Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Management Fundamentals
Network Management Fundamentals
Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just...
Clsc Exam Certification Guide (Cisco Career Certification)
Clsc Exam Certification Guide (Cisco Career Certification)
CLSC Exam Certification Guide is a comprehensive preparation tool for the CLSC exam (#640-404) and Foundation Routing and Switching exam (#640-409). Coverage of all CLSC exam objectives ensures readers will arrive at a complete understanding of the exam topics. This title reviews the main features of the Catalyst family of switches and the...
How to Cheat at Microsoft Vista Administration
How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,
...
IS-IS: Deployment in IP Networks
IS-IS: Deployment in IP Networks

IS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

PBX Systems for IP Telephony
PBX Systems for IP Telephony
The most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Deploying Voice over Wireless LANs (Networking Technology)
Deploying Voice over Wireless LANs (Networking Technology)

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

 

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly...

DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)
Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)

Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process.

Meeting this challenge is the focus of...

Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy