Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Network Administration


1. 

System Forensics, Investigation, and Response

System Forensics, Investigation, and Response

By: John R. Vacca; K Rudolph

Publisher: Jones & Bartlett Learning

Publication Date: 15-SEP-2010

Insert Date: 09-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform...

2. 

Business Data Communications and Networking, Eleventh Edition

Business Data Communications and Networking, Eleventh Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 23-AUG-2011

Insert Date: 19-NOV-2011

Slots: 1.0

Table of Contents • Start Reading

The 11th edition of FitzGerald and Dennis' Business Data Communications and Networking focuses on more comprehensive updating, as well as more hands-on and applied exercises. The new edition has more in-depth coverage of routing; revisions and updates on wireless; additional cases for team-based learning; and more hands-on lab exercises. In general, this text has more details in many chapters, specific updates, and updated illustrations. ...

3. 

Hacking with Kali

Hacking with Kali

By: James Broad; Andrew Bindner

Publisher: Syngress

Publication Date: 16-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing...

4. 

Networking for VMware Administrators

Networking for VMware Administrators

By: Christopher Wahl; Steven Pantol

Publisher: VMware Press

Publication Date: 21-MAR-2014

Insert Date: 21-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

The one-stop guide to modern networking for every VMware® administrator, engineer, and architect Now that virtualization has blurred the lines between networking and servers, many VMware specialists need a stronger understanding of networks than they may have gained in earlier IT roles. Networking for VMware Administrators fills this crucial knowledge gap. Writing for VMware professionals, Christopher Wahl and Steve Pantol illuminate the core concepts of modern networking, and show how to apply them in designing, configuring, and troubleshooting any virtualized...

5. 

Head First Networking

Head First Networking

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 27-MAY-2009

Insert Date: 28-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can. With this book, you'll learn skills through a variety of genuine scenarios, from fixing a malfunctioning office network to planning a network for a high-technology haunted house. You'll learn exactly what you need to know,...

6. 

The Art of Network Architecture: Business-Driven Design

The Art of Network Architecture: Business-Driven Design

By: Russ White; Denise Donohue

Publisher: Cisco Press

Publication Date: 04-APR-2014

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Art of Network Architecture Business-Driven Design The business-centered, business-driven guide to architecting and evolving networks The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks. Two leading enterprise network architects help you craft solutions that are fully aligned with business strategy, smoothly accommodate change, and maximize future flexibility. Russ White and Denise Donohue guide network designers in asking and answering the crucial questions that lead to...

7. 

TCP/IP Illustrated, Volume 1: The Protocols, Second Edition

TCP/IP Illustrated, Volume 1: The Protocols, Second Edition

By: 

Publisher: Addison-Wesley Professional

Publication Date: 15-NOV-2011

Insert Date: 01-JUL-2011

Slots: 1.0

Table of Contents • Start Reading

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.” —Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There’s no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how...

8. 

End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud Networks, Second Edition, Video Enhanced Edition

End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud Networks, Second Edition, Video Enhanced Edition

By: Tim Szigeti; Christina Hattingh; Robert Barton; Kenneth Briley Jr.

Publisher: Cisco Press

Publication Date: 26-NOV-2013

Insert Date: 22-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

End-to-End QoS Network Design Quality of Service for Rich-Media & Cloud Networks Second Edition New best practices, technical strategies, and proven designs for maximizing QoS in complex networks This authoritative guide to deploying, managing, and optimizing QoS with Cisco technologies has been thoroughly revamped to reflect the newest applications, best practices, hardware, software, and tools for modern networks. This new edition focuses on complex traffic mixes with increased usage of mobile devices, wireless network access, advanced communications, and video. It reflects the...

9. 

Security Policies and Implementation Issues

Security Policies and Implementation Issues

By: Robert Johnson; Mark Merkow

Publisher: Jones & Bartlett Learning

Publication Date: 25-OCT-2010

Insert Date: 10-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! The study of information system security concepts and domains is an essential part of the education of computer science students and professionals alike. Security Policies and Implementation Issues offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information...

10. 

SDN: Software Defined Networks

SDN: Software Defined Networks

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 22-AUG-2013

Insert Date: 15-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Explore the emerging definitions, protocols, and standards for SDN—software-defined, software-driven, programmable networks—with this comprehensive guide. Two senior network engineers show you what’s required for building networks that use software for bi-directional communication between applications and the underlying network infrastructure....

11. 

MPLS Fundamentals

MPLS Fundamentals

By: 

Publisher: Cisco Press

Publication Date: 21-NOV-2006

Insert Date: 05-NOV-2006

Slots: 1.0

Table of Contents • Start Reading

A comprehensive introduction to all facets of MPLS theory and practice Helps networking professionals choose the suitable MPLS application and design for their network Provides MPLS theory and relates to basic IOS configuration examples The Fundamentals Series from Cisco Press launches the basis to readers for understanding the purpose, application, and management of technologies MPLS has emerged as the new networking layer for service providers throughout the world. For many service providers and enterprises MPLS is a way of delivering new applications on their IP networks,...

12. 

Implementing Cisco UCS Solutions

Implementing Cisco UCS Solutions

By: Farhan Ahmed Nadeem; Prasenjit Sarkar

Publisher: Packt Publishing

Publication Date: 26-DEC-2013

Insert Date: 29-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

A hands-on guide to implementing solutions in Cisco UCS, as well as deploying servers and application stacks Learn about various Cisco UCS equipment options suitable for your deployment and configure various Cisco UCS components like LAN, SAN, Resource pools, Backup, Restore, RBAC, policies, and service profiles Configure Cisco UCS Emulator for Cisco UCS practice lab and integrate Cisco UCS with 3rd party applications With implementation examples for each topic using the Cisco UCS Emulator , learn how to configure your Cisco UCS environment The book will follow a hands-on...

13. 

Legal Issues in Information Security

Legal Issues in Information Security

By: Joanna Lyn Grama

Publisher: Jones & Bartlett Learning

Publication Date: 25-OCT-2010

Insert Date: 18-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations...

14. 

Network Security: Private Communication in a Public World, Second Edition

Network Security: Private Communication in a Public World, Second Edition

By: Charlie Kaufman; Radia Perlman; Mike Speciner

Publisher: Prentice Hall

Publication Date: 22-APR-2002

Insert Date: 04-MAY-2008

Slots: 1.0

Table of Contents • Start Reading

The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together...

15. 

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

By: Dawn M. Cappelli; Andrew P. Moore; Randall F. Trzeciak

Publisher: Addison-Wesley Professional

Publication Date: 24-JAN-2012

Insert Date: 25-JAN-2012

Slots: 1.0

Table of Contents • Start Reading

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address...

16. 

Top-Down Network Design, Third Edition

Top-Down Network Design, Third Edition

By: 

Publisher: Cisco Press

Publication Date: 24-AUG-2010

Insert Date: 04-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

Top-Down Network Design Third Edition Priscilla Oppenheimer A systems analysis approach to enterprise network design The authoritative book on designing networks that align with business goals Top-Down Network Design, Third Edition, is a practical and comprehensive guide to designing enterprise networks that are reliable, secure, and scalable. The book uses a top-down approach to help you focus first on applications and user requirements before selecting devices, cabling, and other technologies to implement the network. The book takes you through an explanation of how to design...

17. 

Bluetooth Low Energy: The Developer’s Handbook

Bluetooth Low Energy: The Developer’s Handbook

By: Robin Heydon

Publisher: Prentice Hall

Publication Date: 28-OCT-2012

Insert Date: 28-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The First Complete Guide to Bluetooth Low Energy: How It Works, What It Can Do, and How to Apply It A radical departure from conventional Bluetooth technology, Bluetooth low energy (BLE) enables breakthrough wireless applications in industries ranging from healthcare to transportation. Running on a coin-sized battery, BLE can operate reliably for years, connecting and extending everything from personal area network devices to next-generation sensors. Now, one of the standard’s leading developers has written the first comprehensive, accessible introduction to BLE for every system developer,...

18. 

Ethernet: The Definitive Guide, 2nd Edition

Ethernet: The Definitive Guide, 2nd Edition

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 28-MAR-2014

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Get up to speed on the latest Ethernet capabilities for building and maintaining networks for everything from homes and offices to data centers and server machine rooms. This thoroughly revised, comprehensive guide covers a wide range of Ethernet technologies, from basic operation to network management, based on the authors’ many years of field experience....

19. 

Wireless Communications Principles and Practice, Second Edition

Wireless Communications Principles and Practice, Second Edition

By: 

Publisher: Prentice Hall

Publication Date: 31-DEC-2001

Insert Date: 05-MAR-2008

Slots: 1.0

Table of Contents • Start Reading

The indispensable guide to wireless communications—now fully revised and updated! Wireless Communications: Principles and Practice, Second Edition is the definitive modern text for wireless communications technology and system design. Building on his classic first edition, Theodore S. Rappaport covers the fundamental issues impacting all wireless networks and reviews virtually every important new wireless standard and technological development, offering especially comprehensive coverage of the 3G systems and wireless local area networks (WLANs) that will transform communications in the...

20. 

Security in Computing, Fourth Edition

Security in Computing, Fourth Edition

By: Charles P.Pfleeger Consulting Group Pfleeger; Shari LawrenceRAND Corporation Pfleeger

Publisher: Prentice Hall

Publication Date: 13-OCT-2006

Insert Date: 04-NOV-2006

Slots: 1.0

Table of Contents • Start Reading

The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer...