 |
|
 A Practical Approach to WBEM/CIM ManagementSystem architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management WBEM and its Component Information Model (CIM) provide the architecture, language,... |  |  Hacking Exposed Cisco NetworksImplement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised... |  |  Automating System Administration with Perl: Tools to Make You More Efficient
If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely... |
|
|
|
 Leveraging WMI Scripting (HP Technologies)Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed... |  |  Windows NT SNMP
As communications networks grow in size and complexity, it becomes increasingly difficult to locally manage and control all of the devices (e.g., routers, servers, and workstations) on those networks. SNMP (Simple Network Management Protocol) gives you a way to manage network devices remotely. You can use SNMP to check on the... |  |  Traffic Engineering with MPLSDesign, configure, and manage MPLS TE to optimize network performance.
Almost every busy network backbone has some congested links while others remain underutilized. That's because shortest-path routing protocols send traffic down the path that is shortest without considering other network parameters,... |
|
Result Page: 6 5 4 3 2 1 |