Friday, January 23, 2015

CCNA ICND1 ICND2 Todd Lamme Contents


Todd Lamme Contents

Chapter 1: Internetworking Chapters 1-14 map to the ICND1 exam. In Chapter 1, you
will learn the basics of the Open Systems Interconnection (OSI) model the way Cisco wants
you to learn it. There are written labs and plenty of review questions to help you. Do not
even think of skipping the fundamental written labs in this chapter!

Chapter 2: Ethernet Networking and Data Encapsulation This chapter will provide
you with the Ethernet foundation you need in order to pass both the CCENT and CCNA exams. Data encapsulation is discussed in detail in this chapter as well. And as with the
other chapters, this chapter includes written labs and review questions to help you.

Chapter 3: Introduction to TCP/IP This chapter provides you with the background necessary
for success on the exam, as well as in the real world with a thorough presentation of TCP/IP.
This in-depth chapter covers the very beginnings of the Internet Protocol stack and goes all
the way to IP addressing and understanding the difference between a network address and a
broadcast address before finally ending with network troubleshooting.

Chapter 4: Easy Subnetting You’ll actually be able to subnet a network in your head after
reading this chapter if you really want to! And you’ll find plenty of help in this chapter as
long as you don’t skip the written labs and review questions at the end.

Chapter 5: VLSMs, Summarization, and Troubleshooting TCP/IP Here, you’ll find out all
about variable length subnet masks (VLSMs) and how to design a network using VLSMs.
This chapter will finish with summarization techniques and configurations. As with Chapter
4, plenty of help is there for you if you don’t skip the written lab and review questions.

Chapter 6: Cisco’s Internetworking Operating System (IOS) This chapter introduces you to
the Cisco Internetworking Operating System (IOS) and command-line interface (CLI). In this
chapter you’ll learn how to turn on a router and configure the basics of the IOS, including
setting passwords, banners, and more. Hands-on labs will help you gain a firm grasp of the
concepts taught in the chapter. Before you go through the hands-on labs, be sure to complete
the written lab and review questions.

Chapter 7: Managing a Cisco Internetwork This chapter provides you with the management
skills needed to run a Cisco IOS network. Backing up and restoring the IOS, as well as router
configuration, are covered, as are the troubleshooting tools necessary to keep a network up
and running. As always, before tackling the hands-on labs in this chapter, complete the written
labs and review questions.

Chapter 8: IP Routing This is a fun chapter because we will begin to build our network,
add IP addresses, and route data between routers. You will also learn about static, default,
and dynamic routing using RIP and RIPv2. Hands-on labs, a written lab, and the review
questions will help you fully nail down IP routing.

Chapter 9: Open Shortest Path First (OSPF) Chapter 9 dives into more complex dynamic
routing by covering OSPF routing. The written lab, hands-on labs, and review questions
will help you master this vital routing protocol.

Chapter 10: Layer 2 Switching This chapter sets you up with the solid background you
need on layer 2 switching, how switches perform address learning and make forwarding
and filtering decisions. In addition, switch port security with MAC addresses is covered in
detail. As always, go through the hands-on labs, written lab, and review questions to make
sure you’ve really got layer 2 switching down!

Chapter 11: VLANs and Inter-VLAN Routing Here I cover virtual VLANs and how
to use them in your internetwork. This chapter covers the nitty-gritty of VLANs and
the different concepts and protocols used with VLANs. I’ll also guide you through troubleshooting techniques in this all-important chapter. The hands-on labs, written lab,
and review questions are there to reinforce the VLAN material.

Chapter 12: Security This chapter covers security and access lists, which are created on
routers to filter the network. IP standard, extended, and named access lists are covered in
detail. Written and hands-on labs, along with review questions, will help you study for the
security and access-list portion of the Cisco exams.

Chapter 13: Network Address Translation (NAT) New information, commands, troubleshooting,
and detailed hands-on labs will help you nail the NAT CCENT objectives.

Chapter 14: Internet Protocol Version 6 (IPv6) This is a fun chapter chock-full of some
great information. IPv6 is not the big, bad scary creature that most people think it is, and
it’s a really important objective on the latest exam, so study this chapter carefully—don’t
just skim it. And make sure you hit those hands-on labs hard!

Chapter 15: Enhanced Switched Technologies Chapter 15 is the first chapter of Part 2 of this
book, which maps to the ICND2 exam. This chapter will start off with STP protocols and
dive into the fundamentals, covering the modes, as well as the various flavors of STP. VLANs,
trunks, and troubleshooting are covered as well. EtherChannel technologies, configuration,
and verification are also covered. There are hands-on labs, a written lab, and plenty of review
questions to help you. Do not even think of skipping the fundamental written and hands-on
labs in this chapter!

Chapter 16: Managing Cisco Devices This chapter describes the boot process of Cisco
routers, the configuration register, and how to manage Cisco IOS files. The chapter finishes
with a section on Cisco’s new licensing strategy for IOS. Hands-on and written labs,
along with review questions, will help you build a strong foundation for the objectives
covered in this chapter.

Chapter 17: IP Services This chapter mostly focuses on first hop redundancy protocols
(FHRPs), such as HSRP and GLBP. Also covered are syslog, SNMP, and NetFlow. There
are review questions and a written lab.

Chapter 18: Troubleshooting IP, IPv6, and VLANs I want to say this is the most important
chapter in the book, but that’s hard to say. You can decide that yourself when you
take the exam! Be sure to go through all the troubleshooting steps for IP, IPv6, and
VLANs. The hands-on labs for this chapter will be included in the free bonus material
and dynamic labs that I’ll write and change as needed. Don’t skip the written lab and
review questions.

Chapter 19: Enhanced IGRP EIGRP was not covered in the ICND1 (CCENT) chapters,
so this is a full chapter on nothing but EIGRP and EIGRPv6. There are lots of examples,
including configuration, verification, and troubleshooting labs, with both IP and with IPv6.
Great hands-on labs are included, as well as a written lab and review questions.

Chapter 20: Multi-Area OSPF The ICND1 (CCENT) portion of this book had a large
chapter on OSPF, so before reading this chapter, be sure you have the CCENT objectives
down pat with a strong OSPF foundation. This chapter will take off where that ICND1 chapter left off and add multi-area networks along with advanced configurations and then
finish with OSPv3. Hands-on labs, a written lab, and challenging review questions await
you at the end of the chapter.

Chapter 21: Wide Area Networks This is the longest, and last, chapter in the book. It
covers multiple protocols in depth, especially HDLC, PPP, and Frame Relay, along with a
discussion on many other technologies. Good troubleshooting examples are provided in the
PPP and Frame Relay configuration sections, and these cannot be skipped! Hands-on labs
meant to focus squarely on the objectives are included at the end of the chapter, as well as
a written lab and challenging review questions.

Appendix A: Answers to Written Labs This appendix contains the answers to the book’s
written labs.
Appendix B: Answers to Chapter Review Questions This appendix provides the answers
to the end-of-chapter review questions.
Appendix C: Disabling and Configuring Network Services Appendix C takes a look at
the basic services you should disable on your routers to make your network less of a target
for denial of service (DoS) attacks and break-in attempts.
Appendix D: About the Additional Study Tools This describes the technical requirements
for the digital study tools that come with this book. (Those tools are described further in
the following section.)


Monday, September 30, 2013

Electrical Electronics

A
C
D
E
F
H
I
L
M
N
O
P
R
T
U

Saturday, August 24, 2013

CCNA CCNP CCIE Cisco Press E-Book

A
B
C
D
E
F
H
I
L
M
N
O
P
Q
R
S
T
V
W

Monday, June 17, 2013


Machine Learning for Hackers
Case Studies and Algorithms to Get You Started

Publisher: O'Reilly Media
Released: February 2012
Pages: 324

If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.
Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.
  • Develop a naïve Bayesian classifier to determine if an email is spam, based only on its text
  • Use linear regression to predict the number of page views for the top 1,000 websites
  • Learn optimization techniques by attempting to break a simple letter cipher
  • Compare and contrast U.S. Senators statistically, based on their voting records
  • Build a “whom to follow” recommendation system from Twitter data

  1. Chapter 1 Using R

    1. R for Machine Learning

  2. Chapter 2 Data Exploration

    1. Exploration versus Confirmation

    2. What Is Data?

    3. Inferring the Types of Columns in Your Data

    4. Inferring Meaning

    5. Numeric Summaries

    6. Means, Medians, and Modes

    7. Quantiles

    8. Standard Deviations and Variances

    9. Exploratory Data Visualization

    10. Visualizing the Relationships Between Columns

  3. Chapter 3 Classification: Spam Filtering

    1. This or That: Binary Classification

    2. Moving Gently into Conditional Probability

    3. Writing Our First Bayesian Spam Classifier

  4. Chapter 4 Ranking: Priority Inbox

    1. How Do You Sort Something When You Don’t Know the Order?

    2. Ordering Email Messages by Priority

    3. Writing a Priority Inbox

  5. Chapter 5 Regression: Predicting Page Views

    1. Introducing Regression

    2. Predicting Web Traffic

    3. Defining Correlation

  6. Chapter 6 Regularization: Text Regression

    1. Nonlinear Relationships Between Columns: Beyond Straight Lines

    2. Methods for Preventing Overfitting

    3. Text Regression

  7. Chapter 7 Optimization: Breaking Codes

    1. Introduction to Optimization

    2. Ridge Regression

    3. Code Breaking as Optimization

  8. Chapter 8 PCA: Building a Market Index

    1. Unsupervised Learning

  9. Chapter 9 MDS: Visually Exploring US Senator Similarity

    1. Clustering Based on Similarity

    2. How Do US Senators Cluster?

  10. Chapter 10 kNN: Recommendation Systems

    1. The k-Nearest Neighbors Algorithm

    2. R Package Installation Data

  11. Chapter 11 Analyzing Social Graphs

    1. Social Network Analysis

    2. Hacking Twitter Social Graph Data

    3. Analyzing Twitter Networks

  12. Chapter 12 Model Comparison

    1. SVMs: The Support Vector Machine

    2. Comparing Algorithms

  1. Works Citedbooks and publicationsbibliography ofresourcesbooks and publications; website resourcesstatisticsresources formachine learningresources forR programming languageresources for

  2. Colophon











    Title:
    Machine Learning for Hackers
    By:
    Drew Conway, John Myles White
    Publisher:
    O'Reilly Media
    Formats:
    Print:
    February 2012
    Ebook:
    February 2012
    Pages:
    324
    Print ISBN:
    978-1-4493-0371-6
    | ISBN 10:
    1-4493-0371-4
    Ebook ISBN:
    978-1-4493-0378-5
    | ISBN 10:
    1-4493-0378-1