- CBT Nuggets: Cisco CCNA/CCENT – Exam-Pack 640-822: ICND1
- CBT Nuggets: Intro to XML and Programming using the Microsoft.NET
- CBT Nuggets: Cisco CCSP – Exam-Pack 642-513: HIPS
- Pocket pc network programming
- DNS on Windows
- The rational unified process made easy
- Unix/Linux Survival Guide: Erik Keller
- Incident Response: Computer Forensics Toolkit
- High Performance MySQL: Optimierung, Datensicherung & Lastverteilung
- IP in Wireless Networks
Posted: 23 Jun 2009 04:09 PM PDT
Wouldn’t it be cool to walk into a small business that has no network and configure a fairly advanced network from the ground up using Cisco gear? Let the CBT Nuggets’ Cisco CCNA/CCENT – Exam-Pack 640-822: ICND1 video series teach you the essential skills for passing the CCENT certification exam and meeting the network support needs of employers and clients.
Successful networking careers begin with Cisco CCENT certification and the fundamental knowledge it represents. Trainer Jeremy Cioara carefully explains the certification process by walking you through CCENT networking basics and mapping those basics directly to the exam. His organized and captivating presentation prepares new users for junior administrator positions and provides managers of any description with a sound understanding of what their technicians are talking about.
You proceed at your own pace, watching videos that break down the CCENT certification process and basic Cisco networking into bite-sized nuggets. Video by video you learn how to install, operate and troubleshoot a small enterprise branch network — including basic network security.
Cisco CCNA/CCENT – Exam-Pack 640-822: ICND1 shows you how to be a subnetting master, teaches you about switches and routers, helps you understand essential protocols like TCP and UDP, explains cabling and networking, and covers exciting topics like wireless networking and Cisco’s SDM graphic interface.
These videos go beyond simply prepping you for the CCENT test (although they’re great test prep!). They also teach you skills you’ll need day-in and day-out as a networking technician professional. Over and over again you’ll draw on these videos as an indispensable reference tool. They also lay a terrific foundation for the follow-up CCNA exam and certification.
Posted: 23 Jun 2009 04:06 PM PDT
XML, the standardized format of the World Wide Web Consortium (W3C) aims to make application development and integration very simple. It is a data format and framework that has been adopted as the basis for information exchange by the software development community. It is so powerful that Microsoft developed their entire .NET platform around using XML.
It is simple to learn, flexible to use and easy to understand. It works with applications, the internet and databases and is platform independent meaning it can be used to share data between a variety of database and application types and formats.
Garth Schulte, the instructor for this series, details how XML came to life, why it is needed and how you can use it. This creates a very informative foundation of knowledge that will benefit programmers, administrators and engineers alike. If your job entails any type of interface with databases, connectivity of applications or transferring of information, you need to watch these videos. Programmers will find the videos a great place to start if they are considering an MCAD or MCSD for .NET certification track. The series contains 14 videos that average 30 minutes in length. This provides for 7 hours of in-depth instruction that is designed to entertain as well as educate. You won’t fall asleep watching these. Garth has a great personality that shines through in his presentation of the material. He is truly passionate about programming and what you can create with a computer.
Posted: 23 Jun 2009 04:04 PM PDT
This video series shows you how to configure and deploy Cisco Security Agent (CSA) Management Center (MC) — a terrific weapon for defeating attacks and gaining security piece of mind. Once CSA MC is installed, and your system is rebooted, it provides immediate protection for all the workstations, hosts and servers throughout your system.
The CSA MC is a vital part of Cisco’s Self-Defending Network (SDN) strategy, which offers you a layered approach to network security. Threats, both internal and external, can’t slip through your defenses just by defeating a single obstacle; CSA MC lets you put other layered security barriers in place to keep your system safe and secure.
HIPS includes Agent Kits, which ease your network administrator tasks by simplifying the installation process. This training shows you how to set up Agent Kits step by step.
Because this security strategy lets you group hosts as you please, you’ll spend less time deploying software updates. It also provides variables, so you won’t need to create the same security rules over and over again. Variables let you apply rules quickly throughout your network. And they also let you group similar components for easier management — such as data sets, file sets, network address sets, network services sets, registry sets, COM component sets and query settings.
Many security rules are common to both Windows and UNIX, but others are specific to one or the other. This training makes sure you know which is which and how to handle system-specific rules.
The training also goes into detail on event logging, report generation and monitoring applicant deployment behavior and investigation — vital topics for every security administrator.
In addition to giving you practical, hands-on instruction, the training in Exam-Pack 642-513: HIPS maps to exam objectives. It prepares you to describe, configure, and verify the Cisco Security Agent product for the simulation- and knowledge-based HIPS exam. Exam 642-513: HIPS is one of five exams required to earn the Cisco Certified Security Professional certification.
The CCSP-HIPS video series contains:
# Introduction to the CSA
# Configuring and Installing the CSA MC
# Installing the CSA Agent
# Configuring Groups on the CSA MC
# The CSA Agent Kit
# Host Management (free video!)
# Policy Configuration
# Working with Variables
# Working with Application Classes
# Working with Rules (part 1)
# Working with Rules (part 2)
# Managing Events
# Generating Reports
# Application Deployment Investigation and Reporting
# Application Behavior Investigation and Reporting
Here’s what you’ll learn in each video of the CCSP-HIPS series:
Video 1 – “Introduction to the Cisco HIPS Series” – Introduces you to Cisco Security Agent (CSA). Familiarizes you with the CCSP – HIPS 642-513 certification exam. Separates the exam content into five main domains and discusses the exam.
Video 2 – “Introduction to the CSA” – Walks you through CSA and its role in Cisco’ Self-Defending Network (SDN). Describes how CSA works on workstations, hosts and servers to enforce the security of network traffic. You’ll learn about CSA architecture, the features of CSA and CSA Management Center (MC) components. You’ll also see a portrait of typical network attack and how CSA handles it.
Video 3 – “Configuring and Installing the CSA MC” – You’ll learn about the CSA interface and how to configure security policies. (Understanding the interface is necessary to pass the exam.) Plus, you’ll learn the CSA MC installation requirements.
Video 4 – “Installing the CSA Agent” – This video shows you how to customize CSA MC installation using installation kits. You’ll learn system-specific installation requirements and how to use CSA to monitor system functions and analyze operations, and you’ll see how CSA proactively blocks malicious activity attempts.
Video 5 – “Configuring Groups on the CSA MC” – This video provides an overview of groups and why to use them. It covers a variety of configuration topics, including: setting security requirements for groups of similar hosts; streamlining the process of assigning common policies to groups and sending out updates and alerts; configuring groups; and generating and distributing rule groups before policies take effect.
Video 6 – “The CSA Agent Kit” – Agent kits make your job as a network administrator easier. They simplify installing CSA (along with pre-existing security policies and rules) onto a host. Learn how to build agent kits step by step. This video walks you through agent kit status levels, rebooting options and controlling host registration by defining IP addresses.
Video 7 – “Host Management” – Protect yourself from structured and unstructured network attacks with effective policies. Learn how to generate solid security policies. This video provides you with an overview and key considerations of security policy. It also discusses security policy issues and configuring policy elements on CSA MC.
Video 9 – “Working with Variables” – Why create the same rules over and over to cover hosts across the network? Simplify the process by connecting similar components using variables. Variables can connect data sets, file sets, network address sets, network services sets, registry sets, COM component sets and query settings.
Video 10 – “Working with Application Classes” – Gain an overview of application classes. Understand the difference between static and dynamic classes. Learn to configure application classes in CSA MC.
Video 11 – “Working with Rules (part 1)” – This video shows you rules for using workstations in a host-based IPS environment. It also covers managing files and registry keys, and shows how to handle COM components and network access. You’ll understand CSA rules, major rule types, rules common to both UNIX and Microsoft, rule configuration and rule prioritization for specific actions.
Video 12 – “Working with Rules (part 2)” – Learn about rules specific to UNIX or Windows. Windows-specific rules include clipboard access control, COM component access, file version control, kernal control, NT event log, registry access, service restart and sniffer & protocol detection. UNIX-specific rules include network interface control, resource access control, root kit/kernal protection and Syslog control.
Video 13 – “Managing Events” – Learn about CSA MC event log and event monitor. This video discusses event log management and event management wizard. It also explains event sets and alerts/system status.
Video 14 – “Generating Reports” – Some activities require ongoing monitoring, such as upgrades and patches. Configuring rules in CSA MC lets you log specific events. Learn how to generate the following reports: events by severity, events by groups, host detail, policy detail and group detail.
Video 15 – “Application Deployment Investigation and Reporting” – Learn about monitoring applications running on host systems (end-user workstations, servers, etc.). Other topics include: configuring the CSA MC to perform application deployment investigation on all installed network applications; analyzing and compiling data on all network host applications and creating application deployment reports.
Video 16 – “Application Behavior Investigation and Reporting” – Detecting and rectifying application violations and locating undesirable intrusions and activities are essential security activities. This video gives you an overview of behavior Analysis in CSA MC. It also explains the following reports: file event, registry event, COM event, network event and summary.
Posted: 23 Jun 2009 09:35 AM PDT
Pocket PC Network Programming is the resource developers need to exploit the power of mobile technology and high-speed wireless connections. This book is a comprehensive tutorial and reference for writing network applications on Pocket PC 2002 and Pocket PC 2002 Phone Edition devices. It explains how the Pocket PC communicates with the Internet, with other mobile devices, and with networks. It teaches developers the basics of Pocket PC telephony, synchronization, and messaging.
Pocket PC Network Programming begins with a guide to writing applications that communicate over the Internet and then explores how to use Pocket PC devices with Windows-based networks, how these devices communicate over serial and infrared, and how they utilize Remote Access Services (RAS). The focus then shifts to the Pocket PC 2002 Phone Edition before turning to the building of applications designed for synchronization with a desktop computer. The final chapters cover the Pocket Outlook Object Model, the Mail API, and the .NET Compact Framework.
Key topic coverage includes:
Sample applications clearly demonstrate each of the networking technologies discussed, and answers to developers’ most frequently asked questions are indexed on the book’s inside covers.
Posted: 23 Jun 2009 09:34 AM PDT
DNS on Windows 2000
DNS on Windows 2000 is a special Windows-oriented edition of the classic DNS and BIND. The Domain Name System (DNS) is one of the Internet’s fundamental building blocks: the distributed host information database that’s responsible for translating names into addresses, routing mail to its proper destination, and many other services. As the preface says, if you’re using the Internet, you’re already using DNS–even if you don’t know it. Besides covering general issues like installing, setting up, and maintaining the server, DNS on Windows 2000 tackles those specific to the Windows environment: integration between DNS and Active Directory, conversion from BIND to the Microsoft DNS server, and registry settings. You’ll also acquire a grounding in:
If you’re a Windows administrator, DNS on Windows 2000 is the operations manual you need for working with DNS every day; if you’re a Windows user who simply wants to take the mystery out of the Internet, this book is a readable introduction to the Internet’s architecture and inner workings. Topics include:
Posted: 23 Jun 2009 09:34 AM PDT
From the Back Cover
“Per Kroll and Philippe Kruchten are especially well suited to explain the RUP…because they have been the central forces inside Rational Software behind the creation of the RUP and its delivery to projects around the world.”
–From the Foreword by Grady Booch
This book is a comprehensive guide to modern software development practices, as embodied in the Rational Unified Process, or RUP. With the help of this book’s practical advice and insight, software practitioners will learn how to tackle challenging development projects–small and large–using an iterative and risk-driven development approach with a proven track record.
The Rational Unified Process Made Easy will teach you the key points involved in planning and managing iterative projects, the fundamentals of component design and software architecture, and the proper employment of use cases. All team members–from project managers to analysts, from developers to testers–will learn how to immediately apply the RUP to their work. You will learn that the RUP is a flexible, versatile process framework that can be tailored to suit the needs of development projects of all types and sizes.
Key topics covered include:
Use this book to get quickly up to speed with the RUP, so you can easily employ the significant power of this process to increase the productivity of your team.
Posted: 23 Jun 2009 09:33 AM PDT
Unix/Linux Survival Guide: Erik Keller
Posted: 23 Jun 2009 09:32 AM PDT
Incident Response: Computer Forensics Toolkit
Publisher: Wiley | ISBN: 0764526367 | edition 2003 | PDF | 360 pages | 5,08 mb
Posted: 23 Jun 2009 09:31 AM PDT
About the Author
Thanks to the original uploader!
Posted: 23 Jun 2009 09:24 AM PDT
IP in Wireless Networks
" This is a guide to integrating the Internet Protocol in second generation and third generation wireless networks. Implementation issues associated with running IP in a wireless environment are examined in-depth. For each type of wireless network discussed, the authors examine the architecture, operation/deployment strategies, mobility model, routing and applications. The evolution from circuit switched to packet switched networks in 802.11,GSM, CDMA and TDMA networks is covered from a data(IP) network perspective. The authors discuss the type of applications that are prevalent in these networks today with a special emphasis on messaging. Also examined are emerging wireless IP applications including VoIP over wireless and wireless multimedia messaging. The authors also examine the standards bodies that play a role in defining the specifications for wireless networks that are evolving into extensions of the Internet (or what is referred to as the wireless Internet). Patil is the Chair of the IETF Committee charged with developing routing standards in mobile and wireless networks.
|You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS |
To stop receiving these emails, you may unsubscribe now.
|Email delivery powered by Google|
|Inbox too full?|
|Google Inc., 20 West Kinzie, Chicago IL USA 60610|