World of Books - Find your book here
The San Veneficio Canon
Michael CiscoMichael Cisco has created a city and a character that will live in the reader's imagination long after this book has been read.
The Narrator
Michael Cisco"Michael Cisco is of a different kind and league from almost anyone writing today, and "The Narrator" is Cisco at his startling best.
The Divinity Student and Others: Novels and Stories of ...
Michael CiscoFour novels and one short story collection from Michael Cisco all in a signed and limited boxed edition.
Celebrant
Michael CiscoThe latest novel from Michael Cisco (The Narrator, 2010, The Great Lover, 2011), Celebrant is the story of deKlend¿s search for the mystical city of Votu, where time runs backwards, deified robots arise naturally in the mountains like ...
The Tyrant
Michael Cisco"Michael Cisco's works immerse the reader in worlds that are not simply dreamlike in the quality of their imagination but somehow manage to capture and convey the power of the dream itself. The Tyrant is his masterpiece." -- Thomas Ligotti
Deploying Cisco Unified Contact Center Express
Michael HouTong Luo, CCIE# 6183Cisco and third-party tools such as CET, RTMT, LDAP Browser, and WinGrep. Written by Michael HouTong Luo, CCIE# 6183 (Routing/Switching and Collaboration), author of ""Deploying Cisco Unified Presence.""
The Complete Cisco VPN Configuration Guide
Richard DealThe Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, ...
John Chambers and the Cisco Way: Navigating Through Volatility
John K. WatersBeyond exploring his key business strategies and management philosophy at Cisco, this book chronicles Chambers' amazing journey from IBM salesman to Cisco CEO.
Cisco PIX Firewalls: Configure / Manage / Troubleshoot
Umer KhanCisco is poised to release the newest, completely re-designed version 7 of the Pix operating system in the first quarter of 2004 "Cisco Pix Firewalls: configure | manage | troubleshoot" Covers all objectives on the new Cisco Pix ...
Cisco Access Control Security: AAA Administrative Services
Brandon CarrollThe only guide to the CISCO Secure Access Control Server, this resource examines the concepts and configuration of the Cisco Secure ACS.
Network Security Assessment: From Vulnerability to Patch
Steve ManzuikConfigure, Manage, & Troubleshoot - Charles Riley, Umer Khan, Michael Sweeney Cisco PIX Cisco P.X Firewall is the world's most used network firewall, protecting internal - networks from unwanted intrusions and attacks. Virtual Private ...
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth FogieSee security. l AVAILABLE NOW Cisco PIX Firewalls: order 0 ' mum-rm m jyngrmmm Configure, Monoge, & Troubleshoot _ Charles Riley, Umer Khan, Michael Sweeney Cisco PIX Firewall is the world's most used network firewall, protecting ...
The Accidental Administrator: Cisco Router Step-By-Step ...
Don R. CrawleyEasily the most straightforward approach to learning how to configure a Cisco router, this book is filled with practical tips and secrets learned from years of Don s teaching and consulting on Cisco network devices.
CCSP Self-Study: Securing Cisco IOS Networks (SECUR)
John RolandAn authorized self-study guide based on the CCSP SECUR 642-501 exam from Cisco Systems, this book is a reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide ...
Cisco Router Firewall Security
Richard DealThis book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
CCENT Cisco Certified Entry Networking Technician Study ...
Matt WalkerThe Boson Network Simulator has a retail price of more than $179 Cisco's certification program has been consistently listed in the Top 10 Most Valuable IT Certifications by ComputerWorld and Certification Magazine
CCDA: Cisco Certified Design Associate Study Guide
Donald PorterWith full coverage of each Cisco exam objective, this study guide delivers what you need to know about network-layer addressing, filtering with access lists, using VLANs, and network sizing.
Secret Hours
Michael CiscoThis edition collects various horror and dark fantasy short stories, as well as several Lovecraftian and Cthulhu Mythos style stories inspired by H.P. Lovecraft.
The Great Lover
Michael CiscoAn undead man, who values libido and life, lives in the sewers and pines for Vera, a blind woman, while he helps a disgraced academic and serves as the mascot of a subway cult.
The Scarlet Letter
Michael Cisco- Concise critical excerpts provide a scholarly overview of each work. - The Story Behind the Story details the conditions under which the work was written.
Roadmap to Information Security: For IT and Infosec Managers
Michael E. WhitmanFor. Further. Reading. Firewall Fundamentals by Wes Noonan and Ido Dubrawsky, Cisco Press, 2006. The Best Damn Firewall Book Period, Second Edition, by Thomas W. Shinder, Syngress, 2008.
Glossator 8: Practice and Theory of the Commentary
Michael Cisco15 Terence Diggory uses Goodman's phrase “intimate community”, from the same essay, to describe the New York School as an avant- garde, though diverges from its efficacy by comparison with Jean- Luc Nancy's theory of the “ inoperative ...
Principles of Information Security
Michael E. WhitmanFirewall Fundamentals by Wes Noonan and Ido Dubrawsky. 2006. Cisco Press. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party ...
THE BFI COMPANION TO THE WESTERN
More editions1939/Fox/d Herbert Leeds/lp Lynn Bari, Cesar Romero • Cesar Romero/The Cisco Kid and the Lady/ 1940/ Fox/d Herbert Leeds/Ip George Montgomery □ Cesar Romero/Viva Cisco Kid/ 1 940/Fox/d Norman Foster/Ip Jean Rogers • Cesar ...
Configuring SonicWALL Firewalls
Dan BendellCharles Riley, Umer Khan, Michael Sweeney Cisco PIX Firewall is the world's most used network firewall, protecting internal networks from unwanted intrusions and attacks. Virtual Private Networks (VPNs) are the means by which authorized ...
Business Transformation Management Methodology
Lars Alexander GolleniaAXEL UHL (SAP AG), DOMINIC HOULDER (London Business School), DANIEL SCHMID (SAP AG) and MICHAEL VON DER HORST (Cisco Systems GmbH) 3.1 Overview This chapter presents how organizations or organizational units can ...
Cisco MDS 9396S 16G Multilayer Fabric Switch for IBM System ...
Megan GilgeThis IBM® Redbooks® Product Guide describes the Cisco MDS 9396S 16G Multilayer Fabric Switch for IBM System Storage®.
The Other Cisco Kid
Sam FosterA Western novel focusing on the adventures of a young Billy Baxter who encounters a range of dangerous situations which force him to grow up in order to save the woman he loves.
who called from an unknown number?