In the wake of increased traffic, today's service providers and enterprises must assure high availability across a variety of networked services and applications. Multiprotocol Label Switching (MPLS) is the enabling technology for the widespread deployment of IP networks in core and Metro Ethernet applications. Many service...
First Mile Access Networks and Enabling Technologies provides a platform for showcasing first mile access technologies and associated network solutions. Using this book, you learn about the bandwidth bottleneck within the first mile and explore the resulting business prospects. Benefit from a...
Preparing for the CCNA® exam? Working as a network administrator? Here are all the CCNA-level commands you need in one condensed, portable resource. The CCNA Portable Command Guide is filled with valuable, easy-to-access information, and portable enough for use whether you're in the server...
Understand the business case for storage networks and lower your total cost of ownership with this comprehensive guide
When adopting a storage networking solution, you need to understand the business case for your decision. Yet this process is fraught with many business and technical considerations. How...
The web has become a major vehicle for transforming business processes, but ineffective management of web-based services can result in high costs and user dissatisfaction. Service Level Management (SLM) is therefore a competitive weapon in the web marketplace, providing the tools needed to improve performance and reliability of...
Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS projectfrom needs definition to deployment considerations. Implementation...
The Exam Cram Method of study focuses on exactly what you need to get certified now.
The Cisco SAFE Implementation Exam (which carries the examination ID number of 642-541) is intended to evaluate whether you understand the ideas behind a secured network architecture and...