Showing posts with label network security. Show all posts
Showing posts with label network security. Show all posts

48% Off Discounts: Purchase Cheap CISSP All-in-One Exam Guide, Fifth Edition Review

CISSP All-in-One Exam Guide, Fifth Edition

Are you looking to buy CISSP All-in-One Exam Guide, Fifth Edition? here is the right place to find the great deals. we can offer discounts of up to 90% on CISSP All-in-One Exam Guide, Fifth Edition. check out the link below:

>> Click Here to See Compare Prices and Get the Lowest Price Offers

CISSP All-in-One Exam Guide, Fifth Edition Review

There is no simple formula to prepare for the CISSP certification, and no single resource which can guarantee success on the certification exam since every applicant's background is unique. However, this book (fifth edition) was my only resource in preparing for the exam and I passed on my first attempt (April 24, 2010).
I spent 60+ hours in preparation for the exam... that's 60+ hours of DEDICATED individual study using this book and CD, not 60+ hours spent web surfing during lunch hours or commercial breaks. My recent background is in middle management, with 20 years experience in network architecture and data security, so I already had a firm technical foundation for the test areas dealing with protocols and encryption variations. I also have an MS in Computer Science. Nonetheless, the exam was so broad, with topics covering general principles and concepts, that I could have prepared twice as long and still left the exam with questions about the outcome.
My personal opinion is that formal classroom instruction, through one of the many organizations offering CISSP preparation courses, is a worthwhile companion to Shon Harris' book. A study group is also a good idea. You will not obtain CISSP certification if you take the exam without preparation. This book (fifth edition) was sufficient, but not 100% comprehensive, to prepare me for passing the CISSP test.
Note: Some reviewers do not appreciate Shon's frequent analogies and humor. Most of her analogies helped me internalize the complex topics, but that's my personal learning style. The efforts at humor were generally awful, but every once in a while she was subtle and brilliant enough to make me laugh out loud. Working through Shon's unique writing style was not a problem for me... I actually found it refreshing.

CISSP All-in-One Exam Guide, Fifth Edition Overview



Want to learn more information about CISSP All-in-One Exam Guide, Fifth Edition?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

45% Off Discounts: Buy Cheap Metasploit: The Penetration Tester's Guide Review

Metasploit: The Penetration Tester's Guide

Are you looking to buy Metasploit: The Penetration Tester's Guide? here is the right place to find the great deals. we can offer discounts of up to 90% on Metasploit: The Penetration Tester's Guide. check out the link below:

>> Click Here to See Compare Prices and Get the Cheapest Deals

Metasploit: The Penetration Tester's Guide Review

I really enjoyed reading the Metasploit book. I would have to agree with one of the readers that most of the information can be found on the Metasploit Unleashed website. My only problem is that it did not push the envelope on the advance features of Metasploit. But over all this is still one hell of a book.

Metasploit: The Penetration Tester's Guide Overview

"The best guide to the Metasploit Framework." -HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.

Learn how to:

Find and exploit unmaintained, misconfigured, and unpatched systems
Perform reconnaissance and find valuable information about your target
Bypass anti-virus technologies and circumvent security controls
Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
Use the Meterpreter shell to launch further attacks from inside the network
Harness standalone Metasploit utilities, third-party tools, and plug-ins
Learn how to write your own Meterpreter post exploitation modules and scripts

You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.


Want to learn more information about Metasploit: The Penetration Tester's Guide?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

19% Off Discounts: Purchase Cheap Computer Networking: A Top-Down Approach (5th Edition) Review

Computer Networking: A Top-Down Approach (5th Edition)

Are you looking to buy Computer Networking: A Top-Down Approach (5th Edition)? here is the right place to find the great deals. we can offer discounts of up to 90% on Computer Networking: A Top-Down Approach (5th Edition). check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Computer Networking: A Top-Down Approach (5th Edition) Review

This review compares the following four books:
Computer Networks by Peterson and Davie (P & D)
Computer Networks by Tanenbaum
Computer Networks by Comer / Internetworking with TCP/IP
Computer Networking by Kurose and Ross (K & R)
By far the best book in the list is "Computer Networking" by Kurose and Ross. This book covers all of the essential material that is in the other books but manages to do so in a relevant and entertaining way. This book is very up to date as seen by the release of the 5th Ed when the 4th Ed is barely two years old. There are lots of practical exercises using wireshark and the companion website is actually useful and relevant. The attitude of this book with regard to teaching networking concepts could be summed up as "try it out and see for yourself". One interesting thing to note is that the socket programming example are all in Java.
Next up is the Peterson and Davie book which covers everything that Kurose and Ross discuss but is slightly more mathematical in how it goes about things. There are a lot more numerical examples and defining of formulas in this book which is fine by me and in no way detracts from the book. Also the socket programming examples are in C which is a little more traditional. The points where this text loses ground to K & R is that it doesn't have the practical application exercises that K & R has and it also doesn't extend the basic networking theory that is covered to modern protocols like K & R.
The two Comer books come next. Comer's "Computer Networks" book is probably the most introductory book out of this whole list and is more of a survey of networking topics that doesn't cover anything in any real depth. Still, this is an excellent book in that it is a quick clear read that is very lucid in its explanations and you can't help feeling that you understand everything that is covered in the book. Comer's TCP/IP book is the equivalent of the other authors' computer network books and in that respect it is pretty average. It covers all of the relevant material and in a manner which is more than readable but that is all. There is nothing exceptional about the book which stands out from the rest.
Last comes Tanenbaum's book from the author who is probably most famous for his OS books. This is probably the most technical and detailed of the books with lots of sample C code belying is experience with operating systems and their network stack code. The weak point of this book is that all of the code and technical minutia might prevent the reader from seeing the forest for the trees. Unless you are trying to learn how to program your own network stack for a Unix/Linux system, then I would get either the K & R book or the P & D book to learn networking for the first time. This book would best be served as a reference in which case the technical nature of the book becomes a benefit rather than detracting from the text.

Computer Networking: A Top-Down Approach (5th Edition) Overview

Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current and relevant networking technologies. Networking today involves much more than standards specifying message formats and protocol behaviors—and it is far more interesting. Professors Kurose and Ross focus on describing emerging principles in a lively and engaging manner and then illustrate these principles with examples drawn from Internet architecture.

Want to learn more information about Computer Networking: A Top-Down Approach (5th Edition)?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...