Vi bøger
Levering: 1 - 2 hverdage

Netværkspakker

Her finder du spændende bøger om Netværkspakker. Nedenfor er et flot udvalg af over 18 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Brad Riapolov
    807,95 kr.

    This cert guide is Cisco's official, comprehensive self-study resource for the CCNP SPCOR 350-501 certification. It prepares students to demonstrate knowledge of implementing core service provider network technologies including core architecture, services, networking, automation, quality of services, security, and network assurance. This book serves as a valuable resource, offering foundational insights into every aspect of the Service Providers' technologies. In each chapter, there are review questions that allow students to assess their understanding of the pertinent information, from the big picture down to the finer details, all of which are illustrated through practical examples. Furthermore, each chapter imparts useful design tips that will steer students toward a more visionary approach, particularly within the context of Service Provider networks. This Official Cert Guide covers every exam objective concisely and logically, with extensive teaching features designed to promote retention and understanding. This complete study package includes A test-preparation routine proven to help you pass the exams Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly Practice exercises that help you enhance your knowledge An online interactive Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time

  • af William Stallings
    2.098,95 kr.

    For courses in Cryptography, Computer Security, and Network Security The Principles and Practice of Cryptography and Network Security StallingsGÇÖ Cryptography and Network Security, Seventh Edition, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material GÇö including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for instructors and students to ensure a successful teaching and learning experience.

  • af Avinash Naduvath
    389,95 kr.

    Before an enterprise answers "How can we achieve a Zero Trust architecture?" they should be asking "Why are we looking at Zero Trust as an access model? Does it align with our vision?" In an innovative format, Cisco security architecture expert Avinash Naduvath guides you through the philosophical questions and practical answers for an enterprise looking to start the Zero Trust journey.   A conversational model will take you from the initial stages of identifying goals and pitching solutions, through practical tasks that highlight tangible outcomes-including common primary use cases-in order to bring focus to the correct implementation and maintenance of a Zero Trust architecture.   For a future where success is measured as much by the security of a system as by the functionality, In Zero Trust We Trust is designed to help everyone at every stage and level of leadership understand not only the conceptual underpinnings, but the real-world context of when, how, and why to deploy Zero Trust security controls. This book provides the starting point for helping you change the mindset of others, and getting them to understand why Zero Trust isn't simply a conversation to be had, but a movement to embrace.   Origins of the Zero Trust philosophy in security architecture explained, and why it took so long to catch onDetailed examination of how to ask the right questions so as to implement the right security answers for clientsUnderstanding the metrics by which to measure Zero Trust success, and what maintaining that success looks likeIdentifying the stakeholders and empowering a Zero Trust team within an enterpriseExamples of how to catalyze opinion and tailor tactics to motivate investment in secure Zero Trust architectureImplement, monitor, feedback, repeat: Presenting and building a roadmap for a sustainable security architectureLooking ahead to a Zero Trust Lifecycle Framework and a blueprint for the future

  • af Omar Santos
    405,95 kr.

    As artificial intelligence (AI) becomes more and more woven into our everyday lives-and underpins so much of the infrastructure we rely on-the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.   Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals-and, increasingly, users-are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.   · An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future · Introduction to AI models and implementations, as well as examples of emerging AI trends · Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment · Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology · A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas · An academic resource and guide for the evolving technical and intellectual challenges of AI · Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.

  • af Omar Santos
    269,95 kr.

    The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.   AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more.   In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.   You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company.   Are you ready to join The AI Revolution in Networking, Cybersecurity, and Emerging Technologies?   Gain industry-specific knowledge from experienced professionals Discover new capabilities like self-healing networks and predictive analytics Learn how AI can save time by detecting and correcting issues in real time Master techniques for security monitoring and alerting Understand potential security and privacy pitfalls of using AI, and how to guard against them Understand how AI works for you and with you   Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

  • af Achim Orlikowski
    657,95 kr.

    "Mein MySQL Buch" mit Grundlagen, Fortgeschrittene Techniken und Best Practices ist das ultimative Handbuch für jeden, der seine Kenntnisse im Bereich Datenbankmanagement erweitern möchte. "Mein MySQL Buch" bietet eine umfassende Einführung in mySQL sowie zahlreiche fortgeschrittene Techniken und Best Practices, die von Einsteigern, Auszubildenden, Fortgeschrittenen und Experten gleichermaßen genutzt werden können."Mein MySQL Buch" ist in einer Schritt-für-Schritt-Struktur aufgebaut und bietet detaillierte Anleitungen, zahlreiche kommentierte Beispiele, Übungen, Multple Choise Aufgaben nach jedem Kapitel, Fallbeispiele, sowie ein umfangreiches Stichwortregister mit Erklärungen, um das Verständnis des Lesers zu verbessern. Jedes Kapitel baut auf den vorherigen Kapiteln auf, um eine nahtlose Lernumgebung zu schaffen.

  • af Russ White
    432,95 kr.

    Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCST Networking 100-150 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Leading Cisco technology expert and best-selling author Russ White shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports More than 5 hours of video mentoring from the author An online Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Content Update Program: This Cert Guide includes coverage of all the topics on the Cisco Certified Support Technician CCST Networking exam from the original exam blueprint. Visit ciscopress.com/newcerts for information on any digital updates for this book that align with Cisco exam blueprint version changes The Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide walks you through all the exam topics found in the Cisco CCST exam. Topics covered include Standards and Concepts Addressing and Subnet Formats Endpoints and Media Types Infrastructure Diagnosing Problems Security Companion Website The companion website contains more than 200 unique practice exam questions, practice exercises, a study planner, online flash cards, and more than 5 hours of video training. Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. Internet access required. Pearson Test Prep offline system requirements: Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases Also available from Cisco Press for CCST study is the Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide Premium Edition and Practice Test. This digital-only certification preparation product combines an eBook with an enhanced Pearson Test Prep Practice Test. This integrated learning package: Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

  • af Yuri Diogenes
    387,95 kr.

    The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management - all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsoft's Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, they'll help you address new security challenges far more effectively-and save hours, days, or even weeks. Two of Microsoft's leading cloud security experts show how to: Assess new threat landscapes, the MITRE ATT&CK framework, and the implications of ''assume-breach'' Explore Defender for Cloud architecture, use cases, and adoption considerations including multicloud with AWS and GCP Plan for effective governance, successful onboarding, and maximum value Fully visualize complex cloud estates and systematically reduce their attack surfaces Prioritize risks with Secure Score, and leverage at-scale tools to build secure cloud-native apps Establish consistent policy enforcement to avoid drift Use advanced analytics and machine learning to identify attacks based on signals from all cloud workloads Enhance security posture by integrating with the Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft Defender for Endpoint Leverage just-in-time VM access and other enhanced security capabilities  About This Book For architects, designers, implementers, SecOps professionals, developers, and security specialists working in Microsoft Azure environments For all IT professionals and decision-makers concerned with securing modern hybrid/multicloud environments, cloud-native apps, and PaaS services

  • af John Capobianco
    512,95 kr.

    Unlock the power of automated network testing with the Cisco pyATS framework.Written by industry experts John Capobianco and Dan Wade, Cisco pyATSNetwork Test and Automation Solution is a comprehensive guide to the Cisco pyATS framework, a Python-based environment for network testing, device configuration, parsing, APIs, and parallel programming.Capobianco and Wade offer in-depth insights into the extensive capabilities of pyATS and the pyATS library (Genie). You'll learn how to leverage pyATS for network testing, including software version testing, interface testing, neighbor testing, and reachability testing. You'll discover how to generate intent-based configurations, create mock devices, and integrate pyATS into larger workflows using CI/CD pipelines and artificial intelligence. You'll explore the pyATS Blitz feature, which introduces a low-code no-code approach to network testing by allowing you to configure devices and write test cases using YAML, much like Ansible. And you'll learn how to reset devices during or after testing with the pyATS Clean feature, build a pyATS image from scratch for containerized application deployment, and much more.Whether you're a network professional, software developer, or preparing for the Cisco DevNet Expert Lab exam, this book is a must-have resource.Understand the foundations of NetDevOps and the modern network engineer's toolkitInstall, upgrade, and work with the pyATS framework and libraryDefine test cases, control the flow of test execution, and review test results with built-in reporting featuresGenerate automated network documentation with Jinja2 templates and Genie Conf objectsApply CI/CD practices in network automation with GitLab, Ansible, and pyATSLeverage artificial intelligence in pyATS for enhanced network automation

  • af Charles P. Pfleeger & Shari Lawrence Pfleeger
    1.089,95 - 1.263,95 kr.

    Covers the economics of cyber security and the intersection of privacy and information security. This title introduces the core concepts and vocabulary of computer security, including attacks and controls. It identifies and assesses the threats facing programs, operating systems, database systems, and networks.

  • af William Easttom
    765,95 kr.

  • af Matthew Baker, Sean McKeown, Brandon Beck, mfl.
    597,95 kr.

  • af Omar Santos
    558,95 kr.

    This is Cisco's official, comprehensive self-study resource for preparing for the DCCOR 300-601 exam, part of Cisco's modern pathways towards CCNP and CCIE certification. Cisco technology experts cover every objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find: Pre-chapter quizzes to assess knowledge upfront and focus study more efficiently Foundation topics sections that explain concepts and configurations, and link theory to actual configuration commands Key topics sections calling attention to every figure, table, and list that candidates must know Exam Preparation sections with additional chapter review features Final preparation chapter providing tools and a complete final study plan Customizable online practice testsThis guide's comprehensive, current coverage covers implementation of all these core data center technologies: Network Compute Storage network Automation Security Authoritative coverage of every Implementing Cisco Data Center Core Technologies (DCCOR 300-601) exam topic, with all the context and practical examples you need to succeed Logical, well-organized, and practical coverage of implementing core data center technologies, including network, compute, storage networking, automation, and security Includes realistic practice tests, plus extensive proven features to help you review more efficiently Ideal for Cisco data center professionals pursuing CCNP or CCIE certification Two leading experts in Cisco data center technologies help you improve your data center skills to gain a competitive edgeStraight from Cisco: the official complete assessment, review, and practice for the new CCNP/CCIE DCCOR 300-601 exam! Authoritative coverage of every Implementing Cisco Data Center Core Technologies (DCCOR 300-601) exam topic, with all the context and practical examples you need to succeed Logical, well-organized, and practical coverage of implementing core data center technologies, including network, compute, storage networking, automation, and security Includes realistic practice tests, plus extensive proven features to help you review more efficiently Ideal for Cisco data center professionals pursuing CCNP or CCIE certification Two leading experts in Cisco data center technologies help you improve your data center skills to gain a competitive edge dccor; 300-601; ccnp, cisco data center; ccie data center; ccnp data center; cisco data center + network; cisco data center + compute; cisco data center + storage; cisco data center + automation; cisco data center + security

  • af Andrew L. Russell, James L. Pelkey & Loring G. Robbins
    727,95 - 967,95 kr.

  • af Eugene Spafford
    322,95 kr.

    175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Elected into the Cybersecurity Canon Hall of Fame! Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us , three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses. Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them. Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best? Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader. Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. "You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it." --From the Foreword by Vint Cerf , Internet Hall of Fame Pioneer Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

  • af Maarten Van Steen & Michi Henning
    561,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.