Saturday, February 28, 2009

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

Product Description
Identify, mitigate, and respond to network attacks
* Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware
* Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS
* Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration
* Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI)
* Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM)
Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network.
This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products.
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner’s guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments.
The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network.
“I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider’s guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks.”
–Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems®
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Download Link:

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

P2P Networking and Applications

# Hardcover: 408 pages
# Publisher: Morgan Kaufmann (December 29, 2008)
# Language: English
# ISBN-10: 0123742145
# ISBN-13: 978-0123742148
Review
* Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
* Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
* Provides online access to the Overlay Weaver P2P emulator, an open source tool that supports a number of peer-to-peer applications with which readers can practice.

Download Link:

P2P Networking and Applications

Some Videos on TCP IP Subnetting

Download Link:

Some Videos on TCP IP Subnetting

http://rapidshare.com/files/195342948/readme.zip

Wireshark Troubleshooting Network Performance

This course focuses on the causes of poor network performance including packet-loss, retransmissions, high latency, low throughput rates, minimal bandwidth, application errors, configuration faults, resolution problems and protocol behavior problems. Section
1: Analyzer Placement a) Analyzing Hubbed Networks b) Analyzing Switched Networks c) Analyzing Routed Networks d) Analyzing WAN Links e) Capturing in Stealth Mode Section
2: Normal Network Communications a) When Everything Goes Right b) The Multi-Step Resolution Process c) Building the Packet Section
3: Causes of Performance Problems a) Where Network Faults Occur b) Time is of the Essence Section
4: Wireshark Functions for Troubleshooting a) Using Pre-Defined Coloring Rules b) Basic and Advanced IO Graphs c) Use the Delta Time Value d) Analyze Expert Information
e) Look Who s Talking f) Graph Bandwidth Use, Round Trip Time and TCP Performance g) Flow Graphing h) Statistics (Various) Section
5: Latency Issues a) The Five Primary Points in Calculating Latency b) Plotting High Latency Times c) Free Latency Calculators d) Using the frame.time_delta Filter Section
6: Packet Loss and Retransmissions a) Packet Loss and Recovery UDP v. TCP b) Previous Segment Lost Events c) Duplicate ACKs d) TCP Retransmissions and Fast Retransmissions e) Out-of-Order Segments Section
7: Misconfigurations and Redirections a) Visible Misconfigurations b) Don t Forget the Time Section
8: Dealing with Congestion a) Shattered Windows b) Flooded Out Section
9: Baseline Network Communications a) Your First Task When You Finish this Class

Download Link:

Wireshark_Troubleshooting_Network_Performance.part1.rar

Wireshark_Troubleshooting_Network_Performance.part2.rar

Wireshark_Troubleshooting_Network_Performance.part3.rar

Wireshark_Troubleshooting_Network_Performance.part4.rar

http://rapidshare.com/files/195342948/readme.zip