Cisco Routers for the Desperate, 2nd Edition

Router and Switch Management, the Easy Way

Author: Michael W. Lucas

Publisher: No Starch Press

ISBN: 159327193X

Category: Computers

Page: 144

View: 5191

A guide to Cisco routers and switches provides informaton on switch and router maintenance and integration into an existing network.

Network Know-How

An Essential Guide for the Accidental Admin

Author: John Ross

Publisher: No Starch Press

ISBN: 1593271913

Category: Computers

Page: 288

View: 6138

A guide to creating a home computer network covers such topics as implementing network addressing, configuring network adapters and routers, sharing music and photos, automating household appliances, and troubleshooting.

Cisco IOS in a Nutshell

A Desktop Quick Reference for IOS on IP Networks

Author: James Boney

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596553111

Category: Computers

Page: 798

View: 6980

Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly. Fortunately, there's help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.

The Accidental Administrator

Cisco Router Step-By-Step Configuration Guide

Author: Don R. Crawley

Publisher: Soundtraining.Net

ISBN: 9780983660729

Category: Computers

Page: 356

View: 4850

"Your easy-to-follow step-by-step guide to configuring a Cisco router from the ground up " The Accidental Administratortm: Cisco Router Step-by-Step Configuration Guide is packed with more than 30 easy-to-follow interactive exercises, loads of screen captures, and lots of step-by-step examples to help you build a working router from scratch. Easily the most straightforward approach to learning how to configure a Cisco router, this book is filled with practical tips and secrets learned from years of Don s teaching and consulting on Cisco network devices. As a bonus, you won t waste your time on boring theory. All the essentials are covered in chapters on installing, backups and restores, and TCP/IP. You ll learn the nitty-gritty on subnetting, remote administration, routing protocols, static routing, access-control lists, site-to-site VPNs, network address translation (NAT), DHCP, password recovery, and security. There s even an entire chapter on the new Internet Protocol version 6 (IPv6). Here's just some of what you'll find: How to configure and manage access lists How to set up a site-to-site VPN How to implement IPv6 All the information is presented in a straightforward style that you can understand and use right away. With The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide you ll be able to sit down with your routers and build a working configuration in a matter of minutes. Of course, some of the more advanced configs may take a little longer, but even so, you'll be able to "get 'er done" in a minimal amount of time In addition, there are supporting videos and a supporting webpage to provide even more help and updated information.

Network Flow Analysis

Author: Michael Lucas

Publisher: No Starch Press

ISBN: 1593272030

Category: Business & Economics

Page: 224

View: 749

A detailed and complete guide to exporting, collecting, analyzing, and understanding network flows to make managing networks easier. Network flow analysis is the art of studying the traffic on a computer network. Understanding the ways to export flow and collect and analyze data separates good network administrators from great ones. The detailed instructions in Network Flow Analysis teach the busy network administrator how to build every component of a flow-based network awareness system and how network analysis and auditing can help address problems and improve network reliability. Readers learn what flow is, how flows are used in network management, and how to use a flow analysis system. Real-world examples illustrate how to best apply the appropriate tools and how to analyze data to solve real problems. Lucas compares existing popular tools for network management, explaining why they don't address common real-world issues and demonstrates how, once a network administrator understands the underlying process and techniques of flow management, building a flow management system from freely-available components is not only possible but actually a better choice than much more expensive systems.

Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide

Foundation Learning for the ROUTE 642-902 Exam

Author: Diane Teare

Publisher: Pearson Education

ISBN: 1587058820

Category: Computers

Page: 945

View: 8003

Foundational, authorized learning for the brand-new CCNP Implementing Cisco IP Routing (ROUTE) exam from Cisco! * *The only Cisco authorized foundational self-study book for the new CCNP ROUTE exam: developed with [email protected], designers of the exam and its companion course. *Includes review questions, chapter objectives, summaries, definitions, case studies, job aids, and command summaries. *Thoroughly introduces routed network construction, support, and scalability. CCNP Authorized Self-Study Guide: Implementing Cisco IP Routing (ROUTE) is the only Cisco authorized, self-paced foundational learning tool designed to help network professionals prepare for the brand new CCNP ROUTE exam from Cisco. This book covers all CCNP ROUTE exam objectives for mastering routed network construction, support, and scalability, including: * *Assessing complex enterprise network requirements and planning routing services. *Applying standards, models and best practices to complex networks. *Creating and documenting routing implementation plans. *Planning, configuring, verifying, and troubleshooting EIGRP solutions. *Implementing scalable OSPF multiarea network solutions. *Implementing IPv4 based redistribution. *Assessing, controlling, configuring, and verifying path control. As part of the Cisco Press Self-Study series, this revision to the popular Authorized Self-Study Guide to advanced routing has been fully updated to provide early and comprehensive foundational learning for the new CCNP ROUTE course. This text assumes that readers have been exposed to concepts covered by CCNA (ICND1 and ICND2), but does not assume any prior knowledge of CCNP concepts.

