Business Data Networks and Security 11th Edition Panko Solutions Manual

$26.99$50.00 (-46%)

In stock

Business Data Networks and Security 11th Edition Panko Solutions Manual.

Download sample

Business Data Networks and Security 11th Edition Panko Solutions Manual

Product details:

  • ISBN-10 ‏ : ‎ 0134817125
  • ISBN-13 ‏ : ‎ 978-0134817125
  • Author: Ray Panko

With a clear writing style and a focus on contemporary technologies, Business Data Networks and Security guides readers through the details of networking, while effectively training them for the demands of the modern workplace. Authors Panko and Panko start with the basics –including the Internet, security, and network design – and move on to the latest in networking techniques and wireless networking, all while emphasizing security. The 11th Edition helps readers form a firm foundation, including sound job-related training, in the context of the latest updates and advances in the field.

Table contents:

  1. Chapter 1 Core Network Concepts and Terminology
  2. Learning Objectives
  3. A State of Siege1
  4. Anything, Anytime, Anywhere
  5. Test Your Understanding
  6. The Internet Reorganizes to Get Commercial
  7. Internet Service Providers
  8. Hosts
  9. E-Commerce
  10. Test Your Understanding
  11. Old Yet Always New
  12. No Longer New?
  13. Growing Speed
  14. Growing Ubiquity and Reliability
  15. The Emerging Internet of Everything
  16. Test Your Understanding
  17. Owning and Managing the Internet
  18. Test Your Understanding
  19. The Snake in the Garden
  20. Test Your Understanding
  21. Next Steps
  22. Test Your Understanding
  23. Outside the Internet
  24. Test Your Understanding
  25. Client and Server Hosts
  26. Client Hosts
  27. Server Hosts
  28. Test Your Understanding
  29. Networked Applications
  30. Test Your Understanding
  31. The Job of the Source Host
  32. Sending Short Application Messages
  33. The Final IP Packet
  34. Sending Long Application Messages
  35. Test Your Understanding
  36. The Job of the Destination Host
  37. Freeing the Application Program from Networking Details
  38. Test Your Understanding
  39. Inside the Internet
  40. The Main Characters: IP Addresses, Packets, Routers, Data Links, and Routes
  41. IP Addresses
  42. Binary to Decimal
  43. Decimal to Binary
  44. IP Version 6 Addresses
  45. Test Your Understanding
  46. IP Packets
  47. Test Your Understanding
  48. Routers
  49. Routing
  50. On Router B
  51. Test Your Understanding
  52. Data Links and Routes
  53. Test Your Understanding
  54. The Transport and Internet Processes in the Network Stack
  55. Test Your Understanding
  56. Supervisory Standards: Beyond TCP and IP
  57. Supervisory Protocols
  58. Test Your Understanding
  59. Dynamic Host Configuration Protocol (DHCP)
  60. Test Your Understanding
  61. Domain Name System (DNS)
  62. Test Your Understanding
  63. Single Networks, Data Links, and Physical Links
  64. Point-to-Point Single Networks
  65. Test Your Understanding
  66. Ethernet Single Networks
  67. Ethernet Frames and Data Links
  68. Ethernet Physical Links (versus PPP Physical Links)
  69. Test Your Understanding
  70. Frames and Packets
  71. Test Your Understanding
  72. Single Network Addresses
  73. Test Your Understanding
  74. Internet Routers and Personal Access Routers
  75. Internet Core Routers
  76. Residential Access Router
  77. Corporate Access Point
  78. Test Your Understanding
  79. Where to Next?
  80. End-of-Chapter Questions
  81. Thought Questions
  82. Perspective Questions
  83. Chapter 1a Hands-On: A Few Internet Tools
  84. Learning Objectives
  85. Hands-On Exercises
  86. Chapter 2 Network Standards
  87. Learning Objectives
  88. How Internet Standards Come to Be
  89. Introduction
  90. Standard = Protocol
  91. What Are Network Standards?
  92. The Importance of Standards
  93. Test Your Understanding
  94. Creating Standards
  95. Standards Agencies
  96. Test Your Understanding
  97. Standards Architectures
  98. Layering
  99. Specialization in Design
  100. Changing a Single Layer
  101. Test Your Understanding
  102. The OSI Standards Architecture
  103. The TCP/IP Standards Architecture
  104. When Do We Capitalize “Internet?”
  105. The Hybrid TCP/IP–OSI Standards Architecture
  106. Application Standards
  107. Test Your Understanding
  108. The Five Layers
  109. Test Your Understanding
  110. Repeated Concepts at Layers 2 and 3
  111. Packets Are Carried Inside Frames
  112. Test Your Understanding
  113. Message Ordering (Plus Reliability and Connection Orientation) in Standards
  114. Simple Message Ordering in HTTP
  115. Test Your Understanding
  116. Message Ordering and Reliability in TCP at the Transport Layer
  117. Connections
  118. TCP Segments
  119. The Three-Step Opening
  120. Control Segments
  121. Test Your Understanding
  122. Sequence Numbers
  123. Test Your Understanding
  124. Carrying Application Data
  125. Reliability
  126. Test Your Understanding
  127. The Four-Step Closing
  128. Test Your Understanding
  129. Message Syntax in Standards
  130. Syntax: General Message Organization
  131. Data Fields, Headers, and Trailers
  132. Fields
  133. Test Your Understanding
  134. The Syntax of the Internet Protocol (IP) Packet
  135. 32 Bits per Row
  136. Source and Destination IP Address Fields
  137. Unreliability
  138. A Connectionless Protocol
  139. Test Your Understanding
  140. Transmission Control Protocol (TCP) Segment Syntax
  141. Fields in TCP/IP Segments
  142. Flag Fields
  143. Sequence Numbers
  144. Acknowledgment Numbers
  145. Dual-Purpose Segments
  146. Test Your Understanding
  147. User Datagram Protocol (UDP) Datagram Syntax
  148. Test Your Understanding
  149. Port Numbers
  150. Server Port Numbers
  151. Client Port Numbers
  152. Sockets
  153. Test Your Understanding
  154. Frame Syntax
  155. Octets
  156. The Ethernet II Frame
  157. Test Your Understanding
  158. Encoding Application Messages into Binary
  159. Encoding
  160. Test Your Understanding
  161. Encoding Text as ASCII
  162. Test Your Understanding
  163. Converting Integers into Binary Numbers (1s and 0s)
  164. Encoding Small Decimal Integers to Binary Using Your Brain
  165. Encoding Decimal Integers to Binary Using a Computer
  166. Converting Binary to Decimal Using Your Brain
  167. Test Your Understanding
  168. Encoding Alternatives
  169. Test Your Understanding
  170. Protocols in this Chapter
  171. Test Your Understanding
  172. End-of-Chapter Questions
  173. Thought Questions
  174. Internet Research: April 1 RFCs
  175. Perspective Questions
  176. Chapter 3 Network Management
  177. Learning Objectives
  178. Introduction
  179. Network Quality of Service (QoS)
  180. Test Your Understanding
  181. Transmission Speed1
  182. Bits per second (bps)
  183. Application Requirements
  184. Test Your Understanding
  185. Rated Speed and Throughput
  186. Shared Speed: Aggregate and Individual Throughput
  187. Test Your Understanding
  188. Transmission Capacity on Multiplexed Transmission Links
  189. Why Multiplexing?
  190. The Downside of Sharing
  191. Test Your Understanding
  192. Other Quality-of-Service Metrics
  193. Availability
  194. Error Rates
  195. Latency
  196. Jitter
  197. Engineering for Latency and Jitter
  198. Test Your Understanding
  199. Service Level Agreements (SLAs)
  200. Worst-Case Specification
  201. Percentage-of-Time Elements
  202. Corporations versus Individuals
  203. Test Your Understanding
  204. Network Design
  205. Traffic Analysis
  206. Two-Site Analysis
  207. Three-Site Analysis
  208. Four-Site Analysis
  209. Test Your Understanding
  210. Reliability Through Redundancy
  211. Failed Transmission Line
  212. Adding Redundancy
  213. Test Your Understanding
  214. Traffic Requirements versus Leased Lines
  215. Test Your Understanding
  216. Momentary Traffic Peaks
  217. Adding More Capacity
  218. Priority
  219. Quality-of-Service Guarantees
  220. Traffic Shaping
  221. Test Your Understanding
  222. Centralized Network Management
  223. Ping
  224. Reachability
  225. Latency Problems
  226. Traceroute
  227. Test Your Understanding
  228. The Simple Network Management Protocol (SNMP)
  229. SNMP Agents
  230. SNMP Get Commands
  231. SNMP Management Information Base (MIB)
  232. SNMP Set Commands and Security
  233. SNMP Trap
  234. Network Visualization Program
  235. Test Your Understanding
  236. Automation
  237. Test Your Understanding
  238. Software-Defined Networking (SDN)
  239. Traditional Configuration and Its Discontents
  240. The Forwarding Function
  241. The Control Function
  242. Policy-Based Configuration
  243. Control Agility
  244. Software-Defined Networking Operation
  245. Test Your Understanding
  246. End-of-Chapter Questions
  247. Thought Questions
  248. Perspective Questions
  249. Chapter 3a Hands-On: Microsoft Office Visio
  250. Learning Objective
  251. What is Visio?
  252. Using Visio
  253. Hands-On Exercises
  254. Chapter 4 Network Security
  255. Learning Objectives
  256. The Target Breach
  257. The POS Attack
  258. Test Your Understanding
  259. Damages
  260. Test Your Understanding
  261. Perspective
  262. Introduction
  263. Test Your Understanding
  264. Types of Attacks
  265. Malware Attacks
  266. Test Your Understanding
  267. Vulnerabilities and Patches
  268. Test Your Understanding
  269. Social Engineering: No Vulnerability Necessary
  270. Test Your Understanding
  271. Types of Malware
  272. Viruses
  273. Worms
  274. Trojan Horses
  275. Test Your Understanding
  276. Payloads
  277. Erasing or Encrypting Your Hard Drive
  278. Turn Your Computer into a Spam or Pornography Server
  279. Spyware
  280. Credit Card Number Theft
  281. Identity Theft
  282. Test Your Understanding
  283. Human Break-Ins (Hacking)
  284. What Is Hacking?
  285. Test Your Understanding
  286. Denial-of-Service (DoS) Attacks
  287. Test Your Understanding
  288. Advanced Persistent Threats (APTs)
  289. Test Your Understanding
  290. Types of Attackers
  291. Cybercriminals
  292. Test Your Understanding
  293. Employees, Ex-Employees, and Other Insiders
  294. Test Your Understanding
  295. Business Competitors
  296. Test Your Understanding
  297. Cyberterrorists and National Governments
  298. Test Your Understanding
  299. Protecting Dialogues Cryptographically
  300. Encryption for Confidentiality
  301. Encryption for Confidentiality
  302. Keys
  303. Key Length
  304. Test Your Understanding
  305. Electronic Signatures: Message Authentication and Integrity
  306. Test Your Understanding
  307. Host-to-Host Virtual Private Networks (VPNs)
  308. Test Your Understanding
  309. Authentication
  310. Authentication Terminology and Concepts
  311. Test Your Understanding
  312. Reusable Passwords
  313. Ease of Use and Low Cost
  314. Picking Poor Passwords
  315. Traditional Advice on Reusable Passwords
  316. National Institute of Standards and Technology
  317. Ever-Smaller Scope of Usefulness
  318. Test Your Understanding
  319. Other Forms of Authentication
  320. Access Cards
  321. Biometrics
  322. Digital Certificate Authentication
  323. Two-Factor Authentication
  324. Test Your Understanding
  325. Firewalls and Intrusion Detection Systems
  326. Dropping and Logging Provable Attack Packets
  327. Test Your Understanding
  328. Stateful Packet Inspection (SPI) Firewalls
  329. Test Your Understanding
  330. Next-Generation (Application Aware) Firewalls (NGFWs)
  331. Test Your Understanding
  332. Intrusion Detection Systems (IDSs)
  333. False Positives (False Alarms)
  334. No Alternatives
  335. Test Your Understanding
  336. End-of-Chapter Questions
  337. Thought Questions
  338. Harder Thought Questions (You May Not Get These, but Try)
  339. Perspective Questions
  340. Chapter 5 Ethernet (802.3) Switched LANs
  341. Learning Objectives
  342. Ethernet Begins
  343. Introduction
  344. Local Area Networks
  345. Test Your Understanding
  346. Perspective: Layer 1 and Layer 2 Standards
  347. Test Your Understanding
  348. Basic Physical Layer Terminology
  349. Workgroup Switches and Core Switches
  350. Access Links and Trunk Links
  351. Test Your Understanding
  352. Ethernet Physical Layer Standards
  353. Test Your Understanding
  354. Signaling
  355. Bits and Signals
  356. Binary Signaling
  357. Digital Signaling
  358. Binary Is a Special Case of Digital
  359. Clock Cycles
  360. Test Your Understanding
  361. 4-Pair Unshielded Twisted Pair (UTP) Physical Links
  362. 4-Pair Unshielded Twisted Pair (UTP) Cables
  363. Parallel Transmission
  364. Radiative Attenuation
  365. Test Your Understanding
  366. Maximum Cord Distance
  367. The 10 Gbps Problem
  368. 2.5 Gbps and 5 Gbps for Wi-Fi Access Points
  369. Test Your Understanding
  370. Optical Fiber (Fiber)
  371. Test Your Understanding
  372. Multimode Fiber Propagation Limitations
  373. Test Your Understanding
  374. Maximum Optical Fiber Transmission Distances
  375. The Coming Explosion in Multimode Fiber Speed Standards
  376. Test Your Understanding
  377. Link Aggregation (Bonding)
  378. Test Your Understanding
  379. Perspective on Purchasing Physical Links in Ethernet
  380. Test Your Understanding
  381. The Ethernet Data Link Layer Switching and Frame Syntax Standard
  382. Physical Link and Data Link Length Restrictions
  383. Switches versus Transmission Lines
  384. Test Your Understanding
  385. Ethernet Data Link Layer Switch Operation
  386. Frame Forwarding
  387. Test Your Understanding
  388. Hierarchical Switch Organization
  389. Test Your Understanding
  390. Core Fields in the Ethernet Frame
  391. Test Your Understanding
  392. Management
  393. SNMP
  394. Test Your Understanding
  395. Reliability
  396. Test Your Understanding
  397. Ethernet Security
  398. Ethernet Security in Perspective
  399. Virtual LANs (VLANs) for Network Segregation
  400. Test Your Understanding
  401. Initial User Authentication Through 802.1X
  402. Test Your Understanding
  403. 802.1AE Switch-to-Switch Protection
  404. Test Your Understanding
  405. ARP Cache Poisoning
  406. Test Your Understanding
  407. End-of-Chapter Questions
  408. Thought Questions
  409. Design Questions
  410. Troubleshooting Question
  411. Perspective Questions
  412. Chapter 5a Hands-On: Cutting and Connectorizing UTP1
  413. Learning Objectives
  414. Introduction
  415. Solid and Stranded Wiring
  416. Solid-Wire UTP versus Stranded-Wire UTP
  417. Relative Advantages
  418. Adding Connectors
  419. Cutting the Cord
  420. Stripping the Cord
  421. Working with the Exposed Pairs
  422. Pair Colors
  423. Untwisting the Pairs
  424. Ordering the Pairs
  425. Cutting the Wires
  426. Adding the Connector
  427. Holding the Connector
  428. Sliding in the Wires
  429. Some Jacket Inside the Connector
  430. Crimping
  431. Pressing Down
  432. Making Electrical Contact
  433. Strain Relief
  434. Testing
  435. Testing with Continuity Testers
  436. Testing for Signal Quality
  437. Test Your Understanding
  438. Chapter 6 Wireless LANs I
  439. Learning Objectives
  440. Introduction
  441. OSI Standards
  442. Test Your Understanding
  443. 802.11 = Wi-Fi
  444. 802.11
  445. Wi-Fi
  446. Test Your Understanding
  447. Basic Access Point Operation
  448. Test Your Understanding
  449. Radio Signal Propagation
  450. Perfidious Radio
  451. Test Your Understanding
  452. Frequencies
  453. Test Your Understanding
  454. Antennas
  455. Test Your Understanding
  456. Wireless Propagation Problems
  457. Inverse Square Law Attenuation
  458. Absorptive Attenuation
  459. Dead Zones
  460. Multipath Interference
  461. Electromagnetic Interference (EMI)
  462. Frequency-Dependent Propagation Problems
  463. Test Your Understanding
  464. Service Bands and Bandwidth
  465. Service Bands
  466. The Frequency Spectrum
  467. Service Bands
  468. Channels
  469. Test Your Understanding
  470. Signal and Channel Bandwidth
  471. Test Your Understanding
  472. Licensed and Unlicensed Service Bands
  473. Licensed Service Bands
  474. Unlicensed Service Bands
  475. Test Your Understanding
  476. Channel Use and Co-Channel Interference
  477. Test Your Understanding
  478. The 2.4 GHz and 5 GHz Unlicensed Service Bands
  479. The 2.4 GHz Unlicensed Service Band
  480. The 5 GHz Service Band
  481. Test Your Understanding
  482. Spread Spectrum Transmission
  483. Normal versus Spread Spectrum Transmission
  484. Test Your Understanding
  485. Orthogonal Frequency Division Multiplexing (OFDM) Spread Spectrum Transmission
  486. Test Your Understanding
  487. 802.11 WLAN Operation
  488. From 802.11 to 802.3
  489. Test Your Understanding
  490. Wireless Networks with Multiple Access Points
  491. Test Your Understanding
  492. Media Access Control
  493. Test Your Understanding
  494. 802.11 Transmission Standards
  495. Channel Bandwidth and Service Band Bandwidth
  496. Test Your Understanding
  497. Speed and Market Status
  498. Test Your Understanding
  499. Your Service Speed Will Vary. A Lot
  500. Test Your Understanding
  501. Multiple Input/Multiple Output (MIMO)
  502. Test Your Understanding
  503. Beamforming and Multiuser MIMO
  504. Test Your Understanding
  505. End-of-Chapter Questions
  506. Thought Questions
  507. Troubleshooting Question
  508. Hands On
  509. Perspective Questions
  510. Chapter 6a Hands-On: Using Xirrus Wi-Fi Inspector
  511. Learning Objectives
  512. Introduction
  513. The Four Windows
  514. The Radar Window (Read the Fine Print)
  515. Relative Direction (Meaningless)
  516. Distance From the Center (Signal Strength)
  517. Measuring Signal Strength
  518. Expanding the Radar Window
  519. Connection Window
  520. The Networks Window
  521. Signal History
  522. Other Groups on the Ribbon
  523. Help Group
  524. Settings Group
  525. Tests Group
  526. Tests
  527. Connection Test
  528. Speed Test
  529. Quality Test
  530. Hands-On Exercises
  531. Questions
  532. Activity
  533. Chapter 7 Wireless LANs II
  534. Learning Objectives
  535. Child’s Play1
  536. Test Your Understanding
  537. 802.11i WLAN Security
  538. 802.11i
  539. Test Your Understanding
  540. 802.11i Stages
  541. Test Your Understanding
  542. Pre-Shared Key (PSK) Initial Authentication Mode in 802.11i
  543. Pre-Shared Session Keys
  544. Unshared Pairwise Session Keys
  545. Security Threats in 802.11i PSK Mode
  546. Test Your Understanding
  547. 802.1X Initial Authentication Mode Operation
  548. The Elements of 802.1X Initial Authentication Mode
  549. The 802.1X Authentication Process
  550. Test Your Understanding
  551. Beyond 802.11i Security
  552. Rogue Access Points
  553. Test Your Understanding
  554. Evil Twin Access Points and Virtual Private Networks (VPNs)
  555. Evil Twin Access Points
  556. Normal Operation
  557. Using a VPN to Defeat Evil Twins
  558. Test Your Understanding
  559. 802.11 Wi-Fi Wireless LAN Management
  560. Access Point Placement
  561. Initial Planning
  562. Installation and Initial Site Surveys
  563. Ongoing Site Surveys
  564. Test Your Understanding
  565. Centralized Management
  566. Test Your Understanding
  567. Peer-to-Peer Protocols for The Internet of Things (IoT)
  568. Bluetooth
  569. Classic Bluetooth and Bluetooth Low Energy (LE)
  570. Classic Bluetooth
  571. Bluetooth Low Energy
  572. Dual-Mode and Single-Mode Device
  573. Test Your Understanding
  574. One-to-One, Master–Slave Operation
  575. One-to-One Connections
  576. Master–Slave Control
  577. Multiple Slaves and Masters
  578. Test Your Understanding
  579. Bluetooth Profiles
  580. Test Your Understanding
  581. Bluetooth Low Energy
  582. Advertisements and Connections
  583. Beacons
  584. Profiles
  585. Test Your Understanding
  586. Other Promising IoT Transmission Standards
  587. Near Field Communication (NFC)
  588. Test Your Understanding
  589. Wi-Fi Direct
  590. Test Your Understanding
  591. Zigbee and Z-Wave
  592. Zigbee Controller (and Often Gateway)
  593. Zigbee End Devices
  594. Zigbee Routers
  595. Dual-Band Use in Zigbee
  596. Z-Wave
  597. Test Your Understanding
  598. Security in the Internet of Things
  599. Test Your Understanding
  600. End-of-Chapter Questions
  601. Thought Questions
  602. Perspective Questions
  603. Chapter 8 TCP/IP Internetworking I
  604. Learning Objectives
  605. Introduction
  606. Test Your Understanding
  607. IP Routing
  608. Test Your Understanding
  609. Hierarchical IPv4 Addressing
  610. Single Networks versus “Networks” on the Internet
  611. Hierarchical Addressing
  612. Network Part
  613. Subnet Part
  614. Host Part
  615. Variable Part Lengths
  616. Hierarchical IPv6 Address
  617. Test Your Understanding
  618. Routers, Networks, and Subnets
  619. Border Routers Connect Different Networks
  620. Internal Routers Connect Different Subnets
  621. Test Your Understanding
  622. Network and Subnet Masks
  623. 32-Bit Strings
  624. Prefix Notation for Masks
  625. Masking IPv4 Addresses
  626. Network Masks
  627. Subnet Masks
  628. Test Your Understanding
  629. How Routers Process Packets
  630. Switching versus Routing
  631. Test Your Understanding
  632. Routing Table
  633. Rows Are Routes for All IPv4 Addresses in a Range
  634. Test Your Understanding
  635. Step 1: Finding All Row Matches
  636. Row Number Column
  637. Row Matches
  638. Mask and Compare
  639. The Default Row
  640. The Need to Look at All Rows
  641. Test Your Understanding
  642. Step 2: Selecting the Best-Match Row
  643. List of Matching Rows
  644. Basic Rule (Always Used): Longest Match
  645. Tie-Breaker Rule (Only When Needed): Best Metric Value
  646. Test Your Understanding
  647. Step 3: Sending the Packet Back Out
  648. Interface
  649. Next-Hop Router
  650. Test Your Understanding
  651. Cheating (Decision Caching)
  652. Test Your Understanding
  653. Routing Tables for IPv6 Addresses
  654. The Internet Protocol Version 4 (IPv4) Fields
  655. The First Row
  656. Test Your Understanding
  657. The Second Row
  658. Test Your Understanding
  659. The Third Row
  660. IP Time to Live (TTL) Field
  661. IP Protocol Field
  662. Test Your Understanding
  663. IP Options
  664. Test Your Understanding
  665. IP Version 6 (IPv6)
  666. Outgrowing IPv4
  667. Test Your Understanding
  668. IPv6
  669. Test Your Understanding
  670. Writing IPv6 Addresses in Canonical Text Notation (RFC 5952)
  671. Step 1: Convert to Hexadecimal Notation
  672. Step 2: Remove Leading Zeroes from Segments
  673. Step 3: Reducing Multiple Single-Zero Fields
  674. Test Your Understanding
  675. The IPv6 Main Header
  676. Version Number Field
  677. Traffic Class and Flow Label Fields
  678. Payload Length
  679. Hop Limit Field
  680. No Checksum Field?
  681. Test Your Understanding
  682. Extension Headers
  683. Main Header and Extension Header
  684. Next Header Field
  685. Test Your Understanding
  686. The Transmission Control Protocol (TCP)
  687. Fields in TCP/IP Segments
  688. Sequence Numbers
  689. Acknowledgment Numbers
  690. Flag Fields
  691. Options Fields
  692. Test Your Understanding
  693. Openings and Abrupt TCP Closes
  694. Test Your Understanding
  695. The Limited Maximum Length of User Datagram Protocol (UDP) Datagrams
  696. Test Your Understanding
  697. End-of-Chapter Questions
  698. Thought Questions
  699. Perspective Questions
  700. Chapter 8a Hands-On: Wireshark Packet Capture
  701. Learning Objectives
  702. Introduction
  703. Getting Wireshark
  704. Using Wireshark
  705. Getting Started
  706. Starting a Packet Capture
  707. Getting Data
  708. Stopping Data Collection
  709. Looking at Individual Packets
  710. Packet Summary Window
  711. Window with Detailed Information on the Selected Packet
  712. Hex Window
  713. Options
  714. Hands-On Exercises
  715. Chapter 9 TCP/IP Internetworking II
  716. Learning Objectives
  717. Introduction
  718. IP Subnetting
  719. IPv4 Subnet Planning
  720. The N = 2b-2 Rule
  721. Balancing Subnet and Host Part Sizes
  722. Test Your Understanding
  723. IPv6 Subnetting
  724. The Three Parts
  725. The Fixed-Length 64-Bit Interface ID
  726. Routing Prefix and Subnet ID
  727. Creating the 64-Bit Interface ID
  728. Canonical Text Representation and Modified EUI-64 Addresses
  729. Test Your Understanding
  730. Other TCP/IP Standards
  731. Network Address Translation (NAT)
  732. NAT Operation
  733. NAT and Security
  734. Expanding the Effective Number of IP Addresses
  735. Using Private IP Addresses
  736. Transparency and Problems
  737. Test Your Understanding
  738. The Domain Name System (DNS)
  739. IP Address Lookup
  740. Test Your Understanding
  741. What Are Domains?
  742. Root
  743. Top-Level Domains
  744. Second-Level Domains
  745. Lower-Level Domains
  746. Test Your Understanding
  747. Domain Records
  748. Test Your Understanding
  749. DHCP Servers
  750. Up-to-Date Configuration Information
  751. Test Your Understanding
  752. Simple Network Management Protocol (SNMP)
  753. The Management Information Base (MIB)
  754. SNMP Set Security
  755. Test Your Understanding
  756. Dynamic Routing Protocols
  757. Interior Dynamic Protocols: OSPF and EIGRP
  758. Exterior Dynamic Protocol: BGP
  759. Test Your Understanding
  760. Internet Control Message Protocol (ICMP) for Supervisory Messages at the Internet Layer
  761. Supervisory Messages at the Internet Layer
  762. Error Advisement
  763. Echo (Ping)
  764. Test Your Understanding
  765. IPsec
  766. Core IPsec Principles
  767. Encapsulating Security Payload (ESP) and Authentication Header (AH)
  768. ESP Transport and Tunnel Modes
  769. Test Your Understanding
  770. VPNs
  771. IPsec Gateways
  772. Test Your Understanding
  773. Applying ESP Protections
  774. ESP in Transport Mode
  775. ESP Additions in Tunnel Mode
  776. ESP Additions in IPv6
  777. Test Your Understanding
  778. Security Associations (SAs)
  779. Methods and Options
  780. Security Associations
  781. Security Associations Can Be Asymmetric
  782. Test Your Understanding
  783. Creating Security Associations
  784. Weak Methods and Options in Security Associations
  785. Test Your Understanding
  786. SSL / TLS VPNs
  787. Test Your Understanding
  788. End-of-Chapter Questions
  789. Thought Questions
  790. Troubleshooting Question
  791. Hands-On Project
  792. Perspective Questions
  793. Chapter 9a Cisco’s IOS Command Line Interface (CLI)
  794. Command Line Interfaces (CLIs)
  795. Test Your Understanding
  796. CLI Essentials
  797. Command Modes
  798. Test Your Understanding
  799. A More Complex Cisco IOS Interaction
  800. Test Your Understanding
  801. Activity
  802. Chapter 10 Carrier Wide Area Networks (WANs)
  803. Learning Objectives
  804. LANs and WANs (and MANs)
  805. LANs versus MANs and WANs
  806. On and Off the Customer Premises
  807. Economics
  808. Technologies
  809. Test Your Understanding
  810. Other Aspects of WANs
  811. Metropolitan Area Networks (MANs)
  812. Single Networks versus Internets
  813. Test Your Understanding
  814. Carrier WAN Components and Business Uses
  815. Test Your Understanding
  816. The Telephone System
  817. Test Your Understanding
  818. Residential Wired Internet Access
  819. Residential Asymmetric Digital Subscriber Line (ADSL) Service
  820. Digital Subscriber Lines
  821. Residential Customer Equipment and Service
  822. Carrier End Office Equipment
  823. Fiber to the Home (FTTH)
  824. Test Your Understanding
  825. Cable Modem Service
  826. Telephone Service and Cable TV
  827. Cable Modem Service
  828. Test Your Understanding
  829. ADSL versus Cable Modem Service
  830. Test Your Understanding
  831. Cellular Data Service
  832. Cellular Service
  833. Cells and Cellsites
  834. Mobile Telephone Switching Office (MTSO)
  835. Cellsite
  836. Handoffs
  837. Test Your Understanding
  838. Why Cells?
  839. Test Your Understanding
  840. Cellular Data Speeds
  841. Test Your Understanding
  842. Cellular Generations: 3G, 4G, and 5G
  843. Test Your Understanding
  844. Wired Business WANs
  845. Leased Lines
  846. Test Your Understanding
  847. Reaching the ISP via a Leased Line
  848. Test Your Understanding
  849. Leased Line Private Corporate WANs
  850. Applying Figure 10-14
  851. Managing the WAN
  852. Test Your Understanding
  853. Carrier WAN Services
  854. Carrier Ethernet
  855. Test Your Understanding
  856. Multiprotocol Label Switching (MPLS)
  857. Making Routing More Efficient
  858. Operation
  859. Benefits
  860. Carrier MPLS
  861. An Expensive Service
  862. Extendibility
  863. Test Your Understanding
  864. WAN Optimization
  865. Compression
  866. Caching
  867. Traffic Shaping
  868. Application and Network Protocol Acceleration (Tuning)
  869. Test Your Understanding
  870. End-of-Chapter Questions
  871. Thought Questions
  872. Hands-On
  873. Perspective Questions
  874. Chapter 11 Networked Applications
  875. Learning Objectives
  876. Introduction
  877. Networked Applications and Application Architectures
  878. Programming Networked Applications
  879. Changing Server Locations
  880. Test Your Understanding
  881. Application Security
  882. Cross-Site Scripting (XSS)
  883. Test Your Understanding
  884. Netflix Dives into the Amazon1
  885. Netflix
  886. Requirements
  887. Server Outsourcing
  888. Content Delivery
  889. Test Your Understanding
  890. Virtualization and Agility
  891. Test Your Understanding
  892. Infrastructure as a Service (IaaS) and Software as a Service (SaaS)
  893. Infrastructure as a Service
  894. Software as a Service
  895. “As a Product” versus “As a Service”
  896. Test Your Understanding
  897. Clients Move into the Cloud
  898. Test Your Understanding
  899. Rain Clouds: Security
  900. Test Your Understanding
  901. Networks and The Cloud
  902. Test Your Understanding
  903. The World Wide Web
  904. HTTP and HTML Standards
  905. Test Your Understanding
  906. Complex Webpages
  907. Test Your Understanding
  908. The Hypertext Transfer Protocol (HTTP)
  909. HTTP Request Messages
  910. HTTP Response Message
  911. Test Your Understanding
  912. Electronic Mail (E-Mail)
  913. Delivery Standards
  914. The Delivery Process
  915. Transmission to the Sender’s Mail Host Using the Simple Mail Transfer Protocol (SMTP)
  916. Web Mail and HTTP
  917. SMTP between Mail Hosts
  918. Immediate Delivery
  919. Test Your Understanding
  920. Receiving Standards
  921. Test Your Understanding
  922. E-Mail File Format Standards
  923. ASCII and Searchable Header Fields
  924. Graphics in E-Mail Messages
  925. UNICODE
  926. Test Your Understanding
  927. Cryptographic E-Mail Protections
  928. Link Encryption
  929. End-to-End Encryption
  930. File Encryption on Mail Hosts and Clients
  931. Internal versus External Transmission
  932. Test Your Understanding
  933. Voice Over IP (VoIP)
  934. Test Your Understanding
  935. CODEC
  936. Test Your Understanding
  937. External Components
  938. Test Your Understanding
  939. VoIP Signaling
  940. Test Your Understanding
  941. The VoIP Transport Packet
  942. VoIP Transport Packets
  943. UDP with RTP at the Transport Layer
  944. Test Your Understanding
  945. Peer-to-Peer (P2P) Applications
  946. Test Your Understanding
  947. Skype
  948. Test Your Understanding
  949. Tor
  950. Tor Routing
  951. Anonymity, not Confidentiality
  952. What Does the Exit Node Know?
  953. Test Your Understanding
  954. End-of-Chapter Questions
  955. Thought Questions
  956. Appendix Managing the Security Process
  957. Learning Objectives
  958. Failures in the Target Breach
  959. The Plan–Protect–Respond Cycle
  960. Security Planning Principles
  961. Risk Analysis
  962. A Risk Analysis Example
  963. Countermeasure A
  964. Countermeasure B
  965. The Decision
  966. Countermeasure Costs
  967. Test Your Understanding
  968. Comprehensive Security
  969. Test Your Understanding
  970. Defense in Depth and Weakest Links
  971. Defense in Depth
  972. Identify and Manage Weakest Links
  973. Defense in Depth versus Identifying and Managing Weakest Links
  974. Test Your Understanding
  975. Identify and Manage Single Points of Takeover
  976. Test Your Understanding
  977. Least Permissions
  978. Authorizations
  979. Authorizations (Permissions)
  980. Authorizations and Authentication Servers
  981. Least Permissions
  982. Example of Least Permissions
  983. Test Your Understanding
  984. Identity Management
  985. Identity Management Mandates in Compliance Regulation
  986. Directory Servers
  987. Role-Based Access Control
  988. Test Your Understanding
  989. Segment the Network
  990. Test Your Understanding
  991. Organizational System Security
  992. Goals
  993. People and Training
  994. Procedures, Processes, and the Separation of Duties
  995. Organizational Structure and Roles
  996. Policies, Priorities, and Culture
  997. Communication
  998. Active Management
  999. Test Your Understanding
  1000. Policy-Based Security Management
  1001. Policies versus Implementation
  1002. Policies (What to Do)
  1003. Implementation (How to Do It)
  1004. Test Your Understanding
  1005. Oversight
  1006. Audits
  1007. Reading Log Files
  1008. Vulnerability Testing
  1009. Test Your Understanding
  1010. Implementation Guidance
  1011. Standards
  1012. Guidelines
  1013. But Considering Guidelines Is Mandatory
  1014. Test Your Understanding
  1015. Policy-Based Centralized Management
  1016. Test Your Understanding
  1017. Response
  1018. Test Your Understanding
  1019. Normal Incidents
  1020. Test Your Understanding
  1021. Major Incidents
  1022. Test Your Understanding
  1023. Rehearsing for Major Incidents
  1024. Desktop Exercises
  1025. Live Exercises
  1026. Test Your Understanding
  1027. Real-Time Fail-Over
  1028. Test Your Understanding
  1029. Intrusion Detection Systems (IDSs)
  1030. Intrusion Detection Systems
  1031. The Problem of Vigilance
  1032. Log Files
  1033. Distributed and Integrated Log Files
  1034. Alarms
  1035. Querying the Integrated Log File
  1036. Test Your Understanding
  1037. Some Final Pictures
  1038. End-of-Chapter Questions
  1039. Thought Questions
  1040. Log File Analysis Questions
  1041. Perspective Questions
  1042. Glossary
  1043. Index

People also search:

business data networks and security 11th edition pdf

business data networks and security 11th edition

business data networks and security (11th edition) pdf reddit

business data networks and security 11th edition free pdf

business data networks and security pdf

Instant download after Payment is complete

Main Menu