Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Host Intrusion Prevention with CSA
Advanced Host Intrusion Prevention with CSA
The Cisco Security Agent product is extremely successful in protecting endpoints around the world. The power it
provides must be understood to use it effectively and efficiently. This book attempts to provide guidance and examples
to help CSA users worldwide do just that.

This book is intended for anyone currently using the CSA
...
The Business Case for Enterprise-Class Wireless LANs
The Business Case for Enterprise-Class Wireless LANs

A comprehensive guide to analyzing the business rationale for WLANs

  • Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership

  • ...
Firewall Fundamentals
Firewall Fundamentals

The essential guide to understanding and using firewalls to protect personal computers and your network

  • An easy-to-read introduction to the most commonly deployed network security device

  • Understand the threats firewalls are designed to...

IP Addressing Fundamentals
IP Addressing Fundamentals

The reader-friendly explanation of how the IP address space works and how it is used

* A reader-friendly introduction to the complex and confusing topic of IP addressing
* Thorough and understandable explanations of the binary mathematics behind IP addressing
* Complete coverage of the IPv4 address space without distractions of
...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Comparing, Designing, and Deploying VPNs
Comparing, Designing, and Deploying VPNs

Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available,...

Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
"This is the right book at the right time for anyone in the telecommunications business, or anyone who is dependent on the services provided by the telecommunications business that would like to understand the new Internet that is rapidly becoming the common reality."
From the Foreword by Scott Bradner, Senior Technical Consultant
...
MySQL Bible with CDROM
MySQL Bible with CDROM
"The MySQL Bible introduces the essential concepts and skills youll need to get started with MySQL." –Jeremy Zawodny, Senior Editor of Linux Magazine and the MySQL database expert at Yahoo! Finance

If MySQL can do it, you can do it too...

MySQL is the leading open source relational database management...

Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network...
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access (Networking Technology)
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access (Networking Technology)

Wi-Fi Hotspots

Setting Up Public Wireless Internet Access

Installing and operating a Wi-Fi hotspot allows you to attract customers and differentiate your business. Deploying even a small wireless network has proven to be a...

Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy