Connecting Networks Companion Guide

Connecting Networks Companion Guide

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Connecting Networks Companion Guide is the official supplemental textbook for the Connecting Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.   This course discusses the WAN technologies and network services required by converged applications in a complex network. The course allows you to understand the selection criteria of network devices and WAN technologies to meet network requirements. You will learn how to configure and troubleshoot network devices and resolve common issues with data link protocols. You will also develop the knowledge and skills needed to implement IPSec and virtual private network (VPN) operations in a complex network.   The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.   The book’s features help you focus on important concepts to succeed in this course:   Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.  Glossary–Consult the comprehensive Glossary with 195 terms.  Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.  Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. How To–Look for this icon to study the steps you need to learn to perform certain tasks. Interactive Activities–Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon. Videos–Watch the videos embedded within the online course. Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters. Hands-on Labs–Work through all the course labs and Class Activities that are included in the course and published in the separate Lab Manual.    

Table of Contents:
Introduction xix Chapter 1: Hierarchical Network Designs 1 Objectives 1 Key Terms 1 Introduction (1.0.1.1) 2 Hierarchical Network Design Overview (1.1) 2   Enterprise Network Campus Design (1.1.1) 2    Network Requirements (1.1.1.1) 3    Structured Engineering Principles (1.1.1.2) 4   Hierarchical Network Design (1.1.2) 4    Network Hierarchy (1.1.2.1) 4    The Access Layer (1.1.2.2) 6   The Distribution Layer (1.1.2.3) 7   The Core Layer (1.1.2.4) 9    Two-Tier Collapsed Core Design (1.1.2.5) 10 Cisco Enterprise Architecture (1.2) 10   Modular Design (1.2.1.1) 11   Modules in the Enterprise Architecture (1.2.1.2) 12 Cisco Enterprise Architecture Model (1.2.2) 14   Cisco Enterprise Architecture Model (1.2.2.1) 14   Cisco Enterprise Campus (1.2.2.2) 15   Cisco Enterprise Edge (1.2.2.3) 17   Service Provider Edge (1.2.2.4) 18   Remote Functional Area (1.2.2.5) 21    Enterprise Branch 21    Enterprise Teleworker 22    Enterprise Data Center 22 Evolving Network Architectures (1.3) 22   IT Challenges (1.3.1.1) 22   Emerging Enterprise Architectures (1.3.1.2) 23 Emerging Network Architectures (1.3.2) 24   Cisco Borderless Networks (1.3.2.1) 24   Collaboration Architecture (1.3.2.2) 25   Data Center and Virtualization (1.3.2.3) 26   Expanding the Network (1.3.2.4) 27 Summary (1.4) 29 Practice 30   Class Activities 30   Packet Tracer Activities 30 Check Your Understanding Questions 31 Chapter 2: Connecting the WAN 35 Objectives 35 Key Terms 35 Introduction (2.0.1.1) 37 WAN Technologies Overview (2.1) 37   Why a WAN? (2.1.1.1) 37   Are WANs Necessary? (2.1.1.2) 38   Evolving Networks (2.1.1.3) 39   Small Office (2.1.1.4) 39   Campus Network (2.1.1.5) 40   Branch Networks (2.1.1.6) 42   Distributed Network (2.1.1.7) 43 WAN Operations (2.1.2) 44   WANs in the OSI Model (2.1.2.1) 44   Common WAN Terminology (2.1.2.2) 45   WAN Devices (2.1.2.3) 47   Circuit-Switched Networks (2.1.2.4) 48   Packet-Switched Networks (2.1.2.5) 50 Selecting a WAN Technology (2.2) 51   WAN Link Connection Options (2.2.1.1) 51   Service Provider Network Infrastructure (2.2.1.2) 52 Private WAN Infrastructures (2.2.2) 54   Leased Lines (2.2.2.1) 54   Dialup (2.2.2.2) 55   ISDN (2.2.2.3) 56   Frame Relay (2.2.2.4) 58   ATM (2.2.2.5) 59   Ethernet WAN (2.2.2.6) 60   MPLS (2.2.2.7) 62   VSAT (2.2.2.8) 63 Public WAN Infrastructure (2.2.3) 64   DSL (2.2.3.1) 64   Cable (2.2.3.2) 65   Wireless (2.2.3.3) 66   3G/4G Cellular (2.2.3.4) 67   VPN Technology (2.2.3.5) 68 Selecting WAN Services (2.2.4) 70   Choosing a WAN Link Connection (2.2.4.1, 2.2.4.2) 70    What Is the Purpose of the WAN? 70    What Is the Geographic Scope? 70    What Are the Traffic Requirements? 71 Summary (2.3) 73 Practice 74   Class Activities 74   Labs 74 Check Your Understanding Questions 74 Chapter 3: Point-to-Point Connections 79 Objectives 79 Key Terms 79 Introduction (3.0.1.1) 80 Serial Point-to-Point Overview (3.1) 80   Serial Communications (3.1.1) 81    Serial and Parallel Ports (3.1.1.1) 81    Serial Communication (3.1.1.2) 82    Point-to-Point Communication Links (3.1.1.3) 84    Time-Division Multiplexing (3.1.1.4) 85    Statistical Time-Division Multiplexing (3.1.1.5) 86    TDM Examples — Sonet and SDM (3.1.1.6) 87    Demarcation Point (3.1.1.7) 88    DTE-DCE (3.1.1.8) 90    Serial Cables (3.1.1.9) 91    Serial Bandwidth (3.1.1.10) 94   HDLC Encapsulation (3.1.2) 96    WAN Encapsulation Protocols (3.1.2.1) 96    HDLC Encapsulation (3.1.2.2) 97    HDLC Frame Types (3.1.2.3) 98    Configuring HDLC Encapsulation (3.1.2.4) 100    Troubleshooting a Serial Interface (3.1.2.5) 100 PPP Operation (3.2) 104   Benefits of PPP (3.2.1) 104    Introducing PPP (3.2.1.1) 104    Advantages of PPP (3.2.1.2) 106   LCP and NCP (3.2.2) 106    PPP Layered Architecture (3.2.2.1) 106    PPP — Link Control Protocol (LCP) (3.2.2.2) 107    PPP — Network Control Protocol (NCP) (3.2.2.3) 108    PPP Frame Structure (3.2.2.4) 108   PPP Sessions (3.2.3) 109    Establishing a PPP Session (3.2.3.1) 110    LCP Operation (3.2.3.2) 111    LCP Packet (3.2.3.3) 113    PPP Configuration Options (3.2.3.4) 115    NCP Explained (3.2.3.5) 117 Configure PPP (3.3) 118   Configure PPP (3.3.1) 118    PPP Configuration Options (3.3.1.1) 119    PPP Basic Configuration Command (3.3.1.2) 120    PPP Compression Commands (3.3.1.3) 121    PPP Link Quality Monitoring Command (3.3.1.4) 122    PPP Multilink Commands (3.3.1.5) 123    Verifying PPP Configuration (3.3.1.6) 125   PPP Authentication (3.3.2) 126    PPP Authentication Protocols (3.3.2.1) 127    Password Authentication Protocol (PAP) (3.3.2.2) 127    Challenge Handshake Authentication Protocol (CHAP) (3.3.2.3) 129    PPP Encapsulation and Authentication Process (3.3.2.4) 131    Configuring PPP Authentication (3.3.2.5) 134    Configuring PPP with Authentication (3.3.2.6) 136 Troubleshoot WAN Connectivity (3.4) 138   Troubleshoot PPP (3.4.1) 138    Troubleshooting PPP Serial Encapsulation (3.4.1.1) 138    Debug PPP (3.4.1.2) 140   Troubleshooting a PPP Configuration with Authentication (3.4.1.3) 142 Summary (3.5) 145 Practice 146   Class Activities 146   Labs 146   Packet Tracer Activities 146 Check Your Understanding Questions 147 Chapter 4: Frame Relay 153 Objectives 153 Key Terms 153 Introduction (4.0.1.1) 154 Introduction to Frame Relay (4.1) 154   Benefits of Frame Relay (4.1.1) 155    Introducing Frame Relay (4.1.1.1) 155    Benefits of Frame Relay WAN Technology (4.1.1.2) 156    Dedicated Line Requirements (4.1.1.3) 157    Cost-Effectiveness and Flexibility of Frame Relay (4.1.1.4) 159   Frame Relay Operation (4.1.2) 160    Virtual Circuits (4.1.2.1) 160    Multiple Virtual Circuits (4.1.2.2) 163    Frame Relay Encapsulation (4.1.2.3) 165    Frame Relay Topologies (4.1.2.4, 4.1.2.5) 167    Frame Relay Address Mapping (4.1.2.6) 171    Local Management Interface (LMI) (4.1.2.7) 174    LMI Extensions (4.1.2.8) 175    Using LMI and Inverse ARP to Map Addresses (4.1.2.9) 178   Advanced Frame Relay Concepts (4.1.3) 180    Access Rate and Committed Information Rate (4.1.3.1) 180    Frame Relay Example (4.1.3.2) 181    Bursting (4.1.3.3) 183    Frame Relay Flow Control (4.1.3.4) 184 Configure Frame Relay (4.2) 187   Configure Basic Frame Relay (4.2.1) 187    Basic Frame Relay Configuration Commands (4.2.1.1) 187    Configuring a Static Frame Relay Map (4.2.1.2) 190    Verify a Static Frame Relay Map (4.2.1.3) 192   Configure Subinterfaces (4.2.2) 193    Reachability Issues (4.2.2.1) 193    Solving Reachability Issues (4.2.2.2) 196    Configuring Point-to-Point Subinterfaces (4.2.2.3) 199    Example: Configuring Point-to-Point Subinterfaces (4.2.2.4) 200 Troubleshoot Connectivity (4.3) 203   Troubleshoot Frame Relay (4.3.1) 203    Verifying Frame Relay Operation: Frame Relay Interface (4.3.1.1) 203    Verifying Frame Relay Operation: LMI Operations (4.3.1.2) 204    Verifying Frame Relay Operation: PVC Status (4.3.1.3) 205    Verifying Frame Relay Operation: Inverse ARP (4.3.1.4) 205    Troubleshooting Frame Relay Operation (4.3.1.5) 207 Summary (4.4) 209 Practice 210   Class Activities 210   Labs 210   Packet Tracer Activities 210 Check Your Understanding Questions 211 Chapter 5: Network Address Translation for IPv4 217 Objectives 217 Key Terms 217 Introduction (5.0.1.1) 218 NAT Operation (5.1) 219   NAT Characteristics (5.1.1) 219    IPv4 Private Address Space (5.1.1.1) 219    What Is NAT? (5.1.1.2) 220    NAT Terminology (5.1.1.3) 221    How NAT Works (5.1.1.5) 224   Types of NAT (5.1.2) 225    Static NAT (5.1.2.1) 225    Dynamic NAT (5.1.2.2) 226    Port Address Translation (PAT) (5.1.2.3) 227    Next Available Port (5.1.2.4) 228    Comparing NAT and PAT (5.1.2.5) 230 Benefits of NAT (5.1.3) 231    Benefits of NAT (5.1.3.1) 231    Disadvantages of NAT (5.1.3.2) 232 Configuring NAT (5.2) 233   Configuring Static NAT (5.2.1) 233    Configuring Static NAT (5.2.1.1) 233    Analyzing Static NAT (5.2.1.2) 235    Verifying Static NAT (5.2.1.3) 237   Configuring Dynamic NAT (5.2.2) 238    Dynamic NAT Operation (5.2.2.1) 238    Configuring Dynamic NAT (5.2.2.2) 239    Analyzing Dynamic NAT (5.2.2.3) 242    Verifying Dynamic NAT (5.2.2.4) 244   Configuring Port Address Translation (PAT) (5.2.3) 247    Configuring PAT: Address Pool (5.2.3.1) 247    Configuring PAT: Single Address (5.2.3.2) 249    Analyzing PAT (5.2.3.3) 251    Verifying PAT (5.2.3.4) 253   Port Forwarding (5.2.4) 255    Port Forwarding (5.2.4.1) 255    SOHO Example (5.2.4.2) 257    Configuring Port Forwarding with IOS (5.2.4.3) 258   Configuring NAT and IPv6 (5.2.5) 260    NAT for IPv6? (5.2.5.1) 260    IPv6 Unique Local Addresses (5.2.5.2) 262    NAT for IPv6 (5.2.5.3) 263 Troubleshooting NAT (5.3) 264    Troubleshooting NAT: show Commands (5.3.1.1) 264    Troubleshooting NAT: debug Command (5.3.1.2) 266    Case Study (5.3.1.3) 268 Summary (5.4) 271 Practice 272      Class Activities 272   Labs 272   Packet Tracer Activities 272 Check Your Understanding Questions 273 Chapter 6: Broadband Solutions 279 Objectives 279 Key Terms 279 Introduction (6.0.1.1) 280 Teleworking (6.1) 280  Benefits of Teleworking (6.1.1) 280    Introducing Teleworking (6.1.1.1) 281    Employer Benefits of Teleworking (6.1.1.2) 281    Community and Government Benefits (6.1.1.3) 282    Individual Benefits of Teleworking (6.1.1.4) 283    Detriments to Telework (6.1.1.5) 283   Business Requirements for Teleworker Services (6.1.2) 284    Teleworker Solution (6.1.2.1) 284   Teleworker Connectivity Requirements (6.1.2.2) 286 Comparing Broadband Solutions (6.2) 287   Cable (6.2.1) 287    What is a Cable System? (6.2.1.1) 287    Cable and the Electromagnetic Spectrum (6.2.1.2) 289    DOCSIS (6.2.1.3) 290    Cable Components (6.2.1.4) 291   DSL (6.2.2) 293    What is DSL? (6.2.2.1) 293    DSL Connections (6.2.2.2) 294    Separating Voice and Data in ADSL (6.2.2.3) 295 Broadband Wireless (6.2.3) 298    Types of Broadband Wireless Technologies (6.2.3.1, 6.2.3.2) 298   Selecting Broadband Solutions (6.2.4) 303    Comparing Broadband Solutions (6.2.4.1) 303 Configuring xDSL Connectivity (6.3) 304   PPPoE Overview (6.3.1) 304    PPPoE Motivation (6.3.1.1) 304    PPPoE Concepts (6.3.1.2) 306   Configuring PPPoE (6.3.2) 306    PPPoE Configuration (6.3.2.1) 307 Summary (6.4) 309 Practice 310   Class Activities 310   Labs 310 Check Your Understanding Questions 310 Chapter 7: Securing Site-to-Site Connectivity 313 Objectives 313 Key Terms 313 Introduction (7.0.1.1) 314 VPNs (7.1) 314   Fundamentals of VPNs (7.1.1) 314    Introducing VPNs (7.1.1.1) 315    Benefits of VPNs (7.1.1.2) 316   Types of VPNs (7.1.2) 317    Remote-Access VPNs (7.1.2.2) 318 Site-to-Site GRE Tunnels (7.2) 319   Fundamentals of Generic Routing Encapsulation (7.2.1) 319    Introduction to GRE (7.2.1.1) 319    Characteristics of GRE (7.2.1.2) 320    Configuring GRE Tunnels (7.2.2) 321    GRE Tunnel Configuration (7.2.2.1) 322    GRE Tunnel Verification (7.2.2.2) 324 Introducing IPsec (7.3) 326   Internet Protocol Security (7.3.1) 326    IPsec (7.3.1.1) 326    IPsec Security Services (7.3.1.2) 327   IPsec Framework (7.3.2) 328    Confidentiality with Encryption (7.3.2.1) 328    Encryption Algorithms (7.3.2.2) 330    Diffie-Hellman Key Exchange (7.3.2.3) 332    Integrity with Hash Algorithms (7.3.2.4) 332    IPsec Authentication (7.3.2.5) 334    IPsec Protocol Framework (7.3.2.6) 335 Remote Access (7.4) 337   Remote-Access VPN Solutions (7.4.1) 337    Types of Remote-Access VPNs (7.4.1.1) 337    Cisco SSL VPN (7.4.1.2) 338    Cisco SSL VPN Solutions (7.4.1.3) 340   IPsec Remote-Access VPNs (7.4.2) 341    IPsec Remote Access (7.4.2.1) 341    Cisco Easy VPN Server and Remote (7.4.2.2) 342    Cisco Easy VPN Client (7.4.2.3) 343    Comparing IPsec and SSL (7.4.2.4) 345 Summary (7.5) 347 Practice 348   Class Activities 348   Labs 348   Packet Tracer Activities 348 Check Your Understanding Questions 348 Chapter 8: Monitoring the Network 351 Objectives 351 Key Terms 351 Introduction (8.0.1.1) 352 Syslog (8.1) 352   Syslog Operation (8.1.1) 352    Introduction to Syslog (8.1.1.1) 352    Syslog Operation (8.1.1.2) 354    Syslog Message Format (8.1.1.3) 355    Service Timestamp (8.1.1.4) 357   Configuring Syslog (8.1.2) 358    Syslog Server (8.1.2.1) 358    Default Logging (8.1.2.2) 359    Router and Switch Commands for Syslog Clients (8.1.2.3) 360    Verifying Syslog (8.1.2.4) 362 SNMP (8.2) 364   SNMP Operation (8.2.1) 364    Introduction to SNMP (8.2.1.1) 364    SNMP Operation (8.2.1.2) 365    SNMP Agent Traps (8.2.1.3) 366    SNMP Versions (8.2.1.4) 368    Community Strings (8.2.1.5) 370    Management Information Base Object ID (8.2.1.6) 371   Configuring SNMP (8.2.2) 374    Steps for Configuring SNMP (8.2.2.1) 374    Verifying SNMP Configuration (8.2.2.2) 375    Security Best Practices (8.2.2.3) 378 NetFlow (8.3) 380   NetFlow Operation (8.3.1) 380    Introducing NetFlow (8.3.1.1) 380    Understanding NetFlow (8.3.1.2) 381    Network Flows (8.3.1.3) 383   Configuring NetFlow (8.3.2) 384    Verifying NetFlow (8.3.2.2) 386   Examining Traffic Patterns (8.3.3) 390    Identifying NetFlow Collector Functions (8.3.3.1) 390    NetFlow Analysis with a NetFlow Collector (8.3.3.2) 392 Summary (8.4) 397 Practice 397   Class Activities 398   Labs 398   Packet Tracer Activities 398 Check Your Understanding Questions 398 Chapter 9: Troubleshooting the Network 401 Objectives 401 Key Terms 401 Introduction (9.0.1.1) 402 Troubleshooting with a Systematic Approach (9.1) 402   Network Documentation (9.1.1) 402    Documenting the Network (9.1.1.1) 403    Network Topology Diagrams (9.1.1.2) 406    Network Baseline Performance Level (9.1.1.3) 408    Establishing a Network Baseline (9.1.1.4) 409    Measuring Data (9.1.1.5) 412   Troubleshooting Process (9.1.2) 415    General Troubleshooting Procedures (9.1.2.1) 415    Gathering Symptoms (9.1.2.2) 417    Questioning End Users (9.1.2.3) 418   Isolating the Issue Using Layered Models (9.1.3) 419    Using Layered Models for Troubleshooting (9.1.3.1) 419    Troubleshooting Methods (9.1.3.2, 9.1.3.3) 422    Guidelines for Selecting a Troubleshooting Method (9.1.3.4) 425 Network Troubleshooting (9.2) 426   Troubleshooting Tools (9.2.1) 426    Software Troubleshooting Tools (9.2.1.1, 9.2.1.2) 426    Hardware Troubleshooting Tools (9.2.1.3) 431    Using a Syslog Server for Troubleshooting (9.2.1.4) 435   Symptoms and Causes of Network Troubleshooting (9.2.2) 437    Physical Layer Troubleshooting (9.2.2.1) 437    Data Link Layer Troubleshooting (9.2.2.2) 439    Network Layer Troubleshooting (9.2.2.3) 441    Transport Layer Troubleshooting — ACLs (9.2.2.4) 443    Transport Layer Troubleshooting — NAT for IPv4 (9.2.2.5) 445    Application Layer Troubleshooting (9.2.2.6) 446   Troubleshooting IP Connectivity (9.2.3) 448    Components of Troubleshooting End-to-End Connectivity (9.2.3.1) 448    End-to-End Connectivity Problem Initiates Troubleshooting (9.2.3.2) 450    Step 1 - Verify the Physical Layer (9.2.3.3) 452    Step 2 - Check for Duplex Mismatches (9.2.3.4) 454    Step 3 - Verify Layer 2 and Layer 3 Addressing on the Local Network (9.2.3.5) 456    Step 4 - Verify Default Gateway (9.2.3.6) 461    Step 5 - Verify Correct Path (9.2.3.7) 464    Step 6 - Verify the Transport Layer (9.2.3.8) 468    Step 7 - Verify ACLs (9.2.3.9) 469    Step 8 - Verify DNS (9.2.3.10) 471     Summary (9.3) 474 Practice 475   Class Activities 475   Packet Tracer Activities 475 Check Your Understanding Questions 476 Appendix A: Answers to the “Check Your Understanding” Questions 479 Glossary 499 TOC, 9781587133329, 3/25/2014


Best Sellers


Product Details
  • ISBN-13: 9781587133329
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Depth: 32
  • Language: English
  • Returnable: N
  • Spine Width: 31 mm
  • Width: 209 mm
  • ISBN-10: 1587133326
  • Publisher Date: 15 May 2014
  • Binding: Hardback
  • Height: 238 mm
  • No of Pages: 576
  • Series Title: Cisco Networking Academy
  • Weight: 1220 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Connecting Networks Companion Guide
Pearson Education (US) -
Connecting Networks Companion Guide
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Connecting Networks Companion Guide

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA