Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Layer 2 VPN Architectures (Networking Technology)
Layer 2 VPN Architectures (Networking Technology)

Master the world of Layer 2 VPNs to provide enhanced services and enjoy productivity gains

  • Learn about Layer 2 Virtual Private Networks (VPNs)

  • Reduce costs and extend the reach of your services by unifying your network architecture

    ...
The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
"This book provides a diverse and solid foundation that will be
immensely beneficial to new network engineers, those looking for a
refresher or developers"
-- Alan Young, Google, Network Surveillance Team

"i haven't had time to read the manuscript
...
Nortel Guide to VPN Routing for Security and VoIP
Nortel Guide to VPN Routing for Security and VoIP
Here's your handbook to Nortel VPN Router

If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN Router. Everything is here—hardware, software, laboratory set-ups, real-world examples, and, most importantly, advice gleaned from the...

Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

Check Point NG/AI: Next Generation with Application Intelligence Security Administration
Check Point NG/AI: Next Generation with Application Intelligence Security Administration

In Check Point Next Generation with Application Security Administration you will cover the basic concepts of security and how to configure a simple firewall all the way to some very advanced VPN scenarios. This book is written by experts in the field as well as certified instructors to give the depth desired by the most advanced users,...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

MPLS Network Management: MIBs, Tools, and Techniques
MPLS Network Management: MIBs, Tools, and Techniques
S everal years ago, there were only a handful of deployments of Multi-Protocol Label Switching (MPLS) technology, and those were restricted to researchers or nonproduction networks. Even in practice, MPLS was largely still theory. Over the past several years, MPLS has matured as a technology, and its acceptance and popularity in the marketplace has...
MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
Special Edition Using Linux
Special Edition Using Linux
Linux is a significant force in the server room and the desktop, delivering reliability, ease of installation and administration, high performance, security, and robust applications. Special Edition Using Linux 6E is written to the just-released 2.4.x kernel and includes the following topics: installation and configuration of Red Hat Linux, Caldera...
Configuring Check Point NGX VPN-1/Firewall-1
Configuring Check Point NGX VPN-1/Firewall-1
Check Point FireWall-1 came out in 1994 and was an immediate success. It has been
the market-leading firewall platform for over 10 years. It is no wonder the platform
has done so well.The Check Point Graphical User Interface for managing firewall
policies is extremely intuitive and easy to learn.

Check Point has come a
...
Managing Cisco Network Security
Managing Cisco Network Security
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy