Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
1,001 CCNA Routing and Switching Practice Questions For Dummies (+ Free Online Practice) (For Dummies Series)
1,001 CCNA Routing and Switching Practice Questions For Dummies (+ Free Online Practice) (For Dummies Series)

Test your CCNA skills as you prepare for the CCNA Routing and Switching exams

To achieve CCNA Routing and Switching certification, you'll need to demonstrate a solid understanding of IP data networks, LAN switching technologies, IP addressing and routing technologies, network device security, WAN technologies, and more....

Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)

CD Features More Than 200 Practice Questions

 

CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...

Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
Cisco CallManager Best Practices
Cisco CallManager Best Practices

Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment

  • Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more

  • ...
JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

End-to-End QoS Network Design : Quality of Service in LANs, WANs, and VPNs
End-to-End QoS Network Design : Quality of Service in LANs, WANs, and VPNs

Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy