viernes, 30 de noviembre de 2007

CNAP CCNA 1 and 2 Companion Guide (3rd Edition)

Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Third Edition, is the Cisco approved textbook to use alongside version 3.1 of the Cisco Networking Academy Program CCNA 1 and CCNA 2 web-based courses. The topics covered provide you with the necessary knowledge to begin your preparation for the CCNA certification exam (640-801, or 640-821 and 640-811) and to enter the field of network administration.

Edición: Cisco Press (2003)
Idioma: Inglés
Formato: PDF

Contenido:

CCNA 1: Networking Basics

  1. Introduction to Networking
  2. Networking Fundamentals
  3. Networking Media
  4. Cable Testing and Cabling LANs and WANs
  5. Ethernet Fundamentals
  6. Ethernet Technologies and Ethernet Switching
  7. TCP/IP Protocol Suite and IP Addressing
  8. Routing Fundamentals and Subnets
  9. TCP/IP Transport and Application Layer

CCNA 2: Routers and Routing Basics

  1. WANs and Routers
  2. Router Fundamentals
  3. Router Configuration
  4. Learning About Neighboring and Remote Devices
  5. Managing Cisco IOS Software
  6. Routing and Routing Protocols
  7. Distance Vector Routing Protocols
  8. TCP/IP Error and Control Messages
  9. Basic Router Troubleshooting
  10. Intermediate TCP
  11. Access Control Lists
  12. Appendix A: Structured Cabling
  13. Appendix B: Glossary of Key Terms
  14. Appendix C: Check Your Understanding Answer Key

Descarga/Download

Business Continuity & Disaster Recovery for IT Professionals

As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, its difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially.

That is what Business Continuity Planning (BCP) is: a methodology used to create a plan for how an organization will recover after a disaster of various types. It takes into account both security and corporate risk management tatics.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Business Continuity and Disaster Recovery Overview
  2. Project Initiation
  3. Risk Assessment
  4. Business Impact Analysis
  5. Mitigation Strategy Development
  6. Business Continuity/Disaster Recovery Plan Development
  7. Emergency Response and Recovery
  8. Training, Testing, and Auditing
  9. BC/DR Plan Maintenance
  10. Appendix A: Risk Management Checklist
  11. Appendix B: Crisis Communications Checklist
  12. Appendix C: Business Continuity and Disaster Recovery Response Checklist
  13. Appendix D: Emergency and Recovery Response Checklist
  14. Appendix E: Business Continuity Checklist
  15. Appendix F: IT Recovery Checklists
  16. Appendix G: Training, Testing, and Auditing Checklists
  17. Appendix H: BC/DR Plan Maintenance Checklist

Descarga/Download

Understanding DB2 9 Security

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

Edición: IBM Press (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. The Regulatory Environment
  2. DB2 Security–The Starting Point
  3. Understanding Identification and Authentication–The First Line of Defense
  4. Securing DB2 on Windows
  5. Authorization–Authority and Privileges
  6. Label Based Access Control
  7. Encryption (Cryptography) in DB2
  8. Ready, Set, Implement?
  9. Database Auditing and Intrusion Detection
  10. SSH for Data-Partitioning on UNIX Platforms
  11. Database Security—Keeping it Current
  12. Final Thoughts: Security—The Human Factor
  13. Appendix A: Independent Security Packages
  14. Appendix B: Kerberos
  15. Appendix C: DB2 Audit Scope Record Layouts
  16. Appendix D: DB2 Audit—Additional Documentation
  17. Appendix E: Security Considerations for DB2
  18. Appendix F: Glossary of Authorization ID
  19. Appendix G: LBAC-Related SYSCAT views
  20. Appendix H: Security Plug-In Return Codes
  21. Appendix I: Detailed Implementation for the Case Study in Chapter 3

Descarga/Download

jueves, 29 de noviembre de 2007

CompTIA A+ Complete Study Guide

Candidates aiming for CompTIA's revised, two-exam A+ Certified Track will find everything they need in this value-packed book. Prepare for the required exam, CompTIA A+ Essentials (220-601), as well as your choice of one of three additional exams focusing on specific job roles--IT Technician (220-602), Remote Support Technician (220-603), or Depot Technician (220-604). This in-depth book prepares you for any or all four exams, with full coverage of all exam objectives.

Edición: Sybex (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Identifying Personal Computer Components
  2. Effectively Working with Personal Computer Components
  3. Understanding Laptops and Portable Devices
  4. Understanding Operating Systems
  5. Understanding Basics of Installing, Configuring, Optimizing, and Upgrading Operating Systems
  6. Identifying Operating System Troubleshooting and Diagnostic Procedures
  7. Understanding the Basics of Printers and Scanners
  8. Networking Fundamentals
  9. Understanding Network Security Fundamentals
  10. Identifying Safety and Environmental Issues
  11. Understanding Professionalism and Communication
  12. Working with Personal Computer Components
  13. Working with Laptops and Portable Devices
  14. Installing, Configuring, Optimizing, and Upgrading Operating Systems
  15. Installing, Configuring, Optimizing, and Upgrading Printers and Scanners
  16. Installing, Configuring, Optimizing, and Upgrading Network Systems
  17. Installing, Configuring, Upgrading, and Optimizing Security Systems

Descarga/Download

How to Cheat at IIS 7 Server Administration

According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of administration tools. Administrators migrating from version 6 will find this How to Cheat book the perfect vehicle for getting up to speed fast on the new version. IIS version 7 is the perfect product for the How to Cheat series. This new version from Microsoft is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average SysAdmin, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help get IIS 7 up and running as quickly and safely as possible.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Getting Started with IIS 7.0
  2. Installation of IIS 7.0
  3. The Extensible Core Server
  4. Get Started with IIS 7.0’s Configuration
  5. Administration of an IIS 7.0 Web Server
  6. Troubleshooting 101: Diagnostics in IIS 7.0
  7. Putting It All Together
  8. Appendix A: Monitoring IIS 6.0 with Microsoft Log Parser
  9. Appendix B: SQL Grammar Reference
  10. Appendix C: Function Reference
  11. Appendix D: Input Format Reference
  12. Appendix E: Output Format Reference

Descarga/Download

miércoles, 28 de noviembre de 2007

MCSA MCSE (Exam 70-350) Implementing Microsoft Internet Security and Acceleration Server 2004

Ace your preparation for the skills measured by MCP Exam 70-350—and on the job—with this official Microsoft study guide. Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions.

Edición: Microsoft Press (2005)
Idioma: Inglés
Formato: PDF



Contenido:

  1. Introduction to ISA Server 2004
  2. Installing ISA Server 2004
  3. Securing and Maintaining ISA Server 2004
  4. Installing and Managing ISA Server Clients
  5. Enabling Secure Internet Access with ISA Server 2004
  6. Implementing ISA Server Caching
  7. Configuring ISA Server as a Firewall
  8. Implementing ISA Server Publishing
  9. Integrating ISA Server 2004 and Exchange Server
  10. Configuring Virtual Private Networks for Remote Clients and Networks
  11. Implementing Monitoring and Reporting
  12. Implementing ISA Server 2004, Enterprise Edition
  13. Planning and Installing ISA Server 2004 (1.0)
  14. Installing and Configuring Client Computers (2.0)
  15. Configuring and Managing ISA Server 2004 (3.0)
  16. Configuring Web Caching (4.0)
  17. Configuring Firewall Policy (5.0)
  18. Configuring and Managing Remote Network Connectivity (6.0)
  19. Monitoring and Reporting ISA Server 2004 Activity (7.0)

Descarga/Download

Wireshark & Ethereal Network Protocol Analyzer Toolkit

If you are looking for a comprehensive guide to help you unleash the powers of Wireshark, you’ve come to the right place. Wireshark is the best open-source network analyzer available. It is packed with features comparable to commercial network analyzers, and with a large, diverse collection of authors, new enhancements are continually developed. Wireshark is a stable and useful component for all network toolkits, and new features and bug fixes are always being developed. A lot of progress has been made since the early days of Wireshark (when it was still called Ethereal); the application now performs comparably to (and in some regards better than) commercial sniffing software.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introducing Network Analysis
  2. Introducing Wireshark: Network Protocol Analyzer
  3. Getting and Installing Wireshark
  4. Using Wireshark
  5. Filters
  6. Wireless Sniffing with Wireshark
  7. Real World Packet Captures
  8. Developing Wireshark
  9. Other Programs Packaged with Wireshark

Descarga/Download

martes, 27 de noviembre de 2007

CWNA: Certified Wireless Network Administrator Study Guide

One of the fastest-growing certifications on the market, CWNA is rapidly becoming the premier professional wireless certification for network administrators. It is also the foundation-level exam for the complete Certified Wireless Network Professional program. Now you can join the move to Wi-Fi and prepare for your certification with this comprehensive and targeted study guide.



Edición: Sybex (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Overview of Wireless Standards and Organizations
  2. Radio Frequency Fundamentals
  3. Radio Frequency Components, Measurements, and Mathematics
  4. Radio Frequency Signal and Antenna Concepts
  5. IEEE 802.11 Standards
  6. Wireless Networks and Spread Spectrum Technologies
  7. Wireless LAN Topologies
  8. 802.11 Medium Access
  9. 802.11 MAC Architecture
  10. Wireless Devices
  11. Network Design, Implementation, and Management
  12. WLAN Troubleshooting
  13. 802.11 Network Security Architecture
  14. Wireless Attacks, Intrusion Monitoring, and Policy
  15. Radio Frequency Site Survey Fundamentals
  16. Site Survey Systems and Devices

Descarga/Download

CCNP ONT Quick Reference Sheets: Exam 642-845

As a final exam preparation tool, the CCNP ONT Quick Reference Sheets provide a concise review of all objectives on the new CCNP ONT exam (642-845). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format.

Edición: Cisco Press (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Network Architecture
  2. Cisco VoIP
  3. QoS Overview
  4. QoS Details
  5. AutoQoS
  6. Wireless Scalability

Descarga/Download

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security addresses security issues from the earliest stages of application development onward. The premise of the book is that there is too much at stake to wait for an audit (or worse, a customer) to find flaws or errors in your code. While acknowledging that there is no way to completely eliminate the risk of a malicious attack on your code, following the instructions and recommendations in this book should dramatically reduce both the likelihood of an attack as well as mitigate the extent of the damage should an attack occur. Specific tool coverage includes CGI Scripting, Java, XML, ActiveX and ColdFusion.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Hacking Methodology
  2. How to Avoid Becoming a Code Grinder
  3. Understanding the Risk Associated with Mobile Code
  4. Vulnerable CGI Scripts
  5. Hacking Techniques and Tools
  6. Code Auditing and Reverse Engineering
  7. Securing Your Java Code
  8. Securing XML
  9. Building Safe ActiveX Internet Controls
  10. Securing ColdFusion
  11. Developing Security-Enabled Applications
  12. Cradle to Grave: Working with a Security Plan

Descarga/Download

lunes, 26 de noviembre de 2007

Voice over IP Fundamentals (2nd Edition)

Voice over IP Fundamentals explains how a basic IP telephony infrastructure is built and works today, major concepts concerning voice and data networking, and transmission of voice over data networks. You’ll learn how voice is signaled through legacy telephone networks, how IP signaling protocols are used to interoperate with current telephony systems, and how to ensure good voice quality using quality of service (QoS).

Edición: Cisco Press (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Overview of the PSTN and Comparisons to Voice over IP
  2. Enterprise Telephony Today
  3. Basic Telephony Signaling
  4. Signaling System 7
  5. PSTN Services
  6. IP Tutorial
  7. VoIP: An In-Depth Analysis
  8. Quality of Service
  9. Billing and Mediation Services
  10. Voice Security
  11. H.323
  12. SIP
  13. Gateway Control Protocols
  14. PSTN and VoIP Interworking
  15. Service Provider VoIP Applications and Services
  16. Enterprise Voice over IP Applications and Services

Descarga/Download

CCNP ISCW Quick Reference Sheets: Exam 642-825

As a final exam preparation tool, the CCNP ISCW Quick Reference Sheets provide a concise review of all objectives on the new CCNP ISCW exam (642-825). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format.

Edición: Cisco Press (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Network Conceptual Models
  2. Providing SOHO/Teleworker Connectivity
  3. Frame Mode MPLS
  4. IPsec
  5. Cisco Device Hardening
  6. Cisco IOS Threat Defenses

Descarga/Download

Fundamentals of WiMAX: Understanding Broadband Wireless Networking

WiMAX is the most promising new technology for broadband wireless access to IP services. Fundamentals of WiMAX is the first comprehensive guide to WiMAX - its technical foundations, features, and peformance. Written by three leading wireless experts, one at the University of Texas, this book gives complete information for wireless professionals as well as basic, accessible knowledge for non-technical managers. While the main audience is industry professionals, this could be used in a special topics wireless undergraduate course.

