CCENT/CCNA ICND1 100-105 Official Cert Guide – Academic Edition
فهرست مطالب:
Introduction
Your Study Plan
Part I: Networking Fundamentals
Part II: Implementing Basic Ethernet LANs
Part III: Ethernet LANs: Design, VLANs, and Troubleshooting
Part IV: IP Version 4 Addressing and Subnetting
Part V: Implementing IPv4
Part VI: IPv4 Design and Troubleshooting
Part VII: IPv4 Services: ACLs and NAT
Part VIII: IP Version
Part IX: Network Device Management
Part X: Final Review
Part XI: Appendixes
DVD Appendixes
CCNA Collaboration CIVND 210-065 Official Cert Guide
فهرست مطالب:
Part I: Cisco Business Video Solutions
Part II: Cisco IP Phones, Collaboration Endpoints and Software Clients
Part III: Cisco TelePresence Endpoints
Part IV: Multipoint Calling
Part V: Final Preparation
CD-Only Appendixes
CCNP Enterprise Design ENSLD 300-420 Official Cert Guide Second Edition
فهرست مطالب کتاب CCNP Enterprise Design ENSLD 300-420 Official Cert Guide Second Edition:
Introduction
Chapter 1 Internet Protocol Version 4 (IPv4) Design
Chapter 2 Internet Protocol Version 6 (IPv6) Design
Chapter 3 Routing Protocol Characteristics, EIGRP, and IS-IS
Chapter 4 OSPF, BGP, and Route Manipulation
Chapter 5 IP Multicast and Network Management
Chapter 6 Enterprise LAN Design and Technologies
Chapter 7 Advanced Enterprise Campus Design
Chapter 8 WAN for the Enterprise
Chapter 9 WAN Availability and QoS
Chapter 10 SD-Access Design
Chapter 11 SD-WAN Design
Chapter 12 Automation
Chapter 13 Final Preparation
Chapter 14 CCNP Enterprise Design ENSLD 300-420 Official Cert Guide Exam Updates
Appendix A Answers to the “Do I Know This Already?” Quiz Questions and Q&A Questions
Appendix B OSI Model, TCP/IP Architecture, and Numeric Conversion
SANS SEC301.2 Computer Function and Networking
فهرست مطالب کتاب SANS SEC301.2 Computer Function and Networking:
ندارد
SANS SEC530 Workbook – Hands-On Labs for Defensible Security Architecture
فهرست مطالب کتاب SANS SEC530 Workbook – Hands-On Labs for Defensible Security Architecture:
ندارد
Security in Wireless Mesh Networks
فهرست مطالب کتاب Security in Wireless Mesh Networks:
Contributors
PART I: INTRODUCTION
1 An Introduction to Wireless Mesh Networks
2 Mesh Networking in Wireless PANs, LANs,MANs, and WANs
PART II: SECURITY PROTOCOLS AND TECHNIQUES
3 Attacks and Security Mechanisms
4 Intrusion Detection in Wireless Mesh Networks
5 Secure Routing in Wireless Mesh Networks
6 Hop Integrity in Wireless Mesh Networks
7 Privacy Preservation in Wireless Mesh Networks
8 Providing Authentication, Trust, and Privacy in
9 Non-Interactive Key Establishment in Wireless Mesh Networks
10 Key Management in Wireless Mesh Networks
PART III: SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES
11 Security in Wireless PANMesh Networks
12 Security in Wireless LANMesh Networks
13 Security in IEEE802.15.4 Cluster-Based Networks
14 Security in Wireless Sensor Networks
15 Key Management in Wireless Sensor Networks
Index
The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:
Introduction to Ethical Hacking
Building a Penetration Testing Lab
Setting up for Advanced Penetration Testing Techniques
Passive Reconnaissace
Exploring Open Source Intelligence
Active Reconnaissance
Performing Vulnerability Assessments
Understanding Network Penetration Testing