Book picks similar to
Introduction to Networks Companion Guide by Cisco Systems Inc.
reference
textbooks
non-fiction
science
Programming Perl
Tom Christiansen - 1991
The first edition of this book, Programming Perl, hit the shelves in 1990, and was quickly adopted as the undisputed bible of the language. Since then, Perl has grown with the times, and so has this book.Programming Perl is not just a book about Perl. It is also a unique introduction to the language and its culture, as one might expect only from its authors. Larry Wall is the inventor of Perl, and provides a unique perspective on the evolution of Perl and its future direction. Tom Christiansen was one of the first champions of the language, and lives and breathes the complexities of Perl internals as few other mortals do. Jon Orwant is the editor of The Perl Journal, which has brought together the Perl community as a common forum for new developments in Perl.Any Perl book can show the syntax of Perl's functions, but only this one is a comprehensive guide to all the nooks and crannies of the language. Any Perl book can explain typeglobs, pseudohashes, and closures, but only this one shows how they really work. Any Perl book can say that my is faster than local, but only this one explains why. Any Perl book can have a title, but only this book is affectionately known by all Perl programmers as "The Camel."This third edition of Programming Perl has been expanded to cover version 5.6 of this maturing language. New topics include threading, the compiler, Unicode, and other new features that have been added since the previous edition.
Adventures of an IT Leader
Robert D. Austin - 2009
A good IT manager must also be a strong business leader.This book invites you to accompany new CIO Jim Barton to better understand the role of IT in your organization. You'll see Jim struggle through a challenging first year, handling (and fumbling) situations that, although fictional, are based on true events.You can read this book from beginning to end, or treat is as a series of cases. You can also skip around to address your most pressing needs. For example, need to learn about crisis management and security? Read chapters 10-12. You can formulate your own responses to a CIO's obstacles by reading the authors' regular "Reflection" questions.You'll turn to this book many times as you face IT-related issues in your own career.
Connect Core Concepts in Health, Brief Version
Paul M. Insel - 1982
The twelfth edition provides current, accurate, scientifically based information about a wealth of health and wellness topics and issues. Connect Personal Health is now seamlessly and deeply integrated with Blackboard and Blackboard related course management systems. Connect is an interactive online learning system that provides interactive multimedia-driven activities and assessments, such as interactive quizzes, video activities, health assessments, Internet research activities, online behavior change workbook, a fitness and nutrition log, and a multimedia ebook. Most activities and assessments are auto graded, entered into the grade book, and automatically uploaded to blackboard. This saves you time, holds your students accountable, and allows for seamless Course Management integration. Only one sign-on is needed for access to Blackboard and Connect, the grade book is integrated, and much much more. To address today's students' need for more portable, more relevant classroom tools, we are providing the book in a three-hole punched, loose-leaf version. "Ask your rep for the correct ISBN to also provide each student full access to Connect Plus and the multimedia e-book at no extra charge with each copy of the loose-leaf text."
Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Rules
Jeff Johnson - 2010
But as the field evolves, designers enter the field from many disciplines. Practitioners today have enough experience in UI design that they have been exposed to design rules, but it is essential that they understand the psychology behind the rules in order to effectively apply them. In "Designing with the Mind in Mind," Jeff Johnson, author of the best selling "GUI Bloopers," provides designers with just enough background in perceptual and cognitive psychology that UI design guidelines make intuitive sense rather than being just a list of rules to follow. * The first practical, all-in-one source for practitioners on user interface design rules and why, when and how to apply them.* Provides just enough background into the reasoning behind interface design rules that practitioners can make informed decisions in every project.* Gives practitioners the insight they need to make educated design decisions when confronted with tradeoffs, including competing design rules, time constrictions, or limited resources.
Animal Diversity
Cleveland P. Hickman Jr. - 1995
The book uses the theme of evolution to develop a broad-scale view of animal diversity--students focus not only the organisms themselves, but also the processes that produce evolutionary diversity. The book is unique in its comprehensive survey of zoological diversity and its emphasis on evolutionary, systematic and ecological principles, all in one package.
Environment
Shankar IAS Academy - 2019
Important-Process to Activate 1 year subscription: Obtain PIN from scratch-off pad; Go to the website link mentioned on the voucher; Enter PIN and follow instructions Note- this is the activation key card; Software needs to be downloaded from the link after following the instructions; Approximate size- 300 MB; Download speed depends on the internet connection Real time Anti Malware - Blocks/Prevents threats and issues like viruses, malware, Trojans, ransomware and spyware It has an adaptive Two-Way Firewall- which safeguards your system For Technical Assistance please contact McAfee India Support on McAfee-Customer Service Tel: 1 800 3000 2656 (Toll Free); 1800 3000 2454, for any activation issues use mcafee.com/activate 15 offers from 135.00
CEH Certified Ethical Hacker Study Guide
Kimberly Graves - 2010
That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews
Nursing Diagnosis Handbook: An Evidence-Based Guide to Planning Care
Betty J. Ackley - 1993
Its step-by-step approach guides you through the process, helping you formulate a nursing diagnosis based on known information and assessment findings; identify the appropriate nursing diagnosis; and create a care plan that includes desired outcomes, interventions, and evidence-based rationales. Nursing Diagnosis Handbook is an essential care planning resource you will turn to again and again throughout your nursing education and career.Provides care plans for every NANDA-I approved nursing diagnosis.Includes examples of and suggested NIC and NOC interventions and outcomes for each care plan.A convenient A-to-Z organization in Sections I and II helps you quickly locate key information.Evidence-based practice information is incorporated throughout.Includes complete coverage of pediatric, geriatric, and multicultural considerations, as well as home care and client/family teaching guidelines for each condition.A Care Plan Constructor on the Evolve website helps you create customized plans of care.Features the most up-to-date 2007-2008 NANDA-I approved nursing diagnoses, including approximately 15 new, 20 revised, and 5 replacement diagnoses.Provides a more detailed explanation of NIC and NOC taxonomies and their use in care planning.Explanations of assessment versus action interventions help guide you to the correct choice of intervention.Covers important information on concept mapping.Patient/Family Teaching sections offer expanded wellness and health promotion information.Clustered wellness nursing diagnoses are quick and easy to locate.Includes the latest evidence-based nursing rationales.
MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements
Dan HolmeMelissa Craft - 2003
Maybe you re going for MCSA first, then MCSE. Maybe you need to upgrade your current credentials. Now, direct from Microsoft, this set brings together all the study resources you ll need. You get the brand-new Second Edition of all four books: for Exam 70-290 (Managing and Maintaining a Windows Server Environment), 70-291 and 70-293 (Network Infrastructure), and 70-294 (Active Directory). What s new here? Deeper coverage, more case studies, more troubleshooting, plus significant new coverage: Emergency Management Services, DNS, WSUS, Post-Setup Security Updates, traffic monitoring, Network Access Quarantine Control, and much more. There are more than 1,200 highly customizable CD-based practice questions. And, for those who don t have easy acess to Windows Server 2003, there s a 180-day eval version. This package isn t cheap, but there s help there, too: 15% discount coupons good toward all four exams. Bill Camarda, from the August 2006 href="http://www.barnesandnoble.com/newslet... Only
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
OccupyTheWeb - 2018
Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Principles of Information Security
Michael E. Whitman - 2002
Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.
HTTP: The Definitive Guide
David Gourley - 2002
Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the black arts and tricks of the trade -- in a concise and readable manner.In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection.Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume.There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the why and the how of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.
Network Security: Private Communication in a Public World
Charlie Kaufman - 1995
In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.
Development Across the Life Span
Robert S. Feldman - 1996
The text taps into students' inherent interest in the subject of human development, encouraging them to draw connections between the material and their own experiences.
Planning, Implementing, and Evaluating Health Promotion Programs: A Primer
James F. McKenzie - 1992
The Fifth Edition features updated information throughout, including new theories and models such as the Healthy Action Process Approach (HAPA) and the Community Readiness Model (CRM), sections on grant writing and preparing a budget, real-life examples of marketing principles and processes, and a new classification system for evaluation approaches and designs. Health Education, Health Promotion, Health Educators, and Program Planning, Models for Program Planning in Health Promotion, Starting the Planning Process, Assessing Needs, Measurement, Measures, Measurement Instruments and Sampling, Mission Statement, Goals, and Objectives, Theories and Models Commonly Used for Health Promotion Interventions, Interventions, Community Organizing and Community Building, Identification and Allocation of Resources, Marketing: Making Sure Programs Respond to Wants and Needs of Consumers, Implementation: Strategies and Associated Concerns, Evaluation: An Overview, Evaluation Approaches and Designs, Data Analysis and Reporting. Intended for those interested in learning the basics of planning, implementing, and evaluating health promotion programs