Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Home Networking Demystified
Home Networking Demystified
No need to be intimidated by home networking! With a very readable and easy to understand writing style, this book takes the anxiety out of learning how to build or expand a home network. Read a home networking book organised like a fun and painless self-teaching guide. Use the 8-page, 2-colour visual instruction insert to see how to set up a home...
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Layer 2 VPN Architectures (Networking Technology)
Layer 2 VPN Architectures (Networking Technology)

Master the world of Layer 2 VPNs to provide enhanced services and enjoy productivity gains

  • Learn about Layer 2 Virtual Private Networks (VPNs)

  • Reduce costs and extend the reach of your services by unifying your network architecture

    ...
Dr. Tom Shinder's Configuring ISA Server 2004
Dr. Tom Shinder's Configuring ISA Server 2004

This book is based in large part on our own trials and tribulations (as well as the occasional “Eureka!” moment) that we’ve experienced working with ISA Server 2004. In this book, we are talking to people much like ourselves—experienced Windows network administrators who want to secure their networks and speed up Web...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Next-Generation Network Services
Next-Generation Network Services

A guide to building service-oriented networks to differentiate and grow your business 

  • Understand the changing landscape of the telecommunications industry and what technologies can lead to business and revenue growth

  • Examine the...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

MPLS Configuration on Cisco IOS  Software
MPLS Configuration on Cisco IOS Software

MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy