Computer certification Books
McGraw-Hill Education CISM Certified Information Security Manager
Book SynopsisThis effective study guide provides 100% coverage of every topic on the latest version of the CISM examWritten by an information security executive consultant, experienced author, and university instructor, this highly effective integrated self-study system enables you to take the challenging CISM exam with complete confidence. CISM Certified Information Security Manager All-in-One Exam Guide covers all four exam domains developed by ISACA. Youâll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. All questions closely match those on the live test in tone, format, and content. âœNote,â âœTip,â and âœCautionâ sections throughout provide real-world insight and call out potentially harmful situations. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference.Covers all exam domains, including:âInformation securi
£43.99
McGraw Hill LLC Ccsp Certified Cloud Security Professional
Book Synopsis
£30.00
McGraw-Hill Education SSCP Systems Security Certified Practitioner
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated study guide offers complete coverage of every topic on the latest version of the SSCP exam This thoroughly revised guide offers complete coverage of all the material on the Systems Security Certified Practitioner (SSCP) exam. Written by a leading IT security certification and training expert, this authoritative resource addresses all seven SSCP domains as developed by the International Information Systems Security Certification Consortium (ISC)2 , including updated exam objectives effective November 1, 2018. Youâll find lists of topics covered at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanationsTable of ContentsChapter 1: Security FundamentalsChapter 2: Access ControlsChapter 3: Basic Networking and CommunicationsChapter 4: Advanced Networking and CommunicationsChapter 5: AttacksChapter 6: Malicious Code and ActivityChapter 7: Risk, Response, and RecoveryChapter 8: Monitoring and AnalysisChapter 9: Controls and CountermeasuresChapter 10: AuditingChapter 11: Security OperationsChapter 12: Security Administration and PlanningChapter 13: Legal IssuesChapter 14: Cryptography
£47.19
McGraw-Hill Education CISSP Practice Exams Fifth Edition
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Donât Let the Real Test Be Your First Test! This fully updated self-study guide offers complete coverage of all eight Certified Information Systems Security Professional exam domains developed by the International Information Systems Security Certification Consortium (ISC)2 . To reinforce important skills and facilitate retention, every question is accompanied by in-depth explanations for both correct and incorrect answers. Designed to help you pass the test with ease, this book is the ideal companion to the bestselling CISSP All-in-One Exam GuideTable of ContentsChapter 1: Security and Risk ManagementChapter 2: Asset SecurityChapter 3: Security EngineeringChapter 4: Communication and Network SecurityChapter 5: Identity and Access ManagementChapter 6: Security Assessment and TestingChapter 7: Security OperationsChapter 8: Software Development Security
£23.39
McGraw-Hill Education CASP CompTIA Advanced Security Practitioner
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam by the experts!Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Also includes a voucher coupon for a 10% discount on your CompTIA exam!Covers all exam domains, Table of ContentsPART I: Risk ManagementChapter 1: Security Influences and RiskChapter 2: Security Policies and ProceduresChapter 3: Risk Mitigation, Strategies, and ControlsChapter 4: Risk MetricsPART II: Enterprise Security ArchitectureChapter 5: Network Security Components, Concepts and ArchitecturesChapter 6: Security Controls for Host DevicesChapter 7: Mobile Security ControlsChapter 8: Vulnerabilities and Security ControlsPART III: Enterprise Security OperationsChapter 9: Security AssessmentChapter 10: Security Assessment ToolsChapter 11: Incident Response and Recovery ProceduresPART IV: Technical Integration of Enterprise SecurityChapter 12: Hosts, Storage, Networks, and ApplicationsChapter 13: Cloud and VirtualizationChapter 14: Authentication and AuthorizationChapter 15: Cryptographic TechniquesChapter 16: Securing Communications and CollaborationPART V: Research, Development and CollaborationChapter 17: Research Methods and Industry TrendsChapter 18: Technology Life Cycles and Security ActivitiesChapter 19: Business Unit InteractionsGlossary
£35.24
McGraw-Hill Education PHRSPHR Professional in Human Resources
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Donât Let the Real Test Be Your First Test! Based on the HR Certification Instituteâs Professional and Senior Professional in Human Resources bodies of knowledge, this practical guide contains 600+ realistic practice exam questions to prepare you for the 2018 versions of these challenging certification exams. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment exam tests your readiness and identifies areas requiring further study. Designed to help you pass the exams, this is the perfect companion to PHR /SPHR Professional in Human Resour
£27.89
McGraw-Hill Education AWS Certified Developer Associate AllinOne Exam
Book SynopsisThis effective self-study system delivers complete coverage of every topic on the AWS Certified Developer Associate ExamTake the challenging AWS Certified Developer Associate Exam with confidence using the comprehensive information contained in this effective test preparation guide. Written by an Amazon Web Services certified expert and experienced trainer, AWS Certified Developer Associate All-in-One Exam Guide (Exam DVA-C01) covers every subject on the exam and clearly explains how to create, deploy, migrate, monitor, and debug cloud-native applications. Designed to help you pass the exam with ease, this guide also serves as an ideal on-the-job reference.Covers all topics on the exam, including: Getting started with AWS Journey AWS high availability and fault tolerance Working with cloud storage Authentication and authorization Creating SQL and NoSQL databases in AWS Cloud AWS application integraTable of ContentsPART 1: Getting Started with AWS JourneyChapter 1: Overview of Cloud Computing and AWSChapter 2: Interacting with AWS using API, SDKI, and CLIChapter 3: Networking using Amazon Virtual Private Cloud (Amazon VPC)Chapter 4: Creating a Virtual machine Using Amazon EC2PART 2: AWS High Availability and Fault ToleranceChapter 5: Elastic Load Balancing and Auto ScalingChapter 6: Distributing the Contents via AWS CloudFrontChapter 7: Domain Name System (DNS) and Amazon Route 53PART 3: Working with Cloud StorageChapter 8: Working with Simple Storage Service s3Chapter 9: Amazon EBS, Amazon EFS, and GlacierPART 4: Authentication and AuthorizationChapter 10: Securing AWS resources with Identity and Access Management (IAM)Chapter 11: Web Identity Federation and Amazon Cognito for User AuthenticationChapter 12: Protect Your Data Using Server-side and Client-side EncryptionPART 5: Creating SQL and NoSQL Database in AWS CloudChapter 13: AWS Relational Database ServicesChapter 14: AWS NoSQL Database Service -- DynamoDBPART 6: AWS Application Integration and ManagementChapter 15: Amazon Simple Queue Service and Simple Notifcation ServiceChapter 16: Simple Workflow Service, Amazon API Gateway and AWS Step FunctionsChapter 17: Monitoring Using Amazon CloudWatch, AWS CloudTrail, and AWS ConfigChapter 18: Infrastructure as Code Using AWS CloudFormationPART 7: Developing Cloud Native Applications in AWSChapter 19: Develop Serverless Application with LambdaChapter 20: Deploying a Static Website on Amazon S3 BucketChapter 21: Deploy Web Application Using Elastic BeanstalkChapter 22: Migrating Your Application and Database to AWSPART 8: Build, Deploy, and Debug Cloud ApplicationsChapter 23: Host Secure Repositories Using AWS CodeCommitChapter 24: Building an Application Using CodeBuildChapter 25: Deploying Application Using CodeDeploy and CodePipelineChapter 26: Building Scalable and Fault-Tolerant CI/CD PipelinePART 9: AppendicesAppendix A: AWS Certified Developer - Associate Exam Objective MapGlossary
£31.19
McGraw-Hill Education CompTIA Security Certification Study Guide Fourth
Book SynopsisThis fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ examWith hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+â Certification Study Guide, Fourth Edition covers what you need to knowâand shows you how to prepareâfor this challenging exam. 100% complete coverage of all official objectives for exam SY0-601 Exam Watch notes call attention to information about, and potential pitfalls in, the exam Inside the Exam sections in every chapter highlight key exam topics covered Two-Minute Drills for quick review at the end of every chapter Simulated exam questionsâincluding performance-based questionsâmatch the format, topics, and difficulty of the real exam Covers all exam topics, including:Networking Basics and Terminology â Security Terminology â Security Policies and Standards â Types of Attacks â VTable of Contents Networking Basics and Terminology Introduction to Security Terminology Security Policies and Standards Types of Attacks Vulnerabilities and Threats Mitigating Security Threats Implementing Host-based Security Securing the Network Infrastructure Wireless Networking and Security Authentication Authorization and Access Control Introduction to Cryptography Managing a Public Key Infrastructure Physical Security Application Attacks and Security Virtualization and Cloud Security Risk Analysis Disaster Recovery and Business Continuity Understanding Monitoring and Auditing Security Assessments and Audits Incident Response and Computer Forensics
£33.14
McGraw-Hill Education CEH Certified Ethical Hacker Practice Exams Fifth
Book SynopsisDonât Let the Real Test Be Your First Test!Fully updated for the CEH v11 exam objectives, this practical guide contains more than 550 realistic practice exam questions to prepare you for the EC-Councilâs Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. Designed to help you pass the exam, this is the perfect companion to CEHâ Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition.Covers all exam topics, including: Ethical hacking fundamentals Reconnaissance and footprinting Scanning and enumeration Sniffing and evasion Attacking a system Hacking web servers and applications Wireless network hacking Mobile, IoT, and OT Security in cloud computing Trojans and other attacks, including malware analysis Cryptography Social engineering
£29.44
McGraw-Hill Education CISSP Passport
Book SynopsisThis quick review study guide offers 100% coverage of every topic on the latest version of the CISSP examGet on the fast track to becoming CISSP certified with this affordable, portable study tool. Inside, cybersecurity instructor Bobby Rogers guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass (ISC)2 âs 2021 Certified Information Systems Security Professional exam, this certification passport is your ticket to success on exam day.Designed for focus on key topics and exam success: List of official exam objectives covered by domain Exam Tips offer expert pointers for success on the test Cautions highlight common pitfalls and real-world issues as well as provide warnings about the exam Tables, bulleted lists, and figures throughout focus on quick reference and review Cross-Reference elements point to an essential, related conce
£33.68
McGraw-Hill Education Mike Meyers CompTIA A Core 1 Certification
Book SynopsisAccelerated review of the 2022 version of the A+ Core 1 exam from CompTIAGet on the fast track to becoming CompTIA A+ certified with this affordable, portable study tool. Inside, certification training gurus Mike Meyers and Ron Gilster guide you on your exam preparation path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA A+ 220-1101 exam, this certification passport is your ticket to success on exam day.Inside: Quick-reference tables and illustrated laptop teardown enhance coverage of mobile devices (Exam 1101, Domain 1.0) Quick-reference tables help you master hardware troubleshooting (Exam 1101, Domain 5.0) Practice questions and content review after each objective prepare you for exam mastery Enhanced coverage of network laptop teardown, desktop hardware, and hardware and software troubleshooting Enhanced coverage of Windows 10/11, macO
£17.59
McGraw-Hill Education CompTIA Linux Certification AllinOne Exam Guide
Book SynopsisThis comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ examGet complete coverage of all the objectives included on CompTIA Linux+ exam XK0-005 from this up-to-date resource. Written by Linux experts and technology trainers, the book provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth answer explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including how to: Use the vi text editor Work with the Linux shell Manage Linux users, groups, files, and directories Administer ownership, permissions, and quotas Install Linux and manage the boot process Perform container operations and version control with Git Manage software and hardware Write shell scripts Manage network settings and s
£37.49
McGraw-Hill Education CC Certified in Cybersecurity AllinOne Exam Guide
Book SynopsisThis new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity examTake the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by a pair of cybersecurity experts and successful trainers, CC Certified in Cybersecurity All-in-One Exam Guide offers background material, detailed examples, and over 200 practice questions. Each exam domain is presented with information corresponding to the (ISC)2 certification exam outline. Using the trusted âœAll-in-Oneâ format, the book reviews every topic on the test and presents foundational knowledge and skills important for an entry-level cybersecurity role. You will get explanations and technical details on core concepts as well as stories, discussions, and anecdotes from real-world cybersecurity experts.Coverage includes: Security Principles Business Continuity (BC), Disaster Rec
£33.74
John Wiley & Sons Inc ISC2 CISSP Certified Information Systems Security
Book Synopsis
£49.50
Hodder Education Cambridge International A Level Information
Book SynopsisDevelop theoretical and practical IT skills with this comprehensive Student's Book written by experienced authors and examiners specially for the new Cambridge Assessment International Education AS & A Level IT syllabus (9626).
£38.08
O'Reilly Media Head First Java 3rd Edition
Book SynopsisWith this book, you'll learn the Java language with a unique method that goes beyond how-to manuals. Through puzzles, mysteries, and soul-searching interviews with famous Java objects, you'll quickly get up to speed on Java's fundamentals and advanced topics including lambdas, streams, generics, threading, networking, and the dreaded desktop GUI.
£47.99
SAP Press SAP Activate Project Management Certification
Book SynopsisPreparing for your SAP Activate project management exam? Make the grade with this certification study guide to C_ACTIVATE12! From agile project planning and delivery to new implementations and system conversions, this guide will review the technical and functional knowledge you need to pass with flying colours. Explore test methodology, key concepts for each topic area, and practice questions and answers. Your path to SAP Activate certification begins here!In this book, you'll learn about:The Test - Know what to expect on exam day so you can take your test with confidence. This guide follows the exact structure of the exam, so align your study of SAP Activate with the test objectives and walk through topics covered in C_ACTIVATE12. Core Content - Review major subject areas like SAP Activate elements, workstreams, new implementation, and system conversion. Then master important terminology and key takeaways for each subject. Q&A - After reviewing each chapter, solidify your knowledg
£72.76
SAP Press SAP Extension Suite Certification Guide
Book SynopsisPreparing for your SAP Extension Suite development associate exam? Make the grade with this certification study guide! From user interfaces to security, this guide will review the key technical knowledge you need to pass the test. Explore test methodology, key concepts for each topic area, and practice questions and answers. Your path to SAP Extension Suite certification begins here! Highlights include: 1) Exam C_CPE_13 2) SAP S/4HANA 3) SAP Extension Suite 4) SAP Integration Suite 5) SAP API Business Hub 6) SAP Business Application Studio 7) SAP Business Technology Platform (SAP BTP) 8) SAP Fiori 9) APIs 10) Continuous integration and continuous delivery (CI/CD) 11) Extensibility 12) Security
£72.76
Microsoft Press,U.S. Exam Ref 70-745 Implementing a Software-Defined
Book SynopsisPrepare for Microsoft Exam 70-745–and help demonstrate your real-world mastery of skills needed to build and manage software-defined infrastructure with Windows Server 2016 and System Center 2016 Virtual Machine Manager (SC VMM). Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSE level. Focus on the expertise measured by these objectives: • Plan and implement System Center Virtual Machine Manager (VMM) core infrastructure • Implement Software-Defined Networking (SDN) • Implement software-defined storage • Implement datacenter compute solutions with Virtual Machine Manager (VMM) • Secure your software-defined datacenter • Monitor and maintain the software-defined datacenter This Microsoft Exam Ref: • Organizes its coverage by exam objectives • Features strategic, what-if scenarios to challenge you • Assumes you have experience with System Center 2012 R2 Virtual Machine Manager and Windows Server 2016 networking, storage, Hyper-V, and Hyper-V Clusters About the Exam Exam 70-745 focuses on skills and knowledge for implementing a software-defined datacenter with Windows Server 2016 and Microsoft System Center 2016 Virtual Machine Manager (SCVMM). About Microsoft Certification Passing this exam earns you credit towards the Microsoft Certified Solutions Expert (MCSE): Cloud Platform and Infrastructure certification, validating that you have skills needed to run a highly efficient and modern data center, with expertise in cloud technologies, identity and systems management, virtualization, storage, and networking. See full details at: microsoft.com/learningTable of ContentsCHAPTER 1 Plan and implement System Center Virtual Machine Manager core infrastructure CHAPTER 2 Implement Software-Defined Networking (SDN) CHAPTER 3 Implement Software-Defined Storage CHAPTER 4 Implement Datacenter Compute Solutions with Virtual Machine Manager (VMM) CHAPTER 5 Secure your Software-Defined Datacenter CHAPTER 6 Monitor and maintain the Software-Defined Datacenter
£30.14
Microsoft Press,U.S. Exam Ref 70-347 Enabling Office 365 Services
Book SynopsisPrepare for Microsoft Exam 70-347--and help demonstrate your real-world mastery of the skills needed to help securely and efficiently provide Microsoft Office 365 services in any environment. Designed for experienced IT pros ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Manage clients and end-user devices Provision Microsoft SharePoint Online site collections Configure Microsoft Exchange Online and Skype for Business for end users Plan for Exchange Online and Skype for Business This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Provides exam preparation tips written by a top trainer, consultant, and sysadmin Assumes you have experience with the Office 365 Admin Center and an understanding of Exchange Online, Skype for Business, SharePoint Online, Office 365 ProPlus, and Microsoft Azure Active Directory Table of ContentsChapter 1:Manage clients and end-user devices• Manage user-driven client deployments• Manage IT deployments of Office 365 ProPlus• Set up telemetry and reporting• Plan for Office clients Chapter 2: Provision SharePoint Online site collections• Configure external user sharing• Create SharePoint site collection• Plan a collaboration solution Chapter 3:Configure Exchange Online and Skype Online for end users• Configure additional e-mail addresses for users• Create and manage external contacts, resources and groups• Configure personal archive policies• Configure Skype for Business Online end-user communication settings Chapter 4:Plan for Exchange Online and Skype for Business Online• Manage anti-malware and anti-spam policies• Recommend a mailbox migration strategy• Plan for Exchange Online• Manage Skype for Business
£26.54
Microsoft Press,U.S. Exam Ref 70-533 Implementing Microsoft Azure
Book SynopsisPrepare for the newest versions of Microsoft Exam 70-533–and help demonstrate your real-world mastery of implementing Microsoft Azure Infrastructure as a Service (IaaS). Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Design and implement Azure App Service Apps Create and manage compute resources, and implement containers Design and implement a storage strategy, including storage encryption Implement virtual networks, including new techniques for hybrid connections Design and deploy ARM Templates Manage Azure security and Recovery Services Manage Azure operations, including automation and data analysis Manage identities with Azure AD Connect Health, Azure AD Domain Services, and Azure AD single sign on This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are an IT professional with experience implementing and monitoring cloud and hybrid solutions and/or supporting application lifecycle management This book covers the 533 objectives as of December 2017. If there are updates for this book, you will find them at https://aka.ms/examref5332E/errata. About the Exam Exam 70-533 focuses on skills and knowledge for provisioning and managing services in Microsoft Azure, including: implementing infrastructure components such as virtual networks, virtual machines, containers, web and mobile apps, and storage; planning and managing Azure AD, and configuring Azure AD integration with on-premises Active Directory domains. About Microsoft Certification Passing this exam helps qualify you for MCSA: Cloud Platform Microsoft Certified Solutions Associate certification, demonstrating your expertise in applying Microsoft cloud technologies to reduce costs and deliver value. To earn this certification, you must also pass any one of the following exams: 70-532 Developing Microsoft Azure Solutions, or 70-534 Architecting Microsoft Azure Solutions, or 70-535, Architecting Microsoft Azure Solutions, or 70-537: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack.Table of ContentsChapter 1 Design and implement Azure App Service Web Apps Skill 1.1: Deploy web apps Skill 1.2: Configure web apps Skill 1.3: Configure diagnostics, monitoring, and analytics Skill 1.4: Configure web apps for scale and resilience Chapter 2 Create and manage Compute Resources Skill 2.1: Deploy workloads on Azure Resource Manager (ARM) virtual machines (VMs) Skill 2.2: Perform configuration management Skill 2.3: Design and implement VM Storage Skill 2.4: Monitor ARM VMs Skill 2.5: Manage ARM VM availability Skill 2.6 Scale ARM VMs Skill 2.7 Manage containers with Azure Container Services (ACS) Chapter 3 Design and implement a storage strategy Skill 3.1: Implement Azure Storage blobs and files Skill 3.2: Manage access Skill 3.3: Configure diagnostics, monitoring, and analytics Skill 3.4: Implement storage encryption Chapter 4 Implement Virtual Networks Skill 4.1: Configure Virtual Networks Skill 4.2: Design and implement multi-site or hybrid network connectivity Skill 4.3: Configure ARM VM Networking Skill 4.4: Design and implement a communication strategy Chapter 5 Design and deploy ARM templates Skill 5.1: Implement ARM templates Skill 5.2: Control access Skill 5.3: Design role-based access control (RBAC) Chapter 6 Manage Azure Security and Recovery Services Skill 6.1: Manage data protection and security compliance Skill 6.2: Implement recovery services Chapter 7 Manage Azure Operations Skill 7.1: Enhance cloud management with automation Skill 7.2: Collect and analyze data generated by resources in cloud and on-premises environments Chapter 8 Manage Azure Identities Skill 8.1: Monitor On-Premises Identity Infrastructure and Synchronization Services with Azure AD Connect Health Skill 8.2: Manage Domains with Active Directory Domain Services Skill 8.3: Integrate with Azure Active Directory (Azure AD) Skill 8.4: Implement Azure AD B2C and Azure AD B2B
£30.14
MC Press, LLC DB2 9 for z/OS Database Administration:
Book SynopsisIn order to become an IBM Certified Database Administrator - DB2 9 DBA for z/OS, you must pass two exams: DB2 9 Fundamentals Exam (Exam 730), and DB2 9 Database Administrator for z/OS (Exam 732)—the primary focus focus of this book.Written by two members of the team who participated in the actual writing of the exam, this specialized study guide covers every topic that you will need to know to pass Exam 732, including database design and implementation, operation and recovery, security and auditing, performance, as well as installation and migration/upgrade. But that is only the beginning. It also covers the new features of DB2 9 for both database and application development.This comprehensive guide includes an extensive set of practice questions in each chapter that closely model the actual exam, along with an answer key with a description of why the answer is the correct one. No other source gives you this much help in passing the exam.Whether you plan to take Exam 732 or just want to master the skills needed to be an effective database administrator on z/OS systems, this is the only book you’ll need.With the DB2 9 for z/OS Database Administration Certification Study Guide, you will:• Discover the changes to DB2 9 that you’ll need to know in order to be successful when taking the exam • Learn how to effectively administer a DB2 database • Receive an explanation of every objective included on the test…by someone involved in the creation of the actual exam • Find 85 practice questions based on the actual exam’s format and approach, along with comprehensive answers to help you gain understandingPublisher’s Note: While this book covers much of the information needed to prepare for Exam 730, a far more in-depth review of topics specifically related to Exam 730 can be found in the MC Press companion book: DB2 9 Fundamentals Certification Study Guide by Roger E. Sanders.Table of ContentsDB2 Product Fundamentals Environment Access and Security Database Objects Retrieving and Manipulating Database Objects Advanced SQL Coding Maintaining Data Recovery and Restart Data Sharing Using SQL in an Application Pogram Binding an Application Program Application Program Features Stored Procedures Accessing Distributed Data Advanced Functionality Locking and Concurrency Performance Monitoring and Tuning
£54.15
MC Press, LLC DB2 9 for Linux, UNIX, and Windows Database
Book SynopsisIn DB2 9 for Linux, UNIX, and Windows Database Administration Upgrade Certification Study Guide , Roger E. Sanders--one of the world's leading DB2 authors and an active participant in the development of IBM's DB2 certification exams--covers everything a reader needs to know to pass the short--but notoriously challenging--DB2 9 for LUW DBA Certification Upgrade exam (Exam 736). This specialized study guide steps you through all of the topics that are covered on the exam, including server management, data placement, XML concepts, activity analysis, high availability, database security, and much more. Everything new to DB2 9 that you will need to know in order to successfully pass the exam is covered in this book. Taking and passing the DB2 9 for LUW DBA Certification Upgrade exam (Exam 736) provides validation that you have mastered DB2 9. Passing this exam also earns you the IBM Certified Database Administrator or Advanced Database Administrator certification. This concentrated guide includes an extensive set of practice questions in each chapter that closely models the actual exam, along with an answer key with a full description of why the answer is the correct one. No other source gives you this much help in passing the exam. With the DB2 9 for Linux, UNIX, and Windows Database Administration Upgrade Certification Study Guide , you will: Gain the knowledge necessary to pass the DB2 9 for LUW DBA Upgrade Certification exam (Exam 736) Discover the changes to DB2 9 that you'll need to know in order to be successful when taking the exam Receive an explanation of every topic included on the test...by someone involved in the creation of the actual exam Find 60 practice questions based on the actual exam's format and approach, along with comprehensive answers to the test questions to help you gain understandingTable of ContentsChapter 1: IBM DB2 9 Certification Chapter 2: Server Management Chapter 3: Data Placement Chapter 4: XML Concepts Chapter 5: Analyzing DB2 Activity Chapter 6: High Availability Chapter 7: Security
£29.40
Pearson Education (US) Routing TCP/IP, Volume 1
Book SynopsisA detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1, Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.Table of Contents Chapter 1 TCP/IP Review Chapter 2 IPv6 Overview Chapter 3 Static Routing Chapter 4 Dynamic Routing Protocols Chapter 5 Routing Information Protocol (RIP) Chapter 6 RIPv2, RIPng, and Classless Routing Chapter 7 Enhanced Interior Gateway Routing Protocol (EIGRP) Chapter 8 OSPFv2 Chapter 9 OSPFv3 Chapter 10 Integrated IS-IS Chapter 11 Route Redistribution Chapter 12 Default Routes and On-Demand Routing Chapter 13 Route Filtering Chapter 14 Route Maps Appendix A Tutorial : Working with Binary and Hex Appendix B Tutorial : Access Lists Appendix C CCIE Preparation Tips Appendix D Answers to Review Questions Appendix E Solutions to Configuration Exercises Appendix F Solutions to Troubleshooting Exercises
£56.52
Pearson Education (US) CCENT Practice and Study Guide: Exercises,
Book SynopsisCCENT Practice and Study Guide is designed with dozens of exercises to help you learn the concepts and configurations crucial to your success with the Interconnecting Cisco Networking Devices Part 1 (ICND1 100-101) exam. The author has mapped the chapters of this book to the first two Cisco Networking Academy courses in the CCNA Routing and Switching curricula, Introduction to Networks and Routing and Switching Essentials. These courses cover the objectives of the Cisco Certified Networking Entry Technician (CCENT) certification. Getting your CCENT certification means that you have the knowledge and skills required to successfully install, operate, and troubleshoot a small branch office network. As a Cisco Networking Academy student or someone taking CCENT-related classes from professional training organizations, or college- and university-level networking courses, you will gain a detailed understanding of routing by successfully completing all the exercises in this book.Each chapter is designed with a variety of exercises, activities, and scenarios to help you: · Review vocabulary · Strengthen troubleshooting skills · Boost configuration skills · Reinforce concepts · Research and analyze topicsTable of Contents Part I: Introduction to Networks CHAPTER 1 Exploring the Network 1 Globally Connected 1 Vocabulary Exercise: Matching 2 Completion Exercise 3 LANs, WANs, and the Internet 3 Completion Exercise 3 Classify and Identify Network Components 5 Compare LANs and WANs 6 Vocabulary Exercise: Matching 7 The Network as a Platform 8 Classify Network Architecture Requirements 8 The Changing Network Environment 10 Completion Exercise 10 Network Security Terminology 11 CHAPTER 2 Configuring a Network Operating System 13 IOS Bootcamp 13 Completion Exercise 13 Accessing a Cisco IOS Device 14 Navigating the IOS Matching Exercise 15 Basic Device Configuration 16 Applying a Basic Configuration 16 CHAPTER 3 Network Protocols and Communications 19 Rules of Communication 19 Vocabulary Exercise: Matching 20 Network Protocols and Standards 21 Protocol Definitions: Matching 21 Mapping the Protocols of the TCP/IP Suite 22 Explore the Purpose of Standards Organizations 22 OSI Reference Model Layers: Matching 24 TCP/IP Model Layers: Matching 24 Mapping the Layers of the OSI and TCP/IP Models 25 Moving Data in the Network 26 Data Encapsulation and the PDUs 26 The Role of Addressing in Network Communications 27 CHAPTER 4 Network Access 29 Physical Layer Protocols 29 Completion Exercise 29 Vocabulary Exercise: Matching 31 Network Media 32 Copper Cabling Completion Exercise 32 Compare UTP, STP, and Coaxial Characteristics 32 UTP Cabling Completion Exercise 33 UTP Cable Pinouts 34 Fiber-Optic Cabling Completion Exercise 34 Compare Single-Mode and Multimode Fiber 35 Wireless Media Completion Exercise 36 Data Link Layer Protocols 37 The Sublayers of the Data Link Layer 37 Label the Generic Frame Fields 37 Identify the Data Link Layer Standards Organization 37 Media Access Control 38 Topologies and Access Methods Completion Exercise 38 Label the Ethernet Frame Fields 39 Label the PPP Frame Fields 40 Label the 802.11 Wireless Frame Fields 40 CHAPTER 5 Ethernet 41 Ethernet Protocol 41 Ethernet Operation Completion Exercise 41 Identify the Ethernet Frame Attributes: Matching 42 Comparing Decimal, Binary, and Hexadecimal Digits 43 Address Resolution Protocol 43 Completion Exercise 43 Identify the MAC and IP Addresses 44 LAN Switches 45 Building the MAC Address Table 45 Switching Concepts Completion Exercise 46 Comparing Switch Forwarding Methods 47 Forward the Frame 47 Layer 3 Switching Concepts Completion Exercise 50 Layer 3 Switch Configuration 51 CHAPTER 6 Network Layer 53 Network Layer Protocols 53 The Processes of the Network Layer 53 Characteristics of the IP Protocol 53 Fields of the IPv4 Packet: Matching 55 Fields of the IPv6 Packet: Matching 55 Routing 56 How a Host Routes Packets Completion Exercise 56 Routing Table Entry: Matching 58 Routers 58 Identify Router Components 58 Router Boot Process Exercise 59 Interpreting the show version Command Exercise 60 Configuring a Cisco Router 60 Basic Router Configuration Exercise 60 Applying a Basic Configuration 62 Verifying Basic Router Configuration 63 CHAPTER 7 Transport Layer 65 Transport Layer Protocols 65 Transportation of Data Completion Exercise 65 Introducing TCP and UDP 66 TCP and UDP 66 TCP Communication 67 UDP Communication 69 TCP or UDP, That Is the Question 69 CHAPTER 8 IP Addressing 71 IPv4 Network Addresses 71 IPv4 Address Structure 71 IPv4 Subnet Mask 72 The Last Nonzero Octet 73 ANDing to Determine the Network Address 73 IPv4 Unicast, Broadcast, and Multicast 74 Types of IPv4 Addresses 74 IPv6 Network Addresses 75 Representing IPv6 Addresses 76 Identify IPv6 Address Types 77 IPv6 Unicast Addresses 80 The 3-1-4 Rule 80 Static Configuration of Global Unicast Addressing 81 Dynamic Configuration of Global Unicast Addressing 81 IPv6 Multicast Addresses 82 Connectivity Verification 83 ICMP Message Types 83 Testing the Path 83 CHAPTER 9 Subnetting IP Networks 85 Subnetting an IPv4 Network 85 Subnetting in Four Steps 85 Subnetting Example 85 Determine How Many Bits to Borrow 85 Determine the New Subnet Mask 86 Determine the Subnet Multiplier 86 List the Subnets, Host Ranges, and Broadcast Addresses 87 Subnetting Scenario 1 87 Subnetting Scenario 2 87 Subnetting Scenario 3 88 VLSM Addressing Schemes 88 VLSM Review 89 VLSM Addressing Design Exercises 90 Exercise 1 91 Exercise 2 92 Exercise 3 93 Exercise 4 93 Design Considerations for IPv6 94 Subnetting an IPv6 Network 95 IPv6 Subnetting Practice 95 IPv6 Subnetting Scenario 1 95 IPv6 Subnetting Scenario 2 96 IPv6 Subnetting Scenario 3 96 CHAPTER 10 Application Layer 97 Application Layer Protocols 97 OSI and TCP/IP Model Comparison 97 Application and Presentation Protocols and Standards 98 How Application Protocols Interact with End-User Applications 98 Well-Known Application Layer Protocols and Services 99 Web and Mail Services 99 IP Addressing Services 100 File Sharing Services 102 The Message Heard Around the World 103 CHAPTER 11 It’s a Network 105 Create and Grow 105 Devices in a Small Network 105 Protocols in a Small Network 106 Growing to Larger Networks 107 Keeping the Network Safe 107 Network Device Security Measures 107 Vulnerabilities and Network Attacks 108 Mitigating Network Attacks 109 Securing Devices 110 Basic Network Performance 110 Using the ping Command 111 Tracing a Route 111 show Commands 112 Managing IOS Configuration Files 114 Integrated Routing Services 116 Part II: Routing and Switching Essentials CHAPTER 12 Introduction to Switched Networks 117 LAN Design 117 LAN Design Principles 117 Selecting Switch Hardware 119 The Switched Environment 120 Frame Forwarding Methods and Terminology 120 Building the MAC Address Table 120 Collision and Broadcast Domains 122 CHAPTER 13 Basic Switching Concepts and Configuration 125 Basic Switch Configuration 125 Switch Boot Sequence 125 Half-Duplex, Full-Duplex, and Auto-MDIX 125 Configure a Switch with Initial Settings 126 Basic Configuration Tasks 127 Applying a Basic Configuration 127 Verifying Basic Switch Configuration 129 Switch Security: Management and Implementation 129 Configuring SSH 129 Common Security Attacks 131 Configuring Port Security 132 Configuring NTP 134 NTP Commands 134 CHAPTER 14 VLANs 135 VLAN Segmentation 135 Overview of VLANs 135 VLANs in a Multiswitched Environment 136 VLAN Implementations 137 VLAN Configuration Exercise 137 Practice VLAN Configuration 141 VLAN Trunk Configuration Exercise 141 Practice Trunk Configuration 142 Dynamic Trunking Protocol 143 Troubleshoot VLANs and Trunks 144 VLAN Security and Design 146 Switch Spoofing Attack 146 Double-Tagging Attack 147 PVLAN Edge 147 CHAPTER 15 Routing Concepts 149 Initial Configuration of a Router 149 Functions of a Router 149 External Router Features 152 Topology and Addressing Documentation 154 Configure and Verify Dual-Stack IPv4 and IPv6 Addressing 156 Routing Decisions 161 Path Determination 162 Concept of Administrative Distance Exercise 164 Switching Packets Between Networks 164 Router Operation 165 Analyze the Routing Table 165 Directly Connected, Static, and Dynamic Routes 167 CHAPTER 16 Inter-VLAN Routing 171 Inter-VLAN Routing Configuration 171 Types of Inter-VLAN Routing 171 Configuring Inter-VLAN Routing 172 Troubleshoot Inter-VLAN Routing 174 Inter-VLAN Troubleshooting Scenarios 174 Layer 3 Switching 176 Layer 3 Switching Operation 176 Configuring Static Routes on a Catalyst 2960 177 Layer 3 Switching Troubleshooting Scenarios 179 CHAPTER 17 Static Routing 183 Static Routing Implementation 183 Static Routing Overview 183 Identify Types of Static Routes 184 Configure Static and Default Routes 185 Configuring IPv4 Static and Default Routes 185 B1 and B2 Routing Strategy 186 Configuring IPv6 Static and Default Routes 187 B1 and B2 Routing Strategy 187 Review of CIDR and VLSM 188 Classful Addressing 189 CIDR and Route Summarization 189 Summary Route Calculation Scenario 1 190 Summary Route Calculation Scenario 2 191 Summary Route Calculation Scenario 3 191 Configure Summary and Floating Static Routes 191 Configure IPv4 Summary Routes 192 Configure IPv6 Summary Routes 192 Configure Floating Static Routes 194 Troubleshoot Static and Default Route Issues 195 IPv4 Static and Default Route Implementation 195 IPv6 Static and Default Route Implementation 195 CHAPTER 18 Routing Dynamically 197 Dynamic Routing Protocols 197 Dynamic Routing Protocol Operation 197 Compare Static and Dynamic Routing 197 From Cold Start to Convergence 198 Dynamic Routing Protocols Classification Chart 200 Routing Protocols Characteristics 201 Comparing Routing Protocol Characteristics 202 Distance Vector Dynamic Routing 202 Distance Vector Operation and Terminology 202 Comparing RIP and EIGRP 204 RIP and RIPng Routing 204 Configuring RIPv2 204 Configuring RIPng 206 Link-State Dynamic Routing 208 Link-State Routing Protocol Operation 208 Building the Link-State Database 210 Using Link-State Routing Protocols 214 The Routing Table 214 Identifying Elements of the Routing Table 214 Dynamically Learned IPv4 Routes 215 The IPv4 Route Lookup Process 217 Routing Table Lookup Chart 217 Routing Table Lookup Exercise 218 Analyze an IPv6 Routing Table 219 CHAPTER 19 Single-Area OSPF 221 Characteristics of OSPF 221 OSPF Terminology 222 OSPF Concepts 223 OSPF Operation 224 Configuring Single-Area OSPFv2 227 The Router ID 228 Single-Area OSPFv2 Basic Configuration Scenario 229 Adjusting OSPF Cost 231 The Reference Bandwidth 231 The Default Interface Bandwidth 232 Modifying the OSPF Cost Metric 232 Verify the OSPF Configuration 233 Configure Single-Area OSPFv3 233 Comparing OSPFv2 and OSPFv3 233 Configuring OSPFv3 234 Verifying OSPFv3 236 CHAPTER 20 Access Control Lists 237 IP ACL Operation 237 Standard Versus Extended IPv4 ACLs 237 Calculating Wildcard Masks 237 Wildcard Mask in Operation 238 Guidelines for ACL Creation 239 Guidelines for ACL Placement 240 Standard IPv4 ACLs 240 Configuring Standard IPv4 ACLs 241 Modifying IPv4 ACLs 244 Securing vty Ports with a Standard IPv4 ACL 245 Extended IPv4 ACLs 245 Configuring Extended IPv4 ACL Statements 245 Extended ACL Configuration Scenarios 246 Evaluating Extended IPv4 ACL Statements 247 Extended ACL Quiz 248 Troubleshoot ACLs 251 IPv6 ACLs 252 Comparing IPv4 and IPv6 ACLs 252 Configuring IPv6 ACLs 252 CHAPTER 21 DHCP 255 Dynamic Host Configuration Protocol v4 255 DHCPv4 Operation 255 Configuring a Cisco Device as a DHCPv4 Server 256 Configuring a Router to Relay DHCPv4 Requests 258 Configuring a Router as a DHCPv4 Client 259 Troubleshooting DHCPv4 259 Dynamic Host Configuration Protocol v6 260 SLAAC and DHCPv6 260 Configuring a Router as a Stateless DHCPv6 Server 262 Configuring a Router as a Stateful DHCPv6 Server 263 CHAPTER 22 Network Address Translation for IPv4 265 NAT Operation 265 NAT Characteristics 265 Configuring NAT 267 Configuring Static NAT 267 Configuring Dynamic NAT 268 Configuring Port Address Translation 269 A Word About Port Forwarding 272 Configuring NAT and IPv6 272 Troubleshooting NAT 273 9781587133459, TOC, 11/22/2013
£19.05
Pearson Education (US) CCNP SWITCH Lab Manual
Book SynopsisThe only authorized Lab Manual for the Cisco Networking Academy CCNP Version 7 SWITCH course A CCNP certification equips students with the knowledge and skills needed to plan, implement, secure, maintain, and troubleshoot converged enterprise networks. The CCNP certification requires candidates to pass three 120-minute exams–ROUTE 300-101, SWITCH 300-115, TSHOOT 300-135–that validate the key competencies of network engineers. The Cisco Networking Academy curriculum consists of three experience-oriented courses that employ industry-relevant instructional approaches to prepare students for professional-level jobs: CCNP ROUTE: Implementing IP Routing, CCNP SWITCH: Implementing IP Switching, and CCNP TSHOOT: Maintaining and Troubleshooting IP Networks. This course teaches students how to implement, monitor, and maintain switching in converged enterprise campus networks. Students will learn how to plan, configure, and verify the implementation of complex enterprise switching solutions. The course also covers the secure integration of VLANs, WLANs, voice, and video into campus networks. Comprehensive labs emphasize hands-on learning and practice to reinforce configuration skills. The 15 comprehensive labs in this manual emphasize hands-on learning and practice to reinforce configuration skills. Table of Contents Chapter 1: Fundamentals Review Lab 1-1 Preparing the Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Network Design Fundamentals No labs in this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Chapter 3: Campus Network Architecture Lab 3-1 Static VLANS, Trunking, and VTP. . . . . . . . . . . . . . . . . . . . . . . . . . 9 Lab 3-2 EtherChannel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Chapter 4: Spanning-tree In-depth Lab 4-1 Implement Spanning Tree Protocols . . . . . . . . . . . . . . . . . . . . . . . . 38 Lab 4-2 Multiple Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Chapter 5: InterVLAN Routing Lab 5-1 Inter-VLAN Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Lab 5-2 DHCP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . 81 Chapter 6: First Hop Redundancy Lab 6-1 First Hop Redundancy Protocols - HSRP and VRRP. . . . . . . . . . . . . . . . . . 88 Lab 6-2 Hot Standby Router Protocol for IPV6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Lab 6-3 Gateway Load Balancing Protocol (GLBP) . . . . . . . . . . . . . . . . . . . 118 Chapter 7: Network Management Lab 7-1 Synchronizing Campus Network Devices using Network Time Protocol (NTP). .. 138 Lab 7-2 Configure Campus Network Devices to Support Simple Network Management Protocol (SNMPv3). . . . . . . 151 Chapter 8: Switching Features and Technologies Lab 8-1 IP Service Level Agreements and Remote SPAN in a Campus Environment. . .. . 162 Chapter 9: High-Availability No labs in this chapter . . . . . . . . . . . . . 177 Chapter 10: Campus Network Security Lab 10-1 Securing Layer 2 Switches. . . . . . . . 178 Lab 10-2 Securing VLANs . . . . . . . . .. . . . . . . . . 201
£29.76
Pearson Education (US) Investigating the Cyber Breach: The Digital
Book SynopsisInvestigating the Cyber Breach The Digital Forensics Guide for the Network Engineer · Understand the realities of cybercrime and today’s attacks · Build a digital forensics lab to test tools and methods, and gain expertise · Take the right actions as soon as you discover a breach · Determine the full scope of an investigation and the role you’ll play · Properly collect, document, and preserve evidence and data · Collect and analyze data from PCs, Macs, IoT devices, and other endpoints · Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence · Analyze iOS and Android devices, and understand encryption-related obstacles to investigation · Investigate and trace email, and identify fraud or abuse · Use social media to investigate individuals or online identities · Gather, extract, and analyze breach data with Cisco tools and techniques · Walk through common breaches and responses from start to finish · Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.Table of ContentsIntroduction xix Chapter 1 Digital Forensics 1 Defining Digital Forensics 3 Engaging Forensics Services 4 Reporting Crime 7 Search Warrant and Law 9 Forensic Roles 13 Forensic Job Market 15 Forensic Training 16 Summary 23 References 24 Chapter 2 Cybercrime and Defenses 25 Crime in a Digital Age 27 Exploitation 31 Adversaries 34 Cyber Law 36 Summary 39 Reference 39 Chapter 3 Building a Digital Forensics Lab 41 Desktop Virtualization 42 VMware Fusion 43 VirtualBox 44 Installing Kali Linux 44 Attack Virtual Machines 52 Cuckoo Sandbox 56 Virtualization Software for Cuckoo 58 Installing TCPdump 58 Creating a User on VirtualBox for Cuckoo 59 Binwalk 60 The Sleuth Kit 61 Cisco Snort 62 Windows Tools 67 Physical Access Controls 68 Storing Your Forensics Evidence 71 Network Access Controls 72 Jump Bag 74 Summary 74 References 75 Chapter 4 Responding to a Breach 77 Why Organizations Fail at Incident Response 78 Preparing for a Cyber Incident 80 Defining Incident Response 81 Incident Response Plan 82 Assembling Your Incident Response Team 84 When to Engage the Incident Response Team 85 Outstanding Items that Often Get Missed with Incident Response 88 Phone Tree and Contact List 88 Facilities 89 Responding to an Incident 89 Assessing Incident Severity 91 Following Notification Procedures 92 Employing Post-Incident Actions and Procedures 93 Identifying Software Used to Assist in Responding to a Breach 93 Trend Analysis Software 94 Security Analytics Reference Architectures 94 Other Software Categories 97 Summary 97 References 98 Chapter 5 Investigations 99 Pre-Investigation 100 Opening a Case 102 First Responder 105 Device Power State 110 Search and Seizure 113 Chain of Custody 118 Network Investigations 121 Forensic Reports 127 Case Summary 129 Example 129 Acquisition and Exam Preparation 129 Example 129 Findings 130 Example 130 Conclusion 130 Example 131 List of Authors 131 Example 131 Closing the Case 132 Critiquing the Case 136 Summary 139 References 139 Chapter 6 Collecting and Preserving Evidence 141 First Responder 141 Evidence 144 Autopsy 145 Authorization 147 Hard Drives 148 Connections and Devices 150 RAID 152 Volatile Data 153 DumpIt 154 LiME 154 Volatility 156 Duplication 158 dd 161 dcfldd 161 ddrescue 162 Netcat 162 Guymager 163 Compression and Splitting 164 Hashing 166 MD5 and SHA Hashing 168 Hashing Challenges 169 Data Preservation 170 Summary 172 References 172 Chapter 7 Endpoint Forensics 173 File Systems 174 Locating Data 178 Unknown Files 180 Windows Registry 182 Deleted Files 185 Windows Recycle Bin 187 Shortcuts 189 Printer Spools 190 Slack Space and Corrupt Clusters 191 Alternate Data Streams 196 Mac OS X 198 OS X Artifacts 199 Log Analysis 202 IoT Forensics 207 Summary 210 References 211 Chapter 8 Network Forensics 213 Network Protocols 214 Security Tools 215 Firewall 219 Intrusion Detection and Prevention System 219 Content Filter 219 Network Access Control 220 Packet Capturing 223 NetFlow 224 Sandbox 225 Honeypot 226 Security Information and Event Manager (SIEM) 228 Threat Analytics and Feeds 229 Security Tool Summary 229 Security Logs 229 Network Baselines 233 Symptoms of Threats 235 Reconnaissance 235 Exploitation 238 Malicious Behavior 242 Beaconing 244 Brute Force 249 Exfiltration 250 Other Indicators 254 Summary 255 References 255 Chapter 9 Mobile Forensics 257 Mobile Devices 258 Investigation Challenges 258 iOS Architecture 259 iTunes Forensics 261 iOS Snapshots 263 How to Jailbreak the iPhone 265 Android 266 PIN Bypass 270 How to Brute Force Passcodes on the Lock Screen 271 Forensics with Commercial Tools 272 Call Logs and SMS Spoofing 274 Voicemail Bypass 275 How to Find Burner Phones 276 SIM Card Cloning 278 Summary 279 Reference 279 Chapter 10 Email and Social Media 281 A Message in a Bottle 281 Email Header 283 Social Media 288 People Search 288 Google Search 293 Facebook Search 297 Summary 304 References 305 Chapter 11 Cisco Forensic Capabilities 307 Cisco Security Architecture 307 Cisco Open Source 310 Cisco Firepower 312 Cisco Advanced Malware Protection (AMP) 313 Cisco Threat Grid 319 Cisco Web Security Appliance 322 Cisco CTA 323 Meraki 324 Email Security Appliance 326 Cisco Identity Services Engine 328 Cisco Stealthwatch 331 Cisco Tetration 335 Cisco Umbrella 337 Cisco Cloudlock 342 Cisco Network Technology 343 Summary 343 Reference 343 Chapter 12 Forensic Case Studies 345 Scenario 1: Investigating Network Communication 346 Pre-engagement 347 Investigation Strategy for Network Data 348 Investigation 350 Closing the Investigation 355 Scenario 2: Using Endpoint Forensics 357 Pre-engagement 357 Investigation Strategy for Endpoints 358 Investigation 359 Potential Steps to Take 360 Closing the Investigation 362 Scenario 3: Investigating Malware 364 Pre-engagement 364 Investigation Strategy for Rogue Files 365 Investigation 365 Closing the Investigation 369 Scenario 4: Investigating Volatile Data 370 Pre-engagement 371 Investigation Strategy for Volatile Data 372 Investigation 373 Closing the Investigation 375 Scenario 5: Acting as First Responder 377 Pre-engagement 377 First Responder Strategy 377 Closing the Investigation 379 Summary 381 References 382 Chapter 13 Forensic Tools 383 Tools 384 Slowloris DDOS Tool: Chapter 2 385 Low Orbit Ion Cannon 386 VMware Fusion: Chapter 3 386 VirtualBox: Chapter 3 387 Metasploit: Chapter 3 388 Cuckoo Sandbox: Chapter 3 389 Cisco Snort: Chapter 3 389 FTK Imager: Chapters 3, 9 390 FireEye Redline: Chapter 3 391 P2 eXplorer: Chapter 3 392 PlainSight: Chapter 3 392 Sysmon: Chapter 3 393 WebUtil: Chapter 3 393 ProDiscover Basics: Chapter 3 393 Solarwinds Trend Analysis Module: Chapter 4 394 Splunk: Chapter 4 394 RSA Security Analytics: Chapter 4 395 IBM’s QRadar: Chapter 4 396 HawkeyeAP: Chapter 4 396 WinHex: Chapters 6, 7 396 OSForensics: Chapter 6 397 Mount Image Pro: Chapter 6 397 DumpIt: Chapter 6 398 LiME: Chapter 6 398 TrIDENT: Chapter 7 398 PEiD: Chapter 7 399 Lnkanalyser: Chapter 7 399 Windows File Analyzer: Chapter 7 399 LECmd: Chapter 7 401 SplViewer: Chapter 7 401 PhotoRec: Chapter 7 402 Windows Event Log: Chapter 7 402 Log Parser Studio: Chapter 7 403 LogRhythm: Chapter 8 403 Mobile Devices 404 Elcomsoft: Chapter 9 404 Cellebrite: Chapter 9 404 iPhone Backup Extractor: Chapter 9 405 iPhone Backup Browser: Chapter 9 405 Pangu: Chapter 9 405 KingoRoot Application: Chapter 9 405 Kali Linux Tools 406 Fierce: Chapter 8 406 TCPdump: Chapter 3 406 Autopsy and Autopsy with the Sleuth Kit: Chapters 3, 6 406 Wireshark: Chapter 8 406 Exiftool: Chapter 7 407 DD: Chapter 6 407 Dcfldd: Chapter 6 408 Ddrescue: Chapter 6 408 Netcat: Chapter 6 408 Volatility: Chapter 6 408 Cisco Tools 408 Cisco AMP 408 Stealthwatch: Chapter 8 409 Cisco WebEx: Chapter 4 409 Snort: Chapter 11 409 ClamAV: Chapter 10 409 Razorback: Chapter 10 410 Daemonlogger: Chapter 10 410 Moflow Framework: Chapter 10 410 Firepower: Chapter 10 410 Threat Grid: Chapter 10 410 WSA: Chapter 10 410 Meraki: Chapter 10 411 Email Security: Chapter 10 411 ISE: Chapter 10 411 Cisco Tetration: Chapter 10 411 Umbrella: Chapter 10 411 Norton ConnectSafe: No Chapter 412 Cloudlock: Chapter 10 412 Forensic Software Packages 413 FTK Toolkit: Chapter 3 413 X-Ways Forensics: Chapter 3 413 OSforensics: Chapter 6 414 EnCase: Chapter 7 414 Digital Forensics Framework (DFF): Chapter 7 414 Useful Websites 414 Shodan: Chapter 1 414 Wayback Machine: Chapter 3 415 Robot.txt files: Chapter 2 415 Hidden Wiki: Chapter 2 415 NIST: Chapter 4 416 CVE: Chapter 4 416 Exploit-DB: Chapter 4 416 Pastebin: Chapters 4, 10 416 University of Pennsylvania Chain of Custody Form: Chapter 6 417 List of File Signatures: Chapter 9 417 Windows Registry Forensics Wiki: Chapter 7 417 Mac OS Forensics Wiki: Chapter 7 417 Miscellaneous Sites 417 Searchable FCC ID Database 418 Service Name and Transport Protocol Port Number Registry 418 NetFlow Version 9 Flow-Record Format 418 NMAP 418 Pwnable 418 Embedded Security CTF 419 CTF Learn 419 Reversing.Kr 419 Hax Tor 419 W3Challs 419 RingZer0 Team Online CTF 420 Hellbound Hackers 420 Over the Wire 420 Hack This Site 420 VulnHub 420 Application Security Challenge 421 iOS Technology Overview 421 Summary 421 9781587145025 TOC 1/10/2017
£33.29
Pearson Education (US) Implementing Cisco IP Routing (ROUTE) Foundation
Book SynopsisNow updated for Cisco’s new ROUTE 300-101 exam, Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide is your Cisco® authorized learning tool for CCNP® or CCDP® preparation. Part of the Cisco Press Foundation Learning Series, it teaches you how to plan, configure, maintain, and scale a modern routed network. Focusing on Cisco routers connected in LANs and WANs at medium-to-large network sites, the authors show how to select and implement Cisco IOS services for building scalable, routed networks. They examine basic network and routing protocol principles in detail; introduce both IPv4 and IPv6; fully review EIGRP, OSPF, and BGP; explore enterprise Internet connectivity; cover routing updates and path control; and present today’s router security best practices. Each chapter opens with a list of topics that clearly identifies its focus. Each chapter ends with a summary of key concepts for quick study, as well as review questions to assess and reinforce your understanding. Throughout, configuration and verification output examples illustrate critical issues in network operation and troubleshooting. This guide is ideal for all certification candidates who want to master all the topics covered on the ROUTE 300-101 exam. Serves as the official book for the newest version of the Cisco Networking Academy CCNP ROUTE course Includes all the content from the newest Learning@Cisco ROUTE course and information on each of the ROUTE exam topics Compares basic routing protocol features and limitations Examines RIPv2 and RIPng Covers EIGRP operation and implementation for both IPv4 and IPv6 Explores OSPFv2 implementation, and OSPFv3 for both IPv4 and IPv6 Discusses network performance optimization via routing updates Introduces path control with Cisco Express Forwarding (CEF) switching, policy-based routing (PBR), and service level agreements (SLAs) Addresses enterprise Internet connectivity via single or redundant ISP connections Explains BGP terminology, concepts, operation, configuration, verification, and troubleshooting Covers securing the management plane of Cisco routers using authentication and other recommended practices Presents self-assessment review questions, chapter objectives, and summaries to facilitate effective studying Table of ContentsIntroduction xxv Chapter 1 Basic Network and Routing Concepts 1 Differentiating Routing Protocols 2 Enterprise Network Infrastructure 2 Role of Dynamic Routing Protocols 3 Choosing a of Dynamic Routing Protocols 5 IGP versus EGP 5 Types of Routing Protocols 7 Convergence 8 Route Summarization 9 Route Protocol Scalability 10 Understanding Network Technologies 10 Traffic Types 11 IPv6 Address Types 13 ICMPv6 Neighbor Discovery 14 Network Types 15 NBMA Networks 16 Routing Over the Internet 18 Connecting Remote Locations with Headquarters 18 Principles of Static Routing 19 Configuring an IPv4 Static Route 20 Configuring a Static Default Route 22 Basic PPP Overview 23 PPP Authentication Overview 23 PPPoE 26 Basic Frame Relay Overview 28 VPN Connectivity Overview 31 MPLS-based VPNs 31 Tunneling VPNs 32 Hybrid VPNs 32 Routing Across MPLS VPNs 32 Routing Over GRE Tunnel 34 Dynamic Multipoint Virtual Private Network 35 Multipoint GRE 36 NHRP 37 IPsec 39 Routing and TCP/IP Operations 40 MSS, Fragmentation, and PMTUD 40 IPv4 Fragmentation and PMTUD 41 Bandwidth Delay Product 41 TCP Starvation 42 Latency 42 ICMP Redirect 42 Implementing RIPng 43 RIP Overview 43 RIPv2 Overview 45 Configuring RIPng 47 Basic RIPng Configuration 47 Propagating a Default Route 50 Investigating the RIPng Database 53 Summary 55 Review Questions 56 Chapter 2 EIGRP Implementation 59 Establishing EIGRP Neighbor Relationships 60 EIGRP Features 60 EIGRP Features 62 EIGRP Operation Overview 63 Configuring and Verifying Basic EIGRP for IPv4 64 Manipulating EIGRP Timers 73 EIGRP Neighbor Relationship over Frame Relay 74 Establishing EIGRP over Layer 3 MPLS VPN 74 Establishing EIGRP over Layer 2 MPLS VPN 75 Building the EIGRP Topology Table 76 Building and Examining the EIGRP Topology Table 77 Choosing the Best Path 80 Exchange of Routing Knowledge in EIGRP 88 EIGRP Metric 88 EIGRP Metric Calculation 89 EIGRP Wide Metrics 90 EIGRP Metric Calculation Example 90 EIGRP Metric Calculation Example 91 EIGRP Path Calculation Example 92 Optimizing EIGRP Behavior 94 EIGRP Queries 95 EIGRP Stub Routers 96 Configuring EIGRP Stub Routing 97 EIGRP Stub Options 100 Stuck in Active 108 Reducing Query Scope by Using Summary Routes 109 Configuring EIGRP Summarization 110 Determining the Summary Route 116 Obtaining Default Route 120 Load Balancing with EIGRP 123 Configuring EIGRP Load Balancing 123 EIGRP Load Balancing 124 EIGRP Load Balancing Across Unequal-Metric Paths 126 Configuring EIGRP for IPv6 128 Overview of EIGRP for IPv6 128 Configuring and Verifying EIGRP for IPv6 129 EIGRP for IPv6 Configuration 130 Determining the IPv6 Summary Route 134 Named EIGRP Configuration 136 Introduction to Named EIGRP Configuration 136 Configuring Named EIGRP 137 Address Families 139 EIGRP for IPv4 Address Family 139 EIGRP for IPv6 Address Family 142 Named EIGRP Configuration Modes 148 Classic Versus Named EIGRP Configuration 150 Summary 151 Review Questions 152 Chapter 3 OSPF Implementation 155 Establishing OSPF Neighbor Relationships 155 OSPF Features 156 OSPF Operation Overview 157 Hierarchical Structure of OSPF 158 Design Restrictions of OSPF 160 OSPF Message Types 160 Basic OSPF Configuration 161 Optimizing OSPF Adjacency Behavior 170 Using OSPF Priority in the DR/BDR Election 174 OSPF Behavior in NBMA Hub-and-Spoke Topology 175 The Importance of MTU 177 Manipulating OSPF Timers 179 OSPF Neighbor Relationship over Point-to-Point Links 182 OSPF Neighbor Relationship over Layer 3 MPLS VPN 182 OSPF Neighbor Relationship over Layer 2 MPLS VPN 184 OSPF Neighbor States 184 OSPF Network Types 186 Configuring Passive Interfaces 187 Building the Link-State Database 187 OSPF LSA Types 188 Examining the OSPF Link-State Database 189 OSPF Link-State Database 190 OSPF Type 2 Network LSA 196 OSPF Type 3 Summary LSA 197 OSPF Type 4 ASBR Summary LSA 199 OSPF Type 5 External LSA 201 Periodic OSPF Database Changes 203 Exchanging and Synchronizing LSDBs 204 Synchronizing the LSDB on Multiaccess Networks 206 Running the SPF Algorithm 207 Configuring OSPF Path Selection 208 OSPF Path Selection 208 OSPF Best Path Calculation 210 Default OSPF Costs 211 Calculating the Cost of Intra-Area Routes 214 Calculating the Cost of Interarea Routes 214 Selecting Between Intra-Area and Interarea Routes 215 Optimizing OSPF Behavior 215 OSPF Route Summarization 216 Benefits of Route Summarization 217 Configuring OSPF Route Summarization 218 Summarization on ABRs 223 Summarization on ASBRs 224 OSPF Virtual Links 225 Configuring OSPF Virtual Links 227 Configuring OSPF Stub Areas 229 OSPF Stub Areas 230 OSPF Totally Stubby Areas 234 Cost of the Default Route in a Stub Area 236 The default-information originate Command 237 Other Stubby Area Types 238 OSPFv3 239 Configuring OSPFv3 240 Implementing OSPFv3 241 OSPFv3 for IPv4 and IPv6 246 Configuring Advanced OSPFv3 260 OSPFv3 Caveats 261 Summary 262 Review Questions 263 Chapter 4 Manipulating Routing Updates 267 Using Multiple IP Routing Protocols on a Network 267 Why Run Multiple Routing Protocols? 269 Running Multiple Routing Protocols 269 Administrative Distance 269 Multiple Routing Protocols Solutions 270 Implementing Route Redistribution 270 Defining Route Redistribution 270 Planning to Redistribute Routes 271 Redistributing Routes 271 Seed Metrics 272 Default Seed Metrics 273 Configuring and Verifying Basic Redistribution in IPv4 and IPv6 275 Redistributing OSPFv2 Routes into the EIGRP Routing Domain 276 Redistributing OSPFv3 Routes into the EIGRP for IPv6 Routing Domain 279 Redistributing EIGRP Routes into the OSPFv2 Routing Domain 281 Redistributing EIGRP for IPv6 Routes into the OSPFv3 Routing Domain 285 Types of Redistribution Techniques 287 One-Point Redistribution 287 Multipoint Redistribution 288 Redistribution Problems 289 Preventing Routing Loops in a Redistribution Environment 291 Verifying Redistribution Operation 292 Controlling Routing Update Traffic 292 Why Filter Routes? 292 Route Filtering Methods 293 Using Distribute Lists 294 Configuring Distribute Lists 294 Distribute List and ACL Example 295 Using Prefix Lists 297 Prefix List Characteristics 297 Configuring Prefix Lists 298 Distribute List and Prefix List Example 299 Prefix List Examples 300 Verifying Prefix Lists 301 Manipulating Redistribution Using ACLs, Prefix Lists, and Distribute Lists 302 Using Route Maps 305 Understanding Route Maps 305 Route Map Applications 305 Configuring Route Maps 306 Route Map Match and Set Statements 308 Configuring Route Redistribution Using Route Maps 310 Using Route Maps with Redistribution 310 Manipulating Redistribution Using Route Maps 311 Mutual Redistribution without Route Filtering 312 Mutual Redistribution with Route Maps 313 Change Administrative Distance to Enable Optimal Routing 315 Manipulating Redistribution Using Route Tagging 318 Caveats of Redistribution 319 Summary 320 References 323 Review Questions 323 Chapter 5 Path Control Implementation 327 Using Cisco Express Forwarding Switching 327 Control and Data Plane 328 Cisco Switching Mechanisms 328 Process and Fast Switching 332 Cisco Express Forwarding 333 Analyzing Cisco Express Forwarding 335 Verify the Content of the CEF Tables 335 Enable and Disable CEF by Interface and Globally 341 Understanding Path Control 343 The Need for Path Control 343 Implementing Path Control Using Policy-Based Routing 344 PBR Features 344 Steps for Configuring PBR 345 Configuring PBR 346 Verifying PBR 348 Configuring PBR Example 348 Implementing Path Control Using Cisco IOS IP SLAs 354 PBR and IP SLA 354 IP SLA Features 354 Steps for Configuring IP SLAs 356 Verifying Path Control Using IOS IP SLAs 360 Configuring IP SLA Example 361 Configuring PBR and IP SLA Example 364 Summary 369 References 370 Review Questions 370 Chapter 6 Enterprise Internet Connectivity 373 Planning Enterprise Internet Connectivity 374 Connecting Enterprise Networks to an ISP 374 Enterprise Connectivity Requirements 374 ISP Redundancy 375 Public IP Address Assignment 376 The Internet Assigned Numbers Authority 376 Regional Internet Registries 377 Public IP Address Space 377 Autonomous System Numbers 378 Establishing Single-Homed IPv4 Internet Connectivity 381 Configuring a Provider-Assigned IPv4 Address 381 DHCP Operation 382 Obtaining a Provider-Assigned IPv4 Address with DHCP 383 Configuring a Router as a DHCP Server and DHCP Relay Agent 384 NAT 385 Configuring Static NAT 388 Configuring Dynamic NAT 389 Configuring PAT 390 Limitations of NAT 392 NAT Virtual Interface 393 Configuring NAT Virtual Interface 393 Verifying NAT Virtual Interface 396 Establishing Single-Homed IPv6 Internet Connectivity 398 Obtaining a Provider-Assigned IPv6 Address 398 Manual Assignment 399 Configuring Basic IPv6 Internet Connectivity 399 Stateless Address Autoconfiguration 401 DHCPv6 Operation 402 Stateless DCHPv6 403 Stateful DHCPv6 404 DHCPv6 Prefix Delegation 405 NAT for IPv6 405 NAT64 405 NPTv6 405 IPv6 ACLs 405 IPv6 ACL Characteristics 406 Configuring IPv6 ACLs 406 Securing IPv6 Internet Connectivity 409 Improving Internet Connectivity Resilience 410 Drawbacks of a Single-Homed Internet Connectivity 410 Dual-Homed Internet Connectivity 410 Dual-Homed Connectivity Options 411 Configuring Best Path for Dual-Homed Internet Connectivity 411 Multihomed Internet Connectivity 413 Summary 415 References 417 Review Questions 418 Chapter 7 BGP Implementation 423 BGP Terminology, Concepts, and Operation 424 BGP Use Between Autonomous Systems 424 Comparison with Other Scalable Routing Protocols 425 BGP Path Vector Characteristics 426 BGP Characteristics 428 BGP Tables 430 BGP Message Types 431 Open and Keepalive Messages 431 Update Messages 433 Notification Messages 433 When to Use BGP 433 When Not to Use BGP 434 Implementing Basic BGP 435 BGP Neighbor Relationships 435 External BGP Neighbors 436 Internal BGP Neighbors 437 iBGP on All Routers in a Transit Path 438 Basic BGP Configuration Requirements 442 Entering BGP Configuration Mode 442 Defining BGP Neighbors and Activating BGP Sessions 443 Basic BGP Configuration and Verification 444 Configuring and Verifying an eBGP Session 445 Configuring and Verifying an iBGP Session 449 Advertising Networks in BGP and Verifying That They Are Propagated 450 Using the Next-Hop-Self Feature 457 Understanding and Troubleshooting BGP Neighbor States 458 BGP Session Resilience 460 Sourcing BGP from Loopback Address 461 eBGP Multihop 463 Resetting BGP Sessions 464 BGP Attributes and the Path-Selection Process 467
£49.94
Manning Publications Acing the Certified Kubernetes Administrator Exam
Book SynopsisLearn the hands-on skills you need to ace the Kubernetes exam and boost your career by becoming a Certified Kubernetes Administrator (CKA). For readers who know the basics of containers and Linux admin. No Kubernetes experience is required. Acing the Certified Kubernetes Administrator Exam will provide you with content and practical exercises according to the unique CKA test environment. This practical book takes you hands-on with all the exam objectives, including deploying containerised applications to Kubernetes, accessing an application from an ingress resource, backup and restoring. You will learn how to: Administer an application running on Kubernetes Troubleshoot errors inside a Kubernetes cluster Authenticate users and machines to the Kubernetes API Create persistent storage in Kubernetes Add additional functionality to an existing Kubernetes cluster Plus! Essential exam tips and exercises help you work out your mental muscle memory. Acing the Certified Kubernetes Administrator Exam is your fast track to becoming a Certified Kubernetes Administrator! Your expert exam tutor is Chad Crowell, whose courses have helped thousands of developers to understand Kubernetes and earn the coveted CKA certification. About the technology The Certified Kubernetes Administrator (CKA) exam proves your skills as a Kubernetes administrator and is a serious test of your competency. There are no multiple-choice questions or essays: the whole test is conducted from the command line, with you performing solutions directly in the terminal. Administered by the Linux Foundation, the certification is recognised by employers worldwide as a proof of your ability to configure and manage production-grade Kubernetes clusters.
£41.39
Vibrant Publishers Administrator & Helpdesk Interview Questions
Book Synopsis
£25.12
Goodheart-Wilcox Publisher Computer Service and Repair
Book Synopsis
£35.02
Rocky Nook Software Testing Foundations, 5th Edition
Book SynopsisProfessional testing of software is an essential task that requires a profound knowledge of testing techniques. The International Software Testing Qualifications Board (ISTQB) has developed a universally accepted, international qualification scheme aimed at software and system testing professionals, and has created the Syllabi and Tests for the Certified Tester. Today, hundreds of thousands of people have taken the ISTQB certification exams. The authors of Software Testing Foundations, 5th Edition, are among the creators of the Certified Tester Syllabus and are currently active in the ISTQB. This thoroughly revised and updated fifth edition covers the Foundations Level (entry level) and teaches the most important methods of software testing. It is designed for self-study and provides the information necessary to pass the Certified Tester Foundations Level exam, as defined by the ISTQB. Also in this new edition, technical terms have been precisely stated according to the ISTQB glossary. Topics covered: Fundamentals of Testing Testing and the Software Lifecycle Static and Dynamic Testing Techniques Test Management Test Tools
£31.50
Rocky Nook Test Automation Fundamentals: A Study Guide for the Certified Test Automation Engineer Exam * Advanced Level Specialist * ISTQB® Compliant
Book SynopsisTest automation is an essential tool in today’s software development environments. It increases testing efficiency and makes test procedures reliably repeatable.This book provides a complete overview of how to design test automation processes and integrate them into your organization or existing projects. It details functional and technical strategies and goes into detail on the relevant concepts and best practices. The book’s main focus is on functional system testing.Topics covered:• An introduction to test automation• Objectives and success factors• Preparing for test automation• Introduction to generic test automation architectures• Design and development of a test automation solution• Risks and contingencies during deployment• Metrics and reporting• Transitioning manual testing to an automated environment• Verifying a test automation solution• Continuous improvementThe appendix contains an overview of software quality characteristics according to the ISO 25010 standard, and lists potential test automation applications within this context. It also provides an introduction to load and performance testing, and a sample catalog of criteria for selecting test automation tools.This book is fully compliant with the ISTQB® syllabus and, with its many explanatory examples, is equally suitable for preparation for certification, as a concise reference book for anyone who wants to acquire this essential skill, or for university-level study.
£37.46
Velociteach Press All-in-One PMP Exam Prep Kit 6th Edition Plus
Book SynopsisThis all-inclusive, self-study guide for the PMI's Project Management Professional (PMP) certification exam provides all the information project managers need to thoroughly prepare for the test. It contains the book The PMP Exam: How to Pass on Your First Try ; flash card App to help with memorization of key points; a laminated quick reference guide; a limited access, trial version subscription to the PMP course in InSite (the top PMP e-learning site); and downloadable audio CDs featuring experts Andy Crowe, Bill Yates, and Louis Alderman discussing the main points and concepts for the exam. The included learning materials cover all the processes, inputs, tools, and outputs that will be tested, along with insider secrets, test tricks and tips, hundreds of sample questions, and exercises designed to strengthen mastery of key concepts to help you pass the exam with confidence.
£140.00
Packt Publishing Limited Certified Information Security Manager Exam Prep
Book SynopsisPass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey Features Pass the CISM exam confidently with this step-by-step guide Explore practical solutions that validate your knowledge and expertise in managing enterprise information security teams Enhance your cybersecurity skills with practice questions and mock tests Book DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market. CISM is one of the top-paying and most sought-after certifications by employers.This CISM Certification Guide comprises comprehensive self-study exam content for those who want to achieve CISM certification on the first attempt. This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios. You'll learn about the practical aspects of information security governance and information security risk management. As you advance through the chapters, you'll get to grips with information security program development and management. The book will also help you to gain a clear understanding of the procedural aspects of information security incident management.By the end of this CISM exam book, you'll have covered everything needed to pass the CISM certification exam and have a handy, on-the-job desktop reference guide.What you will learn Understand core exam objectives to pass the CISM exam with confidence Create and manage your organization's information security policies and procedures with ease Broaden your knowledge of the organization's security strategy designing Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives Find out how to monitor and control incident management procedures Discover how to monitor activity relating to data classification and data access Who this book is forIf you are an aspiring information security manager, IT auditor, chief information security officer (CISO), or risk management professional who wants to achieve certification in information security, then this book is for you. A minimum of two years' experience in the field of information technology is needed to make the most of this book. Experience in IT audit, information security, or related fields will be helpful.Table of ContentsTable of Contents Information Security Governance Practical Aspects of Information Security Governance Overview of Information Risk Management Practical Aspects of Information Risk Management Procedural Aspects of Information Risk Management Overview of Information Security Program Development Management Information Security Infrastructure and Architecture Practical Aspects of Information Security Program Development Management Information Security Monitoring Tools and Techniques Overview of Information Security Incident Manager Practical Aspects of Information Security Incident Management
£56.99
Packt Publishing Limited CISA – Certified Information Systems Auditor
Book SynopsisThis CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA’s latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questionsKey Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization’s security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.Table of ContentsTable of Contents Audit Planning Audit Execution IT Governance IT Management Information Systems Acquisition and Development Information Systems Implementation Information System Operations Business Resilience Information Asset Security and Control Network Security and Control Public Key Cryptography and Other Emerging Technologies Security Event Management
£31.49
podbooks.com, LLC Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
£30.91
podbooks.com, LLC Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
£64.95
Rocky Nook Expert Test Manager: Guide to the Istqb Expert
Book SynopsisThis book covers the ISTQB Expert Level Test Manager syllabus and is a complete, one-stop preparation guide for the reader who is otherwise qualified (based on experience as a test manager) to take the Expert Level Test Manager exam. Included are extensive hands-on exercises and sample exam questions that comply with ISTQB standards for Expert Level exams. The ISTQB certification program is the leading software tester certification program in the world. With more than 240,000 certificates issued and a global presence in 70 countries, you can be confident in the value and international stature that the ISTQB Expert Level certificate can offer you.
£31.50
Rocky Nook Advanced Software Testing V 2. 2e
Book SynopsisThis book teaches test managers what they need to know to achieve advanced skills in test estimation, test planning, test monitoring, and test control. Readers will learn how to define the overall testing goals and strategies for the systems being tested. This hands-on, exercise-rich book provides experience with planning, scheduling, and tracking these tasks. You'll be able to describe and organize the necessary activities as well as learn to select, acquire, and assign adequate resources for testing tasks. You'll learn how to form, organize, and lead testing teams, and master the organizing of communication among the members of the testing teams, and between the testing teams and all the other stakeholders. Additionally, you'll learn how to justify decisions and provide adequate reporting information where applicable. With over thirty years of software and systems engineering experience, author Rex Black is President of RBCS, is a leader in software, hardware, and systems testing, and is the most prolific author practicing in the field of software testing today. He has published a dozen books on testing that have sold tens of thousands of copies worldwide. He is past president of the International Software Testing Qualifications Board (ISTQB) and a director of the American Software Testing Qualifications Board (ASTQB). This book will help you prepare for the ISTQB Advanced Test Manager exam. Included are sample exam questions, at the appropriate level of difficulty, for most of the learning objectives covered by the ISTQB Advanced Level Syllabus. The ISTQB certification program is the leading software tester certification program in the world. With about 300,000 certificate holders and a global presence in over 50 countries, you can be confident in the value and international stature that the Advanced Test Manager certificate can offer you. This second edition has been thoroughly updated to reflect the new ISTQB Advanced Test Manager 2012 Syllabus, and the latest ISTQB Glossary. This edition reflects Rex Black's unique insights into these changes, as he was one of the main participants in the ISTQB Advanced Level Working Group.
£33.75
Springer International Publishing AG ISTQB® Certified Tester Foundation Level: A
Book SynopsisThis book is aimed at everyone preparing for the ISTQB® Certified Tester – Foundation Level exam based on the Foundation Level syllabus (version 4.0) published in 2023. It provides candidates with reliable knowledge based on this document and thus distinguishes itself from all the information about ISTQB® syllabi and exams on the Internet, which is often of rather poor quality and may even contain serious errors. The book expands and details many issues that are described in the new 2023 version of the syllabus in a perfunctory or general way only. According to the ISTQB® guidelines for syllabus-based training, an exercise must be provided for each learning objective at the K3 level, and a practical example must be provided for each objective at the K2 or K3 level. In order to satisfy these requirements, the authors prepared numerous exercises and examples for all learning objectives at these levels. In addition, for each learning objective, one or more sample exam questions are presented which are similar to those that the candidate will see in the exam. This makes the book an excellent aid for studying and preparing for the exam and verifying acquired knowledge. Table of ContentsPart I: Certification, Syllabus and Foundation Level Exam.- Foundation Level Certificate.- Foundation Level Syllabus.- Foundation Level Exam.- Part II: The Syllabus Content.- 1. Fundamentals of Testing.- 2. Testing Throughout the Software Development Lifecycle.- 3. Static Testing.- 4. Test Analysis and Design.- 5. Managing the Test Activities.- 6. Test Tools.- Part III: Answers to Questions and Exercises.- Answers to Sample Questions. Solutions to Exercises.- Part IV: Official Sample Exam.- Exam Set A.- Additional Sample Questions.- Exam Set A – Answers.- Additional Sample Questions – Answers.
£49.49
Springer International Publishing AG A Study Guide to the ISTQB® Foundation Level 2018
Book SynopsisThis book is an excellent, helpful and up-to-date resource for all candidates preparing for the ISTQB Foundation Level certification exam based on the new Foundation Level 2018 Syllabus. Although there are plenty of sample questions and information related to the Foundation Level exam on the web, there are two problems with these: Firstly, most of them will soon be outdated, as the old syllabus and exams are going to be retracted in June 2019. Secondly, much of what is available is of poor quality, since many of the sample questions do not follow the strict ISTQB examination rules.This book stands out from other ISTQB-related works through a number of special features: Topicality: The material complies with the latest version of the Foundation Level syllabus published in 2018. Quality and originality: The exam questions are original, not redundant, of high quality, fully aligned with the ISTQB exam requirements and have not been published before. Huge amount of material: It includes 5 full sample exams (200 questions in total) designed in accordance with the ISTQB exam rules, and with the appropriate distribution of questions regarding the learning objectives and K-levels. Well-thought-out sample questions: The questions not only appropriately cover the corresponding learning objectives (LOs), but also to show the typical pitfalls. Diversity: The questions from various sample exams related to the same LO are diversified, that is, each of them points out different aspects of a given LO. This is an excellent method for better and more effective learning and preparing for the exam. Comprehensive, intelligible explanations: All answers are justified and there are detailed and easy-to-understand explanations not only of why a given answer is correct, but also why all the others are wrong. A lot of bonus material: The book includes a great bonus pack: chapters that explain the white-box and black-box test techniques in a detailed way, a set of exercises on test techniques and the detailed solutions to them, and much more. Table of Contents1 2018 Foundation Syllabus Overview.- 2 ISTQB Foundation Level Exam Structure and Rules.- 3 Test Techniques and Exercises.- 4 Black-box Testing Techniques.- 5 White-box test techniques.- 6 Sample Exam – Question Set 1.- 7 Sample Exam – Question Set 2.- 8 Sample Exam – Question Set 3.- 9 Sample Exam – Question Set 4.- 10 Sample Exam – Question Set 5.- 11 Solutions to Exercises on Test Techniques.- 12 Answers to Question Set 1.- 13 Answers to Question Set 2.- 14 Answers to Question Set 3.- 15 Answers to Question Set 4.- 16 Answers to Question Set 5.- Appendix A: Foundation Syllabus Glossary Terms.- Appendix B: Questions distribution by Learning Objectives.
£47.49
Van Haren Publishing BV ITIL - Das Taschenbuch: Volume 3
Book Synopsis
£17.82
Independently Published CCNP Enterprise Advanced Routing and Services
Book Synopsis
£11.25