Linux on IBM eserver zSeries and S/390: Best Security Practices This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
Cisco CallManager Best Practices
Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment
Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...
End-to-End QoS Network Design : Quality of Service in LANs, WANs, and VPNs
Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to...
|Result Page: 10 9 8 7 6 5 4 3 2 1 |