The Networking CD Bookshelf


Book Description

More and more, technology professionals are relying on the Web, online help, and other online information sources to solve their tough problems. Now, with O'Reilly's ""Networking CD Bookshelf, Version 2.0, you can have the same convenient online access to your favorite O'Reilly books--all from your CD-ROM drive. We've packed seven of our best-selling guides onto this CD-ROM, giving you 4,016 pages of O'Reilly references and tutorials --fully searchable and cross-referenced, so you can search either the individual index for each book or the master index for the entire collection. Included are the complete, unabridged versions of these popular titles: ""TCP/IP Network Administration, 3rd Edition DNS & Bind, 4th Edition Building Internet Firewalls, 2nd Edition SSH, The Secure Shell: The Definitive Guide Network Troubleshooting Tools Managing NFS & NIS, 2nd Edition Essential SNMP As a bonus, you also get the new paperback version of ""TCP/IP Network Administration, 3rd Edition. Now it's easier than ever to find what you need to know about managing, administering, and protecting networks. This unique CD-ROM is a dream come true for network and system administrators--potent combination of books that offers unprecedented power and flexibility in this ever-expanding field. Formatted in HTML, ""The Networking CD Bookshelf, Version 2.0, can be accessed with any web browser, so you have a complete library of technical books that you can carry with you anywhere you need it. No other resource makes so much valuable information so easy to find and so convenient to use.




TCP/IP Network Administration


Book Description

"Covers Linux, Solaris, BSD, and System V TCP/IP implementations"--Back cover.




Practical UNIX and Internet Security


Book Description

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.




Cisco Router Firewall Security


Book Description

Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package. Each chapter in Cisco Router Firewall Security addresses an important component of perimeter router security. Author Richard Deal explains the advantages and disadvantages of all key security features to help you understand when they should be used and includes examples from his personal consulting experience to illustrate critical issues and security pitfalls. A detailed case study is included at the end of the book, which illustrates best practices and specific information on how to implement Cisco router security features. Whether you are looking to learn about firewall security or seeking how-to techniques to enhance security in your Cisco routers, Cisco Router Firewall Security is your complete reference for securing the perimeter of your network. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.




The FreeBSD Corporate Networker's Guide


Book Description

FreeBSD runs many of the Web's most demanding applications. Yahoo! uses FreeBSD to deliver nearly 500 million page hits a day; even Microsoft's Hotmail has run for years on FreeBSD. Now, there's a single source of documentation for the thousands of technical professionals who've discovered FreeBSD and want to leverage its awesome power. The FreeBSD Corporate Networker's Guide covers everything IT professionals need to know to deploy and manage FreeBSD in applications from the desktop to high availability enterprise servers. Start with an overview of how FreeBSD compares with Windows NT, and the roles a FreeBSD server might play in an enterprise network. Next, review server planning, hardware selection, and infrastructure preparation; then walk through the steps involved in a successful FreeBSD installation. Master every aspect of FreeBSD Internet connectivity and services -- including TCP/IP, DNS, security, Apache, email, and more. Learn the fundamentals of FreeBSD system administration; use FreeBSD systems as firewalls and routers; configure Samba to support Windows workstations; deliver efficient print services, and more. The book concludes with a "manifesto" explaining why companies should consider migrating all their business-critical applications to FreeBSD, whatever they're using now. An accompanying CD-ROM contains FreeBSD 4.1, the latest version.




Network Warrior


Book Description

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An in-depth view of routers and routing Switching, using Cisco Catalyst and Nexus switches as examples SOHO VoIP and SOHO wireless access point design and configuration Introduction to IPv6 with configuration examples Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS Security, firewall theory, and configuration, as well as ACL and authentication Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ) IP address allocation, Network Time Protocol (NTP), and device failures




Design to Thrive


Book Description

Social networks and online communities are reshaping the way people communicate, both in their personal and professional lives. What makes some succeed and others fail? What draws a user in? What makes them join? What keeps them coming back? Entrepreneurs and businesses are turning to user experience practitioners to figure this out. Though they are well-equipped to evaluate and create a variety of interfaces, social networks require a different set of design principles and ways of thinking about the user in order to be successful. Design to Thrive presents tried and tested design methodologies, based on the author’s decades of research, to ensure successful and sustainable online communities -- whether a wiki for employees to share procedures and best practices or for the next Facebook. The book describes four criteria, called "RIBS," which are necessary to the design of a successful and sustainable online community. These concepts provide designers with the tools they need to generate informed creative and productive design ideas, to think proactively about the communities they are building or maintaining, and to design communities that encourage users to actively contribute. Provides essential tools to create thriving social networks, helping designers to avoid common pitfalls, avoid costly mistakes, and to ensure that communities meet client needs Contains real world stories from popular, well known communities to illustrate how the concepts work Features a companion online network that employs the techniques outlined in the boo




CCNP Security IPS 642-627 Official Cert Guide


Book Description

CCNP Security IPS 642-627 Official Cert Guide David Burns Odunayo Adesina, CCIE� No. 26695 Keith Barker, CCIE No. 6783 . Master CCNP Security IPS 642-627 exam topics . Assess your knowledge with chapter-opening quizzes . Review key concepts with exam preparation tasks . Practice with realistic exam questions on the CD-ROM Learn, prepare, and practice for exam success CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns, Odunayo Adesina, and Keith Barker share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCNP Security IPS 642-627 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. The companion CD-ROM contains the powerful Pearson IT Certification Practice Test engine that enables you to focus on individual topic areas or take a complete, timed exam. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCNP Security IPS 642-627 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. The official study guide helps you master all the topics on the CCNP Security IPS exam, including Cisco IPS software, hardware, and supporting applications Network IPS and IDS deployment architecture Installing and maintaining Cisco IPS physical and virtual sensors Traffic analysis IPS signatures and responses Anomaly-based operations Improving alarm response and quality Managing and analyzing events High availability and performance IPS modules for ASAs, routers, and switches Companion CD-ROM The CD-ROM contains a free, complete practice exam. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test Pearson IT Certification Practice Test minimum system requirements: Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Microsoft SQL Server Compact 4.0; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB disc space plus 50 MB for each downloaded practice exam CCNP Security Category: Cisco Press-Cisco Certification Covers: CCNP Security IPS 642-627




Cisco Networking Simplified


Book Description

This text serves as an introduction to networking technologies, providing an overview of topics and teaching their relevance to business and the Internet. Using a simple illustrated storytelling approach, it provides readers with a comprehensive reference to networking concepts.




Programming Embedded Systems in C and C++


Book Description

This book introduces embedded systems to C and C++ programmers. Topics include testing memory devices, writing and erasing flash memory, verifying nonvolatile memory contents, controlling on-chip peripherals, device driver design and implementation, and more.