rogue2shadow wrote: » I'll get to these eventually: Amazon.com: The Tao of Network Security Monitoring: Beyond Intrusion Detection (9780321246776): Richard Bejtlich: BooksAmazon.com: Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (978189393999: Laura Chappell, Gerald Combs: Books
Zartanasaurus wrote: » The Practice of System and Network Administration
RobertKaucher wrote: » This is a good book. Have you read his Time Management book?
EmpoweredBizTech wrote: » I would like to make a run For the MCITP: Virtualization Administrator as such my list is the following 1) Mastering Microsoft Virtualization 2) Mastering Virtual Machine Manager 2008 RS 3) Mastering Hyper-V Deployment 4) Sybex 70-652
EmpoweredBizTech wrote: » Ohh yea and I'm going to be taking VCP Classes over the summer this is very aggressive but we shall see.
ccnxjr wrote: » I need this oneAmazon.com: Network Administrators Survival Guide (978158705211: Anand Deveriya: Books Seems to give a high level overview of how to administer a growing network without requiring specialist knowledge or dumbing things down to the point where its just a jargon builder.
RobertKaucher wrote: » What's on your wish list of books to read in the next few months?SharePoint 2010 Developer's Certification: Certification Toolkit for Exams 70-573 and 70-576Automating SharePoint 2010 with Windows PowerShell 2.0Windows Sysinternals Administrator's Reference Those are mine. But no time...
MentholMoose wrote: » I think Mastering Microsoft Virtualization is really all you need for MCITP: VA (70-659/669/693). It's even enough for 70-403... SCVMM is just not that complicated so you can learn it well enough with that book and lab time.
RobertKaucher wrote: » Automating SharePoint 2010 with Windows PowerShell 2.0
Forsaken_GA wrote: » As far as the post goes... to be honest, I have so many 'to be read' books, it's not funny. I keep picking up new stuff before I finish the old stuff.
Anonymous got lucky. When five of its hackers attacked security company HBGary Federal on February 6, 2011, they were doing so in order to defend the group’s privacy. It wasn’t because they hoped to reveal plans to attack WikiLeaks, create surveillance cells targeting pro-union organizations, and sell sophisticated rootkits to the US government for use as offensive cyber weapons—but that’s what they found. In the weeks after the attack, the hackers released tens of thousands of e-mail messages and made headlines around the world. Aaron Bar, the CEO of HBGary Federal, eventually resigned; 12 Congressman called for an investigation; an ethics complaint was lodged against a major DC law firm involved with some of the more dubious plans. Join Ars' editors as they dig into the secret world of Anonymous and hackers for hire in Unmasked.