4/30/2012

CCNA Official Exam Certification Library (Exam #640-801), 2nd edition Review

CCNA Official Exam Certification Library (Exam #640-801), 2nd edition
Average Reviews:

(More customer reviews)
Very Good Book. If you didn't know already the CCNA exam is no Joke. You really have to know the concepts and you really need a good book to prepare for it. Cisco is not giving the CCNA Certificate away anymore. They really want you to learn and earn it. I purchase this because I felt the sybex CCNA didn't cover the exam in full detail (Especially the NAT section). This Book is Well Written. The Price wasn't that bad either since it came with 2 Books (Intro&ICND) and a 30min Video CD. You won't be disappointed. A+

Click Here to see more reviews about: CCNA Official Exam Certification Library (Exam #640-801), 2nd edition

Assessment, review, and practice package for the CCNA 640-801, ICND 640-811, and INTRO 640-821 examsThis library combines the most current versions of the Number-One sellingCCNA study guides with a bonus CD-ROM containing30 minutes of video training on difficult exam topics. The libraryhelps you master all the topics on the CCNA exam, includingTCP/IP and OSI networking models Operating Cisco® routers and LAN switches IP addressing and subnetting Discovering information about an IP network Analog modems, PAP/CHAP, DSL, and cable Spanning Tree Protocol (STP), VLANs, and trunking RIP, IGRP, EIGRP, OSPF, and static route concepts and configuration Variable-length subnet masking (VLSM) support and route summarization Classless interdomain routing (CIDR) and Network Address Translation (NAT) Point-to-point leased line implementation ISDN and dial-on-demand routing (DDR) Frame Relay configuration IP access control list (ACL) securityCCNA Official Exam Certification Library, Second Edition, is a comprehensive review and practice package for the latest CCNA® exam. The two books contained in this package, CCNA INTRO Exam Certification Guide, First Edition, and CCNA ICND Exam Certification Guide, First Edition, present complete reviews and ample opportunity to test your knowledge of all the CCNA exam topics. Also included is a CD-ROM with training videos that explain select CCNA topics. Senior instructor and best-selling author Wendell Odom shares preparation hints and test-taking tips, helping you identify areas requiring further study and improve both your conceptual and hands-on knowledge. The material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. This new edition includes the CCNA Video Mentor, Library Edition CD. This CD-ROM contains three select video labs totaling 30 minutes of personal visual instruction at no additional charge! In each 10-minute video, author Wendell Odom walks you through basic CCNA configuration tasks, including navigating router and switch command-line interface, static and connected routes and the IP routing table, and NAT overload (PAT). The videos consist of animation and video captures of a terminal displaying router and switch command entry and output while Wendell provides audio instruction on how to configure various features and offers various tips and shortcuts that truly help make learning easy.CCNA INTRO Exam Certification Guide, First Edition, and CCNA ICND Exam Certification Guide, First Edition, present you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. Scenario-based exercises help you think about exam objectives in real-world situations, thus increasing recall during exam time. The companion CD-ROMs contain a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams from INTRO, ICND, or unified CCNA test banks. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text and laying out a complete study plan for review. The CD-ROMs also include a wealth of hands-on practice exercises and a copy of the Boson NetSim™ for CCNA, Learning Edition, network simulation software that allows you to practice your hands-on skills in a virtual lab environment.CCNA Official Exam Certification Library, Second Edition, is part of a recommended study program from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press®. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, visit www.cisco.com/go/authorizedtraining.

Buy Now

Click here for more information about CCNA Official Exam Certification Library (Exam #640-801), 2nd edition

Read More...

4/29/2012

Power System Operation Review

Power System Operation
Average Reviews:

(More customer reviews)
Power System Operation provides a well structured knowledge base and reference for the new and seasoned power system operator. It will serve as the foundational and theoretical basis for many of the experienced based knowledge that is passed from operator to operator. I would recommend that all power system operators be equipped with this book as must read material.

Click Here to see more reviews about: Power System Operation

The best-selling power system operation manual ever published--NOW IN AN ALL-NEW EDITION! For over 30 years more electrical power professionals have used this guide for safe, economical system operation than any other in print. Why? Because Power System Operation, by Robert Miller and James Malinowski, presents more of the fundamental principles and methods dispatchers and operators need in a clear, easy-to-understand style. Now this third edition has been expanded by 50% to cover even more: VAR flows; Power system control; Telemetering methods; Supervisory control and data acquisition methods; System control, protection and stability; System reliability factors, Power system energy transfer; Energy accounting in interconnected operations; Operating systems most economically; EHV operation; Power system communications; Impedance of parallel circuits; Effects of resistance on impedance.

Buy NowGet 27% OFF

Click here for more information about Power System Operation

Read More...

4/28/2012

The Managed Health Care Handbook Review

The Managed Health Care Handbook
Average Reviews:

(More customer reviews)
This book, in its latest edition, continues to be the most complete resource for all who work in or who are associated with the managed health care industry. It can be used by the novice as an introduction to the vary complex nature of managed health care, or it can be used by the more experienced managed health care warrior as a reference book when one needs a refresher on a particular aspect of managed health care operations.
I am a consultant working with health plans, providers, employers and regulators, and The Managed Health Care Handbook never fails to provide me with the information I need to be successful.

Click Here to see more reviews about: The Managed Health Care Handbook

This Thoroughly Revised And Updated Book Provides A Strategic And Operational Resource For Use In Planning And Decision-Making. The Handbook Enables Readers To Fine-Tune Operation Strategies By Providing Updates On Critical Managed Care Issues, Insights To The Complex Managed Care Environment, And Methods To Gain And Maintain Cost-Efficient, High Quality Health Services. With 30 New Chapters, It Includes Advice From Managers In The Field On How To Succeed In Every Aspect Of Managed Care Including: Quality Management, Claims And Benefits Administration, And Managing Patient Demand. The Handbook Is Considered To Be The Standard Resource For The Managed Care Industry.

Buy Now

Click here for more information about The Managed Health Care Handbook

Read More...

Role-Based Access Control, Second Edition Review

Role-Based Access Control, Second Edition
Average Reviews:

(More customer reviews)
The three authors are leaders in RBAC research and development, making this book one of the most authoritative and complete references to RBAC.
Chapters 1 through 3 give a solid foundation for understanding RBAC and how it evolved, starting with an introduction, an exhaustive survey of access control methods needed to fully understand the evolution, and a solid and detailed overview of RBAC itself.
In the subsequent chapters each aspect of RBAC is covered in depth. Topics include role hierarchies, separation of duty policies, administration, integrating RBAC into existing infrastructures, and migration to RBAC. In addition, there are chapters on related topics that give this book wide scope - "Using RBAC to Implement Military Policies" shows how to implement multi-level security models with RBAC. This information uses military policies, but the material is also of interest to any commercial organization seeking tightly integrated access controls and a high security posture. The chapter on the proposed NIST RBAC standard also covers key items of interest, including Common Criteria RBAC protection profiles and other conformance issues. There are also chapters on RBAC research and prototypes, and commercial products.
While this book is well written and uses illustrations to impart key concepts, you will need to be conversant with set theory in order to get the most from it, as well as understand RBAC itself. If you are a bit rusty I recommend refreshing your skills before diving into this book.
If you want to explore RBAC and the work of each of the authors visit NIST Computer Security Division and Computer Security Research by pasting the ASIN, B0001O48Y4, into the search box, selecting all products and clicking GO. Once you are on the site you'll find the RBAC section under Security Research/Emerging Technologies->Authorization Management and Advanced Access Control Models (AM&AACM) link.

Click Here to see more reviews about: Role-Based Access Control, Second Edition

Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners the very latest details on this popular network security model. The second edition provides more comprehensive and updated coverage of access control models, new RBAC standards, new case studies and discussions on role engineering and the design of role-based systems. This authoritative book offers professionals an in-depth understanding of role hierarchies and role engineering that are so crucial to ensuring total access control with RBAC. The book guides security administrators through the various RBAC products available on the market and along the migration path to implementing RBAC. This unique resource also covers the RBAC standard proposed by the National Institute of Standards and Technology.

Buy Now

Click here for more information about Role-Based Access Control, Second Edition

Read More...

4/27/2012

SSL and TLS: Designing and Building Secure Systems Review

SSL and TLS: Designing and Building Secure Systems
Average Reviews:

(More customer reviews)
As one of the three co-designers of SSL v3, I highly recommend this book -- it's the best book I've seen on SSL/TLS. Eric knows the protocol inside and out and does an excellent job of explaining both the practice and theory of SSL and TLS. The book also includes includes lots of practical information that isn't in the spec about how things are actually done and does a great job explaining the underlying cryptography and security.

Click Here to see more reviews about: SSL and TLS: Designing and Building Secure Systems

Secure Sockets Layer (SSL) is used in virtually every commercial web browser and server. In this book, one of the world's leading network security experts explains how SSL works -- and gives implementers step-by-step guidance and proven design patterns for building secure systems with SSL. Eric Rescorla also provides the first in-depth introduction to Transport Layer Security (TLS), the highly anticipated, maximum-security successor to SSL. Rescorla starts by introducing SSL's fundamentals: how it works, and the threats it is intended to address. One step at a time, he addresses each key SSL concept and technique, including cryptography, SSL performance optimization, designing and coding, and how to work around SSL's limitations. Rescorla demonstrates TLS at work in SMTP-based Internet security applications. The book includes detailed examples of SSL/TLS implementations, with in-depth insight into the key design choices that informed them. For all network and security designers, enterprise developers, system implementers, and suppliers of Internet security products and services.

Buy NowGet 29% OFF

Click here for more information about SSL and TLS: Designing and Building Secure Systems

Read More...

4/26/2012

Novell Netware 6.5 CNA Exam Cram 2 Review

Novell Netware 6.5 CNA Exam Cram 2
Average Reviews:

(More customer reviews)
Before taking this exam I had gone thru the 2000 some odd pages of the Novell 6.0 study guide for the CNA. Be careful in just using Novell's books. Supplement this information with Mr. Wyrostek's book, quite a few things are different on the 6.5 then the 6.0. You are going to need this book for the exam.
As to structure please pay careful attention to all notes and alerts the author provides, think of them as explanation points!!! and then think of them as explanation points!! and then think of them as explanation points again!!! When the author suggests that you carry out the functions of the application services (iManager, Virtual Office, iFolder etc. ) actually do it, these were no joke. Do everything you can to setup and configure these services, memorize all of your file rights, file and directory attributes, object rights, and property rights. I wish you all the best of luck on the exam and I thank the author for publishing this book. PASS
P.S. Questions are paragraphs and there is no way you are going to do it in 20 or 30 mins no matter how many practice questions you can answer in under 5 seconds so go to the bathroom ahead of time :)

Click Here to see more reviews about: Novell Netware 6.5 CNA Exam Cram 2



Buy NowGet 36% OFF

Click here for more information about Novell Netware 6.5 CNA Exam Cram 2

Read More...

LAN Switch Security: What Hackers Know About Your Switches Review

LAN Switch Security: What Hackers Know About Your Switches
Average Reviews:

(More customer reviews)
I really looked forward to reading LAN Switch Security (LSS), simply because it covered layer 2 issues. These days application security, rootkits, and similar topics get all the press, but the foundation of the network is still critical. Unfortunately, LSS disappointed me enough to warrant this three star review. I'm afraid those before me who wrote five star reviews 1) don't read enough other books or 2) don't set their expectations high enough.
Let me first say I am not anti-Cisco, nor anti-Cisco-book. For an earlier Cisco Press book I wrote "I really enjoyed reading Cisco Router Firewall Security (CRFS) by Richard Deal. This book delivers just what a technical Cisco book should: discussion of concepts, explanation of command syntax, and practical examples." LSS, however, is not what I like to see in a Cisco book. It suffers the major flaw found in almost all technical books featuring large numbers of writers (LSS has 2 authors, 4 contributors, 2 tech editors): incoherence and overlapping discussions. Furthermore, many of these contributors do not write clearly. I found large sections to be disjointed and inconsistent. It is clear that no one stepped up to the plate to see if the finished product made any sense from the reader's perspective.
The second major problem with this book is that older books easily overpower LSS. For example, in March 2006 I gave Hacking Exposed: Cisco Networks (HECN) four stars. HECN covers many of the same topics as LSS, more clearly, with more syntax, and better explanations. Anyone who wants to buy a book about layer 2 security should start with HECN. If you don't want to buy a book, just download the free 86-page Cisco IOS Switch Security Configuration Guide published by NSA.
If you read HECN or the NSA guide, you'll be struck by the amount of configuration syntax in those resources. If you glance through LSS you'll see syntax, but (and this bothered me greatly) not for all the features discussed. For example, LSS ch 16 (Wire Speed Access Control Lists) features sections titled "Working with RACL", "Working with VACL", and "Working with PACL". That's great -- six pages (pp 263-268), with no command syntax! Sure, you can read about using VACLs for traffic capture, but where are the examples? If you tell me they are the same as other examples, I want to see the proof. This is the sort of glaring omission that really frustrated me.
I did like some of LSS. I thought attacks against link aggregation protocols, discussions of control plane policy, and spanning tree protocol were interesting. Adding discussions of ARP spoofing a remote gateway using Yersinia would have been helpful. There's a decent number of typos (POP != "point of presence", replace "Ethernet" with "IP" on p 235), but technically the book seemed sound. (One of the authors was kind enough to confirm the p 235 typo; I wanted to be sure I hadn't missed something important.)
I notice Cisco is publishing a book titled Router Security Strategies: Securing IP Network Traffic Planes in December. Presumably that will be a counterpart to this title, except at layer 3. I hope that new book avoids the mistakes made by LSS.

Click Here to see more reviews about: LAN Switch Security: What Hackers Know About Your Switches

LAN Switch Security: What Hackers Know About Your SwitchesA practical guide to hardening Layer 2 devices and stopping campus network attacksEric VynckeChristopher Paggen, CCIE® No. 2659Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks.Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches.After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks. Eric Vyncke has a master's degree in computer science engineering from the University of Liège in Belgium. Since 1997, Eric has worked as a Distinguished Consulting Engineer for Cisco, where he is a technical consultant for security covering Europe. His area of expertise for 20 years has been mainly security from Layer 2 to applications. He is also guest professor at Belgian universities for security seminars. Christopher Paggen, CCIE® No. 2659, obtained a degree in computer science from IESSL in Liège (Belgium) and a master's degree in economics from University of Mons-Hainaut (UMH) in Belgium. He has been with Cisco since 1996 where he has held various positions in the fields of LAN switching and security, either as pre-sales support, post-sales support, network design engineer, or technical advisor to various engineering teams. Christopher is a frequent speaker at events, such as Networkers, and has filed several U.S. patents in the security area.Contributing Authors:Jason Frazier is a technical leader in the Technology Systems Engineering group for Cisco.Steinthor Bjarnason is a consulting engineer for Cisco.Ken Hook is a switch security solution manager for Cisco.Rajesh Bhandari is a technical leader and a network security solutions architect for Cisco.Use port security to protect against CAM attacksPrevent spanning-tree attacks Isolate VLANs with proper configuration techniquesProtect against rogue DHCP serversBlock ARP snoopingPrevent IPv6 neighbor discovery and router solicitation exploitationIdentify Power over Ethernet vulnerabilitiesMitigate risks from HSRP and VRPPStop information leaks with CDP, PaGP, VTP, CGMP and other Cisco ancillary protocolsUnderstand and prevent DoS attacks against switchesEnforce simple wirespeed security policies with ACLsImplement user authentication on a port base with IEEE 802.1xUse new IEEE protocols to encrypt all Ethernet frames at wirespeed.This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.Category: Cisco Press—SecurityCovers: Ethernet Switch Security$60.00 USA / $69.00 CANLAN Switch Security: What Hackers Know About Your SwitchesA practical guide to hardening Layer 2 devices and stopping campus network attacksEric VynckeChristopher Paggen, CCIE® No. 2659Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks.Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches.After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks. Eric Vyncke has a master's degree in computer science engineering from the University of Liège in Belgium. Since 1997, Eric has worked as a Distinguished Consulting Engineer for Cisco, where he is a technical consultant for security covering Europe. His area of expertise for 20 years has been mainly security from Layer 2 to applications. He is also guest professor at Belgian universities for security seminars. Christopher Paggen, CCIE® No. 2659, obtained a degree in computer science from IESSL in Liège (Belgium) and a master's degree in economics from University of Mons-Hainaut (UMH) in Belgium. He has been with Cisco since 1996 where he has held various positions in the fields of LAN switching and security, either as pre-sales support, post-sales support, network design engineer, or technical advisor to various engineering teams. Christopher is a frequent speaker at events, such as Networkers, and has filed several U.S. patents in the security area.Contributing Authors:Jason Frazier is a technical leader in the Technology Systems Engineering group for Cisco.Steinthor Bjarnason is a consulting engineer for Cisco.Ken Hook is a switch security solution manager for Cisco.Rajesh Bhandari is a technical leader and a network security solutions architect for Cisco.Use port security to protect against CAM attacksPrevent spanning-tree attacks Isolate VLANs with proper configuration techniquesProtect against rogue DHCP serversBlock ARP snoopingPrevent IPv6 neighbor discovery and router solicitation exploitationIdentify Power over Ethernet vulnerabilitiesMitigate risks from HSRP and VRPP...

Buy NowGet 29% OFF

Click here for more information about LAN Switch Security: What Hackers Know About Your Switches

Read More...

4/25/2012

MCSE TCP/IP Exam Prep (Exam: 70-059) Review

MCSE TCP/IP Exam Prep (Exam: 70-059)
Average Reviews:

(More customer reviews)
I've read this book. Cover to cover. I was disapointed as subnetting was not explain in details. I had to go out and buy Exam Cram and explantions was way better than Exam Prep. I'd say this book was a waset of money. (Sorry to say that)

Click Here to see more reviews about: MCSE TCP/IP Exam Prep (Exam: 70-059)

Serves as a comprehensive Exam Prep Study Guide for Exam #70-059: Internetworking with Microsoft TCP/IP on Microsoft Windows NT 4.0. Features real-world examples, interactive activities, and over 100 hands-on projects that reinforce key concepts and help prepare for the exam. Includes an interactive CD-ROM with practice exams that allow readers to test their skills and knowledge. Presents a content and study approach officially endorsed by Microsoft. Provides extensive illustrations that help portray complex subject material. Contains troubleshooting tips that provide solutions to common problems.

Buy Now

Click here for more information about MCSE TCP/IP Exam Prep (Exam: 70-059)

Read More...

4/24/2012

Security+ Certification Exam Cram 2 (Exam Cram SYO-101) Review

Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
Average Reviews:

(More customer reviews)
I have never used the Exam Cram series books as a single source to prepare for any certification exam. I believe that their intent is to provide a good final review of the subject matter in preparation for an exam -- sort of like the old Cliff Notes that we used to buy in college. Coupled with the PrepLogic exam on the CD (you would do well to purchase the complete set of questions), it is an adequate preparation tool.
The only criticism that I can offer is that the material in the book (as well as the PrepLogic practice exams) tends to err on the easy side. I found myself scoring consistently in the low 90's on the first take of each practice exam, whereas I passed the actual test with a score of 828.
The Security+ exam is not an overly difficult test, but it is not a pushover either. If you use this book as it was intended to be used, it will probably help you. If you use it as your sole source of study, you will probably be disappointed with the outcome.

Click Here to see more reviews about: Security+ Certification Exam Cram 2 (Exam Cram SYO-101)



Buy Now

Click here for more information about Security+ Certification Exam Cram 2 (Exam Cram SYO-101)

Read More...

Fiber Optics Installer and Technician Guide Review

Fiber Optics Installer and Technician Guide
Average Reviews:

(More customer reviews)
As the publisher of the only weblog devoted solely to fiber to the home (...), from time to time I receive books to review. So here it is.
As fiber to the home gathers momentum, the need for skilled workers installing and troubleshooting fiber access networks is bound to increase. For the next 15-20 years this will be a well paying job with little fear of outsourcing. The technical publishing and training industries are starting to respond to the challenge with training materials, books, and courses.
Sybex has recently released a textbook titled "Fiber Optics, Installer and Technician Guide" written by Bill Woodward and Emile B. Husson. This book is designed as a study guide to help students pass the Fiber Optic Installer (FOI) and Fiber Optic Technician (FOT) certifications. To this end, the book has obviously succeeded, with questions at the end of each chapter and an accompanying CD-ROM with practice questions, exams, and a .pdf version of the book. Topics covered in the book include history of fiber optics, various aspects of fiber optic technology, a chapter on safety, sections on cabling, splicing and connectors, system design considerations, and testing and troubleshooting.
If one is not preparing for the exam, there is some information in the book that I have not seen in other text books. This includes a safety chapter detailing the hazards of various chemicals used in preparing fiber optic connections, some very thorough information on cabling used in access installations and the installation methods. Finally sprinkled throughout the book are sidebar sections called "Real World Scenario" with installation examples that the authors collected from their students "in the trenches".

Click Here to see more reviews about: Fiber Optics Installer and Technician Guide

For years, fiber optics was the future. Now, it's the present, and the time has come to act if you want to make a career in this fast-growing field. The Fiber Optics Installer and Technician Guide is a comprehensive resource designed to prepare you for the two leading fiber optics certifications, Fiber Optics Installer (FOI) and Fiber Optics Technician (FOT). This book's practical, objective-focused coverage includes:
The history of fiber optics
Principles of fiber optic transmission
Optical fiber characteristics, construction, and theory
Safety considerations
Cables, connectors, and splicing
Fiber optic light sources and transmitters
Fiber optic detectors and receivers
Passive components and multiplexers
Fiber optic links
Testing equipment
Techniques for testing links and cables
Troubleshooting and restoration techniques

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Buy Now

Click here for more information about Fiber Optics Installer and Technician Guide

Read More...

4/23/2012

The Executive Guide to Information Security: Threats, Challenges, and Solutions Review

The Executive Guide to Information Security: Threats, Challenges, and Solutions
Average Reviews:

(More customer reviews)
A fun book on security for executives and managers? Unbelievable, you'd say? This one ("The Executive Guide to Information Security") comes pretty close.
On the down side, do not look at this book for technology coverage. Almost total lack of coverage of intrusion prevention, spyware, spam as well as some Symantec bias (understandable, considering the publisher) make this book much stronger on the policy, process and "big picture" coverage rather on modern technical threats and countermeasures. Slightly confusing coverage of vulnerability management also falls in the same category. However, given the target audience of CEOs and CFOs, this is certainly excusable.
The book introduces the executives to basic security concepts such as "defense-in-depth", "people, process, technology", etc, and goes into details on using them for organizing security for their organizations.
I also appreciated the sections on planning and executing a security strategy and measuring security by using various included checklists and questionnaires. 50-point security evaluation framework based on"best practices" was another valuable piece. The books also address one of the important questions of organizational security: in-house vs outsourced security.
Regulations and laws also occupy a significant part of the book. The coverage is high-level and provides few details, appropriate given the target audience. A section on future security was pretty insightful and enjoyable to read!
Overall, I think the book will be one of the first (and, so far, best) books about security for the "C-level" crowd.
Anton Chuvakin, Ph.D., GCIA, GCIH, GCFA is a Security Strategist with a major security company. He is an author of the book "Security Warrior" and a contributor to "Know Your Enemy II". In his spare time, he maintains his security portal info-secure.org


Click Here to see more reviews about: The Executive Guide to Information Security: Threats, Challenges, and Solutions

The book provides a pragmatic approach to evaluating security at a companyand putting together an effective information security program. The bookfocuses on three key themes; People, Processes, and Technology and isorganized according to the steps executives would follow in order to developan information security program for their company. Key elements of theprogram include staffing this function at a company, putting the necessaryinternal processes in place, and implementing the appropriate technology.Business executives will find this book a good primer for understanding the keyexisting and future security issues, and for taking the necessary action to ensurethe protection of their enterprise's information assets.The objective of this book is to provide a "short cut" for executives to learnmore about information security and how it will affect their business in thefuture. An overview of information security concepts is provided, so they canbe better prepared to evaluate how their company is addressing informationsecurity.

Buy NowGet 31% OFF

Click here for more information about The Executive Guide to Information Security: Threats, Challenges, and Solutions

Read More...

4/22/2012

Cisco CID Exam Certification Guide Review

Cisco CID Exam Certification Guide
Average Reviews:

(More customer reviews)
I took the exam and did pass it. I was reading this book and was amazed with the errors and the references to graphs and charts that were not in the book. The book goes into a painfull explanation of SNA, which is more confusing then helping the issue. The voice part is readable but that just about it. I would not recommend this book to anyone who want to pass the test. It has too much irrelevant information.

Click Here to see more reviews about: Cisco CID Exam Certification Guide


The only Cisco-approved study guide for the CCDP CID Exam.


The only Cisco-endorsed study guide for the Cisco Internetwork Design Exam.
Includes review of all concepts covered on the exam for designing complex routed and switched networks
Accompanying CD-ROM containing unique questions and sample tests to help readers identify and master areas of weakness
Extensive use of chapter quizzes and end-of-chapter questions


The only Cisco-endorsed study guide for the Cisco Internetwork Design Exam #640-025, Cisco CID Exam Certification Guide covers all of the major topic areas and objectives for the exam. Organized to help you make the most of your study time, this book focuses on review of the concepts involved in advanced network design, principles of network-layer including addressing, traffic management, and performance considerations.

Foundation Summary sections concisely outline major concepts for quick reference while chapter-opening quizzes enable you to evaluate your knowledge of chapter topics. Scenario-based exercises and chapter-ending review questions reinforce retention and recall of exam topics. Finally, practice questions on the companion CD-ROM enable you to build and take random sample tests.


Buy Now

Click here for more information about Cisco CID Exam Certification Guide

Read More...

EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide Review

EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
Average Reviews:

(More customer reviews)
I decided to read and review three digital forensics books in order to gauge their strengths and weaknesses: "File System Forensic Analysis" (FSFA) by Brian Carrier, "Windows Forensics" (WF) by Chad Steel, and "EnCase Computer Forensics" (ECF) by Steve Bunting and William Wei. All three books contain the word "forensics" in the title, but they are very different. If you want authoritative and deeply technical guidance on understanding file systems, read FSFA. If you want to focus on understanding Windows from an investigator's standpoint, read WA. If you want to know more about EnCase (and are willing to tolerate or ignore information about forensics itself), read ECF.
In the spirit of full disclosure I should mention I am co-author of a forensics book ("Real Digital Forensics") and Brian Carrier cites my book "The Tao of Network Security Monitoring" on p 10. I tried to not let those facts sway my reviews.
In terms of overall book value, ECF is the weakest of the three previously mentioned -- but it is the only book on EnCase. As such it is the one independent book which will help you understand the king of the commercial forensics world. I was particularly interested in using the accompanying DVD, which offered a demo version of EnCase. I did encounter the same limitations as mentioned in previous reviews, but I was able to at least perform most of the numbered exercises in the text. I thought the fairly crippled version of EnCase packaged with the book was a drawback, but I know Guidance Software is paranoid about even discussing their product outside of their training environment.
As far as covering EnCase goes, ECF is a pretty good book. I am an EnCase newbie, but I was able to follow most of the book's discussion of the product's interface. Since the lead author is a police officer, I also thought that perspective was valuable. His mindset appeared in the chapter where securing the crime scene was discussed. The inclusion of short case studies also kept the tone lively and relevant.
I had two major problems with ECF, hence the three star review. First, a book that includes a demo copy of EnCase and sample evidence files should use them throughout the text. When introducing EnCase's interface, use a sample evidence file from the DVD so the reader can follow along. While the book's exercises use the DVD evidence files, the textual explanation of the interface seldom do. That was frustrating. The authors should have either said "You need a fully license copy of EnCase to follow along" or they should have run all their examples as if they were a reader using the sample DVD. They would have learned you can't "Add Devices" using the DVD version and you can't save bookmarks -- argh.
The second major problem I found with ECF involved indications of technical misunderstandings and questionable vernacular. Examples follow. "BSD" is not "a Linux variant" (p 91). There is no such thing as "BSD Linux" (p 231). The authors' faith in MD5 should be positioned against research from the last few years. The "approved solution" for shutting down a Unix server ("synch; synch; halt") plus lack of non-Windows material made me question the relevance of the book to non-Windows platforms. On the language side, I didn't like reading about "NIC cards" (p 381) and "RAM memory" (p 381). These are the sorts of issues that make me wonder if I'm reading another book about "the Windows," thereby undermining my faith in ECF's recommendations.
On the operational forensics side, the book is strongly in the traditional "pull the plug, image the hard drive, grep for strings" camp. This model dominated host-centric forensics for decades, but it has been largely inadequate for the past 10 years. For example, there's nothing really useful on live analysis or memory forensics. NTFS is barely addressed, unlike FAT -- another sign of being somewhat backward. I think a second edition of this book would be a lot stronger -- and it would catch the error of using the word "Sudy" on the cover in place of "Study".
Still, because this is the only book on EnCase, it does share plenty of helpful suggestions on using that software. One possible use case for the book would be using it to apply EnCase to data provided on the DVD we ship with "Real Digital Forensics," looking for Windows artifacts described in WF, based on your understanding of hard drives from Brian Carrier's FSFA.

Click Here to see more reviews about: EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide



Buy NowGet 49% OFF

Click here for more information about EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide

Read More...

4/21/2012

E-Commerce Strategies (IT Professional) Review

E-Commerce Strategies (IT Professional)
Average Reviews:

(More customer reviews)
I found this book to be great, even though we don't have much in the way of MS software. The real value of the book lies in two key areas:
1. Best practice research from I/T industry analysts, and almost every major analyst group is included. This feature alone provides lots of great tips. Plus, getting the best practice research would cost thousands of dollars to purchase from analysts.
2. The checklists, such as the "Taking Stock" and "Action Plan" sections at the end of each chapter. These lists are very useful in planning E-Commerce initiatives and strategies, because they give you a list of things to do, and help you avoid forgetting anything.
While the book does not detail a methodology for E-Commerce development (e.g., programming), it is extremely valuable for strategic planning. It's also valuable for checking your current initiatives to see if you're following the best practices outlined in the book. About me: I'm a 42-year-old Director of E-Commerce with a large east coast food manufacturer.

Click Here to see more reviews about: E-Commerce Strategies (IT Professional)



Buy Now

Click here for more information about E-Commerce Strategies (IT Professional)

Read More...

4/20/2012

CRCP Crystal Reports Certified Professional All-in-One Review

CRCP Crystal Reports Certified Professional All-in-One
Average Reviews:

(More customer reviews)
This textbook contains everything the reader will need to gain Crystal Reports Certified Professional (CRCP) certification.
I used the textbook to take all three exams, and passed them all within twelve weeks. The only other source of information I used was the on-line documentation provided with the product (and I used that as a secondary reference only). Note that I did not take any education courses from Business Objects or third-party providers--this book was my sole information source, and it guided me to high scores on all three exams. I also became a much better Crystal Reports developer in the process.
The writing is exceptionally clear and free of all the techno-babble that clutters up so many other texts. This book is clear, easy to read, and structured perfectly. Not only that, but the examples are exceptional and applicable.
In addition to guiding the reader through the certification material, the text will thereafter continue to serve as a valuable reference for Crystal development.
Highly recommended--this is the Crystal Reports book that nobody should be without.
NOTE: Now that Business Objects has revised their CRCP examinations you might be wondering if this text would still be useful. The unqualified answer is YES. The two exams for XI are nearly identical to the three exams for version 10, except all of the Business Views components have been removed.
For XI certification, you still use this text. Just i) skip the Business Views parts (skip chapters 27, 28, 29)--as that software component has been dropped; ii) focus on the SQL components elective (chapter 22); and iii) skim the other elective sections (chapters 23, 24)--as there are no longer elective test tracks. Do this and you will still find this text the definitive preparation material for the CRCP exams.

Click Here to see more reviews about: CRCP Crystal Reports Certified Professional All-in-One

All-in-One is all you need! This authoritative reference offers complete coverage of all material on all three Crystal Reports Certified Professional exams, including content for each of the three electives.You'll find exam objectives at the beginning of each chapter, helpful exam tips, and end-of-chapter practice questions. The bonus CD-ROM contains a testing engine with questions found only on the CD. This comprehensive guide not only helps you pass the challenging CRCP exam, but will also serve as an invaluable on-the-job reference.

Buy NowGet 36% OFF

Click here for more information about CRCP Crystal Reports Certified Professional All-in-One

Read More...

Passing the Project Management Professional Exam: PMP Certification Practice Book (PMBOK 2004) Review

Passing the Project Management Professional Exam: PMP Certification Practice Book (PMBOK 2004)
Average Reviews:

(More customer reviews)
I am the author of this book. The book is not a study book. It is a practice book. This means it contains only questions to practice for the PMP exam and tips/advice for dealing and preparing for the exam. It is assumed that exam candidates have other resources to use for studying.
It has over 420 questions with answers, covering all areas of project management knowledge areas, professional responsibility, ethics, process groups and project concepts. It is a great value for the price.

Click Here to see more reviews about: Passing the Project Management Professional Exam: PMP Certification Practice Book (PMBOK 2004)

This book is a practice book for those pursuing the PMP certification. It can be used as part of a self-study program, or as part of a four-day PMP preparation workshop I conduct.

Buy Now

Click here for more information about Passing the Project Management Professional Exam: PMP Certification Practice Book (PMBOK 2004)

Read More...

4/19/2012

Cisco ISP Essentials (Cisco Press Networking Technology) Review

Cisco ISP Essentials (Cisco Press Networking Technology)
Average Reviews:

(More customer reviews)
This book is based on a living document that Philip, Barry and many network engineers around the globe have been working on for quite a few years. Since I do work with the original document I feared that it might only be a printed version of the online document, but I was delighted to discover that this is not the case, the book really is an expanded and up to date version of the recommended best practices based on real work network engineering experience.
The book is well written (typos and a few mistakes here and there) but the essence, the meat of it all are the detailed Cisco related commands and the usefull information that is provided. Saves a lot of time versus searching mailing lists, Cisco's web site and other ressources.

Click Here to see more reviews about: Cisco ISP Essentials (Cisco Press Networking Technology)


A comprehensive guide to the best common practices for Internet service providers

Learn the best common practices for configuring routers on the Internet from experts who helped build the Internet
Gain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS Software
Understand the Cisco IOS tools essential to building and maintaining reliable networks
Increase your knowledge of network security
Learn how to prevent problems and improve performance through detailed configuration examples and diagrams

Cisco IOS Software documentation is extensive and detailed and is often too hard for many Internet service providers (ISPs) who simply want to switch on and get going. Cisco ISP Essentials highlights many of the key Cisco IOS features in everyday use in the major ISP backbones of the world to help new network engineers gain understanding of the power of Cisco IOS Software and the richness of features available specifically for them. Cisco ISP Essentials also provides a detailed technical reference for the expert ISP engineer, with descriptions of the various knobs and special features that have been specifically designed for ISPs. The configuration examples and diagrams describe many scenarios, ranging from good operational practices to network security. Finally a whole appendix is dedicated to using the best principles to cover the configuration detail of each router in a small ISP Point of Presence.


Buy Now

Click here for more information about Cisco ISP Essentials (Cisco Press Networking Technology)

Read More...