Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2005-2009  (61)
  • World Bank Group  (36)
  • Safari Tech Books Online  (25)
  • Duggan, Martin
  • Nickel, Johanna (1916-1984)
  • Washington, D.C : The World Bank  (36)
  • Indianapolis, IN : Cisco Press  (25)
Datasource
Material
Language
Years
Year
Author, Corporation
  • 1
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: Developing East Asia is battling the forces of global recession. The impact of the crisis in the advanced countries was transmitted to the economies of the region with unusual speed. In the region, the initial global financial turbulence was marked by sudden reversals of capital flows in the middle-income economies, rapidly declining equity market prices, a sharp increase in the price of external private capital, a shortage of dollar liquidity, and in some cases, a depreciating currency. Now with aggregate global demand falling precipitously, region-wide declines in exports and industrial production are triggering widespread factory closures, rising unemployment, and lower real wages, with disproportionate effects on the poor and near-poor. Authorities in many countries are implementing social programs and cash transfers to assist those most in need. Where possible, policymakers have responded quickly with expansionary monetary and fiscal policies, including fiscal stimulus packages, although in most cases these measures will only mitigate, not overcome, the contraction forces operating on their economies
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Water and Sanitation Program
    Abstract: In 2006-07, the Water and Sanitation Program-South Asia (WSP-SA) initiated a research toidentify barriers to service delivery for the urban poor. The research included a review ofvarious initiatives from across the globe that have resulted in improved service delivery for theurban poor and consultations with the urban poor communities. The present volume is adocumentation of this research and supports the Guidance Notes on Improving WaterSupply and Sanitation Services for the Urban Poor in India
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Economic Updates and Modeling
    Abstract: In the first half of 2009, Indonesia's economy has established a solid recovery from late last year. Quarterly growth has accelerated since the start of 2009, after stalling in the final quarter of 2008, although the year-on-year growth rate has continued to slow, recording 4.0 per cent in the year to Q2. This trend of a gradual recovery is projected to continue into 2011. Indonesia's recovery coincides with an improved external environment. Q2 gross domestic product (GDP) outcomes across its major export destinations were better than expected and most trading partner's exited recession by mid-year. International prices of many of Indonesia's exports have recovered much of their late 2008 falls. These developments have supported Indonesia's economy, with exports recovering faster than imports. Domestic consumption continued to contribute strongly to growth in the second quarter. In the first quarter, large amounts of spending by campaign teams for the parliamentary election lifted private consumption. Indonesia's financial markets have continued to strengthen through Q2, generally by more than markets elsewhere in the region. The rupiah has continued to appreciate against the weakening USD, although at a slowing rate, and stabilized around 10,000 per USD by early September. The stock market also performed strongly in Q2, rising over 20 per cent from late May to early September. By mid-June, yields on sovereign rupiah bonds had returned to early 2008 levels, while the spread on Indonesian government USD bonds had the global emerging market average. From late June to September, local currency bond yields have remained broadly stable, while spreads on USD bonds have fallen another percentage point. These improved market conditions have allowed the government to continue financing its budget through the bond market, accessing funds for longer terms and at lower yields
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Economic Updates and Modeling
    Abstract: Indonesia's slowdown has come relatively later and been more moderate than for many countries but the adverse effects of the global economic slowdown are now playing out. Gross Domestic Product (GDP) growth slowed in the fourth quarter of 2008 and into the first quarter of 2009, to 4.4 percent year-on-year, from 6.4 percent in the year to the third quarter. For 2008 as a whole the Indonesian economy expanded by 6.1 percent, only slightly below 2007's 6.3 percent pace. Nevertheless, all sectors of the economy were impacted during the period of peak turbulence in global financial markets in late 2008. Into the first quarter of 2009 externally focused sectors continued to be especially impacted by the global slowdown, while domestic demand rebounded on buoyant consumer confidence, stable retail prices and renewed investor confidence. Agriculture was a notably strong sector, with agricultural production increasing by 4.8 percent in 2008, the fastest growth since 1992. While agriculture now accounts for 14.4 percent of total output it continues to provide most or all of the support for 42 percent of households. Although Indonesia's direct exposure to troubled American and European-domiciled banks is limited, Indonesian bankers became more conservative in line with tightening global financial conditions. Far fewer new loans are being approved, and anecdotal reports suggest that some new customers have had difficulty accessing credit. While inter-bank lending has been improving and there is sufficient overall rupiah liquidity in the system, it is not evenly distributed with larger banks typically liquid and smaller banks facing problems. Nevertheless banking sector indicators continue to be relatively robust, and the nation's largest banks reported higher net profits in the first quarter of 2009
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: As the global economy finds itself in the worst financial crisis since the great depression, the East Asia and Pacific region has not been spared the full fury of the economic storm. The surge and subsequent drop in food and fuel prices was followed by the intensification in the financial crisis that began in mid- 2007 in the U.S., deepened through the first half of 2008, and took a sharp turn for the worse after September 15. Even as East Asian policymakers were battling the previous crisis in late 2007 and early 2008 - the rise in inflation following the steep increases in food and fuel prices they were confronted by sudden falls in equity prices and exchange rates, sharp increases in short-term interest rates, and an abrupt deceleration in export growth. The epicenter of the storm was in the developed countries, but its reach spread quickly across the globe. The failure of important financial institutions in the major financial systems froze interbank and credit markets around the world and revised the price of risk upward, triggering a global liquidity shortage. The ensuing search for liquidity worldwide prompted, among other things, the sale of equity and debt securities and the withdrawal of capital from emerging markets, destabilizing banking systems far from the center of the crisis. Boosts to liquidity and injections of capital in financial institutions by developed country authorities may avert a systemic meltdown of financial markets, but heightened risk aversion and an ongoing deleveraging across the world is causing capital to retreat from developing countries and the cost of financing to rise. The loss of trust, breakdown in financial markets, and curtailment of bank loans have hit investment, production, and trade, causing global growth to slow rapidly. Japan and Europe are already in recession, and the US is expected to follow soon. All three are expected to contract further in 2009, dampening import demand and resulting in the first decline in world trade volumes in a quarter century
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: Last year Developing East Asia recorded its highest growth rate in over a decade (10.2 percent), capping a decade of improvements following its home-grown financial crisis in 1998. Yet this is hardly a time for celebration, but rather one for concern. The global economy is once again facing a testing time, with soaring fuel and food prices, on the one hand, and, on the other, an unfolding sub-prime crisis emanating in the United States and spreading to other countries and asset classes, bringing in its wake a plunging dollar and a slowdown in global trade and growth. Despite falling growth in exports to the US, rising volatility in global financial markets, high and volatile international commodity prices, and an increasingly clouded outlook for the world economy, economic activity in most East Asian economies continued at strong rates through the end of 2007 and into early 2008. Fortunately, the countries of East Asia are generally better prepared than ever to deal with the vicissitudes of the global economy in this more uncertain time. Reflecting lessons learned from the East Asian financial crisis of a decade ago, today most economies in the region have strong external payments positions and large international reserves, prudent fiscal and monetary policies, better regulated banking systems, and profitable and competitive corporations. East Asia's trade and financial relations with the rest of the world have become steadily more diverse. The region is becoming more of a growth pole in the world economy, proving to be a force for stability at a time when the industrial economies are slowing
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other papers
    Series Statement: World Bank E-Library Archive
    Abstract: The 2005 Gleneagles G8 summit in July 2005 stimulated a concerted effort of the Multilateral Development Banks (MDBs) to broaden and accelerate programs on access to energy and climate change mitigation and adaptation through the Clean Energy Investment Framework (CEIF). At the Gleneagles summit, it was agreed that a report on the implementation of the CEIF would be prepared for the 2008 G8 (Group of Eight: Canada, France, Germany, Italy, Japan, Russia, the United Kingdom, and the United States) summit hosted by Japan. This joint report of the MDBs to the G8 summit in Hokkaido is intended to provide information on the outcomes and lessons learned under the CEIF, describe the collective MDB objectives for addressing the energy access and climate change challenges, and outline how the MDBs plan to build on the CEIF experience to date to more fully achieve these objectives. The report builds upon the 'the MDBs and the climate change agenda' report that was presented at the December 2007 Bali climate change conference. This report describes actions taken by each MDB to develop climate change strategies and programs of actions tailored to their particular client needs, based on resources and funding mechanisms currently available. Under the CEIF, the MDBs have strengthened collaboration on analytical work and programming and committed to expand this collaboration to optimize the impact of their collective actions. In addition to reporting on the status of the CEIF, this report outlines the collective ambition of the MDBs with respect to assisting the developing countries in meeting the climate change challenge, summarizes their evolving strategies designed to meet these objectives and the mechanisms through which they intend to achieve the necessary collaboration to optimize the collective impact of their climate change interventions
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Law and Justice Study
    Abstract: The objective of this research was to document the workings of non-state justice at the village level, with a particular focus on social inclusion and the perspectives of the marginalized. The paper also sought to understand the dynamics of change and how to translate them into a framework that embraces the strengths and addresses some of the shortcomings of non-state justice. It draws on 34 ethnographic case studies collected from five provinces in Indonesia over an eighteen month period and quantitative survey data from the 2006 Governance and Decentralization Survey. This paper will help to expand understanding of the complex and varied processes of non-state justice and thus help policy makers find new ways of building an effective legal and judicial system accessible by all Indonesians. This paper proposes a framework for forging a meaningful middle ground between the current practices of non-state justice and the formal justice system. This approach seeks to marry the social accessibility, authority and legitimacy of informal processes with accountability to the community and the state. This middle ground attempts to accommodate different socio-cultural contexts, customs and habits but at the same time introduces common principles to protect the marginalized
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Other Environmental Study
    Abstract: This Monitor builds on the experiences of other Country Environment Monitors in the region and embraces the key principles articulated by the framework for preparing Country Environmental Analysis initiatives of the Asian Development Bank and the World Bank. The Monitor has three sections. Section 1 reviews trends in natural resources and environmental quality, along with their linkages to poverty. The capacity of Government institutions, policies, legislation and instruments are assessed in Section 2. The environmental challenges confronting the country are analyzed in Section 3. Information has been obtained from a variety of sources, including the Lao Government and Bank publications, academic and scholarly material and personal experience. Several surveys and assessments were undertaken to obtain additional data and insights: (i) A Capacity Assessment was undertaken to assess the effectiveness of the country's institutions regulatory framework; (ii) Public Environmental Expenditures were reviewed to better understand the allocation and trends in environment-related expenditures; (iii) A Survey of Environmental Attitudes was undertaken to assess the perceptions of individuals working in environmental professions in Lao PDR; and (iv) the Poverty-Environment Nexus in Lao PDR was further studied. The results of these surveys and analyses are included in the report
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: Growth in Emerging East Asia accelerated to reach 8.1 percent in 2006. This was the strongest pace of economic expansion in the last ten years and a fitting commemoration of the decade that has passed since the start of the Asian financial crisis in 1997. The region's accomplishments in grappling with and overcoming the crisis and in returning to solid growth are varied and impressive -- a doubling in the dollar value of regional output from pre-crisis levels, the emergence of China into the front rank of global economic powers, a halving in poverty rates, accumulation of over 2 trillion dollars in foreign reserves. But even as the region celebrates recovery, new challenges are arising, which could slow or even derail growth if not properly handled. The report looks at these issues in a section on Ten years after the crisis. Another challenge of staggering proportions that lies ahead is East Asian urbanization: The region's population will rise by around 17 percent between 2000 and 2025 but its urban population will jump by 65 percent or 500 million. The Special Focus in this report on Sustainable Development in East Asia's Urban Fringe looks at the issues
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: Growth in Emerging East Asia is expected to exceed 8 percent in 2007 for a second year in succession and to moderate only slightly in 2008. Our projections for regional growth in 2007 and 2008 have been substantially increased compared to six months ago, mainly due to the unexpected and large domestic demand-led acceleration of growth in China. Growth also picked up in most of the other larger economies of the region, again a result of more buoyant investment and consumption spending. Concerns about the impact of the US sub-prime crisis and the renewed surge in oil prices have clearly increased downside risks. Nevertheless we expect that the stronger growth momentum in the region will carry through 2008. There are as yet few signs of a significant pick-up in underlying core inflation pressures or of other domestic constraints or imbalances that would require a marked slowing of growth
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Public Expenditure Review
    Keywords: Infrastructure Economics ; Infrastructure Economics and Finance ; Property Rights ; Stewardship
    Abstract: This module draws upon the work of the local consultants together with the Avag report on irrigation and a study on the specific problems in rural infrastructure. It aims to given a broad overview of infrastructure problems, the outlook given public policy objectives, and a suggested public policy framework and proposes medium term policy, structural, governance and regulatory improvements in the sector. In Armenia considerable progress has been made in bringing infrastructure services up to economically efficient levels. But major challenges remain concerning service quality, sustainability and adequacy of development to meet demand. The government faces three challenging issues in respect of infrastructure: the desirability of policy settings consistent with sustained high rates of growth; improving the stewardship of state infrastructure assets; and making effective use of future investments, particularly those arising from donor contributions such as the millennium challenge corporation along with funds from customers. Consistent with implementation of the Government's growth and poverty alleviation strategy and related policy settings supportive of the continuation of rapid economic growth including high rates of private investment. The report estimates that addressing basic minimum infrastructure needs will require about USD 300 million of investment
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Energy Study
    Keywords: Electric Power ; Energy ; Energy Policies and Economics
    Abstract: It is generally believed that Afghanistan has one of the lowest levels of access to electricity in the world; the figure of 6 percent access on the national level is often cited. While it is certainly true that overall access to electricity is low in this overwhelmingly rural and poor country, a review of recent household survey data and updated national utility data suggests that the access to electricity is somewhat higher than has generally been supposed, particularly in urban Afghanistan. This note presents the new data and examines the implications of higher levels of access for policy makers and the managers of the power system in Afghanistan, particularly in Kabul. Recommendations to improve the quality of the utility's knowledge of the power system in Kabul follow the analysis of the survey data. The analysis of the Kabul Household Energy and Water Survey (KHEWS) data also considered the possibility that so-called 'minor consumers' might account for the discrepancy between the estimates of access to electricity more accurately reflect the actual level of access to electricity in Afghanistan and particularly in Kabul. At the very least, it would seem reasonable to conclude that the estimate based on Breshna data represents the minimum boundary of the estimate of access to electricity, while the survey data represent the maximum boundary, with the actual level somewhere in between and likely closer to the survey results
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Country Environmental Analysis
    Abstract: Honduras has accomplished important political, economic, and social achievements in the recent past. The country underwent a successful transition from an authoritarian military regime to a pluralistic democracy. The list of economic achievements of the last four years includes: macroeconomic stability, improvements in the business climate and the performance of the financial sector, and putting in place a sound framework for public sector financial management. Progress toward achieving the Millennium Development Goals (MDGs) has also been significant. Despite these achievements, state institutions are still fragile and the governance framework is weak. Furthermore, notwithstanding the country's economic and social improvement, almost two-thirds of the population still lives below the poverty line and key structural constraints on growth have still to be addressed. The key development challenges for Honduras are: (a) strengthening governance and improving the effectiveness of the government, and (b) accelerating its recent growth performance and translating growth into poverty reduction. Among the recommendations the report makes are: The development of additional regulations, strengthen links between the environmental impact assessment (EIA) and other management instruments, particularly Strategic Environmental Assessments (SEAs) and zoning. Work with the Honduran government to strengthen the follow-up and compliance process as well as strengthening public participation in the EIA process
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco SNRS exam 642-502 Attack threats Router management and administration Authentication, Authorization, and Accounting (AAA) and Cisco Secure Access Control Server RADIUS and TACACS+ Cisco IOS® Firewall feature set Securing networks with Cisco routers Mitigating Layer 2 attacks IPsec and Easy Virtual Private Network (VPN) Security Device Manager (SDM) CCSP SNRS Exam Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the SNRS exam. Network security engineers Greg Bastien, Sara Nasseh, and Christian Degu share preparation hints and test-taking tips, helping you identify areas of weakness and improve your knowledge of router and switch security. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP SNRS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation summary information gives you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful test engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP SNRS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press®. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and over 200 practice questions for the SNRS exam, all available in study mode, test mode, and flash card format. Includes a FREE 45-Day Online Edition T...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: An introduction to network attack mitigation with IPS Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the "big picture"? What are the best practices related to IPS? How is IPS deployed, and what should be considered prior to a deployment? Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS project-from needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what "flavors" of IPS are available. The book will answer questions like: Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace. Understand the types, triggers, and actions of IPS signatures Deploy, configure, and monitor IPS activities and secure IPS communications Learn the capabilities, benefits, and limitations of host IPS Examine the inner workings of host IPS agents and management infrastructures Enhance your network security posture by deploying network IPS features Evaluate the various network IPS sensor types and management options Examine real-world host and network IPS deployment scenarios This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques. Includes a FREE 45-Day Online Edition
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of IP telephony No IP telephony experience required Includes clear and easily understood explanations Makes learning easy Your first step to the world of IP telephony begins here! Learn how voice and data communications merge in voice-over-IP technology Use this reader-friendly guide to understand the benefits of this technology Explore real-life applications and theories through case studies in every chapter Welcome to the world of voice over IP We use either a telephone or e-mail for much of our day-to-day communication. Today, these two worlds are merging, and companies can place phone calls over their existing data network infrastructures using a technology called voice over IP (VoIP). No prior experience with VoIP technology is required Voice over IP First-Step is anyone's introduction to the world of VoIP networks. The concepts in this book are presented in plain language, so you don't need in-depth background knowledge to comprehend the technologies covered. If you work with data networks, if you work with telephony networks, if you're a home user interested in how VoIP can reduce your monthly phone bill, or if the concept of VoIP simply intrigues you, this book is for you.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: The report stipulates growth in Emerging East Asian countries eased modestly from 7.5 percent in 2004 to 6.8 percent in 2005. The slower pace of activity was most clear in the Newly Industrialized Economies (NIEs), and in some of the middle income economies of South East Asia. But it was not universal. Growth accelerated in Indonesia and Vietnam, and continued at very high rates in China. In addition, while the moderation in activity in the NIEs and South East Asia occurred in the first part of 2005, activity was generally rebounding in the latter part of the year. Indeed growth for 2005 as a whole, generally turned out higher than we had expected six months ago. The prospects for 2006 also look reasonably firm, with aggregate regional growth expected to exceed 6.5 percent for a third year in a row. Global high tech demand slowed in late 2004 and early 2005, causing a downturn in tech-reliant East Asian export growth, but then rebounded strongly in the second half of the year. High oil prices clearly played a large role in moderating growth in 2005. While the report assumes that oil prices have now peaked, they are still expected to average 10 percent higher in 2006 than in 2005, so that some of the adverse impact is still likely to be playing out in 2006. Nevertheless, the real surprise has been that the highest real oil prices in more than 25 years did not inflict more serious economic damage, with growth not falling below 4 percent in any of the main economies of the region
