Computer networking and communications Books
McGraw-Hill Education Data Communications and Networking with TCPIP
Book SynopsisData Communications and Networking, 6th Edition, teaches the principles of networking using TCP/IP protocol suite. It employs a bottom-up approach where each layer in the TCP/IP protocol suite is built on the services provided by the layer below. This edition has undergone a major restructuring to reduce the number of chapters and focus on the organization of TCP/IP protocol suite. It concludes with three chapters that explore multimedia, network management, and cryptography/network security. Technologies related to data communications and networking are among the fastest growing in our culture today, and there is no better guide to this rapidly expanding field than Data Communications and Networking.Table of ContentsChapter 1: IntroductionChapter 2: Physical LayerChapter 3: Data-Link LayerChapter 4: Local Area Networks: LANsChapter 5: Wide Area Networks: WANsChapter 6: Connecting Devices and Virtual LANsChapter 7: Network Layer: Data TransferChapter 8: Network Layer: Routing of PacketsChapter 9: Transport LayerChapter 10: Application LayerChapter 11: MultimediaChapter 12: Network ManagementChapter 13: Cryptography and Network Security
£53.99
McGraw-Hill Education - Europe Incident Response Computer Forensics Third
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determinTable of ContentsPart 1 PREPARING FOR THE INEVITABLE INCIDENT1Real World Incidents2IR Management Handbook3Pre-Incident PreparationPart 2 INCIDENT DETECTION AND CHARACTERIZATION4Getting the Investigation Started5Initial Development of Leads6Discovering the Scope of the Incident Part 3 DATA COLLECTION7Live Data Collection8Forensic Duplication9Network Evidence10Enterprise ServicesPart 4 DATA ANALYSIS11Analysis Methodology12Investigating Windows Systems13Investigating MacOS Systems14Investigating Applications15Malware Triage16Report WritingPart 5 REMEDIATION17Remediation Introduction18Remediation Case StudiesPart 6 APPENDICESApp AAnswers to QuestionsApp BIncident Response Forms
£37.49
Pearson Education (US) Cloud Computing
Book SynopsisThomas Erl is a best-selling IT author and series editor of the Pearson Digital Enterprise Series from Thomas Erl. Thomas has authored and co-authored 15 books published by Pearson Education and Prentice Hall dedicated to contemporary business technology and practices. You can find Thomas on the Thomas Erl YouTube channel (youtube.com/@terl). He is also the host of the Real Digital Transformation podcast series (available via Spotify, Apple, Google Podcasts, and most other platforms) and also publishes the weekly LinkedIn newsletter The Digital Enterprise. Over 100 articles and interviews by Thomas have been published in numerous publications, including CEO World, The Wall Street Journal, Forbes, and CIO Magazine. Thomas has also toured over 20 countries as a keynote speaker for various conferences and events. At Arcitura Education (www.arcitura.com), Thomas leads the development of curricula for internatiTable of ContentsForeword About the Authors Acknowledgments Chapter 1: Introduction 1.1 Objectives of This Book 1.2 What This Book Does Not Cover 1.3 Who This Book Is For 1.4 How This Book Is Organized Part I: Fundamental Cloud Computing Chapter 3: Understanding Cloud Computing Chapter 4: Fundamental Concepts and Models Chapter 5: Cloud-Enabling Technology Chapter 6: Understanding Containerization Chapter 7: Understanding Cloud Security and Cybersecurity Part II: Cloud Computing Mechanisms Chapter 8: Cloud Infrastructure Mechanisms Chapter 9: Specialized Cloud Mechanisms Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms Chapter 12: Cloud Management Mechanisms Part III: Cloud Computing Architecture Chapter 13: Fundamental Cloud Architectures Chapter 14: Advanced Cloud Architectures Chapter 15: Specialized Cloud Architectures Part IV: Working with Clouds Chapter 16: Cloud Delivery Model Considerations Chapter 17: Cost Metrics and Pricing Models Chapter 18: Service Quality Metrics and SLAs Part V: Appendices Appendix A: Case Study Conclusions Appendix B: Common Containerization Technologies 1.5 Resources Pearson Digital Enterprise Book Series Thomas Erl on YouTube The Digital Enterprise Newsletter on LinkedIn Cloud Certified Professional (CCP) ProgramChapter 2: Case Study Background 2.1 Case Study #1: ATN Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy 2.2 Case Study #2: DTGOV Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy 2.3 Case Study #3: Innovartus Technologies Inc. Technical Infrastructure and Environment Business Goals and Strategy Roadmap and Implementation Strategy PART I: FUNDAMENTAL CLOUD COMPUTINGChapter 3: Understanding Cloud Computing 3.1 Origins and Influences A Brief History Definitions Business Drivers Cost Reduction Business Agility Technology Innovations Clustering Grid Computing Capacity Planning Virtualization Containerization Serverless Environments 3.2 Basic Concepts and Terminology Cloud Container IT Resource On Premises Cloud Consumers and Cloud Providers Scaling Horizontal Scaling Vertical Scaling Cloud Service Cloud Service Consumer 3.3 Goals and Benefits Increased Responsiveness Reduced Investments and Proportional Costs Increased Scalability Increased Availability and Reliability 3.4 Risks and Challenges Increased Vulnerability Due to Overlapping Trust Boundaries Increased Vulnerability Due to Shared Security Responsibility Increased Exposure to Cyber Threats Reduced Operational Governance Control Limited Portability Between Cloud Providers Multiregional Compliance and Legal Issues Cost Overruns Chapter 4: Fundamental Concepts and Models 4.1 Roles and Boundaries Cloud Provider Cloud Consumer Cloud Broker Cloud Service Owner Cloud Resource Administrator Additional Roles Organizational Boundary Trust Boundary 4.2 Cloud Characteristics On-Demand Usage Ubiquitous Access Multitenancy (and Resource Pooling) Elasticity Measured Usage Resiliency 4.3 Cloud Delivery Models Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Comparing Cloud Delivery Models Combining Cloud Delivery Models IaaS + PaaS IaaS + PaaS + SaaS Cloud Delivery Submodels 4.4 Cloud Deployment Models Public Clouds Private Clouds Multiclouds Hybrid Clouds Chapter 5: Cloud-Enabling Technology 5.1 Networks and Internet Architecture Internet Service Providers (ISPs) Connectionless Packet Switching (Datagram Networks) Router-Based Interconnectivity Physical Network Transport Layer Protocol Application Layer Protocol Technical and Business Considerations Connectivity Issues Network Bandwidth and Latency Issues Wireless and Cellular Cloud Carrier and Cloud Provider Selection 5.2 Cloud Data Center Technology Virtualization Standardization and Modularity Autonomic Computing Remote Operation and Management High Availability Security-Aware Design, Operation, and Management Facilities Computing Hardware Storage Hardware Network Hardware Carrier and External Networks Interconnection Web-Tier Load Balancing and Acceleration LAN Fabric SAN Fabric NAS Gateways Serverless Environments NoSQL Clustering Other Considerations 5.3 Modern Virtualization Hardware Independence Server Consolidation Resource Replication Operating System–Based Virtualization Hardware-Based Virtualization Containers and Application-Based Virtualization Virtualization Management Other Considerations 5.4 Multitenant Technology 5.5 Service Technology and Service APIs REST Services Web Services Service Agents Service Middleware Web-Based RPC 5.6 Case Study Example Chapter 6: Understanding Containerization 6.1 Origins and Influences A Brief History Containerization and Cloud Computing 6.2 Fundamental Virtualization and Containerization Operating System Basics Virtualization Basics Physical Servers Virtual Servers Hypervisors Virtualization Types Containerization Basics Containers Container Images Container Engines Pods Hosts Host Clusters Host Networks and Overlay Networks Virtualization and Containerization Containerization on Physical Servers Containerization on Virtual Servers Containerization Benefits Containerization Risks and Challenges 6.3 Understanding Containers Container Hosting Containers and Pods Container Instances and Clusters Container Package Management Container Orchestration Container Package Manager vs. Container Orchestrator Container Networks Container Network Scope Container Network Addresses Rich Containers Other Common Container Characteristics 6.4 Understanding Container Images Container Image Types and Roles Container Image Immutability Container Image Abstraction Operating System Kernel Abstraction Operating System Abstraction Beyond the Kernel Container Build Files Container Image Layers How Customized Container Images Are Created 6.5 Multi-Container Types Sidecar Container Adapter Container Ambassador Container Using Multi-Containers Together 6.6 Case Study Example Chapter 7: Understanding Cloud Security and Cybersecurity 7.1 Basic Security Terminology Confidentiality Integrity Availability Authenticity Security Controls Security Mechanisms Security Policies 7.2 Basic Threat Terminology Risk Vulnerability Exploit Zero-Day Vulnerability Security Breach Data Breach Data Leak Threat (or Cyber Threat) Attack (or Cyber Attack) Attacker and Intruder Attack Vector and Surface 7.3 Threat Agents Anonymous Attacker Malicious Service Agent Trusted Attacker Malicious Insider 7.4 Common Threats Traffic Eavesdropping Malicious Intermediary Denial of Service Insufficient Authorization Virtualization Attack Overlapping Trust Boundaries Containerization Attack Malware Insider Threat Social Engineering and Phishing Botnet Privilege Escalation Brute Force Remote Code Execution SQL Injection Tunneling Advanced Persistent Threat (APT) 7.5 Case Study Example 7.6 Additional Considerations Flawed Implementations Security Policy Disparity Contracts Risk Management 7.7 Case Study Example PART II: CLOUD COMPUTING MECHANISMS Chapter 8: Cloud Infrastructure Mechanisms 8.1 Logical Network Perimeter Case Study Example 8.2 Virtual Server Case Study Example 8.3 Hypervisor Case Study Example 8.4 Cloud Storage Device Cloud Storage Levels Network Storage Interfaces Object Storage Interfaces Database Storage Interfaces Relational Data Storage Non-Relational Data Storage Case Study Example 8.5 Cloud Usage Monitor Monitoring Agent Resource Agent Polling Agent Case Study Example 8.6 Resource Replication Case Study Example 8.7 Ready-Made Environment Case Study Example 8.8 Container Chapter 9: Specialized Cloud Mechanisms 9.1 Automated Scaling Listener Case Study Example 9.2 Load Balancer Case Study Example 9.3 SLA Monitor Case Study Example SLA Monitor Polling Agent SLA Monitoring Agent 9.4 Pay-Per-Use Monitor Case Study Example 9.5 Audit Monitor Case Study Example 9.6 Failover System Active–Active Active–Passive Case Study Example 9.7 Resource Cluster Case Study Example 9.8 Multi-Device Broker Case Study Example 9.9 State Management Database Case Study ExampleChapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms 10.1 Encryption Symmetric Encryption Asymmetric Encryption Case Study Example 10.2 Hashing Case Study Example 10.3 Digital Signature Case Study Example 10.4 Cloud-Based Security Groups Case Study Example 10.5 Public Key Infrastructure (PKI) System Case Study Example 10.6 Single Sign-On (SSO) System Case Study Example 10.7 Hardened Virtual Server Image Case Study Example 10.8 Firewall Case Study Example 10.9 Virtual Private Network (VPN) Case Study Example 10.10 Biometric Scanner Case Study Example 10.11 Multi-Factor Authentication (MFA) System Case Study Example 10.12 Identity and Access Management (IAM) System Case Study Example 10.13 Intrusion Detection System (IDS) Case Study Example 10.14 Penetration Testing Tool Case Study Example 10.15 User Behavior Analytics (UBA) System Case Study Example 10.16 Third-Party Software Update Utility Case Study Example 10.17 Network Intrusion Monitor Case Study Example 10.18 Authentication Log Monitor Case Study Example 10.19 VPN Monitor Case Study Example 10.20 Additional Cloud Security Access-Oriented Practices and Technologies Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms 11.1 Digital Virus Scanning and Decryption System Generic Decryption Digital Immune System Case Study Example 11.2 Malicious Code Analysis System Case Study Example 11.3 Data Loss Prevention (DLP) System Case Study Example 11.4 Trusted Platform Module (TPM) Case Study Example 11.5 Data Backup and Recovery System Case Study Example 11.6 Activity Log Monitor Case Study Example 11.7 Traffic Monitor Case Study Example 11.8 Data Loss Protection Monitor Case Study Example Chapter 12: Cloud Management Mechanisms 12.1 Remote Administration System Case Study Example 12.2 Resource Management System Case Study Example 12.3 SLA Management System Case Study Example 12.4 Billing Management System Case Study Example PART III: CLOUD COMPUTING ARCHITECTURE Chapter 13: Fundamental Cloud Architectures 13.1 Workload Distribution Architecture 13.2 Resource Pooling Architecture 13.3 Dynamic Scalability Architecture 13.4 Elastic Resource Capacity Architecture 13.5 Service Load Balancing Architecture 13.6 Cloud Bursting Architecture 13.7 Elastic Disk Provisioning Architecture 13.8 Redundant Storage Architecture 13.9 Multicloud Architecture 13.10 Case Study ExampleChapter 14: Advanced Cloud Architectures 14.1 Hypervisor Clustering Architecture 14.2 Virtual Server Clustering Architecture 14.3 Load-Balanced Virtual Server Instances Architecture 14.4 Nondisruptive Service Relocation Architecture 14.5 Zero Downtime Architecture 14.6 Cloud Balancing Architecture 14.7 Resilient Disaster Recovery Architecture 14.8 Distributed Data Sovereignty Architecture 14.9 Resource Reservation Architecture 14.10 Dynamic Failure Detection and Recovery Architecture 14.11 Rapid Provisioning Architecture 14.12 Storage Workload Management Architecture 14.13 Virtual Private Cloud Architecture 14.14 Case Study ExampleChapter 15: Specialized Cloud Architectures 15.1 Direct I/O Access Architecture 15.2 Direct LUN Access Architecture 15.3 Dynamic Data Normalization Architecture 15.4 Elastic Network Capacity Architecture 15.5 Cross-Storage Device Vertical Tiering Architecture 15.6 Intra-Storage Device Vertical Data Tiering Architecture 15.7 Load-Balanced Virtual Switches Architecture 15.8 Multipath Resource Access Architecture 15.9 Persistent Virtual Network Configuration Architecture 15.10 Redundant Physical Connection for Virtual Servers Architecture 15.11 Storage Maintenance Window Architecture 15.12 Edge Computing Architecture 15.13 Fog Computing Architecture 15.14 Virtual Data Abstraction Architecture 15.15 Metacloud Architecture 15.16 Federated Cloud Application Architecture PART IV: WORKING WITH CLOUDS Chapter 16: Cloud Delivery Model Considerations 16.1 Cloud Delivery Models: The Cloud Provider Perspective Building IaaS Environments Data Centers Scalability and Reliability Monitoring Security Equipping PaaS Environments Scalability and Reliability Monitoring Security Optimizing SaaS Environments Security 16.2 Cloud Delivery Models: The Cloud Consumer Perspective Working with IaaS Environments IT Resource Provisioning Considerations Working with PaaS Environments IT Resource Provisioning Considerations Working with SaaS Services 16.3 Case Study Example Chapter 17: Cost Metrics and Pricing Models 17.1 Business Cost Metrics Up-Front and Ongoing Costs Additional Costs Case Study Example Product Catalog Browser On-Premises Up-Front Costs On-Premises Ongoing Costs Cloud-Based Up-Front Costs Cloud-Based Ongoing Costs 17.2 Cloud Usage Cost Metrics Network Usage Inbound Network Usage Metric Outbound Network Usage Metric Intra-Cloud WAN Usage Metric Server Usage On-Demand Virtual Machine Instance Allocation Metric Reserved Virtual Machine Instance Allocation Metric Cloud Storage Device Usage On-Demand Storage Space Allocation Metric I/O Data Transferred Metric Cloud Service Usage Application Subscription Duration Metric Number of Nominated Users Metric Number of Transactions Users Metric 17.3 Cost Management Considerations Pricing Models Multicloud Cost Management Additional Considerations Case Study Example Virtual Server On-Demand Instance Allocation Virtual Server Reserved Instance Allocation Cloud Storage Device WAN Traffic Chapter 18: Service Quality Metrics and SLAs 18.1 Service Quality Metrics Service Availability Metrics Availability Rate Metric Outage Duration Metric Service Reliability Metrics Mean Time Between Failures (MTBF) Metric Reliability Rate Metric Service Performance Metrics Network Capacity Metric Storage Device Capacity Metric Server Capacity Metric Web Application Capacity Metric Instance Starting Time Metric Response Time Metric Completion Time Metric Service Scalability Metrics Storage Scalability (Horizontal) Metric Server Scalability (Horizontal) Metric Server Scalability (Vertical) Metric Service Resiliency Metrics Mean Time to Switchover (MTSO) Metric Mean Time to System Recovery (MTSR) Metric 18.2 Case Study Example 18.3 SLA Guidelines 18.4 Case Study Example Scope and Applicability Service Quality Guarantees Definitions Usage of Financial Credits SLA Exclusions PART V: APPENDICES Appendix A: Case Study Conclusions A.1 ATN A.2 DTGOV A.3 Innovartus Appendix B: Common Containerization Technologies B.1 Docker Docker Server Docker Client Docker Registry Docker Objects Docker Swarm (Container Orchestrator) B.2 Kubernetes Kubernetes Node (Host) Kubernetes Pod Kubelet Kube-Proxy Container Runtime (Container Engine) Cluster Kubernetes Control Plane 9780138052256 TOC 7/17/2023
£40.49
John Wiley & Sons Inc Designing the Internet of Things
Book SynopsisExplores the platforms that you can use to develop hardware or software, discusses design concepts that can make your products eye-catching and appealing. This book explains how to combine sensors, servos, robotics, Arduino chips, and more with various networks or the Internet, to create interactive, cutting-edge devices.Trade ReviewAccording to friends of mine who work in the disciplines above, this is an excellent introduction to read through the principles of prototyping through to manufacture and business considerations (Mob76 Outlook, December 2013)Table of ContentsIntroduction 1 PART I: PROTOTYPING 5 Chapter 1: The Internet of Things: An Overview 7 Chapter 2: Design Principles for Connected Devices 21 Chapter 3: Internet Principles 41 Chapter 4: Thinking About Prototyping 63 Chapter 5: Prototyping Embedded Devices 87 Chapter 6: Prototyping the Physical Design 147 Chapter 7: Prototyping Online Components 173 Chapter 8: Techniques for Writing Embedded Code 205 PART II: FROM PROTOTYPE TO REALITY 225 Chapter 9: Business Models 227 Chapter 10: Moving to Manufacture 255 Chapter 11: Ethics 289 Index 311
£16.99
Pearson Education Limited Computer Networks Global Edition
Book SynopsisTable of Contents1. Introduction Uses of Computer Networks Types of Computer Networks Network Technology, from Local to Global Examples of Networks Network Protocols Reference Models Standardization Policy, Legal, and Social Issues Metric Units Outline of the Rest of the Book Summary 2. The Physical Layer Guided Transmission Media Wireless Transmission Using the Spectrum for Transmission From Waveforms to Bits The Public Switched Telephone Network Cellular Networks Cable Networks Communication Satellites Comparing Different Access Networks Policy at the Physical Layer Summary 3. The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Improving Efficiency Data Link Protocols in Practice Summary 4. The Medium Access ControlSublayer The Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Bluetooth DOCSIS Data Link Layer Switching Summary 5. The Network Layer Network Layer Design Issues Routing Algorithms in a Single Network Traffic Management at the Network Layer Quality of Service and Application QoE Internetworking Software Defined Networking The Network Layer in the Internet Policy at the Network layer Summary 6. The Transport Layer The Transport Service Elements of Transport Protocols Congestion Control The Internet Transport Protocols: UDP The Internet Transport Protocols: TCP, QUIC, BBR Performance Monitoring Delay-Tolerant Networking Summary 7. The Application Layer DNS — The Domain Name System Electronic Mail The World Wide Web HTTP/2 Streaming Audio and Video Content Delivery Networks and Distributed Cloud Services Summary 8. Security Fundamentals of Network Security The Core Ingredients of an Attack Firewalls and Intrusion Detection Systems Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Authentication Protocols Communication Security Email Security Web Security Social Issues Summary 9. List and Bibliography Suggestions for Further Reading Alphabetical Bibliography
£65.54
Pearson Education (US) Cisco Data Center Fundamentals
Book SynopsisSomit Maloo, CCIE No. 28603, CCDE No. 20170002, is a content architect from the data center team at Learning@Cisco. He holds a master's degree in telecommunication networks and a bachelor's degree in electronics and telecommunication engineering. He is also a penta-CCIE in enterprise infrastructure, service provider, enterprise wireless, security, and data center technologies. Somit holds various industry-leading certifications, including CCDE, PMP, RHCSA, and VMware VCIX6 in Data Center and Network Virtualization. Somit has extensive experience in designing and developing various data center courses for the official Cisco curriculum. He started his career as a Cisco TAC engineer. Somit has more than 12 years of experience in the networking industry, working mostly with data center networks. You can reach Somit on Twitter: @somitmaloo. Iskren Nikolov, CCIE No.20164, CCSI No.32481, MCT Alumni, Content architect, engineer, and devTable of Contents Introduction xxiv Part I Networking Chapter 1 Data Center Architectures 1 Data Center Basics 1 Cisco Unified Data Center Platform 4 Data Center Network Infrastructure 6 Data Center Storage Infrastructure 10 Data Center Computing Infrastructure 12 Summary 19 References 20 Chapter 2 Describing the Cisco Nexus Family and Cisco NX-OS Software 21 Cisco Nexus Data Center Product Overview 21 Cisco FEX Overview 35 Cisco NX-OS Software Architecture 44 Exploring Cisco NX-OS CLI 48 Summary 61 References 62 Chapter 3 Describing Layer 3 First-Hop Redundancy 65 Default Gateway Redundancy 65 Hot Standby Router Protocol 68 Virtual Router Redundancy Protocol 78 Gateway Load Balancing Protocol 82 Summary 86 References 86 Chapter 4 Port Channels and vPCs 87 Ethernet Port Channels 88 Virtual Port Channels 93 Summary 124 References 125 Chapter 5 Switch Virtualization 127 Cisco Nexus Switch Functional Planes 127 Cisco Nexus Switch Process Separation and Restartability 132 Virtual Routing and Forwarding (VRF) 134 Cisco Nexus 7000 VDCs 144 Summary 177 References 177 Chapter 6 Nexus Switch Routing 179 Routing Fundamentals 179 RIPv2 on NX-OS 190 EIGRP on NX-OS 198 OSPFv2 on NX-OS 210 Multicast Fundamentals 227 Multicast Configuration on NX-OS 240 Summary 254 References 255 Chapter 7 Network Virtualization 257 Overlay Network Protocols 257 Network Interface Virtualization Using FEX 286 VMware vSphere Virtual Switches 287 Summary 291 References 292 Contents xv Chapter 8 Describing Cisco ACI 295 Cisco ACI Overview 295 Cisco ACI Building Blocks 299 Cisco ACI Deployment Models 303 Cisco ACI Hardware 307 ACI Startup Discovery 313 Cisco ACI Policy Model 314 Packet Forwarding within the ACI Fabric 327 Summary 328 References 330 Chapter 9 Operating Cisco ACI 333 Cisco ACI External Connectivity Options 333 Cisco ACI and VMM Integration 339 Cisco ACI and L4–L7 Integration 342 Cisco ACI Management and Automation 343 Cisco ACI Anywhere 352 Cisco Nexus Dashboard 356 Summary 358 References 359 Part II Storage Chapter 10 Data Center Storage Concepts 361 Storage Connectivity Options in the Data Center 361 Fibre Channel Storage Networking 376 Internet Small Computer System Interface (iSCSI) 383 NVM Express and NVM Express over Fabrics 385 Cisco MDS Product Overview 389 Summary 401 Reference 402 Chapter 11 Fibre Channel Protocol Fundamentals 403 Fibre Channel Layered Model 403 Building the Switched Fabric 412 Fibre Channel Flow Control 419 Fabric Shortest Path First 421 Summary 423 Reference 424 Chapter 12 Describing VSANs and Fibre Channel Zoning 425 VSAN Overview 425 VSAN Configuration 430 Fibre Channel Zoning 439 Zoning Configuration 441 Zoning Management 448 Summary 451 Reference 453 Chapter 13 Storage Virtualization 455 Cisco Fibre Channel NPIV Feature 456 Cisco Fibre Channel NPV Mode 460 Summary 469 Reference 470 Chapter 14 Describing Data Center Ethernet Enhancements 471 IEEE Data Center Bridging 472 Priority Flow Control 472 Enhanced Transmission Selection 475 DCBX Protocol 476 Summary 478 References 478 Chapter 15 Describing FCoE 479 Cisco Unified Fabric 479 FCoE Architecture 482 FCoE Initialization Protocol 488 FCoE Configuration 490 Summary 495 References 496 Part III Compute Chapter 16 Describing Cisco UCS Components 497 Cisco UCS Components 497 Cisco UCS Fabric Interconnect Product Overview 503 Cisco UCS Blade Chassis 506 Cisco IOM Product Overview 509 Cisco UCS B-Series Servers 510 Cisco UCS C-Series Servers and the Cisco IMC Supervisor 514 Cisco UCS S-Series Storage Server 521 Cisco HyperFlex Data Platform 524 Cisco UCS X-Series Modular System 527 Summary 529 References 530 Chapter 17 Describing Cisco UCS Abstraction 531 Cisco UCS Manager Overview 532 Exploring the Cisco UCS Server Environment 543 Identity and Resource Pools for Hardware Abstraction 548 Service Profiles and Service Profile Templates 552 Cisco UCS Polices for Use in Service Profiles 555 Cisco UCS Service Profile Configuration 556 Cisco UCS Central Overview 564 Summary 566 References 568 Chapter 18 Server Virtualization 569 Virtual Machine 569 Hypervisor 574 Virtual Switch 575 VMware vSphere 576 VMware ESXi Installation 582 VMware vCenter Installation 592 Summary 611 References 612 Part IV Automation Chapter 19 Using APIs 613 Common Programmability Protocols and Methods 613 Configuring Cisco NX-OS with APIs 624 Exploring the Cisco UCS Manager XML API Management Information Tree 626 Summary 629 Reference 629 Chapter 20 Automating the Data Center 631 Automation Basics 631 Automation and Orchestration Technologies 634 Choosing the Automation Toolset 642 Summary 643 Reference 644 Part V Cloud Chapter 21 Cloud Computing 645 Cloud Computing Overview 645 Cloud Computing Services 653 Cloud Deployment Models 660 Cisco Intersight 666 Summary 669 References 671 9780137638246, TOC, 8/29/2022
£37.79
John Wiley & Sons From Chaos to Clarity How Data Visualization can
Book Synopsis
£17.59
Manning Publications Well-Grounded Java Developer, The
Book SynopsisUnderstanding Java from the JVM up gives you a solid foundation to grow your expertise and take on advanced techniques for performance, concurrency, containerization, and more. In The Well-Grounded Java Developer, Second Edition you will learn: The new Java module system and why you should use it Bytecode for the JVM, including operations and classloading Performance tuning the JVM Working with Java's built-in concurrency and expanded options Programming in Kotlin and Clojure on the JVM Maximizing the benefits from your build/CI tooling with Maven and Gradle Running the JVM in containers Planning for future JVM releases The Well-Grounded Java Developer, Second Edition introduces both the modern innovations and timeless fundamentals you need to know to become a Java master. Authors Ben Evans, Martijn Verburg, and Jason Clark distil their decades of experience as Java Champions, veteran developers, and key contributors to the Java ecosystem into this clear and practical guide. about the technology Java's history of innovation, its huge collection of libraries and frameworks, and the flexibility of the JVM have cemented its place as one of the world's most popular programming languages. Although it's easy to get started with Java, understanding how the language intersects with the JVM is the key to unlocking the power of this awesome language and its deep ecosystem of frameworks, tools, and alternative JVM-based languages. about the book The Well-Grounded Java Developer, Second Edition is a complete revision of the classic original with the latest innovations of the Java platform. It upgrades your existing Java skills with both JVM fundamentals like bytecode, and powerful new features such as modules and concurrency models. You'll broaden your understanding of what's possible by exploring Kotlin and other JVM languages, and learn how functional programming can offer a powerful new perspective. Each concept is illustrated with hands-on examples, including a fully modularized application/library, build setups for Maven and Gradle, and creating your own multithreaded application.Trade Review'A required read to understand new technologies.' Michael Haller 'Provides a lot of great material and helps Java developers discover the "known unknowns" to build their breadth of knowledge that can be leveraged for exploring specific topics in more depth.' Andy Keffalas 'A really good foundation for leveling up your Java development skills. This is a great resource for anybody wanting to dig deeper into the Java ecosystem and learn more about how Java works.' Jared Duncan 'This is a fantastic book to reach beyond the typical Java developer environment.' Matt D.Table of Contentstable of contents PART 1: FROM 8 TO 11 TO 17 READ IN LIVEBOOK 1INTRODUCING MODERN JAVA READ IN LIVEBOOK 2JAVA MODULES READ IN LIVEBOOK 3JAVA 17 PART 2: UNDER THE HOOD READ IN LIVEBOOK 4CLASS FILES AND BYTECODE READ IN LIVEBOOK 5JAVA CONCURRENCY FUNDAMENTALS READ IN LIVEBOOK 6JDK CONCURRENCY LIBRARIES 7 UNDERSTANDING JAVA PERFORMANCE PART 3: NON-JAVA LANGUAGES ON THE JVM READ IN LIVEBOOK 8ALTERNATIVE JVM LANGUAGES READ IN LIVEBOOK 9KOTLIN READ IN LIVEBOOK 10CLOJURE: A DIFFERENT VIEW OF PROGRAMMING PART 4: BUILD AND DEPLOYMENT READ IN LIVEBOOK 11BUILDING WITH GRADLE & MAVEN 12 RUNNING JAVA IN CONTAINERS READ IN LIVEBOOK 13TESTING FUNDAMENTALS 14 TESTING BEYOND JUNIT PART 5: NEW FRONTIERS READ IN LIVEBOOK 15ADVANCED FUNCTIONAL PROGRAMMING 16 ADVANCED CONCURRENT PROGRAMMING 17 MODERN INTERNALS 18 JAVA BEYOND 11 APPENDIXES APPENDIX A: INSTALLING JAVA 11 & BUILDS AND LICENSES APPENDIX B: REVIEW OF STREAMS AND FUNCTIONAL PROGRAMMING IN JAVA
£41.39
Pearson Education Limited Computer Networking A TopDown Approach Global
Book SynopsisAbout our authors Jim Kurose is a Distinguished University Professor in the College of Information and Computer Sciences at the University of Massachusetts Amherst, where he has been on the faculty since receiving his PhD in computer science from Columbia University. He received a BA in physics from Wesleyan University. He has held a number of visiting scientist positions in the US and abroad, including IBM Research, INRIA and the Sorbonne University in France. He recently completed a 5-year term as Assistant Director at the US National Science Foundation, where he led the Directorate of Computer and Information Science and Engineering in its mission is to uphold the nation's leadership in scientific discovery and engineering innovation. Jim is proud to have mentored and taught an amazing group of students, and to have received a number of awards for his research, teaching and service, including the IEEE Infocom Award, the ACM SIGCOMM Lifetime AchievTable of ContentsChapter 1: Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1 Access Networks 1.2.2 Physical Media 1.3 The Network Core 1.3.1 Packet Switching 1.3.2 Circuit Switching 1.3.3 A Network of Networks 1.4 Delay, Loss, and Throughput in Packet-Switched Networks 1.4.1 Overview of Delay in Packet-Switched Networks 1.4.2 Queuing Delay and Packet Loss 1.4.3 End-to-End Delay 1.4.4 Throughput in Computer Networks 1.5 Protocol Layers and Their Service Models 1.5.1 Layered Architecture 1.5.2 Encapsulation 1.6 Networks Under Attack 1.7 History of Computer Networking and the Internet 1.7.1 The Development of Packet Switching: 1961—1972 1.7.2 Proprietary Networks and Internetworking: 1972—1980 1.7.3 A Proliferation of Networks: 1980—1990 1.7.4 The Internet Explosion: The 1990s 1.7.5 The New Millennium 1.8 Summary Homework Problems and Questions Wireshark Lab Chapter 2: Application Layer 2.1 Principles of Network Applications 2.1.1 Network Application Architectures 2.1.2 Processes Communicating 2.1.3 Transport Services Available to Applications 2.1.4 Transport Services Provided by the Internet 2.1.5 Application-Layer Protocols 2.1.6 Network Applications Covered in This Book 2.2 The Web and HTTP 2.2.1 Overview of HTTP 2.2.2 Non-Persistent and Persistent Connections 2.2.3 HTTP Message Format 2.2.4 User-Server Interaction: Cookies 2.2.5 Web Caching 2.2.6 HTTP/2 2.3 Electronic Mail in the Internet 2.3.1 SMTP 2.3.2 Mail Message Formats 2.3.3 Mail Access Protocols 2.4 DNS–The Internet's Directory Service 2.4.1 Services Provided by DNS 2.4.2 Overview of How DNS Works 2.4.3 DNS Records and Messages 2.5 Peer-to-Peer Applications 2.5.1 P2P File Distribution 2.6 Video Streaming and Content Distribution Networks 2.6.1 Internet Video 2.6.2 HTTP Streaming and DASH 2.6.3 Content Distribution Networks 2.6.4 Case Studies: Netflix and YouTube 2.7 Socket Programming: Creating Network Applications 2.7.1 Socket Programming with UDP 2.7.2 Socket Programming with TCP 2.8 Summary Homework Problems and Questions Socket Programming Assignments Wireshark Labs: HTTP, DNS Chapter 3: Transport Layer 3.1 Introduction and Transport-Layer Services 3.1.1 Relationship Between Transport and Network Layers 3.1.2 Overview of the Transport Layer in the Internet 3.2 Multiplexing and Demultiplexing 3.3 Connectionless Transport: UDP 3.3.1 UDP Segment Structure 3.3.2 UDP Checksum 3.4 Principles of Reliable Data Transfer 3.4.1 Building a Reliable Data Transfer Protocol 3.4.2 Pipelined Reliable Data Transfer Protocols 3.4.3 Go-Back-N (GBN) 3.4.4 Selective Repeat (SR) 3.5 Connection-Oriented Transport: TCP 3.5.1 The TCP Connection 3.5.2 TCP Segment Structure 3.5.3 Round-Trip Time Estimation and Timeout 3.5.4 Reliable Data Transfer 3.5.5 Flow Control 3.5.6 TCP Connection Management 3.6 Principles of Congestion Control 3.6.1 The Causes and the Costs of Congestion 3.6.2 Approaches to Congestion Control 3.7 TCP Congestion Control 3.7.1 Classic TCP congestion Control 3.7.2 Network-Assisted Explicit Congestion Notification and Delay-based Congestion Control 3.7.3 Fairness 3.8 Evolution of transport-layer functionality 3.9 Summary Homework Problems and Questions Programming Assignments Wireshark Labs: Exploring TCP, UDP Chapter 4: The Network Layer: Data Plane 4.1 Overview of Network Layer 4.1.1 Forwarding and Routing: The Network Data and Control Planes 4.1.2 Network Service Models 4.2 What's Inside a Router? 4.2.1 Input Port Processing and Destination-Based Forwarding 4.2.2 Switching 4.2.3 Output Port Processing 4.2.4 Where Does Queuing Occur? 4.2.5 Packet Scheduling 4.3 The Internet Protocol (IP): IPv4, Addressing, IPv6, and More 4.3.1 IPv4 Datagram Format 4.3.2 IPv4 Addressing 4.3.3 Network Address Translation (NAT) 4.3.4 IPv6 4.4 Generalized Forwarding and SDN 4.4.1 Match 4.4.2 Action 4.4.3 OpenFlow Examples of Match-plus-action in Action 4.5 Middleboxes 4.6 Summary Homework Problems and Questions Wireshark Lab: IP Chapter 5: The Network Layer: Control Plane 5.1 Introduction 5.2 Routing Algorithms 5.2.1 The Link-State (LS) Routing Algorithm 5.2.2 The Distance-Vector (DV) Routing Algorithm 5.3 Intra-AS Routing in the Internet: OSPF 5.4 Routing Among the ISPs: BGP 5.4.1 The Role of BGP 5.4.2 Advertising BGP Route Information 5.4.3 Determining the Best Routes 5.4.4 IP-Anycast 5.4.5 Routing Policy 5.4.6 Putting the Pieces Together: Obtaining Internet Presence 5.5 The SDN Control Plane 5.5.1 The SDN Control Plane: SDN Controller and SDN Control Applications 5.5.2 OpenFlow Protocol 5.5.3 Data and Control Plane Interaction: An Example 5.5.4 SDN: Past and Future 5.6 ICMP: The Internet Control Message Protocol 5.7 Network Management, SNMP, and NETCONF/YANG 5.7.1 The Network Management Framework 5.7.2 The Simple Network Management Protocol (SNMP) 5.7.3 NETCONF and YANG 5.8 Summary Homework Problems and Questions Socket Programming Assignment Programming Assignment Wireshark Lab: ICMP Chapter 6: The Link Layer and LANs 6.1 Introduction to the Link Layer 6.1.1 The Services Provided by the Link Layer 6.1.2 Where Is the Link Layer Implemented? 6.2 Error-Detection and -Correction Techniques 6.2.1 Parity Checks 6.2.2 Checksumming Methods 6.2.3 Cyclic Redundancy Check (CRC) 6.3 Multiple Access Links and Protocols 6.3.1 Channel Partitioning Protocols 6.3.2 Random Access Protocols 6.3.3 Taking-Turns Protocols 6.3.4 DOCSIS: The Link-Layer Protocol for Cable Internet Access 6.4 Switched Local Area Networks 6.4.1 Link-Layer Addressing and ARP 6.4.2 Ethernet 6.4.3 Link-Layer Switches 6.4.4 Virtual Local Area Networks (VLANs) 6.5 Link Virtualization: A Network as a Link Layer 6.5.1 Multiprotocol Label Switching (MPLS) 6.6 Data Center Networking 6.6.1 Data Center Architectures 6.6.2 Trends in Data Center Networking 6.7 Retrospective: A Day in the Life of a Web Page Request 6.7.1 Getting Started: DHCP, UDP, IP, and Ethernet 6.7.2 Still Getting Started: DNS and ARP 6.7.3 Still Getting Started: Intra-Domain Routing to the DNS Server 6.7.4 Web Client-Server Interaction: TCP and HTTP 6.8 Summary Homework Problems and Questions Wireshark Labs: Ethernet and Home Networking Chapter 7: Wireless and Mobile Networks 7.1 Introduction 7.2 Wireless Links and Network Characteristics 7.2.1 CDMA 7.3 Wireless LANs 7.3.1 The 802.11 Architecture 7.3.2 The 802.11 MAC Protocol 7.3.3 The IEEE 802.11 Frame 7.3.4 Mobility in the Same IP Subnet 7.3.5 Advanced Features in 802.11 7.3.6 Bluetooth 7.4 Cellular Networks: 4G and 5G 7.4.1 4G LTE Cellular Networks: Architecture and Elements 7.4.2 LTE Protocol Stacks 7.4.3 LTE Radio Access Network 7.4.4 LTE Network Attachment and Power Management 7.4.5 The Global Cellular Network: a Network of Networks 7.4.6 5G Cellular Networks 7.5 Mobility Management: Principles 7.5.1 Device Mobility: a Network-layer Perspective 7.5.2 Home Networks and Roaming on Visited Networks 7.5.3 Direct and Indirect Routing to/from a Mobile Device 7.6 Mobile Management in Practice 7.6.1 Mobility Management in 4G/5G Networks 7.6.2 Mobile IP 7.7 Wireless and Mobility: Impact on Higher-Layer Protocols 7.8 Summary Homework Problems and Questions Wireshark Lab: 802.11 Chapter 8: Security in Computer Networks 8.1 What Is Network Security? 8.2 Principles of Cryptography 8.2.1 Symmetric Key Cryptography 8.2.2 Public Key Encryption 8.3 Message Integrity and Digital Signatures 8.3.1 Cryptographic Hash Functions 8.3.2 Message Authentication Code 8.3.3 Digital Signatures 8.4 End-Point Authentication 8.4.1 Building an Authentication Protocol 8.5 Securing E-Mail 8.5.1 Secure E-Mail 8.5.2 PGP 8.6 Securing TCP Connections: SSL 8.6.1 The Big Picture 8.6.2 A More Complete Picture 8.7 Network-Layer Security: IPsec and Virtual Private Networks 8.7.1 IPsec and Virtual Private Networks (VPNs) 8.7.2 The AH and ESP Protocols 8.7.3 Security Associations 8.7.4 The IPsec Datagram 8.7.5 IKE: Key Management in IPsec 8.8 Securing Wireless LANs and 4G/5G Cellular Networks 8.8.1 Authentication and Key Agreement in 802.11 Wireless LANs 8.8.2 Authentication and Key Agreement in 4G/5G Cellular Networks 8.9 Operational Security: Firewalls and Intrusion Detection Systems 8.9.1 Firewalls 8.9.2 Intrusion Detection Systems 8.10 Summary Homework Problems and Questions Wireshark Lab: SSL IPsec Lab
£66.49
John Wiley & Sons Inc CompTIA A Complete Certification Kit
Book Synopsis
£52.50
Cengage Learning, Inc Linux+ and LPIC-1 Guide to Linux Certification
Book SynopsisEckert's LINUX+ and LPIC-1 GUIDE TO LINUX CERTIFICATION, 6th EDITION, empowers you with the knowledge and skills you need to succeed on CompTIA's Linux��+ (XKO-005) certification exam and the Linux Professional Institute LPIC-1 (101-500 and 102-500) certification exams, as well as in your information technology career. The book covers the latest Linux�� distributions, as well as virtualization, containerization, cloud orchestration and enterprise storage. Comprehensive coverage also addresses key job-related services and cloud technologies, including firewalls, FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Postfix, PostgreSQL, SSH, VNC, RDP, Docker and Kubernetes. Appendices allow you to apply your Linux knowledge to macOS�� and FreeBSD��. Hands-on projects give you practice using the latest Fedora��� and Ubuntu�� Linux�� distributions and can be performed on either a Windows�� PC (Intel�� or ARM��) or macOS�� PC (Intel�� or Apple�� Silicon).Table of Contents1. Introduction to Linux��. 2. Linux�� Installation and Usage. 3. Exploring Linux�� Filesystems. 4. Linux�� Filesystem Management. 5. Linux�� Filesystem Administration. 6. Linux�� Server Deployment. 7. Working with the Shell. 8. System Initialization, X Windows, and Localization. 9. Managing Linux�� Processes. 10. Common Administrative Tasks. 11. Compression, System Backup, and Software Installation. 12. Network Configuration. 13. Configuring Network Services and Cloud Technologies. 14. Security, Troubleshooting, and Performance. Appendix A: Certification. Appendix B: Finding Linux Resources on the Internet. Appendix C: Applying Your Linux�� Knowledge to macOS��. Appendix D: Applying Your Linux�� Knowledge to FreeBSD��.
£72.99
John Wiley & Sons Inc Cisco Networking AllinOne For Dummies
Book SynopsisDo you wish that the complex topics of routers, switches, and networking could be presented in a simple, understandable presentation? This reference is packed with all the information you need to learn to use Cisco routers and switches to develop and manage secure Cisco networks.Table of ContentsIntroduction 1 Book I: Overview 5 Chapter 1: Looking at the Cisco Network World 7 Chapter 2: Exploring Cisco Network Design 23 Chapter 3: Knowing as Little as Possible about Math 47 Chapter 4: Testing Your Core Networking Knowledge 59 Chapter 5: Getting into the Cisco Internetwork Operating System 95 Book II: Internet Protocols 131 Chapter 1: Making the Most of IPv4 133 Chapter 2: Choosing between Protocols: TCP and UDP 159 Chapter 3: Working with ARP, the IP Communication Model, and Data Link Layer Troubleshooting 177 Chapter 4: Preparing for the Advent of IPv6 203 Book III: Switching 211 Chapter 1: Reviewing the Enterprise LAN 213 Chapter 2: Switching Basics 225 Chapter 3: Confi guring Switches 237 Chapter 4: Easing Device Discovery with CDP 265 Chapter 5: Virtualizing Networks with VLANs and VTP 277 Chapter 6: Adding Fault Tolerance with STP 295 Chapter 7: Adding Fault Tolerance with EtherChannel 315 Chapter 8: Speeding Confi guration with Smartport Macros 327 Book IV: Routing 337 Chapter 1: Making the Wide Area Network (WAN) Wide 339 Chapter 2: Cozying Up to Routing Basics 351 Chapter 3: Router Confi guration 365 Chapter 4: Setting Up Static Routes 385 Chapter 5: Confi guring Serial Connections and WAN Links 395 Chapter 6: Meeting the Routing Protocols 407 Chapter 7: Checking Out RIP and EIGRP Characteristics and Design 419 Chapter 8: Getting Comfortable with the OSPF and IS-IS Protocols 433 Chapter 9: Routing with BGP and IP Multicast 451 Book V: Wireless 471 Chapter 1: Getting Wise to Wireless LANs473 Chapter 2: Planning Your WLAN 491 Chapter 3: Securing Your WLAN 519 Chapter 4: Building a Cisco Wireless Network 535 Book VI: Security 555 Chapter 1: Defending against Common Attacks with Basic Security Tools 557 Chapter 2: Securing Networks with Cisco's Adaptive Security Appliance 579 Chapter 3: Securing Networks with ACLs and NAT 611 Chapter 4: Cisco Security Best Practices 633 Index 655
£26.39
Pearson Education (US) CCNP and CCIE Data Center Core DCCOR 350601
Book SynopsisSomit Maloo, CCIE No. 28603, CCDE No. 20170002, is a content architect from the data center team in the Learning & Certifications' organization. He holds a master's degree in telecommunication networks and a bachelor's degree in electronics and telecommunication engineering. He is also a penta CCIE in routing and switching, service provider, wireless, security, and data center technologies. Somit holds various industry-leading certifications, including CCDE, PMP, RHCSA, and VMware VCIX6 in Data Center and Network Virtualization. Somit has extensive experience in designing and developing various data center courses for the official Cisco curriculum. He started his career as a Cisco TAC engineer. Somit has more than 13 years of experience in the networking industry, working mostly with data center networks. You can reach Somit on Twitter: @somitmaloo. Iskren Nikolov, CCIE No. 20164, CCSI No. 32481, MCT Alumni, content architect, engineer, and dTable of ContentsIntroduction xxxv Part I Networking Chapter 1 Implementing Routing in the Data Center 2 “Do I Know This Already?” Quiz 2 Foundation Topics 5 Routing Protocols Support on Cisco Nexus Devices 5 OSPF 6 OSPF Link-State Advertisements 7 OSPF Authentication 13 OSPF Configurations and Verifications 13 Border Gateway Protocol 24 BGP Peering 25 BGP Path Selection 26 Multiprotocol BGP 29 BGP Configurations and Verifications 30 Bidirectional Forwarding Detection 37 Rapid Detection of Failures 38 BFD Configurations and Verifications 38 Multicast 42 Internet Group Management Protocol 43 Switch IGMP Snooping 46 Multicast Listener Discovery 46 Multicast Distribution Trees 47 Protocol Independent Multicast 49 Multicast Forwarding 55 Multicast Configurations and Verifications 56 Hot Standby Router Protocol 69 Virtual Router Redundancy Protocol 73 VRRP Operation 73 VRRP Groups 75 VRRP Router Priority and Preemption 76 VRRP Authentication 77 VRRP Tracking 77 IPv6 First Hop Redundancy 77 HSRP/VRRP Configurations and Verifications 79 Exam Preparation Tasks 87 Chapter 2 Implementing Data Center Switching Protocols 90 “Do I Know This Already?” Quiz 90 Foundation Topics 93 Spanning Tree Protocols 93 STP Topology 93 STP Port Types 94 STP Extensions 94 Unidirectional Link Detection 97 Rapid PVST+ 98 Spanning Tree Configurations and Verifications 102 Port Channels 117 Port Channel Load Balance 120 Virtual Port Channel 122 vPC Traffic Flows 125 vPC Dual-Control Plane 126 vPC Primary and Secondary Roles 127 vPC Configuration Consistency 128 vPC Duplicate Frames Prevention Mechanism 129 vPC HSRP Gateway Considerations 131 vPC ARP Synchronization 131 vPC Peer Gateway 131 Port Channel Configurations and Verifications 132 Exam Preparation Tasks 146 Chapter 3 Implementing Data Center Overlay Protocols 150 “Do I Know This Already?” Quiz 150 Foundation Topics 151 Virtual Extensible LAN (VXLAN) Overview 151 VXLAN Encapsulation and Packet Format 152 VXLAN Tunnel Endpoint 152 Virtual Network Identifier 153 VXLAN Control Plane 154 VXLAN Gateways 157 VXLAN High Availability 157 VXLAN Tenant Routed Multicast 159 VXLAN Configurations and Verifications 159 Exam Preparation Tasks 169 Chapter 4 Describe Cisco Application Centric Infrastructure 172 “Do I Know This Already?” Quiz 172 Foundation Topics 174 Cisco Application Centric Infrastructure (ACI) Overview 174 Cisco Application Policy Infrastructure Controller 176 Cisco Nexus 9000 Series Spine and Leaf Switches for Cisco ACI 179 Cisco ACI Initial Setup, Fabric Discovery, Fabric Upgrade, and Fabric Access Policies 182 Cisco ACI Initial Setup 182 Cisco ACI Fabric Discovery 187 Startup with Cisco ACI Fabric Discovery and Configuration 188 Fabric Upgrade 189 Cisco ACI Fabric Access Policies 190 Cisco ACI Fabric Building Blocks, Policy Model, and VMM Domains 195 ACI Policy Model 197 Cisco ACI Tenants 198 Taboo Contracts 209 vzAny Rule 210 Filters and Subjects 213 Management Tenant 213 In-Band Management Access 214 ACI VXLAN 215 ACI Intersubnet Tenant Traffic 217 Policy Identification and Enforcement 218 ACI Fabric Traffic Storm Control 219 ACI Fabric Traffic Load Balance 219 ACI Fabric Loop Detection 220 ACI Design Best Practices 221 ACI LAB Configurations Example 221 Building ACI Fabric 224 Creating Tenant 227 Creating Contract and Filter 230 Deploying a Three-Tier Application 233 Integrating with vCenter 235 Exam Preparation Tasks 238 Chapter 5 Cisco Cloud Services and Deployment Models 240 “Do I Know This Already?” Quiz 240 Foundation Topics 242 What Is Cloud Computing? 242 Cloud Service Models 245 Software as a Service 245 Platform as a Service 246 Infrastructure as a Service 246 Cloud Deployment Models 248 Private Cloud 248 Public Cloud 248 Hybrid Cloud 249 Community Cloud 250 Exam Preparation Tasks 250 Chapter 6 Data Center Network Management and Monitoring 252 “Do I Know This Already?” Quiz 252 Foundation Topics 254 Cisco Nexus NX-OS Software Installation, Updates, and Their Impacts 254 PowerOn Auto Provisioning (POAP) 259 Data Center Infrastructure Software Lifecycle Management 263 Nexus Nondisruptive In-Service Software Upgrade 263 Nexus Disruptive and Nondisruptive Upgrade/Downgrade Procedure 265 Programmable Logical Devices Upgrade 269 Nexus Configuration Management 271 NX-OS Configuration Save and Backup 272 Nexus Config Rollback and Checkpoint 272 Network Time Management 274 Network Time Protocol 275 Precision Time Protocol 280 Network Infrastructure Monitoring 284 NX-OS System Message Logging 284 NX-OS Simple Network Management Protocol 286 Nexus Smart Call Home 292 Nexus NetFlow 293 Switched Port Analyzer 298 Streaming Telemetry 306 Network Assurance Concept 310 Exam Preparation Tasks 312 Chapter 7 Describe Cisco Nexus Dashboard 314 “Do I Know This Already?” Quiz 314 Foundation Topics 316 Cisco Nexus Dashboard 316 Cisco Nexus Dashboard Insights 318 Cisco Nexus Dashboard Orchestrator 323 Cisco Nexus Dashboard Fabric Controller 325 Cisco Nexus Dashboard Data Broker 335 Cisco Nexus Dashboard Platforms 337 Cisco Nexus Dashboard Cluster Nodes 339 Cisco Nexus Dashboard External Networks 341 Cisco Nexus Dashboard GUI Overview 342 One View Page 343 Admin Console Page 343 Exam Preparation Tasks 348 Part II Storage Chapter 8 Implement Fibre Channel 352 “Do I Know This Already?” Quiz 353 Foundation Topics 356 Cisco MDS 9000 Series Hardware 356 Cisco MDS 9700 Series Multilayer Directors 356 Cisco MDS 9300 Series Multilayer Fabric Switches 360 Cisco MDS 9200 Series Multiservice Switches 361 Cisco MDS 9100 Series Multilayer Fabric Switches 362 Fibre Channel Basics 365 Fibre Channel Topologies 365 Fibre Channel Port Types 368 Fibre Channel Addressing 371 Flow Control 372 Switched Fabric Initialization 373 Device Registration: FLOGI, PLOGI, PRLI 378 FLOGI and FCNS Databases 378 CFS 380 CFS Features 381 CFS Fabric Lock 382 CFSoIP and CFSoFC 382 CFS Merge 384 CFS Regions 384 VSAN 386 VSAN Features 386 VSAN Attributes 387 VSAN Advantages 388 Dynamic Port VSAN Membership (DPVM) 388 VSAN Trunking 389 SAN Port Channels 396 Types of SAN Port Channels 396 Port Channel Load Balancing 398 Port Channel Modes 399 Zoning 404 Zoning Features 404 Zone Enforcement 406 Full and Active Zone Set 407 Autozone 410 Zone Merge 410 Smart Zoning 411 Enhanced Zoning 412 Device Alias 418 Device Alias Features 419 Device Alias Modes 419 Device Alias Distribution 420 Zone Aliases (FC Aliases) Versus Device Aliases 421 NPIV and NPV 424 Exam Preparation Tasks 431 Chapter 9 Implement FCoE Unified Fabric 434 “Do I Know This Already?” Quiz 434 Foundation Topics 436 FCoE Overview 436 Ethernet Enhancements 438 FCoE Frame Format 442 Virtual Fibre Channel (VFC) 444 FCoE Elements and Port Types 445 FCoE Addressing and Forwarding 447 FCoE Initialization Protocol (FIP) 448 Benefits of FCoE 451 FCoE Topology Options 451 FCoE Single-Hop Topology 451 FCoE Multi-Hop Topology 454 FCoE Implementations 455 FCoE Configuration on Cisco Nexus 7000 Series Switches 456 FCoE Configuration on Cisco Nexus 5000 Series Switches 458 FCoE Configuration on Cisco Nexus 9000 Series Switches 459 FCoE over FEX 461 FCoE NPV 463 FCoE Verification 466 Exam Preparation Tasks 475 Chapter 10 Describe NFS and NAS Concepts 478 “Do I Know This Already?” Quiz 478 Foundation Topics 479 Describe NFS Concepts 479 Describe NAS Concepts 481 NAS Benefits 483 Cisco UCS S-Series Storage Servers 483 Exam Preparation Tasks 485 Chapter 11 Describe Software Management and Infrastructure Monitoring 488 “Do I Know This Already?” Quiz 488 Foundation Topics 490 Cisco MDS NX-OS Setup Utility 490 Cisco MDS NX-OS Software Upgrade and Downgrade 498 Nondisruptive Upgrade on a Cisco MDS Fabric Switch 500 Disruptive Upgrade on a Cisco MDS Fabric Switch 505 Nondisruptive Downgrade on a Cisco MDS Fabric Switch 508 Disruptive Downgrade on a Cisco MDS Fabric Switch 513 EPLD Upgrade on Cisco MDS 9000 Series Switches 515 Infrastructure Monitoring 521 System Messages 521 Call Home 521 Embedded Event Manager 522 RMON 523 SPAN 523 Exam Preparation Tasks 528 Part III Compute Chapter 12 Cisco Unified Computing Systems Overview 530 “Do I Know This Already?” Quiz 530 Foundation Topics 532 Cisco UCS Architecture 532 Cisco UCS Components and Connectivity 534 Cisco UCS 5108 Blade Server Chassis 536 UCS Blade Servers 536 Cisco UCS Rack Servers 537 Cisco UCS Storage Servers 537 Cisco UCS Mini 539 Cisco UCS Fabric Infrastructure 539 Cisco UCS 6536 Fabric Interconnect 540 Cisco UCS 6454 Fabric Interconnect 541 Cisco UCS 6300 Series Fabric Interconnects 543 Fabric Interconnect and Fabric Extender Connectivity 544 Cisco UCS Virtualization Infrastructure 550 Cisco UCS-X System 555 Cisco UCS Initial Setup and Management 557 Fabric Interconnect Connectivity and Configurations 565 Fabric Interconnect Port Modes 567 Fabric Failover for Ethernet: High-Availability vNIC 569 Ethernet Switching Mode 570 UCS Device Discovery 577 Chassis/FEX Discovery 577 Rack Server Discovery Policy 577 Initial Server Setup for Standalone UCS C-Series 578 Cisco UCS Network Management 584 UCS Virtual LAN 584 UCS Identity Pools 591 Service Profiles 596 UCS Server Policies 599 UCS Service Profile Templates 602 Quality of Service 608 Cisco UCS Storage 611 UCS SAN Connectivity 611 UCS SAN Configuration 615 Virtual Storage-Area Networks 616 World Wide Name Pool 621 SAN Connectivity Policies 624 Exam Preparation Tasks 625 Chapter 13 Cisco Unified Computing Infrastructure Monitoring 628 “Do I Know This Already?” Quiz 628 Foundation Topics 630 Cisco UCS System Monitoring 630 Data Management Engine 631 Application Gateway 631 Northbound Interfaces 631 Cisco UCS Monitoring Events and Logs 632 Cisco UCS Monitoring Policies 634 Traffic Monitoring 640 Cisco Intersight 647 Intersight Management as a Service 648 Intersight as a Telemetry Data Collection 650 Cisco Intersight Supported Software 650 Cisco Intersight Licensing 652 Exam Preparation Tasks 656 Chapter 14 Cisco Unified Compute Software and Configuration Management 658 “Do I Know This Already?” Quiz 658 Foundation Topics 660 Cisco UCS Configuration Management 660 Creating and Running a Backup Operation 661 Backup Policies 666 Backup Policy Configuration 666 Import Backups 668 Enable the Import Operation 669 System Restore 670 Restoring the Configuration for a Fabric Interconnect 671 UCS Firmware and Software Updates 672 Firmware Version Terminology 679 Firmware Upgrades Through Auto Install 680 Direct Upgrade After Auto Install Procedure 684 Install Infrastructure Firmware Procedure 688 Upgrading the Server Firmware with Auto Install 691 Standalone Cisco UCS C-Series Server Firmware Upgrade Using the Host Upgrade Utility (HUU) 693 Downloading and Preparing the ISO for an Upgrade 694 Exam Preparation Tasks 700 Chapter 15 Cisco HyperFlex Overview 702 “Do I Know This Already?” Quiz 702 Foundation Topics 704 Cisco HyperFlex Solution and Benefits 704 HyperFlex Benefits 707 HyperFlex as an Edge, Hybrid, and All-Flash Nodes 712 HyperFlex as an Edge Device 712 HyperFlex Hyperconverged Multicloud Platform (Hybrid or All-Flash) 714 HyperFlex All NVMe 715 Cisco HyperFlex Data Platform 716 Exam Preparation Tasks 728 Part IV Automation Chapter 16 Automation and Scripting Tools 730 “Do I Know This Already?” Quiz 730 Foundation Topics 733 EEM Overview 733 Policies 733 Event Statements 734 Action Statements 734 Configuring EEM 735 Verifying the EEM Configuration 736 Scheduler 736 Configuring Scheduler 737 Verifying Scheduler Configuration 739 Bash Shell for Cisco NX-OS 740 Managing Feature RPMs 742 Managing Patch RPMs 742 Guest Shell for Cisco NX-OS 743 Accessing the Guest Shell 743 Resources Used for the Guest Shell 744 Capabilities in the Guest Shell 744 Managing the Guest Shell 746 XML 748 Example 749 XML Syntax 750 JSON 751 Rest API 752 Authentication 753 Response 754 NX-API 755 NX-API Request and Response Elements 757 NX-API Developer Sandbox 759 Exam Preparation Tasks 760 Chapter 17 Evaluate Automation and Orchestration Technologies 762 “Do I Know This Already?” Quiz 762 Foundation Topics 764 Ansible 764 Ansible Components 765 Important Ansible Concepts 766 Ansible CLI Tools 767 Cisco NX-OS and Ansible Example 767 Python 768 Python Package for Cisco 769 Using the CLI Command APIs 771 Python in Interactive Mode 772 Python in Noninteractive Mode 773 UCS Manager Python SDK 775 Convert to UCS Python 777 PowerOn Auto Provisioning (POAP) 777 Limitations of POAP 778 Network Requirements for POAP 778 POAP Configuration Script 778 POAP Process 779 Configuring a Switch Using POAP 782 HashiCorp Terraform 783 Terraform Concept 784 Terraform Components 784 Terraform Commands 786 PowerShell 789 Exam Preparation Tasks 795 Part V Security Chapter 18 Network Security 798 “Do I Know This Already?” Quiz 798 Foundation Topics 801 Authentication, Authorization, and Accounting 801 AAA Service Configuration Options 802 Authentication and Authorization User Login Process 803 AAA NX-OS Configurations 804 Role-Based Access Control 807 NX-OS User Roles and Rules 809 NX-OS RBAC Configurations 811 Nexus First-Hop Security 815 Nexus Dynamic ARP Inspection 816 NX-OS DAI Configurations 819 NX-OS DHCP Snooping 827 Port Security 832 Nexus Port Secure MAC Address Maximum and Dynamic Address Aging 833 Port Security Violations and Actions 834 Nexus Port Types and Port Security 835 NX-OS Port Security Configuration 835 Nexus Control Plane Policing 837 Control Plane Packet 839 Classification for CoPP 840 NX-OS CoPP Configuration 844 Cisco ACI Contracts 851 Cisco ACI Contract Configuration Parameters 853 Create, Modify, or Remove Regular Contracts 854 Apply or Remove VRF Contracts 856 Inter-Tenant Contracts 857 Inter-Private Network Contracts Communication 858 Single Contract Bidirectional Reverse Filter 859 Single Contract Unidirectional with Multiple Filters 859 Multiple Contracts Unidirectional Single Filter 860 ACI Microsegmentation 860 Example: ACI Microsegmentation with VMs from a Single Application EPG 862 Example: ACI Microsegmentation with VMs in Different Application EPGs 863 ACI Microsegmentation Configurations 864 Keychain Authentication 868 NX-OS Keychain Configurations 868 Key Selection 871 Exam Preparation Tasks 872 Chapter 19 Compute Security 874 “Do I Know This Already?” Quiz 874 Foundation Topics 875 Securing UCS Management Using Authentication, Authorization, and Accounting 875 User RADIUS and TACACS+ Attributes 876 Two-Factor Authentication 879 UCS Web Session Refresh and Session Timeout Period 879 UCS LDAP Providers and Groups 879 RADIUS and TACACS+ Authentication Configurations 888 UCS Remote Users Role Policy 892 Multiple Authentication Services Configuration 894 Exam Preparation Tasks 895 Chapter 20 Storage Security 896 “Do I Know This Already?” Quiz 896 Foundation Topics 898 Authentication, Authorization, and Accounting 898 Authentication 899 Authorization 899 Accounting 900 Server Groups 900 AAA Service Configuration Options 900 AAA Server Monitoring 900 Remote AAA Services 901 Local AAA Services 911 AAA Authentication and Authorization Process 912 AAA Server Distribution 913 Merging RADIUS and TACACS+ Configurations 914 User Accounts and RBAC 914 User Roles 915 Rules 915 User Role Policies 917 RBAC Sample Configuration 918 Port Security 919 Port Security Configuration 921 Verification of Port Security 924 Fabric Binding 926 Fabric Binding Configuration 926 Port Security Versus Fabric Binding 928 Exam Preparation Tasks 929 Chapter 21 Final Preparation 932 Getting Ready 932 Tools for Final Preparation 933 Pearson Test Prep Practice Test Software and Questions on the Website 933 How to Access the Pearson Test Prep (PTP) App 933 Customizing Your Exams 934 Updating Your Exams 935 Chapter-Ending Review Tools 935 Learn the Question Types Using the Cisco Certification Exam Tutorial 935 Suggested Plan for Final Review/Study 940 Summary 940 Chapter 22 CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide Exam Updates 942 The Purpose of This Chapter 942 About Possible Exam Updates 943 Impact on You and Your Study Plan 943 News About the Next Exam Release 944 Updated Technical Content 944 Appendix A Answers to the “Do I Know This Already?” Quizzes 946 Glossary 961 Online Elements Appendix B Memory Tables Appendix C Memory Tables Answer Key Appendix D Study Planner Glossary 9780138228088 TOC 11/7/2023
£48.68
John Wiley & Sons CISA Certified Information Systems Auditor
Book Synopsis
£31.49
Pearson Education (US) Cisco SoftwareDefined Access
Book SynopsisJason Gooley, CCIE No. 38759 (RS and SP), is a very enthusiastic and spontaneous person who has more than 25 years of experience in the industry. Currently, Jason works as a technical evangelist for the Worldwide Enterprise Networking sales team at Cisco Systems. Jason is very passionate about helping others in the industry succeed. In addition to being a Cisco Press author, Jason is a distinguished speaker at CiscoLive, contributes to the development of the Cisco CCIE and DevNet exams, provides training for Learning@Cisco, is an active CCIE mentor, is a committee member for the Cisco Continuing Education Program (CE), and is a program committee member of the Chicago Network Operators Group (CHI-NOG), www.chinog.org. Jason also hosts a show called MetalDevOps. Jason can be found at www.MetalDevOps.com, @MetalDevOps, and @Jason_Gooley on all social media platforms. Roddie Hasan, CCIE No. 7472 (RS), is a technical solutions architect for CiTable of ContentsIntroduction xviiChapter 1 Today’s Networks and the Drivers for Change 1Networks of Today 1Common Business and IT Trends 4Common Desired Benefits 5High-Level Design Considerations 6Cisco Digital Network Architecture 10Past Solutions to Today’s Problems 12 Spanning-Tree and Layer 2–Based Networks 13Introduction to Multidomain 16 Cloud Trends and Adoption 18Summary 20Chapter 2 Introduction to Cisco Software-Defined Access 21Challenges with Today’s Networks 22Software-Defined Networking 22Cisco Software-Defined Access 23 Cisco Campus Fabric Architecture 24 Campus Fabric Fundamentals 25 Cisco SD-Access Roles 27Network Access Control 30 Why Network Access Control? 31Introduction to Cisco Identity Services Engine 32 Overview of Cisco Identity Services Engine 32 Cisco ISE Features 34 Secure Access 34 Device Administration 37 Guest Access 38 Profiling 40 Bring Your Own Device 45 Compliance 46 Integrations with pxGrid 48 Cisco ISE Design Considerations 50 Cisco ISE Architecture 50 Cisco ISE Deployment Options 51 Standalone Deployment 51 Distributed Deployment 51 Dedicated Distributed Deployment 52Segmentation with Cisco TrustSec 54 Cisco TrustSec Functions 54 Classification 55 Propagation 55 Enforcement 57Summary 58Chapter 3 Introduction to Cisco DNA Center 59Network Planning and Deployment Trends 59History of Automation Tools 60Cisco DNA Center Overview 62Design and Visualization of the Network 64 Site Design and Layout 64 Network Settings 69 Wireless Deployments 70Network Discovery and Inventory 72 Discovery Tool 72 Inventory 74Device Configuration and Provisioning 77Summary 79Chapter 4 Cisco Software-Defined Access Fundamentals 81Network Topologies 81Cisco Software-Defined Access Underlay 82 Manual Underlay 83 Automated Underlay: LAN Automation 84Wireless LAN Controllers and Access Points in Cisco Software-Defined Access 89Shared Services 90Transit Networks 91 IP-Based Transit 91 SD-Access Transit 92Fabric Creation 92 Fabric Location 93 Fabric VNs 94Fabric Device Roles 94 Control Plane 95 Fabric Borders 96 Border Automation 98 Border and Control Plane Collocation 99 Fabric Edge Nodes 100 Intermediate Nodes 103 External Connectivity 104 Fusion Router 104Host Onboarding 105 Authentication Templates 105 VN to IP Pool Mapping 106 SSID to IP Pool Mapping 108 Switchport Override 109Summary 110References in This Chapter 110Chapter 5 Cisco Identity Services Engine with Cisco DNA Center 111Policy Management in Cisco DNA Center with Cisco ISE 112 Integration of Cisco DNA Center and ISE 113 Certificates in Cisco DNA Center 113 Certificates on Cisco Identity Services Engine 115 Cisco ISE and Cisco DNA Center Integration Process 116Group-Based Access Control 122Segmentation with Third-Party RADIUS Server 126Secure Host Onboarding in Enterprise Networks 128 Endpoint Host Modes in 802.1X 128 Single-Host Mode 128 Multi-Host Mode 128 Multi-Domain Mode 129 Multi-Auth Mode 129802.1X Phased Deployment 130 Why a Phased Approach? 131 Phase I: Monitor Mode (Visibility Mode) 132 Phase II: Low-Impact Mode 133 Phase II: Closed Mode 134Host Onboarding with Cisco DNA Center 136 No Authentication Template 137 Open Authentication Template 138 Closed Authentication 140 Easy Connect 141Security in Cisco Software-Defined Access Network 144 Macro-Segmentation in Cisco SD-Access 144 Micro-Segmentation in Cisco SD-Access 145Policy Set Overview in Cisco ISE 146Segmentation Policy Construction in Cisco SD-Access 148 Corporate Network Access Use Case 149 Guest Access Use Case 159Segmentation Outside the Fabric 164Summary 164References in This Chapter 165Chapter 6 Cisco Software-Defined Access Operation and Troubleshooting 167Cisco SD-Access Under the Covers 167 Fabric Encapsulation 167 LISP 168 VXLAN 171 MTU Considerations 172Host Operation and Packet Flow in Cisco SD-Access 172 DHCP in Cisco SD-Access 172 Wired Host Onboarding and Registration 175 Wired Host Operation 176 Intra-Subnet Traffic in the Fabric 176 Inter-Subnet Traffic in the Fabric 179 Traffic to Destinations Outside of the Fabric 180 Wireless Host Operation 180 Initial Onboarding and Registration 180Cisco SD-Access Troubleshooting 181 Fabric Edge 182 Fabric Control Plane 186Authentication/Policy Troubleshooting 188 Authentication 188 Policy 190 Scalable Group Tags 191Summary 193References in This Chapter 193Chapter 7 Advanced Cisco Software-Defined Access Topics 195Cisco Software-Defined Access Extension to IoT 196 Types of Extended Nodes 198 Extended Nodes 198 Policy Extended Nodes 198 Configuration of Extended Nodes 200 Onboarding the Extended Node 203 Packet Walk of Extended Cisco SD-Access Use Cases 205 Use Case: Hosts in Fabric Communicating with Hosts Connected Outside the Fabric 205 Use Case: Traffic from a Client Connected to a Policy Extended Node 206 Use Case: Traffic to a Client Connected to a Policy Extended Node 207 Use Case: Traffic Flow Within a Policy Extended Node 207Multicast in Cisco SD-Access 208 Multicast Overview 209 IP Multicast Delivery Modes 210Multicast Flows in Cisco SD-Access 210 Scenario 1: Multicast in PIM ASM with Head-End Replication (Fabric RP) 211 Scenario 2: Multicast in PIM SSM with Head-End Replication 213 Scenario 3: Cisco SD-Access Fabric Native Multicast 214 Cisco SD-Access Multicast Configuration in Cisco DNA Center 216Layer 2 Flooding in Cisco SD-Access 218 Layer 2 Flooding Operation 219Layer 2 Border in Cisco SD-Access 221 Layer 2 Intersite 224 Layer 2 Intersite Design and Traffic Flow 224 Fabric in a Box in Cisco SD-Access 227Cisco SD-Access for Distributed Campus Deployments 228 Types of Transit 229 IP Transit 229 Fabric Multisite or Multidomain with IP Transit 230 Cisco SD-Access Transit 232 Cisco SD-WAN Transit 237 Policy Deployment Models in Cisco SD-Access Distributed Deployment 238Cisco SD-Access Design Considerations 240 Latency Considerations 240 Cisco SD-Access Design Approach 241 Very Small Site 241 Small Site 242 Medium Site 243 Large Site 243 Single-Site Design Versus Multisite Design 244 Cisco SD-Access Component Considerations 245 Underlay Network 246 Underlay Network Design Considerations 246 Overlay Network 247 Overlay Fabric Design Considerations 247 Fabric Control Plane Node Design Considerations 248 Fabric Border Node Design Considerations 248 Infrastructure Services Design Considerations 249 Fabric Wireless Integration Design Considerations 249 Wireless Over-the-Top Centralized Wireless Option Design Considerations 250 Mixed SD-Access Wireless and Centralized Wireless Option Design Considerations 250 Wireless Guest Deployment Considerations 250 Security Policy Design Considerations 251Cisco SD-Access Policy Extension to Cisco ACI 252Summary 254References in This Chapter 254Chapter 8 Advanced Cisco DNA Center 255Cisco DNA Center Architecture and Connectivity 256 Hardware and Scale 256 Network Connectivity 256 High Availability and Clustering with Cisco DNA Center 258Software Image Management 259 Image Repository 261 Golden Image 262 Upgrading Devices 263Cisco DNA Center Templates 266 Template Creation 267 Template Assignment and Network Profiles 269 Deploying Templates 270Plug and Play 272 Onboarding Templates 273 PnP Agent 275 Claiming a Device 276Cisco DNA Center Tools 280 Topology 280 Command Runner 281 Security Advisories 283Summary 284References in This Chapter 284Chapter 9 Cisco DNA Assurance 285Assurance Benefits 285 Challenges of Traditional Implementations 285 Cisco DNA Analytics 286Cisco DNA Assurance Architecture 287 Cisco DNA Assurance Data Collection Points 289 Streaming Telemetry 290 Network Time Travel 292 Health Dashboards 292 Overall Health Dashboard 293 Network Health Dashboard 294 Cisco SD-Access Fabric Network Health 296 Client Health Dashboard 297 Application Health Dashboard 299Cisco DNA Assurance Tools 300 Intelligent Capture 300 Anomaly Capture 301 Path Trace 303 Sensor Tests 303 Cisco AI Network Analytics 304Summary 306References in This Chapter 306Glossary 3079780136448389 TOC 6/24/2020
£40.49
Manning Publications Tiny C Projects
Book SynopsisLearn the big skills of C programming by creating bite-size projects! Work your way through these 21 fun and interesting tiny challenges to master essential C techniques you'll use in full-size applications. In Tiny C Projectsyou will learn how to: Create libraries of functions for handy use and re-use Process input through an I/O filter to generate customized output Use recursion to explore a directory tree and find duplicate files Develop AI for playing simple games Explore programming capabilities beyond the standard C library functions Evaluate and grow the potential of your programs Improve code to better serve users Tiny C Projectsis an engaging collection of 21 small programming challenges! Hone and develop your C abilities with lighthearted games like Hunt the Wumpus and tic-tac-toe, utilities like a useful calendar and a mini-editor app, and thought-provoking exercises like encoding and cyphers. Every project encourages you to evolve your code, add new functions, and explore the full capabilities of C. About the technology C is a mature and secure language that's perfect for everything from low-level systems programming to high performance embedded applications. The 21 fun projects in this guide demonstrate the range of C's capabilities and give you hands-on experience with this powerful and flexible language. About the book Tiny C Projects builds and hones your C programming skills with interesting and exciting challenges. You'll expand your C programming portfolio by creating useful utility programs, fun games, password generators, directory utilities, and more. Each program you create starts out simple and then deepens as you explore approaches and alternatives you can use to achieve your goals. Once you'e done, you'll find it easy to scale up the skills you've learned from tiny projects into real applications. RETAIL SELLING POINTS Create libraries of functions for handy use and re-use Process input through an I/O filter to generate customized output Use recursion to explore a directory tree and find duplicate files Develop AI for playing simple games Explore programming capabilities beyond the standard C library functions Evaluate and grow the potential of your programs Improve code to better serve users AUDIENCE For C programmers of all skill levels who want to hone their skills with the languageTrade Review'Recommended to anyone who wanted to sharpen recently acquired or rusty C skills.' Patrick Regan 'A great resource to understand that C is more than an embedded language in the modern development landscape!' Adhir Ramjiawan 'Even people with too much experience with C will benefit from reading. The reading experience is fantastic. I never got bored, and all the steps are clearly explained.' Marco CarniniTable of Contentstable of contents detailed TOC READ IN LIVEBOOK 1CONFIGURATION AND SETUP READ IN LIVEBOOK 2DAILY GREETINGS READ IN LIVEBOOK 3NATO OUTPUT READ IN LIVEBOOK 4CAESAREAN CIPHER READ IN LIVEBOOK 5ENCODING AND DECODING READ IN LIVEBOOK 6PASSWORD GENERATORS READ IN LIVEBOOK 7STRING UTILITIES 8 UNICODE TEXT 9 HEX DUMPER 10 DIRECTORY TREE 11 FILE FINDER 12 HOLIDAY DETECTOR 13 CALENDAR 14 YOUR LOTTO PICKS 15 BIT MANIPULATION TOOLS
£52.47
John Wiley & Sons Inc The Art of Intrusion
Book SynopsisHacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world''s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use social engineering to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick''s reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollarsTrade Review"...a valuable investment..." (AccountingWeb UK, 30th August 2005) “…he retells stories provided by his other hackers of how they managed, often with pitiful ease, to break supposedly secure companies all over the world.” (Director, May 2005) “…a compilation of real hacking stories told to Mitnick by fellow hackers…” (VNUnet.com, March 2005) It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda–style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick's handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories—some are quite exciting—will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. Agent, David Fugate. (Mar.) (Publishers Weekly, February 14, 2005) Infamous criminal hacker turned computer security consultant Mitnick offers an expert sequel to his best-selling The Art of Deception, this time supplying real-life rather than fictionalized stories of contemporary hackers sneaking into corporate servers worldwide. Each chapter begins with a computer crime story that reads like a suspense novel; it is a little unnerving to learn how one's bank account is vulnerable to digital thieves or how hackers with an interest in gambling can rake in thousands of dollars in just minutes at a compromised slot machine. The hack revealed, Mitnick then walks readers step by step through a prevention method. Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state-of-the-art security. Mitnick's engaging writing style combines intrigue, entertainment, and education. As with Deception, information technology professionals can learn how to detect and prevent security breaches, while informed readers can sit back and enjoy the stories of cybercrime. Recommended for most public and academic libraries. --Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL (Library Journal, January 15, 2005) Table of ContentsChapter 1: Hacking the Casinos for a Million Bucks. Chapter 2: When Terrorists Come Calling. Chapter 3: The Texas Prison Hack. Chapter 4: Cops and Robbers. Chapter 5: The Robin Hood Hacker. Chapter 6: The Wisdom and Folly of Penetration Testing. Chapter 7: Of Course Your Bank Is Secure — Right? Chapter 8: Your Intellectual Property Isn’t Safe. Chapter 9: On the Continent. Chapter 10: Social Engineers — How They Work and How to Stop Them. Chapter 11: Short Takes. Index.
£26.24
John Wiley & Sons Inc Cryptography Engineering
Book SynopsisThe ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging.Table of ContentsPreface to Cryptography Engineering xxiii History xxiv Example Syllabi xxiv Additional Information xxvi Preface to Practical Cryptography (the 1st Edition) xxvii How to Read this Book xxix Part I Introduction 1 Chapter 1 The Context of Cryptography 3 1.1 The Role of Cryptography 4 1.2 The Weakest Link Property 5 1.3 The Adversarial Setting 7 1.4 Professional Paranoia 8 1.4.1 Broader Benefits 9 1.4.2 Discussing Attacks 9 1.5 Threat Model 10 1.6 Cryptography Is Not the Solution 12 1.7 Cryptography Is Very Difficult 13 1.8 Cryptography Is the Easy Part 13 1.9 Generic Attacks 14 1.10 Security and Other Design Criteria 14 1.10.1 Security Versus Performance 14 1.10.2 Security Versus Features 17 1.10.3 Security Versus Evolving Systems 17 1.11 Further Reading 18 1.12 Exercises for Professional Paranoia 18 1.12.1 Current Event Exercises 19 1.12.2 Security Review Exercises 20 1.13 General Exercises 21 Chapter 2 Introduction to Cryptography 23 2.1 Encryption 23 2.1.1 Kerckhoffs’ Principle 24 2.2 Authentication 25 2.3 Public-Key Encryption 27 2.4 Digital Signatures 29 2.5 PKI 29 2.6 Attacks 31 2.6.1 The Ciphertext-Only Model 31 2.6.2 The Known-Plaintext Model 31 2.6.3 The Chosen-Plaintext Model 32 2.6.4 The Chosen-Ciphertext Model 32 2.6.5 The Distinguishing Attack Goal 32 2.6.6 Other Types of Attack 33 2.7 Under the Hood 33 2.7.1 Birthday Attacks 33 2.7.2 Meet-in-the-Middle Attacks 34 2.8 Security Level 36 2.9 Performance 37 2.10 Complexity 37 2.11 Exercises 38 Part II Message Security 41 Chapter 3 Block Ciphers 43 3.1 What Is a Block Cipher? 43 3.2 Types of Attack 44 3.3 The Ideal Block Cipher 46 3.4 Definition of Block Cipher Security 46 3.4.1 Parity of a Permutation 49 3.5 Real Block Ciphers 50 3.5.1 DES 51 3.5.2 AES 54 3.5.3 Serpent 56 3.5.4 Twofish 57 3.5.5 Other AES Finalists 58 3.5.6 Which Block Cipher Should I Choose? 59 3.5.7 What Key Size Should I Use? 60 3.6 Exercises 61 Chapter 4 Block Cipher Modes 63 4.1 Padding 64 4.2 ECB 65 4.3 CBC 65 4.3.1 Fixed IV 66 4.3.2 Counter IV 66 4.3.3 Random IV 66 4.3.4 Nonce-Generated IV 67 4.4 OFB 68 4.5 CTR 70 4.6 Combined Encryption and Authentication 71 4.7 Which Mode Should I Use? 71 4.8 Information Leakage 72 4.8.1 Chances of a Collision 73 4.8.2 How to Deal With Leakage 74 4.8.3 About Our Math 75 4.9 Exercises 75 Chapter 5 Hash Functions 77 5.1 Security of Hash Functions 78 5.2 Real Hash Functions 79 5.2.1 A Simple But Insecure Hash Function 80 5.2.2 MD5 81 5.2.3 SHA-1 82 5.2.4 SHA-224, SHA-256, SHA-384, and SHA-512 82 5.3 Weaknesses of Hash Functions 83 5.3.1 Length Extensions 83 5.3.2 Partial-Message Collision 84 5.4 Fixing the Weaknesses 84 5.4.1 Toward a Short-term Fix 85 5.4.2 A More Efficient Short-term Fix 85 5.4.3 Another Fix 87 5.5 Which Hash Function Should I Choose? 87 5.6 Exercises 87 Chapter 6 Message Authentication Codes 89 6.1 What a MAC Does 89 6.2 The Ideal MAC and MAC Security 90 6.3 CBC-MAC and CMAC 91 6.4 HMAC 93 6.5 GMAC 94 6.6 Which MAC to Choose? 95 6.7 Using a MAC 95 6.8 Exercises 97 Chapter 7 The Secure Channel 99 7.1 Properties of a Secure Channel 99 7.1.1 Roles 99 7.1.2 Key 100 7.1.3 Messages or Stream 100 7.1.4 Security Properties 101 7.2 Order of Authentication and Encryption 102 7.3 Designing a Secure Channel: Overview 104 7.3.1 Message Numbers 105 7.3.2 Authentication 106 7.3.3 Encryption 106 7.3.4 Frame Format 107 7.4 Design Details 107 7.4.1 Initialization 107 7.4.2 Sending a Message 108 7.4.3 Receiving a Message 109 7.4.4 Message Order 111 7.5 Alternatives 112 7.6 Exercises 113 Chapter 8 Implementation Issues (I) 115 8.1 Creating Correct Programs 116 8.1.1 Specifications 117 8.1.2 Test and Fix 118 8.1.3 Lax Attitude 119 8.1.4 So How Do We Proceed? 119 8.2 Creating Secure Software 120 8.3 Keeping Secrets 120 8.3.1 Wiping State 121 8.3.2 Swap File 122 8.3.3 Caches 124 8.3.4 Data Retention by Memory 125 8.3.5 Access by Others 127 8.3.6 Data Integrity 127 8.3.7 What to Do 128 8.4 Quality of Code 128 8.4.1 Simplicity 129 8.4.2 Modularization 129 8.4.3 Assertions 130 8.4.4 Buffer Overflows 131 8.4.5 Testing 131 8.5 Side-Channel Attacks 132 8.6 Beyond this Chapter 133 8.7 Exercises 133 Part III Key Negotiation 135 Chapter 9 Generating Randomness 137 9.1 Real Random 138 9.1.1 Problems With Using Real Random Data 139 9.1.2 Pseudorandom Data 140 9.1.3 Real Random Data and PRNGS 140 9.2 Attack Models for a PRNG 141 9.3 Fortuna 142 9.4 The Generator 143 9.4.1 Initialization 145 9.4.2 Reseed 145 9.4.3 Generate Blocks 146 9.4.4 Generate Random Data 146 9.4.5 Generator Speed 147 9.5 Accumulator 147 9.5.1 Entropy Sources 147 9.5.2 Pools 148 9.5.3 Implementation Considerations 150 9.5.3.1 Distribution of Events Over Pools 150 9.5.3.2 Running Time of Event Passing 151 9.5.4 Initialization 152 9.5.5 Getting Random Data 153 9.5.6 Add an Event 154 9.6 Seed File Management 155 9.6.1 Write Seed File 156 9.6.2 Update Seed File 156 9.6.3 When to Read and Write the Seed File 157 9.6.4 Backups and Virtual Machines 157 9.6.5 Atomicity of File System Updates 158 9.6.6 First Boot 158 9.7 Choosing Random Elements 159 9.8 Exercises 161 Chapter 10 Primes 163 10.1 Divisibility and Primes 163 10.2 Generating Small Primes 166 10.3 Computations Modulo a Prime 167 10.3.1 Addition and Subtraction 168 10.3.2 Multiplication 169 10.3.3 Groups and Finite Fields 169 10.3.4 The GCD Algorithm 170 10.3.5 The Extended Euclidean Algorithm 171 10.3.6 Working Modulo 2 172 10.4 Large Primes 173 10.4.1 Primality Testing 176 10.4.2 Evaluating Powers 178 10.5 Exercises 179 Chapter 11 Diffie-Hellman 181 11.1 Groups 182 11.2 Basic DH 183 11.3 Man in the Middle 184 11.4 Pitfalls 185 11.5 Safe Primes 186 11.6 Using a Smaller Subgroup 187 11.7 The Size of p 188 11.8 Practical Rules 190 11.9 What Can Go Wrong? 191 11.10 Exercises 193 Chapter 12 RSA 195 12.1 Introduction 195 12.2 The Chinese Remainder Theorem 196 12.2.1 Garner’s Formula 196 12.2.2 Generalizations 197 12.2.3 Uses 198 12.2.4 Conclusion 199 12.3 Multiplication Modulo n 199 12.4 RSA Defined 200 12.4.1 Digital Signatures with RSA 200 12.4.2 Public Exponents 201 12.4.3 The Private Key 202 12.4.4 The Size of n 203 12.4.5 Generating RSA Keys 203 12.5 Pitfalls Using RSA 205 12.6 Encryption 206 12.7 Signatures 209 12.8 Exercises 211 Chapter 13 Introduction to Cryptographic Protocols 213 13.1 Roles 213 13.2 Trust 214 13.2.1 Risk 215 13.3 Incentive 215 13.4 Trust in Cryptographic Protocols 217 13.5 Messages and Steps 218 13.5.1 The Transport Layer 219 13.5.2 Protocol and Message Identity 219 13.5.3 Message Encoding and Parsing 220 13.5.4 Protocol Execution States 221 13.5.5 Errors 221 13.5.6 Replay and Retries 223 13.6 Exercises 225 Chapter 14 Key Negotiation 227 14.1 The Setting 227 14.2 A First Try 228 14.3 Protocols Live Forever 229 14.4 An Authentication Convention 230 14.5 A Second Attempt 231 14.6 A Third Attempt 232 14.7 The Final Protocol 233 14.8 Different Views of the Protocol 235 14.8.1 Alice’s View 235 14.8.2 Bob’s View 236 14.8.3 Attacker’s View 236 14.8.4 Key Compromise 238 14.9 Computational Complexity of the Protocol 238 14.9.1 Optimization Tricks 239 14.10 Protocol Complexity 240 14.11 A Gentle Warning 241 14.12 Key Negotiation from a Password 241 14.13 Exercises 241 Chapter 15 Implementation Issues (II) 243 15.1 Large Integer Arithmetic 243 15.1.1 Wooping 245 15.1.2 Checking DH Computations 248 15.1.3 Checking RSA Encryption 248 15.1.4 Checking RSA Signatures 249 15.1.5 Conclusion 249 15.2 Faster Multiplication 249 15.3 Side-Channel Attacks 250 15.3.1 Countermeasures 251 15.4 Protocols 252 15.4.1 Protocols Over a Secure Channel 253 15.4.2 Receiving a Message 253 15.4.3 Timeouts 255 15.5 Exercises 255 Part IV Key Management 257 Chapter 16 The Clock 259 16.1 Uses for a Clock 259 16.1.1 Expiration 259 16.1.2 Unique Value 260 16.1.3 Monotonicity 260 16.1.4 Real-Time Transactions 260 16.2 Using the Real-Time Clock Chip 261 16.3 Security Dangers 262 16.3.1 Setting the Clock Back 262 16.3.2 Stopping the Clock 262 16.3.3 Setting the Clock Forward 263 16.4 Creating a Reliable Clock 264 16.5 The Same-State Problem 265 16.6 Time 266 16.7 Closing Recommendations 267 16.8 Exercises 267 Chapter 17 Key Servers 269 17.1 Basics 270 17.2 Kerberos 270 17.3 Simpler Solutions 271 17.3.1 Secure Connection 272 17.3.2 Setting Up a Key 272 17.3.3 Rekeying 272 17.3.4 Other Properties 273 17.4 What to Choose 273 17.5 Exercises 274 Chapter 18 The Dream of PKI 275 18.1 A Very Short PKI Overview 275 18.2 PKI Examples 276 18.2.1 The Universal PKI 276 18.2.2 VPN Access 276 18.2.3 Electronic Banking 276 18.2.4 Refinery Sensors 277 18.2.5 Credit Card Organization 277 18.3 Additional Details 277 18.3.1 Multilevel Certificates 277 18.3.2 Expiration 278 18.3.3 Separate Registration Authority 279 18.4 Summary 280 18.5 Exercises 280 Chapter 19 PKI Reality 281 19.1 Names 281 19.2 Authority 283 19.3 Trust 284 19.4 Indirect Authorization 285 19.5 Direct Authorization 286 19.6 Credential Systems 286 19.7 The Modified Dream 288 19.8 Revocation 289 19.8.1 Revocation List 289 19.8.2 Fast Expiration 290 19.8.3 Online Certificate Verification 291 19.8.4 Revocation Is Required 291 19.9 So What Is a PKI Good For? 292 19.10 What to Choose 293 19.11 Exercises 294 Chapter 20 PKI Practicalities 295 20.1 Certificate Format 295 20.1.1 Permission Language 295 20.1.2 The Root Key 296 20.2 The Life of a Key 297 20.3 Why Keys Wear Out 298 20.4 Going Further 300 20.5 Exercises 300 Chapter 21 Storing Secrets 301 21.1 Disk 301 21.2 Human Memory 302 21.2.1 Salting and Stretching 304 21.3 Portable Storage 306 21.4 Secure Token 306 21.5 Secure UI 307 21.6 Biometrics 308 21.7 Single Sign-On 309 21.8 Risk of Loss 310 21.9 Secret Sharing 310 21.10 Wiping Secrets 311 21.10.1 Paper 311 21.10.2 Magnetic Storage 312 21.10.3 Solid-State Storage 313 21.11 Exercises 313 Part V Miscellaneous 315 Chapter 22 Standards and Patents 317 22.1 Standards 317 22.1.1 The Standards Process 317 22.1.1.1 The Standard 319 22.1.1.2 Functionality 319 22.1.1.3 Security 320 22.1.2 SSL 320 22.1.3 AES: Standardization by Competition 321 22.2 Patents 322 Chapter 23 Involving Experts 323 Bibliography 327 Index 339
£33.75
John Wiley & Sons Inc Cisco Networking Essentials
Book SynopsisStart a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts.Table of ContentsIntroduction xxiii Chapter 1 Networks 1 Describing Network Components 1 Defining the Benefits of Networks 2 Identifying the Requirements for a Network 5 Classifying Networks by Function 8 Understanding LANs 9 Understanding WANs 10 Defining Network Architectures 10 Understanding Peer-to-Peer Networks 11 Understanding Client-Server Networks 14 The Essentials and Beyond 17 Chapter 2 The OSI Model 19 Using Reference Models 19 Understanding the Benefits of Reference 21 Exploring Reference Model Examples 21 Introducing the Layers of the OSI Model 22 Understanding the Application Layer 23 Understanding the Presentation Layer 24 Understanding the Session Layer 26 Understanding the Transport Layer 26 Understanding the Network Layer 30 Understanding the Data-Link Layer 31 Understanding the Physical Layer 33 Describing the OSI Encapsulation Process 33 Identifying the Process on the Source Device 34 Identifying the Process on the Destination Device 35 The Essentials and Beyond 36 Chapter 3 TCP/IP 39 Understanding the TCP/IP Model 40 Exploring the Four Layers 41 Comparing the OSI and TCP/IP Models 44 Describing the TCP/IP Encapsulation Process 46 Understanding Data and PDUs 46 Describing the Contents of Data 47 Describing the Contents of Segments 47 Describing the Contents of Packets 47 Describing the Contents of Frames 47 Understanding the Conversion to Bits 48 Describing the Functions at the Transport Layer 50 Understanding TCP 50 Understanding UDP 51 Describing the Functions at the Internet Layer 52 Defining Logical Addressing 53 Performing Routing 54 Accomplishing Packet Forwarding 54 Describing the Functions of ARP 55 Illustrating the ARP Broadcast 55 Describing the Logic of MAC-to-IP-Address Conversion 57 The Essentials and Beyond 59 Chapter 4 Protocols 63 Understanding the Function of Protocols 64 Defining Routed Protocols 64 Defining Routing Protocols 64 Exploring Application Layer Protocols 65 Describing FTP 65 Describing TFTP 67 Describing SMTP 67 Describing DNS 69 Describing SNMP70 Exploring Transport Layer Protocols 72 Reviewing TCP 72 Reviewing UDP76 Exploring Internet Layer Protocols 77 Describing IP 77 Describing ARP 79 Describing ICMP 80 Describing IGMP 82 Exploring Network Access Layer Protocols 83 Defining Network Access Layer Protocols on the LAN 84 Defining Network Access Layer Protocols on the WAN 85 The Essentials and Beyond 86 Chapter 5 Physical and Logical Topologies 91 Designing the Physical Topology 91 Implementing a Bus Topology 92 Implementing a Ring Topology 93 Implementing a Star Topology 94 Implementing a Mesh Topology 96 Implementing a Hybrid Topology 97 Implementing a Point-to-Point Topology 98 Implementing a Point-to-Multipoint Topology 100 Designing the Logical Topology 101 Understanding the Token Ring Topology 101 Understanding the FDDI Ring Topology 102 Understanding the Star Topology 103 The Essentials and Beyond 105 Chapter 6 Numbering Systems 109 Exploring Binary Numbering 109 Understanding the Base-2 Numbering System 110 Understanding the Relationship between Binary and Computers 112 Exploring Hexadecimal Numbering 114 Understanding the Base-16 Numbering System 114 Identifying MAC Addresses 116 Applying Conversions 118 Decimal-to-Binary Conversion 118 Hex-to-Decimal Conversion 121 Binary-to-Hex Conversion 123 The Essentials and Beyond 124 Chapter 7 Classful IP Addressing 129 Describing the Function of IP Addresses 129 Identification 130 Segmentation 131 Identifying IP Address Types 132 Defining IP Address Classes 133 Identifying Network and Host Addresses 135 Describing Private IP Addresses and NAT 138 Utilizing Diagnostic Tools 139 Executing the ipconfig Command 141 Executing the ping Command 141 Executing the arp Command 142 Executing the traceroute Command 143 Understanding DHCP 143 Operations 143 Cisco DHCP 145 Introducing IPv6 146 IPv6 Address Format 146 IPv6 Address Types 147 Special IPv6 Addresses 148 The Essentials and Beyond 148 Chapter 8 Classless IP Addressing 153 Understanding the Limitations of Classful Networking 153 Exhaustion of the Class B Network Address Space 154 Unmanageable Routing Tables 154 Exhaustion of the 32-Bit IPv4 Address Space 155 Understanding the Benefi ts of Subnetting 155 Identifying Sources of Network Congestion 156 Deploying Subnetting as a Segmentation Tool 157 Describing the Components of CIDR 158 Introducing Classless Subnetting 158 Designing and Implementing CIDR 160 Understanding VLSM167 Summarization 171 The Essentials and Beyond 172 Chapter 9 Media 175 Selecting the Proper Media Type 175 Bandwidth 176 Security 176 Convenience 180 Cost 180 Understanding Cabling 181 Describing Cable Behavior and Characteristics 181 Describing Physical Implementations 183 Choosing the Correct Wiring Standard 187 Describing Wireless Standards191 Identifying Standards Bodies 191 Understanding 802.11 Amendments 192 Understanding Wireless LAN Components and Terminology 193 Describing CSMA/CA Operation 196 The Essentials and Beyond 198 Chapter 10 Network Devices 201 Describing Device Functions 201 Understanding Repeaters 202 Understanding Hubs 202 Understanding Bridges 203 Understanding Switches 205 Understanding Routers 209 Understanding Wireless Access Points and Wireless Routers 214 Understanding Device Placement Principles 216 Defining Broadcast Domains 216 Defining Collision Domains 217 Understanding the Cisco Three-Layer Model 220 The Essentials and Beyond 221 Chapter 11 LAN Operations 225 Understanding the Routing Process 225 Describing Routing Tables 226 Understanding Population Methods 229 Understanding Administrative Distance 231 Using Routing Protocols 234 Describing the Switching Process 243 Reviewing MAC and IP Addresses 243 Reviewing Contention Methods 244 Describing MAC Address Tables 246 Understanding Frame Forwarding 246 Describing End-to-End Communications 247 Understanding the Local LAN Process 248 Understanding the Remote Communication Process 249 The Essentials and Beyond 250 Chapter 12 Managing the Cisco IOS 253 Describing Components 253 Defining the Contents of RAM 254 Defining the Contents of NVRAM 255 Defining the Contents of Flash 255 Defining the Contents of ROM 256 Describing IOS Navigation 258 Connecting to the Device 258 Accessing User, Privileged, and Global Configuration Modes 262 Understanding and Managing the Boot Process 266 Understanding the Boot Process 267 Managing the IOS 270 Understanding Configuration Files 271 Managing the Configuration Register 272 The Essentials and Beyond 276 Chapter 13 Configuring Routers 281 Cabling the Router 281 Cabling Router to Router 284 Cabling Router to Switch 287 Cabling PC to Router 288 Cabling Router to CSU/DSU 290 Creating a Console Session 292 Connecting with the Console Cable 292 Connecting Through the USB Port 293 Connecting Through Telnet 294 Handling Initial Setup 295 Configuring Passwords 295 Interpreting Prompts 295 Configuring Privileged (Enable) Passwords 296 Configuring Enable Secret Passwords 297 Configuring Line Passwords 297 Configuring Interfaces 299 Accessing Interface Mode 299 Assigning an IP Address 300 Enabling the Interface 301 Verifying the Interface 301 Configuring a Router as a DHCP Server 303 Configuring WAN Interfaces 306 Saving Configuration Changes 308 The Essentials and Beyond 309 Chapter 14 Configuring Switches 315 Cabling the Switch 315 Cabling Switch to Switch 316 Cabling Router to Switch 317 Cabling Hosts to Switch 318 Creating a Session with the Switch 318 Creating a Session with the Console Cable 318 Creating a Session Through Telnet 320 Configuring Passwords321 Configuring Privileged (Enable) Passwords 321 Configuring Enable Secret Passwords 322 Configuring Line Passwords 322 Using the service password-encryption Command 322 Configuring Interfaces 323 Accessing Switchports and Using Switchport Mode323 Enabling the Port 324 Verifying the Port324 Understanding Advanced Switch Functions 325 Understanding VLANs 325 Configuring VLANs 325 Assigning Ports to VLANs 326 Understanding Trunk Ports 327 Configuring Trunk Links 328 Describing STP 328 Understanding Port Security 332 Limiting MAC Addresses 332 Implementing Sticky Mac 333 The Essentials and Beyond 333 Chapter 15 Configuring Static Routing 337 Populating the Routing Table 338 Using the ip route Command 338 Verifying the Route Table 340 Configuring Inter-VLAN Routing 341 Creating a Trunk Link with Encapsulation 342 Creating and Configuring Subinterfaces 343 Troubleshooting VLANs 345 Troubleshooting Trunk Links 346 Troubleshooting Inter-VLAN Routing 347 The Essentials and Beyond 348 Chapter 16 Configuring Dynamic Routing 353 Understanding Routing Protocols 353 Exploring RIP355 Exploring EIGRP 357 Exploring OSPF 358 Configuring Routing Protocols 358 Enabling a Routing Protocol and Accessing Router Mode 359 Defining the Interfaces on Which the Protocol Is Operational 360 Verifying the Routing Table 361 The Essentials and Beyond 367 Chapter 17 Device Security 371 Understanding Access Lists 371 Understanding Standard Access Lists 373 Understanding Extended Access Lists 373 Configuring Numbered Access Lists 374 Configuring Named Access Lists 376 Editing Access Lists Using Sequence Numbers 377 Understanding Network Address Translation (NAT) 378 Implementing Static NAT, Dynamic NAT, and PAT 380 Configuring a Switch or Router as an NTP Client or Server 383 Implementing and Requiring SSH 384 Limiting Remote Access with ACLs 387 The Essentials and Beyond 388 Appendix A Answers to Review Questions 393 Appendix B CCNA Essentials: Ancillary Exercises 407 Index 437
£25.60
John Wiley & Sons Inc Advanced Penetration Testing
Book SynopsisBuild a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World''s Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating dataeven from organizations without a direct Internet connectionthis guide contains the crucial techniques that provide a more accurate picture of your system''s defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanninTable of ContentsForeword xxiii Introduction xxvii Chapter 1 Medical Records (In)security 1 An Introduction to Simulating Advanced Persistent Threat 2 Background and Mission Briefi ng 2 Payload Delivery Part 1: Learning How to Use the VBA Macro 5 How NOT to Stage a VBA Attack 6 Examining the VBA Code 11 Avoid Using Shellcode 11 Automatic Code Execution 13 Using a VBA/VBS Dual Stager 13 Keep Code Generic Whenever Possible 14 Code Obfuscation 15 Enticing Users 16 Command and Control Part 1: Basics and Essentials 19 The Attack 23 Bypassing Authentication 23 Summary 27 Exercises 28 Chapter 2 Stealing Research 29 Background and Mission Briefi ng 30 Payload Delivery Part 2: Using the Java Applet for Payload Delivery 31 Java Code Signing for Fun and Profit 32 Writing a Java Applet Stager 36 Create a Convincing Pretext 39 Signing the Stager 40 Notes on Payload Persistence 41 Microsoft Windows 41 Linux 42 OSX 45 Command and Control Part 2: Advanced Attack Management 45 Adding Stealth and Multiple System Management 45 Implementing a Command Structure 47 Building a Management Interface 48 The Attack 49 Situational Awareness 50 Using AD to Gather Intelligence 50 Analyzing AD Output 51 Attack Against Vulnerable Secondary System 52 Credential Reuse Against Primary Target System 53 Summary 54 Exercises 55 Chapter 3 Twenty-First Century Heist 57 What Might Work? 57 Nothing Is Secure 58 Organizational Politics 58 APT Modeling versus Traditional Penetration Testing 59 Background and Mission Briefi ng 59 Command and Control Part III: Advanced Channels and Data Exfi ltration 60 Notes on Intrusion Detection and the Security Operations Center 64 The SOC Team 65 How the SOC Works 65 SOC Reaction Time and Disruption 66 IDS Evasion 67 False Positives 67 Payload Delivery Part III: Physical Media 68 A Whole New Kind of Social Engineering 68 Target Location Profi ling 69 Gathering Targets 69 The Attack 72 Summary 75 Exercises 75 Chapter 4 Pharma Karma 77 Background and Mission Briefi ng 78 Payload Delivery Part IV: Client-Side Exploits 1 79 The Curse That Is Flash 79 At Least You Can Live Without It 81 Memory Corruption Bugs: Dos and Don’ts 81 Reeling in the Target 83 Command and Control Part IV: Metasploit Integration 86 Metasploit Integration Basics 86 Server Confi guration 86 Black Hats/White Hats 87 What Have I Said About AV? 88 Pivoting 89 The Attack 89 The Hard Disk Firewall Fail 90 Metasploit Demonstration 90 Under the Hood 91 The Benefits of Admin 92 Typical Subnet Cloning 96 Recovering Passwords 96 Making a Shopping List 99 Summary 101 Exercises 101 Chapter 5 Guns and Ammo 103 Background and Mission Briefing 104 Payload Delivery Part V: Simulating a Ransomware Attack 106 What Is Ransomware? 106 Why Simulate a Ransomware Attack? 107 A Model for Ransomware Simulation 107 Asymmetric Cryptography 108 Remote Key Generation 109 Targeting Files 110 Requesting the Ransom 111 Maintaining C2 111 Final Thoughts 112 Command and Control Part V: Creating a Covert C2 Solution 112 Introducing the Onion Router 112 The Torrc File 113 Configuring a C2 Agent to Use the Tor Network 115 Bridges 115 New Strategies in Stealth and Deployment 116 VBA Redux: Alternative Command-Line Attack Vectors 116 PowerShell 117 FTP 117 Windows Scripting Host (WSH) 118 BITSadmin 118 Simple Payload Obfuscation 119 Alternative Strategies in Antivirus Evasion 121 The Attack 125 Gun Design Engineer Answers Your Questions 126 Identifying the Players 127 Smart(er) VBA Document Deployment 128 Email and Saved Passwords 131 Keyloggers and Cookies 132 Bringing It All Together 133 Summary 134 Exercises 135 Chapter 6 Criminal Intelligence 137 Payload Delivery Part VI: Deploying with HTA 138 Malware Detection 140 Privilege Escalation in Microsoft Windows 141 Escalating Privileges with Local Exploits 143 Exploiting Automated OS Installations 147 Exploiting the Task Scheduler 147 Exploiting Vulnerable Services 149 Hijacking DLLs 151 Mining the Windows Registry 154 Command and Control Part VI: The Creeper Box 155 Creeper Box Specifi cation 155 Introducing the Raspberry Pi and Its Components 156 GPIO 157 Choosing an OS 157 Configuring Full-Disk Encryption 158 A Word on Stealth 163 Configuring Out-of-Band Command and Control Using 3G/4G 164 Creating a Transparent Bridge 168 Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers 169 The Attack 171 Spoofing Caller ID and SMS Messages 172 Summary 174 Exercises 174 Chapter 7 War Games 175 Background and Mission Briefi ng 176 Payload Delivery Part VII: USB Shotgun Attack 178 USB Media 178 A Little Social Engineering 179 Command and Control Part VII: Advanced Autonomous Data Exfiltration 180 What We Mean When We Talk About “Autonomy” 180 Means of Egress 181 The Attack 185 Constructing a Payload to Attack a Classified Network 187 Stealthy 3G/4G Software Install 188 Attacking the Target and Deploying the Payload 189 Efficient “Burst-Rate” Data Exfiltration 190 Summary 191 Exercises 191 Chapter 8 Hack Journalists 193 Briefing 193 Advanced Concepts in Social Engineering 194 Cold Reading 194 C2 Part VIII: Experimental Concepts in Command and Control 199 Scenario 1: C2 Server Guided Agent Management 199 Scenario 2: Semi-Autonomous C2 Agent Management 202 Payload Delivery Part VIII: Miscellaneous Rich Web Content 205 Java Web Start 205 Adobe AIR 206 A Word on HTML5 207 The Attack 207 Summary 211 Exercises 211 Chapter 9 Northern Exposure 213 Overview 214 Operating Systems 214 Red Star Desktop 3.0 215 Red Star Server 3.0 219 North Korean Public IP Space 221 The North Korean Telephone System 224 Approved Mobile Devices 228 The “Walled Garden”: The Kwangmyong Intranet 230 Audio and Video Eavesdropping 231 Summary 233 Exercises 234 Index 235
£29.25
Microsoft Press,U.S. Adaptive Code: Agile coding with design patterns
Book SynopsisWrite code that can adapt to changes. By applying this book’s principles, you can create code that accommodates new requirements and unforeseen scenarios without significant rewrites. Gary McLean Hall describes Agile best practices, principles, and patterns for designing and writing code that can evolve more quickly and easily, with fewer errors, because it doesn’t impede change. Now revised, updated, and expanded, Adaptive Code, Second Edition adds indispensable practical insights on Kanban, dependency inversion, and creating reusable abstractions. Drawing on over a decade of Agile consulting and development experience, McLean Hall has updated his best-seller with deeper coverage of unit testing, refactoring, pure dependency injection, and more. Master powerful new ways to: • Write code that enables and complements Scrum, Kanban, or any other Agile framework • Develop code that can survive major changes in requirements • Plan for adaptability by using dependencies, layering, interfaces, and design patterns • Perform unit testing and refactoring in tandem, gaining more value from both • Use the “golden master” technique to make legacy code adaptive • Build SOLID code with single-responsibility, open/closed, and Liskov substitution principles • Create smaller interfaces to support more-diverse client and architectural needs • Leverage dependency injection best practices to improve code adaptability • Apply dependency inversion with the Stairway pattern, and avoid related anti-patterns About You This book is for programmers of all skill levels seeking more-practical insight into design patterns, SOLID principles, unit testing, refactoring, and related topics. Most readers will have programmed in C#, Java, C++, or similar object-oriented languages, and will be familiar with core procedural programming techniques.Table of Contents Chapter 1 Introduction to Scrum Chapter 2 Introduction to Kanban Chapter 3 Dependencies and layering Chapter 4 Interfaces and design patterns Chapter 5 Testing Chapter 6 Refactoring Chapter 7 The single responsibility principle Chapter 8 The open/closed principle Chapter 9 The Liskov substitution principle Chapter 10 Interface segregation Chapter 11 Dependency inversion Chapter 12 Dependency injection Chapter 13 Coupling, cohesion, and connascence
£33.29
O'Reilly Media DNS and BIND 5e
Book SynopsisTalks about distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard. This book covers BIND 9.3.2 as well as BIND 8.4.7.
£38.39
John Wiley & Sons Inc The Art of Deception
Book SynopsisThe world''s most infamous hacker offers an insider''s view of the low-tech threats to high-tech security Kevin Mitnick''s exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world''s most notorious hacker gives new meaning to the old adage, It takes a thief to catch a thief. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustTrade Review“…authoritative…” (Retail Systems, December 2005) Mitnick is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie WarGames. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security. It's not clear whether this book is a means toward that end or a, wink-wink, fictionalized account of his exploits, with his name changed to protect his parole terms. Either way, it's a tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it's like reading the climaxes of a dozen complex thrillers, one after the other. As a security education, it's a great series of cautionary tales; however, the advice to employees not to give anyone their passwords is bland compared to the depth and energy of Mitnick's description of how he actually hacked into systems. As a manual for a would-be hacker, it's dated and nonspecific -- better stuff is available on the Internet—but it teaches the timeless spirit of th e hack. Between the lines, a portrait emerges of the old-fashioned hacker stereotype: a socially challenged, obsessive loser addicted to an intoxication sense of power that comes from stalking and spying. (Oct.) Forecast: Mitnick's notoriety and his well written, entertaining stories should generate positive word-of-mouth. With the double appeal of a true-crime memoir and a manual for computer security, this book will enjoy good sales. (Publishers Weekly, June 24, 2002) "...an interesting read..." (www.infosecnews.com, 17 July 2002) "...highly entertaining...will appeal to a broad audience..." (Publishing News, 26 July 2002) The world's most famous computer hacker and cybercult hero, once the subject of a massive FBI manhunt for computer fraud, has written a blueprint for system security based on his own experiences. Mitnick, who was released from federal prison in 1998 after serving a 22-month term, explains that unauthorized intrusion into computer networks is not limited to exploiting security holes in hardware and software. He focuses instead on a common hacker technique known as social engineering in which a cybercriminal deceives an individual into providing key information rather than trying to use technology to reveal it. Mitnick illustrates the tactics comprising this "art of deception" through actual case studies, showing that even state-of-the-art security software can't protect businesses from the dangers of human error. With Mitnick's recommended security policies, readers gain the information their organizations need to detect and ward off the threat of social engineering. Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries. [This should not be confused with Ridley Pearson's new thriller, The Art of Deception. —Ed]—Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL (Library Journal, August 2002) He was the FBI's most-wanted hacker. But in his own eyes, Mitnick was simply a small-time con artist with an incredible memory, a knack for social engineering, and an enemy at The New York Times. That foe, John Markoff, made big bucks selling two books about Mitnick - without ever interviewing him. This is Mitnick's account, complete with advice for how to protect yourself from similar attacks. I believe his story. (WIRED Magazine, October 2002) Kevin Mitnick spent five years in jail at the federal authorities' behest, but The Art of Deception: Controlling the Human Element of Security (Kevin Mitnick and William Simon), reveals that he was no lowly grifter. Rather, by impersonating others in order to talk guileless employees out of access protocols, Mr. Mitnick was practicing "the performance art called social engineering." While every society has had its demimonde-like the Elizabethan coney catchers who duped visitors to 16th-century London--it's in the United States that con artists assumedlegendary status. The definitive book is still The Big Con from 1940 (Anchor Books), which commemorates a golden age already receding when it was published: the grifters it describes--like the High Ass Kid and Slobbering Bob--thrived between 1914 and 1929, when technological advances and unparalleled prosperity generated a roller-coaster stock market. That sounds a lot like the past decade. So how did the culture of the con do during the Internet era? On Mr. Mitnick's evidence, it flourished and evolved. The Art of Deception is itself a bit of a fraud as far as advice on upgrading security. But the book does deliver on "social engineering" exercises. Some aren't even illegal and Mr. Mitnick -- weasel that he is -- lovingly records their most elaborate convolutions. One way or another, you'll find the information useful. (Red Herring, October 2002) "Mitnick outlines dozens of social engineering scenarios in his book, dissecting the ways attackers can easily exploit what he describes as 'that natural human desire to help others and be a good team player.'" (Wired.com, October 3, 2002) Finally someone is on to the real cause of data security breaches--stupid humans. Notorious hacker Kevin Mitnick--released from federal prison in January 2000 and still on probation--reveals clever tricks of the "social engineering" trade and shows how to fend them off in The Art of Deception: Controlling the Human Element of Security (Wiley, $27.50). Most of the book, coauthored by William Simon (not the one running for governor of California), is a series of fictional episodes depicting the many breathtakingly clever ways that hackers can dupe trusting souls into breaching corporate and personal security--information as simple as an unlisted phone number or as complicated as plans for a top-secret product under development. The rest lays out a fairly draconian plan of action for companies that want to strengthen their defenses. Takeaway: You can put all the technology you want around critical information, but all it takes to break through is one dolt who gives up his password to a "colleague" who claims to be working from the Peoria office. What's useful about this book is its explanation of risks in seemingly innocuous systems few people think about. The caller ID notification that proves you're talking to a top executive of your firm? Easily forged. The password your assistant logs in with? Easily guessed. The memos you toss into the cheap office shredder? Easily reconstructed. The extension that you call in the IT department? Easily forwarded. Physical security can be compromised, too. It's not hard to gain access to a building by "piggybacking" your way in the door amid the happy throng returning from lunch. You'd better have confidence in your IT professionals, because they're likely to have access to everything on the corporate system, including your salary and personal information. Mitnick offers some ideas for plugging these holes, like color-coded ID cards with really big photos. Implementing the book's security action plan in full seems impossible, but it's a good idea to warn employees from the boss down to the receptionist and janitors not to give out even innocuous information to people claiming to be helpful IT folks without confirming their identity--and to use things like encryption technology as fallbacks. Plenty of would-be Mitnicks--and worse--still ply their trade in spaces cyber and psychological. --S.M. (Forbes Magazine - October 14, 2002) "...the book describes how people can get sensitive information without even stepping near a computer through 'social engineering' -- the use of manipulation or persuasion to deceive people by convincing them that you are someone else." (CNN.com's Technology section, October 9, 2002) "...engaging style...fascinating true stories..." (The CBL Source, October/December 2002) "…the book describes how people can get information without even stepping near a computer…" (CNN, 16 October 2002) "…each vignette reads like a mini-cybermystery thriller…I willingly recommend The Art of Deception. It could save you from embarrassment or an even worse fate…" (zdnet.co.uk, 15 October 2002) "…details the ways that employees can inadvertently leak information that can be exploited by hackers to compromise computer systems…the book is scary in ways that computer security texts usually do not manage to be…" (BBC online, 14 October 2002) "…more educational than tell-all…" (Forbes, 2 October 2002) "…would put a shiver into anyone responsible for looking after valuable computer data…the exploits are fictional but realistic…the book is about hacking peoples heads…" (The Independent, 21 October 2002) "…the key strength of The Art of Deception is the stream of anecdotes - with explanations about how and why hacks succeed…provides a solid basis for staff training on security…" (Information Age, October 2002) "…should be on the list of required reading. Mitnick has done an effective job of showing exactly what the greatest threat of attack is - people and their human nature…" (Unix Review, 18 October 2002 "…disturbingly convincing…" (Fraud Watch, Vol.10, No.5, 2002 "…the worlds most authoritative handbook…an unputdownable succession of case studies…chilling…trust me, Kevin Mitnick is right…" (Business a.m, 29 October 2002) "…a damn good read…I would expect to see it as required reading on courses that cover business security…Should you read this book? On several levels the answer has to be yes. If you run your own business, work in one, or just want a good read, this is worth it…" (Acorn User, 29 October 2002) "...the analysis of individual cases is carried out thoroughly...ultimately, the value of the book is that it may encourage security managers to be more assiduous in teaching their staff to check the identities of the people they deal with, and better corporate security will be the result..." (ITWeek, 1 November 2002) "...a penetrating insight into the forgotten side of computer security..." (IT Week, 4 November 2002) "...a highly entertaining read...Mitnick has a laid-back style which makes the book easy to read and of great interest, even to those of us who have no interest in computers..." (Business Age, September 2002) "...one of the hacker gurus of our time...makes it abundantly clear that everyone can be fooled and cheated by the professionals...." (The Times Higher Education Supplement, 15 November 2002) "...focuses on teaching companies how to defeat someone like him…full of specific examples of the ways apparently innocent bits of information can be stitched together to mount a comprehensive attack on an organisation's most prized information..." (New Scientist, 23 November 2002) "...all simple things, little titbits of seemingly innocuous information, which when gathered together give the hacker the power to cripple the biggest corporation or the smallest home business..." (New Media Age, 14 November 2002) "…highly acclaimed…a fascinating account…" (Information Security Management, November 2002) "...His new book, The Art of Deception, presents itself as a manual to help companies defeat hackers..." Also listed in recommended reading list (The Guardian, 13 December 2002) “…gets it’s point across and contains some valuable pointers…”(MacFormat, January 2003) “…supremely educational…a sexy way to hammer home a relevant point…what makes it sing is the clear information that Mitnick brings to the table…”(Business Week, 8 January 2003) “…Indispensable…”(Focus, February 2003) "...incredibly intriguing...a superb book which would be beneficial for anyone to read..." (Telecomworldwire, 4 February 2003) "...a good overview of one of the most neglected aspects of computer security..." (Technology and Society, 7 February 2003) "...fascinating to read...should strike fear into the hearts of commercial computer security departments..." (Business Week, 3 September 2003) "...a penetrating insight into the forgotten side of computer security..." (Accountancy Age, 19 February 2003) Top 10 Popular Science Books (New Scientist, 21 February f2003) "...should be assigned as required reading in every IT department...excellent advice..." (Electronic Commerce Guide, 12 February 2003) “…an interesting and educational read for anyone with a role to play in corporate security…”(Computer Business Review, 6 March 2003) “…if you were not having security nightmares before, read this book and you certainly will…” (IT Showcase News, 6 March 2003) “….easy to understand and actually fun to read…”(Slashdot, 6 March 2003) “…a good read, well written…” (Managing Information, March 2003) “…structured like a mini detective story series…the unfolding attacks are compulsive reading…” (Aberdeen Evening Express, 7 June 21003) “…a real eye-opener…well written and produced…an easy and valuable read…” (Accounting Web, 19 June 2003) “…a superb book which would be beneficial for anyone to read…” (M2 Best Books, 4 February 2003) “…the insights for earlier chapters are fascinationg, and that alone makes it worth blagging a copy for review…”(Mute, Summer/Autumn 2003) “…a good read, well-written…this accessibility makes it doubly important…” (Managing Information – 5 star rating, October 2003)Table of ContentsForeword. Preface. Introduction. Part 1: Behind the Scenes. Chapter 1: Security's Weakest Link. Part 2: The Art of the Attacker. Chapter 2: When Innocuous Information Isn't. Chapter 3: The Direct Attack: Just Asking for It. Chapter 4: Building Trust. Chapter 5: "Let Me Help You". Chapter 6: "Can You Help Me?". Chapter 7: Phony Sites and Dangerous Attachments. Chapter 8: Using Sympathy, Guilt, and Intimidation. Chapter 9: The Reverse Sting. Part 3: Intruder Alert. Chapter 10: Entering the Premises. Chapter 11: Combining Technology and Social Engineering. Chapter 12: Attacks on the Entry-Level Employee. Chapter 13: Clever Cons. Chapter 14: Industrial Espionage. Part 4: Raising the Bar. Chapter 15: Information Security Awareness and Training. Chapter 16: Recommended Corporate Information Security Policies. Security at a Glance. Sources. Acknowledgements. Index.
£27.00
John Wiley & Sons Inc The AllNew Switch Book
Book SynopsisThis much-needed update to the bestselling guide on the extensive changes to the local area networks (LAN) switching technologies explains why LAN switching technologies are critical to network design. This in-depth guide covers the capabilities, application, and design of LAN switches and switched internetworks and examines the significant changes that have taken place since the publication of the first edition seven years ago. You're sure to appreciate the witty writing style and easy-to-follow format on such an often-complicated subject matter.Table of ContentsPreface xxiii Introduction xxv Part One Foundations of LAN Switches Chapter 1 Laying the Foundation 3 Network Architecture 4 Physical Layer 5 Data Link Layer 6 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 9 Layering Makes a Good Servant but a Bad Master 9 Inside the Data Link Layer 12 Modes of Operation 12 Data Link Sublayering 15 Logical Link Control 16 Addressing 19 Local and Global Uniqueness 19 LAN Data Link Addresses 20 Unicast and Multicast Addresses 21 Globally Unique and Locally Unique MAC Addresses 23 How LAN Addresses Are Assigned 24 Written Address Conventions 26 LAN Technology Review 27 Ethernet 27 Ethernet Medium Access Control 28 Ethernet Physical Layer Options and Nomenclature 31 Ethernet Frame Formats 33 Bit-Ordering 38 Token Ring 38 Token Ring Medium Access Control 39 Token Ring Physical Layer Options 41 Token Ring Frame Formats 41 Bit-Ordering on Token Ring LANs 43 Fiber Distributed Data Interface 43 FDDI Operation 43 FDDI Physical Signaling 45 FDDI Frame Format 45 Other LAN Technologies 46 IEEE LAN Standards 48 IEEE 802 Organization 49 IEEE 802 Naming Conventions, or ’’Mind Your Ps and Qs’’ 50 Ieee 802.1 51 Ieee 802.3 53 Ieee 802.5 54 Other Standards Organizations 54 Terminology 55 Applications, Clients, and Service Providers 56 Encapsulation 57 Stations and Interconnections 59 Chapter 2 Transparent Bridges 63 Principles of Operation 63 Unicast Operation 65 Unknown and Multicast Destinations 66 Generating the Address Table 68 Address Table Aging 69 Process Model of Table Operation 70 Custom Filtering and Forwarding 72 Multiple Bridge Topologies 73 Transparent Bridge Architecture 74 Maintaining the Link Invariants 76 The Hard Invariants Are Hard Indeed 78 Soft Invariants 80 Implementing the Bridge Address Table 84 Table Operations 85 Search Algorithms 85 Hash Tables 85 Binary Search 88 Content-Addressable Memories 90 How Deep Is Your Table? 92 Aging Entries from the Table 93 Bridge Performance 95 What Does It Take to Be the Best? 95 If You’re Not the Best, How Good Are You? 97 The IEEE 802.1D Standard 98 Operating Parameters and Requirements 99 Aging Time 99 Bridge Transit Delay 99 Additional Operating Requirements 101 Bridge Address Assignment 102 Reserved Addresses 103 Chapter 3 Bridging Between Technologies 105 Bridging the LAN Gap 106 LAN Operational Mechanisms 107 Frame Format Translation 108 MAC-Specific Fields 109 User Data Encapsulation 110 Translating Versus Encapsulating Bridges 115 Issues in Bridging Dissimilar LANs 117 Maximum Transmission Unit (MTU) 117 Frame Check Protection 124 Bit-Ordering 126 Functional Groups Versus True Multicast Addressing 131 LAN-Specific Features 133 Thoughts on Bridging Dissimilar LANs 137 Bridging Between Local and Wide Area Networks 137 Applications of Remote Bridges 138 Technologies for Remote Bridges 139 Encapsulation 141 Issues in Remote Bridges 143 Error Rate 143 LAN Bandwidth and Delay 144 IEEE 802.1G — Not! 145 Chapter 4 Principles of LAN Switches 147 A Switch Is a Bridge Is a Switch 147 Switched LAN Concepts 148 Separate Access Domains 149 Segmentation and Microsegmentation 150 Extended Distance Limitations 152 Increased Aggregate Capacity 152 Data Rate Flexibility 153 Cut-Through Versus Store-and-Forward Operation 153 MultiLayer Switching 158 Layer 3 Switching 159 A Router by Any Other Name Would Still Forward Packets 160 Layer 3 Switch Operation 162 Layer 4 Switching 173 A Switch Is a Switch Is a Switch Except When 176 Four Generations of Switch Integration 177 Switch Configurations 182 Bounded Systems 183 Stackable Switches 184 Stacking the Deck 184 A Block in the Ointment 185 United, We Are One 185 Chassis Switches 187 Switch Application Environments 188 Desktop Level 190 Workgroup Level 190 Campus Level 191 Enterprise Level 191 The Needs Change with the Level 192 Numbers of Ports 192 Layer 2 Versus Layer 3 Switching (Bridging Versus Routing) 195 Table sizes 196 Link Technologies 198 Port Data Rates and Aggregate Capacity 198 Media Support 199 Chapter 5 Loop Resolution 201 Diary of a Loopy LAN 201 Getting Yourself in the Loop 203 Getting out of the Loop 204 The Spanning Tree Protocol 205 History of the Spanning Tree Protocol 205 Spanning Tree Protocol Operation 206 Spanning Tree Protocol Concepts 207 Calculating and Maintaining the Spanning Tree 213 Bridge Protocol Data Units 217 Port States 220 Topology Changes 222 Protocol Timers 224 Issues in STP Implementation 226 Queuing of BPDUs Relative to Data 227 Save a Receive Buffer for Me! 227 Spanning Tree Protocol Performance 228 Rapid Spanning Tree Protocol 229 RSTP State of the Port Address 229 Discarding 230 Learning 230 Forwarding 231 Port Roles 231 The Root Port 231 The Designated Port 232 The Alternate Port 232 The Backup Port 232 Forwarding State — Rapid Transition 234 Edge Port 234 Link Type 234 BPDUs (Bip-A-Doo-Two) 234 BPDU — The Final Frontier .er uh The New Format 234 How It Is Now Handled 235 Multiple Spanning Tree Protocol 236 RSTP, MSTP, and STP (Can’t we all just get along?) 236 Loops in a Remotely Bridged (WAN) Catenet 237 There’s More Than a One-Letter Difference 238 Spanning Tree on a WAN 238 Link Utilization 239 Delay 239 Using a Single Path for All Traffic 239 Proprietary Loop Resolution Algorithms 241 Routing Versus Bridging on the WAN 242 An Example of Loop Resolution 242 Behavior of a Spanning Tree Catenet 245 Maintaining the Link Invariants 246 Data Flow on the Spanning Tree 246 Traffic Congregation at the Root 248 Topology Changes and Disruption 248 Configuring the Spanning Tree 248 ‘‘We’ll All Be Planning That Root .’’ 249 Assigning Link Costs 250 Setting Protocol Timers 250 Managing the Extent of the Catenet 251 UpaTreeWithoutaProtocol? 252 Why Would Anyone Do This? 252 Interoperability 253 What to Do, What to Do? 253 Chapter 6 Source Routing 255 Overview of Source Routing Operation 256 Eine Kleine Sourceroutinggeschichte 257 Source Routing Concepts 259 Nontransparency, or ‘‘Peek-a-Boo — I See You!’’ 260 Who’s the Boss? 260 Connection Orientation 261 Be All That You Can Be (Without Joining the Army) 263 Even Token Rings Need to Get Out of the Loop Sometimes 263 Ring and Bridge Numbering 264 Route Discovery 266 Maximum Transmission Unit Discovery 266 Source-Routed Frames 267 Differentiating Source-Routed and Non-Source–Routed Frames 267 Non-Source–Routed Frames 269 Source-Routed Frame Format 269 Routing Control Fields 269 Route Descriptors 273 Source Routing Operation 274 Route Discovery 275 Route Discovery Algorithms 275 Route Discovery Frames 277 Route Selection 279 Issues in Route Discovery 280 Station Operation 282 Architectural Model of Source Routing 282 End Station Transmit Behavior 282 End Station Receive Behavior 284 Bridge Operation 285 Bridge Behavior for Specifically Routed Frames 286 Bridge Behavior for Explorer Frames (Both ARE and STE) 286 Interconnecting the Source-Routed and Transparently Bridged Universes 289 Don’t Bridge — Route! 294 The Source Routing-to-Transparent Bridge 295 The Source Routing/Transparent Bridge 298 IEEE Standards and Source Routing 301 The Future of Source Routing 301 Part Two Advanced LAN Switch Concepts Chapter 7 Full Duplex Operation 305 Why a MAC? 305 Full Duplex Enablers 307 Dedicated Media 307 Dedicated LAN 310 Full Duplex Ethernet 311 ‘‘Ethernet Is CSMA/CD’’ 312 Full Duplex Ethernet Operating Environment 313 Subset of Half Duplex Operation 314 Transmitter Operation 315 Receiver Operation 315 Ethernet Minimum Frame Size Constraint 316 Dedicated Token Ring 317 Implications of Full Duplex Operation 319 Eliminating the Link Length Restriction of Half Duplex Ethernet 319 Increasing the Link Capacity 320 Increasing Switch Load 322 Full Duplex Application Environments 323 Switch-to-Switch Connections 323 Server and Router Connections 324 Long-Distance Connections 325 Chapter 8 LAN and Switch Flow Control 327 The Need for Flow Control 327 Default Switch Behavior 330 The Effect of Frame Loss 330 End-to-End Flow Control 332 Cost-Performance Tradeoffs 332 Controlling Flow in Half Duplex Networks 333 Backpressure 333 Aggressive Transmission Policies 337 MAC Control 341 MAC Control Architecture 341 MAC Control Frame Format 343 PAUSE Function 344 Overview of PAUSE Operation 346 PAUSE Frame Semantics 347 Configuration of Flow Control Capabilities 349 IEEE 802.3x Flow Control Implementation Issues 350 Design Implications of PAUSE Function 351 Inserting PAUSE Frames in the Transmit Queue 351 Parsing Received PAUSE Frames 352 PAUSE Timing 353 Buffering Requirements 354 Flow Control Policies and Use 356 Buffer Thresholds 356 Selection of PAUSE Times 357 Dealing with Unreliable Delivery 358 Flow Control Symmetry 358 Symmetric Flow Control 359 Asymmetric Flow Control 359 Chapter 9 Link Aggregation 361 Link Aggregation Benefits 362 Application of Link Aggregation 364 Switch-to-Switch Connections 365 Switch-to-Station (Server or Router) Connections 365 Station-to-Station Connections 367 Aggregate or Upgrade? 367 Issues in Link Aggregation 368 Addressing 368 Distributing Traffic Across an Aggregation 371 Maintaining Link Invariants in an Aggregated Environment 372 Separating Traffic Flows 374 Conversation Determination Aids the Realization of Aggregation 375 Mapping the Distribution Function to the Physical Link 377 Conversations Above the Data Link Layer 377 Summary of Distribution Functions 380 Changing the Distribution 381 Performance 384 Technology Constraints (a.k.a. Link Aggravation) 384 Mixing LAN Technologies in a Single Aggregation 384 Mixing Data Rates in a Single Aggregation 385 Aggregation and Shared LANs 385 Configuration Control 385 IEEE 802.3ad Link Aggregation Standard 388 Scope of the Standard 388 Features and Benefits of the Standard 390 Link Aggregation Architectural Model 392 Binding Physical Ports to Aggregators 394 Binding, Distribution, and Collection 397 Addressing 397 Marker Protocol Operation 398 Link Aggregation Control Protocol 401 LACP Concepts 401 LACP Frame Format 406 Split Up the Trunk 410 Chapter 10 Multicast Pruning 413 Multicast Usage 413 Who Assigns Multicast Addresses? 414 Application Use of Multicast 417 Implications of Default Behavior 419 Trimming the (Spanning) Tree 420 The Weekend Networker’s Guide to Tree Pruning 421 Receiver Declaration 421 Registration of the Declaration 422 Propagation of the Registration 423 Source Pruning 424 IEEE 802.1p 424 GARP Multicast Registration Protocol 424 Generic Attribute Registration Protocol 426 GMRP Use of GARP 430 Chapter 11 Virtual LANs: Applications and Concepts 433 Applications of VLANs 434 The Software Patch Panel 434 LAN Security 437 User Mobility 439 Bandwidth Preservation 442 VLAN Concepts 443 Playing Tag on Your LAN 445 Implicit Tags 445 Explicit Tags 446 VLAN Awareness and Tag Awareness 448 VLAN Awareness 448 What It Means to Be VLAN-Aware 449 VLAN-Aware Switches 449 VLAN-Aware End Stations 454 He Looks Around, Around, He Sees VLANs in the Architecture, Spinning in Infinity 456 Shared Media and VLAN Awareness 458 Non–VLAN-Aware Switches and End Stations 458 VLAN Association Rules (Mapping Frames to VLANs) 459 Port-Based VLAN Mapping 460 MAC Address-Based VLAN Mapping 461 Protocol-Based VLAN Mapping 462 IP Subnet-Based VLAN Mapping 465 A VLAN Phenomenon: The One-Armed Router 466 Application-Based VLAN Mapping 469 The Rules Follow the Application 471 Frame Forwarding 472 Chapter 12 Virtual LANs: The IEEE Standard 475 Overview and Scope of the Standard 477 Elements of the Standard 478 Tag and Frame Formats 480 VLAN Protocol Identifier 481 Tag Control Information Field 482 Embedded Routing Information Field 485 Route Control Portion 486 Route Descriptor Portion 487 Tagged Ethernet Frames 488 Flash! Ethernet MTU Increases by 4 Bytes! 492 Tagged Token Ring Frames 495 Tagged FDDI Frames 495 VLAN Tags on Other LAN Technologies 496 A Word on Bit and Byte Order 496 IEEE 802.1Q Switch Operation 497 Ingress Process 499 Acceptable Frame Filter 499 Ingress Rules 499 Ingress Filter 500 Progress Process 500 Forwarding in a VLAN-Aware Switch 500 Maintaining the Filtering Database 501 Egress Process 502 Egress Rules 502 Egress Filter 504 System-Level Switch Constraints 506 GARP VLAN Registration Protocol 506 GVRP Use of GARP 507 Multicast Registration and VLAN Context 508 VLANs and the Spanning Tree 508 The Multiple Spanning Tree Protocol 511 So Exactly What Are They Trying to Accomplish Here? 511 What the Heck Does This All Mean? 512 Tha-tha-tha-tha-tha .That’s Right Folks! 512 Multiple Spanning Tree Instance 513 MST Regions 514 Chapter 13 Priority Operation 517 Why Priority? 517 LAN Priority Mechanisms 519 Token Ring Priority Mechanisms 520 FDDI Priority Mechanisms 521 Ethernet Priority Mechanisms 522 VLAN and Priority Tagging 525 Getting into the Priority Business 526 Priority Operation in Switches 529 The Ordering Invariant — Redux 530 IEEE 802.1p 530 Switch Process Flow for Priority Operation 532 Determining Frame Priority on Input 533 Tag, You’re It! 533 LAN-Specific User Priority Indication 533 Implicit Priority Determination, or ‘‘Whose Clues Do You Use?’’ 534 Priority Regeneration 535 Mapping Input Priority to Class-of-Service 536 Class of Service Versus Quality of Service 536 How Many Queues Do You Chueues? 538 Default Priority Mappings 540 Output Scheduling 541 Scheduling Algorithms 541 Indicating the Priority in Transmitted Frames 544 Mapping User Priority to Access Priority at the Output Port 545 Chapter 14 LAN Security 547 NetworkSecurityOverview 548 Hackers, Crackers, Viruses, and Those Confounded Worms 549 Hac and Crac, the Ker Brothers. 549 Malware 550 Physical Security 551 Proactive Measures 552 Virus Containment 553 Firewalls 553 End User Checks and Balances 555 LAN Security 555 Security Concerns at Layer 2 555 Man in the Middle 557 MAC Address Table Flooding 557 DHCP Attacks 559 Spanning Tree Attacks 560 Private VLAN Attack 561 VLAN Migration (Hopping) Attack 561 ARP Spoofing Attack 563 Wrap Up 563 Chapter 15 Switch Management 565 The Simple Network Management Protocol 566 SNMP Concepts 568 Manager/Agent Architecture 568 Management Information Base 569 The Simple Network Management Protocol 573 The Simple Network Management Protocol Version 2 575 The Simple Network Management Protocol Version 3 576 Network Monitoring Tools 577 Protocol Analysis in a Switched LAN 580 Mirror, Mirror on the Switch, Which Is the Port That’s Got the Glitch? 581 Switch Mirroring 583 Look Within Yourself for the Truth 585 RMON Capabilities and MIBs 586 Ethernet Statistics Group 586 Ethernet History Group 589 Alarm Group 590 Host Group 591 HostTopN Group 594 Matrix Group 594 Filter Group 596 Packet Capture Group 597 Event Group 597 RMON Support for Virtual LANs 598 Levels of RMON Support 598 Internal Switch Management Platforms 598 Non-SNMP Management 601 Internal Web Servers 602 Out-of-Band Management 602 Management by Telnet 604 Management by Secure Shell 605 Reach Out and Ping Someone 607 Chapter 16 Network Troubleshooting Strategies 609 The Trouble with Troubleshooting 610 Housekeeping 611 Running the Network Baseline 611 Proactive Troubleshooting 613 Troubleshooting Tools 614 Troubleshooting Utilities 615 ping 615 trace route 617 netstat 617 route 618 Arp 620 More Advanced Tools of the Trade 620 Network Analyzers (or whatever they are calling them today) 621 Other Testing Equipment 622 and if all else fails 623 A Systematic Approach 624 Defining the Problem 624 Sharing the Known 625 Determining the Issue 625 Developing a Solution 626 Resolving and Taking Action! 627 Monitoring the Results 627 The Final Step — Have a Beer! 627 Some Strategies for Layer 2 Troubleshooting 628 Performing a Health Check 628 Software, Hardware, and Configuration 629 Issues Relating to Software 629 Issues Relating to Hardware 630 Issues Relating to Configuration 632 Common Layer 2 Issues 632 Vlans 632 Duplex Mismatches 633 Spanning Tree 636 Wrap Up 637 Chapter 17 Make the Switch! 641 Keeping House 644 Housekeeping Functions 645 Implementation and Performance (or, It’s Tough to Find a Good Housekeeper) 647 Switch Data Receive Path Functions 647 Port Interfaces (Receive) 647 Receive Flow Control 649 Link Aggregation Collector 650 Classification Engine 650 Local Sinking of Reserved Multicast Addresses 651 VLAN Ingress Rules 651 Priority Assessment 653 Do It Once and Save the Results 653 Implementation of the Classification Engine 655 VLAN Filters 657 Lookup Engine 658 Generating the Output Vector 659 Maintaining the Filtering Database 662 Lookup Implementation 662 Switch Fabrics 665 Shared Memory 665 Shared Memory Fabric Operation 665 Multicasting in a Shared Memory Architecture 667 Buffer Organization 668 Memory Bandwidth Limitations 671 Increasing the Memory Bandwidth 672 Shared Bus 674 Crosspoint Matrix 677 Multicasting in a Crosspoint Matrix Fabric 677 Crosspoint Matrix Implementation 679 The Head-of-Line Blocking Problem 680 Solving the Head-of-Line Blocking Problem 682 Priority Levels in the Switch Fabric 690 Input Versus Output Queues 690 Input Queues and Shared Memory Switch Fabrics 691 Input Queues, Output Queues, and Flow Control 691 Switch Data Transmit Path Functions 692 Output Filters 692 Output Queues and Priority Handling 695 Link Aggregation Distributor 696 Transmit Flow Control 696 Hey, Kids! What Time Is It? 697 Port Interfaces (Transmit) 697 Appendix: Protocol Parsing 699 References 703 Glossary 711 Index 753
£71.25
Cambridge University Press Foundations of Cryptography v1 Volume 1 Basic
Book SynopsisFocuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs.Trade Review'The written style is excellent and natural, making the text rather comfortable to read even on quite advanced topics. The book is suitable for students in a graduate course on cryptography, and is also a useful reference text for experts.' The Mathematical GazetteTable of ContentsList of figures; Preface; 1. Introduction; 2. Computational difficulty; 3. Pseudorandom generators; 4. Zero-knowledge proof systems; Appendix A: background in computational number theory; Appendix B: brief outline of volume 2; Bibliography; Index.
£48.44
John Wiley & Sons Inc Secrets and Lies
Book SynopsisThis anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn''t, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier''s tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That''s why Secrets and Lies belongs in every manager''s library.-Business Week Startlingly lively....a jewel box of little surprises you can actually use.-Fortune SeTable of ContentsForeword to 2015 15th Anniversary Edition ix Introduction From the Paperback Edition xiii Preface xxiii About the Author xxvii 1. Introduction 1 Part 1: The Landscape 11 2. Digital Threats 14 3. Attacks 23 4. Adversaries 42 5. Security Needs 59 Part 2: Technologies 83 6. Cryptography 85 7. Cryptography in Context 102 8. Computer Security 120 9. Identification and Authentication 135 10. Networked-Computer Security 151 11. Network Security 176 12. Network Defenses 188 13. Software Reliability 202 14. Secure Hardware 212 15. Certificates and Credentials 225 16. Security Tricks 240 17. The Human Factor 255 Part 3: Strategies 271 18. Vulnerabilities and the Vulnerability Landscape 274 19. Threat Modeling and Risk Assessment 288 20. Security Policies and Countermeasures 307 21. Attack Trees 318 22. Product Testing and Verification 334 23. The Future of Products 353 24. Security Processes 367 25. Conclusion 389 Afterword 396 Resources 399 Acknowledgments 401 Index 403
£19.20
John Wiley & Sons Inc TCP IP for Dummies
Book SynopsisPacked with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.Table of ContentsIntroduction 1 About This Book 1 Conventions Used in This Book 2 Foolish Assumptions 2 How This Book Is Organized 3 Part I: TCP/IP from Names to Addresses 3 Part II: Getting Connected 3 Part III: Configuring Clients and Servers: Web, E-Mail, and Chat 4 Part IV: Even More TCP/IP Applications and Services 4 Part V: Network Troubleshooting and Security 4 Part VI: The Part of Tens 5 Icons Used in This Book 5 Where to Go from Here 6 Part I: TCP/IP from Names to Addresses 7 Chapter 1: Understanding TCP/IP Basics 9 Following Rules for the Internet: TCP/IP Protocols 10 Who’s in charge of the Internet and TCP/IP? 10 Checking out RFCs: The written rules 12 Examining Other Standards Organizations That Add to the Rules 13 Distinguishing Between the Internet, an Internet, and an Intranet 13 Extending Intranets to Extranets 14 Introducing Virtual Private Networks 15 Exploring Geographically Based Networks 16 Networks connected by wires and cables 16 Wireless networks 17 The geography of TCP/IP 17 Chapter 2: Layering TCP/IP Protocols 19 Taking a Timeout for Hardware 19 Starting with network connection media 20 Colliding with Ethernet 20 Stacking the TCP/IP Layers 22 Layer 1: The physical layer 23 Layer 2: The data link layer 24 Layer 3: The internet layer 24 Layer 4: The transport layer 24 Layer 5: The application layer 25 TCP/IP For Dummies, 6th Edition viii Chewing through Network Layers: A Packet’s Journey 25 Understanding TCP/IP: More than just protocols 27 Determining whether your network has a protocol, an application, or a service 27 Plowing through the Protocol List (In Case You Thought Only Two Existed) 28 Physical layer protocols 29 Data link layer protocols 29 Internet layer protocols 29 Transport layer protocols 31 Application layer protocols 36 Chapter 3: Serving Up Clients and Servers 43 Understanding the Server Side 43 Examining the server’s job 44 Identifying types of servers 44 Using dedicated servers 45 Understanding the Client Side 45 Defining a client 45 Clients, clients everywhere 46 Answering the Question “Are You Being Served?” 46 Supporting TCP/IP with Client/Server and Vice Versa 47 Recognizing Other Internetworking Styles: Peer-to-Peer Computing 47 Determining whether peer-to-peer workgroups are still handy 48 P2P applications — P2P across the Internet 48 Chapter 4: Nice Names and Appetizing Addresses 51 What Did You Say Your Host’s Name Is? 52 Playing the numbers game 52 Identifying a computer as uniquely yours 53 Translating names into numbers 54 Taking a Closer Look at IP Addresses 54 Savoring Classful Addressing 55 Recognizing the Parts of an IP Address 56 Class A is for a few enormous networks 57 Class B is for lots of big networks 57 Class C is for millions of small networks 57 Class D is for multicasting 57 Biting Down on Bits and Bytes 58 Obtaining an IP Address 60 Choosing whether to go public or stay private 60 Obeying the network police 61 Obtaining a globally unique IP address 61 Acquiring a static address 62 Getting dynamic addresses with DHCP 62 Finding out your IP address 62 Table of Contents ix Resolving Names and Addresses with DNS 64 Understanding the minimum amount of information about DNS 64 Using DNS to “Do Nifty Searches” 65 Describing Fully Qualified Domain Names (FQDNs) 65 Branching out into domains 66 Stalking new domains 68 Determining Whether the Internet Will Ever Fill Up 68 Choking on bandwidth 68 Panicking about not having enough addresses 69 Dishing Up More Kinds of Addresses 69 MAC: Media Access Control 69 Port numbers 70 Chapter 5: Need More Addresses? Try Subnetting and NAT 73 Working with Subnets and Subnet Masks 74 Defining subnet masks 76 Why a network has a mask when it has no subnets 76 Subnetting 101 77 Letting the DHCP Protocol Do the Work for You 79 One administrator’s nightmare is another’s fantasy 80 Understanding how the DHCP protocol works —it’s client/server again 81 Being evicted after your lease expires 82 Sharing Addresses with Network Address Translation (NAT) 83 Understanding how NAT works 83 Securing NAT 84 Using NAT and DHCP to work together 84 Swallowing NAT incompatibilities 86 Digesting NAT-PT (Network Address Translation-Protocol Translation) 87 Part II: Getting Connected 89 Chapter 6: Configuring a TCP/IP Network — the Software Side 91 Installing TCP/IP? Probably Not 91 Detecting whether TCP/IP is installed 92 Determining whether it’s IPv4, IPv6, or both 92 Savoring TCP/IP right out of the box 93 Six Steps to a Complete TCP/IP Configuration 94 Step 1: Determining whether your computer is a client or server or both 95 Step 2: Gathering client information 95 Step 3: Setting up your NIC(s) 95 TCP/IP For Dummies, 6th Edition x Step 4: Deciding on a static IP address or a DHCP leased address 96 Step 5: Choosing how your host will translate names into IP addresses 97 Step 6: Gathering server information 97 Setting TCP/IP Client Properties 97 Configuring TCP/IP on a Mac OS X client 98 Configuring TCP/IP on a Linux or Unix client 100 Configuring a TCP/IP client on Windows Vista 102 Configuring a TCP/IP client on Windows XP 103 Setting TCP/IP Server Properties 104 Installing TCP/IP from Scratch 105 Feasting on Network Files 107 The local hosts file 107 The trusted hosts file, hostsequiv 109 Freddie’s nightmare: Your personal trust file 110 The services file 111 Daemons Aren’t Devils 113 Relishing your daemons113 Finding the daemons on your computer 113 Chapter 7: Networking SOHO with Wireless 115 Gulping the Minimum Hardware Details 116 NICs 116 Routers 117 Setting Up a Home Wireless Network in Four Steps 118 Step 1: Choose your wireless hardware 118 Step 2: Connect your wireless router 120 Step 3: Set up your wireless router 121 Step 4: Connect your computers 124 Securing Your Network 124 Securing the wired side 125 Securing the wireless side 125 Broadband for Everyone? We Hope 128 Level 1: Using wireless hotspots 128 Level 2: Paying for broadband wireless service 129 Level 3: Going anywhere you want to connect to the Internet with WiMAX 129 Chapter 8: Advancing into Routing Protocols 131 Understanding Routing Lingo 132 Routing Through the Layers — the Journey of a Packet 135 A new message heads out across the Net 135 The message visits the router 137 Into an Internet router and out again 139 Reaching the destination 140 Table of Contents xi Getting a Handle on How Routers Work 143 Getting Started with Routers 146 Swallowing Routing Protocols 148 Nibbling on IGP protocols 149 Exterior Gateway Protocols (EGP) 152 Understanding How BGP Routers Work 154 Juicing Up Routing with CIDR 154 C Is for Classless 156 CIDR pressing the routing tables 157 You say “subnet,” aggregating.net says “aggregate” 159 Securing Your Router 159 Coring the apple with Denial of Service (DoS) Attacks 160 Hijacking routers 160 Eavesdropping on BGP 161 It’s so sad 161 S-BGP (Secure BGP): Proposals to make BGP routing secure 161 Chapter 9: IPv6: IP on Steroids 163 Say Hello to IPv6 163 Digesting IPv4 limitations 164 Absorbing IPv6 advantages 164 If It Ain’t Broke, Don’t Fix It — Unless It Can Be Improved 165 Wow! Eight Sections in an IPv6 Address? 165 Why use hexadecimal? 166 There’s good news and there’s bad news 166 Take advantage of IPv6 address shortcuts 167 Special IPv6 Addresses 169 IPv6 — and the Using Is Easy 169 Checking out the network with autodiscovery 170 Ensuring that your address is unique 171 Automatically assigning addresses 172 Realizing that autoregistration says “Let us serve you” 172 IPv6 Installation 173 Configuring IPv6 on Windows XP and Windows Server 2003 173 Welcoming IPv6 to Mac OS X175 Getting started with IPv6 in Unix and Linux 175 Other Delicious IPv6 Morsels 176 Security for all 176 Faster, better multimedia 178 Support for real-time applications 178 Improved support for mobile computing 178 Share the Planet — IPv6 and IPv4 Can Coexist 179 Stacking IPv4 and Iv6 179 Tunneling IPv6 through IPv4 180 Whew — You Made It! 180 TCP/IP For Dummies, 6th Edition xii Chapter 10: Serving Up DNS (The Domain Name System) 181 Taking a Look at the DNS Components 182 Going Back to DNS Basics 183 Revisiting Client/Server with DNS 184 Dishing up DNS client/server definitions 184 Snacking on resolvers and name servers 184 Who’s in charge here? 186 Serving a DNS client’s needs 186 Oops! Can’t help you 187 Who’s Responsible for Name and Address Information? 187 Understanding Servers and Authority 189 Primary name server: Master of your domain 189 Secondary name servers 190 Caching servers 192 Understanding Domains and Zones 193 Problem Solving with Dynamic DNS (DYNDNS) 195 Diving into DNSSEC (DNS Security Extensions) 195 Why does DNS need DNSSEC? 196 Glimpsing behind the scenes of DNSSEC 197 Part III: Configuring Clients and Servers: Web, E-Mail, and Chat 199 Chapter 11: Digesting Web Clients and Servers 201 Standardizing Web Services 201 Deciphering the Languages of the Web 202 HTML 202 HTML 4 204 XML 205 XHTML 205 HTML + MIME = MHTML 205 Java and other Web dialects 205 Hypertext and hypermedia 206 Understanding How Web Browsing Works 207 Serving up a Web page 207 Storing user information as cookies 209 Managing cookies with your browser 210 Dishing up multimedia over the Internet 212 Feeding Web Pages with Atom and RSS 214 Reducing the Web’s Wide Waistline to Increase Speed 215 Proxy Serving for Speed and Security 218 Caching pages 219 Improving security with filtering 220 Setting up a proxy client 220 Finishing touches 223 Table of Contents xiii Setting Up a Caching Proxy Server 223 Outlining the general steps for installing and configuring squid 223 Configuring squid for Microsoft Windows Server 2008 224 Browsing Securely 228 Ensuring that a site is secure 228 Using your browser’s security features 229 Setting Up a Web Server 230 Setting up the Apache HTTP Server 231 Speeding up Apache 234 Making Apache more secure 234 Adding Security to HTTP 235 Taking a look at HTTPS 236 Getting up to speed on SSL 236 Stepping through an SSL Transaction 237 Using Digital Certificates for Secure Web Browsing 238 Chapter 12: Minimum Security Facilities 239 What’s the Worst That Could Happen? 239 Jump-Starting Security with the Big Three 240 Installing a personal firewall 241 Vaccinating your system with the anti-s 242 Encrypting data so snoopers can’t read it 243 Adding a Few More Basic Protections 243 Chapter 13: Eating Up E-Mail 245 Getting the Big Picture about How E-Mail Works 245 Feasting on E-Mail’s Client-Server Delights 246 E-mail clients 246 E-mail clients versus Web mail clients 247 E-mail servers 247 Postfix: Configuring the fastest-growing MTA 249 Sharpening the Finer Points of Mail Servers 252 Transferring e-mail by way of store-and-forward 253 Transferring e-mail by way of DNS MX records 254 Understanding How SMTP Works with MTAs 255 Defining E-Mail Protocols 255 Adding More Protocols to the Mix 256 POP3 256 IMAP4 257 HTTP 258 LDAP 258 DNS and its MX records 258 TCP/IP For Dummies, 6th Edition xiv Chapter 14: Securing E-Mail 261 Common Sense: The Most Important Tool in Your Security Arsenal 261 Being Aware of Possible Attacks 262 Phishing 263 Popping up and under 263 Getting spied on 263 Meeting malware 265 Bombing 265 Have you got anything without spam? Spam, spam, spam! 266 Spoofing 267 Finding Out Whether You’re a Victim 267 Playing Hide-and-Seek with Your E-Mail Address 268 Layering Security 269 Layer 1: Letting your ISP protect your network 269 Layer 2: Building your own walls 270 Layer 3: Securing e-mail on the server side 271 Layer 4: Securing e-mail on the client side 274 Layer 5: Suitely extending e-mail security 278 Using Secure Mail Clients and Servers 278 Setting up a secure IMAP or POP client 279 Setting up a secure mail server 281 Encrypting e-mail 281 Chapter 15: Beyond E-Mail: Social Networking and Online Communities 285 Thumbing to Talk About 286 Choosing a Communication Method 287 Getting together with IRC 288 Jabbering with XMPP 288 Feeding Your Craving for News 289 Getting Even More Social 290 Part IV: Even More TCP/IP Applications and Services 291 Chapter 16: Mobile IP — The Moveable Feast 293 Going Mobile 294 Understanding How Mobile IP Works 294 Sailing into the Future: Potential Mobile IPv6 Enhancements 296 Mobilizing Security 297 Understanding the risks 297 Using basic techniques to protect your mobile devices 298 Table of Contents xv Chapter 17: Saving Money with VoIP (Voice Over Internet Protocol) 299 Getting the Scoop on VoIP 299 Getting Started Using VoIP 300 Step 1: Get broadband 300 Step 2: Decide how to call 301 Step 3: Make the call 302 Step 4: Convert the bits back into voice (with VoIP software) 303 Step 5: Converse 303 Yo-Yo Dieting: Understanding How VoIP Packets Move through the Layers 304 Trekking the Protocols from RTP to H323 304 Talking the talk with the TCP/IP stack and more 305 Ingesting VoIP standards from the ITU 306 Vomiting and Other Vicious VoIP Vices 306 Securing Your Calls from VoIP Violation 306 You, too, can be a secret agent 307 Authenticating VoIP-ers 307 Keeping voice attacks separate from data 308 Defending with firewalls 308 Testing Your VoIP Security 308 Chapter 18: File and Print Sharing Services 309 Defining Basic File Sharing Terms 309 Using FTP to Copy Files 310 Understanding how FTP works 310 Using anonymous FTP to get good stuff 311 Choosing your FTP client 312 Transferring the files 312 Securing FTP file transfers 315 Using rcp or scp to Copy Files 316 Sharing Network File Systems 317 Nifty file sharing with NFS (Network File System) 317 Solving the buried file update problem with NFSv4 318 Examining the mount Protocol 319 Automounting 320 Configuring an NFS Server 320 Step 1: Edit the exports file 321 Step 2: Update the netgroup file 321 Step 3: Start the daemons 322 Configuring an NFS Client 323 TCP/IP For Dummies, 6th Edition xvi Picking Up Some NFS Performance Tips 324 Hardware tips 324 Server tips 325 Client tips 325 Weighing performance against security 325 Getting NFS Security Tips 325 Sharing Files Off the Stack 326 Using Windows network shares 326 Using Samba to share file and print services 327 Working with Network Print Services 328 Valuing IPP features 329 Setting up Windows Server 2008 print servers over IPP 330 Printing with the Common Unix Print System (CUPS) 331 Chapter 19: Sharing Compute Power 333 Sharing Network Resources 333 Accessing Remote Computers 334 Using a telnet client 334 “R” you ready for more remote access? 335 Executing commands with rsh and rexec 335 Securing Remote Access Sessions 336 Taking Control of Remote Desktops 337 Sharing Clustered Resources 338 Clustering for high availability 338 Clustering for load balancing 338 Clustering for supercomputing 339 Sharing Compute Power with Grid and Volunteer Computing 339 Part V: Network Troubleshooting and Security 341 Chapter 20: Staying with Security Protocols 343 Determining Who Is Responsible for Network Security 344 Following the Forensic Trail: Examining the Steps for Securing Your Network 344 Step 1: Prescribing Preventive Medicine for Security 345 Step 2: Observing Symptoms of Malware Infection 347 Uncovering more contagions 348 Step 3: Diagnosing Security Ailments with netstat, ps, and Logging 355 Monitoring network use with ps 355 Nosing around with netstat 357 Examining logs for symptoms of disease 362 Syslog-ing into the next generation 363 Microsoft proprietary event logging 370 Table of Contents xvii Chapter 21: Relishing More Meaty Security 373 Defining Encryption 374 Advancing Encryption with Advanced Encryption Standard (AES) 375 Peering into Authentication 376 Do you have any ID? A digital certificate will do 377 Getting digital certificates 377 Using digital certificates378 Checking your certificates 379 Coping with certificate problems 380 IPSec (IP Security Protocol): More Authentication 381 Kerberos — Guardian or Fiend? 382 Understanding Kerberos concepts 382 Playing at Casino Kerberos 383 Training the dog — one step per head 384 Setting up a Kerberos server step by step 385 Setting up a Kerberos client step by step 387 Chapter 22: Troubleshooting Connectivity and Performance Problems 389 Chasing Network Problems from End to End 390 Getting Started with Ping 390 Pinging away with lots of options 391 And now, for “some-ping” completely different: Running ping graphically 393 Death by ping 395 Diagnosing Problems Step by Step 396 Pinging yourself and others 396 Using nslookup to query a name server 401 Using traceroute (tracert) to fi nd network problems 403 Simplifying SNMP, the Simple Network Management Protocol 406 Just barely describing how SNMP works 406 Using SMNP programming free 407 Part VI: The Part of Tens 411 Chapter 23: Ten More Uses for TCP/IP 413 Chapter 24: Ten More Resources for Information about TCP/IP Security 417 Index 421
£20.79
John Wiley & Sons Inc LPIC2 Linux Professional Institute Certification
Book SynopsisFull coverage of the latest LPI-level 2 exams, with bonus online test bank LPIC-2 is the one-stop preparation resource for the Linux Professional Institute''s Advanced Level certification exam. With 100 percent coverage of all exam objectives, this book provides clear and concise coverage of the Linux administration topics you''ll need to know for exams 201 and 202. Practical examples highlight the real-world applications of important concepts, and together, the author team provides insights based on almost fifty years in the IT industry. This brand new second edition has been completely revamped to align with the latest versions of the exams, with authoritative coverage of the Linux kernel, system startup, advanced storage, network configuration, system maintenance, web services, security, troubleshooting, and more. You also get access to online learning tools including electronic flashcards, chapter tests, practice exams, and a glossary of critical terms to help you Table of ContentsIntroduction xxiii Assessment Test xliii Part I The LPI 201 Exam 1 Chapter 1 Starting a System 3 The Linux Boot Process 4 Following the Boot Process 4 Viewing the Boot Process 5 The Firmware Startup 6 The BIOS Startup 6 The UEFI Startup 7 Linux Bootloaders 8 GRUB Legacy 9 GRUB 2 12 Alternative Bootloaders 14 Secure Bootloaders 15 Process Initialization 16 The SysV Method 17 The systemd Method 21 The Upstart Method 26 System Recovery 27 Kernel Failures 27 Root Drive Failure 29 Summary 31 Exam Essentials 31 Review Questions 33 Chapter 2 Maintaining the System 37 Keeping Users Informed 38 Looking at Fluid Messaging 39 Looking at Static Messaging 47 Backing Up the System 51 Developing a Backup Strategy 51 Performing Backups 61 Installing Programs from Source 72 Obtaining the Installation Files 73 Unpacking the Installation Files 73 Reading Installation Documentation 74 Compiling Preparation 75 Compiling the Program 76 Completing the Installation 76 Managing Resource Usage 79 Measuring Resource Usage 79 Predicting Resource Usage 83 Troubleshooting Resource Usage 85 Summary 87 Exam Essentials 87 Review Questions 89 Chapter 3 Mastering the Kernel 93 What Is the Kernel? 94 The Kernel Features 94 Parts of the Kernel 104 Kernel Versions 107 Compiling a Kernel 108 Obtaining Source Code 109 Creating the Configuration File 110 Compiling and Installing the Kernel 114 Compiling and Installing Modules 116 Creating an Initial RAM Disk 116 Booting the New Kernel 118 Creating a Kernel Package 119 Maintaining the Kernel 120 Working with Module Files 120 Module Commands 120 Working with Hardware 125 Automatically Detecting Hardware 128 Troubleshooting the Kernel 129 Summary 132 Exam Essentials 133 Review Questions 135 Chapter 4 Managing the Filesystem 139 Operating the Linux Filesystem 140 Understanding Filesystem Structures 140 Understanding Filesystem Types 141 Making a Filesystem 144 Attaching a Filesystem 146 Exploring Additional Filesystem Topics 162 Looking at Memory-Based Linux Filesystems 162 Looking at the Btrfs Filesystem 163 Exploring Btrfs Subvolumes 165 Exploring Btrfs Snapshots 169 Looking at Optical Filesystems 171 Looking at Swap Filesystems 177 Looking at Network-Based Filesystems 180 Understanding Auto-Mounting 180 Looking at Encrypted Filesystems 183 Maintaining Linux Filesystems 185 Adjusting a Filesystem 185 Checking and Repairing a Filesystem 187 Using SMART 189 Summary 192 Exam Essentials 192 Review Questions 195 Chapter 5 Administering Advanced Storage Devices 199 Configuring RAID 200 Understanding RAID 200 Implementing RAID on Linux 204 Managing a RAID Array 216 Adjusting Storage Devices 221 Looking at Drive Interface Concepts 221 Testing and Tuning Drives 223 Implementing iSCSI 234 Managing Logical Volumes 245 Understanding LVM 245 Creating Logical Volumes 246 Supporting Logical Volumes 254 Understanding the Device Mapper 263 Summary 264 Exam Essentials 264 Review Questions 267 Chapter 6 Navigating Network Services 271 Networking Basics 272 The Physical Layer 272 The Network Layer 274 The Transport Layer 278 The Application Layer 279 Configuring Network Features 279 Network Configuration Files 280 Graphical Tools 282 Command-Line Tools 284 Basic Network Troubleshooting 288 Checking the Log Files 288 Viewing the ARP Cache 289 Sending Test Packets 290 Testing Network Routes 291 Testing Client/Server Connectivity 293 Finding Host Information 295 Network Security 297 Advanced Network Troubleshooting 297 Viewing Open Network Connections 297 Viewing Network Statistics 300 Scanning the Network 302 Capturing Network Traffic 303 Summary 308 Exam Essentials 308 Review Questions 310 Part II The LPI 202 Exam 315 Chapter 7 Organizing Email Services 317 The Linux Mail System 318 Mail Transfer Agent 319 Mail Delivery Agent 321 Mail User Agent 323 Email Protocols 325 Simple Mail Transfer Protocol 326 Post Office Protocol 332 Internet Message Access Protocol 334 Using Email Servers 338 Using Sendmail 338 Using Postfix 342 Local Email Delivery 351 Procmail Basics 351 Sieve 356 Remote Email Delivery 359 Using Courier 359 Using Dovecot 360 Summary 363 Exam Essentials 364 Review Questions 366 Chapter 8 Directing DNS 371 Configuring a DNS Server 372 Understanding DNS and BIND 372 Configuring DNS on Linux 379 Starting, Stopping, and Reloading BIND 395 Configuring BIND Logging 398 Creating and Maintaining DNS Zones 403 Exploring BIND Zone Files 403 Managing BIND Zones on Linux 417 Securing a DNS Server 427 Setting Up Basic Security 427 Jailing BIND 431 Using DNSSEC 434 Connecting via TSIG 440 Employing DANE 442 Summary 445 Exam Essentials 445 Review Questions 447 Chapter 9 Offering Web Services 451 What Is a Web Server? 452 Web Server Basics 452 The HTTP Standard 453 Linux Web Servers 459 The Apache Web Server 461 Installing an Apache Server 462 Configuring the Apache Server 464 Hosting Dynamic Web Applications 472 Creating a Secure Web Server 474 Using a Proxy Server 482 Installing Squid 482 Configuring Squid 483 Configuring Clients 486 The Nginx Server 487 Installing Nginx 487 Configuring Nginx 488 Summary 490 Exam Essentials 491 Review Questions 493 Chapter 10 Sharing Files 497 Looking at Samba 498 Understanding Samba 498 Configuring Samba 500 Troubleshooting Samba 527 Looking at NFS 530 Understanding NFS 530 Configuring NFS 533 Securing NFS 549 Troubleshooting NFS 552 Looking at FTP Servers 553 Understanding FTP 554 Configuring vsftpd 556 Configuring Pure-FTPd 568 Summary 575 Exam Essentials 575 Review Questions 577 Chapter 11 Managing Network Clients 581 Assigning Network Addresses 582 The DHCP Standard 583 Linux DHCP Software 584 Installing a Linux DHCP Server 585 Configuring a DHCP Server 585 Configuring Clients 590 Authentication Service 591 PAM Basics 591 Configuring PAM 594 Using PAM Application Files 595 Network Directories 597 LDAP Basics 597 The OpenLDAP Server 601 Implementing LDAP Clients 607 Summary 613 Exam Essentials 613 Review Questions 615 Chapter 12 Setting Up System Security 619 Server Network Security 620 Port Scanning 620 Intrusion Detection Systems 628 External Network Security 631 Using iptables 634 Routing in Linux 639 Connecting Securely to a Server 639 OpenSSH 640 OpenVPN 643 Security Resources 646 US-CERT 646 SANS Institute 647 Bugtraq 647 Summary 648 Exam Essentials 649 Review Questions 651 Appendix Answers to Review Questions 655 Chapter 1: Starting a System 656 Chapter 2: Maintaining the System 659 Chapter 3: Mastering the Kernel 662 Chapter 4: Managing the Filesystem 664 Chapter 5: Administering Advanced Storage Devices 667 Chapter 6: Navigating Network Services 670 Chapter 7: Organizing Email Services 673 Chapter 8: Directing DNS 676 Chapter 9: Offering Web Services 678 Chapter 10: Sharing Files 681 Chapter 11: Managing Network Clients 684 Chapter 12: Setting Up System Security 687 Index 691
£43.50
John Wiley & Sons Inc Data Warehousing Fundamentals for IT
Book SynopsisSince the first edition of Data Warehousing Fundamentals, there has been an increase in enterprises either already having or in the process of obtaining the data warehousing programs.Trade Review"...clearly the author is a long-time practitioner and expert in this area. And if this were not enough, the language is clear and precise, and the associated content is easily internalised." ( BCS, August 2010)Table of ContentsPreface xxv Part 1 Overview and Concepts 1 1 The Compelling Need For Data Warehousing 3 Chapter Objectives 3 Escalating Need For Strategic Information 4 Failures of Past Decision-Support Systems 9 Operational Versus Decision-Support Systems 11 Data Warehousing—The Only Viable Solution 13 A Simple Concept For Information Delivery 15 The Data Warehousing Movement 17 Evolution of Business Intelligence 18 Chapter Summary 20 Review Questions 20 Exercises 21 2 Data Warehouse: The Building Blocks 23 Chapter Objectives 23 Defining Features 24 Data Warehouses and Data Marts 29 Architectural Types 32 Overview of The Components 34 Metadata in The Data Warehouse 41 Chapter Summary 42 Review Questions 43 Exercises 43 3 Trends in Data Warehousing 45 Chapter Objectives 45 Continued Growth in Data Warehousing 46 Significant Trends 50 Emergence of Standards 64 Web-Enabled Data Warehouse 66 Chapter Summary 69 Review Questions 69 Exercises 70 Part 2 Planning and Requirements 71 4 Planning and Project Management 73 Chapter Objectives 73 Planning Your Data Warehouse 74 The Data Warehouse Project 79 The Development Phases 83 The Project Team 85 Project Management Considerations 90 Chapter Summary 96 Review Questions 96 Exercises 97 5 Defining The Business Requirements 99 Chapter Objectives 99 Dimensional Analysis 100 Information Packages—A Useful Concept 103 Requirements Gathering Methods 109 Requirements Definition: Scope and Content 116 Chapter Summary 119 Review Questions 119 Exercises 120 6 Requirements As The Driving Force For Data Warehousing 121 Chapter Objectives 121 Data Design 122 The Architectural Plan 125 Data Storage Specifications 131 DBMS Selection 132 Information Delivery Strategy 133 Chapter Summary 136 Review Questions 136 Exercises 137 Part 3 Architecture and Infrastructure 139 7 Architectural Components 141 Chapter Objectives 141 Understanding Data Warehouse Architecture 141 Distinguishing Characteristics 143 Architectural Framework 146 Technical Architecture 148 Architectural Types 156 Chapter Summary 160 Review Questions 160 Exercises 161 8 Infrastructure As The Foundation For Data Warehousing 163 Chapter Objectives 163 Infrastructure Supporting Architecture 164 Hardware and Operating Systems 166 Database Software 181 Collection of Tools 184 Data Warehouse Appliances 188 Chapter Summary 191 Review Questions 191 Exercises 192 9 The Significant Role of Metadata 193 Chapter Objectives 193 Why Metadata Is Important 193 Metadata Types By Functional Areas 203 Business Metadata 207 Technical Metadata 209 How To Provide Metadata 212 Chapter Summary 219 Review Questions 220 Exercises 220 Part 4 Data Design and Data Preparation 223 10 Principles of Dimensional Modeling 225 Chapter Objectives 225 From Requirements To Data Design 225 The Star Schema 232 Star Schema Keys 239 Advantages of The Star Schema 241 Star Schema: Examples 244 Chapter Summary 246 Review Questions 247 Exercises 247 11 Dimensional Modeling: Advanced Topics 249 Chapter Objectives 249 Updates To The Dimension Tables 250 Miscellaneous Dimensions 255 The Snowflake Schema 259 Aggregate Fact Tables 262 Families of Stars 272 Chapter Summary 277 Review Questions 278 Exercises 278 12 Data Extraction, Transformation, and Loading 281 Chapter Objectives 281 ETL Overview 282 ETL Requirements and Steps 284 Data Extraction 286 Data Transformation 295 Data Loading 302 ETL Summary 308 Other Integration Approaches 311 Chapter Summary 313 Review Questions 313 Exercises 314 13 Data Quality: A Key To Success 315 Chapter Objectives 315 Why Is Data Quality Critical? 316 Data Quality Challenges 323 Data Quality Tools 326 Data Quality Initiative 328 Master Data Management (Mdm) 335 MDM Categories 335 MDM Benefits 335 MDM and Data Warehousing 336 Chapter Summary 336 Review Questions 336 Exercises 337 Part 5 Information Access and Delivery 339 14 Matching Information To The Classes of Users 341 Chapter Objectives 341 Information From The Data Warehouse 342 Who Will Use The Information? 349 Information Delivery 356 Information Delivery Tools 360 Information Delivery: Special Topics 366 Chapter Summary 371 Review Questions 371 Exercises 372 15 OLAP in The Data Warehouse 373 Chapter Objectives 373 Demand For Online Analytical Processing 374 OLAP is The Answer 379 OLAP Definitions and Rules 379 OLAP Characteristics 382 Major Features and Functions 382 OLAP Models 393 OLAP Implementation Considerations 398 Chapter Summary 404 Review Questions 405 Exercises 405 16 Data Warehousing and The Web 407 Chapter Objectives 407 Web-Enabled Data Warehouse 408 Web-Based Information Delivery 414 OLAP and The Web 420 Building A Web-Enabled Data Warehouse 421 Chapter Summary 426 Review Questions 426 Exercises 427 17 Data Mining Basics 429 Chapter Objectives 429 What Is Data Mining? 430 Major Data Mining Techniques 439 Data Mining Applications 452 Chapter Summary 459 Review Questions 459 Exercises 460 Part 6 Implementation and Maintenance 461 18 The Physical Design Process 463 Chapter Objectives 463 Physical Design Steps 464 Physical Design Considerations 467 Physical Storage 473 Indexing The Data Warehouse 477 Performance Enhancement Techniques 483 Chapter Summary 486 Review Questions 486 Exercises 487 19 Data Warehouse Deployment 489 Chapter Objectives 489 Data Warehouse Testing 490 Major Deployment Activities 491 Considerations For A Pilot 497 Security 502 Backup and Recovery 504 Chapter Summary 508 Review Questions 508 Exercises 509 20 Growth and Maintenance 511 Chapter Objectives 511 Monitoring The Data Warehouse 512 User Training and Support 515 Managing The Data Warehouse 520 Chapter Summary 524 Review Questions 525 Exercises 525 Answers To Selected Exercises 527 Appendix A: Project Life Cycle Steps and Checklists 531 Appendix B: Critical Factors For Success 535 Appendix C: Guidelines For Evaluating Vendor Solutions 537 Appendix D: Highlights of Vendors and Products 539 Appendix E: Real-World Examples of Best Practices 549 References 555 Glossary 557 Index 565
£109.76
O'Reilly Media Understanding Linux Network Internals
Book SynopsisA no-nonsense guide to Linux networking, which offers a clear view of the underlying concepts and teaches you to follow the C code that implements it. The topics include: system initialization, network interface card (NIC) device drivers, bridging, routing, ICMP, and more.Trade Review"Anyone who works with Linux networking should have a copy to hand to help with those inexplicable problems and to better understand how it all works." - James Millen, BJHC & IM, November 2006
£38.39
John Wiley & Sons Inc Windows Security Monitoring
Book SynopsisDig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON Forensics CTF village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system's event logging patterns for operations and changes performed within the system. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components. Scenariobased instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory obTable of ContentsIntroduction xxix Part I Introduction to Windows Security Monitoring 1 Chapter 1 Windows Security Logging and Monitoring Policy 3 Security Logging 3 Security Logs 4 System Requirements 5 PII and PHI 5 Availability and Protection 5 Configuration Changes 6 Secure Storage 6 Centralized Collection 6 Backup and Retention 7 Periodic Review 7 Security Monitoring 7 Communications 8 Audit Tool and Technologies 8 Network Intrusion Detection Systems 8 Host-based Intrusion Detection Systems 8 System Reviews 9 Reporting 9 Part II Windows Auditing Subsystem 11 Chapter 2 Auditing Subsystem Architecture 13 Legacy Auditing Settings 13 Advanced Auditing Settings 16 Set Advanced Audit Settings via Local Group Policy 18 Set Advanced Audit Settings via Domain Group Policy 19 Set Advanced Audit Settings in the Local Security Authority (LSA) Policy Database 19 Read Current LSA Policy Database Advanced Audit Policy Settings 20 Advanced Audit Policies Enforcement and Legacy Policies Rollback 20 Switch from Advanced Audit Settings to Legacy Settings 21 Switch from Legacy Audit Settings to Advanced Settings 22 Windows Auditing Group Policy Settings 22 Manage Auditing and Security Log 22 Generate Security Audits 23 Security Auditing Policy Security Descriptor 23 Group Policy: “Audit: Shut Down System Immediately If Unable to Log Security Audits” 24 Group Policy: Protected Event Logging 25 Group Policy: “Audit: Audit the Use of Backup and Restore Privilege” 25 Group Policy: “Audit: Audit the Access of Global System Objects” 26 Audit the Access of Global System Container Objects 26 Windows Event Log Service: Security Event Log Settings 27 Changing the Maximum Security Event Log File Size 28 Group Policy: Control Event Log Behavior When the Log File Reaches Its Maximum Size 29 Group Policy: Back Up Log Automatically When Full 29 Group Policy: Control the Location of the Log File 30 Security Event Log Security Descriptor 31 Guest and Anonymous Access to the Security Event Log 33 Windows Auditing Architecture 33 Windows Auditing Policy Flow 34 LsaSetInformationPolicy and LsaQueryInformationPolicy Functions Route 35 Windows Auditing Event Flow 36 LSASS.EXE Security Event Flow 37 NTOSKRNL.EXE Security Event Flow 37 Security Event Structure 38 Chapter 3 Auditing Subcategories and Recommendations 47 Account Logon 47 Audit Credential Validation 47 Audit Kerberos Authentication Service 50 Audit Kerberos Service Ticket Operations 53 Audit Other Account Logon Events 54 Account Management 54 Audit Application Group Management 54 Audit Computer Account Management 54 Audit Distribution Group Management 55 Audit Other Account Management Events 56 Audit Security Group Management 57 Audit User Account Management 57 Detailed Tracking 58 Audit DPAPI Activity 58 Audit PNP Activity 58 Audit Process Creation 58 Audit Process Termination 59 Audit RPC Events 59 DS Access 60 Audit Detailed Directory Service Replication 60 Audit Directory Service Access 60 Audit Directory Service Changes 61 Audit Directory Service Replication 61 Logon and Logoff 61 Audit Account Lockout 61 Audit User/Device Claims 62 Audit Group Membership 62 Audit IPsec Extended Mode/Audit IPsec Main Mode/ Audit IPsec Quick Mode 63 Audit Logoff 63 Audit Logon 64 Audit Network Policy Server 65 Audit Other Logon/Logoff Events 65 Audit Special Logon 66 Object Access 66 Audit Application Generated 67 Audit Certification Services 67 Audit Detailed File Share 67 Audit File Share 67 Audit File System 68 Audit Filtering Platform Connection 68 Audit Filtering Platform Packet Drop 69 Audit Handle Manipulation 69 Audit Kernel Object 70 Audit Other Object Access Events 71 Audit Registry 71 Audit Removable Storage 72 Audit SAM 72 Audit Central Policy Staging 73 Policy Change 73 Audit Policy Change 73 Audit Authentication Policy Change 74 Audit Authorization Policy Change 74 Audit Filtering Platform Policy Change 75 Audit MPSSVC Rule-Level Policy Change 75 Audit Other Policy Change Events 75 Privilege Use 76 Audit Non Sensitive Privilege Use 76 Audit Other Privilege Use Events 77 Audit Sensitive Privilege Use 77 System 77 Audit IPsec Driver 78 Audit Other System Events 78 Audit Security State Change 78 Audit Security System Extension 79 Audit System Integrity 79 Part III Security Monitoring Scenarios 81 Chapter 4 Account Logon 83 Interactive Logon 85 Successful Local User Account Interactive Logon 85 Step 1: Winlogon Process Initialization 85 Step 1: LSASS Initialization 87 Step 2: Local System Account Logon 88 Step 3: ALPC Communications between Winlogon and LSASS 92 Step 4: Secure Desktop and SAS 92 Step 5: Authentication Data Gathering 92 Step 6: Send Credentials from Winlogon to LSASS 94 Step 7: LSA Server Credentials Flow 95 Step 8: Local User Scenario 96 Step 9: Local User Logon: MSV1_0 Answer 99 Step 10: User Logon Rights Verification 104 Step 11: Security Token Generation 105 Step 12: SSPI Call 105 Step 13: LSASS Replies to Winlogon 105 Step 14: Userinit and Explorer.exe 105 Unsuccessful Local User Account Interactive Logon 106 Successful Domain User Account Interactive Logon 110 Steps 1–7: User Logon Process 110 Step 8: Authentication Package Negotiation 110 Step 9: LSA Cache 111 Step 10: Credentials Validation on the Domain Controller 112 Steps 11–16: Logon Process 112 Unsuccessful Domain User Account Interactive Logon 112 RemoteInteractive Logon 112 Successful User Account RemoteInteractive Logon 112 Successful User Account RemoteInteractive Logon Using Cached Credentials 114 Unsuccessful User Account RemoteInteractive Logon - NLA Enabled 115 Unsuccessful User Account RemoteInteractive Logon - NLA Disabled 117 Network Logon 118 Successful User Account Network Logon 118 Unsuccessful User Account Network Logon 120 Unsuccessful User Account Network Logon - NTLM 121 Unsuccessful User Account Network Logon - Kerberos 122 Batch and Service Logon 123 Successful Service / Batch Logon 123 Unsuccessful Service / Batch Logon 125 NetworkCleartext Logon 127 Successful User Account NetworkCleartext Logon - IIS Basic Authentication 127 Unsuccessful User Account NetworkCleartext Logon - IIS Basic Authentication 129 NewCredentials Logon 129 Interactive and RemoteInteractive Session Lock Operations and Unlock Logon Type 132 Account Logoff and Session Disconnect 133 Terminal Session Disconnect 134 Special Groups 135 Anonymous Logon 136 Default ANONYMOUS LOGON Logon Session 136 Explicit Use of Anonymous Credentials 138 Use of Account That Has No Network Credentials 139 Computer Account Activity from Non–Domain- Joined Machine 139 Allow Local System to Use Computer Identity for NTLM 140 Chapter 5 Local User Accounts 141 Built-in Local User Accounts 142 Administrator 142 Guest 144 Custom User Account 145 HomeGroupUser$ 145 DefaultAccount 146 Built-in Local User Accounts Monitoring Scenarios 146 New Local User Account Creation 146 Successful Local User Account Creation 147 Unsuccessful Local User Account Creation: Access Denied 164 Unsuccessful Local User Account Creation: Other 165 Monitoring Scenarios: Local User Account Creation 166 Local User Account Deletion 168 Successful Local User Account Deletion 169 Unsuccessful Local User Account Deletion - Access Denied 173 Unsuccessful Local User Account Deletion - Other 175 Monitoring Scenarios: Local User Account Deletion 176 Local User Account Password Modification 177 Successful Local User Account Password Reset 178 Unsuccessful Local User Account Password Reset - Access Denied 179 Unsuccessful Local User Account Password Reset - Other 180 Monitoring Scenarios: Password Reset 181 Successful Local User Account Password Change 182 Unsuccessful Local User Account Password Change 183 Monitoring Scenarios: Password Change 184 Local User Account Enabled/Disabled 184 Local User Account Was Enabled 184 Local User Account Was Disabled 186 Monitoring Scenarios: Account Enabled/Disabled 186 Local User Account Lockout Events 187 Local User Account Lockout 188 Local User Account Unlock 190 Monitoring Scenarios: Account Enabled/Disabled 191 Local User Account Change Events 191 Local User Account Change Event 192 Local User Account Name Change Event 196 Monitoring Scenarios: Account Changes 198 Blank Password Existence Validation 199 Chapter 6 Local Security Groups 201 Built-in Local Security Groups 203 Access Control Assistance Operators 205 Administrators 205 Backup Operators 205 Certificate Service DCOM Access 205 Cryptographic Operators 205 Distributed COM Users 206 Event Log Readers 207 Guests 207 Hyper-V Administrators 207 IIS_IUSRS 208 Network Configuration Operators 208 Performance Log Users 209 Performance Monitor Users 209 Power Users 209 Print Operators 209 Remote Desktop Users 209 Remote Management Users 210 Replicator 210 Storage Replica Administrators 210 System Managed Accounts Group 210 Users 210 WinRMRemoteWMIUsers__ 211 Built-in Local Security Groups Monitoring Scenarios 211 Local Security Group Creation 212 Successful Local Security Group Creation 212 Unsuccessful Local Security Group Creation - Access Denied 217 Monitoring Scenarios: Local Security Group Creation 218 Local Security Group Deletion 218 Successful Local Security Group Deletion 219 Unsuccessful Local Security Group Deletion - Access Denied 221 Unsuccessful Local Security Group Deletion - Other 222 Monitoring Scenarios: Local Security Group Deletion 223 Local Security Group Change 223 Successful Local Security Group Change 224 Unsuccessful Local Security Group Change - Access Denied 226 Monitoring Scenarios: Local Security Group Change 227 Local Security Group Membership Operations 227 Successful New Local Group Member Add Operation 228 Successful Local Group Member Remove Operation 231 Unsuccessful Local Group Member Remove/ Add Operation - Access Denied 232 Monitoring Scenarios: Local Security Group Members Changes 233 Local Security Group Membership Enumeration 234 Monitoring Scenarios: Local Security Group Membership Enumeration 235 Chapter 7 Microsoft Active Directory 237 Active Directory Built-in Security Groups 237 Administrators 238 Account Operators 238 Incoming Forest Trust Builders 238 Pre-Windows 2000 Compatible Access 238 Server Operators 239 Terminal Server License Servers 239 Windows Authorization Access 239 Allowed RODC Password Replication Group 240 Denied RODC Password Replication Group 240 Cert Publishers 240 DnsAdmins 240 RAS and IAS Servers 241 Cloneable Domain Controllers 241 DnsUpdateProxy 241 Domain Admins 241 Domain Computers 241 Domain Controllers 242 Domain Users 242 Group Policy Creator Owners 242 Protected Users 242 Read-Only Domain Controllers 242 Enterprise Read-Only Domain Controllers 242 Enterprise Admins 243 Schema Admins 243 Built-in Active Directory Accounts 243 Administrator 243 Chapter 8 Active Directory Objects 285 Active Directory Object SACL 286 Child Object Creation and Deletion Permissions 291 Extended Rights 292 Validated Writes 294 Chapter 9 Authentication Protocols 323 NTLM-family Protocols 323 Challenge-Response Basics 323 LAN Manager 325 LM Hash 325 Chapter 10 Operating System Events 367 System Startup/Shutdown 368 Successful Normal System Shutdown 368 Unsuccessful Normal System Shutdown - Access Denied 370 Chapter 11 Logon Rights and User Privileges 419 Logon Rights 419 Logon Rights Policy Modification 420 Logon Rights Policy Settings - Member Added 421 Logon Rights Policy Settings - Member Removed 421 Unsuccessful Logons Due to Lack of Logon Rights 422 User Privileges 422 User Privileges Policy Modification 427 User Privileges Policy Settings - Member Added 427 User Privileges Policy Settings - Member Removed 428 Special User Privileges Assigned at Logon Time 429 Logon Session User Privileges Operations 430 Privilege Use 431 Successful Call of a Privileged Service 431 Unsuccessful Call of a Privileged Service 432 Successful Operation with a Privileged Object 433 Unsuccessful Operation with a Privileged Object 435 Backup and Restore Privilege Use Auditing 435 Chapter 12 Windows Applications 437 New Application Installation 437 Application Installation Using Windows Installer 440 Application Removal Using Windows Installer 443 Chapter 13 Filesystem and Removable Storage 485 Windows Filesystem 486 NTFS Security Descriptors 487 Inheritance 493 Chapter 14 Windows Registry 523 Windows Registry Basics 523 Registry Key Permissions 526 Registry Operations Auditing 528 Chapter 15 Network File Shares and Named Pipes 559 Network File Shares 559 Network File Share Access Permissions 563 File Share Creation 564 Appendix A Kerberos AS_REQ, TGS_REQ, and AP_REQ Messages Ticket Options 585 Appendix B Kerberos AS_REQ, TGS_REQ, and AP_REQ Messages Result Codes 589 Appendix C SDDL Access Rights 597 Object-Specific Access Rights 598 Index 603
£28.49
John Wiley & Sons Inc The Security Culture Playbook
Book SynopsisTable of ContentsAbout the Authors viii Acknowledgments xii Introduction xxv Part I: Foundation 1 Chapter 1: You Are Here 3 Why All the Buzz? 4 What Is Security Culture, Anyway? 8 A Problem of Definition 9 A Problem of Overconfidence 11 Takeaways 12 Chapter 2: Up-leveling the Conversation: Security Culture Is a Board-level Concern 13 A View from the Top 14 Telling the Human Side of the Story 15 What’s the Cost of Not Getting This Right? 16 Cybercriminals Are Doubling Down on Their Attacks Against Your Employees 19 Your People and Security Culture Are at the Center of Everything 20 The Implication 22 Getting It Right 24 Takeaways 25 Chapter 3: The Foundations of Transformation 27 The Core Thesis 29 The Knowledge-Intention-Behavior Gap 29 Three Realities of Security Awareness 31 Program Focus 31 Extending the Discussion 33 Introducing the Security Culture Maturity Model 33 The Security Culture Maturity Model in Brief 35 The S-Curves 36 The Value of the Security Culture Maturity Model 37 You Are Always Either Building Strength or Allowing Atrophy 37 Takeaways 38 Part II: Exploration 39 Chapter 4: Just What Is Security Culture, Anyway? 41 Lessons from Safety Culture 42 A Jumble of Terms 44 Information Security Culture 45 IT Security Culture 45 Cybersecurity Culture 46 Security Culture in the Modern Day 46 Technology Focus 47 Compliance Focus 48 Human-Reality Focus 49 Takeaways 51 Chapter 5: Critical Concepts from the Social Sciences 53 What’s the Real Goal—Awareness, Behavior, or Culture? 54 Coming to Terms with Our Irrational Nature 55 We Are Lazy 56 Why Don’t We Just Give Up? 60 Security Culture—A Part of Organizational Culture 61 Takeaways 62 Chapter 6: The Components of Security Culture 63 A Problem of Definition 64 The Academic Perspective 64 The Practitioner Perspective 65 Defining Security Culture 66 Security Culture as Dimensions 67 The Seven Dimensions of Security Culture 69 Attitudes 69 Behaviors 69 Cognition 69 Communication 70 Compliance 70 Norms 70 Responsibilities 71 The Security Culture Survey 71 Example Findings from Measuring the Seven Dimensions 72 Normalized Use of Unauthorized Services 73 Confidentiality and Insider Threats 74 Last Thought 74 Takeaways 75 Chapter 7: Interviews with Organizational Culture Experts and Academics 77 John R. Childress, PYXIS Culture Technologies Limited 78 Why Is Culture Important? 78 Why Do You Find Culture Interesting? 79 Is There a Specific Definition of Culture That You Find Useful? 79 What Actions Can Be Taken to Direct Cultural Change? 80 Is There a Success or Horror Story You’d Like to Share Related to Culture Change? 81 How Does a Culture Evolve (or How Often?) 82 Professor John McAlaney, Bournemouth University, UK 82 Why Is Culture Important? 83 Why Do You Find Culture Interesting? 83 Is There a Specific Definition of Culture That You Find Useful? 83 What Actions Can Be Taken to Direct Cultural Change? 84 Is There a Success or Horror Story You’d Like to Share Related to Culture Change? 85 How Does a Culture Evolve (or How Often?) 85 Dejun “Tony” Kong, PhD, Muma College of Business, University of South Florida 86 Why Is Culture Important? 86 Why Do You Find Culture Interesting? 86 Is There a Specific Definition of Culture That You Find Useful? 87 How Do You Use Metrics to Improve Culture / Measure the Effectiveness of Cultural Change? 87 Michael Leckie, Silverback Partners, LLC 87 Why Is Culture Important? 88 Why Do You Find Culture Interesting? 89 Is There a Specific Definition of Culture That You Find Useful? 90 How Do You Use Metrics to Improve Culture / Measure the Effectiveness of Cultural Change? 90 What Actions Can Be Taken to Direct Cultural Change? 91 Is There a Success or Horror Story You’d Like to Share Related to Culture Change? 93 How Does a Culture Evolve (or How Often?) 93 Part III: Transformation 95 Chapter 8: Introducing the Security Culture Framework 97 The Power of Three 99 Step 1: Measure 100 Know Where You are 101 Decide Where You Want to Be 102 Find Your Gap 104 Step 2: Involve 106 Building Support 106 Different Audiences 108 Step 3: Engage 109 Rinse and Repeat 111 Benefits of Using the Security Culture Framework 111 Takeaways 112 Chapter 9: The Secrets to Measuring Security Culture 113 Connecting Awareness, Behavior, and Culture 115 How Can You Measure the Unseen? 116 Using Existing Data 116 The Right Way to Use Data 119 Methods of Measuring Culture 119 Observation 120 Experimentation 121 Interrogation (Surveys and Interviews) 121 A/B Testing 122 Multiple Metrics, Single Score 124 Trends 125 A Note Regarding Completion Rates 127 Takeaways 128 Chapter 10: How to Influence Culture 129 Resistance to Change 130 Be Proactive 131 The Complexity of Culture 133 Using the Seven Dimensions to Influence Your Security Culture 134 Attitudes 134 Behaviors 136 Cognition 138 Communication 140 Compliance 141 Norms 143 Responsibilities 144 How Do You Know Which Dimension to Target? 146 Takeaways 147 Chapter 11: Culture Sticking Points 149 Does Culture Change Have to Be Difficult? 150 Using Norms Is a Double-Edged Sword 151 Failing to Plan Is Planning to Fail 152 If You Try to Work Against Human Nature, You Will Fail 153 Not Seeing the Culture You Are Embedded In 155 Takeaways 156 Chapter 12: Planning and Maturing Your Program 157 Taking Stock of What We’ve Covered 158 View Your Culture Through Your Employees’ Eyes 159 Culture Carriers 160 Building and Modeling Maturity 161 Exploring the Data 162 Culture Maturity Indicators 162 Level 1: Basic Compliance 165 Level 2: Security Awareness Foundation 165 Level 3: Programmatic Security Awareness & Behavior 166 Level 4: Security Behavior Management 167 Level 5: Sustainable Security Culture 168 There Are Stories in the Data 170 A Seat at the Table 174 Takeaways 175 Chapter 13: Quick Tips for Gaining and Maintaining Support 177 You Are a Guide 178 Sell by Using Stories 179 Lead with Empathy, Know Your Audience 180 Set Expectations 184 Takeaways 185 Chapter 14: Interviews with Security Culture Thought Leaders 187 Alexandra Panaretos, Ernst & Young 188 Why Is Culture Important? 188 Why Do You Find Culture Interesting? 189 Is There a Success or Horror Story You’d Like to Share Related to Culture Change? 190 Dr. Jessica Barker, Cygenta 193 Why Is Security Culture Important? 193 Why Do You Find Culture Interesting? 194 What Actions Can Be Taken to Direct Cultural Change? 194 What Is Your Most Interesting Experience with Culture? 195 Kathryn Tyrpak, Jaguar Land Rover 195 Why Is Culture Important? 195 Why Do You Find Culture Interesting? 196 Is There a Specific Definition of Culture That You Find Useful? 196 How Do You Use Metrics to Improve Culture / Measure the Effectiveness of Cultural Change? 196 What Actions Can Be Taken to Direct Cultural Change? 197 Lauren Zink, Boeing 197 Why Is Culture Important? 198 Why Do You Find Culture Interesting? 198 Is There a Specific Definition of Culture That You Find Useful? 199 How Do You Use Metrics to Improve Culture / Measure the Effectiveness of Cultural Change? 199 Mark Majewski, Rock Central 200 Why Is Culture Important? 200 Why Do You Find Culture Interesting? 200 Is There a Specific Definition of Culture That You Find Useful? 201 How Do You Use Metrics to Improve Culture / Measure the Effectiveness of Cultural Change? 201 What Actions Can Be Taken to Direct Cultural Change? 201 Is There a Success or Horror Story You’d Like to Share Related to Culture Change? 202 How Does a Culture Evolve (or How Often?) 202 Mo Amin, moamin.com 203 Why Is Culture Important? 203 Why Do You Find Culture Interesting? 203 Is There a Specific Definition of Culture That You Find Useful? 203 How Do You Use Metrics to Improve Culture / Measure the Effectiveness of Cultural Change? 203 What Actions Can Be Taken to Direct Cultural Change? 204 Is There a Success or Horror Story You’d Like to Share Related to Culture Change? 204 How Does a Culture Evolve (or How Often)? 205 Chapter 15: Parting Thoughts 207 Engage the Community 208 Be a Lifelong Learner 209 Be a Realistic Optimist 210 Conclusion 211 Bibliography 213 Index 217
£16.14
Manning Publications Akka in Action
Book SynopsisUse Akka to solve the big problems of distributed systems—from multithreading and concurrency, to handling scalability and failure. In Akka in Action, Second Edition you will learn how to: Create basic programs with Akka Work with clusters to build robust, fault tolerant programs Create and maintain distributed state with strong consistency guarantees Build microservices with Akka Utilize concurrency and parallelism Test Akka software Akka in Action, Second Edition teaches you to use the latest version of Akka to solve common problems of distributed systems. Akka contributor Francisco López-Sancho demonstrates Akka's complex concepts through real-world use cases, including clustering, sharding, persistence, and deploying to Kubernetes. Discover the power of the Actor model, and how to leverage most of the Akka modules to create microservices that are reliable and fault tolerant. about the technology Akka is a toolkit of libraries that make it easy to implement distributed applications in Scala and Java. Akka's Actor model avoids many of the complexities of multithreading, while making systems elastic and resilient, and provides strong consistency. about the book Akka in Action, Second Edition is a practical guide to building message-oriented systems with Akka. Extensively revised by Akka contributor and consultant Francisco López-Sancho, this upgraded second edition comes with new coverage of Akka typed, microservices architecture, and more. You'll learn how to build with Akka actors and why they're the perfect solution for distributed systems. Driven by practical examples, this book is the perfect guide to creating elastic, resilient, and reactive software with Akka.Trade Review'A belter of a book—buckle up and get ready for the ride of your life. Take an expert guided tour through modern distributed systems built the Akka way!' Grahame Oakland 'This is the definitive book on Actors and Actor System design. Level up your design skills by understanding what Actors can do!' Todd Cook 'A great way to get started with Actors and Akka and doesn't require prior experience. It goes even beyond that and covers advanced topics like clustering and sharding.' Nenko Ivanov 'The book is fantastic if you're looking to cover the theoretical and practical aspects of Akka.' Gilberto Taccari 'An incredible way to have an overview of Akka and to understand all the power it has.' Andres SaccoTable of Contentstable of contents READ IN LIVEBOOK 1INTRODUCING AKKA READ IN LIVEBOOK 2UP AND RUNNING READ IN LIVEBOOK 3TEST DRIVEN DEVELOPMENT WITH ACTORS READ IN LIVEBOOK 4FAULT TOLERANCE READ IN LIVEBOOK 5DISCOVERY AND ROUTING 6 CLUSTERING 7 MICROSERVICES EXCERPT 8 AKKA MICROSERVICES MODULES 9 MICROSERVICES MODULES 10 AKKA PORTS 11 AKKA STREAMS 12 CLUSTERING II 13 ALPAKKA 14 MICROSERVICES -FINAL EXAMPLE 15 CONFIGURATION AND DEPLOYMENT
£41.39
John Wiley & Sons Inc CEH v11 Certified Ethical Hacker Study Guide
Book SynopsisAs protecting informationcontinues to bea growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediatedExpand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positionsFully updated for the 2020 CEH v11 exam, including the latest developments in IT securityAccess the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.Table of ContentsIntroduction xix Assessment Test xxvi Chapter 1 Ethical Hacking 1 Overview of Ethics 2 Overview of Ethical Hacking 5 Methodologies 6 Cyber Kill Chain 6 Attack Lifecycle 8 Methodology of Ethical Hacking 10 Reconnaissance and Footprinting 10 Scanning and Enumeration 11 Gaining Access 11 Maintaining Access 12 Covering Tracks 12 Summary 13 Chapter 2 Networking Foundations 15 Communications Models 17 Open Systems Interconnection 18 TCP/IP Architecture 21 Topologies 22 Bus Network 22 Star Network 23 Ring Network 24 Mesh Network 25 Hybrid 26 Physical Networking 27 Addressing 27 Switching 28 IP 29 Headers 29 Addressing 31 Subnets 33 TCP 34 UDP 38 Internet Control Message Protocol 39 Network Architectures 40 Network Types 40 Isolation 41 Remote Access 43 Cloud Computing 44 Storage as a Service 45 Infrastructure as a Service 46 Platform as a Service 48 Software as a Service 49 Internet of Things 51 Summary 52 Review Questions 54 Chapter 3 Security Foundations 57 The Triad 59 Confidentiality 59 Integrity 61 Availability 62 Parkerian Hexad 63 Risk 64 Policies, Standards, and Procedures 66 Security Policies 66 Security Standards 67 Procedures 68 Guidelines 68 Organizing Your Protections 69 Security Technology 72 Firewalls 72 Intrusion Detection Systems 77 Intrusion Prevention Systems 80 Endpoint Detection and Response 81 Security Information and Event Management 83 Being Prepared 84 Defense in Depth 84 Defense in Breadth 86 Defensible Network Architecture 87 Logging 88 Auditing 90 Summary 92 Review Questions 93 Chapter 4 Footprinting and Reconnaissance 97 Open Source Intelligence 99 Companies 99 People 108 Social Networking 111 Domain Name System 124 Name Lookups 125 Zone Transfers 130 Passive DNS 133 Passive Reconnaissance 136 Website Intelligence 139 Technology Intelligence 144 Google Hacking 144 Internet of Things (IoT) 146 Summary 148 Review Questions 150 Chapter 5 Scanning Networks 155 Ping Sweeps 157 Using fping 157 Using MegaPing 159 Port Scanning 161 Nmap 162 masscan 176 MegaPing 178 Metasploit 180 Vulnerability Scanning 183 OpenVAS 184 Nessus 196 Looking for Vulnerabilities with Metasploit 202 Packet Crafting and Manipulation 203 hping 204 packETH 207 fragroute 209 Evasion Techniques 211 Protecting and Detecting 214 Summary 215 Review Questions 217 Chapter 6 Enumeration 221 Service Enumeration 223 Remote Procedure Calls 226 SunRPC 226 Remote Method Invocation 228 Server Message Block 232 Built-in Utilities 233 nmap Scripts 237 NetBIOS Enumerator 239 Metasploit 240 Other Utilities 242 Simple Network Management Protocol 245 Simple Mail Transfer Protocol 247 Web-Based Enumeration 250 Summary 257 Review Questions 259 Chapter 7 System Hacking 263 Searching for Exploits 265 System Compromise 269 Metasploit Modules 270 Exploit-DB 274 Gathering Passwords 276 Password Cracking 279 John the Ripper 280 Rainbow Tables 282 Kerberoasting 284 Client-Side Vulnerabilities 289 Living Off the Land 291 Fuzzing 292 Post Exploitation 295 Evasion 295 Privilege Escalation 296 Pivoting 301 Persistence 304 Covering Tracks 307 Summary 313 Review Questions 315 Chapter 8 Malware 319 Malware Types 321 Virus 321 Worm 323 Trojan 324 Botnet 324 Ransomware 326 Dropper 328 Malware Analysis 328 Static Analysis 329 Dynamic Analysis 340 Creating Malware 349 Writing Your Own 350 Using Metasploit 353 Obfuscating 356 Malware Infrastructure 357 Antivirus Solutions 359 Persistence 360 Summary 361 Review Questions 363 Chapter 9 Sniffing 367 Packet Capture 368 tcpdump 369 tshark 376 Wireshark 378 Berkeley Packet Filter 382 Port Mirroring/Spanning 384 Packet Analysis 385 Spoofing Attacks 390 ARP Spoofing 390 DNS Spoofing 394 sslstrip 397 Spoofing Detection 398 Summary 399 Review Questions 402 Chapter 10 Social Engineering 407 Social Engineering 408 Pretexting 410 Social Engineering Vectors 412 Physical Social Engineering 413 Badge Access 413 Man Traps 415 Biometrics 416 Phone Calls 417 Baiting 418 Phishing Attacks 418 Website Attacks 422 Cloning 423 Rogue Attacks 426 Wireless Social Engineering 427 Automating Social Engineering 430 Summary 433 Review Questions 435 Chapter 11 Wireless Security 439 Wi-Fi 440 Wi-Fi Network Types 442 Wi-Fi Authentication 445 Wi-Fi Encryption 446 Bring Your Own Device 450 Wi-Fi Attacks 451 Bluetooth 462 Scanning 463 Bluejacking 465 Bluesnarfing 466 Bluebugging 466 Mobile Devices 466 Mobile Device Attacks 467 Summary 472 Review Questions 474 Chapter 12 Attack and Defense 479 Web Application Attacks 480 XML External Entity Processing 482 Cross-Site Scripting 483 SQL Injection 485 Command Injection 487 File Traversal 489 Web Application Protections 490 Denial-of-Service Attacks 492 Bandwidth Attacks 492 Slow Attacks 495 Legacy 497 Application Exploitation 497 Buffer Overflow 498 Heap Spraying 500 Application Protections and Evasions 501 Lateral Movement 502 Defense in Depth/Defense in Breadth 504 Defensible Network Architecture 506 Summary 508 Review Questions 510 Chapter 13 Cryptography 515 Basic Encryption 517 Substitution Ciphers 517 Diffie-Hellman 520 Symmetric Key Cryptography 521 Data Encryption Standard 522 Advanced Encryption Standard 523 Asymmetric Key Cryptography 524 Hybrid Cryptosystem 525 Nonrepudiation 525 Elliptic Curve Cryptography 526 Certificate Authorities and Key Management 528 Certificate Authority 528 Trusted Third Party 531 Self-Signed Certificates 532 Cryptographic Hashing 534 PGP and S/MIME 536 Disk and File Encryption 538 Summary 541 Review Questions 543 Chapter 14 Security Architecture and Design 547 Data Classification 548 Security Models 550 State Machine 550 Biba 551 Bell-LaPadula 552 Clark-Wilson Integrity Model 552 Application Architecture 553 n-tier Application Design 554 Service-Oriented Architecture 557 Cloud-Based Applications 559 Database Considerations 561 Security Architecture 563 Summary 567 Review Questions 569 Chapter 15 Cloud Computing and the Internet of Things 573 Cloud Computing Overview 574 Cloud Services 578 Shared Responsibility Model 583 Public vs. Private Cloud 585 Cloud Architectures and Deployment 586 Responsive Design 588 Cloud-Native Design 589 Deployment 590 Dealing with REST 593 Common Cloud Threats 598 Access Management 598 Data Breach 600 Web Application Compromise 600 Credential Compromise 602 Insider Threat 604 Internet of Things 604 Operational Technology 610 Summary 612 Review Questions 614 Appendix Answers to Review Questions 617 Chapter 2: Networking Foundations 618 Chapter 3: Security Foundations 619 Chapter 4: Footprinting and Reconnaissance 622 Chapter 5: Scanning Networks 624 Chapter 6: Enumeration 627 Chapter 7: System Hacking 629 Chapter 8: Malware 632 Chapter 9: Sniffing 635 Chapter 10: Social Engineering 636 Chapter 11: Wireless Security 638 Chapter 12: Attack and Defense 641 Chapter 13: Cryptography 643 Chapter 14: Security Architecture and Design 645 Chapter 15: Cloud Computing and the Internet of Things 646 Index 649
£30.39
Cengage Learning, Inc CompTIA CySA Guide to Cybersecurity Analyst
Book SynopsisDevelop the advanced cybersecurity knowledge and skills for success on the latest CompTIA Cybersecurity Analyst certification exam (CySA+ CS0-002) with Ciampa's COMPTIA CYSA+ GUIDE TO CYBERSECURITY ANALYST (CS0-002), 2nd Edition. Updated, "stair-stepped" content builds on material you've previously mastered as you learn to analyze and interpret threat intelligence data, identify and address both external and internal vulnerabilities and respond effectively to cyber incidents. Each module opens with an actual, recent cybersecurity event that provides context for the information that follows. Quick review questions help test your understanding as you progress through content that completely maps to the latest CySA+ CS0-002 certification. MindTap digital resources offer additional tools to boost understanding and performance. Each module culminates with hands-on Live Virtual Machine Labs that allow you to troubleshoot, practice, explore and try different solutions in a safe, sandbox envirTable of ContentsPart 1: EXTERNAL THREATS & INTERNAL VULNERABILITIES 1. Enterprise threats and vulnerabilities 2. Utilizing threat data and intelligence sources 3. Vulnerability management 4. Cloud computing and assessment tools Part 2: CONTROLS 5. Infrastructure controls 6. Software and hardware assurance best practices Part 3: MONITORING 7. Data analysis (3.1) 8. Advanced monitoring Part 4: INCIDENT RESPONSE 9. Cyber Incident Planning and Procedures 10. Reacting to a Cyber Incident: Indicators and Forensics Part 5: COMPLIANCE AND ASSESSMENT 11. Organizational risk management 12. Data privacy and protection
£71.24
Pearson Education (US) Art of Network Architecture, The: Business-Driven
Book SynopsisThe Art of Network Architecture Business-Driven Design The business-centered, business-driven guide to architecting and evolving networks The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks. Two leading enterprise network architects help you craft solutions that are fully aligned with business strategy, smoothly accommodate change, and maximize future flexibility. Russ White and Denise Donohue guide network designers in asking and answering the crucial questions that lead to elegant, high-value solutions. Carefully blending business and technical concerns, they show how to optimize all network interactions involving flow, time, and people. The authors review important links between business requirements and network design, helping you capture the information you need to design effectively. They introduce today’s most useful models and frameworks, fully addressing modularity, resilience, security, and management. Next, they drill down into network structure and topology, covering virtualization, overlays, modern routing choices, and highly complex network environments. In the final section, the authors integrate all these ideas to consider four realistic design challenges: user mobility, cloud services, Software Defined Networking (SDN), and today’s radically new data center environments. • Understand how your choices of technologies and design paradigms will impact your business • Customize designs to improve workflows, support BYOD, and ensure business continuity • Use modularity, simplicity, and network management to prepare for rapid change • Build resilience by addressing human factors and redundancy • Design for security, hardening networks without making them brittle • Minimize network management pain, and maximize gain • Compare topologies and their tradeoffs • Consider the implications of network virtualization, and walk through an MPLS-based L3VPN example • Choose routing protocols in the context of business and IT requirements • Maximize mobility via ILNP, LISP, Mobile IP, host routing, MANET, and/or DDNS • Learn about the challenges of removing and changing services hosted in cloud environments • Understand the opportunities and risks presented by SDNs • Effectively design data center control planes and topologiesTable of ContentsIntroduction xx Part I Framing the Problem Chapter 1 Business and Technology 1 Business Drives Technology 2 The Business Environment 2 The Big Picture 3 The Competition 4 The Business Side of the Network 5 Technologies and Applications 5 Network Evaluation 6 The Network’s Customers 6 Internal Users 7 External Users 8 Guest Users 9 Technology Drives Business 9 Part II Business-Driven Design Chapter 2 Designing for Change 11 Organic Growth and Decline 12 Mergers, Acquisitions, and Divestments 14 Centralizing Versus Decentralizing 15 Chapter 3 Improving Business Operations 19 Workflow 19 Matching Data Flow and Network Design 20 Person-to-Person Communication 21 Person-to-Machine Communication 21 Machine-to-Machine Communication 22 Bringing It All Together 23 BYOD 24 BYOD Options 24 BYOD Design Considerations 27 BYOD Policy 28 Business Continuity 29 Business Continuity Versus Disaster Recovery 29 Business Continuity Planning 30 Business Continuity Design Considerations 31 Summary 33 Part III Tools of the Trade Chapter 4 Models 35 The Seven-Layer Model 36 Problems with the Seven-Layer Model 38 The Four-Layer Model 38 Iterative Layering Model 39 Connection-Oriented and Connectionless 41 A Hybrid Model 42 The Control Plane 43 What Am I Trying to Reach? 43 Where Is It? 44 How Do I Get There? 45 Other Network Metadata 46 Control Plane Relationships 46 Routing 46 Quality of Service 48 Network Measurement and Management 49 Interaction Between Control Planes 49 Reactive and Proactive 51 The Waterfall Model 53 Places in the Network 54 Summary 56 Chapter 5 Underlying Support 57 Questions You Should Ask 57 What Happens When the Link Fails? 57 What Types of Virtualization Can Be Run Over This Link? 58 How Does the Link Support Quality of Service? 59 Marking Packets 59 Queues and Rate Limiters 59 Speeds and Feeds Versus Quality of Service 60 Spanning Tree 61 TRILL 62 TRILL Operation 62 TRILL in the Design Landscape 64 TRILL and the Fabrics 65 Final Thoughts on the Physical Layer 65 Chapter 6 Principles of Modularity 67 Why Modularize? 68 Machine Level Information Overload 68 Machine Level Information Overload Defined 69 Reducing Machine Information Level Overload 71 Separating Complexity from Complexity 72 Human Level Information Overload 73 Clearly Assigned Functionality 74 Repeatable Configurations 75 Mean Time to Repair and Modularization 75 How Do You Modularize? 77 Topology and Reachability 77 Aggregating Topology Information at Router B 78 Aggregating Reachability Information at Router B 78 Filtering Routing Information at Router B 79 Splitting Failure Domains Horizontally and Vertically 79 Modularization and Optimization 81 Summary 82 Chapter 7 Applying Modularity 83 What Is Hierarchical Design? 83 A Hub-and-Spoke Design Pattern 84 An Architectural Methodology 85 Assign Each Module One Function 85 All Modules at a Given Level Should Share Common Functionality 86 Build Solid Redundancy at the Intermodule Level 87 Hide Information at Module Edges 88 Typical Hierarchical Design Patterns 89 Virtualization 90 What Is Virtualization? 90 Virtualization as Vertical Hierarchy 93 Why We Virtualize 93 Communities of Interest 94 Network Desegmentation 94 Separation of Failure Domains 94 Consequences of Network Virtualization 95 Final Thoughts on Applying Modularity 96 Chapter 8 Weathering Storms 97 Redundancy as Resilience 98 Network Availability Basics 98 Adding Redundancy 99 MTTR, Resilience, and Redundancy 100 Limits on Control Plane Convergence 100 Feedback Loops 102 The Interaction Between MTTR and Redundancy 103 Fast Convergence Techniques 104 Detecting the Topology Change 104 Propagating Information About the Change 105 Calculating the New Best Path 106 Switching to the New Best Path 107 The Impact of Fast Convergence 107 Fast Reroute 108 P/Q Space 109 Loop-Free Alternates 110 Remote Loop-Free Alternates 110 Not-Via Fast Reroute 111 Maximally Redundant Trees 113 Final Thoughts on Fast Reroute 115 The Human Side of Resilience 115 Chapter 9 Securing the Premises 117 The OODA Loop 118 Observe 119 Orient 122 Decide 124 Act 125 Brittleness 125 Building Defense In 126 Modularization 128 Modularity, Failure Domains, and Security 128 Modularity, Complexity, and Security 128 Modularity, Functionality, and Security 129 Resilience 129 Some Practical Considerations 129 Close a Door, Open a Door 129 Beware of Virtualization 131 Social Engineering 131 Summary 132 Chapter 10 Measure Twice 133 Why Manage? 133 Justifying the Cost of the Network 134 Planning 135 Decreasing the Mean Time to Repair 136 Increasing the Mean Time Between Mistakes 136 Management Models 137 Fault, Configuration, Accounting, Performance, and Security 137 Observe, Orient, Decide, and Act (OODA) 138 Deploying Management 140 Loosen the Connection Between Collection and Management 140 Sampling Considerations 141 Where and What 142 End-to-End/Network 142 Interface/Transport 143 Failure Domain/Control Plane 143 Bare Necessities 144 Summary 145 Part IV Choosing Materials Chapter 11 The Floor Plan 147 Rings 147 Scaling Characteristics 147 Resilience Characteristics 149 Convergence Characteristics 151 Generalizing Ring Convergence 154 Final Thoughts on Ring Topologies 155 Full Mesh 155 Clos Networks 157 Clos and the Control Plane 159 Clos and Capacity Planning 160 Partial Mesh 161 Disjoint Parallel Planes 162 Advantages of Disjoint Topologies 163 Added Complexity 164 The Bottom Line 164 Divergent Data Planes 165 Cubes 166 Toroid Topologies 167 Summary 169 Chapter 12 Building the Second Floor 171 What Is a Tunnel? 171 Is MPLS Tunneling? 173 Fundamental Virtualization Questions 175 Data Plane Interaction 176 Control Plane Considerations 177 Control Plane Interaction 177 Scaling 178 Multicast 179 Security in a Virtual Topology 180 MPLS-Based L3VPNs 182 Operational Overview 182 Fundamental Questions 185 The Maximum Transmission Unit 185 Quality of Service 186 Control Plane Interaction 186 Scaling 187 Multicast 188 Security in MPLS-Based L3VPNs 188 MPLS-Based L3VPN Summary 188 VXLAN 189 Operational Overview 189 Fundamental Questions 190 Control Plane Interaction 190 Scaling 190 VXLAN Summary 191 Summary 191 Chapter 13 Routing Choices 193 Which Routing Protocol? 194 How Fast Does the Routing Protocol Converge? 194 Is the Routing Protocol Proprietary? 196 How Easy Is the Routing Protocol to Configure and Troubleshoot? 197 Which Protocol Degrades in a Way That Works with the Business? 198 Which Protocol Works Best on the Topology the Business Usually Builds? 199 Which Protocol is Right? 200 IPv6 Considerations 202 What Is the Shape of the Deployment? 202 How Does Your Deployment Grow? 202 Topological Deployment 203 Virtual Topology Deployment 203 Where Are the Policy Edges? 203 Routing Protocol Interaction with IPv6 204 IS-IS Interaction with IPv6 204 OSPF Interaction with IPv6 205 EIGRP Interaction with IPv6 206 Deploying BGP 206 Why Deploy BGP? 207 Complexity of Purpose 207 Complexity of Place 208 Complexity of Policy 208 BGP Deployment Models 209 iBGP Edge-to-Edge (Overlay Model) 209 iBGP Core 210 eBGP Edge-to-Edge (Core and Aggregation Model) 211 Summary 212 Chapter 14 Considering Complexity 213 Control Plane State 213 Concepts of Control Plane State 214 Network Stretch 215 Configuration State 217 Control Plane Policy Dispersion 218 Data Plane State 220 Reaction Time 223 Managing Complexity Trade-offs 225 Part V Current and Future Trends Chapter 15 Network in Motion 227 The Business Case for Mobility 228 A Campus Bus Service 228 A Mobile Retail Analysis Team 229 Shifting Load 230 Pinning the Hard Problems into Place 230 Mobility Requires State 231 Mobility Requires Speed 231 State Must Be Topologically Located 232 State and the Network Layers 233 IP-Centric Mobility Solutions 234 Identifier-Locator Network Protocol (ILNP) 235 Locator Identifier Separation Protocol (LISP) 237 Mobile IP 238 Host Routing 239 Mobile Ad-Hoc Networks (MANET) 240 Dynamic DNS 242 Final Thoughts on Mobility Solutions 243 Remote Access Solutions 244 Separate Network Access from Application Access 244 Consider Cloud-Based Solutions 245 Keep Flexibility as a Goal 246 Consider Total Cost 248 Consider Making Remote Access the Norm 248 What Solution Should You Deliver? 249 Chapter 16 On Psychologists, Unicorns, and Clouds 251 A Cloudy History 252 This Time It’s Different 254 What Does It Cost? 255 What Are the Risks? 256 What Problems Can Cloud Solve Well? 257 What Services Is Cloud Good at Providing? 258 Storage 258 Content Distribution 259 Database Services 260 Application Services 260 Network Services 260 Deploying Cloud 261 How Hard Is Undoing the Deployment? 261 How Will the Service Connect to My Network? 261 How Does Security Work? 262 Systemic Interactions 262 Flying Through the Cloud 262 Components 263 Looking Back Over the Clouds 264 Chapter 17 Software-Defined Networks 265 Understanding SDNs 265 A Proposed Definition 265 A Proposed Framework 266 The Distributed Model 267 The Augmented Model 268 The Hybrid Model 269 The Replace Model 271 Offline Routing/Online Reaction 272 OpenFlow 274 Objections and Considerations 276 Conclusion 281 Software-Defined Network Use Cases 281 SDNs in a Data Center 281 What OpenFlow Brings to the Table 281 Challenges to the OpenFlow Solution 283 SDNs in a Wide-Area Core 283 Final Thoughts on SDNs 285 Chapter 18 Data Center Design 287 Data Center Spine and Leaf Fabrics 287 Understanding Spine and Leaf 288 The Border Leaf 291 Sizing a Spine and Leaf Fabric 291 Speed of the Fabric 291 Number of Edge Ports 292 Total Fabric Bandwidth 293 Why No Oversubscription? 294 The Control Plane Conundrum 295 Why Not Layer 2 Alone? 295 Where Should Layer 3 Go? 296 Software-Defined Networks as a Potential Solution 298 Network Virtualization in the Data Center 299 Thoughts on Storage 299 Modularity and the Data Center 300 Summary 301 9781587143755 TOC 3/12/2014
£48.59
O'Reilly Media Network Warrior
Book SynopsisThis book starts where certification exams leave off. Network Warrior provides a thorough and practical guide to the entire network infrastructure. You'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA.
£38.99
CompTIA Cloud Guide to Cloud Computing
Book SynopsisWest's COMPTIA CLOUD+ GUIDE TO CLOUD COMPUTING, 2nd Edition, prepares you for certification exam and career success. Fully updated content maps to objectives of the CompTIA Cloud+ (CVO-003) exam, which now has less emphasis on physical host configuration and more emphasis on cloud infrastructure, management and security. Each module in the second edition is packed with enriching features such as self-check questions, group activities and capstone projects that enable you to sharpen your new skills and knowledge through real design and deployment scenarios. You also can work with three popular cloud platforms: AWS (Amazon Web Services), Microsoft Azure and GCP (Google Cloud Platform). Live virtual machine labs, auto-graded quizzes, videos and hands-on projects in the MindTap digital learning platform provide additional preparation to maximize your success on the exam and well beyond.Table of Contents1. Introduction to Cloud Computing. 2. Virtual Hardware. 3. Migration to the Cloud. 4. Cloud Networking. 5. Cloud Connectivity and Troubleshooting. 6. Securing Cloud Resources. 7. Identity and Access Management. 8. Cloud Storage. 9. Managing Cloud Performance. 10. Cloud Automation.
£45.74
Pearson Education Detecting Troubleshooting and Preventing
Book Synopsis
£40.49
Manning Publications Rust Web Development
Book SynopsisCreate bulletproof, high-performance web apps and servers with Rust. In Rust Web Development you will learn: Handling the borrow checker in an asynchronous environment Creating web APIs and using JSON in Rust Graceful error handling Testing, tracing, logging, and debugging Deploying Rust applications Efficient database access Rust Web Development is a hands-on guide to building server-based web applications with Rust. If you've built web servers using Java, C#, or PHP, you'll instantly fall in love with the performance and development experience Rust delivers. This book shows you how to work efficiently using pure Rust, along with important Rust libraries such as tokio for async runtimes, warp for web servers and APIs, and reqwest to run external HTTP requests. about the technology Web development languages and libraries can be resource hungry, with poor safety for maintaining vital web services. Rust services perform better and guarantee better safety. Plus, Rust's awesome compiler gives you an amazing developer experience. You'll get the speed of low-level programming languages like C along with the ease-of-use you'd expect from high-level languages Python or Ruby, with a super strong compiler that automatically prevents common mistakes such as null pointers. about the book In Rust Web Development, you'll learn to build server-side web applications using the Rust language and its key libraries. If you know the basics of Rust, you'll quickly pick up some pro tips for setting up your projects and organizing your code. This book gets you hands-on fast, with numerous small and large examples. You'll get up to speed with how Rust streamlines backend development, implements authentication flows, and even makes it easier for your APIs to interact. As you go, you'll build a complete Q&A web service and iterate on your code chapter-by-chapter, just like a real development project. RETAIL SELLING POINTS • Handling the borrow checker in an asynchronous environment • Creating web APIs and using JSON in Rust • Graceful error handling • Testing, tracing, logging, and debugging • Deploying Rust applications • Efficient database access AUDIENCE For experienced web developers familiar with Java, Node, or Go, and the absolute basics of Rust Trade Review'Rust Web Development offers practical advice and strong technical expertise to equip developers with skills to build secure, performant, and type-safe applications.'Christopher Villanueva 'This is an excellent guide to getting started with Rust web development. The author explains new concepts in bite-sized chunks to help the reader become acquainted with how Rust applications are built.'Rodney Weis 'Do you need to write an API endpoint in Rust? This is a good book on that.'Timothy Robert James Langford 'If you want a more streamlined approach to web development using Rust then this is your book.'Jeff Smith 'Unlock not only the possibilities of using Rust in web development but also the inner workings of Rust that may have been hard to understand without the right context.'Dane BaliaTable of Contentstable of contents detailed TOC PART 1: INTRODUCTION TO RUST READ IN LIVEBOOK 1WHY RUST? READ IN LIVEBOOK 2LAYING THE FOUNDATION PART 2: GETTING STARTED READ IN LIVEBOOK 3CREATE YOUR FIRST ROUTE HANDLER READ IN LIVEBOOK 4IMPLEMENT A RESTFUL API READ IN LIVEBOOK 5CLEANUP YOUR CODEBASE READ IN LIVEBOOK 6LOGGING, TRACING AND DEBUGGING READ IN LIVEBOOK 7ADD A DATABASE TO YOUR APPLICATION READ IN LIVEBOOK 8INTEGRATE 3RD-PARTY APIS PART 3: BRING IT IN PRODUCTION READ IN LIVEBOOK 9ADD AUTHENTICATION AND AUTHORIZATION READ IN LIVEBOOK 10DEPLOY YOUR APPLICATION 11 TESTING YOUR RUST APPLICATION
£29.24
Pearson Education (US) Cisco Certified Support Technician CCST
Book SynopsisRuss White has more than 20 years of experience in designing, deploying, breaking, and troubleshooting large-scale networks. Across that time, he has coauthored 48 software patents, has spoken at venues throughout the world, has participated in the development of several Internet standards, has helped develop the CCDE and the CCAr, and has worked in Internet governance with the ISOC. Russ is currently a senior architect at Akamai Technologies, where he works on next-generation data center designs, complexity, security, and privacy. His most recent books are The Art of Network Architecture, Navigating Network Complexity, and Problems and Solutions in Network Engineering. MSIT Capella University, MACM Shepherds Theological Seminary, PhD Southeastern Baptist Theological Seminary, CCIE No. 2635, CCDE 2007:001, CCArTable of ContentsIntroduction xxvi Part I Foundations 3 Chapter 1 Shipping Things 6 “Do I Know This Already?” Quiz 6 Foundation Topics 8 The Purpose of Packaging 8 The Physical World 8 Computer Networks 9 Addressing 11 The Physical World 11 Computer Networks 12 Hosts and Devices 14 Packaging Data 15 What Is a Protocol? 16 What Is Metadata? 17 Tunnels 17 Review All the Key Topics 19 Key Terms You Should Know 20 Concepts and Actions 20 Chapter 2 Addresses 22 “Do I Know This Already?” Quiz 22 Foundation Topics 24 Address Scope 24 Receiver Set 24 Topological Reach 25 Physical Addresses 28 Internet Protocol Version 4 30 Why Two Addresses? 32 What an IP Address Represents 34 Calculating Prefixes and Subnets Using Subnet Masks 34 Calculating Prefixes and Subnets Using a Skip Chart 35 Calculating Prefixes Using Skips 36 Internet Protocol Version 6 37 Aggregation 39 Network Prefixes 41 Private Address Space 41 Publicly Routable Address Space 42 Reserved Addresses 43 Ports and Sockets 44 Network Address Translation 45 Review All the Key Topics 47 Key Terms You Should Know 48 Concepts and Actions 48 Chapter 3 Routing and Switching 52 “Do I Know This Already?” Quiz 52 Foundation Topics 54 Assigning IP Addresses to Hosts 54 Manual Configuration 54 Calculate an IP Address 54 Computing a Link Local Address 55 Computing a Global Address 56 Physical Addresses and Privacy 56 Assign an Address Through a Protocol 57 IPv4 DHCP 57 IPv6 DHCP and Router Advertisements 58 Host-to-Host Communication and Address Resolution on a Single Wire 59 IPv4 Address Resolution 60 IPv6 Address Resolution 60 Switching Packets 61 Multiple Hops and Switching 63 Routing Packets 66 Using the Routing Table to Forward Packets 68 Building the Routing Table 70 Metrics 73 What Happens Inside a Router? 74 Routers versus Switches 75 Routing Loops 76 Asymmetric Paths 76 Redirects and Relays 77 Review All the Key Topics 79 Key Terms You Should Know 79 Concepts and Actions 79 Chapter 4 Wired Host Networking Configuration 82 “Do I Know This Already?” Quiz 83 Foundation Topics 85 Windows 85 The Settings App 85 The Control Panel 86 The Command Line 88 macOS 91 System Preferences 91 The Terminal Command Line 93 System Information 94 Linux 95 Verifying Connectivity 97 Ping 97 Traceroute 99 Finding Your Public IP Address 101 Review All the Key Topics 103 Key Terms You Should Know 103 Concepts and Actions 103 Chapter 5 What's in a Network? 106 “Do I Know This Already?” Quiz 106 Foundation Topics 108 Hosts and Virtual Hosts 108 Mobile Devices 111 Things 113 Middleboxes 115 The Firewall 115 The Intrusion Detection System 116 The Proxy or Gateway 116 The Load Balancer 117 The Global Internet 118 Internet Assigned Numbers Authority 119 Internet Corporation for Assigned Names and Numbers 119 Regional Internet Registries 119 Top-Level Domain Owners 120 Transit Providers 120 Access Providers 120 Content Providers 120 Content Distribution Networks 121 Internet Exchange Providers 121 Review All the Key Topics 122 Key Terms You Should Know 123 Concepts and Actions 123 Chapter 6 Network Models 126 “Do I Know This Already?” Quiz 126 Foundation Topics 128 Why Are Models Important? 128 The OSI Seven-Layer Model 129 The TCP/IP Model 133 The Recursive Internet Architecture 134 Review All the Key Topics 136 Key Terms You Should Know 137 Concepts and Actions 137 Part II Infrastructure 139 Chapter 7 Wired Networks 140 “Do I Know This Already?” Quiz 141 Foundation Topics 142 Electrical Transmission and Interference 142 Measuring Interference 145 Other Cable Ratings 146 The Maximum Transmission Unit 146 Ethernet over Copper 147 Ethernet Bus Topologies 147 Ethernet Star Topologies 148 Ethernet Twisted Pair 150 Power Over Ethernet 152 Fiber 152 Fiber Cables 154 Fiber Networking Hardware 155 Fiber Connectors 156 Looking into a Fiber 157 Pluggable Interfaces 158 Review All the Key Topics 160 Key Terms You Should Know 161 Concepts and Actions 161 Chapter 8 Wireless Networks 162 “Do I Know This Already?” Quiz 162 Foundation Topics 164 Free Space Concepts 164 Wave Propagation and Beam Forming 164 Wireless Interference 167 Bandwidth and Signal Strength 168 The Electromagnetic Spectrum 169 Wi-Fi 170 Wi-Fi Components 171 Wi-Fi Mesh Systems 172 Advantages and Disadvantages of Wi-Fi 173 Sharing the Bandwidth 174 Channel Selection 174 Cellular 174 Radio Access Network (RAN) 175 Mobile Core 176 Advantages and Disadvantages of Cellular Networks 177 Satellite 177 Review All the Key Topics 179 Key Terms You Should Know 180 Concepts and Actions 180 Chapter 9 Bandwidth, Delay, and Jitter 182 “Do I Know This Already?” Quiz 182 Foundation Topics 184 Bandwidth and Throughput 184 Throughput versus Bandwidth 184 Bandwidth versus Goodput 185 The Bandwidth of a Link versus Bandwidth of a Path 186 Bandwidth and Delay 186 Clocking Packets onto the Wire 187 Queueing 188 Jitter 189 Measuring Network Performance 190 Speed Test Websites 190 iPerf 191 Mike's Traceroute (MTR) 193 Review All the Key Topics 194 Key Terms You Should Know 195 Concepts and Actions 195 Chapter 10 Basic Network Hardware 196 “Do I Know This Already?” Quiz 196 Foundation Topics 198 Hardware, Ports, and Lights 198 Network Diagrams 204 Network Wiring 207 Handling the Heat 209 Review All the Key Topics 211 Key Terms You Should Know 211 Concepts and Actions 212 Chapter 11 Local Area Networks 214 “Do I Know This Already?” Quiz 215 Foundation Topics 217 Building and Campus Networks 217 Equipment Closet (Building Distribution Frame) 218 Wiring Closet (Intermediate Distribution Frame) 218 Server Room 218 Riser 218 Wi-Fi Access Points 218 Zoned Access 218 The Home Network 219 Network Core 219 MODEM 220 Physical Connections to the Home 221 Cable Cutting 222 Combining the MODEM with Other Devices 223 Demarcation 223 The SSID and Wi-Fi Guest Network 224 Which Devices Should Be Wired? 225 Wi-Fi Limitations 225 Traffic Flows 226 Choosing Devices to Wire 226 Configuring the Home Network 227 Configuring the MODEM 227 Configuring the Router and Firewall 227 Main Configuration Screen 227 The More Settings Screen 229 Advanced Options 231 NAT Forwarding 232 Configuring the Wireless Access Point 234 SSID and Password 234 Security 235 Configuring a Windows Host for Wi-Fi Connectivity 236 Configuring Apple's macOS for Wi-Fi Connectivity 238 Configuring Mobile Devices for Wi-Fi Connectivity 240 Review All the Key Topics 241 Key Terms You Should Know 242 Concepts and Actions 242 Chapter 12 Wide Area Networks 244 “Do I Know This Already?” Quiz 244 Foundation Topics 246 Common Challenges to Building Wide Area Networks 246 Right-of-Way 246 Physical Plant 247 Metro and Last-Mile Network Design 249 Transit Provider Design 250 Ring and Hub-and-Spoke Topologies 251 Review All the Key Topics 253 Key Terms You Should Know 254 Concepts and Actions 254 Part III Services 257 Chapter 13 Data Centers and Fabrics 258 “Do I Know This Already?” Quiz 258 Foundation Topics 260 Web Applications 260 Internet Exchange Points 262 Spine-and-Leaf Fabrics 263 Clos Fabrics 264 Butterfly Fabrics 267 Review All the Key Topics 269 Key Terms You Should Know 269 Concepts and Actions 270 Chapter 14 Network Transport 272 “Do I Know This Already?” Quiz 273 Foundation Topics 275 Internet Protocol Version 4 275 Fragmentation 276 Time to Live 277 Internet Protocol Version 6 278 IPv6 Goals 279 Autoconfiguration 279 Eliminating NAT 280 IPv6 Packet Format 281 User Datagram Protocol 282 Connectionless versus Connection-Oriented Transport Protocols 282 The UDP Header 283 Checksums 283 Transmission Control Protocol 283 Building a TCP Connection 283 TCP Flow and Error Control 285 Quick UDP Internet Connections (QUIC) 288 Identifying Flows 289 Path MTU Discovery 289 Review All the Key Topics 291 Key Terms You Should Know 292 Concepts and Actions 292 Chapter 15 Application Transport 294 “Do I Know This Already?” Quiz 294 Foundation Topics 296 Marshaling Systems 296 Fixed-Length Fields 296 Type-Length Values 298 Secure Shell 300 Hypertext Transfer Protocol 303 File Transfer Protocol 305 Review All the Key Topics 307 Key Terms You Should Know 308 Concepts and Actions 308 Chapter 16 Names and Time 310 “Do I Know This Already?” Quiz 310 Foundation Topics 312 The Domain Name Space 312 Domain Names Can Represent an Organization 313 Domain Names Can Represent a Service 313 Domain Names Can Represent a Piece of Information 314 Domain Names and Addresses from a Computer Networking Perspective 314 The Life of a DNS Query 314 Negative DNS Responses 318 Common DNS Records 319 DNS Architecture and Operations 319 Recursive Servers 319 Root Servers 320 TLD Servers 322 Authoritative Servers 322 DNS Security and Privacy 323 Encrypted DNS Queries 323 Oblivious Encrypted DNS Queries 324 Encrypted DNS Records 325 Diagnosing DNS 326 Name Server Lookup 326 Domain Information Groper 329 Web-Based DNS Tools 330 The Network Time Protocol 332 Review All the Key Topics 334 Key Terms You Should Know 335 Concepts and Actions 335 Chapter 17 Cloud Computing 336 “Do I Know This Already?” Quiz 336 Foundation Topics 338 Cloud Computing 338 Who Owns the Resources 338 Cloud Computing Service Models 339 Typical Public Cloud Service Mix 340 Cloud Resilience 341 Connecting to the Cloud 342 Public versus Private Cloud 343 Insurance Estimation Application 344 Manufacturing IOT Deployment 346 Customer Analytics 348 Choosing Public or Private Cloud 348 The Impact of Cloud Computing on Network Engineering 349 Pets versus Cattle 349 Automation 349 Cloud-Based Network Management 350 Remote and Hybrid Work 350 Employment Shifts 350 Information Technology Cycles 350 Review All the Key Topics 351 Key Terms You Should Know 352 Concepts and Actions 352 Part IV Security 355 Chapter 18 Security and Privacy Concepts 358 “Do I Know This Already?” Quiz 358 Foundation Topics 360 A Security Taxonomy 360 Shift Left 362 Privacy Concepts 363 Personally Identifiable Information 363 Data Lifecycle 364 The Law and Privacy 365 Privacy Tools 366 Suppression 366 Noise Injection 367 Aggregation 368 Segmentation 368 Privacy and Network Operations 369 Forwarded Packets 369 Logged Information 369 Protecting Logged User Information 370 Authentication, Authorization, and Accounting 370 Identity Stores 372 Review All the Key Topics 373 Key Terms You Should Know 373 Concepts and Actions 374 Chapter 19 Attacks and Threats 376 “Do I Know This Already?” Quiz 377 Foundation Topics 378 Defining Attacks and Threats 378 Attack Surface 379 Vulnerability 379 Threat 380 Exploit 380 Risk 381 Gaining Access 381 Social Engineering 381 Malware 382 Supply Chain Attack 383 Poor Configuration 383 Man-in-the-Middle Attacks 383 Lateral Movement 384 Attack Actions 385 Command and Control 386 Data Exfiltration 386 Ransomware 386 Denial of Service 387 Direct (or Burner) Attack 387 Reflection Attack 388 Resource Exhaustion 389 Review All the Key Topics 391 Key Terms You Should Know 392 Concepts and Actions 392 Chapter 20 Security Tools 394 “Do I Know This Already?” Quiz 394 Foundation Topics 397 Authentication Tools 397 Single Sign-On 397 Zero Trust 399 Strong Passwords 400 Two-Factor Authentication (2FA) 403 Passwordless Systems 404 Defensive Tools and Design 405 Stateful and Contextual Packet Filtering 405 Source Address Validation 408 Defense in Depth 409 Countering Spam and Phishing 410 System-Level Defenses 410 How to Detect a Phish 412 Encryption 413 Exchanging Private Keys 415 Cryptographic Signatures 416 Virtual Private Networks 418 Review All the Key Topics 421 Key Terms You Should Know 422 Concepts and Actions 422 Part V Managing Networks 425 Chapter 21 Managing Networks 426 “Do I Know This Already?” Quiz 427 Foundation Topics 428 Network Documentation 428 Descriptions 429 Baselines 430 Failure Reports 430 Hardware and Software 431 Network Processes and Lifecycle 431 Managing Change 433 Testing Techniques 433 Technical Debt 436 Management Challenges 436 The Observability Problem 436 Failure Rates in the Real World 437 Connecting to Manage 438 In-Band and Out-of-Band Management 438 Connecting Through a Terminal Emulator 439 Device Management Security Practices 439 Management Systems 440 NMS Dashboard 442 Work Process System 442 Modeling Language versus Configuration 442 Cloud-Managed Networks 443 Review All the Key Topics 445 Key Terms You Should Know 446 Concepts and Actions 446 Chapter 22 Troubleshooting 448 “Do I Know This Already?” Quiz 449 Foundation Topics 450 Failure Terminology 450 What Is a Failure? 450 Failure Frequency 451 Fragility and Resilience 452 Troubleshooting Tools and Techniques 454 The Half-Split Method 454 Fixes 456 The Post-Mortem 457 Applying the Process: An Example 457 Packet Captures 460 Advice to Troubleshooters 464 Review All the Key Topics 465 Key Terms You Should Know 465 Concepts and Actions 465 Chapter 23 Configuring a Network 468 “Do I Know This Already?” Quiz 468 Foundation Topics 471 Initial Access 471 Configuring IPv4 475 Configuring Routing 479 Configuring Remote Access and Security 485 Adding IPv6 487 Adding a Switch 490 Review All the Key Topics 494 Key Terms You Should Know 494 Concepts and Actions 495 Part VI Final Preparation 499 Chapter 24 Final Preparation 500 Advice to Future Engineers 500 Learning Consolidation Activities 501 Suggested Plan for Final Review and Study 503 Part VII Exam Updates 505 Chapter 25 Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide Exam Updates 506 The Purpose of This Chapter 506 About Possible Exam Updates 507 Impact on You and Your Study Plan 507 News About the Next Exam Release 508 Updated Technical Content 508 Part VIII Appendices 509 Appendix A Answers to the “Do I Know This Already?” Questions 510 Glossary of Key Terms 519 Online Elements Appendix B Concepts and Actions Memory Tables Appendix C Solutions to Concepts and Actions Memory Tables Appendix D Study Planner Glossary of Key Terms 9780138213428 TOC---10/5/2023
£35.58
O'Reilly Media FastAPI
Book SynopsisWith this practical book, developers familiar with Python will learn how FastAPI lets you accomplish more in less time with less code. Author Bill Lubanovic covers the nuts and bolts of FastAPI development with how-to guides on various topics such as forms, database access, graphics, maps, and more that will take you beyond the basics.
£33.74
Wiley-VCH Verlag GmbH Kali Linux Hacking-Tools für Dummies
Book SynopsisSie möchten testen, wie sicher Ihr IT-System ist? Dann hilft Ihnen dieses Buch! Es zeigt Ihnen Schritt für Schritt, wie Sie Ihre Systeme mit Kali Linux auf Herz und Nieren prüfen. Sie lernen, wie Passwörter geknackt werden, wie Sie Schwachstellen von Websites finden, die Konfigurationen von Webservern überprüfen und vieles mehr. Außerdem führen die Autoren Sie in Wireless Attacks, Sniffing, Spoofing und IT-Forensik-Analysen ein. Endlose Theorie? Fehlanzeige! Unter Anleitung ausgewiesener IT-Security-Experten lernen Sie aus der Sicht von Hackern zu denken und Ihre IT-Infrastruktur entsprechend zu sichern.Table of ContentsEinleitung 23 Teil I: Kali Linux – System einrichten und kennenlernen 29 Kapitel 1: Die Grundlagen zu Kali Linux erfahren 31 Kapitel 2: Kali Linux installieren 37 Kapitel 3: Die ersten Schritte ausführen 51 Teil II: Information Gathering – verdeckte Informationen sammeln 59 Kapitel 4: Netzwerke analysieren 61 Kapitel 5: Domains und IP-Adressen auslesen 79 Kapitel 6: Server-Dienste untersuchen und testen 87 Kapitel 7: Öffentliche Informationen (OSINT) 99 Teil III: Password Attacks – Passwörter knacken 111 Kapitel 8: Angriffsmethoden gegen Passwörter nutzen 113 Kapitel 9: FTP-, SSH- und Web-Logins angreifen 133 Kapitel 10: Passwort-Hashes auslesen und berechnen 143 Teil IV: Web Application Analysis – Websites untersuchen 155 Kapitel 11: Webrisiken verstehen 157 Kapitel 12: Potenzielle Webziele finden und identifizieren 163 Kapitel 13: Web-Kommunikation analysieren 175 Kapitel 14: Auf bekannte Fehlkonfigurationen und Schwachstellen testen 191 Teil V: Wireless Attacks – WLANs angreifen / Sicherheit testen 239 Kapitel 15: WLAN-Equipment vorbereiten 241 Kapitel 16: Versteckte Netzwerke finden 247 Kapitel 17: WPA/2-Passwörter angreifen 253 Kapitel 18: Fake-Netzwerke erstellen 267 Teil VI: Sniffing und Spoofing – Netzwerke unterwandern 289 Kapitel 19: Netzwerke angreifen 291 Kapitel 20: Netzwerkverkehr aufzeichnen 295 Kapitel 21: Datenströme umleiten 301 Kapitel 22: Netzwerkverkehr manipulieren 311 Teil VII: Forensics – IT-Forensik-Analysen 319 Kapitel 23: Sicherungskopie erstellen 321 Kapitel 24: Gelöschte Dateien wiederherstellen 333 Kapitel 25: Versteckte Informationen in Dateien 345 Kapitel 26: Betriebssysteme und Anwendungen analysieren 361 Teil VIII: Der Top-Ten-Teil 375 Kapitel 27: Top-Ten-Tools im Überblick 377 Kapitel 28: Top-Ten-Alternativen zu Kali Linux 391 Abbildungsverzeichnis 395 Stichwortverzeichnis 405
£23.70
John Wiley & Sons Inc CEH v12 Certified Ethical Hacker Study Guide with
Book SynopsisTable of ContentsIntroduction xvii Assessment Test xxv Chapter 1 Ethical Hacking 1 Overview of Ethics 2 Overview of Ethical Hacking 5 Attack Modeling 6 Cyber Kill Chain 7 Attack Lifecycle 8 MITRE ATT&CK Framework 10 Methodology of Ethical Hacking 12 Reconnaissance and Footprinting 12 Scanning and Enumeration 12 Gaining Access 13 Maintaining Access 14 Covering Tracks 14 Summary 15 Chapter 2 Networking Foundations 17 Communications Models 19 Open Systems Interconnection 20 TCP/IP Architecture 23 Topologies 24 Bus Network 24 Star Network 25 Ring Network 26 Mesh Network 27 Hybrid 28 Physical Networking 29 Addressing 29 Switching 30 IP 31 Headers 32 Addressing 34 Subnets 35 TCP 37 UDP 40 Internet Control Message Protocol 41 Network Architectures 42 Network Types 43 Isolation 44 Remote Access 45 Cloud Computing 46 Storage as a Service 47 Infrastructure as a Service 48 Platform as a Service 49 Software as a Service 51 Internet of Things 53 Summary 54 Review Questions 56 Chapter 3 Security Foundations 59 The Triad 61 Confidentiality 61 Integrity 63 Availability 64 Parkerian Hexad 65 Information Assurance and Risk 66 Policies, Standards, and Procedures 69 Security Policies 69 Security Standards 70 Procedures 71 Guidelines 72 Organizing Your Protections 72 Security Technology 75 Firewalls 76 Intrusion Detection Systems 80 Intrusion Prevention Systems 83 Endpoint Detection and Response 84 Security Information and Event Management 86 Being Prepared 87 Defense in Depth 87 Defense in Breadth 89 Defensible Network Architecture 90 Logging 91 Auditing 93 Summary 95 Review Questions 96 Chapter 4 Footprinting and Reconnaissance 101 Open Source Intelligence 103 Companies 103 People 112 Social Networking 115 Domain Name System 129 Name Lookups 130 Zone Transfers 136 Passive DNS 138 Passive Reconnaissance 142 Website Intelligence 145 Technology Intelligence 150 Google Hacking 150 Internet of Things (IoT) 152 Summary 154 Review Questions 157 Chapter 5 Scanning Networks 161 Ping Sweeps 163 Using fping 163 Using MegaPing 165 Port Scanning 167 nmap 168 masscan 184 MegaPing 186 Metasploit 188 Vulnerability Scanning 190 OpenVAS 192 Nessus 203 Looking for Vulnerabilities with Metasploit 209 Packet Crafting and Manipulation 210 hping 211 packETH 214 fragroute 217 Evasion Techniques 218 Evasion with nmap 221 Protecting and Detecting 223 Summary 224 Review Questions 226 Chapter 6 Enumeration 231 Service Enumeration 233 Countermeasures 236 Remote Procedure Calls 236 SunRPC 237 Remote Method Invocation 239 Server Message Block 242 Built- in Utilities 243 nmap Scripts 247 NetBIOS Enumerator 249 Metasploit 250 Other Utilities 254 Countermeasures 257 Simple Network Management Protocol 258 Countermeasures 259 Simple Mail Transfer Protocol 260 Countermeasures 263 Web- Based Enumeration 264 Countermeasures 271 Summary 272 Review Questions 274 Chapter 7 System Hacking 279 Searching for Exploits 281 System Compromise 285 Metasploit Modules 286 Exploit- DB 290 Gathering Passwords 292 Password Cracking 295 John the Ripper 296 Rainbow Tables 298 Kerberoasting 300 Client- Side Vulnerabilities 305 Living Off the Land 307 Fuzzing 308 Post Exploitation 313 Evasion 313 Privilege Escalation 314 Pivoting 319 Persistence 322 Covering Tracks 326 Summary 332 Review Questions 334 Chapter 8 Malware 339 Malware Types 341 Virus 341 Worm 342 Trojan 344 Botnet 344 Ransomware 345 Dropper 347 Fileless Malware 348 Polymorphic Malware 348 Malware Analysis 349 Static Analysis 350 Dynamic Analysis 361 Automated Malware Analysis 370 Creating Malware 371 Writing Your Own 372 Using Metasploit 375 Obfuscating 381 Malware Infrastructure 382 Antivirus Solutions 384 Persistence 385 Summary 386 Review Questions 388 Chapter 9 Sniffing 393 Packet Capture 394 tcpdump 395 tshark 401 Wireshark 403 Berkeley Packet Filter 408 Port Mirroring/Spanning 410 Detecting Sniffers 410 Packet Analysis 412 Spoofing Attacks 417 ARP Spoofing 418 DNS Spoofing 422 DHCP Starvation Attack 424 sslstrip 425 Spoofing Detection 426 Summary 428 Review Questions 430 Chapter 10 Social Engineering 435 Social Engineering 436 Pretexting 438 Social Engineering Vectors 440 Identity Theft 441 Physical Social Engineering 442 Badge Access 442 Man Traps 444 Biometrics 445 Phone Calls 446 Baiting 447 Tailgating 448 Phishing Attacks 448 Contact Spamming 452 Quid Pro Quo 452 Social Engineering for Social Networking 453 Website Attacks 454 Cloning 454 Rogue Attacks 457 Wireless Social Engineering 458 Automating Social Engineering 461 Summary 464 Review Questions 466 Chapter 11 Wireless Security 471 Wi- Fi 472 Wi- Fi Network Types 474 Wi- Fi Authentication 477 Wi- Fi Encryption 478 Bring Your Own Device 483 Wi- Fi Attacks 484 Bluetooth 495 Scanning 496 Bluejacking 498 Bluesnarfing 498 Bluebugging 498 Bluedump 499 Bluesmack 499 Mobile Devices 499 Mobile Device Attacks 500 Summary 504 Review Questions 506 Chapter 12 Attack and Defense 511 Web Application Attacks 512 OWASP Top 10 Vulnerabilities 514 Web Application Protections 524 Denial- of- Service Attacks 526 Bandwidth Attacks 527 Slow Attacks 529 Legacy 531 Application Exploitation 531 Buffer Overflow 532 Heap Spraying 534 Application Protections and Evasions 535 Lateral Movement 536 Defense in Depth/Defense in Breadth 538 Defensible Network Architecture 540 Summary 542 Review Questions 544 Chapter 13 Cryptography 549 Basic Encryption 551 Substitution Ciphers 551 Diffie–Hellman 553 Symmetric Key Cryptography 555 Data Encryption Standard 555 Advanced Encryption Standard 556 Asymmetric Key Cryptography 558 Hybrid Cryptosystem 559 Nonrepudiation 559 Elliptic Curve Cryptography 560 Certificate Authorities and Key Management 562 Certificate Authority 562 Trusted Third Party 565 Self- Signed Certificates 566 Cryptographic Hashing 569 PGP and S/MIME 571 Disk and File Encryption 572 Summary 576 Review Questions 578 Chapter 14 Security Architecture and Design 581 Data Classification 582 Security Models 584 State Machine 584 Biba 585 Bell–LaPadula 586 Clark–Wilson Integrity Model 586 Application Architecture 587 n- tier Application Design 588 Service- Oriented Architecture 591 Cloud- Based Applications 593 Database Considerations 595 Security Architecture 598 Zero- Trust Model 602 Summary 604 Review Questions 606 Chapter 15 Cloud Computing and the Internet of Things 611 Cloud Computing Overview 612 Cloud Services 616 Shared Responsibility Model 621 Public vs. Private Cloud 623 Grid Computing 624 Cloud Architectures and Deployment 625 Responsive Design 629 Cloud- Native Design 629 Deployment 631 Dealing with REST 633 Common Cloud Threats 639 Access Management 639 Data Breach 641 Web Application Compromise 642 Credential Compromise 643 Insider Threat 645 Internet of Things 646 Fog Computing 651 Operational Technology 652 The Purdue Model 654 Summary 655 Review Questions 657 Appendix Answers to Review Questions 661 Chapter 2: Networking Foundations 662 Chapter 3: Security Foundations 663 Chapter 4: Footprinting and Reconnaissance 666 Chapter 5: Scanning Networks 669 Chapter 6: Enumeration 672 Chapter 7: System Hacking 675 Chapter 8: Malware 678 Chapter 9: Sniffing 681 Chapter 10: Social Engineering 683 Chapter 11: Wireless Security 686 Chapter 12: Attack and Defense 688 Chapter 13: Cryptography 691 Chapter 14: Security Architecture and Design 693 Chapter 15: Cloud Computing and the Internet of Things 695 Index 699
£40.38
Pearson Education (US) CCNP and CCIE Collaboration Core CLCOR 350801
Book SynopsisAnyone who has worked with Jason Ball or has sat in one of his classes knows that his enthusiasm for collaboration is matched only by his engaging zeal for teaching. Jason currently works for Cisco on the Learning & Certifications team, helping manage all the collaboration certification learning content. He has been operating as a collaboration engineer since 2009 and holds 19 different certifications, including a CCNP Collaboration certification and a Cisco Certified Systems Instructor (CCSI) certification. He has been teaching Cisco Voice, Video, and Collaboration certification courses for as many years as he has been involved with Cisco. Some of his accomplishments include serving as a subject matter expert (SME), developing certification content, performing installations of many Cisco UCS servers with collaboration VMs, and performing as a consultant and technical instructor for many years as well. He also co-wrote the CCNA CollaborationTable of Contents Introduction xxxiv Part I AV Fundamentals 3 Chapter 1 Introduction to Collaboration 4 “Do I Know This Already?” Quiz 4 Foundation Topics 6 Audio Communication 6 Video Communication 8 Unified Communication 10 Driving Change in the Industry 11 Exam Preparation Tasks 13 Review All Key Topics 13 Define Key Terms 14 Q&A 14 Chapter 2 Audio Basics 16 “Do I Know This Already?” Quiz 17 Foundation Topics 19 Basic Understanding of Sound 19 Analog vs. Digital Signals 23 ITU Audio Encoding Formats 27 Exam Preparation Tasks 30 Review All Key Topics 30 Define Key Terms 30 Q&A 30 Chapter 3 Video Basics 32 “Do I Know This Already?” Quiz 33 Foundation Topics 35 Basic Understanding of Light 35 Capturing and Cameras 39 Standard Video Codecs 45 Video Container Formats and Codecs 47 Exam Preparation Tasks 49 Review All Key Topics 50 Define Key Terms 50 Q&A 50 Chapter 4 Collaboration Endpoint Components and Environment 52 “Do I Know This Already?” Quiz 53 Foundation Topics 55 Physical Components 55 Sound Behavior 57 Light Behavior 70 Exam Preparation Tasks 81 Review All Key Topics 81 Define Key Terms 82 Q&A 82 Chapter 5 Communication Protocols 84 “Do I Know This Already?” Quiz 85 Foundation Topics 88 PSTN Communication 88 H.323 Communication 91 SIP Communication 95 NAT and Firewall Traversal Solutions 102 Exam Preparation Tasks 109 Review All Key Topics 109 Define Key Terms 110 Q&A 110 Chapter 6 Cisco Solution for Converged Collaboration 112 “Do I Know This Already?” Quiz 114 Foundation Topics 116 Introduction to Cisco Endpoints 116 Introduction to Cisco Call Control 119 Introduction to Cisco Applications 126 Designing a Cisco Collaboration Solution 130 Exam Preparation Tasks 146 Review All Key Topics 146 Define Key Terms 147 Command Reference to Check Your Memory 148 Q&A 148 Part II Endpoints 151 Chapter 7 Cisco Unified Communications Phones 152 “Do I Know This Already?” Quiz 152 Foundation Topics 154 7800 Series Phones 154 8800 Series Phones 157 Software Versions for Phones 160 Exam Preparation Tasks 161 Review All Key Topics 161 Define Key Terms 162 Q&A 162 Chapter 8 Cisco Telepresence Endpoints 164 “Do I Know This Already?” Quiz 165 Foundation Topics 167 CE Software 167 DX Series 171 SX Series 172 MX Series 176 Webex Series 179 Webex Desk Series Endpoints 189 Exam Preparation Tasks 192 Review All Key Topics 192 Define Key Terms 193 Q&A 193 Chapter 9 Endpoint Registration 194 “Do I Know This Already?” Quiz 195 Foundation Topics 197 SIP Registration to the Cisco Unified Communications Manager 197 SIP Registration to Expressway Core 218 H.323 Registration to the Expressway Core 225 Exam Preparation Tasks 229 Review All Key Topics 229 Define Key Terms 230 Command Reference to Check Your Memory 230 Q&A 232 Chapter 10 Call Settings on Cisco CE Software-Based Endpoints 234 “Do I Know This Already?” Quiz 235 Foundation Topics 237 Calling Options 237 Content Sharing Options 246 Other Features 248 Exam Preparation Tasks 259 Review All Key Topics 259 Define Key Terms 260 Q&A 260 Chapter 11 Maintaining Cisco Endpoints 262 “Do I Know This Already?” Quiz 262 Foundation Topics 264 Upgrading Endpoints 264 Backing Up and Restoring CE Software-Based Endpoints 270 Exam Preparation Tasks 276 Review All Key Topics 276 Define Key Terms 277 Q&A 277 Part III Network Requirements for Collaboration Deployments 279 Chapter 12 Cisco Core Network Components 280 “Do I Know This Already?” Quiz 281 Foundation Topics 283 LAN, WAN, and Wireless LAN 283 Gateways 295 Exam Preparation Tasks 302 Review All Key Topics 302 Define Key Terms 302 Q&A 303 Chapter 13 Layer 2 and Layer 3 QoS Parameters 304 “Do I Know This Already?” Quiz 306 Foundation Topics 309 QoS-Related Issues 309 Class Models for Provisioning QoS 311 QoS Requirements 315 Traffic Classifications 319 Configure and Verify LLQ 322 Exam Preparation Tasks 328 Review All Key Topics 328 Define Key Terms 328 Command Reference to Check Your Memory 329 Q&A 331 Chapter 14 DNS, NTP, and SNMP 332 “Do I Know This Already?” Quiz 333 Foundation Topics 334 DNS Settings 334 NTP Settings 339 SNMP Settings 340 Exam Preparation Tasks 342 Review All Key Topics 342 Define Key Terms 343 Q&A 343 Part IV Call Control Mechanisms 345 Chapter 15 Cisco Unified Communications Manager Setup 346 “Do I Know This Already?” Quiz 347 Foundation Topics 349 Services 349 Enterprise Parameters 353 Service Parameters 355 Other Settings 357 Codec Negotiations Using Regions 364 Exam Preparation Tasks 367 Review All Key Topics 367 Define Key Terms 368 Q&A 368 Chapter 16 LDAP Integration with Cisco Unified Communications Manager 370 “Do I Know This Already?” Quiz 371 Foundation Topics 373 Application Users and End Users 373 Cisco Unified Communications Directory Architecture 376 LDAP Synchronization 377 LDAP Authentication 389 Exam Preparation Tasks 393 Review All Key Topics 393 Define Key Terms 393 Q&A 393 Chapter 17 Registering SIP Endpoints to the Cisco Unified Communications Manager 394 “Do I Know This Already?” Quiz 395 Foundation Topics 397 Bulk Administration Tool (BAT) 407 Device Onboarding with Activation Codes 414 Exam Preparation Tasks 420 Review All Key Topics 420 Define Key Terms 421 Q&A 422 Chapter 18 Cisco Unified Communications Manager Call Admission Control (CAC) 424 “Do I Know This Already?” Quiz 425 Foundation Topics 427 Endpoint Addressing 427 Call Privileges 435 Call Coverage 446 Exam Preparation Tasks 454 Review All Key Topics 454 Define Key Terms 454 Q&A 454 Chapter 19 Configuring Globalized Call Routing in Cisco Unified Communications Manager 456 “Do I Know This Already?” Quiz 457 Foundation Topics 458 Call Routing and Path Selection 458 Digit Manipulation 471 Exam Preparation Tasks 473 Review All Key Topics 473 Define Key Terms 474 Q&A 474 Part V Edge Services 477 Chapter 20 Introduction to Cisco Edge Services 478 “Do I Know This Already?” Quiz 479 Foundation Topics 480 Cisco Expressway 480 Cisco Voice Gateway Elements 483 Cisco Unified Border Element 485 Exam Preparation Tasks 486 Review All Key Topics 486 Define Key Terms 487 Q&A 487 Chapter 21 Mobile and Remote Access (MRA) 488 “Do I Know This Already?” Quiz 489 Foundation Topics 492 Requirements for MRA 492 Cisco Unified Communications Manager Settings for MRA 498 TLS Verify Requirements 501 Initializing MRA on Expressway Servers 511 Collaboration Traversal Zones and Search Rules 515 Device Onboarding with Activation Codes over MRA 518 Exam Preparation Tasks 523 Review All Key Topics 523 Define Key Terms 524 Q&A 524 Part VI Webex Calling 527 Chapter 22 Components of the Webex Solution 528 “Do I Know This Already?” Quiz 529 Foundation Topics 531 Webex Meeting 531 Webex Messaging 533 Webex Calling 535 Exam Preparation Tasks 537 Review All Key Topics 538 Define Key Terms 538 Q&A 538 Chapter 23 Adding Users and Devices in the Webex Control Hub 540 “Do I Know This Already?” Quiz 541 Foundation Topics 543 Webex Control Hub Overview 543 Methods of Adding Users to Webex Control Hub 556 Directory Connector Configuration 566 Add Unified IP Phones to Webex Control Hub 570 Add Webex Endpoints to Webex Control Hub 575 Exam Preparation Tasks 578 Review All Key Topics 578 Define Key Terms 579 Q&A 579 Chapter 24 Webex Calling Options 580 “Do I Know This Already?” Quiz 581 Foundation Topics 583 PSTN Options for Webex Calling 583 Routers Supporting Local Gateway 588 Deployment Scenarios for the Local Gateway 593 Exam Preparation Tasks 599 Review All Key Topics 599 Define Key Terms 599 Q&A 599 Chapter 25 Webex Calling Features 600 “Do I Know This Already?” Quiz 600 Foundation Topics 602 Admin-Configurable Features 602 User-Configurable Features 620 Exam Preparation Tasks 629 Review All Key Topics 629 Define Key Terms 630 Q&A 630 Chapter 26 Webex Calling Using a Local Gateway 632 “Do I Know This Already?” Quiz 633 Foundation Topics 635 Webex Control Hub Settings 635 Router Configuration 644 Exam Preparation Tasks 651 Review All Key Topics 652 Define Key Terms 652 Command Reference to Check Your Memory 652 Q&A 657 Part VII Collaboration Applications 659 Chapter 27 Understanding Cisco Unity Connection 660 “Do I Know This Already?” Quiz 661 Foundation Topics 662 Cisco Unity Connection Integration 662 Cisco Unity Connection System Settings 666 Cisco Unity Connection Call Handlers 667 Cisco Unity Connection Call Routing 668 Cisco Unity Connection Distribution Lists 670 Cisco Unity Connection Authentication Rules 670 Cisco Unity Connection Dial Plan 671 Exam Preparation Tasks 671 Review All Key Topics 671 Define Key Terms 672 Q&A 672 Chapter 28 Cisco Unity Connection End-User and Voice Mailbox 674 “Do I Know This Already?” Quiz 675 Foundation Topics 677 Cisco Unity Connection End-User Templates 677 User Templates Basics 681 Default Class of Service 683 Password Settings and Roles 684 Transfer Rules and Greetings 685 Call Actions 686 Message Actions and Caller Input 687 TUI Experience 689 Cisco Unity Connection End Users 690 Cisco Unity Connection Voice Mailboxes 696 Exam Preparation Tasks 698 Review All Key Topics 698 Define Key Terms 699 Q&A 699 Chapter 29 Deploying the Webex Application 700 “Do I Know This Already?” Quiz 701 Foundation Topics 703 Webex App Overview 703 Register Webex App to Cisco Unified Communications Manager 708 Migrate Cisco Jabber Clients to Webex App 715 Exam Preparation Tasks 721 Review All Key Topics 721 Define Key Terms 721 Q&A 721 Part VIII Troubleshooting Collaboration Components 723 Chapter 30 Troubleshooting Endpoints 724 “Do I Know This Already?” Quiz 725 Foundation Topics 727 Accessing Logs on Cisco Unified IP Phones 727 Accessing Logs on CE Software-Based Endpoints 729 Call Signaling and Quality 734 Troubleshooting Cisco Jabber 749 Exam Preparation Tasks 753 Review All Key Topics 753 Define Key Terms 754 Q&A 754 Chapter 31 Cisco Unified Communications Manager Reports 756 “Do I Know This Already?” Quiz 756 Foundation Topics 758 Dialed Number Analyzer 758 CAR Tool 760 CDR and CMR Logs on CUCM 763 Exam Preparation Tasks 770 Review All Key Topics 771 Define Key Terms 771 Q&A 771 Chapter 32 Real-Time Monitoring Tool (RTMT) 772 “Do I Know This Already?” Quiz 772 Foundation Topics 774 Cisco Unified RTMT Overview 774 Monitor Systems with RTMT 778 Monitor the CUCM with RTMT 783 Exam Preparation Tasks 787 Review All Key Topics 787 Define Key Terms 788 Q&A 788 Chapter 33 Understanding the Disaster Recovery System 790 “Do I Know This Already?” Quiz 790 Foundation Topics 792 Disaster Recovery System Overview 792 Backup Cisco Unified Communications Solutions 794 Restore Cisco Unified Communications Solutions 797 Exam Preparation Tasks 799 Review All Key Topics 799 Define Key Terms 799 Q&A 799 Chapter 34 Monitoring Voicemail in Cisco Unity Connection 800 “Do I Know This Already?” Quiz 800 Foundation Topics 802 Generate Reports on Cisco Unity Connection 802 Generate Reports in Cisco Unified Serviceability 808 Use Reports for Troubleshooting and Maintenance 810 Exam Preparation Tasks 814 Review All Key Topics 814 Define Key Terms 815 Q&A 815 Part IX Final Preparation 817 Chapter 35 Final Preparation 818 Hands-on Activities 818 Suggested Plan for Final Review and Study 818 Summary 819 Part X Exam Updates 821 Chapter 36 CCNP and CCIE Collaboration Core (CLCOR) 350-801 Exam Updates 822 The Purpose of This Chapter 822 News about the Next Exam Release 824 Updated Technical Content 824 Part XI Appendices 827 Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A Sections 828 Glossary 859 Online Elements Part XII Online Appendices Appendix B Memory Tables Appendix C Memory Tables Answer Key Appendix D Study Planner 9780138200947, TOC, 9/26/23
£43.69
Sybex CCNA Certification Study Guide Volume 1 Volume 2
Book Synopsis
£48.75
Pearson Education Segment Routing for Service Provider and
Book SynopsisFlorian Deragisch, CCIE #47970, is a Technical Leader, working with large service provider and carrier-grade enterprise customers. He joined Cisco in 2012 as part of a graduate program, where he discovered his passion for service provider designs and technologies. After gaining extensive exposure to MPLS-based networks and services, he embraced the evolution toward segment routing with his first SR-MPLS deployment in 2018. More recently, he has focused on the migration and deployment of L2VPN/L3VPN SRv6 services to build simple and highly scalable network architectures. He holds a master's degree in electrical engineering and information technology from the Swiss Federal Institute of Technology in Zurich and a Cisco Internetwork Expert certification (CCIE #47970). When not busy with work, he enjoys traveling to explore new places, cultures, and food. Leonir Hoxha, CCIE #49534, has been with Cisco Systems since 2013, taking on va
£44.79
John Wiley & Sons Inc CompTIA A Complete Deluxe Study Guide with Online
Book SynopsisThe ultimate resource for successful certification and IT skillset enhancement The newly revised and updated Fifth Edition of the CompTIA A+ Complete Deluxe Study Guide with Online Labs: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is the ultimate test preparation tool for anyone hoping to succeed on the highly sought-after A+ certification exams. This comprehensive set of study aids covers every exam objective and competency tested by the Core 1 and Core 2 exams. You'll find coverage of mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software trouble shooting, and operational procedures. The book also includes: Practical examples and real-world insights drawn from the experiences of actual computer technicians6 months of access to 28 online A+ Core 2 Exam 220-1102 Practice Lab modulesAccess to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a searchable glossary of key terms Perfect for anyone preparing for the popular A+ certification exams, CompTIA A+ Complete Deluxe Study Guide with Online Labs: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is also an invaluable resource for anyone seeking to improve their computer technician skillset and better their performance on the job.Table of ContentsIntroduction xxvii Assessment Test lxxxii Part I 220-1101 1 Chapter 1 Motherboards, Processors, and Memory 3 Understanding Motherboards 7 Understanding Processors 42 Understanding Memory 49 Understanding Cooling Systems 63 Summary 71 Exam Essentials 71 Review Questions 73 Performance-Based Question 1 77 Performance-Based Question 2 78 Chapter 2 Expansion Cards, Storage Devices, and Power Supplies 79 Installing and Configuring Expansion Cards 81 Understanding Storage Devices 89 Understanding Power Supplies 118 Summary 131 Exam Essentials 131 Review Questions 133 Performance-Based Question 137 Chapter 3 Peripherals, Cables, and Connectors 139 Understanding Cables and Connectors 140 Understanding Cables and Connectors 160 Summary 184 Exam Essentials 185 Review Questions 186 Performance-Based Question 190 Chapter 4 Printers and Multifunction Devices 191 Understanding Print Technologies and Imaging Processes 193 Summary 262 Exam Essentials 262 Review Questions 264 Performance-Based Question 268 Chapter 5 Networking Fundamentals 269 Understanding Networking Principles 271 Identifying Common Network Hardware 295 Summary 324 Exam Essentials 324 Review Questions 327 Performance-Based Question 331 Chapter 6 Introduction to TCP/IP 333 Understanding TCP/IP 335 Understanding Virtual Networks 368 Virtual Local Area Networks 368 Virtual Private Networks 370 Summary 372 Exam Essentials 372 Review Questions 374 Performance-Based Question 378 Chapter 7 Wireless and SOHO Networks 379 Understanding Wireless Networking Technologies 381 Installing and Configuring SOHO Networks 402 Summary 449 Exam Essentials 449 Review Questions 451 Performance-Based Question 455 Chapter 8 Network Services, Virtualization, and Cloud Computing 457 Understanding Network Services 459 Understanding Virtualization and Cloud Computing 487 Summary 515 Exam Essentials 516 Review Questions 518 Performance-Based Question 522 Chapter 9 Laptop and Mobile Device Hardware 523 Working with Laptop and Mobile Device Hardware 526 Summary 584 Exam Essentials 585 Review Questions 586 Performance-Based Question 590 Chapter 10 Mobile Connectivity and Application Support 591 Understanding Mobile Connectivity 593 Summary 668 Exam Essentials 668 Review Questions 670 Performance-Based Question 674 Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems 675 Using the Troubleshooting Best Practice Methodology 678 Troubleshooting Motherboards, CPUs, RAM, and Power Problems 690 Summary 708 Exam Essentials 709 Review Questions 711 Performance-Based Question 715 Chapter 12 Hardware and Network Troubleshooting 717 Troubleshooting Storage Drives and RAID Arrays 721 Troubleshooting Video, Projector, and Display Issues 731 Troubleshooting Common Mobile Device Issues 737 Troubleshooting Printer Problems 751 Troubleshooting Networking Problems 779 Summary 806 Exam Essentials 806 Review Questions 809 Performance-Based Question 813 Part II 220-1102 815 Chapter 13 Operating System Basics 817 Understanding Operating Systems 819 Understanding Applications 830 Introduction to Windows 10 836 Preparing for the Exam 871 Summary 872 Exam Essentials 872 Review Questions 874 Performance-Based Question 878 Chapter 14 Windows Configuration 879 Interacting with Operating Systems 882 The Windows Registry 960 Disk Management 962 Summary 970 Exam Essentials 970 Review Questions 972 Performance-Based Question 976 Chapter 15 Windows Administration 977 Installing and Upgrading Windows 980 Command-Line Tools 1013 Networking in Windows 1030 Summary 1050 Exam Essentials 1050 Review Questions 1052 Performance-Based Question 1056 Chapter 16 Working with macOS and Linux 1057 macOS and Linux 1060 Applications on macOS 1061 Managing Applications 1064 Creating Shortcuts 1065 Tools 1071 System Preferences 1073 Features 1082 Basic Linux Commands 1087 Linux and Windows 1106 Summary 1108 Exam Essentials 1109 Review Questions 1110 Performance-Based Question 1114 Chapter 17 Security Concepts 1115 Physical Security Concepts 1121 Physical Security for Staff 1128 Key Fobs 1129 Smartcards and RFID Badges 1129 Logical Security 1132 Malware 1143 Mitigating Software Threats 1151 Social Engineering Attacks, Threats, and Vulnerabilities 1159 Common Security Threats 1163 Exploits and Vulnerabilities 1170 Security Best Practices 1172 Data Encryption 1172 Setting Strong Passwords 1173 Requiring Passwords 1174 Password Expiration 1175 End-User Best Practices 1176 Account Management 1177 Disable AutoRun 1181 Destruction and Disposal Methods 1183 Recycling or Repurposing Best Practices 1183 Physical Destruction 1185 Summary 1187 Exam Essentials 1187 Review Questions 1190 Performance-Based Question 1194 Chapter 18 Securing Operating Systems 1195 Working with Windows OS Security Settings 1199 Users and Groups 1199 Web Browser Security 1228 Securing a SOHO Network (Wireless) 1239 Securing a SOHO Network (Wired) 1247 Mobile Device Security 1253 Summary 1263 Exam Essentials 1264 Review Questions 1265 Performance-Based Question 1269 Chapter 19 Troubleshooting Operating Systems and Security 1271 Troubleshooting Common Microsoft Windows OS Problems 1275 Troubleshooting Security Issues 1309 Symptoms 1315 Best Practices for Malware Removal 1318 Troubleshooting Mobile OS Issues 1325 Troubleshooting Mobile Security Issues 1335 Summary 1341 Exam Essentials 1342 Review Questions 1343 Performance-Based Question 1346 Chapter 20 Scripting and Remote Access 1347 Scripting 1349 Remote Access 1375 Summary 1387 Exam Essentials 1388 Review Questions 1389 Performance-Based Question 1392 Chapter 21 Safety and Environmental Concerns 1393 Understanding Safety Procedures 1395 Understanding Environmental Controls 1417 Understanding Policies, Licensing, and Privacy 1433 Summary 1446 Exam Essentials 1446 Review Questions 1448 Performance-Based Question 1452 Chapter 22 Documentation and Professionalism 1453 Documentation and Support 1457 Change Management Best Practices 1476 Disaster Prevention and Recovery 1482 Demonstrating Professionalism 1494 Summary 1508 Exam Essentials 1508 Review Questions 1510 Performance-Based Question 1514 Appendix A Answers to the Review Questions 1515 Chapter 1: Motherboards, Processors, and Memory 1516 Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1518 Chapter 3: Peripherals, Cables, and Connectors 1520 Chapter 4: Printers and Multifunction Devices 1521 Chapter 5: Networking Fundamentals 1523 Chapter 6: Introduction to TCP/IP 1525 Chapter 7: Wireless and SOHO Networks 1527 Chapter 8: Network Services, Virtualization, and Cloud Computing 1529 Chapter 9: Laptop and Mobile Device Hardware 1531 Chapter 10: Mobile Connectivity and Application Support 1533 Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1535 Chapter 12: Hardware and Network Troubleshooting 1537 Chapter 13: Operating System Basics 1539 Chapter 14: Windows Configuration 1540 Chapter 15: Windows Administration 1543 Chapter 16: Working with macOS and Linux 1545 Chapter 17: Security Concepts 1547 Chapter 18: Securing Operating Systems 1549 Chapter 19: Troubleshooting Operating Systems and Security 1551 Chapter 20: Scripting and Remote Access 1554 Chapter 21: Safety and Environmental Concerns 1556 Chapter 22: Documentation and Professionalism 1558 Appendix B Answers to Performance-Based Questions 1561 Chapter 1: Motherboards, Processors, and Memory 1562 Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1563 Chapter 3: Peripherals, Cables, and Connectors 1563 Chapter 4: Printers and Multifunction Devices 1564 Chapter 5: Networking Fundamentals 1565 Chapter 6: Introduction to TCP/IP 1566 Chapter 7: Wireless and SOHO Networks 1566 Chapter 8: Network Services, Virtualization, and Cloud Computing 1567 Chapter 9: Laptop and Mobile Device Hardware 1568 Chapter 10: Mobile Connectivity and Application Support 1568 Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1569 Chapter 12: Hardware and Network Troubleshooting 1569 Chapter 13: Operating System Basics 1570 Chapter 14: Windows Configuration 1570 Chapter 15: Windows Administration 1571 Chapter 16: Working with macOS and Linux 1575 Chapter 17: Security Concepts 1577 Chapter 18: Securing Operating Systems 1577 Chapter 19: Troubleshooting Operating Systems and Security 1578 Chapter 20: Scripting and Remote Access 1578 Chapter 21: Safety and Environmental Concerns 1579 Chapter 22: Documentation and Professionalism 1579 Index 1581 Table of Exercises Exercise 2.1 Removing an Internal Storage Device 115 Exercise 2.2 Installing an Internal Storage Device 116 Exercise 2.3 Removing a Power Supply 130 Exercise 3.1 Changing the Refresh Rate in Windows 10 143 Exercise 3.2 Changing the Settings for Multiple Monitors 148 Exercise 4.1 Identifying the Parts of an Inkjet Printer 203 Exercise 4.2 Installing a USB Printer in Windows 10 239 Exercise 4.3 Installing a TCP/IP Printer in Windows 10 242 Exercise 4.4 Determining if Bonjour Is Installed in Windows 244 Exercise 4.5 Scanning a Document to Google Drive 250 Exercise 4.6 Using an Inkjet Cleaning Solution 255 Exercise 4.7 Installing Memory into a Laser Printer 258 Exercise 5.1 Pricing Network Cables 313 Exercise 7.1 The Cost of Networking 422 Exercise 7.2 Installing an Internal NIC in Windows 10 422 Exercise 8.1 Configuring Windows 10 to Use a Proxy Server 477 Exercise 8.2 Using Google’s Cloud Services 497 Exercise 8.3 Enabling Hyper-V in Windows 10 503 Exercise 8.4 Installing VirtualBox and Lubuntu on Windows 10 508 Exercise 9.1 Removing Speakers from a Laptop 536 Exercise 9.2 Removing the Display Assembly 544 Exercise 9.3 Removing the Display Panel 546 Exercise 9.4 Removing the Motherboard from a Laptop 549 Exercise 9.5 Replacing Laptop Memory 553 Exercise 9.6 Removing an M.2 SSD from a Laptop 557 Exercise 9.7 Removing a Laptop Keyboard 560 Exercise 9.8 Disabling a Touchpad in Windows 10 563 Exercise 9.9 Removing an Internal Laptop Battery 568 Exercise 9.10 Removing the System Fan 572 Exercise 9.11 Removing the CPU Heat Sink 573 Exercise 9.12 Removing the Wireless NIC 574 Exercise 9.13 Removing the CMOS Battery 575 Exercise 9.14 Flashing the System BIOS 576 Exercise 10.1 Connecting an iPhone to a Wi-Fi Network 609 Exercise 10.2 Connecting an Android Phone to a Wi-Fi Network 611 Exercise 10.3 Disabling Cellular Use for Data Networking on an iPhone 614 Exercise 10.4 Disabling Cellular Use for Data Networking in Android OS 616 xxvi Table of Exercises Exercise 10.5 Setting Up a VPN in Android 619 Exercise 10.6 Pairing an Android Device with a Windows Laptop 623 Exercise 10.7 Pairing an iPhone with a Vehicle’s Sound System 632 Exercise 10.8 Configuring Location Services in iOS 638 Exercise 10.9 Email Account Configuration on an iPhone 645 Exercise 10.10 Email Account Configuration in Android 648 Exercise 10.11 Enabling ActiveSync in iOS 658 Exercise 11.1 Troubleshooting Practice 707 Exercise 12.1 Using a S.M.A.R.T Software Utility in Windows 729 Exercise 12.2 Stopping and Restarting the Print Spooler in Windows 10 775 Exercise 12.3 Renewing an IP Address in Windows 10 787 Exercise 12.4 Renewing an IP Address from the Command Line 789 Exercise 12.5 Using the net share Command in Windows 795 Exercise 13.1 Changing a Screen Saver in Windows 854 Exercise 13.2 Auto-Hiding the Taskbar 856 Exercise 13.3 Starting a Program from the Run Window 859 Exercise 14.1 Working with Task Manager 887 Exercise 14.2 Working with Performance Monitor 896 Exercise 14.3 Changing the Time Zone 908 Exercise 14.4 Showing Hidden Files and Folders 913 Exercise 15.1 Command-Line Directory Management 1015 Exercise 15.2 Running chkdsk within Windows 1025 Exercise 15.3 Running chkdsk at the Command Line 1026 Exercise 16.1 Installing Applications on macOS 1063 Exercise 16.2 Uninstalling Applications on macOS 1065 Exercise 16.3 Working with Files 1103 Exercise 17.1 Testing Your Antimalware 1153 Exercise 17.2 Testing Social Engineering 1160 Exercise 18.1 Examining a Security Token 1207 Exercise 18.2 Examining File Permissions 1214 Exercise 18.3 Working with File Hashes 1230 Exercise 18.4 Setting the Passcode Lock on an iPhone 1255 Exercise 18.5 Setting the Passcode Lock on an Android Phone 1255 Exercise 19.1 Reviewing Reliability Monitor 1288 Exercise 19.2 Manually Creating a Restore Point in Windows 1304 Exercise 20.1 Creating and Running a Windows Batch Script 1356 Exercise 20.2 Creating Your First PowerShell Script 1360 Exercise 21.1 Finding Trip Hazards 1413 Exercise 21.2 Finding MSDSs 1425 Exercise 22.1 Understanding Punctuality 1501 Exercise 22.2 Surprise Someone 1505
£86.25