Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IS-IS Network Design Solutions
IS-IS Network Design Solutions

The definitive IS-IS reference and design guide.

  • Extensive coverage of both underlying concepts and practical applications of the IS-IS protocol

  • Detailed explanation of how the IS-IS database works and...

JUNOS OS For Dummies (Computer/Tech)
JUNOS OS For Dummies (Computer/Tech)

Welcome to Junos OS For Dummies. This book provides you with a handy reference for configuring and running Junos software on Juniper Networks products. (We won’t bore you with how Junos got here, but you can discover more about Juniper Networks and the evolution of Junos software at www.juniper.net/company.)

...

Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way

Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the "in case of emergency" basics will take you far.

Just like the original, this second edition of the highly acclaimed Cisco Routers for the...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

IBM System Storage Solutions Handbook
IBM System Storage Solutions Handbook

This IBM® Redbooks® publication provides overviews and pointers for information about the most current IBM System StorageTM products, showing how IBM delivers the right mix of products for nearly every aspect of business continuance and business efficiency. IBM System Storage products can help you store, safeguard, retrieve, and share...

Ethernet Networks: Design, Implementation, Operation,& Management
Ethernet Networks: Design, Implementation, Operation,& Management
Ethernet Networks, Fourth Edition, provides everything you need to know to plan, implement, manage and upgrade Ethernet networks.
  • Improve your skills in employing Ethernet hubs, switches, and routers.

  • Learn how to set up and operate a wireless Local Area Network (LAN).

    ...
Network Warrior
Network Warrior

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy