Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Network Administration


1. 

Head First Networking

Head First Networking

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 27-MAY-2009

Insert Date: 28-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can. With this book, you'll learn skills through a variety of genuine scenarios, from fixing a malfunctioning office network to planning a network for a high-technology haunted house. You'll learn exactly what you need to know,...

2. 

Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition

Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition

By: Jazib Frahim; Omar Santos; Andrew Ossipov

Publisher: Cisco Press

Publication Date: 30-APR-2014

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Cisco® ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Identify, mitigate, and respond to today’s highly-sophisticated network attacks. Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and...

3. 

Hacking with Kali

Hacking with Kali

By: James Broad; Andrew Bindner

Publisher: Syngress

Publication Date: 05-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing...

4. 

Learning Nagios 4

Learning Nagios 4

By: Wojciech Kocjan

Publisher: Packt Publishing

Publication Date: 21-MAR-2014

Insert Date: 25-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn how to set up Nagios 4 in order to monitor your systems efficiently Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a simplified manner In Detail One of the most important challenges in system monitoring is to detect and report any malfunctioning system or device as soon as possible, so that you as an administrator are aware of the problem before a user runs into...

5. 

TCP/IP Illustrated, Volume 1: The Protocols, Second Edition

TCP/IP Illustrated, Volume 1: The Protocols, Second Edition

By: 

Publisher: Addison-Wesley Professional

Publication Date: 15-NOV-2011

Insert Date: 01-JUL-2011

Slots: 1.0

Table of Contents • Start Reading

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.” —Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There’s no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how...

6. 

Software Defined Networks

Software Defined Networks

By: Paul Goransson; Chuck Black

Publisher: Morgan Kaufmann

Publication Date: 05-JUN-2014

Insert Date: 18-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Software Defined Networks discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN model How to make intelligent decisions about when to integrate SDN technologies in a network How to decide if your organization should be developing its own SDN...

7. 

Managing Risk in Information Systems

Managing Risk in Information Systems

By: Darril Gibson

Publisher: Jones & Bartlett Learning

Publication Date: 25-OCT-2010

Insert Date: 12-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Using examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management,...

8. 

A detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new...

9. 

End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud Networks, Second Edition, Video Enhanced Edition

End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud Networks, Second Edition, Video Enhanced Edition

By: Tim Szigeti; Christina Hattingh; Robert Barton; Kenneth Briley Jr.

Publisher: Cisco Press

Publication Date: 26-NOV-2013

Insert Date: 22-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

End-to-End QoS Network Design Quality of Service for Rich-Media & Cloud Networks Second Edition New best practices, technical strategies, and proven designs for maximizing QoS in complex networks This authoritative guide to deploying, managing, and optimizing QoS with Cisco technologies has been thoroughly revamped to reflect the newest applications, best practices, hardware, software, and tools for modern networks. This new edition focuses on complex traffic mixes with increased usage of mobile devices, wireless network access, advanced communications, and video. It reflects the...

10. 

MPLS Fundamentals

MPLS Fundamentals

By: 

Publisher: Cisco Press

Publication Date: 21-NOV-2006

Insert Date: 05-NOV-2006

Slots: 1.0

Table of Contents • Start Reading

A comprehensive introduction to all facets of MPLS theory and practice Helps networking professionals choose the suitable MPLS application and design for their network Provides MPLS theory and relates to basic IOS configuration examples The Fundamentals Series from Cisco Press launches the basis to readers for understanding the purpose, application, and management of technologies MPLS has emerged as the new networking layer for service providers throughout the world. For many service providers and enterprises MPLS is a way of delivering new applications on their IP networks,...

11. 

Networking for VMware Administrators

Networking for VMware Administrators

By: Christopher Wahl; Steven Pantol

Publisher: VMware Press

Publication Date: 21-MAR-2014

Insert Date: 21-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

The one-stop guide to modern networking for every VMware® administrator, engineer, and architect Now that virtualization has blurred the lines between networking and servers, many VMware specialists need a stronger understanding of networks than they may have gained in earlier IT roles. Networking for VMware Administrators fills this crucial knowledge gap. Writing for VMware professionals, Christopher Wahl and Steve Pantol illuminate the core concepts of modern networking, and show how to apply them in designing, configuring, and troubleshooting any virtualized...

12. 

The Art of Network Architecture: Business-Driven Design

The Art of Network Architecture: Business-Driven Design

By: Russ White; Denise Donohue

Publisher: Cisco Press

Publication Date: 04-APR-2014

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Art of Network Architecture Business-Driven Design The business-centered, business-driven guide to architecting and evolving networks The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks. Two leading enterprise network architects help you craft solutions that are fully aligned with business strategy, smoothly accommodate change, and maximize future flexibility. Russ White and Denise Donohue guide network designers in asking and answering the crucial questions that lead to...

13. 

SSH, The Secure Shell: The Definitive Guide, 2nd Edition

SSH, The Secure Shell: The Definitive Guide, 2nd Edition

By: ; ;

Publisher: O'Reilly Media, Inc.

Publication Date: 10-MAY-2005

Insert Date: 10-AUG-2005

Slots: 1.0

Table of Contents • Start Reading

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2...

14. 

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813 Richard Froom, CCIE No. 5102 Balaji Sivasubramanian Erum Frahim, CCIE No. 7549 Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide is a Cisco® authorized learning tool for CCNP® and CCDP® preparation. As part of the Cisco Press foundation learning series, this book covers how to plan, configure, and verify the implementation of complex enterprise switching solutions using the Cisco Campus Enterprise Architecture. The Foundation Learning Guide also...

15. 

Cisco ISE for BYOD and Secure Unified Access, Video Enhanced Edition

Cisco ISE for BYOD and Secure Unified Access, Video Enhanced Edition

By: Jamey Heary; Aaron Woland

Publisher: Cisco Press

Publication Date: 10-JUN-2013

Insert Date: 12-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting. Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through...

16. 

Network Warrior, 2nd Edition

Network Warrior, 2nd Edition

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 26-MAY-2011

Insert Date: 17-MAY-2011

Slots: 1.0

Table of Contents • Start Reading

This book starts where certification exams leave off. Network Warrior provides a thorough and practical guide to the entire network infrastructure. You'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Revised and updated for the latest Cisco technology, including the Nexus 7000 series, this second edition takes you step by step through the world of routers, switches, firewalls, and more....

17. 

Practical Malware Analysis

Practical Malware Analysis

By: ;

Publisher: No Starch Press

Publication Date: 22-FEB-2012

Insert Date: 29-FEB-2012

Slots: 1.0

Table of Contents • Start Reading

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way....

18. 

Introduction to Computer and Network Security: Navigating Shades of Gray

Introduction to Computer and Network Security: Navigating Shades of Gray

By: Richard Brooks

Publisher: Chapman and Hall/CRC

Publication Date: 19-AUG-2013

Insert Date: 29-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Combining hands-on work with technical overviews, this text integrates security analysis into a technical computing curriculum. It educates students on security issues, such as side-channel attacks, and deepens their understanding of how computers and networks work. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Classroom-tested projects prompt students to stage exploits and choose countermeasures to neutralize the attacks. Many ancillaries are available upon qualifying...

19. 

Pro ASP.NET Web API Security: Securing ASP.NET Web API

Pro ASP.NET Web API Security: Securing ASP.NET Web API

By: Badrinarayanan Lakshmiraghavan

Publisher: Apress

Publication Date: 27-MAR-2013

Insert Date: 10-APR-2013

Slots: 1.0

Table of Contents • Start Reading

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP. With such wide accessibility, securingyour code effectively needs to be a top priority. You will quickly find that the WCF security protocols you're familiar with from .NET (WS-* and similar)are less suitable than they once were in this new environment; proving themselves cumbersome and limited in...

20. 

Cassandra: The Definitive Guide

Cassandra: The Definitive Guide

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 22-NOV-2010

Insert Date: 28-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

The rising popularity of Apache Cassandra rests on its ability to handle very large data sets that include hundreds of terabytes -- and that's why this distributed database has been chosen by organizations such as Facebook, Twitter, Digg, and Rackspace. With this hands-on guide, you'll get all the details and practical examples you need to understand Cassandra's non-relational database design and put it to work in a production environment.Author Eben Hewitt (Java SOA Cookbook) pays special attention to data modeling, and demonstrates Cassandra's many advantages, including its high...