Home | Amazing | Today | Tags | Publishers | Years | Search 
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Network Mergers and Migrations: Junos Design and Implementation
Network Mergers and Migrations: Junos Design and Implementation

This book provides a complete reference to network mergers and migrations using the Junos operating system

Network Mergers and Migrations provides readers with a comprehensive guide for network migration activities by detailing a variety of internetworking case studies. Both enterprise and service provider scenarios...

JUNOS High Availability: Best Practices for High Network Uptime (Animal Guide)
JUNOS High Availability: Best Practices for High Network Uptime (Animal Guide)

Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management,...

OSPF and IS-IS: Choosing an IGP for Large-Scale Networks
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks

The practical guide to large-scale networking with OSPF and IS-IS

This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting...

Running IPv6
Running IPv6
This is a book about running the IPv6 protocol in heterogeneous environments. It will tell
you how to enable the protocol on Windows, MacOS, FreeBSD, Linux, and Cisco routers, and,
up to a point, on Juniper routers. The intent behind the book is to present a clear view of the
aspects to IPv6 that are of interest to those who’ll
...
Now You Know Treo
Now You Know Treo
Even a smartphone needs a smart user to take advantage of all of its brillianceespecially when that phone is as jam-packed with features as the Treo. To master all of the Treo's phone, email, Internet, photographic, and organizational capabilities, you need this pocket-sized guide! As the only Treo guide authorized by its maker (palmOne), this one...
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network...
Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy