Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide
Home > Computing and Information Technology > Computer certification > Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320
Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320

Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition ·         Learn about the Cisco modular enterprise architecture ·         Create highly available enterprise network designs ·         Develop optimum Layer 3 designs ·         Examine advanced WAN services design considerations ·         Evaluate data center design considerations ·         Design effective modern WAN and data center designs ·         Develop effective migration approaches to IPv6 ·         Design resilient IP multicast networks ·         Create effective network security designs Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition, is a Cisco-authorized, self-paced learning tool for CCDP foundation learning. This book provides you with the knowledge needed to perform the conceptual, intermediate, and detailed design of a network infrastructure that supports desired network solutions over intelligent network services to achieve effective performance, scalability, and availability. This book presents concepts and examples necessary to design converged enterprise networks. You learn additional aspects of modular campus design, advanced routing designs, WAN service designs, enterprise data center design, IP multicast design, and security design. Advanced and modern network infrastructure solutions, such as virtual private networks (VPN), Cisco Intelligent WAN (IWAN), and Cisco Application-Centric Infrastructure (ACI), are also covered. Chapter-ending review questions illustrate and help solidify the concepts presented in the book. Whether you are preparing for CCDP certification or CCDE certification, or simply want to gain a better understanding of designing scalable and reliable network architectures, you will benefit from the foundation information presented in this book. Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit https://learningnetwork.cisco.com. Category: Cisco Certification Covers: CCDP ARCH 300-320    

Table of Contents:
Introduction Part I Designing Reliable and Resilient Enterprise Layer 2 and Layer 3 Networks Chapter 1 Optimal Enterprise Campus Design Enterprise Campus Design Principles Hierarchy     Access Layer     Distribution Layer     Core Layer     Enterprise Campus Two-Tier Layer Model     Enterprise Campus Three-Tier Layer Model Modularity     Modular Enterprise Campus Architecture and Modular Enterprise Campus with OSPF     Access-Distribution Block Flexibility     Campus Network Virtualization     Campus Network Virtualization Technologies and Techniques         VLAN Assignment         Virtual Routing and Forwarding         Path Isolation Techniques Resiliency     Enterprise Campus High-Availability Design Considerations     VLANs, Trunking, and Link Aggregation Design Recommendations         VLAN Design         Trunking         Link Aggregation     First-Hop Redundancy Protocol (FHRP)         IP Gateway Redundancy Optimization with VSS     Layer 2 to Layer 3 Boundary Design Options and Considerations         Distribution-to-Distribution Link Design Considerations         A Summary of Enterprise Campus HA Designs Summary Review Questions References Chapter 2 EIGRP Design Scalable EIGRP Design Overview EIGRP with Multiple Autonomous Systems     EIGRP Queries     Multiple EIGRP Autonomous System Drivers EIGRP Multilayer Architectures     EIGRP Two-Layer Hierarchy Architecture     EIGRP Three-Layer Hierarchy Architecture EIGRP Hub-and-Spoke Design     Summarization Challenges         Route Summarization Black Holes         Route Summarization and Suboptimal Routing     EIGRP Hub-and-Spoke Scalability Optimization         EIGRP Stub Leaking     EIGRP DMVPN Scaling EIGRP Fast Convergence Design Considerations     Bidirectional Forwarding Detection EIGRP Graceful Restart/NSF Considerations Summary Review Questions Chapter 3 OSPF Design OSPF Scalability Design Considerations     Adjacent Neighbors     Routing Information in the Area and the Routed Domain     Numbers of Routers in an Area     Number of Areas per ABR OSPF Area Design Considerations     OSPF Hierarchy     Area and Domain Summarization OSPF Full-Mesh Design OSPF Hub-and-Spoke Design     OSPF ABR Placement in Hub-and-Spoke Design     Number of Areas in OSPF Hub-and-Spoke Design     OSPF Network Types in Hub-and-Spoke Design OSPF Convergence Design Considerations and Optimization Techniques     Event Detection     OSPF Event Propagation     OSPF Event Processing     OSPF Flooding Reduction     OSPF Database Overload Protection Summary Review Questions Chapter 4 IS-IS Design Protocol Overview     IS-IS Characteristics     Integrated IS-IS Routing IS-IS Hierarchical Architecture Overview     IS-IS Router and Link Types     IS-IS Adjacencies IS-IS Versus OSPF     Similarities Between IS-IS and OSPF     OSPF and IS-IS Characteristics     Integrated IS-IS and OSPF Area Designs         OSPF Area Design         Integrated IS-IS Area Design IS-IS Technical Deep Dive     IS-IS Addressing         IS-IS Packets         IS-IS Information Data Flow         IS-IS Network Types         IS-IS Protocol Operations         Level 1 and Level 2 LSPs and IIHs     IS-IS Link-State Packets Flooding     IS-IS LSDB Synchronization IS-IS Design Considerations     IS-IS Routing Logic Overview         Advanced IS-IS Routing     Route Leaking     Asymmetric Versus Symmetric IS-IS Routing     IS-IS Routing over NBMA Hub-and-Spoke     IS-IS Routing over a Full-Mesh Network     Flat IS-IS Routing Design     Hierarchal IS-IS Design     IS-IS Routes Summarization     Integrated IS-IS for IPv6         IS-IS Single-Topology Restrictions         Multitopology IS-IS for IPv6     Final Thoughts on IS-IS Routing Design Summary Review Questions Chapter 5 Border Gateway Protocol Design BGP Overview     BGP Speaker Types     BGP Loop Prevention and Split-Horizon Rule     BGP Path Attributes and Path Selection (Review)         BGP Path Attributes         How BGP Selects Paths Designing Scalable iBGP Networks     iBGP Scalability Limitations     IBGP Scalability Solutions         BGP Route Reflectors         BGP Confederations         BGP Confederations Versus BGP Route Reflectors BGP Route Reflector Design     Route Reflector Split-Horizon Rule     BGP Route Reflectors Redundancy Design Options and Considerations         Route Reflector Clusters         Loop-Prevention Mechanisms         Congruence of Physical and Logical Networks         Hierarchical Route Reflector Design     Route Reflector Potential Network Design Issues Enhancing the Design of BGP Policies with BGP Communities     BGP Community Attribute Overview     Well-Known BGP Communities     BGP Named Community List     Planning for the Use of BGP Communities Case Study: Designing Enterprise wide BGP Policies Using BGP Communities     Enterprise BGP Policy Requirements     BGP Community Solution Design         Solution Detailed Design and Traffic Flow BGP Load-Sharing Design     Single-Homing Versus Multihoming     Dual-Homing and Multihoming Design Considerations         Single-Homed, Multiple Links         Dual-Homed to One ISP Using a Single Local Edge Router         Dual-Homed to One ISP Using Multiple Edge Routers         Multihoming with Two ISPs Using a Single Local Edge Router         Multihoming with Two ISPs Using Multiple Local Edge Routers Summary Review Questions Part II Enterprise IPv6 Design Considerations and Challenges Chapter 6 IPv6 Design Considerations in the Enterprise IPv6 Deployment and Design Considerations     Business and Network Discovery Phase     Assessment Phase     Planning and Design Phase     Implementation and Optimization Phases Considerations for Migration to IPv6 Design     Acquiring IPv6 Prefixes         Provider Independent Versus Provider Assigned     Where to Start the Migration     Migration Models and Design Considerations         IPv6 Island         IPv6 WAN IPv6 Transition Mechanisms     Dual Stack     NAT64 and DNS64     Manual Tunnels     Tunnel Brokers     6 Rapid Deployment     Dual-Stack Lite (DS-Lite)     Locator/ID Separation Protocol (LISP)         LISP Site Edge Devices         LISP Infrastructure Devices Final Thoughts on IPv6 Transition Mechanisms Summary Review Questions Chapter 7 Challenges of the Transition to IPv6 IPv6 Services     Name Services         Implementation Recommendations     Addressing Services         Implementation Recommendations     Security Services Link Layer Security Considerations     Application Support         Application Adaptation         Application Workarounds     Control Plane Security     Dual-Stack Security Considerations     Tunneling Security Considerations     Multihoming Summary Review Questions Part III Modern Enterprise Wide-Area Networks Design Chapter 8 Service Provider—Managed VPNs Choosing Your WAN Connection Layer 3 MPLS VPNs     MPLS VPN Architecture     Enterprise Routing Considerations     Provider Edge (PE) Router Architecture         Route Distinguishers         Route Target (RT)     PE-CE Routing Protocol         Using EIGRP as the PE-CE Routing Protocol         Using OSPF as the PE-CE Routing Protocol         Using BGP as the PE-CE Routing Protocol Case Study: MPLS VPN Routing Propagation     Forwarding in MPLS VPN Layer 2 MPLS VPN Services     Virtual Private Wire Service (VPWS)     Virtual Private LAN Service (VPLS)         VPLS Scalability Considerations         VPLS Resiliency Considerations     VPLS Versus VPWS Summary Review Questions Chapter 9 Enterprise-Managed WANs Enterprise-Managed VPN Overview GRE Overview Multipoint GRE Overview Point-to-Point and Multipoint GRE Comparison IPsec Overview     IPsec and GRE     IPsec and Virtual Tunnel Interface IPsec and Dynamic VTI DMVPN Overview     DMVPN Phase 1     DMVPN Phase 2     DMVPN Phase 3 Case Study: EIGRP DMVPN     EIGRP over DMVPN Phase 1     EIGRP over DMVPN Phase 2     EIGRP over DMVPN Phase 3     DMVPN Phase 1—3 Summary DMVPN and Redundancy Case Study: MPLS/VPN over GRE/DMVPN SSL VPN Overview FlexVPN Overview     FlexVPN Architecture     FlexVPN Capabilities     FlexVPN Configuration Blocks GETVPN Summary Review Questions Chapter 10 Enterprise WAN Resiliency Design WAN Remote-Site Overview MPLS Layer 3 WAN Design Models Common Layer 2 WAN Design Models Common VPN WAN Design Models 3G/4G VPN Design Models Remote Site Using Local Internet Remote-Site LAN Case Study: Redundancy and Connectivity     ATM WAN Design     Remote-Site (Branch Office) WAN Design     Regional Offices WAN Design     Basic Traffic Engineering Techniques NGWAN, SDWAN, and IWAN Solution Overview     Transport-Independent Design     Intelligent Path Control     Application Optimization     Secure Connectivity     Management IWAN Design Overview     IWAN Hybrid Design Model Cisco PfR Overview     Cisco PfR Operations     Cisco IWAN and PfRv3     Cisco PfRv3 Design and Deployment Considerations Enterprise WAN and Access Management     APIC-EM     Design of APIC-EM Summary Review Questions Part IV Enterprise Data Center Designs Chapter 11 Multitier Enterprise Data Center Designs Case Study 1: Small Data Centers (Connecting Servers to an Enterprise LAN) Case Study 2: Two-Tier Data Center Network Architecture Case Study 3: Three-Tier Data Center Network Architecture     Data Center Inter-VLAN Routing     End of Row Versus Top of Rack Design     Fabric Extenders     Data Center High Availability     Network Interface Controller Teaming Summary Review Questions Chapter 12 New Trends and Techniques to Design Modern Data Centers The Need for a New Network Architecture Limitations of Current Networking Technology Modern Data Center Design Techniques and Architectures     Spine-Leaf Data Center Design     Network Overlays         Cisco Fabric Path         Virtual Extensible LAN (VXLAN)     VXLAN Tunnel Endpoint     Remote VTEP Discovery and Tenant Address Learning     VXLAN Control-Plane Optimization     Software-Defined Networking         How SDN Can Help         Selection Criteria of SDN Solutions         SDN Requirements         SDN Challenges         Direction of Nontraditional SDN Multitenant Data Center     Secure Tenant Separation         Layer 3 Separation with VRF-Lite         Device-Level Virtualization and Separation     Case Study: Multitenant Data Center     Microsegmentation with Overlay Networks Summary Review Questions References Chapter 13 Cisco Application-Centric Infrastructure ACI Characteristics How the Cisco ACI Addresses Current Networking Limitations Cisco ACI Architecture Components     Cisco Application Policy Infrastructure Controller (APIC)         APIC Approach Within the ACI Architecture     Cisco ACI Fabric ACI Network Virtualization Overlays Application Design Principles with the Cisco ACI Policy Model     What Is an Endpoint Group in Cisco ACI?         Design EPGs     ACI Fabric Access Polices     Building Blocks of a Tenant in the Cisco ACI     Crafting Applications Design with the Cisco ACI     ACI Interaction with External Layer 2 Connections and Networks         Connecting ACI to the Outside Layer 2 Domain         ACI Integration with STP-Based Layer LAN ACI Routing     First-Hop Layer 3 Default Gateway in ACI     Border Leaves     Route Propagation inside the ACI Fabric     Connecting the ACI Fabric to External Layer 3 Domains     Integration and Migration to ACI Connectivity Options Summary Review Questions References Chapter 14 Data Center Connections Data Center Traffic Flows     Traffic Flow Directions     Traffic Flow Types The Need for DCI IP Address Mobility Case Study: Dark Fiber DCI Pseudowire DCI     Virtual Private LAN Service DCI     Customer-Managed Layer 2 DCI Deployment Models         Any Transport over MPLS over GRE         Customer-Managed Layer 2 DCI Deployment         Layer 2 DCI Caveats         Overlay Transport Virtualization DCI     Overlay Networking DCI     Layer 3 DCI Summary Review Questions Part V Design QoS for Optimized User Experience Chapter 15 QoS Overview QoS Overview IntServ versus DiffServ Classification and Marking     Classifications and Marking Tools     Layer 2 Marking: IEEE 802.1Q/p Class of Service     Layer 3 Marking: IP Type of Service     Layer 3 Marking: DSCP Per-Hop Behaviors     Layer 2.5 Marking: MPLS Experimental Bits     Mapping QoS Markings between OSI Layers     Layer 7 Classification: NBAR/NBAR2 Policers and Shapers     Token Bucket Algorithms Policing Tools: Single-Rate Three-Color Marker Policing Tools: Two-Rate Three-Color Marker Queuing Tools     Tx-Ring     Fair Queuing     CBWFQ Dropping Tools     DSCP-Based WRED     IP ECN Summary Review Questions Chapter 16 QoS Design Principles and Best Practices QoS Overview Classification and Marking Design Principles Policing and Remarking Design Principles Queuing Design Principles Dropping Design Principles Per-Hop Behavior Queue Design Principles RFC 4594 QoS Recommendation QoS Strategy Models     4-Class QoS Strategy     8-Class QoS Strategy     12-Class QoS Strategy Summary Review Questions Chapter 17 Campus, WAN, and Data Center QoS Design Campus QoS Overview     VoIP and Video     Buffers and Bursts     Trust States and Boundaries         Trust States and Boundaries Example         Dynamic Trust State     Classification/Marking/Policing QoS Model     Queuing/Dropping Recommendations     Link Aggregation “EtherChannel” QoS Design     Practical Example of Campus QoS Design WAN QoS Overview     Platform Performance Considerations     Latency and Jitter Considerations     Queuing Considerations     Shaping Considerations     Practical Example of WAN and Branch QoS Data Center QoS Overview     High-Performance Trading Architecture     Big Data Architecture     Case Study: Virtualized Multiservice Architectures     Data Center Bridging Toolset     Case Study: DC QoS Application Summary Review Questions Chapter 18 MPLS VPN QoS Design The Need for QoS in MPLS VPN Layer 2 Private WAN QoS Administration Fully Meshed MPLS VPN QoS Administration MPLS DiffServ Tunneling Modes     Uniform Tunneling Mode     Short-Pipe Tunneling Mode     Pipe Tunneling Mode Sample MPLS VPN QoS Roles Summary Review Questions Chapter 19 IPsec VPN QoS Design The Need for QoS in IPsec VPN VPN Use Cases and Their QoS Models IPsec Refresher IOS Encryption and Classification: Order of Operations MTU Considerations DMVPN QoS Considerations GET VPN QoS Considerations Summary Review Questions Part VI IP Multicast Design Chapter 20 Enterprise IP Multicast Design How Does IP Multicast Work?     Multicast Group     IP Multicast Service Model     Functions of a Multicast Network Multicast Protocols Multicast Forwarding and RPF Check     Case Study 1: RPF Check Fails and Succeeds Multicast Protocol Basics     Multicast Distribution Trees Identification PIM-SM Overview     Receiver Joins PIM-SM Shared Tree     Registered to RP     PIM-SM SPT Switchover Multicast Routing Table Basic SSM Concepts     SSM Scenario Bidirectional PIM     PIM Modifications for Bidirectional Operation         DF Election         DF Election Messages     Case Study 2: DF Election Summary Review Questions Chapter 21 Rendezvous Point Distribution Solutions Rendezvous Point Discovery     Rendezvous Placement     Auto-RP         Auto-RP Candidate RPs         Auto-RP Mapping Agents         Auto-RP and Other Routers         Case Study: Auto-RP Operation         Auto-RP Scope Problem     PIMv2 BSR         PIMv2 BSR: Candidate RPs         PIMv2 BSR: Bootstrap Router         PIMv2 BSR: All PIMv2 Routers         BSR Flooding Problem     IPv6 Embedded Rendezvous Point Anycast RP Features Anycast RP Example MSDP Protocol Overview     MSDP Neighbor Relationship     Case Study: MSDP Operation Summary Review Questions Part VII Designing Optimum Enterprise Network Security Chapter 22 Designing Security Services and Infrastructure Protection Network Security Zoning Cisco Modular Network Architecture Cisco Next-Generation Security Designing Infrastructure Protection     Infrastructure Device Access     Routing Infrastructure     Device Resiliency and Survivability     Network Policy Enforcement     Switching Infrastructure     SDN Security Considerations Summary Review Questions Chapter 23 Designing Firewall and IPS Solutions Firewall Architectures Virtualized Firewalls Case Study 1: Separation of Application Tiers     Securing East-West Traffic Case Study 2: Implementing Firewalls in a Data Center Case Study 3: Firewall High Availability IPS Architectures Case Study 4: Building a Secure Campus Edge Design (Internet and Extranet Connectivity)     Campus Edge     Connecting External Partners         Challenges of Connecting External Partners         Extranet Topology: Remote LAN Model         Extranet Topology: Interconnect Model         Extranet: Security and Multitenant Segmentation Summary Review Questions Chapter 24 IP Multicast Security Multicast Security Challenges Problems in the Multicast Network Multicast Network Security Considerations     Network Element Security     Security at the Network Edge         Securing Auto-RP and BSR         MSDP Security     PIM and Internal Multicast Security         Multicast Sender Control         Multicast Receiver Controls         Multicast Admission Controls Summary Review Questions Chapter 25 Designing Network Access Control Solutions IEEE 802.1X Overview Extensible Authentication Protocol 802.1X Supplicants IEEE 802.1X Phased Deployment Cisco TrustSec     Profiling Service     Security Group Tag Case Study: Authorization Options Summary Review Questions Part VIII Design Scenarios Chapter 26 Design Case Studies Case Study 1: Design Enterprise Connectivity     Detailed Requirements and Expectations     Design Analysis and Task List     Selecting a Replacement Routing Protocol     Designing for the New Routing Protocol     OSPF Design Optimization     Planning and Designing the Migration from the Old to the New Routing     Scaling the Design Case Study 2: Design Enterprise BGP Network with Internet Connectivity     Detailed Requirements and Expectations     Design Analysis and Task List     Choosing the Routing Protocol     Choosing the Autonomous System Numbers     BGP Connectivity         BGP Sessions         BGP Communities     Routing Policy         Routing Policy in North American Sites         Routing Policy in European and Asian Sites     Internet Routing         Public IP Space Selection         Main HQ Multihoming         Default Routing Case Study 3: Design Enterprise IPv6 Network     Detailed Requirements and Expectations     Design Analysis and Task List     Choosing the IP Address Type for the HQ     Connecting the Branch Sites     Deployment Model     Addressing         Address Provisioning     Communication Between Branches     Application and Service Migration Case Study 4: Design Enterprise Data Center Connectivity     Detailed Requirements and Expectations     Design Analysis and Task List     Selecting the Data Center Architecture and Connectivity Model     DCN Detailed Connectivity     Connecting Network Appliances     Data Center Interconnect     Data Center Network Virtualization Design Case Study 5: Design Resilient Enterprise WAN     Detailed Requirements and Expectations     Design Analysis and Task List     Selecting WAN Links     WAN Overlay Case Study 6: Design Secure Enterprise Network     Detailed Requirements and Expectations     Security Domains and Zone Design     Infrastructure and Network Access Security     Layer 2 Security Considerations     Main and Remote Location Firewalling Case Study 7: Design QoS in the Enterprise Network     Detailed Requirements and Expectations     Traffic Discovery and Analysis     QoS Design Model     QoS Trust Boundary     Congestion Management     Scavenger Traffic Considerations     MPLS WAN DiffServ Tunneling Appendix A Answers to Review Questions Appendix B References   9781587144622    TOC   11/28/2016  


Best Sellers


Product Details
  • ISBN-13: 9780134424583
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Sub Title: CCDP ARCH 300-320
  • ISBN-10: 0134424581
  • Publisher Date: 27 Dec 2016
  • Binding: Digital download
  • No of Pages: 944
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320
Pearson Education (US) -
Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!