 Public Key Infrastructure 277 Certificates 278 Certificate Authorities 279 Certificate Lifecycle 280 Certificate Formats 283 Asymmetric Key Management 284 Hybrid Cryptography 285 Applied Cryptography 285 Portable Devices 285 Email 286 Web Applications 290 Steganography and Watermarking 292 Networking 294 Emerging Applications 295 Cryptographic Attacks 297 Summary 301 Exam Essentials 302 Written Lab 303 Review Questions 304 Chapter 8 Principles of Security Models, Design, and Capabilities 309 Secure Design Principles 310 Objects and Subjects 311 Closed and Open Systems 312 Secure Defaults 314 Fail Securely 314 Keep It Simple 316 Zero Trust 317 Privacy by Design 319 Trust but Verify 319 Techniques for Ensuring CIA 320 Confinement 320 Bounds 320 Isolation 321 Access Controls 321 Trust and Assurance 321 Understand the Fundamental Concepts of Security Models 322 Trusted Computing Base 323 State Machine Model 325 Information Flow Model 325 Noninterference Model 326 Take-Grant Model 326 Access Control Matrix 327 Bell–LaPadula Model 328 Biba Model 330 Clark–Wilson Model 333 Brewer and Nash Model 334 Goguen–Meseguer Model 335 Sutherland Model 335 Graham–Denning Model 335 Harrison–Ruzzo–Ullman Model 336 Select Controls Based on Systems Security Requirements 337 Common Criteria 337 Authorization to Operate 340 Understand Security Capabilities of Information Systems 341 Memory Protection 341 Virtualization 342 Trusted Platform Module 342 Interfaces 343 Fault Tolerance 343 Encryption/Decryption 343 Summary 343 Exam Essentials 344 Written Lab 347 Review Questions 348 Chapter 9 Security Vulnerabilities, Threats, and Countermeasures 353 Shared Responsibility 354 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements 355 Hardware 356 Firmware 370 Client-Based Systems 372 Mobile Code 372 Local Caches 375 Server-Based Systems 375 Large-Scale Parallel Data Systems 376 Grid Computing 377 Peer to Peer 378 Industrial Control Systems 378 Distributed Systems 380 High-Performance Computing (HPC) Systems 382 Internet of Things 383 Edge and Fog Computing 385 Embedded Devices and Cyber-Physical Systems 386 Static Systems 387 Network-Enabled Devices 388 Cyber-Physical Systems 389 Elements Related to Embedded and Static Systems 389 Security Concerns of Embedded and Static Systems 390 Specialized Devices 393 Microservices 394 Infrastructure as Code 395 Virtualized Systems 397 Virtual Software 399 Virtualized Networking 400 Software-Defined Everything 400 Virtualization Security Management 403 Containerization 405 Serverless Architecture 406 Mobile Devices 406 Mobile Device Security Features 408 Mobile Device Deployment Policies 420 Essential Security Protection Mechanisms 426 Process Isolation 426 Hardware Segmentation 427 System Security Policy 427 Common Security Architecture Flaws and Issues 428 Covert Channels 428 Attacks Based on Design or Coding Flaws 430 Rootkits 431 Incremental Attacks 431 Summary 432 Exam Essentials 433 Written Lab 440 Review Questions 441 Chapter 10 Physical Security Requirements 447 Apply Security Principles to Site and Facility Design 448 Secure Facility Plan 448 Site Selection 449 Facility Design 450 Implement Site and Facility Security Controls 452 Equipment Failure 453 Wiring Closets 454 Server Rooms/Data Centers 455 Intrusion Detection Systems 458 Cameras 460 Access Abuses 462 Media Storage Facilities 462 Evidence Storage 463 Restricted and Work Area Security 464 Utility Considerations 465 Fire Prevention, Detection, and Suppression 470 Implement and Manage Physical Security 476 Perimeter Security Controls 477 Internal Security Controls 481 Key Performance Indicators of Physical Security 483 Summary 484 Exam Essentials 485 Written Lab 488 Review Questions 489 Chapter 11 Secure Network Architecture and Components 495 OSI Model 497 History of the OSI Model 497 OSI Functionality 498 Encapsulation/Deencapsulation 498 OSI Layers 500 TCP/IP Model 504 Analyzing Network Traffic 505 Common Application Layer Protocols 506 Transport Layer Protocols 508 Domain Name System 509 DNS Poisoning 511 Domain Hijacking 514 Internet Protocol (IP) Networking 516 IPv4 vs. IPv6 516 IP Classes 517 ICMP 519 IGMP 519 ARP Concerns 519 Secure Communication Protocols 521 Implications of Multilayer Protocols 522 Converged Protocols 523 Voice over Internet Protocol (VoIP) 524 Software-Defined Networking 525 Microsegmentation 526 Wireless Networks 527 Securing the SSID 529 Wireless Channels 529 Conducting a Site Survey 530 Wireless Security 531 Wi-Fi Protected Setup (WPS) 533 Wireless MAC Filter 534 Wireless Antenna Management 534 Using Captive Portals 535 General Wi-Fi Security Procedure 535 Wireless Communications 536 Wireless Attacks 539 Other Communication Protocols 543 Cellular Networks 544 Content Distribution Networks (CDNs) 545 Secure Network Components 545 Secure Operation of Hardware 546 Common Network Equipment 547 Network Access Control 549 Firewalls 550 Endpoint Security 556 Cabling, Topology, and Transmission Media Technology 559 Transmission Media 559 Network Topologies 563 Ethernet 565 Sub-Technologies 566 Summary 569 Exam Essentials 570 Written Lab 574 Review Questions 575 Chapter 12 Secure Communications and Network Attacks 581 Protocol Security Mechanisms 582 Authentication Protocols 582 Port Security 585 Quality of Service (QoS) 585 Secure Voice Communications 586 Public Switched Telephone Network 586 Voice over Internet Protocol (VoIP) 586 Vishing and Phreaking 588 PBX Fraud and Abuse 589 Remote Access Security Management 590 Remote Access and Telecommuting Techniques 591 Remote Connection Security 591 Plan a Remote Access Security Policy 592 Multimedia Collaboration 593 Remote Meeting 593 Instant Messaging and Chat 594 Load Balancing 595 Virtual IPs and Load Persistence 596 Active-Active vs. Active-Passive 596 Manage Email Security 596 Email Security Goals 597 Understand Email Security Issues 599 Email Security Solutions 599 Virtual Private Network 602 Tunneling 603 How VPNs Work 604 Always-On 606 Split Tunnel vs. Full Tunnel 607 Common VPN Protocols 607 Switching and Virtual LANs 610 Network Address Translation 614 Private IP Addresses 616 Stateful NAT 617 Automatic Private IP Addressing 617 Third-Party Connectivity 618 Switching Technologies 620 Circuit Switching 620 Packet Switching 620 Virtual Circuits 621 WAN Technologies 622 Fiber-Optic Links 624 Security Control Characteristics 624 Transparency 625 Transmission Management Mechanisms 625 Prevent or Mitigate Network Attacks 625 Eavesdropping 626 Modification Attacks 626 Summary 626 Exam Essentials 628 Written Lab 630 Review Questions 631 Chapter 13 Managing Identity and Authentication 637 Controlling Access to Assets 639 Controlling Physical and Logical Access 640 The CIA Triad and Access Controls 640 Managing Identification and Authentication 641 Comparing Subjects and Objects 642 Registration, Proofing, and Establishment of Identity 643 Authorization and Accountability 644 Authentication Factors Overview 645 Something You Know 647 Something You Have 650 Something You Are 651 Multifactor Authentication (MFA) 655 Two-Factor Authentication with Authenticator Apps 655 Passwordless Authentication 656 Device Authentication 657 Service Authentication 658 Mutual Authentication 659 Implementing Identity Management 659 Single Sign-On 659 SSO and Federated Identities 660 Credential Management Systems 662 Credential Manager Apps 663 Scripted Access 663 Session Management 663 Managing the Identity and Access Provisioning Lifecycle 664 Provisioning and Onboarding 665 Deprovisioning and Offboarding 666 Defining New Roles 667 Account Maintenance 667 Account Access Review 667 Summary 668 Exam Essentials 669 Written Lab 671 Review Questions 672 Chapter 14 Controlling and Monitoring Access 677 Comparing Access Control Models 678 Comparing Permissions, Rights, and Privileges 678 Understanding Authorization Mechanisms 679 Defining Requirements with a Security Policy 681 Introducing Access Control Models 681 Discretionary Access Control 682 Nondiscretionary Access Control 683 Implementing Authentication Systems 690 Implementing SSO on the Internet 691 Implementing SSO on Internal Networks 694 Understanding Access Control Attacks 699 Risk Elements 700 Common Access Control Attacks 700 Core Protection Methods 713 Summary 714 Exam Essentials 715 Written Lab 717 Review Questions 718 Chapter 15 Security Assessment and Testing 723 Building a Security Assessment and Testing Program 725 Security Testing 725 Security Assessments 726 Security Audits 727 Performing Vulnerability Assessments 731 Describing Vulnerabilities 731 Vulnerability Scans 732 Penetration Testing 742 Compliance Checks 745 Testing Your Software 746 Code Review and Testing 746 Interface Testing 751 Misuse Case Testing 751 Test Coverage Analysis 752 Website Monitoring 752 Implementing Security Management Processes 753 Log Reviews 753 Account Management 754 Disaster Recovery and Business Continuity 754 Training and Awareness 755 Key Performance and Risk Indicators 755 Summary 756 Exam Essentials 756 Written Lab 758 Review Questions 759 Chapter 16 Managing Security Operations 763 Apply Foundational Security Operations Concepts 765 Need to Know and Least Privilege 765 Separation of Duties (SoD) and Responsibilities 767 Two-Person Control 768 Job Rotation 768 Mandatory Vacations 768 Privileged Account Management 769 Service Level Agreements (SLAs) 771 Addressing Personnel Safety and Security 771 Duress 771 Travel 772 Emergency Management 773 Security Training and Awareness 773 Provision Resources Securely 773 Information and Asset Ownership 774 Asset Management 774 Apply Resource Protection 776 Media Management 776 Media Protection Techniques 776 Managed Services in the Cloud 779 Shared Responsibility with Cloud Service Models 780 Scalability and Elasticity 782 Perform Configuration Management (CM) 782 Provisioning 783 Baselining 783 Using Images for Baselining 783 Automation 784 Managing Change 785 Change Management 787 Versioning 788 Configuration Documentation 788 Managing Patches and Reducing Vulnerabilities 789 Systems to Manage 789 Patch Management 789 Vulnerability Management 791 Vulnerability Scans 792 Common Vulnerabilities and Exposures 792 Summary 793 Exam Essentials 794 Written Lab 796 Review Questions 797 Chapter 17 Preventing and Responding to Incidents 801 Conducting Incident Management 803 Defining an Incident 803 Incident Management Steps 804 Implementing Detective and Preventive Measures 810 Basic Preventive Measures 810 Understanding Attacks 811 Intrusion Detection and Prevention Systems 820 Specific Preventive Measures 828 Logging and Monitoring 834 Logging Techniques 834 The Role of Monitoring 837 Monitoring Techniques 840 Log Management 844 Egress Monitoring 844 Automating Incident Response 845 Understanding SOAR 845 Machine Learning and AI Tools 846 Threat Intelligence 847 The Intersection of SOAR, Machine Learning, AI, and Threat Feeds 850 Summary 851 Exam Essentials 852 Written Lab 855 Review Questions 856 Chapter 18 Disaster Recovery Planning 861 The Nature of Disaster 863 Natural Disasters 864 Human-Made Disasters 869 Understand System Resilience, High Availability, and Fault Tolerance 875 Protecting Hard Drives 875 Protecting Servers 877 Protecting Power Sources 878 Trusted Recovery 879 Quality of Service 880 Recovery Strategy 880 Business Unit and Functional Priorities 881 Crisis Management 882 Emergency Communications 882 Workgroup Recovery 883 Alternate Processing Sites 883 Database Recovery 888 Recovery Plan Development 890 Emergency Response 891 Personnel and Communications 891 Assessment 892 Backups and Off-site Storage 892 Software Escrow Arrangements 896 Utilities 897 Logistics and Supplies 897 Recovery vs. Restoration 897 Training, Awareness, and Documentation 898 Testing and Maintenance 899 Read-Through Test 899 Structured Walk-Through 900 Simulation Test 900 Parallel Test 900 Full-Interruption Test 900 Lessons Learned 901 Maintenance 901 Summary 902 Exam Essentials 902 Written Lab 903 Review Questions 904 Chapter 19 Investigations and Ethics 909 Investigations 910 Investigation Types 910 Evidence 913 Investigation Process 919 Major Categories of Computer Crime 923 Military and Intelligence Attacks 924 Business Attacks 925 Financial Attacks 926 Terrorist Attacks 926 Grudge Attacks 927 Thrill Attacks 928 Hacktivists 928 Ethics 929 Organizational Code of Ethics 929 (ISC)2 Code of Ethics 930 Ethics and the Internet 931 Summary 933 Exam Essentials 934 Written Lab 935 Review Questions 936 Chapter 20 Software Development Security 941 Introducing Systems Development Controls 943 Software Development 943 Systems Development Lifecycle 952 Lifecycle Models 955 Gantt Charts and PERT 964 Change and Configuration Management 964 The DevOps Approach 966 Application Programming Interfaces 967 Software Testing 969 Code Repositories 970 Service-Level Agreements 971 Third-Party Software Acquisition 972 Establishing Databases and Data Warehousing 973 Database Management System Architecture 973 Database Transactions 977 Security for Multilevel Databases 978 Open Database Connectivity 982 NoSQL 982 Storage Threats 983 Understanding Knowledge-Based Systems 984 Expert Systems 984 Machine Learning 985 Neural Networks 986 Summary 987 Exam Essentials 987 Written Lab 988 Review Questions 989 Chapter 21 Malicious Code and Application Attacks 993 Malware 994 Sources of Malicious Code 995 Viruses 995 Logic Bombs 999 Trojan Horses 1000 Worms 1001 Spyware and Adware 1004 Ransomware 1004 Malicious Scripts 1005 Zero-Day Attacks 1006 Malware Prevention 1006 Platforms Vulnerable to Malware 1007 Antimalware Software 1007 Integrity Monitoring 1008 Advanced Threat Protection 1008 Application Attacks 1009 Buffer Overflows 1009 Time of Check to Time of Use 1010 Backdoors 1011 Privilege Escalation and Rootkits 1011 Injection Vulnerabilities 1012 SQL Injection Attacks 1012 Code Injection Attacks 1016 Command Injection Attacks 1016 Exploiting Authorization Vulnerabilities 1017 Insecure Direct Object References 1018 Directory Traversal 1018 File Inclusion 1020 Exploiting Web Application Vulnerabilities 1020 Cross-Site Scripting (XSS) 1021 Request Forgery 1023 Session Hijacking 1024 Application Security Controls 1025 Input Validation 1025 Web Application Firewalls 1027 Database Security 1028 Code Security 1029 Secure Coding Practices 1031 Source Code Comments 1031 Error Handling 1032 Hard-Coded Credentials 1033 Memory Management 1034 Summary 1035 Exam Essentials 1035 Written Lab 1036 Review Questions 1037 Appendix A Answers to Review Questions 1041 Chapter 1: Security Governance Through Principles and Policies 1042 Chapter 2: Personnel Security and Risk Management Concepts 1045 Chapter 3: Business Continuity Planning 1049 Chapter 4: Laws, Regulations, and Compliance 1051 Chapter 5: Protecting Security of Assets 1053 Chapter 6: Cryptography and Symmetric Key Algorithms 1056 Chapter 7: PKI and Cryptographic Applications 1058 Chapter 8: Principles of Security Models, Design, and Capabilities 1060 Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 1062 Chapter 10: Physical Security Requirements 1067 Chapter 11: Secure Network Architecture and Components 1071 Chapter 12: Secure Communications and Network Attacks 1075 Chapter 13: Managing Identity and Authentication 1078 Chapter 14: Controlling and Monitoring Access 1080 Chapter 15: Security Assessment and Testing 1082 Chapter 16: Managing Security Operations 1084 Chapter 17: Preventing and Responding to Incidents 1086 Chapter 18: Disaster Recovery Planning 1089 Chapter 19: Investigations and Ethics 1091 Chapter 20: Software Development Security 1093 Chapter 21: Malicious Code and Application Attacks 1095 Appendix B Answers to Written Labs 1099 Chapter 1: Security Governance Through Principles and Policies 1100 Chapter 2: Personnel Security and Risk Management Concepts 1100 Chapter 3: Business Continuity Planning 1101 Chapter 4: Laws, Regulations, and Compliance 1102 Chapter 5: Protecting Security of Assets 1102 Chapter 6: Cryptography and Symmetric Key Algorithms 1103 Chapter 7: PKI and Cryptographic Applications 1104 Chapter 8: Principles of Security Models, Design, and Capabilities 1104 Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 1105 Chapter 10: Physical Security Requirements 1106 Chapter 11: Secure Network Architecture and Components 1108 Chapter 12: Secure Communications and Network Attacks 1109 Chapter 13: Managing Identity and Authentication 1110 Chapter 14: Controlling and Monitoring Access 1111 Chapter 15: Security Assessment and Testing 1111 Chapter 16: Managing Security Operations 1112 Chapter 17: Preventing and Responding to Incidents 1113 Chapter 18: Disaster Recovery Planning 1113 Chapter 19: Investigations and Ethics 1114 Chapter 20: Software Development Security 1114 Chapter 21: Malicious Code and Application Attacks 1115 Index 1117
£55.10
John Wiley & Sons Inc CISM Certified Information Security Manager Study
Book SynopsisTable of ContentsIntroduction Assessment Test xxi Chapter 1 Today’s Information Security Manager 1 Information Security Objectives 2 Role of the Information Security Manager 3 Chief Information Security Officer 4 Lines of Authority 4 Organizing the Security Team 5 Roles and Responsibilities 7 Information Security Risks 8 The DAD Triad 8 Incident Impact 9 Building an Information Security Strategy 12 Threat Research 12 SWOT Analysis 13 Gap Analysis 13 Creating SMART Goals 16 Alignment with Business Strategy 16 Leadership Support 17 Internal and External Influences 17 Cybersecurity Responsibilities 18 Communication 19 Action Plans 19 Implementing Security Controls 20 Security Control Categories 21 Security Control Types 21 Data Protection 23 Summary 25 Exam Essentials 25 Review Questions 27 Chapter 2 Information Security Governance and Compliance 31 Governance 33 Corporate Governance 33 Governance, Risk, and Compliance Programs 35 Information Security Governance 35 Developing Business Cases 36 Third- Party Relationships 37 Understanding Policy Documents 38 Policies 38 Standards 40 Procedures 42 Guidelines 43 Exceptions and Compensating Controls 44 Developing Policies 45 Complying with Laws and Regulations 46 Adopting Standard Frameworks 47 Cobit 47 NIST Cybersecurity Framework 49 NIST Risk Management Framework 52 ISO Standards 53 Benchmarks and Secure Configuration Guides 54 Security Control Verification and Quality Control 56 Summary 57 Exam Essentials 57 Review Questions 59 Chapter 3 Information Risk Management 63 Analyzing Risk 65 Risk Identification 66 Risk Calculation 67 Risk Assessment 68 Risk Treatment and Response 72 Risk Mitigation 73 Risk Avoidance 74 Risk Transference 74 Risk Acceptance 75 Risk Analysis 75 Disaster Recovery Planning 78 Disaster Types 78 Business Impact Analysis 79 Privacy 79 Sensitive Information Inventory 80 Information Classification 80 Data Roles and Responsibilities 82 Information Lifecycle 83 Privacy- Enhancing Technologies 83 Privacy and Data Breach Notification 84 Summary 84 Exam Essentials 85 Review Questions 86 Chapter 4 Cybersecurity Threats 91 Chapter 5 Exploring Cybersecurity Threats 92 Classifying Cybersecurity Threats 92 Threat Actors 94 Threat Vectors 99 Threat Data and Intelligence 101 Open Source Intelligence 101 Proprietary and Closed Source Intelligence 104 Assessing Threat Intelligence 105 Threat Indicator Management and Exchange 107 Public and Private Information Sharing Centers 108 Conducting Your Own Research 108 Summary 109 Exam Essentials 109 Review Questions 111 Information Security Program Development and Management 115 Information Security Programs 117 Establishing a New Program 117 Maintaining an Existing Program 121 Security Awareness and Training 123 User Training 123 Role- Based Training 124 Ongoing Awareness Efforts 124 Managing the Information Security Team 125 Hiring Team Members 126 Developing the Security Team 126 Managing the Security Budget 127 Organizational Budgeting 127 Fiscal Years 127 Expense Types 128 Budget Monitoring 129 Integrating Security with Other Business Functions 130 Procurement 130 Accounting 133 Human Resources 133 Information Technology 135 Audit 138 Summary 139 Exam Essentials 139 Review Questions 141 Chapter 6 Security Assessment and Testing 145 Vulnerability Management 146 Identifying Scan Targets 146 Determining Scan Frequency 148 Configuring Vulnerability Scans 149 Scanner Maintenance 154 Vulnerability Scanning Tools 155 Reviewing and Interpreting Scan Reports 159 Validating Scan Results 160 Security Vulnerabilities 161 Patch Management 162 Legacy Platforms 163 Weak Configurations 164 Error Messages 164 Insecure Protocols 165 Weak Encryption 166 Penetration Testing 167 Adopting the Hacker Mindset 168 Reasons for Penetration Testing 169 Benefits of Penetration Testing 169 Penetration Test Types 170 Rules of Engagement 171 Reconnaissance 173 Running the Test 173 Cleaning Up 174 Training and Exercises 174 Summary 175 Exam Essentials 176 Review Questions 177 Chapter 7 Cybersecurity Technology 181 Endpoint Security 182 Malware Prevention 183 Endpoint Detection and Response 183 Data Loss Prevention 184 Change and Configuration Management 185 Patch Management 185 System Hardening 185 Network Security 186 Network Segmentation 186 Network Device Security 188 Network Security Tools 191 Cloud Computing Security 195 Benefits of the Cloud 196 Cloud Roles 198 Cloud Service Models 198 Cloud Deployment Models 202 Shared Responsibility Model 204 Cloud Standards and Guidelines 207 Cloud Security Issues 208 Cloud Security Controls 210 Cryptography 212 Goals of Cryptography 212 Symmetric Key Algorithms 214 Asymmetric Cryptography 215 Hash Functions 217 Digital Signatures 218 Digital Certificates 219 Certificate Generation and Destruction 220 Code Security 223 Software Development Life Cycle 223 Software Development Phases 224 Software Development Models 226 DevSecOps and DevOps 229 Code Review 230 Software Security Testing 232 Identity and Access Management 234 Identification, Authentication, and Authorization 234 Authentication Techniques 235 Authentication Errors 237 Single- Sign On and Federation 238 Provisioning and Deprovisioning 238 Account Monitoring 239 Summary 240 Exam Essentials 241 Review Questions 244 Chapter 8 Incident Response 249 Security Incidents 251 Phases of Incident Response 252 Preparation 253 Detection and Analysis 254 Containment, Eradication, and Recovery 255 Post- Incident Activity 267 Building the Incident Response Plan 269 Policy 269 Procedures and Playbooks 270 Documenting the Incident Response Plan 270 Creating an Incident Response Team 272 Incident Response Providers 273 CSIRT Scope of Control 273 Coordination and Information Sharing 273 Internal Communications 274 External Communications 274 Classifying Incidents 274 Threat Classification 275 Severity Classification 276 Conducting Investigations 279 Investigation Types 279 Evidence 282 Plan Training, Testing, and Evaluation 288 Summary 289 Exam Essentials 290 Review Questions 292 Chapter 9 Business Continuity and Disaster Recovery 297 Planning for Business Continuity 298 Project Scope and Planning 299 Organizational Review 300 BCP Team Selection 301 Resource Requirements 302 Legal and Regulatory Requirements 303 Business Impact Analysis 304 Identifying Priorities 305 Risk Identification 306 Likelihood Assessment 308 Impact Analysis 309 Resource Prioritization 310 Continuity Planning 310 Strategy Development 311 Provisions and Processes 311 Plan Approval and Implementation 313 Plan Approval 313 Plan Implementation 314 Training and Education 314 BCP Documentation 314 The Nature of Disaster 318 Natural Disasters 319 Human- Made Disasters 324 System Resilience, High Availability, and Fault Tolerance 327 Protecting Hard Drives 328 Protecting Servers 329 Protecting Power Sources 331 Recovery Strategy 331 Business Unit and Functional Priorities 332 Crisis Management 333 Emergency Communications 334 Workgroup Recovery 334 Alternate Processing Sites 334 Database Recovery 338 Recovery Plan Development 340 Emergency Response 341 Personnel and Communications 341 Assessment 342 Backups and Offsite Storage 342 Utilities 345 Logistics and Supplies 345 Training, Awareness, and Documentation 345 Testing and Maintenance 346 Read- Through Test 346 Structured Walk- Through 346 Simulation Test 347 Parallel Test 347 Full- Interruption Test 347 Lessons Learned 347 Maintenance 348 Summary 349 Exam Essentials 349 Review Questions 351 Appendix Answers to the Review Questions 357 Chapter 1: Today’s Information Security Manager 358 Chapter 2: Information Security Governance and Compliance 360 Chapter 3: Information Risk Management 362 Chapter 4: Cybersecurity Threats 363 Chapter 5: Information Security Program Development and Management 365 Chapter 6: Security Assessment and Testing 368 Chapter 7: Cybersecurity Technology 370 Chapter 8: Incident Response 372 Chapter 9: Business Continuity and Disaster Recovery 374 Index 377
£37.50
John Wiley & Sons Inc CEH v11 Certified Ethical Hacker Study Guide
Book SynopsisMaster CEH v11 and identify your weak spots As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. CEH v11 Certified Ethical Hacker Study Guide and Practice Tests Set provides you with all of the technical review you need of CEH skills PLUS SEVEN practice tests to prove your readiness for exam day. About the CEH v11 Certified Ethical Hacker Study Guide The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review q
£43.12
John Wiley & Sons Inc Google Cloud Certified Professional Cloud
Book SynopsisTable of ContentsIntroduction xxiii Assessment Test xxix Answers to the Assessment Test xxxv Chapter 1 Introduction to the Google Professional Cloud Architect Exam 1 Exam Objectives 2 Analyzing Business Requirements 3 Reducing Operational Expenses 3 Accelerating the Pace of Development 4 Reporting on Service- Level Objectives 5 Reducing Time to Recover from an Incident 5 Improving Compliance with Industry Regulations 6 Analyzing Technical Requirements 8 Functional Requirements 8 Exam Case Studies 11 EHR Healthcare 12 Helicopter Racing League 13 Mountkirk Games 14 TerramEarth 15 Summary 16 Exam Essentials 16 Review Questions 18 Chapter 2 Designing Solutions to Meet Business Requirements 23 Business Use Cases and Product Strategy 24 EHR Healthcare 25 Helicopter Racing League 26 Mountkirk Games Strategy 26 TerramEarth Strategy 27 Application Design and Cost Considerations 27 Managed Services 28 Reduced Levels of Services 30 Data Lifecycle Management 32 Systems Integration and Data Management 33 Systems Integration Business Requirements 33 Data Management Business Requirements 36 Compliance and Regulation 38 Privacy Regulations 38 Data Integrity Regulations 39 Security 39 Confidentiality 40 Integrity 40 Availability 41 Success Measures 41 Key Performance Indicators 41 Return on Investment 42 Summary 43 Exam Essentials 43 Review Questions 45 Chapter 3 Designing Solutions to Meet Technical Requirements 51 High Availability 52 Compute Availability 54 Storage Availability 56 Network Availability 60 Application Availability 60 Scalability 61 Scaling Compute Resources 62 Scaling Storage Resources 64 Network Design for Scalability 64 Reliability 65 Measuring Reliability 65 Reliability Engineering 65 Summary 66 Exam Essentials 66 Review Questions 68 Chapter 4 Designing Compute Systems 73 Compute Services and Use Cases 74 Compute Engine 75 App Engine 80 Cloud Functions 82 Cloud Run 84 Kubernetes Engine 84 Anthos 90 Overview of Anthos 91 Anthos Service Mesh 91 Anthos Multi Cluster Ingress 92 Anthos Deployment Options 92 AI and Machine Learning Services 93 Vertex AI 94 Cloud TPU 94 Data Flows and Pipelines 94 Cloud Pub/Sub Pipelines 95 Cloud Dataflow Pipelines 96 Cloud Dataproc 96 Cloud Workflows 96 Cloud Data Fusion 96 Cloud Composer 97 Compute System Provisioning 97 Additional Design Issues 97 Managing State in Distributed Systems 98 Synchronous and Asynchronous Operations 99 Summary 100 Exam Essentials 101 Review Questions 102 Chapter 5 Designing Storage Systems 107 Overview of Storage Services 108 Object Storage with Google Cloud Storage 109 Organizing Objects in a Namespace 109 Cloud Storage FUSE 110 Storage Tiers 110 Cloud Storage Use Cases 111 Network- Attached Storage with Google Cloud Filestore 112 Cloud Filestore Service Tiers 112 Cloud Filestore Networking 113 Cloud Filestore Access Controls 113 Databases 113 Relational Database Overview 114 Cloud SQL 115 Cloud Spanner 117 Analytical Database: BigQuery 117 NoSQL Databases 120 Caching with Cloud Memorystore 121 Data Retention and Lifecycle Management 122 Networking and Latency 123 Summary 124 Exam Essentials 125 Review Questions 127 Chapter 6 Designing Networks 131 IP Addressing, Firewall Rules, and Routers 133 IP Address Structure 133 Public vs. Private Addressing 134 Firewall Rules 134 Cloud Router 135 Cloud Armor 135 Virtual Private Clouds 136 VPC Subnets 136 Shared VPC 137 VPC Network Peering 137 Hybrid- Cloud Networking 138 Hybrid- Cloud Design Considerations 138 Hybrid- Cloud Implementation Options 139 Service- Centric Networking 141 Private Service Connect for Google APIs 141 Private Service Connect for Google APIs with Consumer Http(s) 142 Private Google Access 142 Private Google Access for On- Premises Hosts 142 Private Service Connect for Published Services 142 Private Service Access 142 Serverless VPC Access 142 Load Balancing 143 Regional Load Balancing 143 Global Load Balancing 144 Additional Network Services 145 Service Directory 145 Cloud CDN 145 Cloud DNS 145 Summary 146 Exam Essentials 146 Review Questions 148 Chapter 7 Designing for Security and Legal Compliance 153 Identity and Access Management and Related Access Control Services 154 Identities and Groups 154 Resources 155 Permissions 156 Roles 156 Policies 158 Cloud IAM Conditions 160 IAM Best Practices 160 Identity- Aware Proxy 161 Workload Identity Federation 161 Organization Constraints 162 Data Security 162 Encryption 163 Key Management 164 Cloud Storage Data Access 166 Security Evaluation 166 Penetration Testing 167 Auditing 167 Security Design Principles 168 Separation of Duties 168 Least Privilege 169 Defense in Depth 170 Major Regulations 171 Hipaa/hitech 171 General Data Protection Regulation 172 Sarbanes- Oxley Act 172 Children’s Online Privacy Protection Act 173 ITIL Framework 173 Summary 174 Exam Essentials 174 Review Questions 177 Chapter 8 Designing for Reliability 181 Improving Reliability with Cloud Operations Suite 182 Monitoring with Cloud Monitoring 183 Alerting with Cloud Monitoring 186 Logging with Cloud Logging 187 Open Source Observability Tools 188 Release Management 188 Continuous Delivery 189 Continuous Integration 192 Systems Reliability Engineering 193 Overload 193 Cascading Failures 196 Testing for Reliability 197 Incident Management and Post- Mortem Analysis 198 Summary 199 Exam Essentials 199 Review Questions 201 Chapter 9 Analyzing and Defining Technical Processes 205 Software Development Lifecycle Plan 206 Analysis 206 Design 208 Continuous Integration/Continuous Delivery 211 Business Drivers to Adopt CI/CD 211 CI/CD Building Blocks 212 Troubleshooting and Post- Mortem Analysis Culture 213 Incident Post- Mortems 214 Project Post- Mortems 215 IT Enterprise Processes 216 Business Continuity Planning and Disaster Recovery 217 Business Continuity Planning 217 Disaster Recovery 218 Summary 219 Exam Essentials 220 Review Questions 222 Chapter 10 Analyzing and Defining Business Processes 227 Stakeholder Management 228 Interests and Influence 228 Projects, Programs, and Portfolios 229 Stages of Stakeholder Management 230 Change Management 231 Reasons for Change 231 Change Management Methodologies 232 Team Skill Management 233 Customer Success Management 234 Cost Optimization/Resource Optimization 235 Summary 236 Exam Essentials 236 Review Questions 238 Chapter 11 Development and Operations 243 Application Development