Home | Amazing | Today | Tags | Publishers | Years | Search 
Application Acceleration and WAN Optimization Fundamentals
Application Acceleration and WAN Optimization Fundamentals
IT organizations face a number of increasing pressures to increase productivity, improve application performance, provide infrastructure conducive to global collaboration, improve posture toward data protection and compliance, and minimize costs across the board. These pressures come largely as a result of initiatives to increase availability and...
End-to-End Network Security: Defense-in-Depth
End-to-End Network Security: Defense-in-Depth
The network security lifecycle requires specialized support and a commitment to best practice standards. In this book, you will learn best practices that draw upon disciplined processes, frameworks, expert advice, and proven technologies that will help you protect your infrastructure and organization. You will learn end-to-end security best...
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Every year, organizations rely on Internet applications and services more deeply–and every year, Internet infrastructure grows more powerful and complex. As the limitations of traditional IPv4 addressing become increasingly apparent, many decision makers recognize that a transition to IPv6 is needed far sooner than anticipated. Global...
Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822 (2nd Edition)
Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822 (2nd Edition)
Interconnecting Cisco Network Devices, Part 1 (ICND1), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCENT™ and CCNA® foundation learning. This book provides you with the knowledge needed to configure Cisco switches and routers to operate in corporate internetworks. By reading this book, you will gain a...
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers,...
Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1) (Authorized Self-Study Guide)
Implementing Cisco Unified Communications Manager, Part 1 (CIPT1) (Authorized Self-Study Guide)
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, the certified employee/consultant/job candidate is considered more...
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Result Page: Previous 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy