Ccna
Author: Michael Valentin
The CCNA Exam Cram 2, Second Edition is a concise, comprehensive study aid that is perfect for anyone preparing for the CCNA exam. Some changes to the exam are expected in late 2005, and this updated edition to the popular Exam Cram will keep you up to date. This newest edition continues to provide you with specific, targeted explanations of the concepts and commands that you will find on the actual CCNA exam.
You will be able to focus on exam objectives, without having to first wade through lots of extra information that you don't need for the test. You will also be able to gain specific skills to improve your testing ability, not only in CCNA knowledge, but with proven test-taking strategies designed to improve your score. The CCNA Exam Cram 2, Second Edition's focus on objectives, exam alerts, and strategies will give you some of the best study preparation material available. It truly is "The Smartest Way to Get Certified!"
Table of Contents:
Ch. 1 | Networking fundamentals | 1 |
Ch. 2 | Network models | 13 |
Ch. 3 | Concepts in IP addressing | 37 |
Ch. 4 | Working with Cisco equipment | 65 |
Ch. 5 | Managing your router | 85 |
Ch. 6 | Catalyst switch operations and configuration | 99 |
Ch. 7 | VLANs | 125 |
Ch. 8 | IP access lists | 147 |
Ch. 9 | Routing | 171 |
Ch. 10 | Wide area networks | 209 |
Ch. 11 | Advanced IP concepts | 241 |
Ch. 12 | CCNA practice labs | 269 |
Ch. 13 | Practice exam #1 | 281 |
Ch. 14 | Answer key to practice test #1 | 305 |
Ch. 15 | Practice exam #2 | 321 |
Ch. 16 | Answer key to practice test #2 | 339 |
See also: Natural Healing for Headaches or From the Heart
Computer Security Fundamentals
Author: William Easttom
KEY BENEFIT: This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption. Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software. For system analysts network administrators, network security professionals and security audit professionals.
No comments:
Post a Comment