Methodologies 244 Waterfall 244 Spiral 245 Agile 246 Technical Debt 247 API Best Practices 248 Resources and Standard Methods 248 API Security 249 Testing Frameworks 251 Testing Framework Models 251 Automated Testing Tools 252 Data and System Migration Tooling 253 Types of Cloud Migrations 253 Migration Services and Tools 254 Interacting with Google Cloud Programmatically 255 Google Cloud SDK 256 Google Cloud Shell 256 Cloud Emulators 257 Summary 257 Exam Essentials 257 Review Questions 259 Chapter 12 Migration Planning 263 Integrating Cloud Services with Existing Systems 264 Migrating Systems and Data to Support a Solution 266 Planning for Systems Migrations 266 Planning for Data Migration 268 Software Licensing Mapping 269 Network Planning 271 Virtual Private Clouds 271 Network Access Controls 272 Scaling 273 Connectivity 273 Summary 273 Exam Essentials 274 Review Questions 276 Appendix Answers to the Review Questions 279 Chapter 1: Introduction to the Google Professional Cloud Architect Exam 280 Chapter 2: Designing Solutions to Meet Business Requirements 282 Chapter 3: Designing Solutions to Meet Technical Requirements 285 Chapter 4: Designing Compute Systems 287 Chapter 5: Designing Storage Systems 290 Chapter 6: Designing Networks 293 Chapter 7: Designing for Security and Legal Compliance 295 Chapter 8: Designing for Reliability 297 Chapter 9: Analyzing and Defining Technical Processes 298 Chapter 10: Analyzing and Defining Business Processes 301 Chapter 11: Development and Operations 303 Chapter 12: Migration Planning 305 Index 309
£39.00
John Wiley & Sons Inc ISC2 CCSP Certified Cloud Security Professional
Book SynopsisTable of ContentsIntroduction xv Chapter 1 Domain 1: Cloud Concepts, Architecture, and Design 1 Chapter 2 Domain 2: Architecture and Design 23 Chapter 3 Domain 3: Cloud Platform and Infrastructure Security 45 Chapter 4 Domain 4: Cloud Application Security 65 Chapter 5 Domain 5: Cloud Security Operations 85 Chapter 6 Domain 6: Legal, Risk, and Compliance 105 Chapter 7 Practice Test 1 125 Chapter 8 Practice Test 2 151 Appendix Answers to Review Questions 175 Chapter 1: Domain 1: Cloud Concepts, Architecture, and Design 176 Chapter 2: Domain 2: Architecture and Design 188 Chapter 3: Domain 3: Cloud Platform and Infrastructure Security 198 Chapter 4: Domain 4: Cloud Application Security 213 Chapter 5: Domain 5: Cloud Security Operations 223 Chapter 6: Domain 6: Legal, Risk, and Compliance 232 Chapter 7: Practice Test 1 245 Chapter 8: Practice Test 2 259 Index 273
£26.24
McGraw-Hill Education OCA Java SE 8 Programmer I Study Guide Exam
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The official study guide for the entry-level Oracle Certified Associate exam for Java Programmersâfully updated for Java SE 8Confidently prepare for the OCA Java SE 8 Programmer I exam with this thoroughly revised, up-to-date guide from Oracle Press. Featuring step-by-step exercises, comprehensive chapter self-tests, and a CD-ROM containing two complete practice exams, this volume provides an integrated, easy-to-follow study system based on a proven methodology.OCA Java SE 8 Programmer I Study Guide (Exam 1Z0-808) offers the most complete and in-depth coverage of all of the exam objectives, anTable of ContentsChapter 1: Packaging, Compiling, and Interpreting Java CodeChapter 2: Programming with Java StatementsChapter 3: Programming with Java Operators and StringsChapter 4: Working with Basic Classes and VariablesChapter 5: Understanding Methods and Variable ScopeChapter 6: Programming with ArraysChapter 7: Understanding Class InheritanceChapter 8: Understanding Polymorphism and CastsChapter 9: Handling ExceptionsChapter 10: Programming with the Date and Time APIChapter 11: Understanding Lambda ExpressionsAppendicesAppendix A: Class RelationshipsAppendix B: Java SE 8 PackagesAppendix C: Java KeywordsAppendix D: Bracket ConventionsAppendix E: Unicode StandardAppendix F: Pseudo-code AlgorithmsAppendix G: Unified Modeling LanguageAppendix H: Functional InterfacesAppendix I: About the CDGlossary
£27.64
McGraw-Hill Education CompTIA CySA Cybersecurity Analyst Certification
Book SynopsisThis comprehensive self-study guide offers complete coverage of the new CompTIA Cybersecurity Analyst+ certification examThis highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CSA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference.Covers every topic on the exam, including:â Threat and vulnerability managementâ Conducting and analyzing reconnaissanceâ Responding to network-based threatsâ
£49.39