Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCNP BCMSN Exam Cram 2 (642-811), Second Edition
CCNP BCMSN Exam Cram 2 (642-811), Second Edition

The Exam Cram Method of study focuses on exactly what you need to get certified now.

In this book you'll learn how to:

  • Design enterprise switched networks

  • Use VLANs and STP...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

CCNP TSHOOT 642-832 Official Certification Guide
CCNP TSHOOT 642-832 Official Certification Guide

CCNP TSHOOT 642-832 Official Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® TSHOOT exam. Senior instructor and best-selling author Kevin Wallace shares preparation hints and test-taking tips, helping you identify areas of weakness and...

CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
CCNP Practical Studies: Remote Access (CCNP Self-Study)
CCNP Practical Studies: Remote Access (CCNP Self-Study)

Gain hands-on experience of CCNP Remote Access topics with lab scenarios for the new 642-821 BCRAN exam.

  • Prepare for the CCNP 642-821 BCRAN exam and gain a better, practical understanding of exam concepts

  • Experience how remote access...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
Scott Empson is currently the associate chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, teaching Cisco® routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. He...
CCIE: Cisco Certified Internetwork Expert Study Guide
CCIE: Cisco Certified Internetwork Expert Study Guide
This book is intended to help you continue on your exciting path
toward obtaining your CCIE certification. Before reading this book, it is
important to have at least read the Sybex
CCNA: Cisco Certified Network Associate Study Guide,
as well as the Sybex CCNP: Routing Study Guide,
CCNP: Support Study Guide, CCNP: Switching
...
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

Head First Networking
Head First Networking
Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy