IP Telephony Unveiled
Understand how IP telephony can change your business
This book explains four key points to help you successfully implement your IP telephony strategy:
Mobile IP Technology and Applications Real-world solutions for Cisco IOS® Mobile IP configuration, troubleshooting, and management First book to address the practical application of Mobile IP in real-world environments Detailed case studies show how to apply Mobile IP in real-world networks Configuration examples demonstrate working implementations of the Cisco Mobile IP... IPSec VPN Design
Master IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group
Understand how IPSec VPNs are designed, built, and administered
Improve VPN performance through enabling of modern VPN services...
Cisco® OSPF Command and Configuration Handbook (CCIE Professional Development)
As one of the most predominantly deployed Interior Gateway Protocols, Open Shortest Path First (OSPF) demands a wealth of knowledge on the part of internetworking professionals working with it on a daily basis. Unfortunately, publicly available documentation on the OSPF command set varies from being too thin on coverage to...
Cisco CallManager Best Practices
Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment
Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more
MPLS and VPN Architectures
Multiprotocol Label Switching (MPLS) provides the mechanisms to perform label switching, which is an innovative technique for high-performance packet forwarding. This book provides an in-depth study of MPLS technology, including MPLS theory and configuration, network design issues, and case studies. The MPLS/VPN architecture...
Securing Your Business with Cisco ASA and PIX Firewalls The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
|Result Page: 25 24 23 22 21 20 19 18 17 16 |