|
|
|
|
|
| | | | Administering Cisco QOS for IP NetworksAdministering Cisco QoS in IP Networks discusses IP Quality of Service (QoS) and how it applies to Enterprise and Service Provider environments. It reviews routing protocols and quality of service mechanisms available today on Cisco network devices (routers, switches, etc.).This guide provides examples and... |
|
Asp Configuration HandbookThe Complete Guide to Migrating an ISP to an ASP ISPs are now faced with a narrowing margin brought on by fierce competition, with little available differentiation in their offerings. In order to reverse this decline in profitability, ISPs have begun to expand services beyond bandwidth and connectivity, by adding remote hosting services such as... | | Running IPv6This is a book about running the IPv6 protocol in heterogeneous environments. It will tell you how to enable the protocol on Windows, MacOS, FreeBSD, Linux, and Cisco routers, and, up to a point, on Juniper routers. The intent behind the book is to present a clear view of the aspects to IPv6 that are of interest to those who’ll... | | Caution! Wireless Networking: Preventing a Data DisasterSure you’re vulnerable. Now here’s what you do about it
Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard... |
|
qmailqmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book fills crucial gaps in existing documentation, detailing exactly what the core qmail software does. ... | | Phishing: Cutting the Identity Theft LineHave you been caught yet?
They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,... | | Postfix (Other Sams)Networking guide to the Postfix Mail Transfer software package, showing how to configure Postfix for specific tasks, how to use external databases with Postfix, and how to migrate from Sendmail. Also explains e-mail protocols, setting up Postfix as an ISP or office mail server, and using list servers and Web mail interfaces with Postfix. Softcover.... |
|
|
Result Page: 5 4 3 2 1 |