Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Wireless LAN Security
Cisco Wireless LAN Security

Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the...

Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Cisco IP Routing Protocols: Troubleshooting Techniques
Cisco IP Routing Protocols: Troubleshooting Techniques

Cisco IP Routing Protocols: Troubleshooting Techniques is a comprehensive reference guide for network professionals facing problems with implementing and configuring IP routing protocols. It begins with an explanation of troubleshooting methodologies and tools, including Cisco and TCP/IP diagnostic commands and basic protocol...

PacketCable Implementation (Networking Technology)
PacketCable Implementation (Networking Technology)
PacketCable networks use IP technology to enable a wide range of multimedia services, from IP telephony to interactive gaming and beyond. Because PacketCable-based business and residential services are central to the cable industry's strategy for growth, the industry's need for PacketCable expertise is expected to increase dramatically. ...
Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

Administering Data Centers: Servers, Storage, and Voice over IP
Administering Data Centers: Servers, Storage, and Voice over IP
"This book covers a wide spectrum of topics relevant to implementing and managing a modern data center. The chapters are comprehensive and the flow of concepts is easy to understand."
—Cisco reviewer

Gain a practical knowledge of data center concepts

To create a well-designed data center (including storage...

CCNP Security VPN 642-648 Quick Reference
CCNP Security VPN 642-648 Quick Reference

As a final exam preparation tool, the CCNP Security VPN 642-648 Quick Reference ...

CCNA Wireless (640-722 IUWNE) Quick Reference
CCNA Wireless (640-722 IUWNE) Quick Reference

As a final exam preparation tool, the CCNA Wireless (640-722 IUWNE) Quick Reference provides a concise review of all objectives on the new exams.  The short eBook provides readers with detailed,...

Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Configuring Cisco Voice Over IP
Configuring Cisco Voice Over IP
Arming network administrators with a thorough understanding of Cisco’s current VoIP solutions and the means to put them to work, Configuring Cisco Voice Over IP, Second Edition demonstrates how to configure all of Cisco’s core VoIP products, among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. Now...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy