Home | Amazing | Today | Tags | Publishers | Years | Search 
CCNP Practical Studies: Remote Access (CCNP Self-Study)
CCNP Practical Studies: Remote Access (CCNP Self-Study)

Gain hands-on experience of CCNP Remote Access topics with lab scenarios for the new 642-821 BCRAN exam.

  • Prepare for the CCNP 642-821 BCRAN exam and gain a better, practical understanding of exam concepts

  • Experience how remote access...

Wireless Local-Area Network Fundamentals
Wireless Local-Area Network Fundamentals

Master the basics in designing, building, and managing a Cisco Aironet WLAN.

  • Master the basics of Wireless LANs with this concise design and deployment guide

  • Understand implementation issues for a variety of environments including...

IPSec VPN Design
IPSec VPN Design

Master IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group

  • Understand how IPSec VPNs are designed, built, and administered

  • Improve VPN performance through enabling of modern VPN services...

IP Telephony Unveiled
IP Telephony Unveiled

Understand how IP telephony can change your business

This book explains four key points to help you successfully implement your IP telephony strategy:

  • IP telephony works today. This is not new, unproven technology. Thousands of customers have implemented IP...

Interdomain Multicast Routing: Practical Juniper Networks and Cisco Systems Solutions
Interdomain Multicast Routing: Practical Juniper Networks and Cisco Systems Solutions

Increasing numbers of ISPs have begun implementing multicast infrastructure. Soon the Internet will provide multicast connectivity between any two points on the Internet the way it provides for unicast traffic today. Long-evolving protocols are reaching maturity, and enterprise networks and ISPs around the world are ramping...

Taking Charge of Your VoIP Project
Taking Charge of Your VoIP Project

Voice over IP (VoIP) is the telephone system of the future. Problem is, VoIP is not yet widely deployed, so there are few skilled practitioners today. As you make your move to VoIP, how will you know how to make VoIP work and keep it working well? What changes will you need to make without disrupting your business? How can...

Routing TCP/IP Volume I (CCIE Professional Development)
Routing TCP/IP Volume I (CCIE Professional Development)

CCIE Professional Development: Routing TCP/IP, Volume 1 takes you from a basic understanding of routers and routing protocols through a detailed examination of each of the IP interior routing protocols: RIP, RIP2, IGRP, EIGRP, OSPF, and IS-IS. In addition to specific protocols, important...

Business Case for Network Security : Advocacy, Governance, and ROI, The (Network Business)
Business Case for Network Security : Advocacy, Governance, and ROI, The (Network Business)

The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments....

Advanced MPLS Design and Implementation
Advanced MPLS Design and Implementation

Multiprotocol Label Switching (MPLS) is a highly scalable, high-performance forwarding technology that has multiple applications in the service provider and enterprise environment. This book is intended for internetwork engineers and administrators who are responsible for designing, implementing, and supporting service...

Traffic Engineering with MPLS
Traffic Engineering with MPLS

Design, configure, and manage MPLS TE to optimize network performance.

Almost every busy network backbone has some congested links while others remain underutilized. That's because shortest-path routing protocols send traffic down the path that is shortest without considering other network parameters,...

MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
Build the Best Data Center Facility for Your Business (Cisco Press Networking Technology)
Build the Best Data Center Facility for Your Business (Cisco Press Networking Technology)
A comprehensive, step-by-step guide to designing and managing robust, flexible, and productive data center facilities Includes step-by-step instructions on every major decision involved in designing flexible and productive data center facilities Shows how to maximize infrastructure, avoid downtime, and save millions by extending data center...
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy