World of Books - Find your book here

The San Veneficio Canon

The San Veneficio Canon

Michael Cisco

Michael Cisco has created a city and a character that will live in the reader's imagination long after this book has been read.
The Narrator

The Narrator

Michael Cisco

"Michael Cisco is of a different kind and league from almost anyone writing today, and "The Narrator" is Cisco at his startling best.
The Divinity Student and Others: Novels and Stories of ...

The Divinity Student and Others: Novels and Stories of ...

Michael Cisco

Four novels and one short story collection from Michael Cisco all in a signed and limited boxed edition.
Celebrant

Celebrant

Michael Cisco

The latest novel from Michael Cisco (The Narrator, 2010, The Great Lover, 2011), Celebrant is the story of deKlend¿s search for the mystical city of Votu, where time runs backwards, deified robots arise naturally in the mountains like ...
The Tyrant

The Tyrant

Michael Cisco

"Michael Cisco's works immerse the reader in worlds that are not simply dreamlike in the quality of their imagination but somehow manage to capture and convey the power of the dream itself. The Tyrant is his masterpiece." -- Thomas Ligotti
Deploying Cisco Unified Contact Center Express

Deploying Cisco Unified Contact Center Express

Michael HouTong Luo, CCIE# 6183

Cisco and third-party tools such as CET, RTMT, LDAP Browser, and WinGrep. Written by Michael HouTong Luo, CCIE# 6183 (Routing/Switching and Collaboration), author of ""Deploying Cisco Unified Presence.""
The Complete Cisco VPN Configuration Guide

The Complete Cisco VPN Configuration Guide

Richard Deal

The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, ...
John Chambers and the Cisco Way: Navigating Through Volatility

John Chambers and the Cisco Way: Navigating Through Volatility

John K. Waters

Beyond exploring his key business strategies and management philosophy at Cisco, this book chronicles Chambers' amazing journey from IBM salesman to Cisco CEO.
Cisco PIX Firewalls: Configure / Manage / Troubleshoot

Cisco PIX Firewalls: Configure / Manage / Troubleshoot

Umer Khan

Cisco is poised to release the newest, completely re-designed version 7 of the Pix operating system in the first quarter of 2004 "Cisco Pix Firewalls: configure | manage | troubleshoot" Covers all objectives on the new Cisco Pix ...
Cisco Access Control Security: AAA Administrative Services

Cisco Access Control Security: AAA Administrative Services

Brandon Carroll

The only guide to the CISCO Secure Access Control Server, this resource examines the concepts and configuration of the Cisco Secure ACS.
Network Security Assessment: From Vulnerability to Patch

Network Security Assessment: From Vulnerability to Patch

Steve Manzuik

Configure, Manage, & Troubleshoot - Charles Riley, Umer Khan, Michael Sweeney Cisco PIX Cisco P.X Firewall is the world's most used network firewall, protecting internal - networks from unwanted intrusions and attacks. Virtual Private ...
XSS Attacks: Cross Site Scripting Exploits and Defense

XSS Attacks: Cross Site Scripting Exploits and Defense

Seth Fogie

See security. l AVAILABLE NOW Cisco PIX Firewalls: order 0 ' mum-rm m jyngrmmm Configure, Monoge, & Troubleshoot _ Charles Riley, Umer Khan, Michael Sweeney Cisco PIX Firewall is the world's most used network firewall, protecting ...
The Accidental Administrator: Cisco Router Step-By-Step ...

The Accidental Administrator: Cisco Router Step-By-Step ...

Don R. Crawley

Easily the most straightforward approach to learning how to configure a Cisco router, this book is filled with practical tips and secrets learned from years of Don s teaching and consulting on Cisco network devices.
CCSP Self-Study: Securing Cisco IOS Networks (SECUR)

CCSP Self-Study: Securing Cisco IOS Networks (SECUR)

John Roland

An authorized self-study guide based on the CCSP SECUR 642-501 exam from Cisco Systems, this book is a reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide ...
Cisco Router Firewall Security

Cisco Router Firewall Security

Richard Deal

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
CCENT Cisco Certified Entry Networking Technician Study ...

CCENT Cisco Certified Entry Networking Technician Study ...

Matt Walker

The Boson Network Simulator has a retail price of more than $179 Cisco's certification program has been consistently listed in the Top 10 Most Valuable IT Certifications by ComputerWorld and Certification Magazine
CCDA: Cisco Certified Design Associate Study Guide

CCDA: Cisco Certified Design Associate Study Guide

Donald Porter

With full coverage of each Cisco exam objective, this study guide delivers what you need to know about network-layer addressing, filtering with access lists, using VLANs, and network sizing.
Secret Hours

Secret Hours

Michael Cisco

This edition collects various horror and dark fantasy short stories, as well as several Lovecraftian and Cthulhu Mythos style stories inspired by H.P. Lovecraft.
The Great Lover

The Great Lover

Michael Cisco

An undead man, who values libido and life, lives in the sewers and pines for Vera, a blind woman, while he helps a disgraced academic and serves as the mascot of a subway cult.
The Scarlet Letter

The Scarlet Letter

Michael Cisco

- Concise critical excerpts provide a scholarly overview of each work. - The Story Behind the Story details the conditions under which the work was written.
Roadmap to Information Security: For IT and Infosec Managers

Roadmap to Information Security: For IT and Infosec Managers

Michael E. Whitman

For. Further. Reading. Firewall Fundamentals by Wes Noonan and Ido Dubrawsky, Cisco Press, 2006. The Best Damn Firewall Book Period, Second Edition, by Thomas W. Shinder, Syngress, 2008.
Glossator 8: Practice and Theory of the Commentary

Glossator 8: Practice and Theory of the Commentary

Michael Cisco

15 Terence Diggory uses Goodman's phrase “intimate community”, from the same essay, to describe the New York School as an avant- garde, though diverges from its efficacy by comparison with Jean- Luc Nancy's theory of the “ inoperative ...
Principles of Information Security

Principles of Information Security

Michael E. Whitman

Firewall Fundamentals by Wes Noonan and Ido Dubrawsky. 2006. Cisco Press. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party ...
THE BFI COMPANION TO THE WESTERN

THE BFI COMPANION TO THE WESTERN

More editions

1939/Fox/d Herbert Leeds/lp Lynn Bari, Cesar Romero • Cesar Romero/The Cisco Kid and the Lady/ 1940/ Fox/d Herbert Leeds/Ip George Montgomery □ Cesar Romero/Viva Cisco Kid/ 1 940/Fox/d Norman Foster/Ip Jean Rogers • Cesar ...
Configuring SonicWALL Firewalls

Configuring SonicWALL Firewalls

Dan Bendell

Charles Riley, Umer Khan, Michael Sweeney Cisco PIX Firewall is the world's most used network firewall, protecting internal networks from unwanted intrusions and attacks. Virtual Private Networks (VPNs) are the means by which authorized  ...
Business Transformation Management Methodology

Business Transformation Management Methodology

Lars Alexander Gollenia

AXEL UHL (SAP AG), DOMINIC HOULDER (London Business School), DANIEL SCHMID (SAP AG) and MICHAEL VON DER HORST (Cisco Systems GmbH) 3.1 Overview This chapter presents how organizations or organizational units can ...
Cisco MDS 9396S 16G Multilayer Fabric Switch for IBM System ...

Cisco MDS 9396S 16G Multilayer Fabric Switch for IBM System ...

Megan Gilge

This IBM® Redbooks® Product Guide describes the Cisco MDS 9396S 16G Multilayer Fabric Switch for IBM System Storage®.
The Other Cisco Kid

The Other Cisco Kid

Sam Foster

A Western novel focusing on the adventures of a young Billy Baxter who encounters a range of dangerous situations which force him to grow up in order to save the woman he loves.

who called from an unknown number?