Practical Packet Analysis, 3E

Using Wireshark to Solve Real-World Network Problems

Author: Chris Sanders

Publisher: No Starch Press

ISBN: 1593278292

Category: Computers

Page: 368

View: 6562

It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network? Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You’ll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a packet map. Practical Packet Analysis will show you how to: –Monitor your network in real time and tap live network communications –Build customized capture and display filters –Use packet analysis to troubleshoot and resolve common network problems, like loss of connectivity, DNS issues, and slow speeds –Explore modern exploits and malware at the packet level –Extract files sent across a network from packet captures –Graph traffic patterns to visualize the data flowing across your network –Use advanced Wireshark features to understand confusing captures –Build statistics and reports to help you better explain technical network information to non-techies No matter what your level of experience is, Practical Packet Analysis will show you how to use Wireshark to make sense of any network and get things done.

Network Warrior

Everything You Need to Know That Wasn't on the CCNA Exam

Author: Gary A. Donahue

Publisher: "O'Reilly Media, Inc."

ISBN: 1449309356

Category: Computers

Page: 788

View: 3018

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An in-depth view of routers and routing Switching, using Cisco Catalyst and Nexus switches as examples SOHO VoIP and SOHO wireless access point design and configuration Introduction to IPv6 with configuration examples Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS Security, firewall theory, and configuration, as well as ACL and authentication Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ) IP address allocation, Network Time Protocol (NTP), and device failures

Quantum Computing

A Gentle Introduction

Author: Eleanor G. Rieffel,Wolfgang H. Polak

Publisher: MIT Press

ISBN: 0262015064

Category: Computers

Page: 372

View: 1348

A thorough exposition of quantum computing and the underlying concepts of quantum physics, with explanations of the relevant mathematics and numerous examples.

PGP & GPG

Email for the Practical Paranoid

Author: Michael Lucas

Publisher: No Starch Press

ISBN: 1593270712

Category: Computers

Page: 216

View: 1193

No, you are not paranoid. They are out to read your email. In this engaging and oddly reassuring text, practitioner Lucas describes Pretty Good Privacy (PGP) and Open Source GPG for moderately skilled computer geeks who are unfamiliar with public-key cryptography but want a cheap solution to security woes. He covers cryptography, installing OPENPGP

Juniper Networks Warrior

Author: Peter Southwick

Publisher: "O'Reilly Media, Inc."

ISBN: 1449316638

Category: Computers

Page: 408

View: 8560

Follows teams of Juniper Networks engineers as they solve specific client problems related to new and emerging network platform architectures.

Absolute OpenBSD, 2nd Edition

UNIX for the Practical Paranoid

Author: Michael W. Lucas

Publisher: No Starch Press

ISBN: 1593274769

Category: Computers

Page: 536

View: 7057

OpenBSD is widely used as the basis for critical DNS servers, routers, firewalls, and more. With this book, you'll learn the intricacies of the platform, the technical details behind certain design decisions, and best practices. This edition has been updated for OpenBSD 5.3, including new coverage of OpenBSD's boot system, security features like W^X and ProPolice, and advanced networking techniques. You'll also learn how to: manage network traffic with VLANs, trunks, IPv6, and the PF packet filter; make software management quick and effective using the ports and packages system; give users only the access they need with groups, sudo, and chroots; configure OpenBSD's secure implementations of SNMP, DHCP, NTP, hardware sensors, and more; and customize the installation and upgrade processes for your network and hardware, or build a custom OpenBSD release.

Home Network Security Simplified

Author: Jim Doherty,Neil Anderson

Publisher: Cisco Press

ISBN: 0133034860

Category: Computers

Page: 224

View: 7962

A straightforward, graphic-based reference for securing your home network Set up a firewall Secure your wireless network Stop adware and spyware Keep your children safe from online threats Prevent a virus outbreak Avoid Internet scams Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your vulnerability–is that much greater. Now, with Home Network Security Simplified, you can get illustrated, easy-to-digest information written specifically for your needs. For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to: Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. Use this book to find the peace of mind that comes with knowing that your home network and your information are secure. Jim Doherty is the director of marketing and programs with Symbol Technologies’ industry solutions group. Prior to joining Symbol, Jim worked at Cisco Systems, where he led various marketing campaigns for IP telephony and routing and switching solutions. Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies. Jim is a coauthor of the Networking Simplified series, including Cisco Networking Simplified, Home Networking Simplified, and Internet Phone Services Simplified. He is also the author of the “Study Notes” section of CCNA Flash Cards and Exam Practice Pack (CCNA Self-Study, Exam #640-801), Second Edition. Jim is a former Marine Corps sergeant; he holds a bachelor’s degree in electrical engineering from N.C. State University and a master’s degree in business administration from Duke University. Neil Anderson is the senior manager of enterprise systems engineering at Cisco Systems. Neil has more than 20 years of engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is a coauthor of the Networking Simplified series, including Home Networking Simplified and Internet Phone Services Simplified. Neil holds a bachelor’s degree in computer science. This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.

The Hacked World Order

How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age

Author: Adam Segal

Publisher: PublicAffairs

ISBN: 161039416X

Category: Political Science

Page: 320

View: 5712

In this updated edition of The Hacked World Order, cybersecurity expert Adam Segal offers unmatched insight into the new, opaque global conflict that is transforming geopolitics. For more than three hundred years, the world wrestled with conflicts between nation-states, which wielded military force, financial pressure, and diplomatic persuasion to create "world order." But in 2012, the involvement of the US and Israeli governments in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks, was revealed; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber warfare demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, Segal reveals, power has been well and truly hacked.

JUNOS OS For Dummies

Author: Walter J. Goralski,Cathy Gadecki,Michael Bushong

Publisher: John Wiley & Sons

ISBN: 1118173740

Category: Computers

Page: 408

View: 8200

Learn to use JUNOS to make your network reliable! Providing network administrators with a reliable network operating system, JUNOS software is an award-winning network operating system that focuses on security and the avoidance of down time. This easy-to-understand book starts with the basics of JUNOS and walks you through its features so that you can quickly learn how to set up, operate, and add key services. Since the various JUNOS features are constantly being updated to provide your network with the best security possible, this new edition shares must-know information, helpful advice, handy tips, and essential cautions for working with JUNOS. Plus, you'll find out how to set up a routing protocol that automates configuration of routing tables for greater efficiency and how you can set up individual or group user accounts locally on the route, or on remote centralized authentication servers. Starts with the basics and introduces you to JUNOS Explains how to connect, manage, and troubleshoot routers and other Juniper appliances Offers tips for making your network more efficient and reveals essential cautions Walks you through setting up, operating, and adding key services Details ways to configure JUNOS default security features as well as restricted physical access to protect routers Breaks down advanced concepts into easy-to-understand segments so you can build your knowledge gradually This new edition gets you started using the sophisticated features and techniques of JUNOS today.

Underground

Tales of Hacking, Madness and Obsession on the Electronic Frontier

Author: Suelette Dreyfus,Julian Assange

Publisher: Canongate Books

ISBN: 085786260X

Category: Computers

Page: 320

View: 1557

Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took on the establishment. Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world’s biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail. As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

The Shadow Factory

The Ultra-Secret NSA from 9/11 to the Eavesdropping on America

Author: James Bamford

Publisher: Anchor

ISBN: 0385528396

Category: Political Science

Page: 352

View: 2909

James Bamford has been the preeminent expert on the National Security Agency since his reporting revealed the agency’s existence in the 1980s. Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public. The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here. From the Trade Paperback edition.

Cisco ISP Essentials

Author: Barry Raveendran Greene,Philip Smith

Publisher: Cisco Press

ISBN: 9781587050411

Category: Computers

Page: 428

View: 9021

Learn Ciscos best common practices for Internet Service Providers (ISPs).

Pirate Cinema

Author: Cory Doctorow

Publisher: Tor Teen

ISBN: 1429943181

Category: Young Adult Fiction

Page: 384

View: 7306

From the New York Times bestselling author of Little Brother, Cory Doctorow, comes Pirate Cinema, a new tale of a brilliant hacker runaway who finds himself standing up to tyranny. Trent McCauley is sixteen, brilliant, and obsessed with one thing: making movies on his computer by reassembling footage from popular films he downloads from the net. In the dystopian near-future Britain where Trent is growing up, this is more illegal than ever; the punishment for being caught three times is that your entire household's access to the internet is cut off for a year, with no appeal. Trent's too clever for that too happen. Except it does, and it nearly destroys his family. Shamed and shattered, Trent runs away to London, where he slowly learns the ways of staying alive on the streets. This brings him in touch with a demimonde of artists and activists who are trying to fight a new bill that will criminalize even more harmless internet creativity, making felons of millions of British citizens at a stroke. Things look bad. Parliament is in power of a few wealthy media conglomerates. But the powers-that-be haven't entirely reckoned with the power of a gripping movie to change people's minds.... At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.

IPv6 in Practice

A Unixer's Guide to the Next Generation Internet

Author: Benedikt Stockebrand

Publisher: Springer Science & Business Media

ISBN: 3540480013

Category: Computers

Page: 390

View: 7859

This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily any IPv6 knowledge. It focuses on reliable and efficient operation of IPv6 implementations available today rather than on protocol specifications. Consequently, it covers the essential concepts, using instructive and thoroughly tested examples, on how to configure, administrate, and debug IPv6 setups. These foundations are complemented by discussions of best practices and strategic considerations aimed at overall efficiency, reliability, maintainability, and interoperation.