Sunday, November 27, 2011

A+, Network+, Security+ Exams in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

A+, Network+, Security+ Exams in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly)) Review



If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of specialization.

As with other O'Reilly Nutshell books for certification exams, A+, Network+ and Security + in a Nutshell follows a proven style and approach. It reviews all of the topics needed to master each exam in a remarkably concise format, with required knowledge boiled down to the core. Instead of plowing through 500 to 700 pages to prepare for each exam, this book covers each one in approximately 150 pages. And because the objectives for the three elective A+ exams are redundant, and the book covers them in one section.

The exams covered include:

  • A+ Essentials: Required for A+ 2006 certification
  • EXAM 220-602: For the A+ IT Technician specialization
  • EXAM 220-603: For the A+ Remote Support Technician specialization
  • EXAM 220-604: For the A+ IT Depot specialization
  • EXAM N10-003: For Network+ Certification
  • EXAM SYO-101: For Security+ Certification


Each exam is covered in three parts: Exam Overview, Study Guide and Prep and Practice. Plenty of detailed tables and screen shots are included, along with study notes and practice questions. Once you have completed the exams successfully, you will find this all-in-one book to be a valuable reference to core administration and security skills.


Wednesday, November 23, 2011

Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service Review



If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and tricks for tweaking and tuning Skype to make it do just what you want and more.

Millions of people (48 million and counting, in fact) have opted for Skype, which uses peer-to-peer (P2P) technology to turn any PC, Mac, or Pocket PC into a telephone. Skype offers free calls between computers and extremely cheap calls to "old-fashioned" phone numbers (landlines and mobile phones). The sound quality is excellent, and end-to-end encryption means the connection is private and secure.

But if you really know what you're doing, Skype can accomplish a whole lot more than that. Software developer and author Andrew Sheppard recently converted his entire house to Skype and uses it for all his personal and business calls, even when he's traveling. In Skype Hacks, he shows you how to do things with the technology that even the engineers at Skype probably never intended.

Skype Hacks shows you how to:

  • Get started with Skype
  • Figure out how much money you're saving and maximize your savings
  • Cut the ties to your old phone company
  • Optimize your Skype configuration
  • Integrate Skype with desktop tools like Microsoft Office and your web browser
  • Set up a Skype-based call center

The book offers ideas for creating and organizing a contacts list, using Skype to transfer files, taking advantage of chat and voicemail capabilities, turning a PDA into a mobile phone, and automating Skype for even greater efficiency. So whether you'd simply like to give Skype a trial run, you want new Skype ring tones and fun on-hold music, or you're considering wiring your home with Skype to get rid of "regular" phone service altogether, Skype Hacks is your ideal guide.


Sunday, November 20, 2011

Wireless - Webster's Specialty Crossword Puzzles

Wireless - Webster's Specialty Crossword Puzzles Review



If you enjoy crosswords, or need to learn more about the word "wireless", these crosswords are for you. Learning a subject can be difficult. To ease the pain, hints are provided at the bottom of each page, though these are selected to prevent an engineered solution to the puzzle. The clues in this book are used under license or with permission, used under "fair use" conditions, used in agreement with the original authors, or are in the public domain. Definitions of terms can be found at www.websters-online-dictionary.org. All entries marked [WP] are adapted from articles created by contributors to Wikipedia.org, the free encyclopedia under a copyleft GNU Free Documentation License (GFDL) based on the headword. Please note that these entries are not full articles. For the full article associated with a given Wikipedia headword, the reader can simply go to www.wikipedia.org or www.websters-online-dictionary.org and type in the name of the topic to better understand the context of the entry; passages attributed to Wikipedia are exempt from any compilation or other copyright held by this book and can be freely used under the GFDL found at www.wikipedia.org. The full GFDL is reproduced at the end of the book after the solutions, and applies to each Wikipedia headword. Enjoy!


Tuesday, November 15, 2011

Official (ISC)2® Guide to the ISSAP® CBK ((ISC)2 Press)

Official (ISC)2® Guide to the ISSAP® CBK ((ISC)2 Press) Review



Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC) Guide to the ISSAP® CBK® provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

  • Endorsed by the (ISC)
  • Follows the newly revised CISSP-ISSAP® CBK®
  • Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP® CBK®. Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.


Thursday, November 10, 2011

Security Issues in Wireless Technologies:: Bluetooth, MANET and WiMAX

Security Issues in Wireless Technologies:: Bluetooth, MANET and WiMAX Review



Due to the flexibility and mobility of wireless technologies; Bluetooth, Zig-bee, RFID, WiMAX etc. have become most commonly used medium of wireless communication. Although the demand of these technologies is rapidly increasing all over the world, very few of us are aware about the security issues related to them. A number of attacks is possible to make illegal access to our system if we do not know how to protect our system from intruders. This book focuses on security threats and countermeasures of Bluetooth, MANET and WiMAX. The readers will get to know about different types of attacks as well as preventive mechanisms. Some research questions are also identified that may be interesting to those who want to go for further study.


Monday, November 7, 2011

Complete Guide to Networking

Complete Guide to Networking Review



Peter Norton's Complete Guide to Networking discusses a variety of topics that are critical to successfully understanding and using a network system, including hardware, installation, configuration, administration. The book also addresses advanced maintenance and security topics. The topics are presented in an easy to understand fashion, offering specific solutions to various problems an administrator or user might encounter. The book provides concrete examples for a variety of common tasks or problems. Three popular network environments-Windows NT/2000, Unix/Linux and NetWare-receive primary focus in the book. The book also provides coverage of integrating multiple operating systems and establishing simple mini-LANs.


Saturday, November 5, 2011

Guide to Bluetooth security: recommendations of the National Institute of Standards and Technology

Guide to Bluetooth security: recommendations of the National Institute of Standards and Technology Review



Original publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] OCLC Number: (OCoLC)712603834 Subject: Bluetooth technology. Excerpt: ... UIDE TO LUETOOTH ECURITY G B S 3. Bluetooth Security Features This section provides an overview of the security mechanisms included in the Bluetooth specifications to illustrate their limitations and provide a foundation for some of the security recommendations in Section 4. A high-level example of the scope of the security for the Bluetooth radio path is depicted in Figure 3-1. In this example, Bluetooth security is provided only between the mobile phone and the laptop computer, while IEEE 802.11 security protects the wireless local area network link between the laptop and the IEEE 802.11 AP. However, the communications on the wired network are not protected by Bluetooth or IEEE 802.11 security capabilities. End-to-end security is not possible without using higher-layer security solutions in addition to the security features included in the Bluetooth specification and IEEE 802.11 standards. Figure 3-1. Bluetooth Air-Interface Security The following are the three basic security services specified in the Bluetooth standard:�Authentication: verifying the identity of communicating devices. User authentication is not provided natively by Bluetooth.�Confidentiality: preventing information compromise caused by eavesdropping by ensuring that only authorized devices can access and view data.�Authorization: allowing the control of resources by ensuring that a device is authorized to use a service before permitting it to do so. The three security services offered by Bluetooth and details about the modes of security are described below. Bluetooth does not address other security services such as audit and non-repudiation; if such services are needed, they must be provided through additional means. 3-1