Edición: Prentice Hall (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction to Broadband Wireless
  2. Overview of WiMAX
  3. The Challenge of Broadband Wireless Channels
  4. Orthogonal Frequency Division Multiplexing
  5. Multiple-Antenna Techniques
  6. Orthogonal Frequency Division Multiple Access
  7. Networking and Services Aspects of Broadband Wireless
  8. PHY Layer of WiMAX
  9. MAC Layer of WiMAX
  10. WiMAX Network Architecture
  11. Link-Level Performance of WiMAX
  12. System-Level Performance of WiMAX

Descarga/Download

domingo, 25 de noviembre de 2007

Check Point Next Generation Security Administration

The Check Point Next Generation suite of products provides the tools necessary for easy development and deployment of Enterprise Security Solutions. Check Point VPN-1/FireWall-1 has been beating out its competitors for years, and the Next Generation software continues to improve the look, feel, and ease of use of this software. Check Point NG Security Administration will show you the ins and outs of the NG product line.

Edición: Syngress (2002)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Introduction to Check Point Next Generation
  2. Installing and Configuring VPN-1/FireWall-1 Next Generation
  3. Using the Graphical Interface
  4. Creating a Security Policy
  5. Applying Network Address Translation
  6. Authenticating Users
  7. Open Security (OPSEC) and Content Filtering
  8. Managing Policies and Logs
  9. Tracking and Alerts
  10. Configuring Virtual Private Networks
  11. Securing Remote Clients
  12. Advanced Configurations
  13. Appendix A: Class C Subnet Mask Cheat Sheet
  14. Appendix B: Spoofing: Attacks on Trusted Identity

Descarga/Download

Cross Site Scripting Attacks: XSS Exploits and Defense

Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern.

Edición: Syngress (2007)
Idioma: Inglés
Formato: PDF



Contenido:

  1. Cross-site Scripting Fundamentals
  2. The XSS Discovery Toolkit
  3. XSS Theory
  4. XSS Attack Methods
  5. Advanced XSS Attack Vectors
  6. XSS Exploited
  7. Exploit Frameworks
  8. XSS Worms
  9. Preventing XSS Attacks
  10. Appendix A: The Owned List

Descarga/Download

CCIE Security Practice Labs

CCIE Security Practice Labs provides a series of complete practice labs that mirror the difficult hands-on lab exam. Written by a CCIE Security engineer and Cisco Systems CCIE proctor, this book lays out seven end-to-end scenarios that are both complex and realistic, providing you with the practice needed to prepare for your lab examination and develop critical-thinking skills that are essential for resolving complex, real-world security problems. While many engineers are able to configure single technologies in standalone environments, most will struggle when dealing with integrated technologies in heterogeneous environments.

Edición: Cisco Press (2004)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Practice Lab 1
  2. Practice Lab 2
  3. Practice Lab 3
  4. Practice Lab 4
  5. Practice Lab 5
  6. Practice Lab 6
  7. Practice Lab 7

Descarga/Download

sábado, 24 de noviembre de 2007

TestInside CCNA 640-802 v12

With the complete collection of questions and answers, TestInside has assembled to take you through 192 questions to your 640-802 Exam preparation. In the 640-802 exam resources, you will cover every field and category in CCNA helping to ready you for your successful Cisco Certification.

Questons and Answers: 208



Descarga/Download

Windows Vista Inside Out

You’re beyond the basics, so dive right in and really put your PC to work! This supremely organized reference is packed with hundreds of timesaving solutions, troubleshooting tips, and workarounds. It’s all muscle and no fluff. Discover how the experts tackle Windows Vista—and challenge yourself to new levels of mastery!



Edición: Microsoft Press (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Setup and Startup
  2. Security and Networking
  3. Digital Media
  4. System Maintenance and Management
  5. Advanced System Management
  6. Appendices

Descarga/Download

Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle

Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle provides solutions for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? Have you considered the damage that could be done by recently laid-off or disgruntled employees, contractors and consultants, building security guards, cleaning staff, and of course the unsecured wireless network? This is the one book you need to defend the soft, chewy center of internal networks.

Edición: Syngress (2003)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Assessing Internal Network Security
  2. Inventory and Exposure of Corporate Assets
  3. Hunting for High Severity Vulnerabilities (HSV)
  4. Attacking and Defending Windows XP Professional
  5. Attacking and Defending Windows 2000
  6. Securing Active Directory
  7. Securing Exchange and Outlook Web Access
  8. Attacking and Defending DNS
  9. Attacking and Defending Microsoft Terminal Services
  10. Securing IIS
  11. Hacking Custom Web Applications
  12. Attacking and Defending Microsoft SQL Server
  13. Attacking and Defending Oracle
  14. Attacking and Defending Unix
  15. Wireless LANs: Discovery and Defense
  16. Network Architecture
  17. Architecting the Human Factor
  18. Creating Effective Corporate Security Policies

Descarga/Download

miércoles, 21 de noviembre de 2007

Testking CCNA 640-802 V9.0

What do you get with our Testking Q & A package? Simple, you will receive 676 questions and answers - complete with thorough explanations. There is no better way to prepare for your Cisco Certification and your upcoming 640-802 Exam then with using our assembled Q & A package created by our certified Information Technology educational staff.

Questons and Answers: 676
Updated: 11/11/2007



Descarga/Download

Core Java Volume I - Fundamentals (8th Edition)

This revised edition of the classic Core Java™, Volume I - Fundamentals, is the definitive guide to Java for serious programmers who want to put Java to work on real projects.

Fully updated for the new Java SE 6 platform, this no-nonsense tutorial and reliable reference illuminates the most important language and library features with thoroughly tested real-world examples. The example programs have been carefully crafted to be easy to understand as well as useful in practice, so you can rely on them as an outstanding starting point for your own code.

Edición: Prentice Hall (2007)
Idioma: Inglés
Formato: PDF

Contenido:

  1. An Introduction to Java
  2. The Java Programming Environment
  3. Fundamental Programming Structures in Java
  4. Objects and Classes
  5. Inheritance
  6. Interfaces and Inner Classes
  7. Graphics Programming
  8. Event Handling
  9. User Interface Components with Swing
  10. Deploying Applications and Applets
  11. Exceptions, Logging, Assertions, and Debugging
  12. Generic Programming
  13. Collections
  14. Multithreading

Descarga/Download

martes, 20 de noviembre de 2007

Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package.

Edición: Cisco Press (2004)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Security Threats
  2. Introduction to Firewalls
  3. Accessing a Router
  4. Disabling Unnecessary Services
  5. Authentication, Authorization, and Accounting
  6. Access List Introduction
  7. Basic Access Lists
  8. Reflexive Access Lists
  9. Context-Based Access Control
  10. Filtering Web and Application Traffic
  11. Address Translation
  12. Address Translation Issues
  13. Lock-and-Key Access Lists
  14. Authentication Proxy
  15. Routing Protocol Protection
  16. Intrusion-Detection System
  17. DoS Protection
  18. Logging Events
  19. IPSec Site-to-Site Connections
  20. IPSec Remote-Access Connections
  21. Case Study

Descarga/Download

lunes, 19 de noviembre de 2007

CCNP BSCI Quick Reference Sheets: Exam 642-901

As a final exam preparation tool, the CCNP BSCI Quick Reference Sheets provide a concise review of all objectives on the new CCNP BSCI exam (642-901). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format.

Edición: Cisco Press (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. The Evolving Network Model
  2. EIGRP
  3. OSPF
  4. IS-IS
  5. Optimizing Routing
  6. BGP
  7. IP Multicast
  8. IPv6 Introduction

Descarga/Download

Windows to Linux Migration Toolkit

This book will provide the system administrator all the information, tools, and guidance, including valuable fully functioning scripts to migrate from Windows NT/2000 to any Linux variant.

It allows a company to fully migrate away from Microsoft Active Directory and Exchange Server, and add anti-virus/anti-spam features for free and provides migration process planning, automated migration scripts, anti-virus/anti-spam solutions, and specific migration and deployment details for all relevant technologies.

Edición: Syngress (2004)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Network Services Migration Roadmap
  2. Core TCP/IP Networking Services
  3. Directory Services
  4. Authentication Services
  5. File Services
  6. Print Services
  7. Messaging Services
  8. Groupware and Calendaring Services
  9. Web Services: IIS vs Apache
  10. Desktop Migration Roadmap
  11. Inside the Typical Linux Desktop
  12. Appendix A: Introducing Network Análisis and Ethereal
  13. Appendix B: Introducing Intrusion Detection Systems and Snort
  14. Appendix C: Introducing Vulnerability Assessments and Nessus

Descarga/Download