Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

MPLS Fundamentals
MPLS Fundamentals
As an escalation engineer, I experienced the boom of Multiprotocol Label Switching (MPLS) networking first hand. I saw the first trials of MPLS in service provider networks and saw MPLS successfully expanding further into enterprise networks. In addition, I witnessed new MPLS technologies coming into existence, which the networking industry...
EIGRP Network Design Solutions: The Definitive Resource for EIGRP Design, Deployment, and Operation
EIGRP Network Design Solutions: The Definitive Resource for EIGRP Design, Deployment, and Operation
EIGRP Network Design Solutions provides readers with in-depth knowledge of EIGRP, the Cisco routing protocol that runs many large enterprise and service provider networks. It covers the theory of EIGRP, network design issues, configuration of EIGRP on Cisco IOS routers, and detailed troubleshooting information. Case studies and configuration...
CCNP BSCI Portable Command Guide (Self-Study Guide)
CCNP BSCI Portable Command Guide (Self-Study Guide)

Preparing for the CCNP® certification? Working as a network professional? Here are all the CCNP-level commands for the Building Scalable Cisco Internetworks (BSCI) exam you need in one condensed, portable resource. The CCNP BSCI Portable Command Guide is filled with valuable, easy-to-access information and is portable...

Cisco Express Forwarding (Networking Technology)
Cisco Express Forwarding (Networking Technology)
How does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and...
Internet Routing Architectures (Design & Implementation)
Internet Routing Architectures (Design & Implementation)

The industryes leading resource for Internet routing solutions and scenariosExplore the functions, attributes, and applications of BGP-4, the de facto interdomain routing protocol, through practical scenarios and configuration examplesLearn the contemporary Internet structure and understand how to evaluate a service provider in dealing with...

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
New Trends in Software Methodologies, Tools and Techniques:  Proceedings of the fifth SoMeT_06, Volume 147 Frontiers in Artificial Intelligence and Applications
New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06, Volume 147 Frontiers in Artificial Intelligence and Applications
Software is the essential enabler for the new economy and science. It creates new markets and new directions for a more reliable, flexible, and robust society. It empowers the exploration of our world in ever more depth. However, software often falls short behind our expectations. Current software methodologies, tools, and techniques remain...
Artificial Intelligence in Education (Frontiers in Artificial Intelligence and Applications)
Artificial Intelligence in Education (Frontiers in Artificial Intelligence and Applications)
The 12th International Conference on Artificial Intelligence in Education (AIED-2005) is being held July 18–22, 2005, in Amsterdam, the beautiful Dutch city near the sea. AIED-2005 is the latest in an on-going series of biennial conferences in AIED dating back to the mid-1980’s when the field emerged from a synthesis of artificial...
Multi-Relational Data Mining:  Volume 145 Frontiers in Artificial Intelligence and Applications
Multi-Relational Data Mining: Volume 145 Frontiers in Artificial Intelligence and Applications
This thesis is concerned with Data Mining: extracting useful insights from large and detailed collections of data. With the increased possibilities in modern society for companies and institutions to gather data cheaply and efficiently, this subject has become of increasing importance. This interest has inspired a rapidly maturing research field...
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy