Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IP Routing
IP Routing

This concise guide offers the basic concepts of IP routing, free of hype and jargon. It begins with the simplest routing protocol, RIP, and then proceeds, in order of complexity, to IGRP, EIGRP, RIP2, OSPF, and finally to BGP. New concepts are presented one at a time in successive chapters. By the end, you will have mastered not only...

Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

Cisco IOS in a Nutshell
Cisco IOS in a Nutshell

Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and...

Cisco Internetworking with Windows NT & 2000
Cisco Internetworking with Windows NT & 2000
Guide to using Cisco hardware and software in a Microsoft environment With the announced Cisco/Microsoft partnership, just about all NT administrators will need a working knowledge of Cisco products and technologies. You'll find that know-how in Cisco Internetworking with Windows NT & 2000, by Anthony Velte, Toby Velte, and Amy Hanson. After an...
Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

Routing TCP/IP, Volume II (CCIE Professional Development)
Routing TCP/IP, Volume II (CCIE Professional Development)

The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the...

Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
Linux Firewalls (3rd Edition)
Linux Firewalls (3rd Edition)
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most...
Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
GMPLS Technologies: Broadband Backbone Networks and Systems (Optical Science and Engineering)
GMPLS Technologies: Broadband Backbone Networks and Systems (Optical Science and Engineering)
Multi-Protocol Label Switch (MPLS) and Generalized MPLS (GMPLS) are key technologies for next-generation IP backbone networks. Until now, however, engineers have been forced to search for technical papers on this subject and read them in an ad-hoc manner. At last there is a book that explains both MPLS and GMPLS concepts in a systematic way....
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy