Book picks similar to
Cisco Ccna Simplified by Paul W. Browning


computer-security
computers
network
networking

SSH, The Secure Shell: The Definitive Guide


Daniel J. Barrett - 2001
    It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

Big Data for Dummies


Judith Hurwitz - 2013
    Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly outpace the capacity of traditional data management tools. If you need to develop or manage big data solutions, you'll appreciate how these four experts define, explain, and guide you through this new and often confusing concept. You'll learn what it is, why it matters, and how to choose and implement solutions that work.Effectively managing big data is an issue of growing importance to businesses, not-for-profit organizations, government, and IT professionals Authors are experts in information management, big data, and a variety of solutions Explains big data in detail and discusses how to select and implement a solution, security concerns to consider, data storage and presentation issues, analytics, and much more Provides essential information in a no-nonsense, easy-to-understand style that is empowering Big Data For Dummies cuts through the confusion and helps you take charge of big data solutions for your organization.

Mnemonics Memory Palace Book One: Memory Palaces and Mnemonics. The Forgotten Craft of Memorization and Memory Improvement With Total Recall. (How To Build a Mnemonics Memory Palace 1)


Sjur Midttun - 2016
    In it you will learn: What is a memory palace? How to build your first couple of memory palace. Learn the one secret to why some information stick to your mind, and other types don't How to easily build up to 15 memory palaces, based on the first two. Building memory palaces based on walks/journeys. How to build virtual memory palaces. How to memorize any fact or information using memory palaces. Unlike other popular books on the subject, like "Moonwalking with Einstein", the book "How to Build a Mnemonic Memory Palace" focuses on practical, hands on advice. Information that will get you started making your own memory palaces from day one.  This short, but informative book is virtually packed with information. Tips that simply work. Memory palaces are an ancient, yet somehow forgotten method of memorizing all kinds of information. Before the printing press was invented, content was passed on verbally from person to person. And using the Greek tradition of memory palaces, scholars could store vast amounts of information.  These techniques have seen an increased interest lately, and many people who have been inspired by memory palaces from TV-series like "Sherlock" or books like "Hannibal", want to find a way to easily get started making memory palaces. "How to Build a Mnemonic Memory Palace" literally takes you by the hand and walks you through the process, step by step. And thanks to the many examples, these ancient methods become very clear. In many ways, this book starts where others, like "Moonwalking With Einstein" stop.  Download a sample, or get the set of two books today. Learn how you can use the powerful techniques of memory palaces in order to memorize vitually anything.  A full, practical guide to getting started memorizing all types of information using memory palaces Equally useful for students, as adults Find out the perfect method for memorizing speeches Never forget another keyword

Interaction Design: Beyond Human-Computer Interaction


Yvonne Rogers - 2001
    It should be labelled 'start here'." --Pieter Jan Stappers, ID-StudioLab, Delft University of Technology

Two Scoops of Django: Best Practices for Django 1.6


Daniel Roy Greenfeld - 2014
    

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

LDAP System Administration


Gerald Carter - 2003
    That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

Linux Network Administrator's Guide


Tony Bautts - 1994
    Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system--including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems.But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:Wireless hubsOpenLDAPFreeS/WANIMAPSpam filteringOpenSSHBINDIPv6Featuring a litany of insider tips and techniques, the Linux Network Administrator's Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environmentAuthored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator's Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP's goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.

Celebrating Life: Finding Happiness in Unexpected Places


Jonathan Sacks - 2000
    Happiness isn't somewhere else, it's where we are. It isn't something we don't have, we do. It isn't fantasy, it's reality experienced in a certain way. Happiness is a close relative of faith'Following the painful loss of his father, Chief Rabbi Sacks began to learn how to celebrate life in a new way. He discovered where happiness lives, often in unexpected places, through family, community, friendship and responsibilities. He also found it through a renewed relationship with God who spoke to his deepest needs.Based, in part, on his columns in the UK's Times newspaper, Celebrating Life is for people of all faiths and none. It shows us how to be human and, in becoming so, how we can touch the divine.

Database Systems: Design, Implementation, and Management


Peter Rob - 1993
    The proven success of database design treatment is sustained and further improved in this revision. The proven Parts organizations streamline the chapter coverage, so it is an ideal choice for your classroom. Each Part opens with a new business vignette, which provides real world examples to engage your students. The new edition includes updates in every chapter as well as added exercises and cases. There are new chapters such as Advanced Modeling Concepts, Database Performance Tuning and Query Optimization, and Database Connectivity and Web Development. In the seventh edition you will find examples of database usage, which highlights eBAY for compelling context. In our new Query Optimization chapter, we cover database performance tuning concepts, index selectivity and SQL coding practices. There is added EERD coverage such as clusters and subtype discriminator attributes. With the authors' strong writing style and outstanding balance of theory and practice, this is just a small sampling of the improvements we have made to the new edition of Database Systems: Design, Implementation, and Management by Peter Rob and Carlos Coronel.

Amazon Elastic Compute Cloud (EC2) User Guide


Amazon Web Services - 2012
    This is official Amazon Web Services (AWS) documentation for Amazon Compute Cloud (Amazon EC2).This guide explains the infrastructure provided by the Amazon EC2 web service, and steps you through how to configure and manage your virtual servers using the AWS Management Console (an easy-to-use graphical interface), the Amazon EC2 API, or web tools and utilities.Amazon EC2 provides resizable computing capacity—literally, server instances in Amazon's data centers—that you use to build and host your software systems.

The Delicate Art of Bureaucracy: Digital Transformation with the Monkey, the Razor, and the Sumo Wrestler


Mark Schwartz - 2020
    Through humor, a healthy dose of history and philosophy, and real-life examples from his days as a government bureaucrat, Schwartz shows IT leaders (and the whole of business) how to master the arts of the Monkey, the Razor, and the Sumo Wrestler to create a lean, learning, and enabling bureaucracy. For anyone frustrated by roadblocks, irritated you can't move fast enough, suffering under the weight of crushing procedures, this book is for you. No matter your role, you need a playbook for bureaucracy. This is it. With this playbook, you can wield bureaucracy as a superpower and bust through it at the same time.

Break Free from OCD: Overcoming Obsessive Compulsive Disorder with CBT


Paul M. Salkovskis - 2011
    However, you don't need to suffer any more. This practical guide, written by three leading cognitive behavioural therapy experts, enables you to make sense of your symptoms, and gives a simple plan to help you conquer OCD.Includes: detailed information on the many different manifestations of OCD; the differences between normal and obsessive worries; clear information on treating your individual problem; real-life case studies and examples; and advice and support for friends and family of OCD sufferers.Whether your condition is mild or severe, this definitive resource will help you reclaim your life and keep OCD away for good.

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers


T.J. O'Connor - 2012
    Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.