Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco CallManager Best Practices
Cisco CallManager Best Practices

Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment

  • Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more

  • ...
Cisco Catalyst QoS: Quality of Service in Campus Networks
Cisco Catalyst QoS: Quality of Service in Campus Networks

Quality of service (QoS) is the set of techniques designed to manage network resources. QoS refers to the capability of a network to provide better service to selected network traffic over various LAN and WAN technologies. The primary goal of QoS is to provide flow priority, including dedicated bandwidth, controlled jitter and...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
Designing Cisco Networks
Designing Cisco Networks
Cisco authorized self-study book for CCDA foundation learning

* Prepare for CCDA certification while mastering the network design process
* Learn to characterize existing networks and determine new customer requirements
* Develop appropriate network topologies for various environments
* Design device naming schemes and IP
...

CCNA Cisco Certified Network Associate : Study Guide (with CD-ROM)
CCNA Cisco Certified Network Associate : Study Guide (with CD-ROM)

Here's the book you need to prepare for Cisco's new CCNA exam, 640-607. Written by a Cisco internetworking expert who knows exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official exam objectives Configuration practice with a Router...

The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
The only Cisco-endorsed study guide for the new CCNA #640-507 examCoverage of all CCNA exam topics enables you to discover and fill your knowledge gaps before sitting the exam. You will learn about:Internetworking functions of each layer of the OSI reference model and how they are performed in network devicesDesign, implementation, configuration,...
Next-Generation Network Services
Next-Generation Network Services

A guide to building service-oriented networks to differentiate and grow your business 

  • Understand the changing landscape of the telecommunications industry and what technologies can lead to business and revenue growth

  • Examine the...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy