Archive for November 2017

Ebook Download CCNA Security Official Exam Certification Guide (Exam 640-553)

Ebook Download CCNA Security Official Exam Certification Guide (Exam 640-553)

As known, we are the most effective publication website that constantly detail lots of points of books from various nations. Certainly, you could discover as well as take pleasure in searching the title by search from the country and also various other nations on the planet. It implies that you can think about many points while locate the interesting book to check out. Connected to the CCNA Security Official Exam Certification Guide (Exam 640-553) that we conquer now, we are not question any more. Lots of people have actually shown it; prove that this book offers good impacts for you.

CCNA Security Official Exam Certification Guide (Exam 640-553)

CCNA Security Official Exam Certification Guide (Exam 640-553)


CCNA Security Official Exam Certification Guide (Exam 640-553)


Ebook Download CCNA Security Official Exam Certification Guide (Exam 640-553)

CCNA Security Official Exam Certification Guide (Exam 640-553) As a matter of fact, publication is actually a window to the world. Even many people could not such as reading publications; the books will always give the exact information concerning reality, fiction, experience, journey, politic, religion, and also much more. We are right here a website that provides collections of publications more than guide store. Why? We offer you great deals of numbers of link to obtain guide CCNA Security Official Exam Certification Guide (Exam 640-553) On is as you require this CCNA Security Official Exam Certification Guide (Exam 640-553) You could discover this book easily here.

Why should be CCNA Security Official Exam Certification Guide (Exam 640-553) in this site? Obtain much more earnings as just what we have told you. You can locate the various other eases besides the previous one. Alleviate of obtaining the book CCNA Security Official Exam Certification Guide (Exam 640-553) as what you desire is additionally given. Why? We offer you numerous sort of guides that will certainly not make you feel weary. You could download them in the link that we offer. By downloading CCNA Security Official Exam Certification Guide (Exam 640-553), you have actually taken the proper way to pick the convenience one, compared to the inconvenience one.

We have hundreds lists of guide titles that can be your guidance in discovering the right publication. Searching by the title will certainly make you less complicated to obtain what book that you actually want. Yeah, it's because so many publications are given in this website. We will certainly show you how kind of CCNA Security Official Exam Certification Guide (Exam 640-553) is felt bitter. You may have searched for this publication in many places. Have you discovered it? It's better for you to seek this publication as well as various other collections by below. It will reduce you to locate.

After obtaining the data of the CCNA Security Official Exam Certification Guide (Exam 640-553), you should recognize ways to handle your time to check out. Obviously, lots of people will certainly have various ways to organize the moment. You could use it in your extra time in the house, at the workplace, or at the evening prior to sleeping. Guide file can be likewise stored as one of today analysis material

CCNA Security Official Exam Certification Guide (Exam 640-553)

About the Author

Michael Watkins, CCNA/CCNP/CCVP/CCSP, is a full-time senior technical instructor with SkillSoft Corporation. With 13 years of network management, training, and consulting experience, he has worked with organizations such as Kraft Foods, Johnson and Johnson, Raytheon, and the U.S. Air Force to help them implement and learn about the latest network technologies. In addition to holding more than 20 industry certifications in the areas of networking and programming technologies, he holds a bachelor of arts degree from Wabash College.   Kevin Wallace, CCIE No. 7945, is a certified Cisco instructor working full time for SkillSoft, where he teaches courses in the Cisco CCSP, CCVP, and CCNP tracks. With 19 years of Cisco networking experience, he has been a network design specialist for the Walt Disney World Resort and a network manager for Eastern Kentucky University. He holds a bachelor of science degree in electrical engineering from the University of Kentucky. He is also a CCVP, CCSP, CCNP, and CCDP, with multiple Cisco security and IP communications specializations.

Read more

Excerpt. © Reprinted by permission. All rights reserved.

Introduction Introduction Congratulations on your decision to pursue a Cisco Certification! If you're reading far enough to look at the introduction to this book, you likely already have a sense of what you ultimately would like to achieve—the Cisco CCNA Security certification. Achieving Cisco CCNA Security certification requires that you pass the Cisco IINS (640-553) exam. Cisco certifications are recognized throughout the networking industry as a rigorous test of a candidate's knowledge of and ability to work with Cisco technology. Through its quality technologies, Cisco has garnered a significant market share in the router and switch marketplace, with more than 80 percent market share in some markets. For many industries and markets around the world, networking equals Cisco. Cisco certification will set you apart from the crowd and allow you to display your knowledge as a networking security professional. Historically speaking, the first entry-level Cisco certification is the Cisco Certified Network Associate (CCNA) certification, first offered in 1998. With the introduction of the CCNA Security certification, Cisco has for the first time provided an area of focus at the associate level. The CCNA Security certification is for networking professionals who work with Cisco security technologies and who want to demonstrate their mastery of core network security principles and technologies. Format of the IINS Exam The 640-553 IINS exam follows the same general format of other Cisco exams. When you get to the testing center and check in, the proctor gives you some general instructions and then takes you into a quiet room with a PC. When you're at the PC, you have a few things to do before the timer starts on your exam. For instance, you can take a sample quiz, just to get accustomed to the PC and the testing engine. If you have user-level PC skills, you should have no problems with the testing environment. Additionally, Chapter 16 points to a Cisco website where you can see a demo of the actual Cisco test engine. When you start the exam, you are asked a series of questions. You answer the question and then move on to the next question. The exam engine does not let you go back and change your answer. When you move on to the next question, that's it for the earlier question. The exam questions can be in one of the following formats: Multiple-choice (MC) Testlet Drag-and-drop (DND) Simulated lab (Sim) Simlet The first three types of questions are relatively common in many testing environments. The multiple-choice format simply requires that you point and click a circle beside the correct answer(s). Cisco traditionally tells you how many answers you need to choose, and the testing software prevents you from choosing too many answers. Testlets are questions with one general scenario, with multiple MC questions about the overall scenario. Drag-and-drop questions require you to click and hold, move a button or icon to another area, and release the mouse button to place the object somewhere else—typically in a list. For example, to get the question correct, you might need to put a list of five things in the proper order. The last two types both use a network simulator to ask questions. Interestingly, these two types allow Cisco to assess two very different skills. Sim questions generally describe a problem, and your task is to configure one or more routers and switches to fix the problem. The exam then grades the question based on the configuration you changed or added. Interestingly, Sim questions are the only questions that Cisco (to date) has openly confirmed that partial credit is given for. The Simlet questions may well be the most difficult style of question on the exams. Simlet questions also use a network simulator, but instead of answering the question by changing the configuration, the question includes one or more MC questions. The questions require that you use the simulator to examine the current behavior of a network, interpreting the output of any show commands that you can remember to answer the question. Whereas Sim questions require you to troubleshoot problems related to a configuration, Simlets require you to analyze both working networks and networks with problems, correlating show command output with your knowledge of networking theory and configuration commands. What's on the IINS Exam? Cisco wants the public to know both the variety of topics and the kinds of knowledge and skills that are required for each topic, for every Cisco certification exam. To that end, Cisco publishes a set of exam topics for each exam. The topics list the specific subjects, such as ACLs, PKI, and AAA, that you will see on the exam. The wording of the topics also implies the kinds of skills required for that topic. For example, one topic might start with "Describe...", and another might begin with "Describe, configure, and troubleshoot...". The second objective clearly states that you need a thorough and deep understanding of that topic. By listing the topics and skill level, Cisco helps you prepare for the exam. Although the exam topics are helpful, keep in mind that Cisco adds a disclaimer that the posted exam topics for all its certification exams are guidelines. Cisco makes an effort to keep the exam questions within the confines of the stated exam topics. I know from talking to those involved that every question is analyzed to ensure that it fits within the stated exam topics. IINS Exam Topics Table I-1 lists the exam topics for the 640-553 IINS exam. Although the posted exam topics are not numbered at Cisco.com, Cisco Press does number the exam topics for easier reference. Notice that the topics are divided among nine major topic areas. The table also notes the part of this book in which each exam topic is covered. Because it is possible that the exam topics may change over time, it may be worthwhile to double-check the exam topics as listed on Cisco.com (http://www.cisco.com/go/certification). If Cisco later adds exam topics, you may go to http://www.ciscopress.com and download additional information about the newly added topics. Table I-1Å@640-553 IINS Exam Topics Reference Number Exam Topic Book Part(s) Where Topic Is Covered 1.0 Describe the security threats facing modern network infrastructures   1.1 Describe and mitigate the common threats to the physical installation I 1.2 Describe and list mitigation methods for common network attacks I 1.3 Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks II 1.4 Describe the main activities in each phase of a secure network lifecycle I 1.5 Explain how to meet the security needs of a typical enterprise with a comprehensive security policy I 1.6 Describe the Cisco Self Defending Network architecture I 1.7 Describe the Cisco security family of products and their interactions I, II, III 2.0 Secure Cisco routers   2.1 Secure Cisco routers using the SDM Security Audit feature I 2.2 Use the One-Step Lockdown feature in SDM to secure a Cisco router I 2.3 Secure administrative access to Cisco routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements I 2.4 Secure administrative access to Cisco routers by configuring multiple privilege levels I 2.5 Secure administrative access to Cisco routers by configuring role based CLI I 2.6 Secure the Cisco IOS image and configuration file I 3.0 Implement AAA on Cisco routers using local router database and external ACS   3.1 Explain the functions and importance of AAA I 3.2 Describe the features of TACACS+ and RADIUS AAA protocols I 3.3 Configure AAA authentication I 3.4 Configure AAA authorization I 3.5 Configure AAA accounting I 4.0 Mitigate threats to Cisco routers and networks using ACLs   4.1 Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets II 4.2 Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI II 4.3 Configure IP ACLs to prevent IP address spoofing using CLI II 4.4 Discuss the caveats to be considered when building ACLs II 5.0 Implement secure network management and reporting   5.1 Describe the factors to be considered when planning for secure management and reporting of network devices I 5.2 Use CLI and SDM to configure SSH on Cisco routers to enable secured management access I 5.3 Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server I 5.4 Describe SNMPv3 and NTPv3 I 6.0 Mitigate common Layer 2 attacks   6.1 Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features II 7.0 Implement the Cisco IOS firewall feature set using SDM   7.1 Describe the operational strengths and weaknesses of the different firewall technologies II 7.2 Explain stateful firewall operations and the function of the state table II 7.3 Implement Zone Based Firewall using SDM II 8.0 Implement the Cisco IOS IPS feature set using SDM   8.1 Define network based vs. host based intrusion detection and prevention II 8.2 Explain IPS technologies, attack responses, and monitoring options II 8.3 Enable and verify Cisco IOS IPS operations using SDM II 9.0 Implement site-to-site VPNs on Cisco Routers using SDM   9.1 Explain the different methods used in cryptography III 9.2 Explain IKE protocol functionality and phases III 9.3 Describe the building blocks of IPSec and the security functions it provides III 9.4 Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM III IINS Course Outlines Another way to get some direction about the topics on the exams is to look at the course outlines for the related courses. Cisco offers one authorized CCNA Security-related course: Implementing Cisco IOS Network Security (IINSv1.0). Cisco authorizes Certified Learning Solutions Providers (CLSP) and Certified Learning Partners (CLP) to deliver these classes. These authorized companies can also create unique custom course books using this material, in some cases to teach classes geared toward passing the 640-553 IINS exam. About the CCNA Security Official Exam Certification Guide As mentioned earlier, Cisco has outlined the topics tested on the 640-553 IINS exam. This book maps to these topic areas and provides some background material to give context and to help you understand these topics. This section lists this book's variety of features. A number of basic features included in this book are common to all Cisco Press Official Exam Certification Guides. These features are designed to help you prepare to pass the official certification exam, as well as help you learn relevant real-world concepts and procedures. Objectives and Methods The most important and somewhat obvious objective of this book is to help you pass the 640-553 IINS exam. In fact, if the primary objective of this book were different, the book's title would be misleading! However, the methods used in this book to help you pass the exams are also designed to make you much more knowledgeable about how to do your job. This book uses several key methodologies to help you discover the exam topics on which you need more review, to help you fully understand and remember those details, and to help you prove to yourself that you have retained your knowledge of those topics. So, this book does not try to help you pass the exams only by memorization, but by truly learning and understanding the topics. The CCNA Security certification is the foundation of the professional level Cisco certification in security, the CCSP, so it is important that this book also help you truly learn the material. This book is designed to help you pass the CCNA Security exam by using the following methods: Helping you discover which exam topics you have not mastered Providing explanations and information to fill in your knowledge gaps Supplying exercises that enhance your ability to recall and deduce the answers to test questions Providing practice exercises on the topics and the testing process via test questions on the CD Book Features To help you customize your study time using this book, the core chapters have several features that help you make the best use of your time: "Do I Know This Already?" quiz: Each chapter begins with a quiz that helps you determine how much time you need to spend studying that chapter. Foundation Topics: These are the core sections of each chapter. They explain the protocols, concepts, and configuration for the topics in that chapter. Exam Preparation Tasks: At the end of the "Foundation Topics" section of each chapter, the "Exam Preparation Tasks" section lists a series of study activities that you should do at the end of the chapter. Each chapter includes the activities that make the most sense for studying the topics in that chapter. — Review All the Key Topics: The Key Topic icon appears next to the most important items in the "Foundation Topics" section of the chapter. The Review All the Key Topics activity lists the Key Topics from the chapter, along with their page numbers. Although the contents of the entire chapter could be on the exam, you should definitely know the information listed in each Key Topic, so you should review these. — Complete the Tables and Lists from Memory: To help you memorize some lists of facts, many of the more important lists and tables from the chapter are included in a document on the CD. This document lists only partial information, allowing you to complete the table or list. — Definition of Key Terms: Although the exam may be unlikely to ask a question such as "Define this term," the CCNA exams do require that you learn and know a lot of networking terminology. This section lists the most important terms from the chapter, asking you to write a short definition and compare your answer to the glossary at the end of the book. — Command Reference Tables: Some chapters cover a large number of configuration and EXEC commands. These tables list and describe the commands introduced in the chapter. For exam preparation, use these tables for reference, but also read them when performing the Exam Preparation Tasks to make sure you remember what all the commands do. CD-based practice exam: The companion CD contains an exam engine (From Boson software, http://www.boson.com), that includes two question databases. One database has a copy of all the "Do I Know This Already?" quiz questions from the book, and the other has unique exam-realistic questions. To further help you prepare for the exam, you can take a simulated IINS exam using the CD. How This Book Is Organized This book contains 15 core chapters—Chapters 1 through 15. Chapter 16 includes some preparation tips and suggestions for how to approach the exam. Each core chapter covers a subset of the topics on the IINS exam. The core chapters are organized into parts. They cover the following topics: Part I: Network Security Concepts — Chapter 1, "Understanding Network Security Principles": This chapter explains the need for network security and discusses the elements of a secure network. Additionally, legal and ethical considerations are discussed. You are also introduced to various threats targeting the security of your network. — Chapter 2, "Developing a Secure Network": This chapter explains the day-to-day procedures for deploying, maintaining, and retiring information security components. You are also provided with considerations and principles for authoring a security policy, in addition to creating user awareness of the security policy. Finally, this chapter describes the Cisco Self-Defending Network, which is Cisco's vision for security systems. — Chapter 3, "Defending the Perimeter": This chapter describes methods of securely accessing a router prompt for purposes of administration. Additionally, you are given an overview of the Cisco Integrated Services Router (ISR) line of routers. In this chapter you also examine the Cisco Security Device Manager (SDM) interface. The graphical interface provided by SDM allows administrators to configure a variety of router features using a collection of wizards, which use best-practice recommendations from the Cisco Technical Assistance Center (TAC). — Chapter 4, "Configuring AAA": This chapter explores the uses of AAA, including the components that make it up, as well as the steps necessary to successfully configure AAA using the local database. The role of Cisco ACS is also examined as it relates to configuring AAA, including a discussion of working with both RADIUS and TACACS+. — Chapter 5, "Securing the Router": This chapter discusses various router services that attackers might target. To help you harden the security of a router, this chapter also describes the AutoSecure feature and Cisco SDM's One-Step Lockdown feature. Next the chapter focuses on securing and monitoring router access using syslog, SSH, and SNMPv3 technologies. Finally, this chapter distinguishes between in-band and out-of-band network management and how to use Cisco SDM to configure a variety of management and monitoring features. Part II: Constructing a Secure Infrastructure — Chapter 6, "Securing Layer 2 Devices": This chapter explains how Cisco Catalyst switches can be configured to mitigate several common Layer 2 attacks. Then you are introduced to how Cisco Identity-Based Networking Services (IBNS) uses IEEE 802.1x, RADIUS, and Extensible Authentication Protocol (EAP) technologies to selectively allow access to network resources based on user credentials. — Chapter 7, "Implementing Endpoint Security": This chapter examines a variety of threats faced by endpoints in a network environment and introduces a series of techniques that can be used to help safeguard systems from common operating system vulnerabilities. This chapter also explores various Cisco-specific technologies that may be used to defend endpoints from a variety of attacks. Specifically, technologies such as IronPort, the Cisco NAC Appliance, and the Cisco Security Agent are discussed. — Chapter 8, "Providing SAN Security": This chapter outlines the basics of SAN operation and looks at the benefits that a SAN brings to the enterprise as a whole. A variety of security mechanisms, such as LUN masking, SAN zoning, and port authentication, are also explored as steps that may be taken to safeguard data in a SAN environment. — Chapter 9, "Exploring Secure Voice Solutions": This chapter introduces you to voice over IP (VoIP) networks. You learn what business benefits VoIP offers, in addition to the components and protocols that support the transmission of packetized voice across a data network. You are made aware of specific threats targeting a VoIP network. Some threats (such as toll fraud) are found in traditional telephony networks, but others are specific to VoIP. — Finally, this chapter identifies specific actions you can take to increase the security of VoIP networks. For example, you will consider how to use firewalls and VPNs to protect voice networks and how to harden the security of Cisco IP Phones and voice servers. — Chapter 10, "Using Cisco IOS Firewalls to Defend the Network": This chapter begins by exploring the evolution of firewall technology and the role of firewalls in constructing an overall network defense. This chapter also examines how to use access control lists (ACL) to construct a static packet-filtering mechanism for the enterprise environment. Finally, zone-based firewalls are discussed because they represent a significant advance in firewall technology. Their role in defending the network is examined. — Chapter 11, "Using Cisco IOS IPS to Secure the Network": This chapter distinguishes between intrusion detection and intrusion prevention. Various Intrusion Prevention System (IPS) appliances are introduced, and the concept of signatures is discussed. Also, this chapter examines how to configure a Cisco IOS router to act as an IPS sensor, as opposed to using, for example, a dedicated IPS appliance. Specifically, the configuration discussed uses a wizard available in the Cisco SDM interface. Part III: Extending Security and Availability with Cryptography and VPNs — Chapter 12, "Designing a Cryptographic Solution": This chapter initially explores the basics of cryptographic services and looks at their evolution. This chapter also examines the use of symmetric encryption, including a variety of symmetric algorithms such as DES, 3DES, AES, SEAL, and various Rivest ciphers. This chapter concludes with a discussion of the encryption process and what makes for a strong, trustworthy encryption algorithm. — Chapter 13, "Implementing Digital Signatures": This chapter begins with a look at hash algorithms and explores their construction and usage. This includes a discussion of their relative strengths and weaknesses in practical application. The components that make up a digital signature are also explored in depth, along with a discussion of their application as a means of proving a message's authenticity. — Chapter 14, "Exploring PKI and Asymmetric Encryption": This chapter looks at the use of asymmetric algorithms in a PKI and examines the features and capabilities of RSA specifically. The Diffie-Hellman (DH) algorithm is also discussed, as to how it is used for key exchange. This chapter also explores the makeup of the PKI infrastructure and discusses the various components and topologies that may be employed. — Chapter 15, "Building a Site-to-Site IPsec VPN Solution": This chapter introduces you to an IPsec virtual private network (VPN) and its components. Additionally, you explore specific devices in the Cisco VPN product family. Then you are presented with Cisco best-practice recommendations for VPNs. This chapter then walks you through the process of configuring an IPsec site-to-site VPN on an IOS router, using both the command-line interface and the Cisco Security Device Manager (SDM) interface. Part IV: Final Preparation — Chapter 16, "Final Preparation": This chapter identifies tools for final exam preparation and helps you develop an effective study plan. Part V: Appendixes — Appendix A, "Answers to the 'Do I Know This Already?' Questions": Includes the answers to all the questions from Chapters 1 through 15. — Appendix B, "Glossary": The glossary contains definitions of all the terms listed in the "Definition of Key Terms" section at the conclusion of Chapters 1 through 15. — Appendix C, "CCNA Security Exam Updates: Version 1.0": This appendix provides instructions for finding updates to the exam and this book when and if they occur. — Appendix D, "Memory Tables": This CD-only appendix contains the key tables and lists from each chapter, with some of the contents removed. You can print this appendix and, as a memory exercise, complete the tables and lists. The goal is to help you memorize facts that can be useful on the exams. This appendix is available in PDF format on the CD; it is not in the printed book. — Appendix E, "Memory Tables Answer Key": This CD-only appendix contains the answer key for the memory tables in Appendix D. This appendix is available in PDF format on the CD; it is not in the printed book. How to Use This Book to Prepare for the IINS Exam Using this book to prepare for the IINS exam is pretty straightforward—read each chapter in succession, and follow the study suggestions in Chapter 16, "Final Preparation." For the core chapters of this book (Chapters 1 through 15), you do have some choices about how much of the chapter you read. In some cases, you may already know most or all of the information covered in a given chapter. To help you decide how much time to spend on each chapter, the chapters begin with a "Do I Know This Already?" quiz. If you get all the quiz questions correct, or you miss just one question, you may want to skip to the end of the chapter and the "Exam Preparation Tasks" section, and do those activities. Figure I-1 shows the overall plan. Figure I-1 How to Approach Each Chapter of This Book When you have completed Chapters 1 through 15, you can use Chapter 16 for exam preparation guidance. That chapter includes the following suggestions: Check http://www.ciscopress.com for the latest copy of Appendix C, which may include additional topics for study. Repeat the tasks in all the chapters' "Exam Preparation Tasks" chapter-ending section. Review all DIKTA questions using the exam engine. Practice for the exam using the exam engine. This book is broken into parts and chapters that address the key areas of the IINS exam. Each chapter begins with a series of "Do I Know This Already?" questions. You should work through these to get a sense of your current knowledge of the subject matter being discussed. Each chapter contains memory tables that you should work through. At the end of each chapter is a list of all the key topics, as well as terms central to the topic. It is a good idea to focus on these key topic areas and to be familiar with all the terms listed in each chapter. After you have completed this book, you may further prepare for the exam and test your knowledge by working through the practice exam on the CD. Tracking your score on the practice exam and noting areas of weakness will allow you to review these areas in the text to further solidify your knowledge before the actual IINS exam. For More Information If you have any comments about this book, you can submit them at http://www.ciscopress.com. Just go to the website, click Contact Us, and enter your message. Cisco might occasionally make changes that affect the CCNA Security certification. You should always check http://www.cisco.com/go/certification for the latest details. © Copyright Pearson Education. All rights reserved.

(function(g,h){function d(a,d){var b={};if(!e||!f)try{var c=h.sessionStorage;c?a&&("undefined"!==typeof d?c.setItem(a,d):b.val=c.getItem(a)):f=1}catch(g){e=1}e&&(b.e=1);return b}var b=g.ue||{},a="",f,e,c,a=d("csmtid");f?a="NA":a.e?a="ET":(a=a.val,a||(a=b.oid||"NI",d("csmtid",a)),c=d(b.oid),c.e||(c.val=c.val||0,d(b.oid,c.val+1)),b.ssw=d);b.tabid=a})(ue_csm,window);

(function(c,l,m){function h(a){if(a)try{if(a.id)return"//*[@id='"+a.id+"']";var b,d=1,e;for(e=a.previousSibling;e;e=e.previousSibling)e.nodeName===a.nodeName&&(d+=1);b=d;var c=a.nodeName;1!==b&&(c+="["+b+"]");a.parentNode&&(c=h(a.parentNode)+"/"+c);return c}catch(f){return"DETACHED"}function f(a){if(a&&a.getAttribute)return a.getAttribute(k)?a.getAttribute(k):f(a.parentElement)}var k="data-cel-widget",g=!1,d=[];(c.ue||{}).isBF=function(){try{var a=JSON.parse(localStorage["csm-bf"]||"[]"),b=0<=a.indexOf(c.ue_id);

a.unshift(c.ue_id);a=a.slice(0,20);localStorage["csm-bf"]=JSON.stringify(a);return b}catch(d){return!1}();c.ue_utils={getXPath:h,getFirstAscendingWidget:function(a,b){c.ue_cel&&c.ue_fem?!0===g?b(f(a)):d.push({element:a,callback:b}):b()},notifyWidgetsLabeled:function(){if(!1===g){g=!0;for(var a=f,b=0;b

typeof a)return a}})(ue_csm,window,document);

window.ue_ibe = (window.ue_ibe || 0) + 1;

if (window.ue_ibe === 1) {

window.ue_csm.cel_widgets = [

{ id: "detail-bullets" } , { id: "featurebullets_feature_div" } , { id: "summaryContainer" } , { id: "sims_fbt" } , { id: "purchase-sims-feature" } , { id: "session-sims-feature" } , { id: "quickPromoBucketContent" } , { id: "productDescription" } , { id: "technicalSpecifications_feature_div" } , { id: "prodDetails" } , { id: "related_ads" } , { id: "technical-data" } , { id: "tagging_lazy_load_div" } , { id: "consumption-sims" } , { id: "moreBuyingChoices_feature_div" } , { id: "product-ads-feedback_feature_div" } , { id: "DAcrt" } , { id: "vtpsims" } , { c: "feature" } , { c: "celwidget" } , { id: "fallbacksessionShvl" } , { id: "rhf" } , { id: "unifiedLocationPopoverSelections" }

];

ue_csm.ue.exec(function(b){var a=b.ue;if(a&&a.onSushiUnload){if(a.onunload)a.onunload(function(){a.count&&a.count("beforeUnloadNexusCounter",1,{bf:1})});a.onSushiUnload(function(){var c={server:b.ue_sn||"sn"};a.event&&a.event(c,"csm","csm.CSMUnloadBaselineEvent.2")})},"Nxs-unload-baseline")(ue_csm);

(function(a,g){a.ue_cel||(a.ue_cel=function(){function h(a,b){b?b.r=z:b={r:z,c:1};!ue_csm.ue_sclog&&b.clog&&e.clog?e.clog(a,b.ns||l,b):b.glog&&e.glog?e.glog(a,b.ns||l,b):e.log(a,b.ns||l,b)}function m(){var a=b.length;if(0

c.executed=1;for(a=0;a

{wb:1});setTimeout(m,0);e.onunload(c);if(e.onflush)e.onflush(s);k=setTimeout(c,6E5);x();"function"==typeof y&&y("ld","csmCELLSframework",{wb:1});return{registerModule:function(a,c){b.push({name:a,api:c});h({k:"mrg",n:a,t:e.d()});m()},reset:function(a){h({k:"rst",t0:e.t0,t:e.d()});b=b.concat(d);d=[];for(var g=b.length,f=0;f

a()})},b)},log:h,off:c}}())})(ue_csm,window);

(function(a,g,h){a.ue_pdm||!a.ue_cel||ue.isBF||(a.ue_pdm=function(){function m(){try{var b=window.screen;if(b){var c={w:b.width,aw:b.availWidth,h:b.height,ah:b.availHeight,cd:b.colorDepth,pd:b.pixelDepth};e&&e.w===c.w&&e.h===c.h&&e.aw===c.aw&&e.ah===c.ah&&e.pd===c.pd&&e.cd===c.cd||(e=c,e.t=k(),e.k="sci",r(e))}var g=h.body||{},f=h.documentElement||{},d={w:Math.max(g.scrollWidth||0,g.offsetWidth||0,f.clientWidth||0,f.scrollWidth||0,f.offsetWidth||0),h:Math.max(g.scrollHeight||0,g.offsetHeight||0,f.clientHeight||

0,f.scrollHeight||0,f.offsetHeight||0)};t&&t.w===d.w&&t.h===d.h||(t=d,t.t=k(),t.k="doi",r(t));l=a.ue_cel.timeout(m,v);z+=1}catch(p){window.ueLogError&&ueLogError(p,{attribution:"csm-cel-page-module",logLevel:"WARN"})}function c(){p("ebl","default",!1)}function n(){p("efo","default",!0)}function x(){p("ebl","app",!1)}function s(){p("efo","app",!0)}function u(){g.setTimeout(function(){h[D]?p("ebl","pageviz",!1):p("efo","pageviz",!0)},0)}function p(a,b,c){y!==c&&r({k:a,t:k(),s:b},{ff:!0===c?0:1});y=

c}function b(){f.attach&&(w&&f.attach(q,u,h),A&&P.when("mash").execute(function(a){a&&a.addEventListener&&(a.addEventListener("appPause",x),a.addEventListener("appResume",s))}),f.attach("blur",c,g),f.attach("focus",n,g))}function d(){f.detach&&(w&&f.detach(q,u,h),A&&P.when("mash").execute(function(a){a&&a.removeEventListener&&(a.removeEventListener("appPause",x),a.removeEventListener("appResume",s))}),f.detach("blur",c,g),f.detach("focus",n,g))}var l,k,v,e,t,y=null,z=0,f=a.ue,r=a.ue_cel.log,B=a.uet,

E=a.uex,w=!!f.pageViz,q=w&&f.pageViz.event,D=w&&f.pageViz.propHid,A=g.P&&g.P.when;"function"==typeof B&&B("bb","csmCELLSpdm",{wb:1});return{on:function(a){v=a.timespan||500;k=a.ts;b();a=g.location;r({k:"pmd",o:a.origin,p:a.pathname,t:k()});m();"function"==typeof E&&E("ld","csmCELLSpdm",{wb:1})},off:function(a){clearTimeout(l);d();f.count&&f.count("cel.PDM.TotalExecutions",z)},ready:function(){return h.body&&a.ue_cel&&a.ue_cel.log},reset:function(){e=t=null}}(),a.ue_cel&&a.ue_cel.registerModule("page module",

a.ue_pdm))})(ue_csm,window,document);

(function(a,g){a.ue_vpm||!a.ue_cel||ue.isBF||(a.ue_vpm=function(){function h(){var a=s(),b={w:g.innerWidth,h:g.innerHeight,x:g.pageXOffset,y:g.pageYOffset};c&&c.w==b.w&&c.h==b.h&&c.x==b.x&&c.y==b.y||(b.t=a,b.k="vpi",c=b,d(c,{clog:1}));n=0;u=s()-a;p+=1}function m(){n||(n=a.ue_cel.timeout(h,x))}var c,n,x,s,u=0,p=0,b=a.ue,d=a.ue_cel.log,l=a.uet,k=a.uex,v=b.attach,e=b.detach;"function"==typeof l&&l("bb","csmCELLSvpm",{wb:1});return{on:function(a){s=a.ts;x=a.timespan||100;h();v&&(v("scroll",m),v("resize",

m));"function"==typeof k&&k("ld","csmCELLSvpm",{wb:1})},off:function(a){clearTimeout(n);e&&(e("scroll",m),e("resize",m));b.count&&(b.count("cel.VPI.TotalExecutions",p),b.count("cel.VPI.TotalExecutionTime",u),b.count("cel.VPI.AverageExecutionTime",u/p))},ready:function(){return a.ue_cel&&a.ue_cel.log},reset:function(){c=void 0},getVpi:function(){return c}}(),a.ue_cel&&a.ue_cel.registerModule("viewport module",a.ue_vpm))})(ue_csm,window);

(function(a,g,h){if(!a.ue_fem&&a.ue_cel&&a.ue_utils){var m=a.ue||{};!m.isBF&&!a.ue_fem&&h.querySelector&&g.getComputedStyle&&[].forEach&&(a.ue_fem=function(){function c(a,b){return a>b?3>a-b:3>b-a}function n(a,b){var f=g.pageXOffset,e=g.pageYOffset,d;a:{try{if(a){var h=a.getBoundingClientRect(),l,m=0===a.offsetWidth&&0===a.offsetHeight;c:{for(var k=a.parentNode,p=h.left||0,q=h.top||0,r=h.width||0,t=h.height||0;k&&k!==document.body;){var n;d:{try{if(k){var C=k.getBoundingClientRect();n={x:C.left||

0,y:C.top||0,w:C.width||0,h:C.height||0}else n=void 0;break d}catch(v){}n=void 0}var s=window.getComputedStyle(k),u="hidden"===s.overflow,x=u||"hidden"===s.overflowX,y=u||"hidden"===s.overflowY,M=q+t-1n.y+n.h-1;if((p+r-1n.x+n.w-1)&&x||M&&y){l=!0;break c}k=k.parentNode}l=!1}d={x:h.left+f||0,y:h.top+e||0,w:h.width||0,h:h.height||0,d:(m||l)|0}else d=void 0;break a}catch(N){}d=void 0}if(d&&!a.cel_b)a.cel_b=d,w({n:a.getAttribute(z),w:a.cel_b.w,h:a.cel_b.h,d:a.cel_b.d,x:a.cel_b.x,

y:a.cel_b.y,t:b,k:"ewi",cl:a.className},{clog:1});else{if(f=d)f=a.cel_b,e=d,f=e.d===f.d&&1===e.d?!1:!(c(f.x,e.x)&&c(f.y,e.y)&&c(f.w,e.w)&&c(f.h,e.h)&&f.d===e.d);f&&(a.cel_b=d,w({n:a.getAttribute(z),w:a.cel_b.w,h:a.cel_b.h,d:a.cel_b.d,x:a.cel_b.x,y:a.cel_b.y,t:b,k:"ewi"},{clog:1}))}function x(b,e){var c;c=b.c?h.getElementsByClassName(b.c):b.id?[h.getElementById(b.id)]:h.querySelectorAll(b.s);b.w=[];for(var g=0;g

(b.id_gen||E)(d,g)||d.id;d.setAttribute(z,k)}b.w.push(d);p(Q,d,e)}!1===B&&(r++,r===f.length&&(B=!0,a.ue_utils.notifyWidgetsLabeled()))}function s(a,b){q.contains(a)||w({n:a.getAttribute(z),t:b,k:"ewd"},{clog:1})}function u(a){I.length&&ue_cel.timeout(function(){if(t){for(var b=R(),c=!1;R()-b

f[c].w||[],d=0;d

g.MozMutationObserver,M=!!G,H,C,N="DOMAttrModified",K="DOMNodeInserted",L="DOMNodeRemoved",O,J,I=[],U=0,S=null,W="removedWidget",X="updateWidgets",Q="processWidget",T,V=g.performance||{},R=V.now&&function(){return V.now()}||function(){return Date.now()};"function"==typeof uet&&uet("bb","csmCELLSfem",{wb:1});return{on:function(b){function c(){if(k()){T={removedWidget:s,updateWidgets:x,processWidget:n};if(M){var a={attributes:!0,subtree:!0};H=new G(l);C=new G(d);H.observe(q,a);C.observe(q,{childList:!0,

subtree:!0});C.observe(D,a)}else A.call(q,N,l),A.call(q,K,d),A.call(q,L,d),A.call(D,K,l),A.call(D,L,l);d()}q=h.body;D=h.head;A=q.addEventListener;F=q.removeEventListener;y=b.ts;f=a.cel_widgets||[];S=b.bs||5;m.deffered?c():m.attach&&m.attach("load",c);"function"==typeof uex&&uex("ld","csmCELLSfem",{wb:1});t=!0},off:function(){k()&&(C&&(C.disconnect(),C=null),H&&(H.disconnect(),H=null),F.call(q,N,l),F.call(q,K,d),F.call(q,L,d),F.call(D,K,l),F.call(D,L,l));m.count&&m.count("cel.widgets.batchesProcessed",

U);t=!1},ready:function(){return a.ue_cel&&a.ue_cel.log},reset:function(){f=a.cel_widgets||[]}}(),a.ue_cel&&a.ue_fem&&a.ue_cel.registerModule("features module",a.ue_fem))})(ue_csm,window,document);

(function(a,g,h){!a.ue_mcm&&a.ue_cel&&a.ue_utils&&!a.ue.isBF&&(a.ue_mcm=function(){function m(a,c){var l=a.srcElement||a.target||{},k={k:n,w:(c||{}).ow||(g.body||{}).scrollWidth,h:(c||{}).oh||(g.body||{}).scrollHeight,t:(c||{}).ots||x(),x:a.pageX,y:a.pageY,p:p.getXPath(l),n:l.nodeName};h&&"function"===typeof h.now&&a.timeStamp&&(k.dt=(c||{}).odt||h.now()-a.timeStamp,k.dt=parseFloat(k.dt.toFixed(2)));a.button&&(k.b=a.button);l.href&&(k.r=p.extractStringValue(l.href));l.id&&(k.i=l.id);l.className&&

l.className.split&&(k.c=l.className.split(/\s+/));u(k,{c:1})}function c(){switch(a.ue_mcimp){case 1:return"click";case 3:return"mousedown"}var n="mcm",x,s=a.ue,u=a.ue_cel.log,p=a.ue_utils;return{on:function(b){x=b.ts;a.ue_cel_stub&&a.ue_cel_stub.replayModule(n,m);(event=c())?window.addEventListener&&window.addEventListener(event,m,!0):s.attach&&s.attach("click",m,g)},off:function(a){(event=c())?window.removeEventListener&&window.removeEventListener(event,m,!0):s.detach&&s.detach("click",m,g)},ready:function(){return a.ue_cel&&

a.ue_cel.log},reset:function(){}}(),a.ue_cel&&a.ue_cel.registerModule("mouse click module",a.ue_mcm))})(ue_csm,document,window.performance);

(function(a,g){a.ue_mmm||!a.ue_cel||a.ue.isBF||(a.ue_mmm=function(h){function m(a,b){var c={x:a.pageX||a.x||0,y:a.pageY||a.y||0,t:p()};!b&&w&&(c.t-w.tc)){d=void 0;a:if(r[c].t-r[c-1].t>n)d=0;else{for(d=E+1;ds){d=0;break a}d=1}d=!d}(F=

d)?E=c-1:B.pop();B.push(b)}f=G.now()-z;v=Math.min(v,f);e=Math.max(e,f);t=(t*y+f)/(y+1);y+=1;l({k:u,e:B,min:Math.floor(1E3*v),max:Math.floor(1E3*e),avg:Math.floor(1E3*t)},{c:1});r=[];B=[];E=0}var n=100,x=20,s=25,u="mmm1",p,b,d=a.ue,l=a.ue_cel.log,k,v=1E3,e=0,t=0,y=0,z,f,r=[],B=[],E=0,w,q,D,A,F,G=h&&h.now&&h||Date.now&&Date||{now:function(){return(new Date).getTime()};return{on:function(a){p=a.ts;b=a.ns;d.attach&&d.attach("mousemove",m,g);k=setInterval(c,3E3)},off:function(a){b&&(w&&m(w,!0),c());

clearInterval(k);d.detach&&d.detach("mousemove",m,g)},ready:function(){return a.ue_cel&&a.ue_cel.log},reset:function(){r=[];B=[];E=0;w=null}}(window.performance),a.ue_cel&&a.ue_cel.registerModule("mouse move module",a.ue_mmm))})(ue_csm,document);

}

(function(a){var b=document.ue_backdetect;b&&b.ue_back&&a.ue&&(a.ue.bfini=b.ue_back.value);a.uet&&a.uet("be");a.onLdEnd&&(window.addEventListener?window.addEventListener("load",a.onLdEnd,!1):window.attachEvent&&window.attachEvent("onload",a.onLdEnd));a.ueh&&a.ueh(0,window,"load",a.onLd,1);a.ue&&a.ue.tag&&(a.ue_furl&&a.ue_furl.split?(b=a.ue_furl.split("."))&&b[0]&&a.ue.tag(b[0]):a.ue.tag("nofls"))})(ue_csm);

var ue_pty='Detail', ue_spty='Glance', ue_pti='1587202204';

v

(function(b,c){var a=c.images;a&&a.length&&b.ue.count("totalImages",a.length)})(ue_csm,document);

(function(k,l){function K(a){if(a)return a.replace(/^\s+|\s+$/g,"")}function A(a,d){if(!a)return{};var c="INFO"===d.logLevel;a.m&&a.m[n]&&(a=a.m);var b=d.m||d[n]||"",b=a.m&&a.m[n]?b+a.m[n]:a.m&&a.m.target&&a.m.target.tagName?b+("Error handler invoked by "+a.m.target.tagName+" tag"):a.m?b+a.m:a[n]?b+a[n]:b+"Unknown error",b={m:b,name:a.name,type:a.type,csm:L+" "+(a.fromOnError?"onerror":"ueLogError")},e,g,f=0;e=0;var h;g=l.location;b[p]=d[p]||v;d.adb&&(b.adb=d.adb);(e=d[r])&&(b[r]=""+e);if(!c){b[B]=

d[B]||g&&g.href||"missing";b.f=a.f||a.sourceURL||a.fileName||a.filename||a.m&&a.m.target&&a.m.target.src;b.l=a.l||a.line||a.lineno||a.lineNumber;b.c=a.c?""+a.c:a.c;b.s=[];b.t=k.ue.d();if((c=a.stack||(a.err?a.err.stack:""))&&c.split)for(b.csm+=" stack",e=c.split("\n");f

f++;!b.f&&0q.mxe)){q.ter.push(a);d=d||{};var c=a[p]||d[p];d[p]=c;d[r]=a[r]||d[r];c&&c!==v&&c!==O&&c!==P&&c!==Q||k.ue_err.ec++;c&&c!=v||q.ecf++;z(a,d)}function z(a,d){if(a){for(var c=A(a,d),b=d.channel||R,e=(window.ue_err?window.ue_err.errorHandlers:null)||[],g=0;g

if(ue.log.isStub&&l[w]&&l[w][x]){e={};e[b]=c;try{var f=l[w][x]({rid:ue.rid,sid:k.ue_sid,mid:k.ue_mid,sn:k.ue_sn,reqs:[e]}),h=l[S],m;if(m=!(h[F]&&h[F](G,f))){var n;if(l[H]){var s=new l[H];s.onerror=u;s.ontimeout=u;s.onprogress=u;s.onload=u;s.timeout=0;n=s}else{var p;if(l[I]){var r=new l[I];p="withCredentials"in r?r:void 0}else p=void 0;n=p}m=n}if(b=m){b.open("POST",G,!0);if(b[J])b[J]("Content-type","text/plain");b.send(f)}catch(t){}else k.ue.log(c,b,{nb:1});"function"===typeof q.elh&&q.elh(a,d);

if(!a.fromOnError){f=l.console||{};b=f.error||f.log||u;h=l[w];m="Error logged with the Track&Report JS errors API(http://tiny/1covqr6l8/wamazindeClieUserJava): ";if(h&&h[x])try{m+=h[x](c)}catch(v){m+="no info provided; converting to string failed"}else m+=c.m;b.apply(f,[m,c])}}if(k.ue_err){var I="XMLHttpRequest",H="XDomainRequest",S="navigator",F="sendBeacon",x="stringify",w="JSON",p="logLevel",r="attribution",B="pageURL",t="skipTrace",J="setRequestHeader",n="message",u=function(){},G="//"+k.ue_furl+

"/1/batch/1/OE/",q=k.ue_err,R=k.ue_err_chan||"jserr",v="FATAL",O="ERROR",P="WARN",Q="DOWNGRADED",L="v6",C=20,y=256,N=RegExp(" (?([^ s]*):( d+): d+ )?".split(" ").join(String.fromCharCode(92))),M=/.*@(.*):(\d*)/;A[t]=1;E[t]=1;z[t]=1;(function(){for(var a,d=0;d<(q.erl||[]).length;d++)a=q.erl[d],z(a.ex,a.info);q.erl=[]})();k.ueLogError=E})(ue_csm,window);

(function(c,d){var b=c.ue,a=d.navigator;b&&b.tag&&a&&(a=a.connection||a.mozConnection||a.webkitConnection)&&a.type&&b.tag("netInfo:"+a.type)})(ue_csm,window);

(function(c,d){function h(a,b){for(var c=[],d=0;d

a}function q(){g&&g.isStub&&g.replay(function(a,b,c){a=a[0];b=a[k]=a[k]||{};b[f]=b[f]||c;s(a)});l.impression=s;g=null}if(!(1

A)}),A=r(",","@","|",function(a){return a.id}),g=l.impression;n?q():(l.attach("load",q),l.attach("beforeunload",q));try{d.P&&d.P.register&&d.P.register("impression-client",function(){})}catch(B){c.ueLogError(B,{logLevel:"WARN"})}})(ue_csm,window);

ue_csm.ue.exec(function(e,d,a){function b(a,b){return{name:a,getFeatureValue:function(){return void 0!==b|0}}function h(a,b,c){return{name:a,getFeatureValue:function(){return b===c|0}}function g(a,b){return{name:a,getFeatureValue:function(){for(var a=0;a

a.__phantomas]),b("njs",a.Buffer),b("cjs",a.emit),b("rhn",a.spawn),b("sel",a.webdriver),g("chrm",[a.domAutomation,a.domAutomationController]),{name:"plg",getFeatureValue:function(){return(void 0!==a.navigator.plugins&&0

f._bf.modules=c;f._bf.mpm=b},"bf")(ue_csm,document,window);

ue_csm.ue.exec(function(c,a){function g(a){a.run(function(e){d.tag("csm-feature-"+a.name+":"+e);d.isl&&c.uex("at")})}if(a.addEventListener)for(var d=c.ue||{},f=[{name:"touch-enabled",run:function(b){var e=function(){a.removeEventListener("touchstart",c,!0);a.removeEventListener("mousemove",d,!0)},c=function(){b("true");e()},d=function(){b("false");e()};a.addEventListener("touchstart",c,!0);a.addEventListener("mousemove",d,!0)}],b=0;b

if (!window.fwcimData) {

window.fwcimData = {

customerId: '0'

};

if (window.P && P.load && P.load.js && P.declare && P.now) {

if (window.ue && window.ue.uels) {

ue.uels("https://images-na.ssl-images-amazon.com/images/G/01/AUIClients/FWCIMAssets.efbe4bec418ea4d05c29b54e78e3aab92fa84c99._V2_.js");

}

}

}

ue_csm.ue.exec(function(e,f){var a=e.ue||{},b=a._wlo,d;if(a.ssw){d=a.ssw("CSM_previousURL").val;var c=f.location,b=b?b:c&&c.href?c.href.split("#")[0]:void 0;c=(b||"")===a.ssw("CSM_previousURL").val;!c&&b&&a.ssw("CSM_previousURL",b);d=c?"reload":d?"intrapage-transition":"first-view"}else d="unknown";a._nt=d},"NavTypeModule")(ue_csm,window);

var ue_mbl=ue_csm.ue.exec(function(e,a){function l(f){b=f||{};a.AMZNPerformance=b;b.transition=b.transition||{};b.timing=b.timing||{};e.ue.exec(m,"csm-android-check")()&&b.tags instanceof Array&&(f=-1!=b.tags.indexOf("usesAppStartTime")||b.transition.type?!b.transition.type&&-1

b.timing.transitionStart=a.performance.timing.navigationStart:delete b.timing.transitionStart:"undefined"===typeof c._nt&&a.performance&&performance.timing&&performance.timing.navigationStart&&a.history&&"function"===typeof a.History&&"object"===typeof a.history&&history.length&&1!=history.length&&(b.timing.transitionStart=a.performance.timing.navigationStart);f=b.transition;var d;d=c._nt?c._nt:void 0;f.subType=d;a.ue&&a.ue.tag&&a.ue.tag("has-AMZNPerformance");c.isl&&a.uex&&uex("at","csm-timing");

n()}function p(b){a.ue&&a.ue.count&&a.ue.count("csm-cordova-plugin-failed",1)}function m(){return a.webclient&&"function"===typeof a.webclient.getRealClickTime?a.cordova&&a.cordova.platformId&&"ios"==a.cordova.platformId?!1:!0:!1}function n(){try{P.register("AMZNPerformance",function(){return b})}catch(a){}function h(){if(!b)return"";ue_mbl.cnt=null;for(var a=b.timing,d=b.transition,a=["mts",k(a.transitionStart),"mps",k(a.processStart),"mtt",d.type,"mtst",d.subType,"mtlt",d.launchType],d="",c=0;c<

a.length;c+=2){var e=a[c],g=a[c+1];"undefined"!==typeof g&&(d+="&"+e+"="+g)}return d}function k(a){if("undefined"!==typeof a&&"undefined"!==typeof g)return a-g}function q(a,c){b&&(g=c,b.timing.transitionStart=a,b.transition.type="view-transition",b.transition.subType="ajax-transition",b.transition.launchType="normal",ue_mbl.cnt=h)}var c=e.ue||{},g=e.ue_t0,b;if(a.P&&a.P.when&&a.P.register)return a.P.when("CSMPlugin").execute(function(a){a.buildAMZNPerformance&&a.buildAMZNPerformance({successCallback:l,

failCallback:p})}),{cnt:h,ajax:q},"mobile-timing")(ue_csm,window);

(function(b){function c(){var d=[];a.log&&a.log.isStub&&a.log.replay(function(a){e(d,a)});a.clog&&a.clog.isStub&&a.clog.replay(function(a){e(d,a)});d.length&&(a._flhs+=1,n(d),p(d))}function g(){a.log&&a.log.isStub&&(a.onflush&&a.onflush.replay&&a.onflush.replay(function(a){a[0]()}),a.onunload&&a.onunload.replay&&a.onunload.replay(function(a){a[0]()}),c())}function e(d,b){var c=b[1],f=b[0],e={};a._lpn[c]=(a._lpn[c]||0)+1;e[c]=f;d.push(e)}function n(b){q&&(a._lpn.csm=(a._lpn.csm||0)+1,b.push({csm:{k:"chk",

f:a._flhs,l:a._lpn,s:"inln"}))}function p(a){if(h)a=k(a),b.navigator.sendBeacon(l,a);else{a=k(a);var c=new b[f];c.open("POST",l,!0);c.setRequestHeader&&c.setRequestHeader("Content-type","text/plain");c.send(a)}function k(a){return JSON.stringify({rid:b.ue_id,sid:b.ue_sid,mid:b.ue_mid,mkt:b.ue_mkt,sn:b.ue_sn,reqs:a})}var f="XMLHttpRequest",q=1===b.ue_ddq,a=b.ue,r=b[f]&&"withCredentials"in new b[f],h=b.navigator&&b.navigator.sendBeacon,l="//"+b.ue_furl+"/1/batch/1/OE/",m=b.ue_fci_ft||5E3;a&&(r||h)&&

(a._flhs=a._flhs||0,a._lpn=a._lpn||{},a.attach&&(a.attach("beforeunload",g),a.attach("pagehide",g)),m&&b.setTimeout(c,m),a._ffci=c)})(window);

ue_csm.ue.exec(function(w,a){function q(){if(d&&f){var a;a:{try{a=d.getItem(g);break a}catch(c){}a=void 0}if(a)return b=a,!0}return!1}function r(){b=h;k();if(f)try{d.setItem(g,b)}catch(a){}function s(){b=1===a.ue_adb_chk?l:h;k();if(f)try{d.setItem(g,b)}catch(c){}function m(){a.ue_adb_rtla&&c&&0

(c.elh=m)}function t(){return b}if(a.ue_adb){a.ue_fadb=a.ue_fadb||10;var e=a.ue,h="adblk_yes",l="adblk_no",b="adblk_unk",d;a:{try{d=a.localStorage;break a}catch(x){}d=void 0}var g="csm:adb",c=a.ue_err,p=e.cookie,f=void 0!==a.localStorage,u=Math.random()>1-1/a.ue_fadb,n=!1,v=q();u||!v?e.uels("https://m.media-amazon.com/images/G/01/csm/showads.v2.js",{onerror:r,onload:s}):k();a.ue_isAdb=t;a.ue_isAdb.unk="adblk_unk";a.ue_isAdb.no=l;a.ue_isAdb.yes=h},"adb")(document,window);

ue_csm.ue_unrt = 750;

(function(d,b,t){function u(a,b){var c=a.srcElement||a.target||{},e={k:w,t:b.t,dt:b.dt,x:a.pageX,y:a.pageY,p:f.getXPath(c),n:c.nodeName};a.button&&(e.b=a.button);c.type&&(e.ty=c.type);c.href&&(e.r=f.extractStringValue(c.href));c.id&&(e.i=c.id);c.className&&c.className.split&&(e.c=c.className.split(/\s+/));g+=1;f.getFirstAscendingWidget(c,function(a){e.wd=a;d.ue.log(e,r)})}function x(a){if(!y(a.srcElement||a.target)){k+=1;n=!0;var v=h=d.ue.d(),c;p&&"function"===typeof p.now&&a.timeStamp&&(c=p.now()-

a.timeStamp,c=parseFloat(c.toFixed(2)));s=b.setTimeout(function(){u(a,{t:v,dt:c})},z)}function A(a){if(a){var b=a.filter(B);a.length!==b.length&&(q=!0,l=d.ue.d(),n&&q&&(l&&h&&d.ue.log({k:C,t:h,m:Math.abs(l-h)},r),m(),q=!1,l=0))}function B(a){if(!a)return!1;var b="characterData"===a.type?a.target.parentElement:a.target;if(!b||!b.hasAttributes||!b.attributes)return!1;var c={"class":["gw-clock","gw-clock-aria","s-item-container-height-auto","feed-carousel","using-mouse"],id:["dealClock","deal_expiry_timer",

"timer"],role:["timer"]},e=!1;Object.keys(c).forEach(function(a){var d=b.attributes[a]?b.attributes[a].value:"";(c[a]||"").forEach(function(a){-1!==d.indexOf(a)&&(e=!0)})});return e}function y(a){if(!a)return!1;var b=(f.extractStringValue(a.nodeName)||"").toLowerCase(),c=(f.extractStringValue(a.type)||"").toLowerCase(),d=(f.extractStringValue(a.href)||"").toLowerCase();a=(f.extractStringValue(a.id)||"").toLowerCase();var g="checkbox color date datetime-local email file month number password radio range reset search tel text time url week".split(" ");

if(-1!==["select","textarea","html"].indexOf(b)||"input"===b&&-1!==g.indexOf(c)||"a"===b&&-1!==d.indexOf("http")||-1!==["sitbreaderrightpageturner","sitbreaderleftpageturner","sitbreaderpagecontainer"].indexOf(a))return!0}function m(){n=!1;h=0;b.clearTimeout(s)}function D(){b.ue.onSushiUnload(function(){ue.event({violationType:"unresponsive-clicks",violationCount:g,totalScanned:k},"csm","csm.ArmoredCXGuardrailsViolation.3")});b.ue.onunload(function(){ue.count("armored-cxguardrails.unresponsive-clicks.violations",

g);ue.count("armored-cxguardrails.unresponsive-clicks.violationRate",g/k*100||0)})}if(b.MutationObserver&&b.addEventListener&&Object.keys&&d&&d.ue&&d.ue.log&&d.ue_unrt&&d.ue_utils){var z=d.ue_unrt,r="cel",w="unr_mcm",C="res_mcm",p=b.performance,f=d.ue_utils,n=!1,h=0,s=0,q=!1,l=0,g=0,k=0;b.addEventListener&&(b.addEventListener("mousedown",x,!0),b.addEventListener("beforeunload",m,!0),b.addEventListener("visibilitychange",m,!0),b.addEventListener("pagehide",m,!0));b.ue&&b.ue.event&&b.ue.onSushiUnload&&

b.ue.onunload&&D();(new MutationObserver(A)).observe(t,{childList:!0,attributes:!0,characterData:!0,subtree:!0})})(ue_csm,window,document);

ue_csm.ue.exec(function(g,e){if(e.ue_err){var f="";e.ue_err.errorHandlers||(e.ue_err.errorHandlers=[]);e.ue_err.errorHandlers.push({name:"fctx",handler:function(a){if(!a.logLevel||"FATAL"===a.logLevel)if(f=g.getElementsByTagName("html")[0].innerHTML){var b=f.indexOf("var ue_t0=ue_t0||+new Date();");if(-1!=b){var b=f.substr(0,b).split(String.fromCharCode(10)),d=Math.max(b.length-5-1,0),b=b.slice(d,b.length-1);a.fcsmln=b.length+1;a.cinfo=a.cinfo||{};for(var c=0;c

f.split(String.fromCharCode(10));a.cinfo=a.cinfo||{};if(!(a.f||void 0===a.l||a.l in a.cinfo))for(c=+a.l-1,d=Math.max(c-2,0),c=Math.min(c+2,b.length-1);d<=c;d++)a.cinfo[d+1+""]=b[d]}})},"fatals-context")(document,window);

ue_csm.ue.exec(function(b,e){function q(){for(var a=0;aw)d.count&&1==p-w&&(d.count("WeblabTriggerThresholdReached",1),b.ue_int&&console.error("Number of max call reached. Data will no longer be send"));else{var h=c||{};h&&-1

(h=b.ue_id,c&&c.rid&&(h=c.rid),c=h,a=encodeURIComponent(",wl="+a+"/"+l),2E3>a.length+n?(2E3

d.trigger.replay(function(a){v.apply(this,a)})}function y(){z||(f.length&&q(u),z=!0)}var s=":1234",r="//"+b.ue_furl+"/1/remote-weblab-triggers/1/OE/"+b.ue_mid+":"+b.ue_sid+":PLCHLDR_RID$s:wl-client-id%3DCSMTriger",A="PLCHLDR_RID",D=b.wtt||1E4,n=r.length+s.length,w=b.mwtc||2E3,F=e.XMLHttpRequest&&"withCredentials"in new e.XMLHttpRequest,x="String",C="Object",d=b.ue,g={},f=[],k=n,m,z=!1,p=0,B=function(){return{send:function(a){if(F){var b=new e.XMLHttpRequest;b.open("GET",a,!0);b.send()}else throw"";

}}(),u=function(){return{send:function(a){(new Image).src=a}}();e.encodeURIComponent&&(d.attach&&(d.attach("beforeunload",y),d.attach("pagehide",y)),E(),d.trigger=v)},"client-wbl-trg")(ue_csm,window);

if (ue.trigger) {

ue.trigger("UEDATA_AA_SERVERSIDE_ASSIGNMENT_CLIENTSIDE_TRIGGER_190249", "C");

}

Read more

Product details

Hardcover: 672 pages

Publisher: Cisco Press; 1 edition (July 4, 2008)

Language: English

ISBN-10: 1587202204

ISBN-13: 978-1587202209

Product Dimensions:

7.6 x 1.7 x 9.4 inches

Shipping Weight: 2.8 pounds (View shipping rates and policies)

Average Customer Review:

3.8 out of 5 stars

22 customer reviews

Amazon Best Sellers Rank:

#2,340,354 in Books (See Top 100 in Books)

I read this book, as well as the Exam Cram book for this exam, and studied a little bit from the other CCNA Security book by Richard Deal. Overall I think the Cisco Press book was the best as far as what it covers and how it words things. The key topics are clearly marked throughout the chapters so you can easily flip through the book and review them, this helps keep from having to highlight and mark things on your own. The many screen shots of SDM where helpful and the configuration examples where easy to understand. So yeah, best single study source.Some final advice:I think this book was better than the other two I studied. But I'd suggest studying from at least one other book just to get a different taste of it. You may be able to answer all the questions in this book, but fail miserably at the questions from another book because they're different. This was a tough exam, I was lucky to have SDM and a router at home to practice the stuff on and passed the exam, not a great score, but still. I honestly don't think studying ONLY this book will enable you to pass, I don't think studying any ONE book will enable you to pass, at the least you should have some way to practice everything hands-on, or "simulate" it however you can, because Cisco has questions on the exams that require you to know how to do some of the stuff hands on.

I haven't taken the CCNA Security (640-553) yet but will by the end of this month. I have been using this book as my primary source to study from and have been very disappointed.The book covers most of what is in the stated exam topics. However, there are some missing. For example, the book lists "Configure Zone-Based Firewalls in SDM" as a topic covered on the test. However, nowhere does the book show how to accomplish this task.When topics are reviewed, it is often confusing. There are a few passages I'd read and think "I don't know what they meant by any of this". Maybe it is because cryptography can be complex, but i read the chapters on cryptography and got very little out of it. The order of content is often a cause for this and sometimes the actual text itself.I do not yet know whether this book is enough to pass the test but I'd be surprised if it is. Of course you will need some lab time but that is expected. In the future, Cisco Press should be a little more particular about the quality of the books released. I did purchase IINS by Catherine Paquet per Amazon reviews and it is a significantly better book.Note: I don't hold this against the authors of these books. But the CCNA Security exam is outdated because it is using SDM. SDM has been replaced by CCP and is no longer maintained. Furthermore, it requires an old Java version (1.4.2-05 from best I can tell) which isn't overly compatible with Windows 7. The exam itself should probably be updated.

Network Security is a very broad topic. Any book that attempts so cover its many aspects is certainly taking on a very difficult task. That being said, how does this book fair? Not thrilling, but not exceptionally bad either. Let's face it, Cisco exams have become very difficult, and its nearly impossible to pass their exams without arduous effort. One needs good resources (and a good lab). On many of the topics, this book does a reasonable job. My biggest complaint is that its firewall coverage is just terrible. That chapter is confusing, uneven, disorganized, lacking in proper examples and should be completely redone. I retired a year ago as a network engineer with 30 years experience, the last 10 as a network security specialist. I've decided to do a little consulting work and figured I'd refresh my Cisco certifications to insure I was current. I previously had a CCNP and CCSP (with firewall, VPN, and IDS specializations). I've worked on PIX, ASA, Checkpoint, Netscreen, Sonicwall and Fortinet firewalls. I've also worked on F5 and IBM application layer gateways (proxies). I've taught Information Systems Security at the university level. Needless to say, I felt my background qualifies me to deal with a basic, entry level exam. However, after reading the firewall chapter in this book, I felt totally lost and confused. The Paquet book ("Implementing Cisco IOS Network Security") does a much better job on all the topics related to firewalls. Read both books and the supporting Cisco documentation on selected topics (like Zone Based Firewalls and CBAC) if you expect to pass this exam. I'll sit this exam in about two weeks. Hope my experience doesn't hinder my success.

I can't imagine being able to pass this exam without this book. topics are well organized and very well covered. The included CD has the boson test on it, which is integrally tied to the book. If you miss a question on the test their is a link that will take directly to that section of the book that covers that material.

I passed my CCNA Security after reading this. Recommend it

I read and reviewed this book prior to taken the exam, and passed with flying colors. I spent 3 weeks reading this book and reviewing the questions in it, and it made the exam easey.

This book is an easy read unlike other Cisco books which put you to sleep in 15 minutes or less. Written extremely well, and did the job of getting me my cert. Who can complain about that?

Good book but you need more to pass the examexeperience + this book + exam questions tests is right

CCNA Security Official Exam Certification Guide (Exam 640-553) PDF
CCNA Security Official Exam Certification Guide (Exam 640-553) EPub
CCNA Security Official Exam Certification Guide (Exam 640-553) Doc
CCNA Security Official Exam Certification Guide (Exam 640-553) iBooks
CCNA Security Official Exam Certification Guide (Exam 640-553) rtf
CCNA Security Official Exam Certification Guide (Exam 640-553) Mobipocket
CCNA Security Official Exam Certification Guide (Exam 640-553) Kindle

CCNA Security Official Exam Certification Guide (Exam 640-553) PDF

CCNA Security Official Exam Certification Guide (Exam 640-553) PDF

CCNA Security Official Exam Certification Guide (Exam 640-553) PDF
CCNA Security Official Exam Certification Guide (Exam 640-553) PDF

PDF Download 40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes)

PDF Download 40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes)

There are many ideas that individuals provide to increase the life quality, concerning every little thing. Right here, we also will certainly provide you a very simple suggestion to life much better. Checking out 40 Hadith About The Rights Of Muslims: Restraining The Criminal From Cursing The Muslim (Sheikhy Notes) is our tip. Please ask why we recommend this publication to read. Lots of people try to make themselves to be abundant, but sometime they forget a very straightforward thing. Checking out is really a straightforward thing, yet lots of slouch to do it. It's type of uninteresting activity and waste the moment.

40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes)

40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes)


40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes)


PDF Download 40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes)

When somebody believes that analysis is an important task to do for the human life, other may think about just how analysis will certainly be so dull. It's usual. When lots of people choose to select going someplace as well as talking with their buddies, some people favor to g to guide shops as well as hunt for the new publication released. How if you don't have sufficient time to go guide store?

Among the sources to obtain in this online collection is the 40 Hadith About The Rights Of Muslims: Restraining The Criminal From Cursing The Muslim (Sheikhy Notes) This site with this book turns into one of the finding out centres to get the sources and materials. Lots of publications from numerous sources, publishers, and also writers from around the globe are supplied. This service will certainly supply not just the support publications, the referrals, literature, as well as standard publications are offered to learn.

If you could see exactly how the book is suggested, you might should recognize who composes this book and publish it. It will actually affect the how people will certainly be appreciated to read this publication. As below, 40 Hadith About The Rights Of Muslims: Restraining The Criminal From Cursing The Muslim (Sheikhy Notes) can be acquired by searching for in some stores. Or, if you wish to obtain simple as well as rapid way, simply get it in this website. Below, we not just offer you the simplicity of checking out material, however additionally rapid way to obtain it. When you need some days to wait to get the book, you will get the rapid respond here.

Nevertheless, also this publication is developed based on the fact, one that is very intriguing is that the author is very wise to make this book simple to review as well as comprehend. Valuing the great viewers to always have reviewing routine, every author offers their ideal in using their ideas as well as works. That you are and also just what you are does not end up being any huge issue to get this publication. After seeing this website, you can inspect even more concerning this publication and afterwards discover it to recognize reading.

40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes)

Product details

Series: Sheikhy notes (Book 7)

Paperback: 93 pages

Publisher: Independently published (November 10, 2018)

Language: English

ISBN-10: 1731057776

ISBN-13: 978-1731057778

Product Dimensions:

5 x 0.2 x 8 inches

Shipping Weight: 5.6 ounces (View shipping rates and policies)

Average Customer Review:

Be the first to review this item

Amazon Best Sellers Rank:

#844,653 in Books (See Top 100 in Books)

40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) PDF
40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) EPub
40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) Doc
40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) iBooks
40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) rtf
40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) Mobipocket
40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) Kindle

40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) PDF

40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) PDF

40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) PDF
40 hadith about the rights of Muslims: Restraining the criminal from cursing the Muslim (Sheikhy notes) PDF