Deploying IPv6 Networks
An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.
Learn about IPv6 services and the relevant IPv6 features that make them possible
Plan, deploy, and manage IPv6 services at...
IPv6 for Enterprise Networks (Networking Technology)
Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...
Software Testing and Quality Assurance: Theory and Practice A superior primer on software testing and quality assurance, from integration to execution and automation
This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...
Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services
SS7/C7 is a signaling network and protocol that is used worldwide to bring telecommunications networks, both fixed-line and cellular, to life. Setting up phone calls, providing cellular roaming and messaging, and converged voice/data services, such as Internet Call Waiting, are only a few of the vast number of ways that...
Active Defense: A Comprehensive Guide to Network Security Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead...
Security Assessment: Case Studies for Implementing the NSA IAM The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
|Result Page: 49 48 47 46 45 44 43 42 41 40 |