Learn Java, Cisco, Linux, Microsoft

Provide Learning tools , Ebooks for Java, Cisco, Linux, Microsoft

. .
Showing posts with label Cisco. Show all posts
Showing posts with label Cisco. Show all posts




From bestselling author Todd Lammle comes the most up-to-date book on CCNA exam 640-821, the first exam in Cisco's popular two-exam Cisco Certified Network Associate (CCNA) certification track. Understand networking for the small or home office market, prepare for the exam, and acquire the skills you need with this comprehensive guide. Inside you'll find:
Complete coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need
Practical hands-on exercises to reinforce critical skills








BRKCRT-1963 - CCVP:Mobility Features in Cisco Unified Communications Manager version 6 and 7. This session discusses Cisco Unified Device Mobility and Cisco Unified Mobility and their implementation in Cisco Unified Communications Manager versions 6 and 7. It describes how Cisco Unified Device Mobility and Cisco Unified Mobility work and how they are implemented. The session discusses how these features interact with different calling privileges implementation models such as the traditional calling search space approach, the line/device calling search space approach, and the corresponding changes in Cisco Unified Communications Manager version 7, for example when using the Local Route Group feature.

Download

http://hotfile.com/dl/13990355/dd7c442/www.dl4all_CN2009CCVPMFiCUCM6a7.part01.rar.html
http://hotfile.com/dl/13990388/8121436/www.dl4all_CN2009CCVPMFiCUCM6a7.part02.rar.html
http://hotfile.com/dl/13990410/6ea4afd/www.dl4all_CN2009CCVPMFiCUCM6a7.part03.rar.html
http://hotfile.com/dl/13990443/288e42e/www.dl4all_CN2009CCVPMFiCUCM6a7.part04.rar.html
http://hotfile.com/dl/13990467/60c9dd9/www.dl4all_CN2009CCVPMFiCUCM6a7.part05.rar.html
http://hotfile.com/dl/13990494/01cc7d2/www.dl4all_CN2009CCVPMFiCUCM6a7.part06.rar.html
http://hotfile.com/dl/13990511/1deaea2/www.dl4all_CN2009CCVPMFiCUCM6a7.part07.rar.html
http://hotfile.com/dl/13990524/748c57a/www.dl4all_CN2009CCVPMFiCUCM6a7.part08.rar.html
http://hotfile.com/dl/13990543/71e5b5d/www.dl4all_CN2009CCVPMFiCUCM6a7.part09.rar.html
http://hotfile.com/dl/13990565/1b1aad6/www.dl4all_CN2009CCVPMFiCUCM6a7.part10.rar.html
http://hotfile.com/dl/13990574/0e2ac1f/www.dl4all_CN2009CCVPMFiCUCM6a7.part11.rar.html
http://hotfile.com/dl/13990584/76ff5c8/www.dl4all_CN2009CCVPMFiCUCM6a7.part12.rar.html
 



Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due to increased attack frequency, diverse attack sophistication, and the rapid nature of attack velocity–all blurring the boundaries between the network and perimeter.

End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds.

End-to-End Network Security provides you with a comprehensive look at the mechanisms to counter threats to each part of your network. The book starts with a review of network security technologies then covers the six-step methodology for incident response and best practices from proactive security frameworks. Later chapters cover wireless network security, IP telephony security, data center security, and IPv6 security. Finally, several case studies representing small, medium, and large enterprises provide detailed example configurations and implementation strategies of best practices learned in earlier chapters.

Adopting the techniques and strategies outlined in this book enables you to prevent day-zero attacks, improve your overall security posture, build strong policies, and deploy intelligent, self-defending networks.

“Within these pages, you will find many practical tools, both process related and technology related, that you can draw on to improve your risk mitigation strategies.” –Bruce Murphy, Vice President, World Wide Security Practices, Cisco

Omar Santos is a senior network security engineer at Cisco®. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.

* Guard your network with firewalls, VPNs, and intrusion prevention systems
* Control network access with AAA
* Enforce security policies with Cisco Network Admission Control (NAC)
* Learn how to perform risk and threat analysis
* Harden your network infrastructure, security policies, and procedures against security threats
* Identify and classify security threats
* Trace back attacks to their source
* Learn how to best react to security incidents
* Maintain visibility and control over your network with the SAVE framework
* Apply Defense-in-Depth principles to wireless networks, IP telephony networks, data centers, and IPv6 networks

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.




Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening.

Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors.

Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools.

“In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment.” —Ed Skoudis, Vice President of Security Strategy, Predictive Systems

Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful computer crimes conviction in the state of Oregon. Gary is a regular speaker at security events and presents at Cisco Networkers conferences.

Greg Kellogg is the vice president of security solutions for Calence, LLC. He is responsible for managing the company’s overall security strategy. Greg has more than 15 years of networking industry experience, including serving as a senior security business consultant for the Cisco Enterprise Channel organization. Additionally, Greg worked for Protego Networks, Inc. (where MARS was originally developed). There he was responsible for developing channel partner programs and helped solution providers increase their security revenue.

Learn the differences between various log aggregation and correlation systems

* Examine regulatory and industry requirements
* Evaluate various deployment scenarios
* Properly size your deployment
* Protect the Cisco Security MARS appliance from attack
* Generate reports, archive data, and implement disaster recovery plans
* Investigate incidents when Cisco Security MARS detects an attack
* Troubleshoot Cisco Security MARS operation
* Integrate Cisco Security MARS with Cisco Security Manager, NAC, and third-party devices
* Manage groups of MARS controllers with global controller operations

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.




Written by test-prep specialists, this guide begins with a complete description of the exam, and then goes on to cover the four main areas that the test targets: planning and designing, implementation and operation, troubleshooting, and technology. The authors provide more than 500 practice questions with answers and explanations, share proven test-taking strategies, and offer ten full-length practice exams that are structured like the actual test so you’ll be familiar with the format.


Download            Mirror


504 PAGES | 40 MB

Master IUWNE 640-721 exam topics with the official study guide Assess your knowledge with chapter-opening quizzes Review key concepts with Exam Preparation Tasks Practice with realistic exam questions on the CD-ROM

CCNA Wireless Official Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNA® Wireless IUWNE exam. Senior instructor Brandon Carroll shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

CCNA Wireless Official Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks sections help you drill on key concepts you must know thoroughly.

The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text and laying out a complete study plan for review.

Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

CCNA Wireless Official Exam Certification Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

Brandon James Carroll is one of the country’s leading instructors for Cisco security technologies, teaching classes that include the CCNA, CCNP®, CCSP® courses, a number of the CCVP® courses, as well as custom-developed courseware. In his eight years with Ascolta, Brandon has developed and taught many private Cisco courses for companies such as Boeing, Intel, and Cisco. He is a CCNA, CCNP, CCSP, and a certified Cisco instructor. Brandon is the author of Cisco Access Control Security.



Cisco VPN Client v5.0.05.0290 | 10.7 MB

Simple to deploy and operate, the Cisco VPN Client allows organizations to establish end-to-end, encrypted VPN tunnels for secure connectivity for mobile employees or teleworkers. This thin design, IP security (IPSec)-implementation is compatible with all Cisco virtual private network (VPN) products.

The Cisco VPN Client can be preconfigured for mass deployments, and initial logins require little user intervention. It supports the innovative Cisco Easy VPN capabilities, delivering a uniquely scalable, cost-effective, and easy-to-manage remote access VPN architecture that eliminates the operational costs associated with maintaining a consistent policy and key management method. The Cisco Easy VPN feature allows the Cisco VPN Client to receive security policies upon a VPN tunnel connection from the central site VPN device (Cisco Easy VPN Server), minimizing configuration requirements at the remote location. This simple and highly scalable solution is ideal for large remote access deployments where it is impractical to individually configure policies for multiple remote PCs.

The Cisco VPN client supports Windows 2000, XP and Vista (x86/32-bit only); Linux (Intel); Mac OS X 10.4; and Solaris UltraSparc (32 and 64-bit). The Cisco VPN Client is compatible with the following Cisco products:
Cisco 6500 / 7600 IPSec VPNSM and VPN SPA IOS Software Release 12.2SX and later
Cisco VPN 3000 Series Concentrator Software Version 3.0 and later
Cisco IOS Software Release 12.2(8)T and later
Cisco PIX Security Appliance Software Version 6.0 and later
Cisco ASA 5500 Series Software Version 7.0 and higher

The Cisco VPN Client is included with all models of Cisco VPN 3000 Series concentrators and Cisco ASA 5500 Series security appliances (excluding ASA 5505), and most Cisco PIX 500 security appliances. Customers with Cisco SMARTnet® support contracts and encryption entitlement may download the Cisco VPN Client from the Cisco Software Center at no additional cost. For customers without Cisco SMARTnet support contracts, a media CD containing the client software is available for purchase. This CD does not provide access to the most current patch releases.


Cisco Speed Meter Pro v1.3.9052

With Speed Meter Pro, take the guesswork out of trying to figure out what is causing slowdowns. This powerful software utility helps you diagnose and manage your wireless, network and Internet connection so you can optimize your connected experience

* Scans across your entire network including computers, wired and wireless networks and Internet connection
* Identifies the source of network slowdowns, saving you troubleshooting time
* Enables you to address problems quickly and optimize your network for maximum speed and productivity
* Proactively monitors your network to detect issues that need immediate attention

Key Features
*View your entire network configuration and performance in one place
- View the device dashboard with traffic flow and program data to see how network resources are being used
- Quickly identify slowdowns and pinpoint issues on your local network, your wireless router or Internet connection that affect performance
- Visually see the devices and software programs that are using your network
*Manage the performance for all of your home network connections
- Analyze your wireless connection to make sure you are getting maximum speed with the best throughput
- Track your favorite websites and their performance to see if connection issues are due to your network, the website or a general slowing of the Internet
*Receive Alerts and network status information
- Set alerts to track if a connection status is slow, interrupted or down
- Get real time data on traffic flow and speed between your computer and other devices on your network and between your computer and Internet
- Check traffic volume and connection status of everything connected on your home network




Cisco IP Communicator 7.0.2 Retail | 52.9 Mb

Cisco IP Communicator—a software-based application that delivers enhanced telephony support through the PC—is designed to meet diverse customer needs by serving as a supplemental telephone when traveling, a telecommuting device, or as a primary desktop telephone. With Cisco IP Communicator, remote users don't just take their office extension with them; they also enjoy access to the same familiar phone services that they have in the office.Cisco IP Communicator is designed for users who require a supplemental telephone when away from their deskphone, traveling, or telecommuting. When using Cisco IP Communicator remotely, you are not just taking your office phone extension with you: you continue to have access to the same familiar phone and video telephony services that you have in the office. This advantage boosts business collaboration and responsiveness and helps organizations keep pace with today's mobile business environment.

Cisco IP Communicator Features
Cisco IP Communicator is intuitively designed and easy to use, and delivers convenient access to a broad range of features:
• Eight line keys: These keys provide telephone lines and direct access to telephony features.
• Five soft keys: These keys dynamically give users call-feature options.
• Messages: This key provides direct access to voicemail messages.
• Directories: Cisco IP Communicator identifies incoming calls and messages and categorizes them on the screen, allowing users to return calls quickly and effectively using direct dial-back capability. The corporate directory integrates with the Lightweight Directory Access Protocol Version 3 (LDAP3) standard directory.
• Settings: This key allows users to select from a large number of ringer sounds and background images.
• Services: Cisco IP Communicator allows users to quickly access diverse information such as weather, stocks, quote of the day, or any other Web-based information. The phone uses XML to provide a portal to an ever-growing world of features and information.
• Help: The online Help feature gives users information about the phone keys, buttons, and features.

Cisco IP Communicator Modes
• Cisco IP Communicator offers handset, headset, and high-quality speakerphone modes.
• Headset mode: In this mode, Cisco IP Communicator offers the highest-quality voice communications capabilities.
• Handset mode: Cisco IP Communicator interoperates with third-party USB telephony handsets.
• Speakerphone mode: Cisco IP Communicator converts a computer into a full-duplex, hands-free speakerphone...............

System:WindowsXP Pro with SP2 or 3/Windows Vista


Download Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
English | McGraw-Hill Osborne Media | 2006 | ISBN: 0072263644 | 539 pages | CHM | 16,3 MB

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
Fortify Cisco, Avaya, and Asterisk systems
Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
Thwart number harvesting, call pattern tracking, and conversation eavesdropping
Measure and maintain VoIP network quality of service and VoIP conversation quality
Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
Avoid insertion/mixing of malicious audio
Learn about voice SPAM/SPIT and how to prevent it
Defend against voice phishing and identity theft scams



"Cisco Secure Firewall Services Module FWSM"
2009 | English | 519 Pages | PDF | 6.78 MB


The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection. The FWSM is a key component to anyone deploying network security.


Cisco Secure Firewall Services Module (FWSM) covers all aspects of the FWSM. The book provides a detailed look at how the FWSM processes information, as well as installation advice, configuration details, recommendations for network integration, and reviews of operation and management. This book provides you with a single source that comprehensively answers how and why the FWSM functions as it does. This information enables you to successfully deploy the FWSM and gain the greatest functional benefit from your deployment. Practical examples throughout show you how other customers have successfully deployed the FWSM.

By reading this book, you will learn how the FWSM functions, the differences between the FWSM and the ASA Security Appliance, how to implement and maintain the FWSM, the latest features of the FWSM, and how to configure common installations.

Ray Blair, CCIE® No. 7050, is a consulting systems architect who has been with Cisco for more than 8 years, working primarily on security and large network designs. He has 20 years of experience in designing, implementing, and maintaining networks that have included nearly all networking technologies. Mr. Blair maintains three CCIE certifications in Routing and Switching, Security, and Service Provider. He is also a CNE and a CISSP.

Arvind Durai, CCIE No. 7016, is an advanced services technical leader for Cisco. His primary responsibility has been in supporting major Cisco customers in the enterprise sector. One of his focuses has been on security, and he has authored several white papers and design guides in various technologies. Mr. Durai maintains two CCIE certifications, in Routing and Switching and Security.

* Understand modes of operation, security levels, and contexts for the FWSM
* Configure routing protocols and the host-chassis to support the FWSM
* Deploy ACLs and Authentication, Authorization, and Accounting (AAA)
* Apply class and policy maps
* Configure multiple FWSMs for failover support
* Configure application and protocol inspection
* Filter traffic using filter servers, ActiveX, and Java filtering functions
* Learn how IP multicast and the FWSM interact
* Increase performance with firewall load balancing
* Configure IPv6 and asymmetric routing
* Mitigate network attacks using shunning, anti-spoofing, connection limits, and timeouts
* Examine network design, management, and troubleshooting best practices

This security book is part of the Cisco Press® Networking Technology series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.