Tuesday, November 20, 2012

Cambridge IELTS 8

Cambridge IELTS 8 provides students with an excellent opportunity to familiarise themselves with IELTS and to practise examination techniques using authentic test material prepared by Cambridge ESOL. Each collection contains four complete tests for Academic candidates, plus extra Reading and Writing modules for General Training candidates. An introduction to these different modules is included in each book, together with an explanation of the scoring system used by Cambridge ESOL. A comprehensive section of answers and tapescripts makes the material ideal for students working partly or entirely on their own.





Wednesday, October 31, 2012

Microsoft Excel VBA Programming For Dummies

I think you’ll find that it offers a fast, enjoyable way to discover the ins and outs of Microsoft Excel programming. Even if you don’t have the foggiest idea of what programming is all about, this book can
help you make Excel jump through hoops in no time (well, it will take some time).
Unlike most programming books, this one is written in plain English, and even normal people can understand it. Even better, it’s filled with information of the “just the facts





Friday, October 14, 2011

Cisco Press Cisco DQOS Exam Certification Guide

Wendell Odom, CCIE No. 1624
Michael J. Cavanaugh, CCIE No. 4516
Computing in general, and networking in particular, must deal with the issues relating to constrained resources. For computers, operating systems must find a way to equitably distribute the CPU time and memory among the various programs running on the computer. When the need for memory exceeds the available memory, the CPU spends more time performing memory management, moving data from memory to permanent storage, typically on a hard disk.

Thursday, October 13, 2011

Cisco Press Cisco Catalyst Quality of Service in Campus Networks

    By Mike Flannagan CCIE® No. 7651, Richard Froom CCIE No. 5102, Kevin Turek CCIE No. 7284

End-to-end QoS deployment techniques for Cisco Catalyst series switches
  • Examine various QoS components, including congestion management, congestion avoidance, shaping, policing/admission control, signaling, link efficiency mechanisms, and classification and marking
  • Map specified class of service (CoS) values to various queues and maintain CoS values through the use of 802.1q tagging on the Cisco Catalyst 2900XL, 3500XL and Catalyst 4000 and 2948G/2980G CatOS Family of Switches
  • Learn about classification and rewrite capabilities and queue scheduling on the Cisco Catalyst 5000
  • Implement ACLs, ACPs, ACEs, and low-latency queuing on the Cisco Catalyst 2950 and 3550 Family of Switches
  • Understand classification, policying, and scheduling capabilities of the Catalyst 4000 and 4500 IOS Family of Switches
  • Configure QoS in both Hybrid and Native mode on the Catalyst 6500 Family of Switches
  • Utilize Layer 3 QoS to classify varying levels of service with the Catalyst 6500 MSFC and Flexwan
  • Understand how to apply QoS in campus network designs by examining end-to-end casestudies


Quality of service (QoS) is the set of techniques designed to manage network resources. QoS refers to the capability of a network to provide better service to selected network traffic over various LAN and WAN technologies. The primary goal of QoS is to provide flow priority, including dedicated bandwidth, controlled jitter and latency (required by some interactive and delaysensitive traffic), and improved loss characteristics.
While QoS has become an essential technology for those organizations rolling out a new generation of network applications such as real-time voice communications and high-quality video delivery, most of the literature available on this foundation technology for current and future business applications focuses on IP QoS. Equally important is the application of QoS in the campus LAN environment, which is primarily responsible for delivering traffic to the desktop.
Cisco Catalyst QoS is the first book to concentrate exclusively on the application of QoS in the campus environment. This practical guide provides you with insight into the operation of QoS on the most popular and widely deployed LAN devices: the Cisco Catalyst family of switches. Leveraging the authors' extensive expertise at Cisco in the support of Cisco Catalyst switches and QoS deployment, the book presents QoS from the campus LAN perspective. It explains why QoS is essential in this environment in order to achieve a more deterministic behavior for traffic when implementing voice, video, or other delay-sensitive applications. Through architectural overviews, configuration examples, real-world deployment case studies, and summaries of common pitfalls, you will understand how QoS operates, the different components involved in making QoS possible, and how QoS can be implemented on the various Cisco Catalyst platforms to enable truly successful end-to-end QoS applications.
This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.





Cisco Press - Cisco IOS Quality Of Service Implementation

Today’s networks are carrying more data in the form of bandwidth-intensive, real-time voice, video and data, which stretch network
capability and resources. Cisco IOS® software provides a toolbox full of quality of service (QoS) solutions to help you solve
problems caused by increasing traffic demands on the network.
The goal of QoS is to provide better and more predictable network service by providing dedicated bandwidth, controlled jitter
and latency, and improved loss characteristics. QoS achieves these goals by providing tools for managing network congestion,
shaping network traffic, using expensive wide-area links more efficiently, and setting traffic policies across the network.
Internet service providers, small and medium-sized business networks, as well as large enterprise networks can take advantage
of the solutions provided by the Cisco IOS QoS software features.
This white paper presents the Cisco IOS QoS implementation in the following sections:
• Introduction
• QoS Framework
• The Cisco QoS Toolkit
• QoS Signaling
• Cisco QoS Policy, Management, and Accounting Capabilities
• Network QoS Application Examples
• QoS Looking Forward
In addition, reference matrices and commonly requested QoS definitions are included in the appendices




Saturday, October 1, 2011

Global IPv6 Strategies From Business Analysis to Operational.Planning

This book intends to provide a business perspective on IPv6 and its adoption, complementing the many technical IPv6 titles available today. It also intends to provide the readers with some of the “whys” and the “whens” applied to IPv6 strategies and some of the “hows” discovered through implementation experience
by various organizations, countries, and market segments around the world. If the clamor of IPv6 has reached your desk and you simply want to understand what the big deal is, this book will bring you up to speed.
To that end, the book will present you information that answers the following questions:
• In a nutshell, what are the real technical benefits of IPv6?
• What are some of the business and technical opportunities presented by
IPv6?
• What IPv6 adoption strategies have emerged in various markets and
throughout the world?
• What did other organizations do to adopt IPv6?
• How do I prepare my organization for IPv6?
The book combines market analysis and case study methods to provide the
current state of IPv6 adoption. It also provides practical guidelines based on the
extensive IPv6 planning and deployment experience of the authors.



Friday, September 30, 2011

Self Defending Networks The Next Generation of Network Security

Protect your network with self-regulating network security solutions that combat both internal and external threats.
Provides an overview of the security components used to design proactive network security
Helps network security professionals understand what the latest tools and techniques can do and how they interact
Presents detailed information on how to use integrated management to increase security
Includes a design guide with step-by-step implementation instructions
Self-Defending Networks: The Next Generation of Network Security helps networking professionals understand how to deploy an
end-to-end, integrated network security solution. It presents a clear view of the various components that can be used throughout the
network to not only monitor traffic but to allow the network itself to become more proactive in preventing and mitigating network attacks.
This security primer provides unique insight into the entire range of Cisco security solutions, showing what each element is capable of
doing and how all of the pieces work together to form an end-to-end Self-Defending Network. While other books tend to focus on
individual security components, providing in-depth configuration guidelines for various devices and technologies,Self-Defending
Networks instead presents a high-level overview of the entire range of technologies and techniques that comprise the latest thinking in
proactive network security defenses. This book arms network security professionals with the latest information on the comprehensive
suite of Cisco security tools and techniques. Network Admission Control, Network Infection Containment, Dynamic Attack Mitigation,
DDoS Mitigation, Host Intrusion Prevention, and Integrated Security Management are all covered, providing the most complete
overview of various security systems. It focuses on leveraging integrated management, rather than including a device-by-device manual
to implement self-defending networks. 



Thursday, September 29, 2011

LAN Switch Security

 What Hackers Know About Your Switches

LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure,
but it is easy to forget about security when things appear to be simple.
Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple
of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can
defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are
impossible with a switch. Indeed, with dsniff, cain, and other user-friendly tools on a Microsoft Windows
or Linux system, a hacker can easily divert any traffic to his own PC to break the confidentiality or
the integrity of this traffic.
Most vulnerabilities are inherent to the Layer 2 protocols, ranging from Spanning Tree Protocol to IPv6
neighbor discovery. If Layer 2 is compromised, it is easier to build attacks on upper-layers protocols by
using techniques such as man-in-the-middle (MITM) attacks. Because a hacker can intercept any traffic,
he can insert himself in clear-text communication (such as HTTP or Telnet) and in encrypted channels
(such as Secure Socket Layer [SSL] or secure shell [SSH]).
To exploit Layer 2 vulnerabilities, an attacker must usually be Layer 2 adjacent to the target. Although it
seems impossible for an external hacker to connect to a company LAN, it is not. Indeed, a hacker can
use social engineering to gain access to the premises, or he can pretend to be an engineer called on site
to fix a mechanical problem.




Wednesday, September 28, 2011

Securing Cisco Network with Router and Switches Lab Guide

Overview
This guide presents the instructions and other information concerning the lab activities for this
course. You can find the solutions in the lab activity Answer Key.
Outline
This guide includes these activities:
  • Lab 1-1: Configure Layer 2 Security
  • Lab 1-2: Configure DHCP Snooping
  • Lab 2-1: Configure Cisco Secure ACS as a AAA Server
  • Lab 2-2: Configure 802.1x Port-Based Authentication
  • Lab 3-1: Configure Cisco NFP
  • Lab 4-1: Configure a Site-to-Site VPN Using Pre-Shared Keys
  • Lab 4-2: Configure a Site-to-Site VPN Using PKI
  • Lab 4-3: Configure a GRE Tunnel to a Remote Site
  • Lab 4-4: Configure a DMVPN
  • Lab 4-5: Configure a Cisco IOS SSL VPN (WebVPN)
  • Lab 4-6: Configure Cisco Easy VPN Remote Access
  • Lab 5-1: Configure Cisco IOS Classic Firewall
  • Lab 5-2: Configure Cisco IOS Application Policy Firewall
  • Lab 5-3: Configure a Cisco IOS Zone-Based Policy Firewall
  • Lab 5-4: Configure Cisco IOS Firewall Authentication Proxy on a Cisco Router
  • Lab 5-5: Configure a Cisco Router with Cisco IOS IPS





Tuesday, September 27, 2011

Router Security Strategies

Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking.

The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. Techniques to secure the IP data plane, IP control plane, IP management plane, and IP services plane are covered in detail in the second section.

The final section provides case studies from both the enterprise network and the service provider network perspectives. In this way, the individual IP traffic plane security techniques reviewed in the second section of the book are brought together to help you create an integrated, comprehensive defense in depth and breadth security architecture.




Tweet