Home | Amazing | Today | Tags | Publishers | Years | Search 
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
Network Management Fundamentals
Network Management Fundamentals
Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just...
Clsc Exam Certification Guide (Cisco Career Certification)
Clsc Exam Certification Guide (Cisco Career Certification)
CLSC Exam Certification Guide is a comprehensive preparation tool for the CLSC exam (#640-404) and Foundation Routing and Switching exam (#640-409). Coverage of all CLSC exam objectives ensures readers will arrive at a complete understanding of the exam topics. This title reviews the main features of the Catalyst family of switches and the...
How to Cheat at Microsoft Vista Administration
How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,
...
IS-IS: Deployment in IP Networks
IS-IS: Deployment in IP Networks

IS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

PBX Systems for IP Telephony
PBX Systems for IP Telephony
The most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Deploying Voice over Wireless LANs (Networking Technology)
Deploying Voice over Wireless LANs (Networking Technology)

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

 

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly...

IP Design for Mobile Networks
IP Design for Mobile Networks

As the cellular world and the Internet converge, mobile networks are transitioning from circuit to packet and the Internet Protocol (IP) is now recognized as the fundamental building block for all next-generation communication networks. The all-IP vision provides the flexibility to deliver cost-effective services and...

Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy