Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (496 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Acomprehensive guide to learning container and application hosting capabilitiesin Cisco platforms, and implementing them to achieve higher efficiency innetwork deployments and operations Cisco architectures offer comprehensive compute virtualizationcapabilities to accommodate both native and third-party container hosting, soyou can containerize and instantiate any application or network service andgain unprecedented value from your networks. Direct from Cisco, this is the complete guide to deploying andoperating containerized application andnetwork services on Cisco platforms. First, the authors review essentialvirtualization and containerization concepts for all network professionals andintroduce leading orchestration tools. Next, they take a deep dive intocontainer networking, introducing Cisco architectural support for containerinfrastructures. Youll find modular coverage of configuration, activation,orchestration, operations, and application hosting for each key Cisco softwareplatform: IOS-XE, IOS-XR, and NX-OS. The authors explore diverse orchestration tools, including LXC,Docker, and Kubernetes, and cover both Cisco and open-source tools for buildingand testing applications. They conclude with multiple use cases that show howcontainerization can improve agility and efficiency in a wide range of networkenvironments. Reviewthe motivation, drivers, and concepts of computing virtualization Learnhow Cisco platforms are achieving infrastructure virtualization Explorethe Cisco reference model for developing cloud-native services and moving tocloud-native network functions MasterCisco container networking fundamentals, supported modes, and configuration Enable,install, activate, and orchestrate containerized applications in Cisco IOS-XE,IOS-XR, and NX-OS Comparetools and methods for developing, testing, hosting, and orchestratingcontainerized applications Discoverreal-world use cases for Day-0, Day-1, and Day-2 operations, with practicaldeployment examples Previewemerging trends in network containerization
    Note: Online resource; Title from title page (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781484290019 , 1484290011
    Language: English
    Pages: 1 online resource (283 pages) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Computer networks Security measures
    Abstract: With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.
    Note: Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781786463555 , 1786463555
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Computer network protocols ; Packet switching (Data transmission) ; Computer networks ; Monitoring ; Packet transport networks ; Electronic books ; Electronic books ; local
    Abstract: Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2 About This Book Place Wireshark 2 in your network and configure it for effective network analysis Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease A practical guide with exciting recipes on a widely used network protocol analyzer Who This Book Is For This book is for security professionals, network administrators, R&D, engineering and technical support, and communications managers who are using Wireshark for network analysis and troubleshooting. It requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations. What You Will Learn Configure Wireshark 2 for effective network analysis and troubleshooting Set up various display and capture filters Understand networking layers, including IPv4 and IPv6 analysis Explore performance issues in TCP/IP Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs Get information about network phenomena, events, and errors Locate faults in detecting security failures and breaches in networks In Detail This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you've learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you'll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them. Style and approach This book consists of practical recipes on Wires...
    Note: Description based on online resource; title from title page (Safari, viewed May 2, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...