 |
|
 PBX Systems for IP TelephonyThe most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates... |  |  The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... |  |  IS-IS: Deployment in IP NetworksIS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol... |
|
 How to Cheat at Microsoft Vista AdministrationThe Perfect Reference for the Multitasked SysAdmin The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,... |  |  Clsc Exam Certification Guide (Cisco Career Certification)CLSC Exam Certification Guide is a comprehensive preparation tool for the CLSC exam (#640-404) and Foundation Routing and Switching exam (#640-409). Coverage of all CLSC exam objectives ensures readers will arrive at a complete understanding of the exam topics. This title reviews the main features of the Catalyst family of switches and the... |  |  Network Management FundamentalsNetwork management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just... |
|
 802.1X Port-Based AuthenticationWritten to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of... |  |  Designing Large Scale LANsLarge networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large... |  |  Building a VoIP Network with Nortel's Multimedia Communication Server 5100This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network... |
|
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 |