 |
|
|
|
 CCNP Practical Studies: RoutingPractice for the CCNP BSCI exam with hands-on, networking lab scenarios
- Ramp up your routing know-how with more than 40 practical lab scenarios
- Reinforce your CCNP exam preparation with step-by-step, hands-on router configuration
- Get up to speed with advanced OSPF and IS-IS configuration,...
|  |  Designing and Building Enterprise DMZsThis is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.
One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a... |  |  MPLS FundamentalsAs an escalation engineer, I experienced the boom of Multiprotocol Label Switching (MPLS) networking first hand. I saw the first trials of MPLS in service provider networks and saw MPLS successfully expanding further into enterprise networks. In addition, I witnessed new MPLS technologies coming into existence, which the networking industry... |
|
 Network Consultant's HandbookA complete resource for assessing, auditing, analyzing, and evaluating any network environment
With Network Consultants Handbook, you will
- Learn from network audit and evaluation guidelines that aid in data gathering and analysis of network environments
- Work with tables and...
|  |  Introduction to Network Analysis, 2nd EditionThe ultimate introductory guide to analyzing network communications at the packet level. This book defines basic analyzer elements (such as capture filters, display filters, expert alarms, trend screens, and decode windows) and provides real-world examples of how an analyzer can be used to troubleshoot networks. Includes chapter tests and several... |  |  802.1X Port-Based AuthenticationWritten to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of... |
|
| Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |