Computer networking and communications Books

704 products


  • FastAPI

    O'Reilly Media FastAPI

    15 in stock

    Book SynopsisWith this practical book, developers familiar with Python will learn how FastAPI lets you accomplish more in less time with less code. Author Bill Lubanovic covers the nuts and bolts of FastAPI development with how-to guides on various topics such as forms, database access, graphics, maps, and more that will take you beyond the basics.

    15 in stock

    £33.74

  • Kali Linux Hacking-Tools für Dummies

    Wiley-VCH Verlag GmbH Kali Linux Hacking-Tools für Dummies

    7 in stock

    Book SynopsisSie möchten testen, wie sicher Ihr IT-System ist? Dann hilft Ihnen dieses Buch! Es zeigt Ihnen Schritt für Schritt, wie Sie Ihre Systeme mit Kali Linux auf Herz und Nieren prüfen. Sie lernen, wie Passwörter geknackt werden, wie Sie Schwachstellen von Websites finden, die Konfigurationen von Webservern überprüfen und vieles mehr. Außerdem führen die Autoren Sie in Wireless Attacks, Sniffing, Spoofing und IT-Forensik-Analysen ein. Endlose Theorie? Fehlanzeige! Unter Anleitung ausgewiesener IT-Security-Experten lernen Sie aus der Sicht von Hackern zu denken und Ihre IT-Infrastruktur entsprechend zu sichern.Table of ContentsEinleitung 23 Teil I: Kali Linux – System einrichten und kennenlernen 29 Kapitel 1: Die Grundlagen zu Kali Linux erfahren 31 Kapitel 2: Kali Linux installieren 37 Kapitel 3: Die ersten Schritte ausführen 51 Teil II: Information Gathering – verdeckte Informationen sammeln 59 Kapitel 4: Netzwerke analysieren 61 Kapitel 5: Domains und IP-Adressen auslesen 79 Kapitel 6: Server-Dienste untersuchen und testen 87 Kapitel 7: Öffentliche Informationen (OSINT) 99 Teil III: Password Attacks – Passwörter knacken 111 Kapitel 8: Angriffsmethoden gegen Passwörter nutzen 113 Kapitel 9: FTP-, SSH- und Web-Logins angreifen 133 Kapitel 10: Passwort-Hashes auslesen und berechnen 143 Teil IV: Web Application Analysis – Websites untersuchen 155 Kapitel 11: Webrisiken verstehen 157 Kapitel 12: Potenzielle Webziele finden und identifizieren 163 Kapitel 13: Web-Kommunikation analysieren 175 Kapitel 14: Auf bekannte Fehlkonfigurationen und Schwachstellen testen 191 Teil V: Wireless Attacks – WLANs angreifen / Sicherheit testen 239 Kapitel 15: WLAN-Equipment vorbereiten 241 Kapitel 16: Versteckte Netzwerke finden 247 Kapitel 17: WPA/2-Passwörter angreifen 253 Kapitel 18: Fake-Netzwerke erstellen 267 Teil VI: Sniffing und Spoofing – Netzwerke unterwandern 289 Kapitel 19: Netzwerke angreifen 291 Kapitel 20: Netzwerkverkehr aufzeichnen 295 Kapitel 21: Datenströme umleiten 301 Kapitel 22: Netzwerkverkehr manipulieren 311 Teil VII: Forensics – IT-Forensik-Analysen 319 Kapitel 23: Sicherungskopie erstellen 321 Kapitel 24: Gelöschte Dateien wiederherstellen 333 Kapitel 25: Versteckte Informationen in Dateien 345 Kapitel 26: Betriebssysteme und Anwendungen analysieren 361 Teil VIII: Der Top-Ten-Teil 375 Kapitel 27: Top-Ten-Tools im Überblick 377 Kapitel 28: Top-Ten-Alternativen zu Kali Linux 391 Abbildungsverzeichnis 395 Stichwortverzeichnis 405

    7 in stock

    £23.70

  • CEH v12 Certified Ethical Hacker Study Guide with

    John Wiley & Sons Inc CEH v12 Certified Ethical Hacker Study Guide with

    15 in stock

    Book SynopsisTable of ContentsIntroduction xvii Assessment Test xxv Chapter 1 Ethical Hacking 1 Overview of Ethics 2 Overview of Ethical Hacking 5 Attack Modeling 6 Cyber Kill Chain 7 Attack Lifecycle 8 MITRE ATT&CK Framework 10 Methodology of Ethical Hacking 12 Reconnaissance and Footprinting 12 Scanning and Enumeration 12 Gaining Access 13 Maintaining Access 14 Covering Tracks 14 Summary 15 Chapter 2 Networking Foundations 17 Communications Models 19 Open Systems Interconnection 20 TCP/IP Architecture 23 Topologies 24 Bus Network 24 Star Network 25 Ring Network 26 Mesh Network 27 Hybrid 28 Physical Networking 29 Addressing 29 Switching 30 IP 31 Headers 32 Addressing 34 Subnets 35 TCP 37 UDP 40 Internet Control Message Protocol 41 Network Architectures 42 Network Types 43 Isolation 44 Remote Access 45 Cloud Computing 46 Storage as a Service 47 Infrastructure as a Service 48 Platform as a Service 49 Software as a Service 51 Internet of Things 53 Summary 54 Review Questions 56 Chapter 3 Security Foundations 59 The Triad 61 Confidentiality 61 Integrity 63 Availability 64 Parkerian Hexad 65 Information Assurance and Risk 66 Policies, Standards, and Procedures 69 Security Policies 69 Security Standards 70 Procedures 71 Guidelines 72 Organizing Your Protections 72 Security Technology 75 Firewalls 76 Intrusion Detection Systems 80 Intrusion Prevention Systems 83 Endpoint Detection and Response 84 Security Information and Event Management 86 Being Prepared 87 Defense in Depth 87 Defense in Breadth 89 Defensible Network Architecture 90 Logging 91 Auditing 93 Summary 95 Review Questions 96 Chapter 4 Footprinting and Reconnaissance 101 Open Source Intelligence 103 Companies 103 People 112 Social Networking 115 Domain Name System 129 Name Lookups 130 Zone Transfers 136 Passive DNS 138 Passive Reconnaissance 142 Website Intelligence 145 Technology Intelligence 150 Google Hacking 150 Internet of Things (IoT) 152 Summary 154 Review Questions 157 Chapter 5 Scanning Networks 161 Ping Sweeps 163 Using fping 163 Using MegaPing 165 Port Scanning 167 nmap 168 masscan 184 MegaPing 186 Metasploit 188 Vulnerability Scanning 190 OpenVAS 192 Nessus 203 Looking for Vulnerabilities with Metasploit 209 Packet Crafting and Manipulation 210 hping 211 packETH 214 fragroute 217 Evasion Techniques 218 Evasion with nmap 221 Protecting and Detecting 223 Summary 224 Review Questions 226 Chapter 6 Enumeration 231 Service Enumeration 233 Countermeasures 236 Remote Procedure Calls 236 SunRPC 237 Remote Method Invocation 239 Server Message Block 242 Built- in Utilities 243 nmap Scripts 247 NetBIOS Enumerator 249 Metasploit 250 Other Utilities 254 Countermeasures 257 Simple Network Management Protocol 258 Countermeasures 259 Simple Mail Transfer Protocol 260 Countermeasures 263 Web- Based Enumeration 264 Countermeasures 271 Summary 272 Review Questions 274 Chapter 7 System Hacking 279 Searching for Exploits 281 System Compromise 285 Metasploit Modules 286 Exploit- DB 290 Gathering Passwords 292 Password Cracking 295 John the Ripper 296 Rainbow Tables 298 Kerberoasting 300 Client- Side Vulnerabilities 305 Living Off the Land 307 Fuzzing 308 Post Exploitation 313 Evasion 313 Privilege Escalation 314 Pivoting 319 Persistence 322 Covering Tracks 326 Summary 332 Review Questions 334 Chapter 8 Malware 339 Malware Types 341 Virus 341 Worm 342 Trojan 344 Botnet 344 Ransomware 345 Dropper 347 Fileless Malware 348 Polymorphic Malware 348 Malware Analysis 349 Static Analysis 350 Dynamic Analysis 361 Automated Malware Analysis 370 Creating Malware 371 Writing Your Own 372 Using Metasploit 375 Obfuscating 381 Malware Infrastructure 382 Antivirus Solutions 384 Persistence 385 Summary 386 Review Questions 388 Chapter 9 Sniffing 393 Packet Capture 394 tcpdump 395 tshark 401 Wireshark 403 Berkeley Packet Filter 408 Port Mirroring/Spanning 410 Detecting Sniffers 410 Packet Analysis 412 Spoofing Attacks 417 ARP Spoofing 418 DNS Spoofing 422 DHCP Starvation Attack 424 sslstrip 425 Spoofing Detection 426 Summary 428 Review Questions 430 Chapter 10 Social Engineering 435 Social Engineering 436 Pretexting 438 Social Engineering Vectors 440 Identity Theft 441 Physical Social Engineering 442 Badge Access 442 Man Traps 444 Biometrics 445 Phone Calls 446 Baiting 447 Tailgating 448 Phishing Attacks 448 Contact Spamming 452 Quid Pro Quo 452 Social Engineering for Social Networking 453 Website Attacks 454 Cloning 454 Rogue Attacks 457 Wireless Social Engineering 458 Automating Social Engineering 461 Summary 464 Review Questions 466 Chapter 11 Wireless Security 471 Wi- Fi 472 Wi- Fi Network Types 474 Wi- Fi Authentication 477 Wi- Fi Encryption 478 Bring Your Own Device 483 Wi- Fi Attacks 484 Bluetooth 495 Scanning 496 Bluejacking 498 Bluesnarfing 498 Bluebugging 498 Bluedump 499 Bluesmack 499 Mobile Devices 499 Mobile Device Attacks 500 Summary 504 Review Questions 506 Chapter 12 Attack and Defense 511 Web Application Attacks 512 OWASP Top 10 Vulnerabilities 514 Web Application Protections 524 Denial- of- Service Attacks 526 Bandwidth Attacks 527 Slow Attacks 529 Legacy 531 Application Exploitation 531 Buffer Overflow 532 Heap Spraying 534 Application Protections and Evasions 535 Lateral Movement 536 Defense in Depth/Defense in Breadth 538 Defensible Network Architecture 540 Summary 542 Review Questions 544 Chapter 13 Cryptography 549 Basic Encryption 551 Substitution Ciphers 551 Diffie–Hellman 553 Symmetric Key Cryptography 555 Data Encryption Standard 555 Advanced Encryption Standard 556 Asymmetric Key Cryptography 558 Hybrid Cryptosystem 559 Nonrepudiation 559 Elliptic Curve Cryptography 560 Certificate Authorities and Key Management 562 Certificate Authority 562 Trusted Third Party 565 Self- Signed Certificates 566 Cryptographic Hashing 569 PGP and S/MIME 571 Disk and File Encryption 572 Summary 576 Review Questions 578 Chapter 14 Security Architecture and Design 581 Data Classification 582 Security Models 584 State Machine 584 Biba 585 Bell–LaPadula 586 Clark–Wilson Integrity Model 586 Application Architecture 587 n- tier Application Design 588 Service- Oriented Architecture 591 Cloud- Based Applications 593 Database Considerations 595 Security Architecture 598 Zero- Trust Model 602 Summary 604 Review Questions 606 Chapter 15 Cloud Computing and the Internet of Things 611 Cloud Computing Overview 612 Cloud Services 616 Shared Responsibility Model 621 Public vs. Private Cloud 623 Grid Computing 624 Cloud Architectures and Deployment 625 Responsive Design 629 Cloud- Native Design 629 Deployment 631 Dealing with REST 633 Common Cloud Threats 639 Access Management 639 Data Breach 641 Web Application Compromise 642 Credential Compromise 643 Insider Threat 645 Internet of Things 646 Fog Computing 651 Operational Technology 652 The Purdue Model 654 Summary 655 Review Questions 657 Appendix Answers to Review Questions 661 Chapter 2: Networking Foundations 662 Chapter 3: Security Foundations 663 Chapter 4: Footprinting and Reconnaissance 666 Chapter 5: Scanning Networks 669 Chapter 6: Enumeration 672 Chapter 7: System Hacking 675 Chapter 8: Malware 678 Chapter 9: Sniffing 681 Chapter 10: Social Engineering 683 Chapter 11: Wireless Security 686 Chapter 12: Attack and Defense 688 Chapter 13: Cryptography 691 Chapter 14: Security Architecture and Design 693 Chapter 15: Cloud Computing and the Internet of Things 695 Index 699

    15 in stock

    £40.38

  • CCNP and CCIE Collaboration Core CLCOR 350801

    Pearson Education (US) CCNP and CCIE Collaboration Core CLCOR 350801

    1 in stock

    Book SynopsisAnyone who has worked with Jason Ball or has sat in one of his classes knows that his enthusiasm for collaboration is matched only by his engaging zeal for teaching. Jason currently works for Cisco on the Learning & Certifications team, helping manage all the collaboration certification learning content. He has been operating as a collaboration engineer since 2009 and holds 19 different certifications, including a CCNP Collaboration certification and a Cisco Certified Systems Instructor (CCSI) certification. He has been teaching Cisco Voice, Video, and Collaboration certification courses for as many years as he has been involved with Cisco.   Some of his accomplishments include serving as a subject matter expert (SME), developing certification content, performing installations of many Cisco UCS servers with collaboration VMs, and performing as a consultant and technical instructor for many years as well. He also co-wrote the CCNA CollaborationTable of Contents Introduction xxxiv Part I AV Fundamentals 3 Chapter 1 Introduction to Collaboration 4 “Do I Know This Already?” Quiz 4 Foundation Topics 6 Audio Communication 6 Video Communication 8 Unified Communication 10 Driving Change in the Industry 11 Exam Preparation Tasks 13 Review All Key Topics 13 Define Key Terms 14 Q&A 14 Chapter 2 Audio Basics 16 “Do I Know This Already?” Quiz 17 Foundation Topics 19 Basic Understanding of Sound 19 Analog vs. Digital Signals 23 ITU Audio Encoding Formats 27 Exam Preparation Tasks 30 Review All Key Topics 30 Define Key Terms 30 Q&A 30 Chapter 3 Video Basics 32 “Do I Know This Already?” Quiz 33 Foundation Topics 35 Basic Understanding of Light 35 Capturing and Cameras 39 Standard Video Codecs 45 Video Container Formats and Codecs 47 Exam Preparation Tasks 49 Review All Key Topics 50 Define Key Terms 50 Q&A 50 Chapter 4 Collaboration Endpoint Components and Environment 52 “Do I Know This Already?” Quiz 53 Foundation Topics 55 Physical Components 55 Sound Behavior 57 Light Behavior 70 Exam Preparation Tasks 81 Review All Key Topics 81 Define Key Terms 82 Q&A 82 Chapter 5 Communication Protocols 84 “Do I Know This Already?” Quiz 85 Foundation Topics 88 PSTN Communication 88 H.323 Communication 91 SIP Communication 95 NAT and Firewall Traversal Solutions 102 Exam Preparation Tasks 109 Review All Key Topics 109 Define Key Terms 110 Q&A 110 Chapter 6 Cisco Solution for Converged Collaboration 112 “Do I Know This Already?” Quiz 114 Foundation Topics 116 Introduction to Cisco Endpoints 116 Introduction to Cisco Call Control 119 Introduction to Cisco Applications 126 Designing a Cisco Collaboration Solution 130 Exam Preparation Tasks 146 Review All Key Topics 146 Define Key Terms 147 Command Reference to Check Your Memory 148 Q&A 148 Part II Endpoints 151 Chapter 7 Cisco Unified Communications Phones 152 “Do I Know This Already?” Quiz 152 Foundation Topics 154 7800 Series Phones 154 8800 Series Phones 157 Software Versions for Phones 160 Exam Preparation Tasks 161 Review All Key Topics 161 Define Key Terms 162 Q&A 162 Chapter 8 Cisco Telepresence Endpoints 164 “Do I Know This Already?” Quiz 165 Foundation Topics 167 CE Software 167 DX Series 171 SX Series 172 MX Series 176 Webex Series 179 Webex Desk Series Endpoints 189 Exam Preparation Tasks 192 Review All Key Topics 192 Define Key Terms 193 Q&A 193 Chapter 9 Endpoint Registration 194 “Do I Know This Already?” Quiz 195 Foundation Topics 197 SIP Registration to the Cisco Unified Communications Manager 197 SIP Registration to Expressway Core 218 H.323 Registration to the Expressway Core 225 Exam Preparation Tasks 229 Review All Key Topics 229 Define Key Terms 230 Command Reference to Check Your Memory 230 Q&A 232 Chapter 10 Call Settings on Cisco CE Software-Based Endpoints 234 “Do I Know This Already?” Quiz 235 Foundation Topics 237 Calling Options 237 Content Sharing Options 246 Other Features 248 Exam Preparation Tasks 259 Review All Key Topics 259 Define Key Terms 260 Q&A 260 Chapter 11 Maintaining Cisco Endpoints 262 “Do I Know This Already?” Quiz 262 Foundation Topics 264 Upgrading Endpoints 264 Backing Up and Restoring CE Software-Based Endpoints 270 Exam Preparation Tasks 276 Review All Key Topics 276 Define Key Terms 277 Q&A 277 Part III Network Requirements for Collaboration Deployments 279 Chapter 12 Cisco Core Network Components 280 “Do I Know This Already?” Quiz 281 Foundation Topics 283 LAN, WAN, and Wireless LAN 283 Gateways 295 Exam Preparation Tasks 302 Review All Key Topics 302 Define Key Terms 302 Q&A 303 Chapter 13 Layer 2 and Layer 3 QoS Parameters 304 “Do I Know This Already?” Quiz 306 Foundation Topics 309 QoS-Related Issues 309 Class Models for Provisioning QoS 311 QoS Requirements 315 Traffic Classifications 319 Configure and Verify LLQ 322 Exam Preparation Tasks 328 Review All Key Topics 328 Define Key Terms 328 Command Reference to Check Your Memory 329 Q&A 331 Chapter 14 DNS, NTP, and SNMP 332 “Do I Know This Already?” Quiz 333 Foundation Topics 334 DNS Settings 334 NTP Settings 339 SNMP Settings 340 Exam Preparation Tasks 342 Review All Key Topics 342 Define Key Terms 343 Q&A 343 Part IV Call Control Mechanisms 345 Chapter 15 Cisco Unified Communications Manager Setup 346 “Do I Know This Already?” Quiz 347 Foundation Topics 349 Services 349 Enterprise Parameters 353 Service Parameters 355 Other Settings 357 Codec Negotiations Using Regions 364 Exam Preparation Tasks 367 Review All Key Topics 367 Define Key Terms 368 Q&A 368 Chapter 16 LDAP Integration with Cisco Unified Communications Manager 370 “Do I Know This Already?” Quiz 371 Foundation Topics 373 Application Users and End Users 373 Cisco Unified Communications Directory Architecture 376 LDAP Synchronization 377 LDAP Authentication 389 Exam Preparation Tasks 393 Review All Key Topics 393 Define Key Terms 393 Q&A 393 Chapter 17 Registering SIP Endpoints to the Cisco Unified Communications Manager 394 “Do I Know This Already?” Quiz 395 Foundation Topics 397 Bulk Administration Tool (BAT) 407 Device Onboarding with Activation Codes 414 Exam Preparation Tasks 420 Review All Key Topics 420 Define Key Terms 421 Q&A 422 Chapter 18 Cisco Unified Communications Manager Call Admission Control (CAC) 424 “Do I Know This Already?” Quiz 425 Foundation Topics 427 Endpoint Addressing 427 Call Privileges 435 Call Coverage 446 Exam Preparation Tasks 454 Review All Key Topics 454 Define Key Terms 454 Q&A 454 Chapter 19 Configuring Globalized Call Routing in Cisco Unified Communications Manager 456 “Do I Know This Already?” Quiz 457 Foundation Topics 458 Call Routing and Path Selection 458 Digit Manipulation 471 Exam Preparation Tasks 473 Review All Key Topics 473 Define Key Terms 474 Q&A 474 Part V Edge Services 477 Chapter 20 Introduction to Cisco Edge Services 478 “Do I Know This Already?” Quiz 479 Foundation Topics 480 Cisco Expressway 480 Cisco Voice Gateway Elements 483 Cisco Unified Border Element 485 Exam Preparation Tasks 486 Review All Key Topics 486 Define Key Terms 487 Q&A 487 Chapter 21 Mobile and Remote Access (MRA) 488 “Do I Know This Already?” Quiz 489 Foundation Topics 492 Requirements for MRA 492 Cisco Unified Communications Manager Settings for MRA 498 TLS Verify Requirements 501 Initializing MRA on Expressway Servers 511 Collaboration Traversal Zones and Search Rules 515 Device Onboarding with Activation Codes over MRA 518 Exam Preparation Tasks 523 Review All Key Topics 523 Define Key Terms 524 Q&A 524 Part VI Webex Calling 527 Chapter 22 Components of the Webex Solution 528 “Do I Know This Already?” Quiz 529 Foundation Topics 531 Webex Meeting 531 Webex Messaging 533 Webex Calling 535 Exam Preparation Tasks 537 Review All Key Topics 538 Define Key Terms 538 Q&A 538 Chapter 23 Adding Users and Devices in the Webex Control Hub 540 “Do I Know This Already?” Quiz 541 Foundation Topics 543 Webex Control Hub Overview 543 Methods of Adding Users to Webex Control Hub 556 Directory Connector Configuration 566 Add Unified IP Phones to Webex Control Hub 570 Add Webex Endpoints to Webex Control Hub 575 Exam Preparation Tasks 578 Review All Key Topics 578 Define Key Terms 579 Q&A 579 Chapter 24 Webex Calling Options 580 “Do I Know This Already?” Quiz 581 Foundation Topics 583 PSTN Options for Webex Calling 583 Routers Supporting Local Gateway 588 Deployment Scenarios for the Local Gateway 593 Exam Preparation Tasks 599 Review All Key Topics 599 Define Key Terms 599 Q&A 599 Chapter 25 Webex Calling Features 600 “Do I Know This Already?” Quiz 600 Foundation Topics 602 Admin-Configurable Features 602 User-Configurable Features 620 Exam Preparation Tasks 629 Review All Key Topics 629 Define Key Terms 630 Q&A 630 Chapter 26 Webex Calling Using a Local Gateway 632 “Do I Know This Already?” Quiz 633 Foundation Topics 635 Webex Control Hub Settings 635 Router Configuration 644 Exam Preparation Tasks 651 Review All Key Topics 652 Define Key Terms 652 Command Reference to Check Your Memory 652 Q&A 657 Part VII Collaboration Applications 659 Chapter 27 Understanding Cisco Unity Connection 660 “Do I Know This Already?” Quiz 661 Foundation Topics 662 Cisco Unity Connection Integration 662 Cisco Unity Connection System Settings 666 Cisco Unity Connection Call Handlers 667 Cisco Unity Connection Call Routing 668 Cisco Unity Connection Distribution Lists 670 Cisco Unity Connection Authentication Rules 670 Cisco Unity Connection Dial Plan 671 Exam Preparation Tasks 671 Review All Key Topics 671 Define Key Terms 672 Q&A 672 Chapter 28 Cisco Unity Connection End-User and Voice Mailbox 674 “Do I Know This Already?” Quiz 675 Foundation Topics 677 Cisco Unity Connection End-User Templates 677 User Templates Basics 681 Default Class of Service 683 Password Settings and Roles 684 Transfer Rules and Greetings 685 Call Actions 686 Message Actions and Caller Input 687 TUI Experience 689 Cisco Unity Connection End Users 690 Cisco Unity Connection Voice Mailboxes 696 Exam Preparation Tasks 698 Review All Key Topics 698 Define Key Terms 699 Q&A 699 Chapter 29 Deploying the Webex Application 700 “Do I Know This Already?” Quiz 701 Foundation Topics 703 Webex App Overview 703 Register Webex App to Cisco Unified Communications Manager 708 Migrate Cisco Jabber Clients to Webex App 715 Exam Preparation Tasks 721 Review All Key Topics 721 Define Key Terms 721 Q&A 721 Part VIII Troubleshooting Collaboration Components 723 Chapter 30 Troubleshooting Endpoints 724 “Do I Know This Already?” Quiz 725 Foundation Topics 727 Accessing Logs on Cisco Unified IP Phones 727 Accessing Logs on CE Software-Based Endpoints 729 Call Signaling and Quality 734 Troubleshooting Cisco Jabber 749 Exam Preparation Tasks 753 Review All Key Topics 753 Define Key Terms 754 Q&A 754 Chapter 31 Cisco Unified Communications Manager Reports 756 “Do I Know This Already?” Quiz 756 Foundation Topics 758 Dialed Number Analyzer 758 CAR Tool 760 CDR and CMR Logs on CUCM 763 Exam Preparation Tasks 770 Review All Key Topics 771 Define Key Terms 771 Q&A 771 Chapter 32 Real-Time Monitoring Tool (RTMT) 772 “Do I Know This Already?” Quiz 772 Foundation Topics 774 Cisco Unified RTMT Overview 774 Monitor Systems with RTMT 778 Monitor the CUCM with RTMT 783 Exam Preparation Tasks 787 Review All Key Topics 787 Define Key Terms 788 Q&A 788 Chapter 33 Understanding the Disaster Recovery System 790 “Do I Know This Already?” Quiz 790 Foundation Topics 792 Disaster Recovery System Overview 792 Backup Cisco Unified Communications Solutions 794 Restore Cisco Unified Communications Solutions 797 Exam Preparation Tasks 799 Review All Key Topics 799 Define Key Terms 799 Q&A 799 Chapter 34 Monitoring Voicemail in Cisco Unity Connection 800 “Do I Know This Already?” Quiz 800 Foundation Topics 802 Generate Reports on Cisco Unity Connection 802 Generate Reports in Cisco Unified Serviceability 808 Use Reports for Troubleshooting and Maintenance 810 Exam Preparation Tasks 814 Review All Key Topics 814 Define Key Terms 815 Q&A 815 Part IX Final Preparation 817 Chapter 35 Final Preparation 818 Hands-on Activities 818 Suggested Plan for Final Review and Study 818 Summary 819 Part X Exam Updates 821 Chapter 36 CCNP and CCIE Collaboration Core (CLCOR) 350-801 Exam Updates 822 The Purpose of This Chapter 822 News about the Next Exam Release 824 Updated Technical Content 824 Part XI Appendices 827 Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A Sections 828 Glossary 859 Online Elements Part XII Online Appendices Appendix B Memory Tables Appendix C Memory Tables Answer Key Appendix D Study Planner 9780138200947, TOC, 9/26/23

    1 in stock

    £43.69

  • CCNA Certification Study Guide Volume 1 Volume 2

    2 in stock

    £48.75

  • Segment Routing for Service Provider and

    Pearson Education Segment Routing for Service Provider and

    1 in stock

    Book SynopsisFlorian Deragisch, CCIE #47970, is a Technical Leader, working with large service provider and carrier-grade enterprise customers. He joined Cisco in 2012 as part of a graduate program, where he discovered his passion for service provider designs and technologies. After gaining extensive exposure to MPLS-based networks and services, he embraced the evolution toward segment routing with his first SR-MPLS deployment in 2018. More recently, he has focused on the migration and deployment of L2VPN/L3VPN SRv6 services to build simple and highly scalable network architectures. He holds a master's degree in electrical engineering and information technology from the Swiss Federal Institute of Technology in Zurich and a Cisco Internetwork Expert certification (CCIE #47970). When not busy with work, he enjoys traveling to explore new places, cultures, and food.   Leonir Hoxha, CCIE #49534, has been with Cisco Systems since 2013, taking on va

    1 in stock

    £44.79

  • CompTIA A Complete Deluxe Study Guide with Online

    John Wiley & Sons Inc CompTIA A Complete Deluxe Study Guide with Online

    15 in stock

    Book SynopsisThe ultimate resource for successful certification and IT skillset enhancement The newly revised and updated Fifth Edition of the CompTIA A+ Complete Deluxe Study Guide with Online Labs: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is the ultimate test preparation tool for anyone hoping to succeed on the highly sought-after A+ certification exams. This comprehensive set of study aids covers every exam objective and competency tested by the Core 1 and Core 2 exams. You'll find coverage of mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software trouble shooting, and operational procedures. The book also includes: Practical examples and real-world insights drawn from the experiences of actual computer technicians6 months of access to 28 online A+ Core 2 Exam 220-1102 Practice Lab modulesAccess to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a searchable glossary of key terms Perfect for anyone preparing for the popular A+ certification exams, CompTIA A+ Complete Deluxe Study Guide with Online Labs: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is also an invaluable resource for anyone seeking to improve their computer technician skillset and better their performance on the job.Table of ContentsIntroduction xxvii Assessment Test lxxxii Part I 220-1101 1 Chapter 1 Motherboards, Processors, and Memory 3 Understanding Motherboards 7 Understanding Processors 42 Understanding Memory 49 Understanding Cooling Systems 63 Summary 71 Exam Essentials 71 Review Questions 73 Performance-Based Question 1 77 Performance-Based Question 2 78 Chapter 2 Expansion Cards, Storage Devices, and Power Supplies 79 Installing and Configuring Expansion Cards 81 Understanding Storage Devices 89 Understanding Power Supplies 118 Summary 131 Exam Essentials 131 Review Questions 133 Performance-Based Question 137 Chapter 3 Peripherals, Cables, and Connectors 139 Understanding Cables and Connectors 140 Understanding Cables and Connectors 160 Summary 184 Exam Essentials 185 Review Questions 186 Performance-Based Question 190 Chapter 4 Printers and Multifunction Devices 191 Understanding Print Technologies and Imaging Processes 193 Summary 262 Exam Essentials 262 Review Questions 264 Performance-Based Question 268 Chapter 5 Networking Fundamentals 269 Understanding Networking Principles 271 Identifying Common Network Hardware 295 Summary 324 Exam Essentials 324 Review Questions 327 Performance-Based Question 331 Chapter 6 Introduction to TCP/IP 333 Understanding TCP/IP 335 Understanding Virtual Networks 368 Virtual Local Area Networks 368 Virtual Private Networks 370 Summary 372 Exam Essentials 372 Review Questions 374 Performance-Based Question 378 Chapter 7 Wireless and SOHO Networks 379 Understanding Wireless Networking Technologies 381 Installing and Configuring SOHO Networks 402 Summary 449 Exam Essentials 449 Review Questions 451 Performance-Based Question 455 Chapter 8 Network Services, Virtualization, and Cloud Computing 457 Understanding Network Services 459 Understanding Virtualization and Cloud Computing 487 Summary 515 Exam Essentials 516 Review Questions 518 Performance-Based Question 522 Chapter 9 Laptop and Mobile Device Hardware 523 Working with Laptop and Mobile Device Hardware 526 Summary 584 Exam Essentials 585 Review Questions 586 Performance-Based Question 590 Chapter 10 Mobile Connectivity and Application Support 591 Understanding Mobile Connectivity 593 Summary 668 Exam Essentials 668 Review Questions 670 Performance-Based Question 674 Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems 675 Using the Troubleshooting Best Practice Methodology 678 Troubleshooting Motherboards, CPUs, RAM, and Power Problems 690 Summary 708 Exam Essentials 709 Review Questions 711 Performance-Based Question 715 Chapter 12 Hardware and Network Troubleshooting 717 Troubleshooting Storage Drives and RAID Arrays 721 Troubleshooting Video, Projector, and Display Issues 731 Troubleshooting Common Mobile Device Issues 737 Troubleshooting Printer Problems 751 Troubleshooting Networking Problems 779 Summary 806 Exam Essentials 806 Review Questions 809 Performance-Based Question 813 Part II 220-1102 815 Chapter 13 Operating System Basics 817 Understanding Operating Systems 819 Understanding Applications 830 Introduction to Windows 10 836 Preparing for the Exam 871 Summary 872 Exam Essentials 872 Review Questions 874 Performance-Based Question 878 Chapter 14 Windows Configuration 879 Interacting with Operating Systems 882 The Windows Registry 960 Disk Management 962 Summary 970 Exam Essentials 970 Review Questions 972 Performance-Based Question 976 Chapter 15 Windows Administration 977 Installing and Upgrading Windows 980 Command-Line Tools 1013 Networking in Windows 1030 Summary 1050 Exam Essentials 1050 Review Questions 1052 Performance-Based Question 1056 Chapter 16 Working with macOS and Linux 1057 macOS and Linux 1060 Applications on macOS 1061 Managing Applications 1064 Creating Shortcuts 1065 Tools 1071 System Preferences 1073 Features 1082 Basic Linux Commands 1087 Linux and Windows 1106 Summary 1108 Exam Essentials 1109 Review Questions 1110 Performance-Based Question 1114 Chapter 17 Security Concepts 1115 Physical Security Concepts 1121 Physical Security for Staff 1128 Key Fobs 1129 Smartcards and RFID Badges 1129 Logical Security 1132 Malware 1143 Mitigating Software Threats 1151 Social Engineering Attacks, Threats, and Vulnerabilities 1159 Common Security Threats 1163 Exploits and Vulnerabilities 1170 Security Best Practices 1172 Data Encryption 1172 Setting Strong Passwords 1173 Requiring Passwords 1174 Password Expiration 1175 End-User Best Practices 1176 Account Management 1177 Disable AutoRun 1181 Destruction and Disposal Methods 1183 Recycling or Repurposing Best Practices 1183 Physical Destruction 1185 Summary 1187 Exam Essentials 1187 Review Questions 1190 Performance-Based Question 1194 Chapter 18 Securing Operating Systems 1195 Working with Windows OS Security Settings 1199 Users and Groups 1199 Web Browser Security 1228 Securing a SOHO Network (Wireless) 1239 Securing a SOHO Network (Wired) 1247 Mobile Device Security 1253 Summary 1263 Exam Essentials 1264 Review Questions 1265 Performance-Based Question 1269 Chapter 19 Troubleshooting Operating Systems and Security 1271 Troubleshooting Common Microsoft Windows OS Problems 1275 Troubleshooting Security Issues 1309 Symptoms 1315 Best Practices for Malware Removal 1318 Troubleshooting Mobile OS Issues 1325 Troubleshooting Mobile Security Issues 1335 Summary 1341 Exam Essentials 1342 Review Questions 1343 Performance-Based Question 1346 Chapter 20 Scripting and Remote Access 1347 Scripting 1349 Remote Access 1375 Summary 1387 Exam Essentials 1388 Review Questions 1389 Performance-Based Question 1392 Chapter 21 Safety and Environmental Concerns 1393 Understanding Safety Procedures 1395 Understanding Environmental Controls 1417 Understanding Policies, Licensing, and Privacy 1433 Summary 1446 Exam Essentials 1446 Review Questions 1448 Performance-Based Question 1452 Chapter 22 Documentation and Professionalism 1453 Documentation and Support 1457 Change Management Best Practices 1476 Disaster Prevention and Recovery 1482 Demonstrating Professionalism 1494 Summary 1508 Exam Essentials 1508 Review Questions 1510 Performance-Based Question 1514 Appendix A Answers to the Review Questions 1515 Chapter 1: Motherboards, Processors, and Memory 1516 Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1518 Chapter 3: Peripherals, Cables, and Connectors 1520 Chapter 4: Printers and Multifunction Devices 1521 Chapter 5: Networking Fundamentals 1523 Chapter 6: Introduction to TCP/IP 1525 Chapter 7: Wireless and SOHO Networks 1527 Chapter 8: Network Services, Virtualization, and Cloud Computing 1529 Chapter 9: Laptop and Mobile Device Hardware 1531 Chapter 10: Mobile Connectivity and Application Support 1533 Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1535 Chapter 12: Hardware and Network Troubleshooting 1537 Chapter 13: Operating System Basics 1539 Chapter 14: Windows Configuration 1540 Chapter 15: Windows Administration 1543 Chapter 16: Working with macOS and Linux 1545 Chapter 17: Security Concepts 1547 Chapter 18: Securing Operating Systems 1549 Chapter 19: Troubleshooting Operating Systems and Security 1551 Chapter 20: Scripting and Remote Access 1554 Chapter 21: Safety and Environmental Concerns 1556 Chapter 22: Documentation and Professionalism 1558 Appendix B Answers to Performance-Based Questions 1561 Chapter 1: Motherboards, Processors, and Memory 1562 Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1563 Chapter 3: Peripherals, Cables, and Connectors 1563 Chapter 4: Printers and Multifunction Devices 1564 Chapter 5: Networking Fundamentals 1565 Chapter 6: Introduction to TCP/IP 1566 Chapter 7: Wireless and SOHO Networks 1566 Chapter 8: Network Services, Virtualization, and Cloud Computing 1567 Chapter 9: Laptop and Mobile Device Hardware 1568 Chapter 10: Mobile Connectivity and Application Support 1568 Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1569 Chapter 12: Hardware and Network Troubleshooting 1569 Chapter 13: Operating System Basics 1570 Chapter 14: Windows Configuration 1570 Chapter 15: Windows Administration 1571 Chapter 16: Working with macOS and Linux 1575 Chapter 17: Security Concepts 1577 Chapter 18: Securing Operating Systems 1577 Chapter 19: Troubleshooting Operating Systems and Security 1578 Chapter 20: Scripting and Remote Access 1578 Chapter 21: Safety and Environmental Concerns 1579 Chapter 22: Documentation and Professionalism 1579 Index 1581 Table of Exercises Exercise 2.1 Removing an Internal Storage Device 115 Exercise 2.2 Installing an Internal Storage Device 116 Exercise 2.3 Removing a Power Supply 130 Exercise 3.1 Changing the Refresh Rate in Windows 10 143 Exercise 3.2 Changing the Settings for Multiple Monitors 148 Exercise 4.1 Identifying the Parts of an Inkjet Printer 203 Exercise 4.2 Installing a USB Printer in Windows 10 239 Exercise 4.3 Installing a TCP/IP Printer in Windows 10 242 Exercise 4.4 Determining if Bonjour Is Installed in Windows 244 Exercise 4.5 Scanning a Document to Google Drive 250 Exercise 4.6 Using an Inkjet Cleaning Solution 255 Exercise 4.7 Installing Memory into a Laser Printer 258 Exercise 5.1 Pricing Network Cables 313 Exercise 7.1 The Cost of Networking 422 Exercise 7.2 Installing an Internal NIC in Windows 10 422 Exercise 8.1 Configuring Windows 10 to Use a Proxy Server 477 Exercise 8.2 Using Google’s Cloud Services 497 Exercise 8.3 Enabling Hyper-V in Windows 10 503 Exercise 8.4 Installing VirtualBox and Lubuntu on Windows 10 508 Exercise 9.1 Removing Speakers from a Laptop 536 Exercise 9.2 Removing the Display Assembly 544 Exercise 9.3 Removing the Display Panel 546 Exercise 9.4 Removing the Motherboard from a Laptop 549 Exercise 9.5 Replacing Laptop Memory 553 Exercise 9.6 Removing an M.2 SSD from a Laptop 557 Exercise 9.7 Removing a Laptop Keyboard 560 Exercise 9.8 Disabling a Touchpad in Windows 10 563 Exercise 9.9 Removing an Internal Laptop Battery 568 Exercise 9.10 Removing the System Fan 572 Exercise 9.11 Removing the CPU Heat Sink 573 Exercise 9.12 Removing the Wireless NIC 574 Exercise 9.13 Removing the CMOS Battery 575 Exercise 9.14 Flashing the System BIOS 576 Exercise 10.1 Connecting an iPhone to a Wi-Fi Network 609 Exercise 10.2 Connecting an Android Phone to a Wi-Fi Network 611 Exercise 10.3 Disabling Cellular Use for Data Networking on an iPhone 614 Exercise 10.4 Disabling Cellular Use for Data Networking in Android OS 616 xxvi Table of Exercises Exercise 10.5 Setting Up a VPN in Android 619 Exercise 10.6 Pairing an Android Device with a Windows Laptop 623 Exercise 10.7 Pairing an iPhone with a Vehicle’s Sound System 632 Exercise 10.8 Configuring Location Services in iOS 638 Exercise 10.9 Email Account Configuration on an iPhone 645 Exercise 10.10 Email Account Configuration in Android 648 Exercise 10.11 Enabling ActiveSync in iOS 658 Exercise 11.1 Troubleshooting Practice 707 Exercise 12.1 Using a S.M.A.R.T Software Utility in Windows 729 Exercise 12.2 Stopping and Restarting the Print Spooler in Windows 10 775 Exercise 12.3 Renewing an IP Address in Windows 10 787 Exercise 12.4 Renewing an IP Address from the Command Line 789 Exercise 12.5 Using the net share Command in Windows 795 Exercise 13.1 Changing a Screen Saver in Windows 854 Exercise 13.2 Auto-Hiding the Taskbar 856 Exercise 13.3 Starting a Program from the Run Window 859 Exercise 14.1 Working with Task Manager 887 Exercise 14.2 Working with Performance Monitor 896 Exercise 14.3 Changing the Time Zone 908 Exercise 14.4 Showing Hidden Files and Folders 913 Exercise 15.1 Command-Line Directory Management 1015 Exercise 15.2 Running chkdsk within Windows 1025 Exercise 15.3 Running chkdsk at the Command Line 1026 Exercise 16.1 Installing Applications on macOS 1063 Exercise 16.2 Uninstalling Applications on macOS 1065 Exercise 16.3 Working with Files 1103 Exercise 17.1 Testing Your Antimalware 1153 Exercise 17.2 Testing Social Engineering 1160 Exercise 18.1 Examining a Security Token 1207 Exercise 18.2 Examining File Permissions 1214 Exercise 18.3 Working with File Hashes 1230 Exercise 18.4 Setting the Passcode Lock on an iPhone 1255 Exercise 18.5 Setting the Passcode Lock on an Android Phone 1255 Exercise 19.1 Reviewing Reliability Monitor 1288 Exercise 19.2 Manually Creating a Restore Point in Windows 1304 Exercise 20.1 Creating and Running a Windows Batch Script 1356 Exercise 20.2 Creating Your First PowerShell Script 1360 Exercise 21.1 Finding Trip Hazards 1413 Exercise 21.2 Finding MSDSs 1425 Exercise 22.1 Understanding Punctuality 1501 Exercise 22.2 Surprise Someone 1505

    15 in stock

    £86.25

  • Mike Meyers CompTIA Network Guide to Managing and

    McGraw-Hill Education Mike Meyers CompTIA Network Guide to Managing and

    Out of stock

    Book SynopsisPractice the Skills Essential for a Successful IT Career 80+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab Analysis tests measure your understanding of lab results Key Term Quizzes help build your vocabulary Mike Meyersâ CompTIA Network+â Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition covers: Network models Cabling and topology Ethernet basics Ethernet standards Installing a physical network TCP/IP basics Routing TCP/IP applications Network naming Securing TCP/IP Switch features IPv6 WAN connectivity Wireless networking Virtualization and cloud computing Data centers Integrating network devices Network operations Protecting your network Network mon

    Out of stock

    £31.49

  • CISA Certified Information Systems Auditor Study

    John Wiley & Sons CISA Certified Information Systems Auditor Study

    15 in stock

    Book Synopsis

    15 in stock

    £45.00

  • Fundamentals of 5G Communications Connectivity

    McGraw-Hill Education Fundamentals of 5G Communications Connectivity

    10 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Explore the foundations and applications of 5G technologyThis comprehensive guide contains practical information from telecommunications experts working at the forefront of 5G innovation. The authors discuss the foundations of 5G technologyânot just the new standards, but the reasons and stories behind them. Fundamentals of 5G Communications features coverage of all major vertical domains with a focus on practical, commercial applications. This book serves both as an essential reference for telecom professionals and as a textbook for students learning about 5G.Coverage includes: 5G versus 4G: Whatâs new? Deployment scenarios and architecture options The evolution of 5G architecture Numerology and slot structure Table of ContentsForewordIntroductionAcronyms1 5G versus 4G: What’s New? 1.1 Overview 1.2 LTE: A Success Story 1.3 Physical Layer Changes in 5G 1.4 Protocol Changes in 5G 1.5 Main Physical Layer Features of LTE over Releases2 Deployment Scenarios 2.1 LTE-NR Spectrum Sharing 2.2 Switched NR UL Carrier Aggregation Enhancements 2.3 Nonaligned Carrier Aggregation Operation 2.4 Frequency Ranges and Frequency Bands3 Architecture Options for 5G 3.1 Introduction 3.2 The 5G RAN Architecture 3.3 The 5G Core 3.4 EPC versus 5GC (What Is 5GC For?) 3.5 Main Functional Entities of the 5G Core 3.6 High-Level Features of 5G Core 3.7 Network Slicing 3.8 QoS 3.9 Interworking with Non-3GPP Access Technologies 3.10 Policy Control 3.11 5G Security 3.12 Access Control and Barring 3.13 Support for Operator and Regulatory Services 3.14 Interworking with EPC 3.15 EPC to 5GC Migration4 Evolution of 5G Architecture 4.1 Introduction 4.2 Non-Public Networks 4.3 Cellular V2X 4.4 Cellular IoT 4.5 “Big Data” Collection (Enhanced Network Automation) 4.6 Enhancements to Interworking with Non-3GPP Accesses 4.7 URLLC 4.8 Slice Authentication 4.9 Other Release 16 Features5 Numerology and Slot Structure 5.1 Numerology and Slot Structure in 4G LTE 5.2 Lessons Learned from 4G LTE and 5G Considerations 5.3 SCSs for 5G NR 5.4 Frequency Ranges, Bandwidths, and Bands for 5G NR 5.5 gNB Channel Bandwidth versus UE Channel Bandwidth 5.6 Symbol, Slot, Subframe, and Frame for 5G NR 5.7 Slot Structure for 5G NR and Forward Compatibility Considerations6 Initial Access and Mobility 6.1 Overview 6.2 Initial Access 6.3 Random Access 6.4 Paging 6.5 Mobility7 Downlink Control Operation 7.1 Downlink Control in 4G LTE 7.2 Control Region Management in 5G NR 7.3 PDCCH Structure in 5G NR 7.4 Search Space for NR PDCCH 7.5 DCI Formats for NR PDCCH 7.6 Physical Layer Block Diagram for NR PDCCH 7.7 Power Saving Considerations8 Downlink Data Operation 8.1 Channel Coding for Data 8.2 Channel Code Rate Matching 8.3 DL Soft Buffer Management 8.4 DL MCS and TBS Determination 8.5 DL Resource Allocation in the Time Domain 8.6 DL Resource Allocation in the Frequency Domain 8.7 DL Rate Matching 8.8 DL HARQ Operation 8.9 DL Data Rate Capability 8.10 Processing Time for DL Data 8.11 Demodulation Reference Signals for Data 8.12 PDSCH DM-RS 8.13 DL Phase Tracking Reference Signal 8.14 Channel State Information Reference Signal 8.15 Tracking Reference Signal 8.16 DL MIMO Scheme 8.17 CSI Feedback 8.18 Beam Management for the PDSCH 8.19 Signal Quasi Co-Location9 Uplink Control Operation 9.1 Uplink Control in 4G LTE 9.2 UCI Types and Payload Sizes in 5G NR 9.3 PUCCH Formats in 5G NR 9.4 PUCCH Resource Determination in 5G NR 9.5 UCI on PUSCH in 5G NR 9.6 Channel Coding for UCI10 Uplink Data Operation 10.1 UL MCS and TBS Determination 10.2 UL Resource Allocation in the Time Domain 10.3 UL Resource Allocation in the Frequency Domain 10.4 UL Rate Matching 10.5 UL HARQ Operation 10.6 UL Soft Buffer Management 10.7 UL Data Rate Capability 10.8 Processing Time for UL Data 10.9 PUSCH DM-RS 10.10 UL Phase Tracking Reference Signal 10.11 Sounding Reference Signal 10.12 UL MIMO Scheme 10.13 Beam Management for the PUSCH 10.14 UL Power Control 10.15 UL Timing11 Coexistence of 4G and 5G 11.1 Adjacent Channel Coexistence 11.2 Same Channel Coexistence 11.3 EN-DC Power Control 11.4 Switched EN-DC UL12 5G in Unlicensed and Shared Spectrum 12.1 Unlicensed Operation in LTE 12.2 Overview 12.3 Channel Access 12.4 Discovery Burst 12.5 Physical Layer Extensions for Uplink 12.6 Increased Scheduling Flexibility13 Vertical Expansion: URLLC 13.1 A Brief History of 3GPP Standardization Related to URLLC 13.2 Use Cases and Deployment Scenarios for 5G NR URLLC 13.3 Resource Management for URLLC 13.4 Optimizing Link Efficiency for URLLC 13.5 Downlink Resource Sharing for Distinct Service Types 13.6 Uplink Resource Sharing for Distinct Service Types 13.7 Handling Distinct Services at the UE 13.8 Other Related Aspects14 Vertical Expansion: MTC 14.1 A Brief History of MTC in 3GPP 14.2 Key Technical Enablers for eMTC 14.3 Key Technical Enablers for NB-IoT 14.4 Integration of eMTC and NB-IoT into 5G NR 14.5 Future Trends15 5G Vertical Expansion: V2X 15.1 Overview 15.2 Background: LTE V2X 15.3 NR V2X16 Vertical Expansion: Broadcast and Multicast17 Miscellaneous Topics for 5G 17.1 Overview 17.2 Interference Management 17.3 UE Power Savings 17.4 NR Positioning 17.5 Two-Step RACH 17.6 Multi-RAT DC/CA Enhancements 17.7 Mobility Enhancements 17.8 Integrated Access and Backhaul18 A Look at Typical 5G Commercial Deployments19 5G: What’s Next? 19.1 Overview 19.2 Radio Projects in Release 17 19.3 Systems Projects in Release 17 19.4 NR Expansion into Higher Frequencies 19.5 Sidelink Beyond V2X 19.6 Relaying Operation 19.7 Edge Applications 19.8 On the Path to 6GIndex

    10 in stock

    £88.19

  • Security Engineering

    John Wiley & Sons Inc Security Engineering

    15 in stock

    Book SynopsisTable of ContentsPreface to the Third Edition xxxvii Preface to the Second Edition xli Preface to the First Edition xliii Formy daughter, and other lawyers… xlvii Foreword xlix Part I Chapter 1 What Is Security Engineering? 3 1.1 Introduction 3 1.2 A framework 4 1.3 Example 1 – a bank 6 1.4 Example 2 – a military base 7 1.5 Example 3 – a hospital 8 1.6 Example 4 – the home 10 1.7 Definitions 11 1.8 Summary 16 Chapter 2 Who Is the Opponent? 17 2.1 Introduction 17 2.2 Spies 19 2.2.1 The Five Eyes 19 2.2.1.1 Prism 19 2.2.1.2 Tempora 20 2.2.1.3 Muscular 21 2.2.1.4 Special collection 22 2.2.1.5 Bullrun and Edgehill 22 2.2.1.6 Xkeyscore 23 2.2.1.7 Longhaul 24 2.2.1.8 Quantum 25 2.2.1.9 CNE 25 2.2.1.10 The analyst’s viewpoint 27 2.2.1.11 Offensive operations 28 2.2.1.12 Attack scaling 29 2.2.2 China 30 2.2.3 Russia 35 2.2.4 The rest 38 2.2.5 Attribution 40 2.3 Crooks 41 2.3.1 Criminal infrastructure 42 2.3.1.1 Botnet herders 42 2.3.1.2 Malware devs 44 2.3.1.3 Spam senders 45 2.3.1.4 Bulk account compromise 45 2.3.1.5 Targeted attackers 46 2.3.1.6 Cashout gangs 46 2.3.1.7 Ransomware 47 2.3.2 Attacks on banking and payment systems 47 2.3.3 Sectoral cybercrime ecosystems 49 2.3.4 Internal attacks 49 2.3.5 CEO crimes 49 2.3.6 Whistleblowers 50 2.4 Geeks 52 2.5 The swamp 53 2.5.1 Hacktivism and hate campaigns 54 2.5.2 Child sex abuse material 55 2.5.3 School and workplace bullying 57 2.5.4 Intimate relationship abuse 57 2.6 Summary 59 Research problems 60 Further reading 61 Chapter 3 Psychology and Usability 63 3.1 Introduction 63 3.2 Insights from psychology research 64 3.2.1 Cognitive psychology 65 3.2.2 Gender, diversity and interpersonal variation 68 3.2.3 Social psychology 70 3.2.3.1 Authority and its abuse 71 3.2.3.2 The bystander effect 72 3.2.4 The social-brain theory of deception 73 3.2.5 Heuristics, biases and behavioural economics 76 3.2.5.1 Prospect theory and risk misperception 77 3.2.5.2 Present bias and hyperbolic discounting 78 3.2.5.3 Defaults and nudges 79 3.2.5.4 The default to intentionality 79 3.2.5.5 The affect heuristic 80 3.2.5.6 Cognitive dissonance 81 3.2.5.7 The risk thermostat 81 3.3 Deception in practice 81 3.3.1 The salesman and the scamster 82 3.3.2 Social engineering 84 3.3.3 Phishing 86 3.3.4 Opsec 88 3.3.5 Deception research 89 3.4 Passwords 90 3.4.1 Password recovery 92 3.4.2 Password choice 94 3.4.3 Difficulties with reliable password entry 94 3.4.4 Difficulties with remembering the password 95 3.4.4.1 Naïve choice 96 3.4.4.2 User abilities and training 96 3.4.4.3 Design errors 98 3.4.4.4 Operational failures 100 3.4.4.5 Social-engineering attacks 101 3.4.4.6 Customer education 102 3.4.4.7 Phishing warnings 103 3.4.5 System issues 104 3.4.6 Can you deny service? 105 3.4.7 Protecting oneself or others? 105 3.4.8 Attacks on password entry 106 3.4.8.1 Interface design 106 3.4.8.2 Trusted path, and bogus terminals 107 3.4.8.3 Technical defeats of password retry counters 107 3.4.9 Attacks on password storage 108 3.4.9.1 One-way encryption 109 3.4.9.2 Password cracking 109 3.4.9.3 Remote password checking 109 3.4.10 Absolute limits 110 3.4.11 Using a password manager 111 3.4.12 Will we ever get rid of passwords? 113 3.5 CAPTCHAs 115 3.6 Summary 116 Research problems 117 Further reading 118 Chapter 4 Protocols 119 4.1 Introduction 119 4.2 Password eavesdropping risks 120 4.3 Who goes there? – simple authentication 122 4.3.1 Challenge and response 124 4.3.2 Two-factor authentication 128 4.3.3 The MIG-in-the-middle attack 129 4.3.4 Reflection attacks 132 4.4 Manipulating the message 133 4.5 Changing the environment 134 4.6 Chosen protocol attacks 135 4.7 Managing encryption keys 136 4.7.1 The resurrecting duckling 137 4.7.2 Remote key management 137 4.7.3 The Needham-Schroeder protocol 138 4.7.4 Kerberos 139 4.7.5 Practical key management 141 4.8 Design assurance 141 4.9 Summary 143 Research problems 143 Further reading 144 Chapter 5 Cryptography 145 5.1 Introduction 145 5.2 Historical background 146 5.2.1 An early stream cipher – the Vigenère 147 5.2.2 The one-time pad 148 5.2.3 An early block cipher – Playfair 150 5.2.4 Hash functions 152 5.2.5 Asymmetric primitives 154 5.3 Security models 155 5.3.1 Random functions – hash functions 157 5.3.1.1 Properties 157 5.3.1.2 The birthday theorem 158 5.3.2 Random generators – stream ciphers 159 5.3.3 Random permutations – block ciphers 161 5.3.4 Public key encryption and trapdoor one-way permutations 163 5.3.5 Digital signatures 164 5.4 Symmetric crypto algorithms 165 5.4.1 SP-networks 165 5.4.1.1 Block size 166 5.4.1.2 Number of rounds 166 5.4.1.3 Choice of S-boxes 167 5.4.1.4 Linear cryptanalysis 167 5.4.1.5 Differential cryptanalysis 168 5.4.2 The Advanced Encryption Standard (AES) 169 5.4.3 Feistel ciphers 171 5.4.3.1 The Luby-Rackoff result 173 5.4.3.2 DES 173 5.5 Modes of operation 175 5.5.1 How not to use a block cipher 176 5.5.2 Cipher block chaining 177 5.5.3 Counter encryption 178 5.5.4 Legacy stream cipher modes 178 5.5.5 Message authentication code 179 5.5.6 Galois counter mode 180 5.5.7 XTS 180 5.6 Hash functions 181 5.6.1 Common hash functions 181 5.6.2 Hash function applications – HMAC, commitments and updating 183 5.7 Asymmetric crypto primitives 185 5.7.1 Cryptography based on factoring 185 5.7.2 Cryptography based on discrete logarithms 188 5.7.2.1 One-way commutative encryption 189 5.7.2.2 Diffie-Hellman key establishment 190 5.7.2.3 ElGamal digital signature and DSA 192 5.7.3 Elliptic curve cryptography 193 5.7.4 Certification authorities 194 5.7.5 TLS 195 5.7.5.1 TLS uses 196 5.7.5.2 TLS security 196 5.7.5.3 TLS 1.3 197 5.7.6 Other public-key protocols 197 5.7.6.1 Code signing 197 5.7.6.2 PGP/GPG 198 5.7.6.3 QUIC 199 5.7.7 Special-purpose primitives 199 5.7.8 How strong are asymmetric cryptographic primitives? 200 5.7.9 What else goes wrong 202 5.8 Summary 203 Research problems 204 Further reading 204 Chapter 6 Access Control 207 6.1 Introduction 207 6.2 Operating system access controls 209 6.2.1 Groups and roles 210 6.2.2 Access control lists 211 6.2.3 Unix operating system security 212 6.2.4 Capabilities 214 6.2.5 DAC and MAC 215 6.2.6 Apple’s macOS 217 6.2.7 iOS 217 6.2.8 Android 218 6.2.9 Windows 219 6.2.10 Middleware 222 6.2.10.1 Database access controls 222 6.2.10.2 Browsers 223 6.2.11 Sandboxing 224 6.2.12 Virtualisation 225 6.3 Hardware protection 227 6.3.1 Intel processors 228 6.3.2 Arm processors 230 6.4 What goes wrong 231 6.4.1 Smashing the stack 232 6.4.2 Other technical attacks 234 6.4.3 User interface failures 236 6.4.4 Remedies 237 6.4.5 Environmental creep 238 6.5 Summary 239 Research problems 240 Further reading 240 Chapter 7 Distributed Systems 243 7.1 Introduction 243 7.2 Concurrency 244 7.2.1 Using old data versus paying to propagate state 245 7.2.2 Locking to prevent inconsistent updates 246 7.2.3 The order of updates 247 7.2.4 Deadlock 248 7.2.5 Non-convergent state 249 7.2.6 Secure time 250 7.3 Fault tolerance and failure recovery 251 7.3.1 Failure models 252 7.3.1.1 Byzantine failure 252 7.3.1.2 Interaction with fault tolerance 253 7.3.2 What is resilience for? 254 7.3.3 At what level is the redundancy? 255 7.3.4 Service-denial attacks 257 7.4 Naming 259 7.4.1 The Needham naming principles 260 7.4.2 What else goes wrong 263 7.4.2.1 Naming and identity 264 7.4.2.2 Cultural assumptions 265 7.4.2.3 Semantic content of names 267 7.4.2.4 Uniqueness of names 268 7.4.2.5 Stability of names and addresses 269 7.4.2.6 Restrictions on the use of names 269 7.4.3 Types of name 270 7.5 Summary 271 Research problems 272 Further reading 273 Chapter 8 Economics 275 8.1 Introduction 275 8.2 Classical economics 276 8.2.1 Monopoly 278 8.3 Information economics 281 8.3.1 Why information markets are different 281 8.3.2 The value of lock-in 282 8.3.3 Asymmetric information 284 8.3.4 Public goods 285 8.4 Game theory 286 8.4.1 The prisoners’ dilemma 287 8.4.2 Repeated and evolutionary games 288 8.5 Auction theory 291 8.6 The economics of security and dependability 293 8.6.1 Why is Windows so insecure? 294 8.6.2 Managing the patching cycle 296 8.6.3 Structural models of attack and defence 298 8.6.4 The economics of lock-in, tying and DRM 300 8.6.5 Antitrust law and competition policy 302 8.6.6 Perversely motivated guards 304 8.6.7 Economics of privacy 305 8.6.8 Organisations and human behaviour 307 8.6.9 Economics of cybercrime 308 8.7 Summary 310 Research problems 311 Further reading 311 Part II Chapter 9 Multilevel Security 315 9.1 Introduction 315 9.2 What is a security policy model? 316 9.3 Multilevel security policy 318 9.3.1 The Anderson report 319 9.3.2 The Bell-LaPadula model 320 9.3.3 The standard criticisms of Bell-LaPadula 321 9.3.4 The evolution of MLS policies 323 9.3.5 The Biba model 325 9.4 Historical examples of MLS systems 326 9.4.1 SCOMP 326 9.4.2 Data diodes 327 9.5 MAC: from MLS to IFC and integrity 329 9.5.1 Windows 329 9.5.2 SELinux 330 9.5.3 Embedded systems 330 9.6 What goes wrong 331 9.6.1 Composability 331 9.6.2 The cascade problem 332 9.6.3 Covert channels 333 9.6.4 The threat from malware 333 9.6.5 Polyinstantiation 334 9.6.6 Practical problems with MLS 335 9.7 Summary 337 Research problems 338 Further reading 339 Chapter 10 Boundaries 341 10.1 Introduction 341 10.2 Compartmentation and the lattice model 344 10.3 Privacy for tigers 346 10.4 Health record privacy 349 10.4.1 The threat model 351 10.4.2 The BMA security policy 353 10.4.3 First practical steps 356 10.4.4 What actually goes wrong 357 10.4.4.1 Emergency care 358 10.4.4.2 Resilience 359 10.4.4.3 Secondary uses 359 10.4.5 Confidentiality – the future 362 10.4.6 Ethics 365 10.4.7 Social care and education 367 10.4.8 The Chinese Wall 369 10.5 Summary 371 Research problems 372 Further reading 373 Chapter 11 Inference Control 375 11.1 Introduction 375 11.2 The early history of inference control 377 11.2.1 The basic theory of inference control 378 11.2.1.1 Query set size control 378 11.2.1.2 Trackers 379 11.2.1.3 Cell suppression 379 11.2.1.4 Other statistical disclosure control mechanisms 380 11.2.1.5 More sophisticated query controls 381 11.2.1.6 Randomization 382 11.2.2 Limits of classical statistical security 383 11.2.3 Active attacks 384 11.2.4 Inference control in rich medical data 385 11.2.5 The third wave: preferences and search 388 11.2.6 The fourth wave: location and social 389 11.3 Differential privacy 392 11.4 Mind the gap? 394 11.4.1 Tactical anonymity and its problems 395 11.4.2 Incentives 398 11.4.3 Alternatives 399 11.4.4 The dark side 400 11.5 Summary 401 Research problems 402 Further reading 402 Chapter 12 Banking and Bookkeeping 405 12.1 Introduction 405 12.2 Bookkeeping systems 406 12.2.1 Double-entry bookkeeping 408 12.2.2 Bookkeeping in banks 408 12.2.3 The Clark-Wilson security policy model 410 12.2.4 Designing internal controls 411 12.2.5 Insider frauds 415 12.2.6 Executive frauds 416 12.2.6.1 The post office case 418 12.2.6.2 Other failures 419 12.2.6.3 Ecological validity 420 12.2.6.4 Control tuning and corporate governance 421 12.2.7 Finding the weak spots 422 12.3 Interbank payment systems 424 12.3.1 A telegraphic history of E-commerce 424 12.3.2 SWIFT 425 12.3.3 What goes wrong 427 12.4 Automatic teller machines 430 12.4.1 ATM basics 430 12.4.2 What goes wrong 433 12.4.3 Incentives and injustices 437 12.5 Credit cards 438 12.5.1 Credit card fraud 439 12.5.2 Online card fraud 440 12.5.3 3DS 443 12.5.4 Fraud engines 444 12.6 EMV payment cards 445 12.6.1 Chip cards 445 12.6.1.1 Static data authentication 446 12.6.1.2 ICVVs, DDA and CDA 450 12.6.1.3 The No-PIN attack 451 12.6.2 The preplay attack 452 12.6.3 Contactless 454 12.7 Online banking 457 12.7.1 Phishing 457 12.7.2 CAP 458 12.7.3 Banking malware 459 12.7.4 Phones as second factors 459 12.7.5 Liability 461 12.7.6 Authorised push payment fraud 462 12.8 Nonbank payments 463 12.8.1 M-Pesa 463 12.8.2 Other phone payment systems 464 12.8.3 Sofort, and open banking 465 12.9 Summary 466 Research problems 466 Further reading 468 Chapter 13 Locks and Alarms 471 13.1 Introduction 471 13.2 Threats and barriers 472 13.2.1 Threat model 473 13.2.2 Deterrence 474 13.2.3 Walls and barriers 476 13.2.4 Mechanical locks 478 13.2.5 Electronic locks 482 13.3 Alarms 484 13.3.1 How not to protect a painting 485 13.3.2 Sensor defeats 486 13.3.3 Feature interactions 488 13.3.4 Attacks on communications 489 13.3.5 Lessons learned 493 13.4 Summary 494 Research problems 495 Further reading 495 Chapter 14 Monitoring and Metering 497 14.1 Introduction 497 14.2 Prepayment tokens 498 14.2.1 Utility metering 499 14.2.2 How the STS system works 501 14.2.3 What goes wrong 502 14.2.4 Smart meters and smart grids 504 14.2.5 Ticketing fraud 508 14.3 Taxi meters, tachographs and truck speed limiters 509 14.3.1 The tachograph 509 14.3.2 What goes wrong 511 14.3.2.1 How most tachograph manipulation is done 511 14.3.2.2 Tampering with the supply 512 14.3.2.3 Tampering with the instrument 512 14.3.2.4 High-tech attacks 513 14.3.3 Digital tachographs 514 14.3.3.1 System-level problems 515 14.3.3.2 Other problems 516 14.3.4 Sensor defeats and third-generation devices 518 14.3.5 The fourth generation – smart tachographs 518 14.4 Curfew tags: GPS as policeman 519 14.5 Postage meters 522 14.6 Summary 526 Research problems 527 Further reading 527 Chapter 15 Nuclear Command and Control 529 15.1 Introduction 529 15.2 The evolution of command and control 532 15.2.1 The Kennedy memorandum 532 15.2.2 Authorization, environment, intent 534 15.3 Unconditionally secure authentication 534 15.4 Shared control schemes 536 15.5 Tamper resistance and PALs 538 15.6 Treaty verification 540 15.7 What goes wrong 541 15.7.1 Nuclear accidents 541 15.7.2 Interaction with cyberwar 542 15.7.3 Technical failures 543 15.8 Secrecy or openness? 544 15.9 Summary 545 Research problems 546 Further reading 546 Chapter 16 Security Printing and Seals 549 16.1 Introduction 549 16.2 History 550 16.3 Security printing 551 16.3.1 Threat model 552 16.3.2 Security printing techniques 553 16.4 Packaging and seals 557 16.4.1 Substrate properties 558 16.4.2 The problems of glue 558 16.4.3 PIN mailers 559 16.5 Systemic vulnerabilities 560 16.5.1 Peculiarities of the threat model 562 16.5.2 Anti-gundecking measures 563 16.5.3 The effect of random failure 564 16.5.4 Materials control 564 16.5.5 Not protecting the right things 565 16.5.6 The cost and nature of inspection 566 16.6 Evaluation methodology 567 16.7 Summary 569 Research problems 569 Further reading 570 Chapter 17 Biometrics 571 17.1 Introduction 571 17.2 Handwritten signatures 572 17.3 Face recognition 575 17.4 Fingerprints 579 17.4.1 Verifying positive or negative identity claims 581 17.4.2 Crime scene forensics 584 17.5 Iris codes 588 17.6 Voice recognition and morphing 590 17.7 Other systems 591 17.8 What goes wrong 593 17.9 Summary 596 Research problems 597 Further reading 597 Chapter 18 Tamper Resistance 599 18.1 Introduction 599 18.2 History 601 18.3 Hardware security modules 601 18.4 Evaluation 607 18.5 Smartcards and other security chips 609 18.5.1 History 609 18.5.2 Architecture 610 18.5.3 Security evolution 611 18.5.4 Random number generators and PUFs 621 18.5.5 Larger chips 624 18.5.6 The state of the art 628 18.6 The residual risk 630 18.6.1 The trusted interface problem 630 18.6.2 Conflicts 631 18.6.3 The lemons market, risk dumping and evaluation games 632 18.6.4 Security-by-obscurity 632 18.6.5 Changing environments 633 18.7 So what should one protect? 634 18.8 Summary 636 Research problems 636 Further reading 636 Chapter 19 Side Channels 639 19.1 Introduction 639 19.2 Emission security 640 19.2.1 History 641 19.2.2 Technical surveillance and countermeasures 642 19.3 Passive attacks 645 19.3.1 Leakage through power and signal cables 645 19.3.2 Leakage through RF signals 645 19.3.3 What goes wrong 649 19.4 Attacks between and within computers 650 19.4.1 Timing analysis 651 19.4.2 Power analysis 652 19.4.3 Glitching and differential fault analysis 655 19.4.4 Rowhammer, CLKscrew and Plundervolt 656 19.4.5 Meltdown, Spectre and other enclave side channels 657 19.5 Environmental side channels 659 19.5.1 Acoustic side channels 659 19.5.2 Optical side channels 661 19.5.3 Other side-channels 661 19.6 Social side channels 663 19.7 Summary 663 Research problems 664 Further reading 664 Chapter 20 Advanced Cryptographic Engineering 667 20.1 Introduction 667 20.2 Full-disk encryption 668 20.3 Signal 670 20.4 Tor 674 20.5 HSMs 677 20.5.1 The xor-to-null-key attack 677 20.5.2 Attacks using backwards compatibility and time-memory tradeoffs 678 20.5.3 Differential protocol attacks 679 20.5.4 The EMV attack 681 20.5.5 Hacking the HSMs in CAs and clouds 681 20.5.6 Managing HSM risks 681 20.6 Enclaves 682 20.7 Blockchains 685 20.7.1 Wallets 688 20.7.2 Miners 689 20.7.3 Smart contracts 689 20.7.4 Off-chain payment mechanisms 691 20.7.5 Exchanges, cryptocrime and regulation 692 20.7.6 Permissioned blockchains 695 20.8 Crypto dreams that failed 695 20.9 Summary 696 Research problems 698 Further reading 698 Chapter 21 Network Attack and Defence 699 21.1 Introduction 699 21.2 Network protocols and service denial 701 21.2.1 BGP security 701 21.2.2 DNS security 703 21.2.3 UDP, TCP, SYN floods and SYN reflection 704 21.2.4 Other amplifiers 705 21.2.5 Other denial-of-service attacks 706 21.2.6 Email – from spies to spammers 706 21.3 The malware menagerie – Trojans, worms and RATs 708 21.3.1 Early history of malware 709 21.3.2 The Internet worm 710 21.3.3 Further malware evolution 711 21.3.4 How malware works 713 21.3.5 Countermeasures 714 21.4 Defense against network attack 715 21.4.1 Filtering: firewalls, censorware and wiretaps 717 21.4.1.1 Packet filtering 718 21.4.1.2 Circuit gateways 718 21.4.1.3 Application proxies 719 21.4.1.4 Ingress versus egress filtering 719 21.4.1.5 Architecture 720 21.4.2 Intrusion detection 722 21.4.2.1 Types of intrusion detection 722 21.4.2.2 General limitations of intrusion detection 724 21.4.2.3 Specific problems detecting network attacks 724 21.5 Cryptography: the ragged boundary 725 21.5.1 SSH 726 21.5.2 Wireless networking at the periphery 727 21.5.2.1 WiFi 727 21.5.2.2 Bluetooth 728 21.5.2.3 HomePlug 729 21.5.2.4 VPNs 729 21.6 CAs and PKI 730 21.7 Topology 733 21.8 Summary 734 Research problems 734 Further reading 735 Chapter 22 Phones 737 22.1 Introduction 737 22.2 Attacks on phone networks 738 22.2.1 Attacks on phone-call metering 739 22.2.2 Attacks on signaling 742 22.2.3 Attacks on switching and configuration 743 22.2.4 Insecure end systems 745 22.2.5 Feature interaction 746 22.2.6 VOIP 747 22.2.7 Frauds by phone companies 748 22.2.8 Security economics of telecomms 749 22.3 Going mobile 750 22.3.1 GSM 751 22.3.2 3G 755 22.3.3 4G 757 22.3.4 5G and beyond 758 22.3.5 General MNO failings 760 22.4 Platform security 761 22.4.1 The Android app ecosystem 763 22.4.1.1 App markets and developers 764 22.4.1.2 Bad Android implementations 764 22.4.1.3 Permissions 766 22.4.1.4 Android malware 767 22.4.1.5 Ads and third-party services 768 22.4.1.6 Pre-installed apps 770 22.4.2 Apple’s app ecosystem 770 22.4.3 Cross-cutting issues 774 22.5 Summary 775 Research problems 776 Further reading 776 Chapter 23 Electronic and Information Warfare 777 23.1 Introduction 777 23.2 Basics 778 23.3 Communications systems 779 23.3.1 Signals intelligence techniques 781 23.3.2 Attacks on communications 784 23.3.3 Protection techniques 785 23.3.3.1 Frequency hopping 786 23.3.3.2 DSSS 787 23.3.3.3 Burst communications 788 23.3.3.4 Combining covertness and jam resistance 789 23.3.4 Interaction between civil and military uses 790 23.4 Surveillance and target acquisition 791 23.4.1 Types of radar 792 23.4.2 Jamming techniques 793 23.4.3 Advanced radars and countermeasures 795 23.4.4 Other sensors and multisensor issues 796 23.5 IFF systems 797 23.6 Improvised explosive devices 800 23.7 Directed energy weapons 802 23.8 Information warfare 803 23.8.1 Attacks on control systems 805 23.8.2 Attacks on other infrastructure 808 23.8.3 Attacks on elections and political stability 809 23.8.4 Doctrine 811 23.9 Summary 812 Research problems 813 Further reading 813 Chapter 24 Copyright and DRM 815 24.1 Introduction 815 24.2 Copyright 817 24.2.1 Software 817 24.2.2 Free software, free culture? 823 24.2.3 Books and music 827 24.2.4 Video and pay-TV 828 24.2.4.1 Typical system architecture 829 24.2.4.2 Video scrambling techniques 830 24.2.4.3 Attacks on hybrid scrambling systems 832 24.2.4.4 DVB 836 24.2.5 DVD 837 24.3 DRM on general-purpose computers 838 24.3.1 Windows media rights management 839 24.3.2 FairPlay, HTML5 and other DRM systems 840 24.3.3 Software obfuscation 841 24.3.4 Gaming, cheating, and DRM 843 24.3.5 Peer-to-peer systems 845 24.3.6 Managing hardware design rights 847 24.4 Information hiding 848 24.4.1 Watermarks and copy generation management 849 24.4.2 General information hiding techniques 849 24.4.3 Attacks on copyright marking schemes 851 24.5 Policy 854 24.5.1 The IP lobby 857 24.5.2 Who benefits? 859 24.6 Accessory control 860 24.7 Summary 862 Research problems 862 Further reading 863 Chapter 25 New Directions? 865 25.1 Introduction 865 25.2 Autonomous and remotely-piloted vehicles 866 25.2.1 Drones 866 25.2.2 Self-driving cars 867 25.2.3 The levels and limits of automation 869 25.2.4 How to hack a self-driving car 872 25.3 AI / ML 874 25.3.1 ML and security 875 25.3.2 Attacks on ML systems 876 25.3.3 ML and society 879 25.4 PETS and operational security 882 25.4.1 Anonymous messaging devices 885 25.4.2 Social support 887 25.4.3 Living off the land 890 25.4.4 Putting it all together 891 25.4.5 The name’s Bond. James Bond 893 25.5 Elections 895 25.5.1 The history of voting machines 896 25.5.2 Hanging chads 896 25.5.3 Optical scan 898 25.5.4 Software independence 899 25.5.5 Why electronic elections are hard 900 25.6 Summary 904 Research problems 904 Further reading 905 Part III Chapter 26 Surveillance or Privacy? 909 26.1 Introduction 909 26.2 Surveillance 912 26.2.1 The history of government wiretapping 912 26.2.2 Call data records (CDRs) 916 26.2.3 Search terms and location data 919 26.2.4 Algorithmic processing 920 26.2.5 ISPs and CSPs 921 26.2.6 The Five Eyes’ system of systems 922 26.2.7 The crypto wars 925 26.2.7.1 The back story to crypto policy 926 26.2.7.2 DES and crypto research 927 26.2.7.3 CryptoWar 1 – the Clipper chip 928 26.2.7.4 CryptoWar 2 – going spotty 931 26.2.8 Export control 934 26.3 Terrorism 936 26.3.1 Causes of political violence 936 26.3.2 The psychology of political violence 937 26.3.3 The role of institutions 938 26.3.4 The democratic response 940 26.4 Censorship 941 26.4.1 Censorship by authoritarian regimes 942 26.4.2 Filtering, hate speech and radicalisation 944 26.5 Forensics and rules of evidence 948 26.5.1 Forensics 948 26.5.2 Admissibility of evidence 950 26.5.3 What goes wrong 951 26.6 Privacy and data protection 953 26.6.1 European data protection 953 26.6.2 Privacy regulation in the USA 956 26.6.3 Fragmentation? 958 26.7 Freedom of information 960 26.8 Summary 961 Research problems 962 Further reading 962 Chapter 27 Secure Systems Development 965 27.1 Introduction 965 27.2 Risk management 966 27.3 Lessons from safety-critical systems 969 27.3.1 Safety engineering methodologies 970 27.3.2 Hazard analysis 971 27.3.3 Fault trees and threat trees 971 27.3.4 Failure modes and effects analysis 972 27.3.5 Threat modelling 973 27.3.6 Quantifying risks 975 27.4 Prioritising protection goals 978 27.5 Methodology 980 27.5.1 Top-down design 981 27.5.2 Iterative design: from spiral to agile 983 27.5.3 The secure development lifecycle 985 27.5.4 Gated development 987 27.5.5 Software as a Service 988 27.5.6 From DevOps to DevSecOps 991 27.5.6.1 The Azure ecosystem 991 27.5.6.2 The Google ecosystem 992 27.5.6.3 Creating a learning system 994 27.5.7 The vulnerability cycle 995 27.5.7.1 The CVE system 997 27.5.7.2 Coordinated disclosure 998 27.5.7.3 Security incident and event management 999 27.5.8 Organizational mismanagement of risk 1000 27.6 Managing the team 1004 27.6.1 Elite engineers 1004 27.6.2 Diversity 1005 27.6.3 Nurturing skills and attitudes 1007 27.6.4 Emergent properties 1008 27.6.5 Evolving your workflow 1008 27.6.6 And finally… 1010 27.7 Summary 1010 Research problems 1011 Further reading 1012 Chapter 28 Assurance and Sustainability 1015 28.1 Introduction 1015 28.2 Evaluation 1018 28.2.1 Alarms and locks 1019 28.2.2 Safety evaluation regimes 1019 28.2.3 Medical device safety 1020 28.2.4 Aviation safety 1023 28.2.5 The Orange book 1025 28.2.6 FIPS 140 and HSMs 1026 28.2.7 The common criteria 1026 28.2.7.1 The gory details 1027 28.2.7.2 What goes wrong with the Common Criteria 1029 28.2.7.3 Collaborative protection profiles 1031 28.2.8 The ‘Principle of Maximum Complacency’ 1032 28.2.9 Next steps 1034 28.3 Metrics and dynamics of dependability 1036 28.3.1 Reliability growth models 1036 28.3.2 Hostile review 1039 28.3.3 Free and open-source software 1040 28.3.4 Process assurance 1042 28.4 The entanglement of safety and security 1044 28.4.1 The electronic safety and security of cars 1046 28.4.2 Modernising safety and security regulation 1049 28.4.3 The Cybersecurity Act 2019 1050 28.5 Sustainability 1051 28.5.1 The Sales of goods directive 1052 28.5.2 New research directions 1053 28.6 Summary 1056 Research problems 1057 Further reading 1058 Chapter 29 Beyond “Computer Says No” 1059 Bibliography 1061 Index 1143

    15 in stock

    £43.31

  • CCNA 200301 Network Simulator

    Pearson Education (US) CCNA 200301 Network Simulator

    15 in stock

    Book SynopsisSean Wilkins (@Sean_R_Wilkins) is an accomplished networking consultant and writer for infoDispersion who has been in the IT field for more than 20 years, working with several large enterprises. Sean holds certifications with Cisco (CCNP/CCDP), Microsoft (MCSE), and CompTIA (A+ and Network+). His educational accomplishments include a Masters of Science in Information Technology with a focus in Network Architecture and Design, a Masters of Science in Organizational Management, a Masters Certificate in Network Security, a Bachelors of Science in Computer Networking, and an Associates of Applied Science in Computer Information Systems. Sean spends most of his time writing articles and books for various clients including Cisco Press, Pearson, Tom's IT Pro, and PluralSight, as well as being an active video training author for PluralSight.Table of Contents ICND1 Skill Builders Part I: Navigation and Administration Lab 1: Switch CLI Exec Mode Lab 2: Switch CLI Configuration Process I Lab 3: Switch CLI Configuration Process II Lab 4: Router CLI Exec Mode I Lab 5: Router CLI Exec Mode II Lab 6: Router CLI Configuration Process Lab 7: Setting Switch Passwords Lab 8: Configuring Switch IP Settings Lab 9: Setting Router Passwords Lab 10: Configuring Router IP Settings Lab 11: Configuring Local Usernames Lab 12: Using and Suspending Telnet Connections Lab 13: Configuring SSH Lab 14: Migrating to a New IOS Image Lab 15: Setting the Configuration Register Lab 16: Comparing Configuration Files Lab 17: Examining the IP Routing Table Lab 18: Using debug Lab 19: Testing Using Pings with Hostnames Lab 20: Ignoring the Startup-config File Lab 21: Booting a New Router IOS Lab 22: Terminal History I Lab 23: Terminal History II Lab 24: Topology Analysis Part II: LAN Switching Lab 1: Interface Settings I Lab 2: Interface Settings II Lab 3: Interface Settings III Lab 4: Switch Forwarding I Lab 5: Switch IP Connectivity I Lab 6: VLANs I Lab 7: VLANs II Lab 8: VLANs III Lab 9: Interface Status I Lab 10: Interface Status II Lab 11: Interface Status III Lab 12: Interface Status IV Lab 13: Switch Security I Lab 14: Switch Security II Lab 15: Switch Security III Lab 16: Switch Security IV Part III: IP Addressing, Routing, and WANs Lab 1: Configuring IP Addresses I Lab 2: Configuring IP Addresses II Lab 3: Configuring IP Addresses III Lab 4: Configuring IP Addresses IV Lab 5: Connected Routes Lab 6: Static Routes I Lab 7: Static Routes II Lab 8: Static Routes III Lab 9: Static Routes IV Lab 10: Default Routes Lab 11: IP Classless Lab 12: Subnet Zero I Lab 13: Subnet Zero II Lab 14: Loopback Interfaces Lab 15: RIP Configuration I Lab 16: RIP Configuration II Lab 17: RIP Configuration III Lab 18: RIP Configuration IV Lab 19: RIP Configuration V Lab 20: RIP Configuration VI Lab 21: RIP Verification I Lab 22: RIP Verification II Lab 23: Configuring Hostnames Lab 24: PC IP Commands I Lab 25: PC IP Commands II Lab 26: PC IP Commands III Lab 27: Serial Link Configuration I Lab 28: Serial Link Configuration II Lab 29: Serial Link Configuration III Lab 30: Serial Link Configuration IV Lab 31: Interface Status V Lab 32: Interface Status VI Configuration Scenarios Part I: Navigation and Administration Lab 1: The Initial Configuration Dialogue (Setup) Lab 2: New Job I Lab 3: Rebuild a Configuration Lab 4: SSH and Telnet Part II: LAN Switching Lab 1: Switch Interfaces and Forwarding Lab 2: Switch IP Connectivity Lab 3: Switch Security Lab 4: Configuring VLANs Part III: IP Addressing, Routing, and WANs Lab 1: Subnetting and Addressing I Lab 2: Subnetting and Addressing II Lab 3: Subnetting and Addressing III Lab 4: Static Routing I Lab 5: Static Routing II Lab 6: RIP-2 Configuration I Lab 7: RIP-2 Configuration II Lab 8: RIP Auto-summary Lab 9: Serial Link Configuration I Lab 10: IP and MAC Address Comparisons Lab 11: IP Classless Troubleshooting Scenarios Lab 1: Switch Forwarding I Lab 2: Path Analysis I Lab 3: Port Security Lab 4: Network Discovery I Lab 5: Network Discovery II Lab 6: Addressing and Routing Lab 7: IP Routing I Lab 8: IP Routing II Subnetting Exercises Part I: Subnet ID Calculation Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part II: IP Address Rejection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part III: IP Route Selection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 ICND 2 Skill Builders Part I: VLANs and Trunking Lab 1: VLAN Configuration I Lab 2: VLAN Configuration II Lab 3: VLAN Configuration III Lab 4: VLAN Configuration IV Lab 5: VLAN Configuration V Lab 6: VTP Configuration I Lab 7: VTP Configuration II Lab 8: VTP Configuration III Lab 9: VTP Configuration IV Lab 10: VTP Configuration V Lab 11: Trunking Configuration I Lab 12: Trunking Configuration II Lab 13: Trunking Configuration III Lab 14: Trunking Configuration IV Lab 15: STP Analysis I Lab 16: STP Analysis II Lab 17: STP Configuration I Lab 18: STP Configuration II Lab 19: STP Configuration III Lab 20: EtherChannel Part II: IP Addressing and Routing Lab 1: IP Addressing I Lab 2: IP Addressing II Lab 3: IP Addressing III Lab 4: Traceroute I Lab 5: Default Route I Lab 6: Zero Subnet Lab 7: Switch IP Address Lab 8: ACL I Lab 9: ACL II Lab 10: ACL III Lab 11: ACL IV Lab 12: ACL V Lab 13: ACL VI Lab 14: Named ACL I Lab 15: Named ACL II Lab 16: Named ACL III Lab 17: ACL Analysis I Lab 18: Auto-summary Lab 19: Routing Analysis I Lab 20: Traceroute II Part III: IP Routing Protocols Lab 1: EIGRP Serial Configuration I Lab 2: EIGRP Serial Configuration II Lab 3: EIGRP Serial Configuration III Lab 4: EIGRP Serial Configuration IV Lab 5: EIGRP Serial Configuration V Lab 6: EIGRP Serial Configuration VI Lab 7: EIGRP Frame Relay Configuration I Lab 8: EIGRP Frame Relay Configuration II Lab 9: EIGRP Frame Relay Configuration III Lab 10: EIGRP Authentication I Lab 11: EIGRP Authentication II Lab 12: EIGRP Route Tuning I Lab 13: EIGRP Route Tuning II Lab 14: EIGRP Route Tuning III Lab 15: EIGRP Route Tuning IV Lab 16: EIGRP Neighbors I Lab 17: EIGRP Neighbors II Lab 18: EIGRP Neighbors III Lab 19: OSPF Serial Configuration I Lab 20: OSPF Serial Configuration II Lab 21: OSPF Serial Configuration III Lab 22: OSPF Serial Configuration IV Lab 23: OSPF Serial Configuration V Lab 24: OSPF Serial Configuration VI Lab 25: OSPF Router ID I Lab 26: OSPF Router ID II Lab 27: OSPF Frame Relay Configuration I Lab 28: OSPF Frame Relay Configuration II Lab 29: OSPF Frame Relay Configuration III Lab 30: OSPF Authentication I Lab 31: OSPF Authentication II Lab 32: OSPF Metric Tuning I Lab 33: OSPF Metric Tuning II Lab 34: OSPF Metric Tuning III Lab 35: OSPF Neighbors I Lab 36: OSPF Neighbors II Lab 37: OSPF Neighbors III Lab 38: OSPF Neighbors IV Lab 39: OSPF Neighbors V Part IV: WAN Lab 1: Serial Configuration I Lab 2: Serial Configuration II Lab 3: Serial Authentication I Lab 4: Serial Authentication II Lab 5: Frame Relay Configuration I Lab 6: Frame Relay Configuration II Lab 7: Frame Relay Configuration III Lab 8: Frame Relay Configuration IV Lab 9: Frame Relay Configuration V Lab 10: Frame Relay Verification I Lab 11: Frame Relay Verification II Lab 12: Frame Relay Verification III Part V: Scaling IP Lab 1: NAT Configuration I Lab 2: NAT Configuration II Lab 3: NAT Configuration III Lab 4: NAT Configuration IV Lab 5: NAT Configuration V Lab 6: NAT Configuration VI Lab 7: NAT Configuration VII Lab 8: IPv6 Address Configuration I Lab 9: IPv6 Address Configuration II Lab 10: IPv6 Address Configuration III Lab 11: IPv6 Address Configuration IV Lab 12: IPv6 Address Configuration V Lab 13: IPv6 Address Configuration VI Lab 14: IPv6 Address Configuration VII Lab 15: IPv6 Address Configuration VIII Lab 16: IPv6 Address Configuration IX Lab 17: IPv6 Routing Configuration I Lab 18: IPv6 Routing Configuration II Lab 19: IPv6 Routing Configuration III Lab 20: IPv6 Hostnames Configuration Scenarios Part I: VLANs and Trunking Lab 1: VTP I Lab 2: VTP Transparent Mode Lab 3: VLAN Trunking I Lab 4: VLAN Trunking II Lab 5: STP Analysis I Lab 6: STP Configuration II Part II: IP Addressing and Routing Lab 1: IP Addressing and Configuration I Lab 2: IP Addressing and Configuration II Lab 3: IP Default Routing and IP Classless Lab 4: Default Routes Lab 5: Standard ACL I Lab 6: Extended ACL I Lab 7: Extended ACL II Part III: IP Routing Protocols Lab 1: OSPF Configuration I Lab 2: OSPF Configuration II Lab 3: OSPF Configuration III Lab 4: OSPF Metric Manipulation Lab 5: EIGRP Serial Configuration I Lab 6: EIGRP Configuration II Lab 7: EIGRP Metric Manipulation I Lab 8: EIGRP Variance and Maximum Paths I Part IV: WAN Lab 1: Frame Relay Configuration I Lab 2: Frame Relay Inverse ARP Lab 3: Frame Relay Correlation Part V: Scaling IP Lab 1: NAT Configuration I Lab 2: NAT Configuration II Lab 3: IPv6 Configuration I Lab 4: IPv6 Configuration II Troubleshooting Scenarios Lab 1: Path Analysis Lab 2: Path Analysis II Lab 3: Path Analysis III Lab 4: Path Troubleshooting I Lab 5: Path Troubleshooting II Lab 6: Path Troubleshooting III Lab 7: Path Troubleshooting IV Lab 8: VLAN Troubleshooting I Lab 9: OSPF Troubleshooting I Lab 10: Routing Analysis III Lab 11: Network Expansion Lab 12: NAT Lab 13: IP Routing II Subnetting Exercises Part I: VLSM Overlap Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part II: VLSM Route Selection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7

    15 in stock

    £125.30

  • 24 Deadly Sins of Software Security Programming

    McGraw-Hill Education - Europe 24 Deadly Sins of Software Security Programming

    1 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Eradicate the Most Notorious Insecure Designs and Coding VulnerabilitiesFully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security Table of ContentsPart I: Web Application Sins; Chapter 1: SQL Injection; Chapter 2: Server Side Cross-Site Scripting; Chapter 3: Web-Client Related Vulnerabilities; Part II: Implementation Sins; Chapter 4: Use of Magic URLsChapter 5: Buffer Overruns; Chapter 6: Format String Problems; Chapter 7: Integer Overflows; Chapter 8: C++ Catastrophes; Chapter 9: Catching All Exceptions; Chapter 10: Command Injection; Chapter 11: Failure to Handle Errors; Chapter 12: Information Leakage; Chapter 13: Race Conditions; Chapter 14: Poor Usability; Chapter 15: Not Updating Easily; Part III: Cryptographic Sins; Chapter 16: Not Using Least Priveleges; Chapter 17: Weak Password Systems; Chapter 18: Unauthenticated Key Exchange; Chapter 19: Random Numbers;Part IV: Networking Sins;Chapter 20: Wrong Algorithm; Chapter 21: Failure to Protect Network Traffic; Chapter 22: Trusting Name Resolution; Part V: Stored Data Sins; Chapter 23: Improper Use of SSL/TLS; Chapter 24: Failure to Protect Stored Data

    1 in stock

    £45.74

  • Hacking Exposed 7

    McGraw-Hill Education - Europe Hacking Exposed 7

    1 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The latest tactics for thwarting digital attacksâœOur new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hackerâs mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.â --Brett Wahlin, CSO, Sony Network EntertainmentâœStop taking punches--letâs change the game; itâs time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.â --Shawn Henry, former Executive Assistant Director, FBIBolster your systemâs securiTable of Contents1: Footprinting2: Scanning3: Enumeration4. Hacking Windows5. Hacking UNIX6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded)8: Wireless Devices (Expanded)9: Embedded Systems (NEW)10: Web Hacking11. Countermeasures Map (NEW)Appendix A: PortsAppendix B: Top 14 Security VulnerabilitiesAppendix C: Denial of Service (DoS) Attacks

    1 in stock

    £43.99

  • Networking A Beginners Guide Sixth Edition

    McGraw-Hill Education - Europe Networking A Beginners Guide Sixth Edition

    Out of stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Current, essential IT networking skills--made easy!Thoroughly revised to cover the latest technologies, this practical resource provides you with a solid foundation in networking fundamentals. Networking: A Beginner's Guide, Sixth Edition discusses wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, and virtualization. You'll also get step-by-step instructions for installing, configuring, and managing Windows Server 2012, ExchangeServer 2013, Oracle Linux, and Apache. This is the perfect book for anyone starting a networking career or in need of an easy-to-follow refresher. Understand network cabling, topologies, hardware, and the OSI seven-layer model Connect LANs and WANs Configure netw

    Out of stock

    £44.99

  • Building  Managing a World Class It Help Desk

    McGraw-Hill Education Building Managing a World Class It Help Desk

    15 in stock

    Book SynopsisGet full details on how to set up an efficient help desk using this comprehensive resource. Real-world examples and step-by-step instructions for doing everything from choosing a staff to implementing the latest technologies make this book truly a blueprint for help desk success.

    15 in stock

    £29.99

  • vpns

    McGraw-Hill Education vpns

    15 in stock

    Book SynopsisIdeal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technology to security features of VPN to actual implementations, this book covers it all.

    15 in stock

    £29.99

  • Hackers Challenge

    McGraw-Hill Education Hackers Challenge

    15 in stock

    Book SynopsisFind out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.

    15 in stock

    £19.79

  • Build Your Own Server

    McGraw-Hill Education Build Your Own Server

    15 in stock

    Book SynopsisThe ultimate guide to building your dream system--without spending a lot of money! This step-by-step guide features more than 200 photographs illustrating how to install and configure hardware components and set up a Workgroup, Domain (Active Directory) and VPN network, using Windows 2000/ .NET Server.

    15 in stock

    £19.99

  • Hacking Exposed 5th Edition

    McGraw-Hill Education Hacking Exposed 5th Edition

    Out of stock

    Book SynopsisâœThe seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.â --Bill Machrone, PC Magazine "The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine"For almost any computer book, you can find a clone. But not this one... A one-of-a-kind study of the art of breaking in." --UNIX ReviewHere is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes: Code hacking methods and countermeasures New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web a

    Out of stock

    £34.99

  • 5G Core Networks

    Elsevier Science 5G Core Networks

    1 in stock

    Book SynopsisTable of Contents1. Introduction 2. Drivers for 5G 3. Architecture overview 4. EPC for 5G 5. Key concepts 6. Session management 7. Mobility Management 8. Security 9. Quality-of-Service 10. Policy control and charging 11. Network slicing 12. Dual connectivity 13. Network functions and services 14. Protocols 15. Selected call flows 16. Architecture extensions and vertical industries 17. Future outlook

    1 in stock

    £86.36

  • Computer Networks

    Elsevier Science Computer Networks

    7 in stock

    Book Synopsis

    7 in stock

    £81.42

  • Computer Networks ISE

    Elsevier Science & Technology Computer Networks ISE

    10 in stock

    Book SynopsisProvides a practical understanding of networks and their building blocks through example-based instruction. This title focuses on the why of network design, not just the specifications comprising systems but how key technologies and protocols actually work in the real world to solve specific problems.Table of Contents1. Foundation 2. Getting Connected 3. Internetworking 4. Advanced Internetworking 5. End-to-End Protocols 6. Congestion Control and Resource Allocation 7. End-to-End Data 8. Network Security 9. Applications

    10 in stock

    £49.39

  • The Definitive Guide to ARMÂ CortexÂM0 and

    Elsevier Science The Definitive Guide to ARMÂ CortexÂM0 and

    Out of stock

    Book SynopsisTrade Review"...if you’re new to these components,...buy the book. It will give you the insight you need to be productive on real projects." --EmbeddedTable of Contents1 Introduction 2 Technical Overview 3 Introduction to Embedded Software Development 4 Architecture 5 Instruction Set 6 Instruction Usage Examples 7 Memory System 8 Exceptions and Interrupts 9 System Control and Low Power Features 10 Operating System Support Features 11 Fault Handling 12 Memory Protection Unit (MPU) 13 Debug Features 14 Getting Started with the Keil Microcontroller Development Kit 15 Getting Started with IAR Embedded Workbench for ARM 16 Getting Started with gcc (GNU Compiler Collection) 17 Getting Started with mbed 18 Programming examples 19 Ultra-Low Power Designs 20 Programming with Embedded OS 21 Mixed Language Projects (C/C++ with assembly) 22 Software porting 23 Advanced topics Appendices A Instruction set quick reference B Exception types quick reference C CMSIS-Core quick reference D NVIC, SCB and SysTick registers quick reference E Debug registers quick reference F Debug connector arrangements G Trouble shooting H A breadboard project with an ARM Cortex-M0 microcontroller

    Out of stock

    £48.44

  • Software Defined Networks

    Elsevier Science Software Defined Networks

    1 in stock

    Book SynopsisTrade Review"The editing in general is very good. The figures are very clearly drawn…The authors have done a good job with this up-to-date book for anyone interested in SDN."--Computing ReviewsTable of Contents1. Introduction2. Why SDN?3. Genesis of SDN4. How SDN Works5. The OpenFlow Specification6. Alternative Definitions of SDN7. Emerging Protocol, Controller, and Application Models8. SDN in the Data Center9. SDN in Other Environments10. Network Functions Virtualization11. Players in the SDN Ecosystem12. SDN Applications13. SDN Open Source14. Business Ramifications15. SDN Futures

    1 in stock

    £40.84

  • Computer Networks

    Elsevier Science & Technology Computer Networks

    1 in stock

    Book SynopsisTrade Review"In the book, consisting of 9 chapters, individual chapters can be grouped into three functional blocks. In the first one, the authors present the principles of accessing computer networks and the basic issues of connecting and integrating various network solutions along with the principles of datagram communication. In the second segment of the book, the emphasis is placed on the quality of communication, in particular flow and congestion control, allowing to counteract overload phenomena in communication between end users.... The last chapters of the book concern data formatting, network security and the principles of realization of selected network applications.An important supplement to the book are numerous examples and a large number of exercises and tasks for the readers. The authors add sketchy solutions to some of them. The book gives therefore interesting and useful material for people who want to learn the basics of computer networks operation." --zbMath/European Mathematical Society and the Heidelberg Academy of Sciences and HumanitiesTable of Contents1. Foundation 2. Getting Connected 3. Internetworking 4. Advanced Internetworking 5. End-to-End Protocols 6. Congestion Control and Resource Allocation 7. End-to-End Data 8. Network Security 9. Applications

    1 in stock

    £87.35

  • Quantum Communication Quantum Networks and

    Elsevier Science Quantum Communication Quantum Networks and

    1 in stock

    Book SynopsisTable of Contents1. Introduction 2. Detection theory, information theory, and channel coding fundamentals 3. Quantum information processing fundamentals 4. Quantum information theory 5. Quantum detection and gaussian quantum information theories 6. Quantum key distribution (QKD) 7. Quantum error correction fundamentals 8. Quantum stabilizer codes and beyond 9. Quantum LDPC codes 10. Quantum networks 11. Quantum sensing 12. QIP and machine learning (ML) 13. Fault-tolerant QEC

    1 in stock

    £103.50

  • Foundations of Modern Networking

    Pearson Education (US) Foundations of Modern Networking

    2 in stock

    Book SynopsisDr. William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer security, computer networking, and computer architecture. He has authored 18 textbooks, and, counting revised editions, a total of 70 books on various aspects of these subjects. His writings have appeared in numerous ACM and IEEE publications, including the Proceedings of the IEEE and ACM Computing Reviews. He has 13 times received the award for the best computer science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. Currently, he is an independent consultant whose clients have included compuTable of ContentsPreface xxi PART I MODERN NETWORKING 3 Chapter 1: Elements of Modern Networking 4 1.1 The Networking Ecosystem . . . . . . . . . . . . . . . . . . . 5 1.2 Example Network Architectures . . . . . . . . . . . . . . . . . 7 A Global Network Architecture . . . . . . . . . . . . . . . . . . 7 A Typical Network Hierarchy . . . . . . . . . . . . . . . . . . 9 1.3 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Applications of Ethernet . . . . . . . . . . . . . . . . . . . . 11 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Ethernet Data Rates . . . . . . . . . . . . . . . . . . . . . 14 1.4 Wi-Fi . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Applications of Wi-Fi . . . . . . . . . . . . . . . . . . . . . 19 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Wi-Fi Data Rates . . . . . . . . . . . . . . . . . . . . . . . 21 1.5 4G/5G Cellular . . . . . . . . . . . . . . . . . . . . . . . . 23 First Generation . . . . . . . . . . . . . . . . . . . . . . . 23 Second Generation . . . . . . . . . . . . . . . . . . . . . . 23 Third Generation . . . . . . . . . . . . . . . . . . . . . . . 24 Fourth Generation . . . . . . . . . . . . . . . . . . . . . . 24 Fifth Generation . . . . . . . . . . . . . . . . . . . . . . . 25 1.6 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . 25 Cloud Computing Concepts . . . . . . . . . . . . . . . . . . 26 The Benefits of Cloud Computing . . . . . . . . . . . . . . . . 27 Cloud Networking . . . . . . . . . . . . . . . . . . . . . . 28 Cloud Storage . . . . . . . . . . . . . . . . . . . . . . . . 28 1.7 Internet of Things. . . . . . . . . . . . . . . . . . . . . . . 28 Things on the Internet of Things . . . . . . . . . . . . . . . . 28 Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Layers of the Internet of Things . . . . . . . . . . . . . . . . . 29 1.8 Network Convergence . . . . . . . . . . . . . . . . . . . . 30 1.9 Unified Communications . . . . . . . . . . . . . . . . . . . 33 1.10 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 37 1.11 References . . . . . . . . . . . . . . . . . . . . . . . . . 37 Chapter 2: Requirements and Technology 38 2.1 Types of Network and Internet Traffic . . . . . . . . . . . . . . 39 Elastic Traffic . . . . . . . . . . . . . . . . . . . . . . . . 39 Inelastic Traffic . . . . . . . . . . . . . . . . . . . . . . . 40 Real-Time Traffic Characteristics . . . . . . . . . . . . . . . . 43 2.2 Demand: Big Data, Cloud Computing, and Mobile Traffic . . . . . . 45 Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . 48 Mobile Traffic . . . . . . . . . . . . . . . . . . . . . . . . 51 2.3 Requirements: QoS and QoE . . . . . . . . . . . . . . . . . . 53 Quality of Service . . . . . . . . . . . . . . . . . . . . . . 53 Quality of Experience . . . . . . . . . . . . . . . . . . . . . 54 2.4 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . 55 Packet Forwarding . . . . . . . . . . . . . . . . . . . . . . 56 Routing Protocols . . . . . . . . . . . . . . . . . . . . . . 57 Elements of a Router . . . . . . . . . . . . . . . . . . . . . 59 2.5 Congestion Control . . . . . . . . . . . . . . . . . . . . . . 60 Effects of Congestion . . . . . . . . . . . . . . . . . . . . . 60 Congestion Control Techniques . . . . . . . . . . . . . . . . 64 2.6 SDN and NFV . . . . . . . . . . . . . . . . . . . . . . . . 67 Software-Defined Networking . . . . . . . . . . . . . . . . . 67 Network Functions Virtualization . . . . . . . . . . . . . . . . 69 2.7 Modern Networking Elements . . . . . . . . . . . . . . . . . 71 2.8 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 72 2.9 References . . . . . . . . . . . . . . . . . . . . . . . . . 73 PART II SOFTWARE DEFINED NETWORKS 75 Chapter 3: SDN: Background and Motivation 76 3.1 Evolving Network Requirements . . . . . . . . . . . . . . . . 77 Demand Is Increasing . . . . . . . . . . . . . . . . . . . . . 77 Supply Is Increasing . . . . . . . . . . . . . . . . . . . . . 77 Traffic Patterns Are More Complex . . . . . . . . . . . . . . . 78 Traditional Network Architectures are Inadequate . . . . . . . . . 79 3.2 The SDN Approach . . . . . . . . . . . . . . . . . . . . . . 80 Requirements. . . . . . . . . . . . . . . . . . . . . . . . 80 SDN Architecture . . . . . . . . . . . . . . . . . . . . . . . 81 Characteristics of Software-Defined Networking . . . . . . . . . . 85 3.3 SDN- and NFV-Related Standards . . . . . . . . . . . . . . . 85 Standards-Developing Organizations . . . . . . . . . . . . . . 87 Industry Consortia . . . . . . . . . . . . . . . . . . . . . . 89 Open Development Initiatives . . . . . . . . . . . . . . . . . 89 3.4 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 91 3.5 References . . . . . . . . . . . . . . . . . . . . . . . . . 91 Chapter 4: SDN Data Plane and OpenFlow 92 4.1 SDN Data Plane . . . . . . . . . . . . . . . . . . . . . . . 93 Data Plane Functions . . . . . . . . . . . . . . . . . . . . . 93 Data Plane Protocols . . . . . . . . . . . . . . . . . . . . . 95 4.2 OpenFlow Logical Network Device . . . . . . . . . . . . . . . 95 Flow Table Structure . . . . . . . . . . . . . . . . . . . . . 98 Flow Table Pipeline . . . . . . . . . . . . . . . . . . . . . 102 The Use of Multiple Tables . . . . . . . . . . . . . . . . . . 106 Group Table . . . . . . . . . . . . . . . . . . . . . . . . 107 4.3 OpenFlow Protocol . . . . . . . . . . . . . . . . . . . . . 109 4.4 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 111 Chapter 5: SDN Control Plane 112 5.1 SDN Control Plane Architecture . . . . . . . . . . . . . . . . 113 Control Plane Functions . . . . . . . . . . . . . . . . . . . 113 Southbound Interface . . . . . . . . . . . . . . . . . . . . 116 Northbound Interface . . . . . . . . . . . . . . . . . . . . 117 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . 119 5.2 ITU-T Model . . . . . . . . . . . . . . . . . . . . . . . . 120 5.3 OpenDaylight . . . . . . . . . . . . . . . . . . . . . . . . 122 OpenDaylight Architecture . . . . . . . . . . . . . . . . . . 122 OpenDaylight Helium . . . . . . . . . . . . . . . . . . . . 124 5.4 REST . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 REST Constraints . . . . . . . . . . . . . . . . . . . . . . 128 Example REST API . . . . . . . . . . . . . . . . . . . . . 130 5.5 Cooperation and Coordination Among Controllers . . . . . . . . 133 Centralized Versus Distributed Controllers . . . . . . . . . . . . 133 High-Availability Clusters . . . . . . . . . . . . . . . . . . . 134 Federated SDN Networks . . . . . . . . . . . . . . . . . . . 135 Border Gateway Protocol . . . . . . . . . . . . . . . . . . . 136 Routing and QoS Between Domains . . . . . . . . . . . . . . 137 Using BGP for QoS Management . . . . . . . . . . . . . . . 138 IETF SDNi . . . . . . . . . . . . . . . . . . . . . . . . . 140 OpenDaylight SNDi . . . . . . . . . . . . . . . . . . . . . 141 5.6 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.7 References . . . . . . . . . . . . . . . . . . . . . . . . . 143 Chapter 6: SDN Application Plane 144 6.1 SDN Application Plane Architecture . . . . . . . . . . . . . . 145 Northbound Interface . . . . . . . . . . . . . . . . . . . . 146 Network Services Abstraction Layer . . . . . . . . . . . . . . 146 Network Applications . . . . . . . . . . . . . . . . . . . . 147 User Interface . . . . . . . . . . . . . . . . . . . . . . . 147 6.2 Network Services Abstraction Layer . . . . . . . . . . . . . . 147 Abstractions in SDN . . . . . . . . . . . . . . . . . . . . . 147 Frenetic . . . . . . . . . . . . . . . . . . . . . . . . . . 150 6.3 Traffic Engineering . . . . . . . . . . . . . . . . . . . . . 153 PolicyCop . . . . . . . . . . . . . . . . . . . . . . . . . 153 6.4 Measurement and Monitoring . . . . . . . . . . . . . . . . . 157 6.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . 157 OpenDaylight DDoS Application . . . . . . . . . . . . . . . . 157 6.6 Data Center Networking . . . . . . . . . . . . . . . . . . . 162 Big Data over SDN . . . . . . . . . . . . . . . . . . . . . 163 Cloud Networking over SDN . . . . . . . . . . . . . . . . . 164 6.7 Mobility and Wireless . . . . . . . . . . . . . . . . . . . . 168 6.8 Information-Centric Networking . . . . . . . . . . . . . . . . 168 CCNx . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Use of an Abstraction Layer . . . . . . . . . . . . . . . . . . 170 6.9 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 173 PART III VIRTUALIATION 175 Chapter 7: Network Functions Virtualization: Concepts and Architecture 176 7.1 Background and Motivation for NFV . . . . . . . . . . . . . . 177 7.2 Virtual Machines . . . . . . . . . . . . . . . . . . . . . . 178 The Virtual Machine Monitor. . . . . . . . . . . . . . . . . . 179 Architectural Approaches . . . . . . . . . . . . . . . . . . . 180 Container Virtualization . . . . . . . . . . . . . . . . . . . . 183 7.3 NFV Concepts . . . . . . . . . . . . . . . . . . . . . . . 184 Simple Example of the Use of NFV . . . . . . . . . . . . . . . 188 NFV Principles . . . . . . . . . . . . . . . . . . . . . . . 189 High-Level NFV Framework . . . . . . . . . . . . . . . . . . 190 7.4 NFV Benefits and Requirements . . . . . . . . . . . . . . . . 191 NFV Benefits . . . . . . . . . . . . . . . . . . . . . . . . 191 NFV Requirements . . . . . . . . . . . . . . . . . . . . . 192 7.5 NFV Reference Architecture . . . . . . . . . . . . . . . . . . 193 NFV Management and Orchestration . . . . . . . . . . . . . . 194 Reference Points . . . . . . . . . . . . . . . . . . . . . . 195 Implementation . . . . . . . . . . . . . . . . . . . . . . . 196 7.6 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 197 7.7 References . . . . . . . . . . . . . . . . . . . . . . . . . 197 Chapter 8: NFV Functionality 198 8.1 NFV Infrastructure . . . . . . . . . . . . . . . . . . . . . . 199 Container Interface . . . . . . . . . . . . . . . . . . . . . 199 Deployment of NFVI Containers . . . . . . . . . . . . . . . . 203 Logical Structure of NFVI Domains . . . . . . . . . . . . . . . 204 Compute Domain . . . . . . . . . . . . . . . . . . . . . . 205 Hypervisor Domain . . . . . . . . . . . . . . . . . . . . . 208 Infrastructure Network Domain . . . . . . . . . . . . . . . . 209 8.2 Virtualized Network Functions . . . . . . . . . . . . . . . . . 213 VNF Interfaces . . . . . . . . . . . . . . . . . . . . . . . 213 VNFC to VNFC Communication . . . . . . . . . . . . . . . . 215 VNF Scaling . . . . . . . . . . . . . . . . . . . . . . . . 216 8.3 NFV Management and Orchestration . . . . . . . . . . . . . . 217 Virtualized Infrastructure Manager . . . . . . . . . . . . . . . 217 Virtual Network Function Manager . . . . . . . . . . . . . . . 218 NFV Orchestrator . . . . . . . . . . . . . . . . . . . . . . 219 Repositories . . . . . . . . . . . . . . . . . . . . . . . . 219 Element Management . . . . . . . . . . . . . . . . . . . . 220 OSS/BSS . . . . . . . . . . . . . . . . . . . . . . . . . 220 8.4 NFV Use Cases . . . . . . . . . . . . . . . . . . . . . . . 221 Architectural Use Cases . . . . . . . . . . . . . . . . . . . 222 Service-Oriented Use Cases . . . . . . . . . . . . . . . . . 223 8.5 SDN and NFV . . . . . . . . . . . . . . . . . . . . . . . . 225 8.6 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 228 8.7 References . . . . . . . . . . . . . . . . . . . . . . . . . 229 Chapter 9: Network Virtualization 230 9.1 Virtual LANs . . . . . . . . . . . . . . . . . . . . . . . . 231 The Use of Virtual LANs . . . . . . . . . . . . . . . . . . . 234 Defining VLANs . . . . . . . . . . . . . . . . . . . . . . . 235 Communicating VLAN Membership . . . . . . . . . . . . . . 236 IEEE 802.1Q VLAN Standard . . . . . . . . . . . . . . . . . 237 Nested VLANs . . . . . . . . . . . . . . . . . . . . . . . 239 9.2 OpenFlow VLAN Support . . . . . . . . . . . . . . . . . . . 240 9.3 Virtual Private Networks . . . . . . . . . . . . . . . . . . . 241 IPsec VPNs . . . . . . . . . . . . . . . . . . . . . . . . 241 MPLS VPNs . . . . . . . . . . . . . . . . . . . . . . . . 243 9.4 Network Virtualization . . . . . . . . . . . . . . . . . . . . 247 A Simplified Example . . . . . . . . . . . . . . . . . . . . 248 Network Virtualization Architecture . . . . . . . . . . . . . . . 250 Benefits of Network Virtualization . . . . . . . . . . . . . . . 252 9.5 OpenDaylight's Virtual Tenant Network. . . . . . . . . . . . . 253 9.6 Software-Defined Infrastructure . . . . . . . . . . . . . . . . 257 Software-Defined Storage . . . . . . . . . . . . . . . . . . 259 SDI Architecture . . . . . . . . . . . . . . . . . . . . . . 261 9.7 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 263 9.8 References . . . . . . . . . . . . . . . . . . . . . . . . . 263 PART IV DEFINING AND SUPPORTING USER NEEDS 265 Chapter 10: Quality of Service 266 10.1 Background . . . . . . . . . . . . . . . . . . . . . . . . 267 10.2 QoS Architectural Framework . . . . . . . . . . . . . . . . 268 Data Plane . . . . . . . . . . . . . . . . . . . . . . . . . 269 Control Plane . . . . . . . . . . . . . . . . . . . . . . . . 271 Management Plane . . . . . . . . . . . . . . . . . . . . . 272 10.3 Integrated Services Architecture . . . . . . . . . . . . . . . 273 ISA Approach . . . . . . . . . . . . . . . . . . . . . . . . 273 ISA Components . . . . . . . . . . . . . . . . . . . . . . 274 ISA Services . . . . . . . . . . . . . . . . . . . . . . . . 276 Queuing Discipline . . . . . . . . . . . . . . . . . . . . . 277 10.4 Differentiated Services . . . . . . . . . . . . . . . . . . . 279 Services . . . . . . . . . . . . . . . . . . . . . . . . . . 281 DiffServ Field . . . . . . . . . . . . . . . . . . . . . . . . 282 DiffServ Configuration and Operation . . . . . . . . . . . . . . 284 Per-Hop Behavior . . . . . . . . . . . . . . . . . . . . . . 286 Default Forwarding PHB . . . . . . . . . . . . . . . . . . . 287 10.5 Service Level Agreements . . . . . . . . . . . . . . . . . . 291 10.6 IP Performance Metrics . . . . . . . . . . . . . . . . . . . 293 10.7 OpenFlow QoS Support . . . . . . . . . . . . . . . . . . . 296 Queue Structures . . . . . . . . . . . . . . . . . . . . . . 296 Meters . . . . . . . . . . . . . . . . . . . . . . . . . . 297 10.8 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . 299 10.9 References . . . . . . . . . . . . . . . . . . . . . . . . 299 Chapter 11: QoE: User Quality of Experience 300 11.1 Why QoE? . . . . . . . . . . . . . . . . . . . . . . . . 301 Online Video Content Delivery . . . . . . . . . . . . . . . . . 302 11.2 Service Failures Due to Inadequate QoE Considerations . . . . . 304 11.3 QoE-Related Standardization Projects . . . . . . . . . . . . . 304 11.4 Definition of Quality of Experience . . . . . . . . . . . . . . . 305 Definition of Quality . . . . . . . . . . . . . . . . . . . . . 306 Definition of Experience . . . . . . . . . . . . . . . . . . . 306 Quality Formation Process . . . . . . . . . . . . . . . . . . 307 Definition of Quality of Experience . . . . . . . . . . . . . . . 308 11.5 QoE Strategies in Practice . . . . . . . . . . . . . . . . . . 308 The QoE/QoS Layered Model . . . . . . . . . . . . . . . . . 308 Summarizing and Merging the QoE/QoS Layers . . . . . . . . . 310 11.6 Factors Influencing QoE . . . . . . . . . . . . . . . . . . . 311 11.7 Measurements of QoE . . . . . . . . . . . . . . . . . . . 312 Subjective Assessment . . . . . . . . . . . . . . . . . . . . 312 Objective Assessment . . . . . . . . . . . . . . . . . . . . 314 End-User Device Analytics . . . . . . . . . . . . . . . . . . 315 Summarizing the QoE Measurement Methods . . . . . . . . . . 316 11.8 Applications of QoE . . . . . . . . . . . . . . . . . . . . 317 11.9 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . 319 11.10 References . . . . . . . . . . . . . . . . . . . . . . . . 320 Chapter 12: Network Design Implications of QoS and QoE 322 12.1 Classification of QoE/QoS Mapping Models . . . . . . . . . . 323 Black-Box Media-Based QoS/QoE Mapping Models . . . . . . . 323 Glass-Box Parameter-Based QoS/QoE Mapping Models . . . . . . 325 Gray-Box QoS/QoE Mapping Models . . . . . . . . . . . . . . 326 Tips for QoS/QoE Mapping Model Selection . . . . . . . . . . . 327 12.2 IP-Oriented Parameter-Based QoS/QoE Mapping Models . . . . . 327 Network Layer QoE/QoS Mapping Models for Video Services . . . . 328 Application Layer QoE/QoS Mapping Models for Video Services . . 328 12.3 Actionable QoE over IP-Based Networks . . . . . . . . . . . . 330 The System-Oriented Actionable QoE Solution . . . . . . . . . . 330 The Service-Oriented Actionable QoE Solution . . . . . . . . . . 331 12.4 QoE Versus QoS Service Monitoring . . . . . . . . . . . . . . 332 QoS Monitoring Solutions. . . . . . . . . . . . . . . . . . . 334 QoE Mo

    2 in stock

    £42.27

  • Switching Routing and Wireless Essentials Course

    Pearson Education (US) Switching Routing and Wireless Essentials Course

    15 in stock

    Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.Table of ContentsIntroduction xxviii Chapter 1 Basic Device Configuration 1 Introduction - 1.0 1 Why should I take this module? - 1.0.1 1 What will I learn to do in this module? - 1.0.2 1 Configure a Switch with Initial Settings - 1.1 1 Switch Boot Sequence - 1.1.1 1 The boot system Command - 1.1.2 2 Switch LED Indicators - 1.1.3 2 Recovering from a System Crash - 1.1.4 4 Switch Management Access - 1.1.5 5 Switch SVI Configuration Example - 1.1.6 5 Lab: Basic Switch Configuration - 1.1.7 6 Configure Switch Ports - 1.2 7 Duplex Communication - 1.2.1 7 Configure Switch Ports at the Physical Layer - 1.2.2 7 Auto-MDIX - 1.2.3 8 Switch Verification Commands - 1.2.4 9 Verify Switch Port Configuration - 1.2.5 9 Network Access Layer Issues - 1.2.6 10 Interface Input and Output Errors - 1.2.7 12 Troubleshooting Network Access Layer Issues - 1.2.8 13 Syntax Checker - Configure Switch Ports - 1.2.9 13 Secure Remote Access - 1.3 13 Telnet Operation - 1.3.1 13 SSH Operation - 1.3.2 14 Verify the Switch Supports SSH - 1.3.3 14 Configure SSH - 1.3.4 14 Verify SSH is Operational - 1.3.5 16 Packet Tracer - Configure SSH - 1.3.6 16 Basic Router Configuration - 1.4 17 Configure Basic Router Settings - 1.4.1 17 Syntax Checker - Configure Basic Router Settings - 1.4.2 18 Dual Stack Topology - 1.4.3 18 Configure Router Interfaces - 1.4.4 18 Syntax Checker - Configure Router Interfaces - 1.4.5 19 IPv4 Loopback Interfaces - 1.4.6 19 Packet Tracer - Configure Router Interfaces - 1.4.7 20 Verify Directly Connected Networks - 1.5 20 Interface Verification Commands - 1.5.1 20 Verify Interface Status - 1.5.2 20 Verify IPv6 Link Local and Multicast Addresses - 1.5.3 21 Verify Interface Configuration - 1.5.4 22 Verify Routes - 1.5.5 22 Filter Show Command Output - 1.5.6 24 Syntax Checker - Filter Show Command Output - 1.5.7 26 Command History Feature - 1.5.8 26 Syntax Checker - Command History Features - 1.5.9 26 Packet Tracer - Verify Directly Connected Networks - 1.5.10 26 Check Your Understanding - Verify Directly Connected Networks - 1.5.11 27 Module Practice and Quiz - 1.6 27 Packet Tracer - Implement a Small Network - 1.6.1 27 Lab - Configure Basic Router Settings - 1.6.2 27 What did I learn in this module? - 1.6.3 27 Chapter Quiz - Basic Device Configuration 29 Your Chapter Notes 29 Chapter 2 Switching Concepts 31 Introduction - 2.0 31 Why should I take this module? - 2.0.1 31 What will I learn to do in this module? - 2.0.2 31 Frame Forwarding - 2.1 31 Switching in Networking - 2.1.1 31 The Switch MAC Address Table - 2.1.2 32 The Switch Learn and Forward Method - 2.1.3 32 Video - MAC Address Tables on Connected Switches - 2.1.4 33 Switching Forwarding Methods - 2.1.5 33 Store-and-Forward Switching - 2.1.6 33 Cut-Through Switching - 2.1.7 33 Activity - Switch It! 34 Switching Domains - 2.2 34 Collision Domains - 2.2.1 34 Broadcast Domains - 2.2.2 34 Alleviate Network Congestion - 2.2.3 35 Check Your Understanding - Switching Domains - 2.2.4 36 Module Practice and Quiz - 2.3 36 What did I learn in this module? - 2.3.1 36 Chapter Quiz - Switching Concepts 37 Your Chapter Notes 37 Chapter 3 VLANs 39 Introduction - 3.0 39 Why should I take this module? - 3.0.1 39 What will I learn to do in this module? - 3.0.2 39 Overview of VLANs - 3.1 39 VLAN Definitions - 3.1.1 39 Benefits of a VLAN Design - 3.1.2 40 Types of VLANs - 3.1.3 41 Packet Tracer - Who Hears the Broadcast? - 3.1.4 43 Check Your Understanding - Overview of VLANs - 3.1.5 43 VLANs in a Multi-Switched Environment - 3.2 43 Defining VLAN Trunks - 3.2.1 43 Network without VLANs - 3.2.2 43 Network with VLANs - 3.2.3 43 VLAN Identification with a Tag - 3.2.4 44 Native VLANs and 802.1Q Tagging - 3.2.5 44 Voice VLAN Tagging - 3.2.6 45 Voice VLAN Verification Example - 3.2.7 46 Packet Tracer - Investigate a VLAN Implementation - 3.2.8 46 Check Your Understanding - VLANs in a Multi-Switch Environment - 3.2.9 46 VLAN Configuration - 3.3 46 VLAN Ranges on Catalyst Switches - 3.3.1 46 VLAN Creation Commands - 3.3.2 48 VLAN Creation Example - 3.3.3 48 VLAN Port Assignment Commands - 3.3.4 48 VLAN Port Assignment Example - 3.3.5 49 Data and Voice VLANs - 3.3.6 49 Data and Voice VLAN Example - 3.3.7 49 Verify VLAN Information - 3.3.8 50 Change VLAN Port Membership - 3.3.9 51 Delete VLANs - 3.3.10 52 Syntax Checker - VLAN Configuration - 3.3.11 53 Packet Tracer - VLAN Configuration - 3.3.12 53 VLAN Trunks - 3.4 53 Trunk Configuration Commands - 3.4.1 53 Trunk Configuration Example - 3.4.2 54 Verify Trunk Configuration - 3.4.3 54 Reset the Trunk to the Default State - 3.4.4 55 Packet Tracer - Configure Trunks - 3.4.5 56 Lab - Configure VLANs and Trunking - 3.4.6 57 Dynamic Trunking Protocol - 3.5 57 Introduction to DTP - 3.5.1 57 Negotiated Interface Modes - 3.5.2 58 Results of a DTP Configuration - 3.5.3 58 Verify DTP Mode - 3.5.4 59 Packet Tracer - Configure DTP - 3.5.5 59 Check Your Understanding - Dynamic Trunking Protocol - 3.5.6 59 Module Practice and Quiz - 3.6 59 Packet Tracer - Implement VLANs and Trunking - 3.6.1 59 Lab - Implement VLANs and Trunking - 3.6.2 60 What did I learn in this module? - 3.6.3 60 Chapter Quiz - VLANs 62 Your Chapter Notes 62 Chapter 4 Inter-VLAN Routing 63 Introduction - 4.0 63 Why should I take this module? - 4.0.1 63 What will I learn to do in this module? - 4.0.2 63 Inter-VLAN Routing Operation - 4.1 63 What is Inter-VLAN Routing? - 4.1.1 63 Legacy Inter-VLAN Routing - 4.1.2 64 Router-on-a-Stick Inter-VLAN Routing - 4.1.3 64 Inter-VLAN Routing on a Layer 3 Switch - 4.1.4 65 Check Your Understanding - Inter-VLAN Routing Operation - 4.1.5 66 Router-on-a-Stick Inter-VLAN Routing - 4.2 66 Router-on-a-Stick Scenario - 4.2.1 66 S1 VLAN and Trunking Configuration - 4.2.2 66 S2 VLAN and Trunking Configuration - 4.2.3 68 R1 Subinterface Configuration - 4.2.4 69 Verify Connectivity Between PC1 and PC2 - 4.2.5 70 Router-on-a-Stick Inter-VLAN Routing Verification - 4.2.6 71 Packet Tracer - Configure Router-on-a-Stick Inter-VLAN Routing - 4.2.7 73 Lab - Configure Router-on-a-Stick Inter-VLAN Routing - 4.2.8 74 Inter-VLAN Routing using Layer 3 Switches - 4.3 74 Layer 3 Switch Inter-VLAN Routing - 4.3.1 74 Layer 3 Switch Scenario - 4.3.2 74 Layer 3 Switch Configuration - 4.3.3 75 Layer 3 Switch Inter-VLAN Routing Verification - 4.3.4 76 Routing on a Layer 3 Switch - 4.3.5 77 Routing Scenario on a Layer 3 Switch - 4.3.6 77 Routing Configuration on a Layer 3 Switch - 4.3.7 77 Packet Tracer - Configure Layer 3 Switching and Inter-VLAN Routing - 4.3.8 80 Troubleshoot Inter-VLAN Routing - 4.4 80 Common Inter-VLAN Issues - 4.4.1 80 Troubleshoot Inter-VLAN Routing Scenario - 4.4.2 81 Missing VLANs - 4.4.3 81 Switch Trunk Port Issues - 4.4.4 84 Switch Access Port Issues - 4.4.5 85 Router Configuration Issues - 4.4.6 87 Check Your Understanding - Troubleshoot Inter-VLAN Routing - 4.4.7 89 Packet Tracer - Troubleshoot Inter-VLAN Routing - 4.4.8 89 Lab - Troubleshoot Inter-VLAN Routing - 4.4.9 89 Module Practice and Quiz - 4.5 89 Packet Tracer - Inter-VLAN Routing Challenge - 4.5.1 89 Lab - Implement Inter-VLAN Routing - 4.5.2 89 What did I learn in this module? - 4.5.3 89 Chapter Quiz - Inter-VLAN Routing 92 Your Chapter Notes 92 Chapter 5 STP Concepts 93 Introduction - 5.0 93 Why should I take this module? - 5.0.1 93 What will I learn to do in this module? - 5.0.2 93 Purpose of STP - 5.1 94 Redundancy in Layer 2 Switched Networks - 5.1.1 94 Spanning Tree Protocol - 5.1.2 94 STP Recalculation - 5.1.3 94 Issues with Redundant Switch Links - 5.1.4 94 Layer 2 Loops - 5.1.5 94 Broadcast Storm - 5.1.6 95 The Spanning Tree Algorithm - 5.1.7 95 Video - Observe STP Operation - 5.1.8 97 Packet Tracer - Investigate STP Loop Prevention - 5.1.9 97 Check Your Understanding - Purpose of STP - 5.1.10 97 STP Operations - 5.2 97 Steps to a Loop-Free Topology - 5.2.1 97 1. Elect the Root Bridge - 5.2.2 98 Impact of Default BIDs - 5.2.3 98 Determine the Root Path Cost - 5.2.4 99 2. Elect the Root Ports - 5.2.5 99 3. Elect Designated Ports - 5.2.6 100 4. Elect Alternate (Blocked) Ports - 5.2.7 100 Elect a Root Port from Multiple Equal-Cost Paths - 5.2.8 100 STP Timers and Port States - 5.2.9 101 Operational Details of Each Port State - 5.2.10 102 Per-VLAN Spanning Tree - 5.2.11 103 Check Your Understanding - STP Operations - 5.2.12 103 Evolution of STP - 5.3 103 Different Versions of STP - 5.3.1 103 RSTP Concepts - 5.3.2 104 RSTP Port States and Port Roles - 5.3.3 104 PortFast and BPDU Guard - 5.3.4 105 Alternatives to STP - 5.3.5 105 Check Your Understanding - Evolution of STP - 5.3.6 106 Module Practice and Quiz - 5.4 106 What did I learn in this module? - 5.4.1 106 Chapter Quiz - STP Concepts 109 Your Chapter Notes 109 Chapter 6 EtherChannel 111 Introduction - 6.0 111 Why should I take this module? - 6.0.1 111 What will I learn to do in this module? - 6.0.2 111 EtherChannel Operation - 6.1 111 Link Aggregation - 6.1.1 111 EtherChannel - 6.1.2 112 Advantages of EtherChannel - 6.1.3 112 Implementation Restrictions - 6.1.4 112 AutoNegotiation Protocols - 6.1.5 113 PAgP Operation - 6.1.6 113 PAgP Mode Settings Example - 6.1.7 114 LACP Operation - 6.1.8 114 LACP Mode Settings Example - 6.1.9 115 Check Your Understanding - EtherChannel Operation 116 Configure EtherChannel - 6.2 116 Configuration Guidelines - 6.2.1 116 LACP Configuration Example - 6.2.2 116 Syntax Checker - Configure EtherChannel - 6.2.3 117 Packet Tracer - Configure EtherChannel 117 Verify and Troubleshoot EtherChannel - 6.3 117 Verify EtherChannel - 6.3.1 117 Common Issues with EtherChannel Configurations - 6.3.2 120 Troubleshoot EtherChannel Example - 6.3.3 120 Packet Tracer - Troubleshoot EtherChannel - 6.3.4 123 Module Practice and Quiz - 6.4 123 Packet Tracer - Implement EtherChannel - 6.4.1 123 Lab - Implement EtherChannel - 6.4.2 124 What did I learn in this module? - 6.4.3 124 Chapter Quiz - EtherChannel 126 Your Chapter Notes 126 Chapter 7 DHCPv4 127 Introduction - 7.0 127 Why should I take this module? - 7.0.1 127 What will I learn to do in this module? - 7.0.2 127 DHCPv4 Concepts - 7.1 127 DHCPv4 Server and Client - 7.1.1 127 DHCPv4 Operation - 7.1.2 128 Steps to Obtain a Lease - 7.1.3 128 Steps to Renew a Lease - 7.1.4 129 Check Your Understanding - DHCPv4 Concepts - 7.1.5 130 Configure a Cisco IOS DHCPv4 Server - 7.2 130 Cisco IOS DHCPv4 Server - 7.2.1 130 Steps to Configure a Cisco IOS DHCPv4 Server - 7.2.2 130 Configuration Example - 7.2.3 131 DHCPv4 Verification Commands - 7.2.4 132 Verify DHCPv4 is Operational - 7.2.5 132 Syntax Checker - Configure DHCPv4 - 7.2.6 134 Disable the Cisco IOS DHCPv4 Server - 7.2.7 134 DHCPv4 Relay - 7.2.8 135 Other Service Broadcasts Relayed - 7.2.9 137 Packet Tracer - Configure DHCPv4 - 7.2.10 137 Configure a DHCPv4 Client - 7.3 137 Cisco Router as a DHCPv4 Client - 7.3.1 137 Configuration Example - 7.3.2 138 Home Router as a DHCPv4 Client - 7.3.3 138 Syntax Checker - Configure a Cisco Router as DHCP Client - 7.3.4 138 Module Practice and Quiz - 7.4 138 Packet Tracer - Implement DHCPv4 - 7.4.1 138 Lab - Implement DHCPv4 - 7.4.2 139 What did I learn in this module? - 7.4.3 139 Chapter Quiz - DHCPv4 141 Your Chapter Notes 141 Chapter 8 SLAAC and DHCPv6 143 Introduction - 8.0 143 Welcome - 8.0.1 143 What will I learn to do in this module? - 8.0.2 143 IPv6 GUA Assignment - 8.1 143 IPv6 Host Configuration - 8.1.1 143 IPv6 Host Link-Local Address - 8.1.2 144 IPv6 GUA Assignment - 8.1.3 144 Three RA Message Flags - 8.1.4 145 Check Your Understanding - IPv6 GUA Assignment - 8.1.5 145 SLAAC - 8.2 145 SLAAC Overview - 8.2.1 145 Enabling SLAAC - 8.2.2 146 SLAAC Only Method - 8.2.3 147 ICMPv6 RS Messages - 8.2.4 147 Host Process to Generate Interface ID - 8.2.5 148 Duplicate Address Detection - 8.2.6 148 Check Your Understanding - SLAAC - 8.2.7 149 DHCPv6 - 8.3 149 DHCPv6 Operation Steps - 8.3.1 149 Stateless DHCPv6 Operation - 8.3.2 150 Enable Stateless DHCPv6 on an Interface - 8.3.3 151 Stateful DHCPv6 Operation - 8.3.4 151 Enable Stateful DHCPv6 on an Interface - 8.3.5 152 Check Your Understanding - DHCPv6 - 8.3.6 152 Configure DHCPv6 Server - 8.4 152 DHCPv6 Router Roles - 8.4.1 152 Configure a Stateless DHCPv6 Server - 8.4.2 153 Configure a Stateless DHCPv6 Client - 8.4.3 155 Configure a Stateful DHCPv6 Server - 8.4.4 157 Configure a Stateful DHCPv6 Client - 8.4.5 160 DHCPv6 Server Verification Commands - 8.4.6 162 Configure a DHCPv6 Relay Agent - 8.4.7 163 Verify the DHCPv6 Relay Agent - 8.4.8 164 Check Your Understanding - Configure DHCPv6 Server - 8.4.9 165 Module Practice and Quiz - 8.5 165 Lab - Configure DHCPv6 - 8.5.1 165 What did I learn in this module? - 8.5.2 166 Chapter Quiz - SLAAC and DHCPv6 168 Your Chapter Notes 168 Chapter 9 FHRP Concepts 169 Introduction - 9.0 169 Why should I take this module? - 9.0.1 169 What will I learn to do in this module? - 9.0.2 169 First Hop Redundancy Protocols - 9.1 169 Default Gateway Limitations - 9.1.1 169 Router Redundancy - 9.1.2 170 Steps for Router Failover - 9.1.3 171 FHRP Options - 9.1.4 171 Check Your Understanding - First Hop Redundancy Protocols - 9.1.5 172 HSRP - 9.2 172 HSRP Overview - 9.2.1 172 HSRP Priority and Preemption - 9.2.2 172 HSRP States and Timers - 9.2.3 173 Check Your Understanding - 9.2.4 174 Module Practice and Quiz - 9.3 174 What did I learn in this module? - 9.3.1 174 Chapter Quiz - FHRP Concepts 176 Packet Tracer - HSRP Configuration Guide 176 Your Chapter Notes 176 Chapter 10 LAN Security Concepts 177 Introduction - 10.0 177 Why should I take this module? - 10.0.1 177 What will I learn in this module? - 10.0.2 177 Endpoint Security - 10.1 177 Network Attacks Today - 10.1.1 177 Network Security Devices - 10.1.2 178 Endpoint Protection - 10.1.3 178 Cisco Email Security Appliance - 10.1.4 179 Cisco Web Security Appliance - 10.1.5 179 Check Your Understanding - Endpoint Security 180 Access Control - 10.2 180 Authentication with a Local Password - 10.2.1 180 AAA Components - 10.2.2 181 Authentication - 10.2.3 181 Authorization - 10.2.4 181 Accounting - 10.2.5 181 802.1X - 10.2.6 182 Check Your Understanding - Access Control - 10.2.7 182 Layer 2 Security Threats 182 Layer 2 Vulnerabilities - 10.3.1 182 Switch Attack Categories - 10.3.2 183 Switch Attack Mitigation Techniques - 10.3.3 183 Check Your Understanding - Layer 2 Security Threats - 10.3.4 184 MAC Address Table Attack - 10.4 184 Switch Operation Review - 10.4.1 184 MAC Address Table Flooding - 10.4.2 184 MAC Address Table Attack Mitigation - 10.4.3 185 Check Your Understanding - MAC Address Table Attacks - 10.4.4 186 LAN Attacks - 10.5 186 Video - VLAN and DHCP Attacks - 10.5.1 186 VLAN Hopping Attacks - 10.5.2 186 VLAN Double-Tagging Attack - 10.5.3 186 DHCP Messages - 10.5.4 187 DHCP Attacks - 10.5.5 187 Video - ARP Attacks, STP Attacks, and CDP Reconnaissance - 10.5.6 188 ARP Attacks - 10.5.7 188 Address Spoofing Attack - 10.5.8 189 STP Attack - 10.5.9 190 CDP Reconnaissance - 10.5.10 190 Check Your Understanding - LAN Attacks - 10.5.11 191 Module Practice and Quiz - 10.6 191 What did I learn in this module? - 10.6.1 191 Chapter Quiz - LAN Security Concepts 193 Your Chapter Notes 193 Chapter 11 Switch Security Configuration 195 Introduction - 11.0 195 Why should I take this module? - 11.0.1 195 What will I learn in this module? - 11.0.2 195 Implement Port Security - 11.1 195 Secure Unused Ports - 11.1.1 195 Mitigate MAC Address Table Attacks - 11.1.2 196 Enable Port Security - 11.1.3 196 Limit and Learn MAC Addresses - 11.1.4 198 Port Security Aging - 11.1.5 200 Port Security Violation Modes - 11.1.6 201 Ports in error-disabled State - 11.1.7 202 Verify Port Security - 11.1.8 203 Syntax Checker - Implement Port Security - 11.1.9 205 Packet Tracer - Implement Port Security 205 Mitigate VLAN Attacks - 11.2 206 VLAN Attacks Review - 11.2.1 206 Steps to Mitigate VLAN Hopping Attacks - 11.2.2 206 Syntax Checker - Mitigate VLAN Hopping Attacks - 11.2.3 207 Mitigate DHCP Attacks - 11.3 207 DHCP Attack Review - 11.3.1 207 DHCP Snooping - 11.3.2 207 Steps to Implement DHCP Snooping - 11.3.3 208 DHCP Snooping Configuration Example - 11.3.4 208 Syntax Checker - Mitigate DHCP Attacks - 11.3.5 209 Mitigate ARP Attacks - 11.4 210 Dynamic ARP Inspection - 11.4.1 210 DAI Implementation Guidelines - 11.4.2 210 DAI Configuration Example - 11.4.3 210 Syntax Checker - Mitigate ARP Attacks - 11.4.4 211 Mitigate STP Attacks - 11.5 211 PortFast and BPDU Guard - 11.5.1 211 Configure PortFast - 11.5.2 212 Configure BPDU Guard - 11.5.3 213 Syntax Checker - Mitigate STP Attacks - 11.5.4 214 Module Practice and Quiz - 11.6 214 Packet Tracer - Switch Security Configuration - 11.6.1 214 Lab - Switch Security Configuration - 11.6.2 215 What did I learn in this module? - 11.6.3 215 Chapter Quiz - Switch Security Configuration 217 Your Chapter Notes 217 Chapter 12 WLAN Concepts 219 Introduction - 12.0 219 Why should I take this module? - 12.0.1 219 What will I learn in this module? - 12.0.2 219 Introduction to Wireless - 12.1 219 Benefits of Wireless - 12.1.1 219 Types of Wireless Networks - 12.1.2 220 Wireless Technologies - 12.1.3 220 802.11 Standards - 12.1.4 221 Radio Frequencies - 12.1.5 222 Wireless Standards Organizations - 12.1.6 223 Check Your Understanding - Introduction to Wireless - 12.1.7 223 WLAN Components - 12.2 223 Video - WLAN Components - 12.2.1 223 Wireless NICs - 12.2.2 223 Wireless Home Router - 12.2.3 224 Wireless Access Points - 12.2.4 224 AP Categories - 12.2.5 224 Wireless Antennas - 12.2.6 225 Check Your Understanding - WLAN Components - 12.2.7 226 WLAN Operation - 12.3 226 Video - WLAN Operation - 12.3.1 226 802.11 Wireless Topology Modes - 12.3.2 226 BSS and ESS - 12.3.3 226 802.11 Frame Structure - 12.3.4 227 CSMA/CA - 12.3.5 227 Wireless Client and AP Association - 12.3.6 228 Passive and Active Discover Mode - 12.3.7 229 Check Your Understanding - WLAN Operation - 12.3.8 229 CAPWAP Operation - 12.4 229 Video - CAPWAP - 12.4.1 229 Introduction to CAPWAP - 12.4.2 229 Split MAC Architecture - 12.4.3 230 DTLS Encryption - 12.4.4 230 FlexConnect APs - 12.4.5 230 Check Your Understanding - CAPWAP Operation - 12.4.6 231 Channel Management - 12.5 231 Frequency Channel Saturation - 12.5.1 231 Channel Selection - 12.5.2 231 Plan a WLAN Deployment - 12.5.3 232 Check Your Understanding - Channel Management - 12.5.4 233 WLAN Threats - 12.6 233 Video - WLAN Threats - 12.6.1 233 Wireless Security Overview - 12.6.2 233 DoS Attacks - 12.6.3 233 Rogue Access Points - 12.6.4 234 Man-in-the-Middle Attack - 12.6.5 234 Check Your Understanding - WLAN Threats - 12.6.6 234 Secure WLANs - 12.7 234 Video - Secure WLANs - 12.7.1 234 SSID Cloaking and MAC Address Filtering - 12.7.2 235 802.11 Original Authentication Methods - 12.7.3 235 Shared Key Authentication Methods - 12.7.4 235 Authenticating a Home User - 12.7.5 236 Encryption Methods - 12.7.6 236 Authentication in the Enterprise - 12.7.7 237 WPA3 - 12.7.8 237 Check Your Understanding - Secure WLANs - 12.7.9 238 Module Practice and Quiz - 12.8 238 What did I learn in this module? - 12.8.1 238 Chapter Quiz - WLAN Concepts 241 Your Chapter Notes 241 Chapter 13 WLAN Configuration 243 Introduction - 13.0 243 Why should I take this module? - 13.0.1 243 What will I learn to do in this module? - 13.0.2 243 Remote Site WLAN Configuration - 13.1 243 Video - Configure a Wireless Network - 13.1.1 243 The Wireless Router - 13.1.2 244 Log in to the Wireless Router - 13.1.3 244 Basic Network Setup - 13.1.4 244 Basic Wireless Setup - 13.1.5 245 Configure a Wireless Mesh Network - 13.1.6 247 NAT for IPv4 - 13.1.7 247 Quality of Service - 13.1.8 247 Port Forwarding - 13.1.9 248 Packet Tracer - Configure a Wireless Network - 13.1.10 248 Lab - Configure a Wireless Network - 13.1.11 248 Configure a Basic WLAN on the WLC - 13.2 248 Video - Configure a Basic WLAN on the WLC - 13.2.1 248 WLC Topology - 13.2.2 249 Log in to the WLC - 13.2.3 249 View AP Information - 13.2.4 249 Advanced Settings - 13.2.5 250 Configure a WLAN - 13.2.6 250 Packet Tracer - Configure a Basic WLAN on the WLC - 13.2.7 252 Configure a WPA2 Enterprise WLAN on the WLC - 13.3 252 Video - Define an SNMP and RADIUS Server on the WLC - 13.3.1 252 SNMP and RADIUS - 13.3.2 252 Configure SNMP Server Information - 13.3.3 253 Configure RADIUS Server Information - 13.3.4 253 Video - Configure a VLAN for a New WLAN - 13.3.5 253 Topology with VLAN 5 Addressing - 13.3.6 253 Configure a New Interface - 13.3.7 254 Video - Configure a DHCP Scope - 13.3.8 255 Configure a DHCP Scope - 13.3.9 255 Video - Configure a WPA2 Enterprise WLAN - 13.3.10 256 Configure a WPA2 Enterprise WLAN - 13.3.11 256 Packet Tracer - Configure a WPA2 Enterprise WLAN on the WLC - 13.3.12 257 Troubleshoot WLAN Issues - 13.4 257 Troubleshooting Approaches - 13.4.1 257 Wireless Client Not Connecting - 13.4.2 258 Troubleshooting When the Network Is Slow - 13.4.3 259 Updating Firmware - 13.4.4 259 Packet Tracer - Troubleshoot WLAN Issues - 13.4.5 260 Module Practice and Summary - 13.5 260 Packet Tracer - WLAN Configuration - 13.5.1 260 What did I learn in this module? - 13.5.2 260 Chapter Quiz - WLAN Configuration 262 Your Chapter Notes 262 Chapter 14 Routing Concepts 263 Introduction - 14.0 263 Why should I take this module? - 14.0.1 263 What will I learn to do in this module? - 14.0.2 263 Path Determination - 14.1 263 Two Functions of Router - 14.1.1 263 Router Functions Example - 14.1.2 264 Best Path Equals Longest Match - 14.1.3 264 IPv4 Address Longest Match Example - 14.1.4 264 IPv6 Address Longest Match Example - 14.1.5 265 Build the Routing Table - 14.1.6 265 Check Your Understanding - Path Determination - 14.1.7 266 Packet Forwarding - 14.2 266 Packet Forwarding Decision Process - 14.2.1 266 End-to-End Packet Forwarding - 14.2.2 267 Packet Forwarding Mechanisms - 14.2.3 268 Check Your Understanding - Packet Forwarding - 14.2.4 269 Basic Router Configuration Review - 14.3 269 Topology - 14.3.1 269 Configuration Commands - 14.3.2 269 Verification Commands - 14.3.3 271 Filter Command Output - 14.3.4 276 Packet Tracer - Basic Router Configuration Review - 14.3.5 278 IP Routing Table - 14.4 278 Route Sources - 14.4.1 278 Routing Table Principles - 14.4.2 280 Routing Table Entries - 14.4.3 281 Directly Connected Networks - 14.4.4 281 Static Routes - 14.4.5 282 Static Routes in the IP Routing Table - 14.4.6 282 Dynamic Routing Protocols - 14.4.7 283 Dynamic Routes in the IP Routing Table - 14.4.8 283 Default Route - 14.4.9 284 Structure of an IPv4 Routing Table - 14.4.10 285 Structure of an IPv6 Routing Table - 14.4.11 286 Administrative Distance - 14.4.12 287 Check Your Understanding - IP Routing Table - 14.4.13 288 Static and Dynamic Routing - 14.5 288 Static or Dynamic? - 14.5.1 288 Dynamic Routing Evolution - 14.5.2 289 Dynamic Routing Protocol Concepts - 14.5.3 290 Best Path - 14.5.4 291 Load Balancing - 14.5.5 291 Check Your Understanding - Dynamic and Static Routing - 14.5.6 292 Module Practice and Quiz - 14.6 292 What did I learn in this module? - 14.6.1 292 Chapter Quiz - Routing Concepts 295 Your Chapter Notes 295 Chapter 15 IP Static Routing 297 Introduction - 15.0 297 Why should I take this module? - 15.0.1 297 What will I learn to do in this module? - 15.0.2 297 Static Routes - 15.1 297 Types of Static Routes - 15.1.1 297 Next-Hop Options - 15.1.2 298 IPv4 Static Route Command - 15.1.3 298 IPv6 Static Route Command - 15.1.4 299 Dual-Stack Topology - 15.1.5 300 IPv4 Starting Routing Tables - 15.1.6 300 IPv6 Starting Routing Tables - 15.1.7 301 Check Your Understanding - Static Routes - 15.1.8 303 Configure IP Static Routes - 15.2 303 IPv4 Next-Hop Static Route - 15.2.1 303 IPv6 Next-Hop Static Route - 15.2.2 304 IPv4 Directly Connected Static Route - 15.2.3 305 IPv6 Directly Connected Static Route - 15.2.4 306 IPv4 Fully Specified Static Route - 15.2.5 307 IPv6 Fully Specified Static Route - 15.2.6 308 Verify a Static Route - 15.2.7 308 Syntax Checker - Configure Static Routes - 15.2.8 310 Configure IP Default Static Routes - 15.3 311 Default Static Route - 15.3.1 311 Configure a Default Static Route - 15.3.2 311 Verify a Default Static Route - 15.3.3 312 Syntax Checker - Configure Default Static Routes - 15.3.4 313 Configure Floating Static Routes - 15.4 313 Floating Static Routes - 15.4.1 313 Configure IPv4 and IPv6 Floating Static Routes - 15.4.2 314 Test the Floating Static Route - 15.4.3 315 Syntax Checker - Configure Floating Static Route - 15.4.4 316 Configure Static Host Routes - 15.5 316 Host Routes - 15.5.1 316 Automatically Installed Host Routes - 15.5.2 316 Static Host Routes - 15.5.3 317 Configure Static Host Routes - 15.5.4 317 Verify Static Host Routes - 15.5.5 317 Configure IPv6 Static Host Route with Link-Local Next-Hop - 15.5.6 318 Syntax Checker - Configure Static Host Routes - 15.5.7 318 Module Practice and Quiz - 15.6 318 Packet Tracer - Configure IPv4 and IPv6 Static and Default Routes - 15.6.1 318 Lab - Configure IPv4 and IPv6 Static and Default Routes - 15.6.2 318 What did I learn in this module? - 15.6.3 319 Chapter Quiz - IP Static Routing 321 Your Chapter Notes 321 Chapter 16 Troubleshoot Static and Default Routes 323 Introduction - 16.0 323 Why should I take this module? - 16.0.1 323 What will I learn to do in this module? - 16.0.2 323 Packet Processing with Statics Routes - 16.1 323 Static Routes and Packet Forwarding - 16.1.1 323 Check Your Understanding - Packet Processing with Static Routes - 16.1.2 324 Troubleshoot IPv4 Static and Default Route Configuration - 16.2 324 Network Changes - 16.2.1 324 Common Troubleshooting Commands - 16.2.2 324 Solve a Connectivity Problem - 16.2.3 326 Syntax Checker - Troubleshoot IPv4 Static and Default Routes - 16.2.4 329 Module Practice and Quiz - 16.3 329 Packet Tracer - Troubleshoot Static and Default Routes - 16.3.1 329 Lab - Troubleshoot Static and Default Routes - 16.3.2 330 What did I learn in this module? - 16.3.3 330 Chapter Quiz - Troubleshoot Static and Default Routes 332 Your Chapter Notes 332 9780136634720 TOC 6/25/2020

    15 in stock

    £30.16

  • Enterprise Networking Security and Automation

    Pearson Education (US) Enterprise Networking Security and Automation

    Out of stock

    Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.Table of ContentsIntroduction xxx Chapter 1 Single-Area OSPFv2 Concepts 1 Introduction - 1.0 1 Why should I take this module? - 1.0.1 1 What will I learn to do in this module? - 1.0.2 1 OSPF Features and Characteristics - 1.1 1 Introduction to OSPF - 1.1.1 1 Components of OSPF - 1.1.2 2 Link-State Operation - 1.1.3 3 Single-Area and Multiarea OSPF - 1.1.4 4 Multiarea OSPF - 1.1.5 4 OSPFv3 - 1.1.6 5 Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 OSPF Packets - 1.2 6 Video - OSPF Packets - 1.2.1 6 Types of OSPF Packets - 1.2.2 6 Link-State Updates - 1.2.3 7 Hello Packet - 1.2.4 7 Check Your Understanding - OSPF Packets - 1.2.5 7 OSPF Operation - 1.3 7 Video - OSPF Operation - 1.3.1 7 OSPF Operational States - 1.3.2 7 Establish Neighbor Adjacencies - 1.3.3 8 Synchronizing OSPF Databases - 1.3.4 9 The Need for a DR - 1.3.5 10 LSA Flooding With a DR - 1.3.6 11 Check Your Understanding - OPSF Operation - 1.3.7 11 Module Practice and Quiz - 1.4 11 What did I learn in this module? - 1.4.1 11 Chapter Quiz - Single-Area OSPFv2 Concepts 14 Your Chapter Notes 14 Chapter 2 Single-Area OSPFv2 Configuration 15 Introduction - 2.0 15 Why should I take this module? - 2.0.1 15 What will I learn to do in this module? - 2.0.2 15 OSPF Router ID - 2.1 15 OSPF Reference Topology - 2.1.1 15 Router Configuration Mode for OSPF - 2.1.2 16 Router IDs - 2.1.3 16 Router ID Order of Precedence - 2.1.4 17 Configure a Loopback Interface as the Router ID - 2.1.5 17 Explicitly Configure a Router ID - 2.1.6 18 Modify a Router ID - 2.1.7 18 Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19 Check Your Understanding - OSPF Router ID - 2.1.9 19 Point-to-Point OSPF Networks - 2.2 20 The network Command Syntax - 2.2.1 20 The Wildcard Mask - 2.2.2 20 Check Your Understanding - The Wildcard Masks - 2.2.3 20 Configure OSPF Using the network Command - 2.2.4 20 Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21 Configure OSPF Using the ip ospf Command - 2.2.6 21 Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22 Passive Interface - 2.2.8 22 Configure Passive Interfaces - 2.2.9 23 Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24 OSPF Point-to-Point Networks - 2.2.11 24 Loopbacks and Point-to-Point Networks - 2.2.12 26 Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 Multiaccess OSPF Networks - 2.3 27 OSPF Network Types - 2.3.1 27 OSPF Designated Router - 2.3.2 27 OSPF Multiaccess Reference Topology - 2.3.3 27 Verify OSPF Router Roles - 2.3.4 28 Verify DR/BDR Adjacencies - 2.3.5 30 Default DR/BDR Election Process - 2.3.6 32 DR Failure and Recovery - 2.3.7 33 The ip ospf priority Command - 2.3.8 33 Configure OSPF Priority - 2.3.9 34 Syntax Checker - Configure OSPF Priority - 2.3.10 35 Packet Tracer - Determine the DR and BDR - 2.3.11 35 Modify Single-Area OSPFv2 - 2.4 36 Cisco OSPF Cost Metric - 2.4.1 36 Adjust the Reference Bandwidth - 2.4.2 36 OSPF Accumulates Costs - 2.4.3 38 Manually Set OSPF Cost Value - 2.4.4 38 Test Failover to Backup Route - 2.4.5 39 Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40 Hello Packet Intervals - 2.4.7 40 Verify Hello and Dead Intervals - 2.4.8 40 Modify OSPFv2 Intervals - 2.4.9 42 Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43 Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 Default Route Propagation - 2.5 43 Propagate a Default Static Route in OSPFv2 - 2.5.1 43 Verify the Propagated Default Route - 2.5.2 44 Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46 Verify Single-Area OSPFv2 - 2.6 46 Verify OSPF Neighbors - 2.6.1 46 Verify OSPF Protocol Settings - 2.6.2 48 Verify OSPF Process Information - 2.6.3 48 Verify OSPF Interface Settings - 2.6.4 50 Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51 Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 Module Practice and Quiz - 2.7 51 Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51 Lab - Single-Area OSPFv2 Configuration - 2.7.2 51 What did I learn in this module? - 2.7.3 52 Chapter Quiz - Single-Area OSPFv2 Configuration 56 Your Chapter Notes 56 Chapter 3 Network Security Concepts 57 Introduction - 3.0 57 Why should I take this module? - 3.0.1 57 What will I learn in this module? - 3.0.2 57 Ethical Hacking Statement - 3.0.3 57 Current State of Cybersecurity - 3.1 58 Current State of Affairs - 3.1.1 58 Vectors of Network Attacks - 3.1.2 58 Data Loss - 3.1.3 59 Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 Threat Actors - 3.2 60 The Hacker - 3.2.1 60 Evolution of Hackers - 3.2.2 61 Cyber Criminals - 3.2.3 61 Hacktivists - 3.2.4 61 State-Sponsored Hackers - 3.2.5 61 Check Your Understanding - Threat Actors - 3.2.6 62 Threat Actor Tools - 3.3 62 Video - Threat Actor Tools - 3.3.1 62 Introduction to Attack Tools - 3.3.2 62 Evolution of Security Tools - 3.3.3 62 Attack Types - 3.3.4 63 Check Your Understanding - Threat Actor Tools - 3.3.5 64 Malware - 3.4 64 Overview of Malware - 3.4.1 64 Viruses and Trojan Horses - 3.4.2 64 Other Types of Malware - 3.4.3 65 Check Your Understanding - Malware - 3.4.4 66 Common Network Attacks - 3.5 66 Overview of Network Attacks - 3.5.1 66 Video - Reconnaissance Attacks - 3.5.2 67 Reconnaissance Attacks - 3.5.3 67 Video - Access and Social Engineering Attacks - 3.5.4 68 Access Attacks - 3.5.5 68 Social Engineering Attacks - 3.5.6 69 Lab - Social Engineering - 3.5.7 70 Video - Denial of Service Attacks - 3.5.8 70 DoS and DDoS Attacks - 3.5.9 70 Check Your Understanding - Common Network Attacks - 3.5.10 71 IP Vulnerabilities and Threats - 3.6 71 Video - Common IP and ICMP Attacks - 3.6.1 71 IPv4 and IPv6 - 3.6.2 71 ICMP Attacks - 3.6.3 71 Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72 Amplification and Reflection Attacks - 3.6.5 72 Address Spoofing Attacks - 3.6.6 72 Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 TCP and UDP Vulnerabilities - 3.7 73 TCP Segment Header - 3.7.1 73 TCP Services - 3.7.2 73 TCP Attacks - 3.7.3 74 UDP Segment Header and Operation - 3.7.4 74 UDP Attacks - 3.7.5 75 Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 IP Services - 3.8 75 ARP Vulnerabilities - 3.8.1 75 ARP Cache Poisoning - 3.8.2 76 Video - ARP Spoofing - 3.8.3 76 DNS Attacks - 3.8.4 76 DNS Tunneling - 3.8.5 78 DHCP - 3.8.6 78 DHCP Attacks - 3.8.7 78 Lab - Explore DNS Traffic - 3.8.8 79 Network Security Best Practices - 3.9 80 Confidentiality, Integrity, and Availability - 3.9.1 80 The Defense-in-Depth Approach - 3.9.2 80 Firewalls - 3.9.3 80 IPS - 3.9.4 81 Content Security Appliances - 3.9.5 81 Check Your Understanding - Network Security Best Practices - 3.9.6 82 Cryptography - 3.10 82 Video - Cryptography - 3.10.1 82 Securing Communications - 3.10.2 82 Data Integrity - 3.10.3 83 Hash Functions - 3.10.4 83 Origin Authentication - 3.10.5 84 Data Confidentiality - 3.10.6 85 Symmetric Encryption - 3.10.7 85 Asymmetric Encryption - 3.10.8 86 Diffie-Hellman - 3.10.9 87 Check Your Understanding - Cryptography - 3.10.10 88 Module Practice and Quiz - 3.11 88 What did I learn in this module? - 3.11.1 88 Chapter Quiz - Network Security Concepts 91 Your Chapter Notes 91 Chapter 4 ACL Concepts 93 Introduction - 4.0 93 Why should I take this module? - 4.0.1 93 What will I learn to do in this module? - 4.0.2 93 Purpose of ACLs - 4.1 93 What is an ACL? - 4.1.1 93 Packet Filtering - 4.1.2 95 ACL Operation - 4.1.3 95 Packet Tracer - ACL Demonstration - 4.1.4 96 Check Your Understanding - Purpose of ACLs - 4.1.5 96 Wildcard Masks in ACLs - 4.2 96 Wildcard Mask Overview - 4.2.1 96 Wildcard Mask Types - 4.2.2 97 Wildcard Mask Calculation - 4.2.3 97 Wildcard Mask Keywords - 4.2.4 98 Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99 Guidelines for ACL Creation - 4.3 99 Limited Number of ACLs per Interface - 4.3.1 99 ACL Best Practices - 4.3.2 99 Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100 Types of IPv4 ACLs - 4.4 100 Standard and Extended ACLs - 4.4.1 100 Numbered and Named ACLs - 4.4.2 101 Where to Place ACLs - 4.4.3 102 Standard ACL Placement Example - 4.4.4 102 Extended ACL Placement Example - 4.4.5 103 Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103 Module Practice and Quiz - 4.5 103 What did I learn in this module? - 4.5.1 103 Chapter Quiz - ACL Concepts 106 Your Chapter Notes 106 Chapter 5 ACLs for IPv4 Configuration 107 Introduction - 5.0 107 Why should I take this module? - 5.0.1 107 What will I learn to do in this module? - 5.0.2 107 Configure Standard IPv4 ACLs - 5.1 107 Create an ACL - 5.1.1 107 Numbered Standard IPv4 ACL Syntax - 5.1.2 108 Named Standard IPv4 ACL Syntax - 5.1.3 109 Apply a Standard IPv4 ACL - 5.1.4 109 Numbered Standard IPv4 ACL Example - 5.1.5 110 Named Standard IPv4 ACL Example - 5.1.6 111 Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112 Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113 Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113 Modify IPv4 ACLs - 5.2 113 Two Methods to Modify an ACL - 5.2.1 113 Text Editor Method - 5.2.2 113 Sequence Numbers Method - 5.2.3 114 Modify a Named ACL Example - 5.2.4 115 ACL Statistics - 5.2.5 116 Syntax Checker - Modify IPv4 ACLs - 5.2.6 116 Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116 Secure VTY Ports with a Standard IPv4 ACL - 5.3 116 The access-class Command - 5.3.1 116 Secure VTY Access Example - 5.3.2 117 Verify the VTY Port is Secured - 5.3.3 118 Syntax Checker - Secure the VTY Ports - 5.3.4 118 Configure Extended IPv4 ACLs - 5.4 119 Extended ACLs - 5.4.1 119 Numbered Extended IPv4 ACL Syntax - 5.4.2 119 Protocols and Ports - 5.4.3 120 Protocols and Port Numbers Configuration Examples - 5.4.4 123 Apply a Numbered Extended IPv4 ACL - 5.4.5 123 TCP Established Extended ACL - 5.4.6 123 Named Extended IPv4 ACL Syntax - 5.4.7 124 Named Extended IPv4 ACL Example - 5.4.8 125 Edit Extended ACLs - 5.4.9 126 Another Named Extended IPv4 ACL Example - 5.4.10 127 Verify Extended ACLs - 5.4.11 128 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130 Module Practice and Quiz - 5.5 130 Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130 Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131 What did I learn in this module? - 5.5.3 131 Chapter Quiz - ACLs for IPv4 Implementation 133 Your Chapter Notes 133 Chapter 6 NAT for IPv4 135 Introduction - 6.0 135 Why should I take this module? - 6.0.1 135 What will I learn to do in this module? - 6.0.2 135 NAT Characteristics - 6.1 135 IPv4 Private Address Space - 6.1.1 135 What is NAT - 6.1.2 136 How NAT Works - 6.1.3 137 NAT Terminology - 6.1.4 137 Check Your Understanding - NAT Characteristics - 6.1.5 138 Types of NAT - 6.2 139 Static NAT - 6.2.1 139 Dynamic NAT - 6.2.2 139 Port Address Translation - 6.2.3 139 Next Available Port - 6.2.4 140 NAT and PAT Comparison - 6.2.5 140 Packets without a Layer 4 Segment - 6.2.6 141 Packet Tracer - Investigate NAT Operations - 6.2.7 141 NAT Advantages and Disadvantages - 6.3 142 Advantages of NAT - 6.3.1 142 Disadvantages of NAT - 6.3.2 142 Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143 Static NAT - 6.4 143 Static NAT Scenario - 6.4.1 143 Configure Static NAT - 6.4.2 143 Analyze Static NAT - 6.4.3 144 Verify Static NAT - 6.4.4 144 Packet Tracer - Configure Static NAT - 6.4.5 145 Dynamic NAT - 6.5 146 Dynamic NAT Scenario - 6.5.1 146 Configure Dynamic NAT - 6.5.2 146 Analyze Dynamic NAT - Inside to Outside - 6.5.3 147 Analyze Dynamic NAT - Outside to Inside - 6.5.4 147 Verify Dynamic NAT - 6.5.5 148 Packet Tracer - Configure Dynamic NAT - 6.5.6 150 PAT - 6.6 150 PAT Scenario - 6.6.1 150 Configure PAT to Use a Single IPv4 Address - 6.6.2 150 Configure PAT to Use an Address Pool - 6.6.3 151 Analyze PAT - PC to Server - 6.6.4 151 Analyze PAT - Server to PC - 6.6.5 151 Verify PAT - 6.6.6 151 Packet Tracer - Configure PAT - 6.6.7 152 NAT64 - 6.7 153 NAT for IPv6? - 6.7.1 153 NAT64 - 6.7.2 153 Module Practice and Quiz - 6.8 153 Packet Tracer - Configure NAT for IPv4 - 6.8.1 153 Lab - Configure NAT for IPv4 - 6.8.2 154 What did I learn in this module? - 6.8.3 154 Chapter Quiz - NAT for IPv4 158 Your Chapter Notes 158 Chapter 7 WAN Concepts 159 Introduction - 7.0 159 Why should I take this module? - 7.0.1 159 What will I learn to do in this module? - 7.0.2 159 Purpose of WANs - 7.1 159 LANs and WANs - 7.1.1 159 Private and Public WANs - 7.1.2 160 WAN Topologies - 7.1.3 160 Carrier Connections - 7.1.4 162 Evolving Networks - 7.1.5 162 Check Your Understanding - Purpose of WANs - 7.1.6 164 WAN Operations - 7.2 164 WAN Standards - 7.2.1 164 WANs in the OSI Model - 7.2.2 164 Common WAN Terminology - 7.2.3 165 WAN Devices - 7.2.4 166 Serial Communication - 7.2.5 167 Circuit-Switched Communication - 7.2.6 168 Packet-Switched Communications - 7.2.7 168 SDH, SONET, and DWDM - 7.2.8 169 Check Your Understanding - WAN Operations - 7.2.9 169 Traditional WAN Connectivity - 7.3 169 Traditional WAN Connectivity Options - 7.3.1 169 Common WAN Terminology - 7.3.2 169 Circuit-Switched Options - 7.3.3 170 Packet-Switched Options - 7.3.4 171 Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172 Modern WAN Connectivity - 7.4 172 Modern WANs - 7.4.1 172 Modern WAN Connectivity Options - 7.4.2 172 Ethernet WAN - 7.4.3 173 MPLS - 7.4.4 174 Check Your Understanding - Modern WAN Connectivity - 7.4.5 174 Internet-Based Connectivity - 7.5 174 Internet-Based Connectivity Options - 7.5.1 174 DSL Technology - 7.5.2 175 DSL Connections - 7.5.3 175 DSL and PPP - 7.5.4 176 Cable Technology - 7.5.5 176 Optical Fiber - 7.5.6 177 Wireless Internet-Based Broadband - 7.5.7 177 VPN Technology - 7.5.8 179 ISP Connectivity Options - 7.5.9 179 Broadband Solution Comparison - 7.5.10 180 Lab - Research Broadband Internet Access Options - 7.5.11 181 Module Practice and Quiz - 7.6 181 Packet Tracer - WAN Concepts - 7.6.1 181 What did I learn in this module? - 7.6.2 181 Chapter Quiz - WAN Concepts 184 Your Chapter Notes 184 Chapter 8 VPN and IPsec Concepts 185 Introduction - 8.0 185 Why should I take this module? - 8.0.1 185 What will I learn in this module? - 8.0.2 185 VPN Technology - 8.1 185 Virtual Private Networks - 8.1.1 185 VPN Benefits - 8.1.2 186 Site-to-Site and Remote-Access VPNs - 8.1.3 186 Enterprise and Service Provider VPNs - 8.1.4 186 Check Your Understanding - VPN Technology - 8.1.5 187 Types of VPNs - 8.2 187 Remote-Access VPNs - 8.2.1 187 SSL VPNs - 8.2.2 187 Site-to-Site IPsec VPNs - 8.2.3 188 GRE over IPsec - 8.2.4 188 Dynamic Multipoint VPNs - 8.2.5 189 IPsec Virtual Tunnel Interface - 8.2.6 189 Service Provider MPLS VPNs - 8.2.7 190 Check Your Understanding - Types of VPNs - 8.2.8 190 IPsec - 8.3 190 Video - IPsec Concepts - 8.3.1 190 IPsec Technologies - 8.3.2 190 IPsec Protocol Encapsulation - 8.3.3 191 Confidentiality - 8.3.4 192 Integrity - 8.3.5 192 Authentication - 8.3.6 192 Secure Key Exchange with Diffie-Hellman - 8.3.7 193 Video - IPsec Transport and Tunnel Mode - 8.3.8 193 Check Your Understanding - IPsec - 8.3.9 193 Module Practice and Quiz - 8.4 193 What did I learn in this module? - 8.4.1 193 Chapter Quiz - VPN and IPsec Concepts 195 Your Chapter Notes 195 Chapter 9 QoS Concepts 197 Introduction - 9.0 197 Why should I take this module? - 9.0.1 197 What will I learn to do in this module? - 9.0.2 197 Network Transmission Quality - 9.1 197 Video Tutorial - The Purpose of QoS - 9.1.1 197 Prioritizing Traffic - 9.1.2 197 Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198 Packet Loss - 9.1.4 199 Check Your Understanding - Network Transmission Quality - 9.1.5 199 Traffic Characteristics - 9.2 199 Video Tutorial - Traffic Characteristics - 9.2.1 199 Network Traffic Trends - 9.2.2 199 Voice - 9.2.3 200 Video - 9.2.4 200 Data - 9.2.5 201 Check Your Understanding - Traffic Characteristics - 9.2.6 202 Queuing Algorithms - 9.3 202 Video Tutorial - QoS Algorithms - 9.3.1 202 Queuing Overview - 9.3.2 202 First In First Out - 9.3.3 202 Weighted Fair Queuing (WFQ) - 9.3.4 203 Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203 Low Latency Queuing (LLQ) - 9.3.6 204 Check Your Understanding - Queuing Algorithms - 9.3.7 204 QoS Models - 9.4 204 Video Tutorial - QoS Models - 9.4.1 204 Selecting an Appropriate QoS Policy Model - 9.4.2 204 Best Effort - 9.4.3 205 Integrated Services - 9.4.4 206 Differentiated Services - 9.4.5 206 Check Your Understanding - QoS Models - 9.4.6 208 QoS Implementation Techniques - 9.5 208 Video Tutorial - QoS Implementation Techniques - 9.5.1 208 Avoiding Packet Loss - 9.5.2 208 QoS Tools - 9.5.3 208 Classification and Marking - 9.5.4 209 Marking at Layer 2 - 9.5.5 210 Marking at Layer 3 - 9.5.6 210 Type of Service and Traffic Class Field - 9.5.7 211 DSCP Values - 9.5.8 211 Class Selector Bits - 9.5.9 211 Trust Boundaries - 9.5.10 211 Congestion Avoidance - 9.5.11 212 Shaping and Policing - 9.5.12 212 QoS Policy Guidelines - 9.5.13 213 Check Your Understanding - QoS Implementation Techniques - 9.5.14 213 Module Practice and Quiz - 9.6 213 What did I learn in this module? - 9.6.1 213 Chapter Quiz - QoS Concepts 216 Your Chapter Notes 216 Chapter 10 Network Management 217 Introduction - 10.0 217 Why should I take this module? - 10.0.1 217 What will I learn to do in this module? - 10.0.2 217 Device Discovery with CDP - 10.1 217 CDP Overview - 10.1.1 217 Configure and Verify CDP - 10.1.2 218 Discover Devices by Using CDP - 10.1.3 220 Syntax Checker - Configure and Verify CDP - 10.1.4 222 Packet Tracer - Use CDP to Map a Network - 10.1.5 222 Device Discovery with LLDP - 10.2 222 LLDP Overview - 10.2.1 222 Configure and Verify LLDP - 10.2.2 222 Discover Devices by Using LLDP - 10.2.3 223 Syntax Checker - Configure and Verify LLDP - 10.2.4 225 Check Your Understanding - Compare CDP and LLDP - 10.2.5 225 Packet Tracer - Use LLDP to Map a Network - 10.2.6 225 NTP - 10.3 225 Time and Calendar Services - 10.3.1 225 NTP Operation - 10.3.2 226 Configure and Verify NTP - 10.3.3 227 Packet Tracer - Configure and Verify NTP - 10.3.4 229 SNMP - 10.4 229 Introduction to SNMP - 10.4.1 229 SNMP Operation - 10.4.2 230 SNMP Agent Traps - 10.4.3 230 SNMP Versions - 10.4.4 231 Check Your Understanding - SNMP Versions - 10.4.5 232 Community Strings - 10.4.6 232 MIB Object ID - 10.4.7 233 SNMP Polling Scenario - 10.4.8 233 SNMP Object Navigator - 10.4.9 233 Lab - Research Network Monitoring Software - 10.4.10 234 Syslog - 10.5 234 Introduction to Syslog - 10.5.1 234 Syslog Operation - 10.5.2 234 Syslog Message Format - 10.5.3 235 Syslog Facilities - 10.5.4 236 Configure Syslog Timestamp - 10.5.5 236 Check Your Understanding - Syslog Operation - 10.5.6 237 Router and Switch File Maintenance - 10.6 237 Router File Systems - 10.6.1 237 Switch File Systems - 10.6.2 240 Use a Text File to Back Up a Configuration - 10.6.3 241 Use a Text File to Restore a Configuration - 10.6.4 241 Use TFTP to Back Up and Restore a Configuration - 10.6.5 242 USB Ports on a Cisco Router - 10.6.6 242 Use USB to Back Up and Restore a Configuration - 10.6.7 243 Password Recovery Procedures - 10.6.8 245 Password Recovery Example - 10.6.9 245 Packet Tracer - Back Up Configuration Files - 10.6.10 247 Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248 Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248 Lab - Research Password Recovery Procedures - 10.6.13 248 IOS Image Management - 10.7 248 Video - Managing Cisco IOS Images - 10.7.1 248 TFTP Servers as a Backup Location - 10.7.2 248 Backup IOS Image to TFTP Server Example - 10.7.3 249 Copy an IOS Image to a Device Example - 10.7.4 250 The boot system Command - 10.7.5 251 Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252 Module Practice and Quiz - 10.8 253 Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253 Lab - Configure CDP, LLDP, and NTP - 10.8.2 253 What did I learn in this module? - 10.8.3 253 Chapter Quiz - Network Management 257 Your Chapter Notes 257 Chapter 11 Network Design 259 Introduction - 11.0 259 Why should I take this module? - 11.0.1 259 What will I learn to do in this module? - 11.0.2 259 Hierarchical Networks - 11.1 259 Video - Three-Layer Network Design - 11.1.1 259 The Need to Scale the Network - 11.1.2 259 Borderless Switched Networks - 11.1.3 260 Hierarchy in the Borderless Switched Network - 11.1.4 261 Access, Distribution, and Core Layer Functions - 11.1.5 262 Three-Tier and Two-Tier Examples - 11.1.6 262 Role of Switched Networks - 11.1.7 263 Check Your Understanding - Hierarchical Networks - 11.1.8 263 Scalable Networks - 11.2 263 Design for Scalability - 11.2.1 263 Plan for Redundancy - 11.2.2 264 Reduce Failure Domain Size - 11.2.3 265 Increase Bandwidth - 11.2.4 265 Expand the Access Layer - 11.2.5 266 Tune Routing Protocols - 11.2.6 266 Check Your Understanding - Scalable Networks - 11.2.7 266 Switch Hardware - 11.3 266 Switch Platforms - 11.3.1 266 Switch Form Factors - 11.3.2 267 Port Density - 11.3.3 268 Forwarding Rates - 11.3.4 268 Power over Ethernet - 11.3.5 269 Multilayer Switching - 11.3.6 269 Business Considerations for Switch Selection - 11.3.7 270 Check Your Understanding - Switch Hardware - 11.3.8 270 Router Hardware - 11.4 270 Router Requirements - 11.4.1 270 Cisco Routers - 11.4.2 271 Router Form Factors - 11.4.3 271 Check Your Understanding - Router Hardware - 11.4.4 272 Module Practice and Quiz - 11.5 272 Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272 What did I learn in this module? - 11.5.2 273 Chapter Quiz - Network Design 275 Your Chapter Notes 275 Chapter 12 Network Troubleshooting 277 Introduction - 12.0 277 Why should I take this module? - 12.0.1 277 What will I learn to do in this module? - 12.0.2 277 Network Documentation - 12.1 277 Documentation Overview - 12.1.1 277 Network Topology Diagrams - 12.1.2 278 Network Device Documentation - 12.1.3 279 Establish a Network Baseline - 12.1.4 279 Step 1 - Determine What Types of Data to Collect - 12.1.5 280 Step 2 - Identify Devices and Ports of Interest - 12.1.6 280 Step 3 - Determine the Baseline Duration - 12.1.7 280 Data Measurement - 12.1.8 281 Check Your Understanding - Network Documentation - 12.1.9 282 Troubleshooting Process - 12.2 282 General Troubleshooting Procedures - 12.2.1 282 Seven-Step Troubleshooting Process - 12.2.2 282 Question End Users - 12.2.3 284 Gather Information - 12.2.4 285 Troubleshooting with Layered Models - 12.2.5 286 Structured Troubleshooting Methods - 12.2.6 286 Guidelines for Selecting a Troubleshooting Method - 12.2.7 288 Check Your Understanding - Troubleshooting Process - 12.2.8 288 Troubleshooting Tools - 12.3 288 Software Troubleshooting Tools - 12.3.1 288 Protocol Analyzers - 12.3.2 289 Hardware Troubleshooting Tools - 12.3.3 289 Syslog Server as a Troubleshooting Tool - 12.3.4 290 Check Your Understanding - Troubleshooting Tools - 12.3.5 292 Symptoms and Causes of Network Problems - 12.4 292 Physical Layer Troubleshooting - 12.4.1 292 Data Link Layer Troubleshooting - 12.4.2 294 Network Layer Troubleshooting - 12.4.3 295 Transport Layer Troubleshooting - ACLs - 12.4.4 297 Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298 Application Layer Troubleshooting - 12.4.6 299 Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300 Troubleshooting IP Connectivity - 12.5 300 Components of Troubleshooting End-to-End Connectivity - 12.5.1 300 End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301 Step 1 - Verify the Physical Layer - 12.5.3 303 Step 2 - Check for Duplex Mismatches - 12.5.4 304 Step 3 - Verify Addressing on the Local Network - 12.5.5 306 Step 4 - Verify Default Gateway - 12.5.7 310 Troubleshoot IPv6 Default Gateway Example - 12.5.8 311 Step 5 - Verify Correct Path - 12.5.9 314 Step 6 - Verify the Transport Layer - 12.5.10 315 Step 7 - Verify ACLs - 12.5.11 317 Step 8 - Verify DNS - 12.5.12 318 Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319 Module Practice and Quiz - 12.6 319 Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319 Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319 What did I learn in this module? - 12.6.3 320 Chapter Quiz - Network Troubleshooting 324 Your Chapter Notes 324 Chapter 13 Network Virtualization 325 Introduction - 13.0 325 Why should I take this module? - 13.0.1 325 What will I learn to do in this module? - 13.0.2 325 Cloud Computing - 13.1 325 Video - Cloud and Virtualization - 13.1.1 325 Cloud Overview - 13.1.2 325 Cloud Services - 13.1.3 326 Cloud Models - 13.1.4 326 Cloud Computing versus Data Center - 13.1.5 327 Check Your Understanding - Cloud Computing - 13.1.6 327 Virtualization - 13.2 327 Cloud Computing and Virtualization - 13.2.1 327 Dedicated Servers - 13.2.2 328 Server Virtualization - 13.2.3 328 Advantages of Virtualization - 13.2.4 328 Abstraction Layers - 13.2.5 329 Type 2 Hypervisors - 13.2.6 330 Check Your Understanding - Virtualization - 13.2.7 330 Virtual Network Infrastructure - 13.3 330 Type 1 Hypervisors - 13.3.1 330 Installing a VM on a Hypervisor - 13.3.2 330 The Complexity of Network Virtualization - 13.3.3 331 Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332 Software-Defined Networking - 13.4 332 Video - Software-Defined Networking - 13.4.1 332 Control Plane and Data Plane - 13.4.2 332 Network Virtualization Technologies - 13.4.3 333 Traditional and SDN Architectures - 13.4.4 334 Check Your Understanding - Software-Defined Networking - 13.4.5 334 Controllers - 13.5 334 SDN Controller and Operations - 13.5.1 334 Video - Cisco ACI - 13.5.2 335 Core Components of ACI - 13.5.3 335 Spine-Leaf Topology - 13.5.4 335 SDN Types - 13.5.5 336 APIC-EM Features - 13.5.6 336 APIC-EM Path Trace - 13.5.7 336 Check Your Understanding - Controllers - 13.5.8 337 Module Practice and Quiz - 13.6 337 Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337 What did I learn in this module? - 13.6.2 337 Chapter Quiz - Network Virtualization 341 Your Chapter Notes 341 Chapter 14 Network Automation 343 Introduction - 14.0 343 Why should I take this module? - 14.0.1 343 What will I learn in this module? - 14.0.2 343 Automation Overview - 14.1 343 Video - Automation Everywhere - 14.1.1 343 The Increase in Automation - 14.1.2 344 Thinking Devices - 14.1.3 344 Check Your Understanding - Benefits of Automation - 14.1.4 344 Data Formats - 14.2 344 Video - Data Formats - 14.2.1 344 The Data Formats Concept - 14.2.2 345 Data Format Rules - 14.2.3 345 Compare Data Formats - 14.2.4 346 JSON Data Format - 14.2.5 347 JSON Syntax Rules - 14.2.6 348 YAML Data Format - 14.2.7 349 XML Data Format - 14.2.8 350 Check Your Understanding - Data Formats - 14.2.9 351 APIs - 14.3 351 Video - APIs - 14.3.1 351 The API Concept - 14.3.2 352 An API Example - 14.3.3 352 Open, Internal, and Partner APIs - 14.3.4 352 Types of Web Service APIs - 14.3.5 353 Check Your Understanding - APIs - 14.3.6 354 REST - 14.4 354 Video - REST - 14.4.1 354 REST and RESTful API - 14.4.2 354 RESTful Implementation - 14.4.3 354 URI, URN, and URL - 14.4.4 355 Anatomy of a RESTful Request - 14.4.5 355 RESTful API Applications - 14.4.6 356 Check Your Understanding - REST - 14.4.7 357 Configuration Management Tools - 14.5 357 Video - Configuration Management Tools - 14.5.1 357 Traditional Network Configuration - 14.5.2 358 Network Automation - 14.5.3 358 Configuration Management Tools - 14.5.4 358 Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359 Check Your Understanding - Configuration Management - 14.5.6 360 IBN and Cisco DNA Center - 14.6 360 Video - Intent-Based Networking - 14.6.1 360 Intent-Based Networking Overview - 14.6.2 360 Network Infrastructure as Fabric - 14.6.3 360 Cisco Digital Network Architecture (DNA) - 14.6.4 361 Cisco DNA Center - 14.6.5 362 Video - DNA Center Overview and Platform APIs - 14.6.6 362 Video - DNA Center Design and Provision - 14.6.7 363 Video - DNA Center Policy and Assurance - 14.6.8 363 Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363 Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363 Module Practice and Quiz - 14.7 363 What did I learn in this module? - 14.7.1 363 Chapter Quiz - Network Automation 365 Your Chapter Notes 365 9780136634737 TOC 6/18/2020

    Out of stock

    £30.16

  • Ubuntu Linux Unleashed 2021 Edition

    Pearson Education (US) Ubuntu Linux Unleashed 2021 Edition

    15 in stock

    Book SynopsisMatthew Helmke has used Ubuntu since 2005. He has written about Linux for several magazines and websites, is a lead author of The Official Ubuntu Book, and has coauthored both A Practical Guide to Linux: Commands, Editors, and Shell Programming and The VMware Cookbook. In his day job, Matthew works for Gremlin (https://www.gremlin.com/) making the Internet more reliable. Matthew first used UNIX in 1987, while studying Lisp on a Vax at the university. He has run a business using only free and open source software, has consulted, and teaches as an adjunct professor for the University of Arizona. You can find out more about Matthew at https://www.linkedin.com/in/matthewhelmke/ or drop him a line with errata or suggestions at matthew@matthewhelmke.com.Table of ContentsIntroduction xxxi PART I: GETTING STARTED Chapter 1 Installing Ubuntu and Post-Installation Configuration 1 Before You Begin the Installation 1 Researching Your Hardware Specifications 2 Installation Options 2 32-Bit Versus 64-Bit Ubuntu 4 Planning Partition Strategies 5 The Boot Loader 5 Installing from DVD or USB Drive 6 Step-by-Step Installation 6 Installing 7 First Update 11 Shutting Down 11 Finding Programs and Files 12 Software Updater 12 The sudo Command 14 Configuring Software Repositories 15 System Settings 17 Detecting and Configuring a Printer 18 Configuring Power Management in Ubuntu 18 Setting the Time and Date 19 Configuring Wireless Networks 20 Troubleshooting Post-Installation Configuration Problems 21 Chapter 2 Background Information and Resources 23 What Is Linux? 23 Why Use Linux? 25 What Is Ubuntu? 27 Ubuntu for Business 27 Ubuntu in Your Home 28 Getting the Most from Linux and Ubuntu Documentation 28 Linux 29 Ubuntu 30 PART II: DESKTOP UBUNTU Chapter 3 Foundations of the Linux GUI 31 Foundations and the X Server 31 Basic X Concepts 32 Using X 33 Elements of the xorg conf File 34 Starting X 39 Using a Display Manager 39 Changing Window Managers 39 Chapter 4 Ubuntu Desktop Options 41 Desktop Environment 41 Using GNOME: A Primer 42 KDE and Kubuntu 45 Xfce and Xubuntu 46 LXDE and Lubuntu 47 MATE and Ubuntu MATE 48 Ubuntu Budgie 49 Ubuntu Kylin 50 Chapter 5 On the Internet 51 Getting Started with Firefox 52 Checking Out Google Chrome and Chromium 53 Chapter 6 Productivity Applications 55 Introducing LibreOffice 56 Other Useful Productivity Software 58 Working with PDFs 58 Writing Scripts 59 Working with XML and DocBook 59 Working with LaTeX 60 Creating Mind Maps 61 Productivity Applications Written for Microsoft Windows 61 Chapter 7 Multimedia Applications 63 Sound and Music 63 Sound Cards 64 Sound Formats 65 Listening to Music 65 Graphics Manipulation 66 The GNU Image Manipulation Program 66 Using Scanners in Ubuntu 67 Working with Graphics Formats 67 Capturing Screen Images 69 Other Graphics Manipulation Options 70 Using Digital Cameras with Ubuntu 70 Handheld Digital Cameras 70 Using Shotwell Photo Manager 71 Burning CDs and DVDs in Ubuntu 71 Creating CDs and DVDs with Brasero 71 Creating CDs from the Command Line 72 Creating DVDs from the Command Line 73 Viewing Video 75 Video Formats 75 Viewing Video in Linux 76 Recording and Editing Audio 76 Editing Video 77 Chapter 8 Games 79 Ubuntu Gaming 79 Installing Proprietary Video Drivers 80 Online Game Sources 81 Steam 81 GOG com 82 Humble 82 itch io 82 LGDB 82 Game Jolt 82 Installing Games from the Ubuntu Repositories 82 Warsow 82 Scorched 3D 83 Frozen Bubble 84 SuperTux 84 Battle for Wesnoth 85 Frets on Fire 85 FlightGear 87 Speed Dreams 87 Games for Kids 88 Commercial Games 88 Playing Windows Games 88 PART III: SYSTEM ADMINISTRATION Chapter 9 Managing Software 91 Ubuntu Software 91 Using Synaptic for Software Management 92 Staying Up to Date 94 Working on the Command Line 95 Day-to-Day APT Usage 95 Finding Software 98 Using apt-get Instead of apt 99 Compiling Software from Source 100 Compiling from a Tarball 100 Compiling from Source from the Ubuntu Repositories 101 Configuration Management 102 dotdee 102 Ubuntu Core 103 Using the Snappy Package Manager 103 Chapter 10 Command-Line Beginner's Class 105 What Is the Command Line? 106 Accessing the Command Line 107 Text-Based Console Login 107 Logging Out 108 Logging In and Out from a Remote Computer 108 User Accounts 109 Reading Documentation 111 Using Man Pages 111 Using apropros 112 Using whereis 112 Understanding the Linux File System Hierarchy 112 Essential Commands in /bin and /sbin 114 Configuration Files in /etc 114 User Directories: /home 115 Using the Contents of the /proc Directory to Interact with or Obtain Information from the Kernel 115 Working with Shared Data in the /usr Directory 117 Temporary File Storage in the /tmp Directory 117 Accessing Variable Data Files in the /var Directory 117 Navigating the Linux File System 117 Listing the Contents of a Directory with ls 118 Changing Directories with cd 120 Finding Your Current Directory with pwd 120 Working with Permissions 120 Assigning Permissions 121 Directory Permissions 122 Altering File Permissions with chmod 123 File Permissions with umask 124 File Permissions with chgrp 125 Changing File Permissions with chown 125 Understanding Set User ID, Set Group ID, and Sticky Bit Permissions 125 Setting Permissions with Access Control Lists 127 Working with Files 128 Creating a File with touch 128 Creating a Directory with mkdir 129 Deleting a Directory with rmdir 129 Deleting a File or Directory with rm 130 Moving or Renaming a File with mv 131 Copying a File with cp 131 Displaying the Contents of a File with cat 132 Displaying the Contents of a File with less 132 Using Wildcards and Regular Expressions 133 Working as Root 133 Understanding and Fixing sudo 134 Creating Users 136 Deleting Users 137 Shutting Down the System 137 Rebooting the System 138 Commonly Used Commands and Programs 139 Chapter 11 Command-Line Master Class, Part 1 141 Why Use the Command Line? 142 Using Basic Commands 143 Printing the Contents of a File with cat 144 Changing Directories with cd 145 Changing File Access Permissions with chmod 147 Copying Files with cp 147 Printing Disk Usage with du 148 Using echo 148 Finding Files by Searching with find 149 Searches for a String in Input with grep 151 Paging Through Output with less 152 Creating Links Between Files with ln 154 Finding Files from an Index with locate 156 Listing Files in the Current Directory with ls 156 Listing System Information with lsblk, lshw, lsmod, lspci, and neofetch 158 Reading Manual Pages with man 159 Making Directories with mkdir 160 Moving Files with mv 161 Renaming Files with rename 161 Deleting Files and Directories with rm 161 Sorting the Contents of a File with sort 162 Printing the Last Lines of a File with tail 163 Printing the Location of a Command with which 164 Downloading Files with wget 164 Chapter 12 Command-Line Master Class, Part 2 167 Redirecting Output and Input 167 stdin, stdout, stderr, and Redirection 169 Comparing Files 170 Finding Differences in Files with diff 170 Finding Similarities in Files with comm 170 Limiting Resource Use and Job Control 171 Listing Processes with ps 171 Listing Jobs with jobs 173 Running One or More Tasks in the Background 173 Moving Jobs to the Background or Foreground with bg and fg 174 Printing Resource Usage with top 175 Setting Process Priority with nice 177 Combining Commands 178 Pipes 178 Combining Commands with Boolean Operators 180 Running Separate Commands in Sequence 180 Process Substitution 181 Executing Jobs in Parallel 181 Using Environment Variables 182 Using Common Text Editors 185 Working with nano 186 Working with vi 187 Working with emacs 188 Working with sed and awk 189 Working with Compressed Files 191 Using Multiple Terminals with byobu192 Doing a Polite System Reset Using REISUB 194 Fixing an Ubuntu System That Will Not Boot 195 Checking BIOS 195 Checking GRUB 195 Reinstalling GRUB 195 Using Recovery Mode 196 Reinstalling Ubuntu 196 Tips and Tricks 196 Running the Previous Command 196 Running Any Previous Command 197 Running a Previous Command That Started with Specific Letters 197 Running the Same Thing You Just Ran with a Different First Word 197 Viewing Your History and More 197 Doing Two or More Things 198 Using Shortcuts 198 Confining a Script to a Directory 198 Using Coreutils 199 Reading the Contents of the Kernel Ring Buffer with dmesg 200 Chapter 13 Managing Users 201 User Accounts 201 The Super User/Root User 202 User IDs and Group IDs 204 File Permissions 204 Managing Groups 205 Group Listing 205 Group Management Tools 206 Managing Users 207 User Management Tools 208 Adding New Users 209 Monitoring User Activity on the System 211 Managing Passwords 212 System Password Policy 212 The Password File 212 Shadow Passwords 214 Managing Password Security for Users 216 Changing Passwords in a Batch 216 Granting System Administrator Privileges to Regular Users 217 Temporarily Changing User Identity with the su Command 217 Granting Root Privileges on Occasion: The sudo Command 219 Disk Quotas 222 Implementing Quotas 222 Manually Configuring Quotas 223 Related Ubuntu Commands 223 Chapter 14 Automating Tasks and Shell Scripting 225 What Is a Shell? 225 Scheduling Tasks 226 Using at and batch to Schedule Tasks for Later 227 Using cron to Run Jobs Repeatedly 229 Using rtcwake to Wake Your Computer from Sleep Automatically 231 Basic Shell Control 233 The Shell Command Line 233 Shell Pattern-Matching Support 235 Redirecting Input and Output 236 Piping Data 237 Background Processing 237 Writing and Executing a Shell Script 237 Running the New Shell Program 239 Storing Shell Scripts for System-wide Access 240 Interpreting Shell Scripts Through Specific Shells 240 Using Variables in Shell Scripts 242 Assigning a Value to a Variable 242 Accessing Variable Values 243 Positional Parameters 243 A Simple Example of a Positional Parameter 243 Using Positional Parameters to Access and Retrieve Variables from the Command Line 244 Using a Simple Script to Automate Tasks 244 Built-in Variables 246 Special Characters 247 Comparison of Expressions in pdksh and bash 250 Comparing Expressions with tcsh 255 The for Statement 259 The while Statement 261 The until Statement 263 The repeat Statement (tcsh) 263 The select Statement (pdksh) 264 The shift Statement 264 The if Statement 265 The expr Statement 266 The case Statement 267 The break and exit Statements 269 Using Functions in Shell Scripts 269 Chapter 15 The Boot Process 271 Running Services at Boot 271 Beginning the Boot Loading Process 272 Loading the Linux Kernel 274 Starting and Stopping Services with systemd 275 Controlling Services at Boot with Administrative Tools 278 Troubleshooting Runlevel Problems 278 Boot-Repair 278 Chapter 16 System-Monitoring Tools 281 Console-Based Monitoring 281 Using the kill Command to Control Processes 283 Using Priority Scheduling and Control 285 Displaying Free and Used Memory with free 286 Disk Space 286 Disk Quotas 287 Checking Log Files 287 Rotating Log Files 289 Graphical Process- and System-Management Tools 292 System Monitor 292 Conky 292 Other Graphical Process- and System-Monitoring Tools 297 KDE Process- and System-Monitoring Tools 298 Enterprise Server Monitoring 298 Chapter 17 Backing Up 301 Choosing a Backup Strategy 301 Why Data Loss Occurs 302 Assessing Your Backup Needs and Resources 303 Evaluating Backup Strategies 304 Making the Choice 308 Choosing Backup Hardware and Media 308 External Hard Drive 308 Network Storage 308 Tape Drive Backups 309 Cloud Storage 309 Using Backup Software 309 tar: The Most Basic Backup Tool 310 The GNOME File Roller 312 The KDE ark Archiving Tool 312 Déjà Dup 313 Back In Time 314 Unison 315 Amanda 315 Alternative Backup Software 316 Copying Files 316 Copying Files Using tar 317 Compressing, Encrypting, and Sending tar Streams 318 Copying Files Using cp 318 Using rsync 319 Version Control for Configuration Files 320 System Rescue 323 The Ubuntu Rescue Disc 323 Restoring the GRUB2 Boot Loader 323 Saving Files from a Nonbooting Hard Drive 324 Chapter 18 Networking 325 Laying the Foundation: The localhost Interface 326 Checking for the Availability of the Loopback Interface 326 Configuring the Loopback Interface Manually 327 Checking Connections with ping, traceroute, and mtr 328 Networking with TCP/IP 330 TCP/IP Addressing 331 Using IP Masquerading in Ubuntu 332 Ports 333 IPv6 Basics 334 Network Organization 337 Subnetting 337 Subnet Masks 337 Broadcast, Unicast, and Multicast Addressing 338 Hardware Devices for Networking 338 Network Interface Cards 338 Network Cable 340 Hubs and Switches 342 Routers and Bridges 343 Initializing New Network Hardware 343 Using Network Configuration Tools 345 Command-Line Network Interface Configuration 346 Network Configuration Files 350 Using Graphical Configuration Tools 355 Dynamic Host Configuration Protocol 355 How DHCP Works 356 Activating DHCP at Installation and Boot Time 357 DHCP Software Installation and Configuration 358 Using DHCP to Configure Network Hosts 359 Other Uses for DHCP 361 Wireless Networking 361 Support for Wireless Networking in Ubuntu 361 Choosing from Among Available Wireless Protocols 363 Beyond the Network and onto the Internet 363 Common Configuration Information 364 Configuring Digital Subscriber Line Access 365 Understanding PPP over Ethernet 366 Configuring a PPPoE Connection Manually 366 Configuring Dial-up Internet Access 367 Troubleshooting Connection Problems 368 Chapter 19 Remote Access with SSH and VNC 371 Setting Up an SSH Server 371 SSH Tools 372 Using scp to Copy Individual Files Between Machines 372 Using sftp to Copy Many Files Between Machines 373 Using ssh-keygen to Enable Key-Based Logins 373 Virtual Network Computing 375 Guacamole 377 Chapter 20 Securing Your Machines 379 Understanding Computer Attacks 379 Assessing Your Vulnerability 381 Protecting Your Machine 382 Securing a Wireless Network 382 Passwords and Physical Security 383 Configuring and Using Tripwire 384 Securing Devices 385 Viruses 385 Configuring Your Firewall 386 AppArmor 388 Forming a Disaster Recovery Plan 390 Chapter 21 Performance Tuning 393 Storage Disk 394 Linux File Systems 394 The hdparm Command 395 File System Tuning 396 The tune2fs Command 396 The e2fsck Command 397 The badblocks Command 397 Disabling File Access Time 397 Kernel 398 Tuned 399 Chapter 22 Kernel and Module Management 401 The Linux Kernel 402 The Linux Source Tree 403 Types of Kernels 405 Managing Modules 406 When to Recompile 408 Kernel Versions 409 Obtaining the Kernel Sources 409 Patching the Kernel 410 Compiling the Kernel 412 Using xconfig to Configure the Kernel 414 Creating an Initial RAM Disk Image 418 When Something Goes Wrong 418 Errors During Compile 418 Runtime Errors, Boot Loader Problems, and Kernel Oops 419 PART IV: UBUNTU AS A SERVER Chapter 23 Sharing Files and Printers 421 Using Network File System 422 Installing and Starting or Stopping NFS 422 NFS Server Configuration 422 NFS Client Configuration 423 Putting Samba to Work 424 Manually Configuring Samba with /etc/samba/smb conf 426 Testing Samba with the testparm Command 429 Starting, Stopping, and Restarting the smbd Daemon 429 Mounting Samba Shares 430 Network and Remote Printing with Ubuntu 431 Creating Network Printers 431 Using the CUPS GUI 433 Avoiding Printer Support Problems 434 Chapter 24 Common Web Server Stacks 437 LAMP 437 LEMP 439 MEAN 440 Chapter 25 Apache Web Server Management 443 About the Apache Web Server 443 Installing the Apache Server 444 Starting and Stopping Apache 444 Runtime Server Configuration Settings 446 Runtime Configuration Directives 446 Editing apache2 conf 447 Apache Multiprocessing Modules 449 Using htaccess Configuration Files 450 File System Authentication and Access Control 452 Restricting Access with Require 452 Authentication 453 Final Words on Access Control 455 Apache Modules 455 mod_access 456 mod_alias 456 mod_asis 456 mod_auth 457 mod_auth_anon 457 mod_auth_dbm 457 mod_auth_digest 457 mod_autoindex4 58 mod_cgi 458 mod_dir and mod_env 458 mod_expires 458 mod_headers 458 mod_include 459 mod_info and mod_log_config 459 mod_mime and mod_mime_magic 459 mod_negotiation 459 mod_rewrite 459 mod_setenvif 460 mod_speling 460 mod_status 460 mod_ssl 460 mod_unique_id 460

    15 in stock

    £41.30

  • CCDE v3 Practice Labs

    Pearson Education (US) CCDE v3 Practice Labs

    10 in stock

    Book SynopsisMartin J. Duggan, CCDE#2016::6 and CCIE#7942, is a Principal Network Architect designing network solutions for global financial accounts at Systal Technology Solutions. He is one of Systal's key technical leadership resources, helping Systal to be a dynamic and innovative services integrator and provider that offers fast, agile, and tailored support to meet business aspirations and challenges. Martin gained his Routing & Switching CCIE in 2001 and has been passionate about Cisco qualifications and mentoring ever since. He wrote the CCIE Routing & Switching Practice Labs series for Cisco Press and was keen to do the same for the CCDE program after completing his CCDE. He resides in the UK, where he draws inspiration for his CCDE scenarios from his successful career in the communications industry. Martin enjoys gliding, cycling, snowboarding, and karate when not designing networks, and he creates content for multiple Cisco exam tracks. Follow Martin on TTable of Contents Foreword xx Introduction: A License to Design xxi Chapter 1 CCDE Practice Lab 1: Jacobs 1 Practice Lab Navigation 1 Practice Lab 1 Summary 114 Chapter 2 CCDE Practice Lab 2: Squid Energy 115 Practice Lab Navigation 115 Practice Lab 116 Summary 382 Chapter 3 CCDE Practice Lab 3: Bank of Jersey 229 Practice Lab Navigation 229 Practice Lab 230 Summary 382 9780137499854, TOC, 6/17/2022

    10 in stock

    £75.64

  • Network Automation Made Easy

    Pearson Education (US) Network Automation Made Easy

    15 in stock

    Book SynopsisIvo Pinto, CCIE No. 57162 (R&S, Security, and Data Center), CISSP, is a Solutions Architect with many years of experience in the fields of multicloud, automation, and enterprise and data center networking. Ivo has worked at Cisco in different roles and different geographies, and he has led the architecture creation and deployment of many automated global-scale solutions for Fortune 50 companies that are in production today. In his latest role, he is responsible for multicloud innovation at the Customer Experience CTO office. Ivo is the founder of IT OnTrack (www.itontrack.com), a provider of services to young professionals who are looking to further their careers in IT. Ivo has authored Cisco white papers and multiple Cisco exam questions. Follow Ivo on LinkedIn @ivopinto01.Table of Contents Introduction xvii Chapter 1 Types of Network Automation 1 Data-Driven Automation 2 Task-Based Automation 11 End-to-End Automation 16 Tools 22 Summary 39 Review Questions 40 Chapter 2 Data for Network Automation 43 The Importance of Data 43 Data Formats and Models 44 Methods for Gathering Data 66 Summary 84 End Notes 84 Review Questions 85 Chapter 3 Using Data from Your Network 87 Data Preparation 87 Data Visualization 100 Data Insights 104 Case Studies 112 Summary 116 Review Questions 117 Chapter 4 Ansible Basics 119 Ansible Characteristics 119 Installing Ansible 120 Variables 126 Playbooks 131 Conditionals 133 Loops 136 Handlers 140 Executing a Playbook 143 Roles 149 Summary 152 Review Questions 153 Chapter 5 Using Ansible for Network Automation 155 Interacting with Files 155 Interacting with Devices 160 Interacting with APIs 187 Case Studies 189 Summary 195 Review Questions 196 Chapter 6 Network DevOps 199 What NetDevOps Is 199 NetDevOps Tools 214 How to Build Your Own NetDevOps Environment 228 Case Studies 233 Summary 238 Review Questions 238 Chapter 7 Automation Strategies 241 What an Automation Strategy Is 241 Why You Need an Automation Strategy 250 How to Build Your Own Automation Strategy 251 How to Use an Automation Strategy 268 Summary 270 Review Questions 271 Appendix A Answers to Review Questions 273 TOC, 9780137455928, 10/5/2021

    15 in stock

    £40.49

  • ModelDriven DevOps

    Pearson Education (US) ModelDriven DevOps

    15 in stock

    Book SynopsisSteven Carter has more than 25 years of industry experience working in large universities, government research and development laboratories, and private sector companies. He has been a speaker at several industry conferences and written blogs and articles in technical journals. He has spent time as a system administrator running some of the world's largest supercomputers and a network engineer building out the world's first SDN network for the Department of Energy. In addition, Steven has a wide range of experience in networking, including operations, embedded software development, and sales. He has spent the past 5 years working for Red Hat Ansible and Cisco Systems consulting and coding for many of the world's largest organizations as they modernize and secure their operations by incorporating DevOps. He currently works as a principal DevOps engineer for Cisco Systems creating CI/CD pipelines for deploying cloud applications and network infrastructure in secure anTable of ContentsChapter 1: A Lightbulb Goes Off Enterprise IT as a Source of Risk to the Business Observations of a Train WreckDevOps Seems Like a Better Way What Is DevOps? Automation Infrastructure as Code CI/CD Apps vs. Infrastructure Harnessing Automation-at-ScaleWhy Are Enterprise IT Departments Not Adopting DevOps? Human Factors Business FactorsSummaryChapter 2: A Better Way The Goal: Business Transformation Constraints-Based IT Business Transformation DevOps in ActionWhy Model-Driven DevOps? Network Infrastructure Is Different What Is Model-Driven DevOps? What Is a Data Model? Source of Truth DevOps as a FrameworkDevSecOps: Baked-In SecuritySummaryChapter 3: Consumable Infrastructure APIs Why API over CLI?Platforms Physical Hardware Provisioning Consolidated Control Point Northbound vs. Southbound APIs API and Feature Normalization Fabricwide Services ScalabilitySummaryChapter 4: Infrastructure as Code Why Infrastructure as Code?Source of Truth Data Models Common IaC Tools Organization Types of Source of TruthCode Data FlowSummaryChapter 5: Continuous Integration/Continuous Deployment CI/CD Overview Applications vs. Infrastructure CI/CD in ActionSource Code Management Core Features Collaboration Features SCM SummaryContinuous Integration Tools CI Engines How They Work Sample WorkflowInfrastructure Simulation Tools Cisco Modeling LabsTest and Validation Linting Schema/Model Validation Functional Testing Test and Validation SummaryContinuous DeploymentContinuous MonitoringSummaryChapter 6: Implementation Model-Driven DevOps Reference ImplementationThe GoalDevOps RoadmapArchitecture Network as an Application ConsistencySimulationAutomation Creating a Source of Truth Moving Data MDD Source of Truth Automation Tooling MDD Data Automation Runner Cisco Network Services OrchestratorTesting Linting Snapshotting the Test Network Data Validation and State Checking Data Validation Pushing Data to the Devices State Checking Restore Continuous Integration Workflow SummaryDeployment Scale Starting WorkflowsSummaryChapter 7: Human Factors Culture and the Need for ChangeStart with the WhyOrganization Leadership Role Models Building a Team Break Down the Silos Community New Tools Summary of Organization-Level ChangesIndividual Programming vs. Automation Version Control Tools Data Formats APIs Templating Linux/UNIX Wait! Where Do I Fit In?Summary9780137644674 TOC 6/23/2022

    15 in stock

    £34.19

  • Cisco Intersight

    Pearson Education (US) Cisco Intersight

    15 in stock

    Book SynopsisMatthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown, Bradley TerEick, and Mohit Vaswani are Solutions Architects within the Cisco Cloud Infrastructure & Software Group who are passionate about helping customers build high-value hybrid cloud and multi-cloud solutions. Every day, they work directly with Cisco customers and partners to combine Cisco, third-party, open-source, and public cloud technologies to achieve key business objectives.Table of Contents Foreword xviii Introduction xix Chapter 1 Intersight Foundations 1 Introduction 1 Intersight Architecture 1 Licensing 21 Summary 21 References 21 Chapter 2 Security 23 Introduction 23 Connectivity 23 Claiming 24 Role-Based Access Control (RBAC) 26 Audit Logs 28 Data Security 29 Security Advantages 30 Summary 31 References 31 Chapter 3 Infrastructure Operations 33 Introduction 33 Device Health and Monitoring 33 Linking Intelligence Feeds 38 Integrated Support 47 Infrastructure Configuration 50 ITSM Integration 54 UCS Director Integration 56 Summary 61 References 61 Chapter 4 Server Operations 63 Introduction 63 Supported Systems 63 Server Actions 64 Server Deployment 69 Server Policies 69 ID Pools 70 Domain Management 73 Firmware Updates 80 Summary 83 Reference 83 Chapter 5 Network Operations 85 Introduction 85 Policy-Driven Network Infrastructure 85 Summary 90 Reference 90 Chapter 6 Storage Operations 91 Introduction 91 HyperFlex 92 Deploying HyperFlex Clusters 101 Managing HX Clusters 105 Traditional Storage Operations 113 Summary 116 References 116 Chapter 7 Virtualization Operations 117 Introduction 117 Claiming a vCenter Target 118 Claiming an AWS Target 120 Contextual Visibility 121 Contextual Operations 130 Virtualization Orchestration 132 Summary 134 Reference 134 Chapter 8 Kubernetes 135 Introduction 135 Intersight Kubernetes Service 136 Benefits of IKS 138 Cluster Management 139 Intersight Workload Engine 161 Summary 165 References 166 Chapter 9 Workload Optimization 167 Introduction 167 Users and Roles 169 Targets and Configuration 170 The Supply Chain 172 Actions 174 Groups and Policies 175 Planning and Placement 180 The Public Cloud 182 Summary 185 References 185 Chapter 10 Orchestration 187 Introduction 187 Automation and Orchestration 187 Intersight Orchestration 188 Use Cases 200 Summary 203 Chapter 11 Programmability 205 Introduction 205 Client SDKs 209 Authentication and Authorization 210 Crawl, Walk, Run 213 Advanced Usage 237 Next Steps: Use Cases 244 Summary 255 References 255 Chapter 12 Infrastructure as Code 257 Introduction 257 What Is Infrastructure as Code? 258 HashiCorp Terraform 262 Intersight and Infrastructure as Code 263 IST and Intersight Cloud Orchestrator 272 Summary 273 9780137937288, TOC, 10/3/2022

    15 in stock

    £40.49

  • Automating and Orchestrating Networks with

    Pearson Education Automating and Orchestrating Networks with

    1 in stock

    Book SynopsisIvo Pinto, CCIE No. 57162 (R&S, Security, and Data Center), CISSP, is a Solutions Architect with many years of experience in the fields of cloud, automation, and enterprise and data center networking. Ivo has worked at Cisco in different roles and different geographies, and he has led the architecture and deployment of many automated global-scale solutions for Fortune 50 companies that are in production today. In his latest role, he is responsible for the architecture of multiple ISV products at Amazon Web Services (AWS). Ivo has authored multiple white papers, blogs, and the book Network Automation Made Easy. You can follow Ivo on LinkedIn @ivopinto01. Faisal Chaudhry, CCIE No. 2706 (R&S and Voice), is a Distinguished Engineer in Cisco Customer Experience (CX). In his current role, Faisal works with Cisco customers and industry on cloud automation and orchestration, software-defined networking (SDN) solutions, and network fun

    1 in stock

    £42.74

  • DevSecOps in Oracle Cloud

    Pearson Education DevSecOps in Oracle Cloud

    15 in stock

    Book Synopsis

    15 in stock

    £44.19

  • Designing RealWorld Multidomain Networks

    Pearson Education Designing RealWorld Multidomain Networks

    1 in stock

    Book SynopsisDhrumil Prajapati: Dhrumil is a principal architect within Cisco CX's GES Architecture team. His focus lies on multi-domain networks, and he has been offering a complete lifecycle of professional services and architecture advisory for the past 13 years. His expertise extends to serving enterprise, government, and service provider entities across the globe. His services are designed to assist clients in planning, designing, deploying, managing, and interoperating all networking technology domains within their private or public infrastructure and application environments.   In his networking career, Dhrumil has designed networks for more than 150 organizations, which inspired him to write a book on the subject. He is a coauthor of Cisco SD-Access for Industry Verticals (https://cs.co/sda-verticals-book), and holds patents and has given multiple presentations in Cisco Live on SD-Access and multi-domain.   Dhrumil holds dua

    1 in stock

    £33.74

  • Cisco Meraki Fundamentals

    Pearson Education (US) Cisco Meraki Fundamentals

    1 in stock

    Book SynopsisArun Paul serves as a technical solutions architect at Cisco Meraki, focusing on supporting public sector SLED customers in the Midwest states. With more than a decade of experience in the technology industry, Arun has held diverse roles ranging from engineering to technical sales. Arun's tech journey began as a software engineer at the Cisco Catalyst 6500 BU, where he played a pivotal role as a point of contact for Catalyst design recommendations and escalations. Arun showcased his innovative spirit by proposing Cisco innovation ideas and process improvements. Beyond corporate roles, Arun co-founded a security consulting and training business, gaining valuable entrepreneurial experience. This venture provided insights into customer challenges in the modern technology landscape. Arun holds an MS in Information Security from George Mason University, graduating with a Distinguished Achievement Award. Arun has consistently demonstrated dedication

    1 in stock

    £43.19

  • Pearson Education Zero Trust in Resilient Cloud and Network

    15 in stock

    Book Synopsis

    15 in stock

    £47.59

  • Deploying Juniper Data Centers with EVPN VXLAN

    Pearson Education Deploying Juniper Data Centers with EVPN VXLAN

    1 in stock

    Book SynopsisAninda Chatterjee holds a Bachelor of Engineering degree in Information Science. His networking career started at AT&T, troubleshooting Layer 1 circuit issues, eventually transitioning to customer support at Cisco TAC, specializing in Layer 2. After his stint at Cisco TAC, he has held several roles across different organizations, with functions including escalation support for enterprise and data center engineering, designing, implementing, and troubleshooting enterprise and data center networks, and technical marketing for Cisco Software Defined Access (SDA). In his current role as a senior technical marketing engineer at Juniper Networks, Aninda specializes in data center networks with EVPN VXLAN, while also focusing on the high demand of networking infrastructure for high-performance computing and AI/ML clusters. Aninda actively writes on his personal blog, www.theasciiconstruct.com.

    1 in stock

    £47.99

  • The AI Revolution in Networking Cybersecurity and

    Pearson Education (US) The AI Revolution in Networking Cybersecurity and

    1 in stock

    Book SynopsisOmar Santos is a cybersecurity thought leader with a passion for driving industry-wide initiatives to enhance the security of critical infrastructures. Omar is the lead of the DEF CON Red Team Village, chair of the Common Security Advisory Framework (CSAF) technical committee, and board member of the OASIS Open standards organization. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is a renowned expert in ethical hacking, vulnerability research, and incident response. He employs his deep understanding of these disciplines to help organizations stay ahead of emerging threats. His dedication to cybersecurity has made a significant impact on businesses, academic institutions, law enforcement agencies, and other entities striving to bolster their security measures. With over twenty books, video courses, Trade Review“As AI promises to revolutionize many aspects of work and society, there is a critical need for IT professionals to understand how AI can help them in practice. This book provides a highly accessible overview of how new and emerging AI capabilities can improve many key areas of IT. The authors were early industry pioneers in applying AI to improve networking, cybersecurity, and the design & operation of AI-based systems for large enterprises -- and their real-world AI experience is clearly shown throughout the book.”--John Apostolopoulos, Area Tech Lead Communication & Collaboration, Google, formerly VP/CTO Enterprise Networking Business, CiscoTable of ContentsPreface xix Chapter 1. Introducing the Age of AI: Emergence, Growth, and Impact on Technology 1 The End of Human Civilization 2 Significant Milestones in AI Development (This Book Is Already Obsolete) 2 The AI Black Box Problem and Explainable AI 5 What's the Difference Between Large Language Models and Traditional Machine Learning? 6 Hugging Face Hub: A Game-Changer in Collaborative Machine Learning 12 AI's Expansion Across Industries: Networking, Cloud Computing, Security, Collaboration, and IoT 14 AI's Impacts on the Job Market 15 AI's Impacts on Security, Ethics, and Privacy 17 Summary 30 References 31 Chapter 2. Connected Intelligence: AI in Computer Networking 33 The Role of AI in Computer Networking 34 AI for Network Management 37 AI for Network Optimization 45 AI for Network Security 49 AI for Traffic Classification and Prediction 52 AI in Network Digital Twins 54 Summary 55 References 56 Chapter 3. Securing the Digital Frontier: AI's Role in Cybersecurity 59 AI in Incident Response: Analyzing Potential Indicators to Determine the Type of Attack 59 AI in Vulnerability Management and Vulnerability Prioritization 71 AI in Security Governance, Policies, Processes, and Procedures 73 Using AI to Create Secure Network Designs 74 AI and Security Implications of IoT, OT, Embedded, and Specialized Systems 75 AI and Physical Security 76 AI in Security Assessments, Red Teaming, and Penetration Testing 77 AI in Identity and Account Management 80 Using AI for Fraud Detection and Prevention 86 AI and Cryptography 87 AI in Secure Application Development, Deployment, and Automation 90 Summary 93 References 94 Chapter 4. AI and Collaboration Building Bridges, Not Walls 95 Collaboration Tools and the Future of Work 96 AI for Collaboration 101 The Contact Center: A Bridge to Customers 109 AR/VR: A Closer Look 113 Affective Computing 116 Summary 116 References 117 Chapter 5. AI in the Internet of Things (AIoT) 119 Understanding the IoT Landscape 120 AI for Data Analytics and Decision Making 122 AI for IoT Resource Optimization 125 AI for IoT in Supply Chain 127 AI for IoT Security 130 AI for IoT in Sustainability 133 Summary 137 References 137 Chapter 6. Revolutionizing Cloud Computing with AI 139 Understanding the Cloud Computing Environment 139 AI in Cloud Infrastructure Management 145 AI for Cloud Security 147 AI for Cloud Optimization 151 AI and Machine Learning as a Service 153 Challenges of AI and Machine Learning in the Cloud 158 What Lies Ahead 158 References 159 Chapter 7. Impact of AI in Other Emerging Technologies 161 Executive Order on the Development and Use of Artificial Intelligence 162 AI in Quantum Computing 163 How AI Can Revolutionize Quantum Hardware Optimization 167 Data Analysis and Interpretation 168 AI in Blockchain Technologies 169 AI in Autonomous Vehicles and Drones 175 AI in Edge Computing 175 Summary 183 References 184 Index 185

    1 in stock

    £25.19

  • Cisco ThousandEyes

    Pearson Education Cisco ThousandEyes

    15 in stock

    Book SynopsisAaron Trompeter is a technical solutions architect within the ThousandEyes global enterprise segment at Cisco, focusing on visibility and operational awareness for onprem, SaaS, and cloud native. In this role, he aligns his passion for education and learning with his motivation for helping the infrastructure community grow and learn to harness tools to provide use cases that fit each organization. Prior to this role, Aaron spent 6 years as a data center TSA within Cisco and had a few other roles within Cisco as a service provider specialist and software engineer in the Cloud Engineering unit. Aaron has more than 20 years of experience in the IT and engineering areas and has continued to focus on networking and software. Rob Webb began his technical career when, at 17 years old, he enlisted in the military as a teletype technician. His military service spanned more than 28 years, during which time he trained and worked in telecommunications sy

    15 in stock

    £40.79

  • Cisco Catalyst SDWAN

    Pearson Education Cisco Catalyst SDWAN

    15 in stock

    Book SynopsisAnastasiya Volkova, CCIE No. 54378 (EN and Security), is a Solutions Architect on the Cisco Global Demo Engineering team, with a focus on Enterprise networking, Security and Cloud solutions, and multi-domain integrations. Anastasiya has more than 12 years of industry experience. Her background includes different areas of expertise, from hands-on experience in design, implementation, and support of network solutions to conducting trainings and technical presentations. She is very passionate about sharing her knowledge with others, hoping to help more people fall in love with the technology.   Osvaldo Salazar Tovar is a Technical Solutions Architect/Solutions Engineer in the Cisco Enterprise Routing and SD-WAN group. Throughout his career, he has supported the Global Service Provider and Enterprise Networking teams in LATAM through various technical sales engineering roles. He is currently working with different verticals in the Uni

    15 in stock

    £50.99

  • Cyber Strategy

    Oxford University Press Inc Cyber Strategy

    Out of stock

    Book SynopsisAre cyber operations as revolutionary as the headlines suggest? Do they compel rival states and alter international politics? By examining cyber strategy as a contemporary form of political warfare and covert action, this book demonstrates that the digital domain complements rather than replaces traditional instruments of power.Trade ReviewThis hugely important work needs to be an inspiration for future works across the cyber field. Nuanced, subtle, and extremely well written, the work aims to explain what cyber strategy may actually be, how it comes in diverse forms not only across issue areas but across state interests, and whether or not cyber really does signal an entirely new and different era in warfare. Summing up: Essential. * M. D. Crosston, CHOICE *Cyber Strategy makes a compelling case that our new age of connectivity is also one of vulnerability. Not only due to the potential for disruption of democratic processes and theft or ransoming of valuable information. But also because many nations believe, perhaps mistakenly, that they can commit predatory acts in cyberspace — to spy, extort, or simply inflict costs upon others — with little fear of escalation to wider warfare. Valeriano, Jensen, and Maness examine these and other issues in cyber strategy, rigorously and unflinchingly. * John Arquilla, Distinguished Professor of Defense Analysis, United States Naval Postgraduate School *The United States is dangerously insecure in cyberspace and we are at great risk from both nation state adversaries and non-state actors alike. This book provides a comprehensive analysis of the utility and efficacy of cyber coercion and great insight into how we can reevaluate cyber strategy. We hope to push the United States into a position where we can defend our nation and, if required, impose costs on our adversaries, serious work like Cyber Strategy provides a solid foundation for these efforts. * Mike Gallagher, , U.S. Representative for Wisconsin's 8th Congressional District *In a new era of cyber coercion, we have more to fear from state-backed botnets manipulating our social media feed than from cyber bombs destroying our electric grid. "Avoiding both hype and complacency, this important book uses empirical evidence to illuminate the strategies of disruption, espionage, and degradation that threaten us, and to outline what we can do about it."-Joseph S. Nye, Jr., author of The Future of PowerCyber Strategy brings together a tremendous amount of emerging research in the field of cyber conflict, tying theory to observed campaigns and data sets to tackle the big questions. Valeriano, Jensen, and Maness clearly lay out their hypotheses and evidence on the behavior of the main cyber powers (Russia, China, and the United States) and the dynamics of the conflict between them."-Jason Healey, Senior Research Scholar, School of International and Public Affairs, Columbia UniversityTable of ContentsPreface Acknowledgements Chapter 1 - Introduction: Are Cyber Strategies Coercive? Chapter 2 - How Rival States Employ Cyber Strategy: Disruption, Espionage, and Degradation Chapter 3 - The Correlates of Cyber Strategy Chapter 4 - Cyber Coercion as a Combined Strategy Chapter 5 - Commissars and Crooks: Russian Cyber Coercion Chapter 6 - China and the Technology Gap: Chinese Strategic Behavior in Cyberspace Chapter 7 - The United States: The Cyber Reconnaissance-Strike Complex Chapter 8 - Conclusion: Cyber Political Warfare with Limited Effects Appendix 1: The Dyadic Cyber Incident and Dispute Dataset Version 1.1 Appendix 2: Cyber Strategy Summary Appendix 3: The Dyadic Cyber Incident and Dispute Dataset (DCID), version 1.1, summarized version Notes Bibliography Index

    Out of stock

    £27.71

  • Parallel Scientific Computation 2e A Structured

    Oxford University Press Parallel Scientific Computation 2e A Structured

    1 in stock

    Book SynopsisParallel Scientific Computation presents a methodology for designing parallel algorithms and writing parallel computer programs for modern computer architectures with multiple processors.Trade ReviewThe author presents a detailed study describing how parallel computation can be applied to a collection of numerical problems. He considers LU decomposition of dense matrices, the fast Fourier transform (FFT), multiplication of a sparse matrix by a dense vector, as well as matching vertices in a sparse graph and sorting. He uses these to teach design and implementation of well-structured efficient parallel algorithms...The book is best suited for a graduate course in parallel scientific processing for mathematics or computer science students. * Bill Satzer, MAA Reviews *

    1 in stock

    £43.69

  • Bavarialift           FINENECKLACEBRACELETANKLET

    Pearson Education Limited Bavarialift FINENECKLACEBRACELETANKLET

    1 in stock

    Book Synopsis

    1 in stock

    £18.00

  • Interconnections

    Pearson Education (US) Interconnections

    Out of stock

    Book Synopsis Radia Perlman's work has had a profound impact on the field of networking. She was recently featured in the 25th anniversary edition of Data Communications magazine as one of the 25 people whose work has most influenced the industry. She is the creator of the spanning tree algorithm upon which bridges (switches) are based, and the algorithms that allow robust and efficient link state routing, upon which all modern link state routing protocols (such as IS-IS, OSPF, and PNNI) are based. Radia designed IS-IS, Simple Multicast, and sabotage-proof routing. She is also co-author of Network Security: Private Communication in a Public World. Both of her books were listed in the top 10 most useful networking reference books in the March, 1988 issue of Network Magazine. She is currently a Distinguished Engineer at Sun Microsystems, Inc. She holds about 50 patents and a Ph.D. from M.I.T. 0201634481AB04062001Table of Contents Preface. Roadmap to the Book. Acknowledgments. 1. Essential Networking Concepts. Layers. Service Models. Important Properties of a Network. Reliable Data Transfer Protocols. 2. Data Link Layer Issues. Generic LANs. IEEE 802 LANs. Names, Addresses, Routes. LAN Addresses. Multicast versus Unicast Addresses. The Broadcast Address. Multiplexing Field. Bit Order. Logical Link Control. Issues in 802.3. Issues in 802.5. Packet Bursts. Reasons for Bridges. Point-to-Point Links. 3. Transparent Bridges. The No-Frills Bridge. The Learning Bridge. Spanning Tree Algorithm. Spanning Tree Algorithm Refinements. Bridge Message Formats. Other Bridge Issues. Remote Bridges. 4. Source Routing Bridges. Pure Source Routing. SR-TB Bridges. SRT Bridges. End-system Algorithms. Source Routing versus Transparent Bridging. Ideas for Improving Source Route Bridging. 5. Hubs, Switches, Virtual LANs, and Fast Ethernet. Hubs. Faster LANs. Virtual LANs (VLANs). 6. Network Interface: Service Models. What Is the Network Layer? Network Service Types. 7. Connection-oriented Nets: X.25 and ATM. Generic Connection-oriented Network. X.25: Reliable Connection-oriented Service. Implementing X.25 Inside the Net. Asynchronous Transfer Mode. 8. Generic Connectionless Service. Data Transfer. Addresses. Hop Count. Service Class Information. Network Feedback. Fragmentation and Reassembly. Maximum Packet Size Discovery. 9. Network Layer Addresses. Hierarchical Addresses with Fixed Boundaries. Hierarchical Addresses with Flexible Boundaries. Owning versus Renting Addresses. Types of Addresses. IP. IPX. IPX+. IPv6. CLNP Network Layer Addresses. AppleTalk Network Layer Addresses. DECnet Phases III and IV. NAT/NAPT. 10. Connectionless Data Packet Formats. Pieces of a Connectionless Network Layer. Data Packets. Summary of Packet Formats for Easy Reference. Technical Issues and Comparisons in Data Packet Formats. Source Routing. The Great IPX Frame Format Mystery. Error Reports and Other Network Feedback to the Endnode. 11. Neighbor Greeting and Autoconfiguration. Endnodes Attached via Point-to-Point Links. Endnodes Attached via LANs. Endnodes Attached via Nonbroadcast Multiaccess Media. Finding Things. 12. Routing Algorithm Concepts. Distance Vector Routing. Link State Routing. Comparison of Link State and Distance Vector Routing. Load Splitting. Link Costs. Migrating Routing Algorithms. LANs. Types of Service. Partition Repair: Level 1 Subnetwork Partition. 13. Fast Packet Forwarding. Using an Additional Header. Address Prefix Matching. Longest Prefix Match with Trie. Binary Search. 14. Specific Routing Protocols. A Brief History of Intradomain Routing Protocols. RIP. RTMP, IPX-RIP, and DECnet. IS-IS, OSPF, NLSP, and PNNI. Interdomain Routing Protocols. 15. WAN Multicast. Introduction. Multicast in IP. 16. Sabotage-proof Routing. The Problem. All You Need to Know about Cryptography. Overview of the Approach. Detailed Description of the Approach. Summary. For Further Reading. 17. To Route, Bridge, or Switch: Is That the Question? Switches. Bridges versus Routers. Extensions to Bridges. Extensions to Routers. 18. Protocol Design Folklore. Simplicity versus Flexibility versus Optimality. Knowing the Problem You're Trying to Solve. Overhead and Scaling. Operation Above Capacity. Compact IDs versus Object Identifiers. Optimizing for the Most Common or Important Case. Forward Compatibility. Migration: Routing Algorithms and Addressing. Parameters. Making Multiprotocol Operation Possible. Running over Layer 3 versus Layer. Robustness. Determinism versus Stability. Performance for Correctness. In Closing. Glossary. Index. 0201634481T04062001

    Out of stock

    £59.84

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account