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: Growth in Emerging East Asia is expected to reach close to 8 percent in 2006, the second strongest pace in the five year long economic expansion underway in the region since 2001. Emerging East Asia comprises Developing East Asia (China, Indonesia, Malaysia, Philippines, Thailand, Vietnam and some smaller economies) and four Newly Industrialized Economies or NIEs (Hong Kong, Korea, Singapore and Taiwan, China). The rest of this summary provides further information on the main cross-country trends and policy issues discussed in this report. Developments at the country level are discussed in the Country Sections at the back of the report, while fuller Country Briefs are available at the website associated with this report. The Special Focus in this report is on Investing in Young People in East Asia and the Pacific, a study of the lessons for East Asia from the World Bank's recent World Development Report 2007: Development and the Next Generation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Country Environmental Analysis
    Abstract: The economic losses resulting from the environmental impacts considered in this report are equivalent to more than 4 percent o f Bangladesh's Gross Domestic Product. Among these impacts, three sources of environmental degradation stand out as currently receiving insufficient attention given their relative significance: (1) in door and urban air pollution, (2) the degradation o f water quality in Dhaka, and (3) the decline of capture fisheries. The economic losses associated with these three concerns alone may amount to more than 2.7 percent of GDP. The report proposes a set of actions in each o f these areas, and also identifies a series of measures that could be taken to strengthen environmental governance, which forms an overarching constraint to improved environmental management across all issues. While the report estimates the economic losses associated with the environmental impacts considered, it does not provide a benefit-cost or cost-effectiveness analysis of the proposed mitigating actions. It will be important to examine the costs of the proposed actions in more detail as an element of the follow-up work in each o f the priority areas
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Country Environmental Analysis
    Abstract: The urgency of addressing Pakistan's environmental problems has probably never been greater. Conservative estimates presented in this report suggest that environmental degradation costs the country at least 6 percent of GDP, or about Rs. 365 billion per year, and these costs fall disproportionately upon the poor. The most significant causes of environmental damage identified and estimated in this report are (1) illness and premature mortality caused by air pollution (indoor and outdoor), (almost 50 percent oft he total damage cost); (2) diarrhoeal diseases and typhoid due to inadequate water supply, sanitation and hygiene (about 30 percent of the total), and (3) reduced agricultural productivity due to soil degradation (about 20 percent of the total). The magnitude of these costs indicates that environmental decay has become a serious development concern. Following a discussion of the analytical framework for environmental outcomes, , the report analyzes the main binding constraints to improving environmental performance as falling into four categories, (1) gaps in institutional design, (2) gaps in the regulatory framework, (3) capacity limitations, and (4) gaps in incentives and accountability. Of these, weak incentives and low levels of public accountability remain the critical constraints on performance. Public scrutiny of performance is ultimately a source of strength that leads to stronger institutions with greater public trust and support. The principal features of these constraints are discussed, as are recommendations for moving forward to more sustainable economic growth. The annex (Volume 2) provides a comprehensive overview of the data and methods used to estimate the costs of environmental degradation in three environmental damage categories and three natural resource damage categories: (1) urban air pollution, including particulate matter and lead, (2) water supply, sanitation and hygiene, (3) indoor air pollution, (4) agricultural damage from soil salinity and erosion, (5) rangeland degradation, and (6) deforestation. Data limitations have prevented estimation of degradation costs at the national level for coastal zones, municipal waste disposal, and inadequate industrial and hospital waste management
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Country Environmental Analysis
    Abstract: Since the signing of the Peace Accords in 1996, Guatemala has made substantial progress in consolidating peace and democracy. While progress in socioeconomic development has been uneven, there have been important gains in education and health coverage, sustained increases in social sector spending, improved coverage of basic utility services, and better management of public finances, among other gains. Unfortunately, progress has been slower than expected in several important areas, including economic growth rates. Based on the best regional and international practices, this report concludes that mainstreaming environmental considerations into sectoral policies rather than scaling-up the operations of environmental agencies is the best way to prepare Guatemalan institutions for current environmental challenges and those it will encounter in the future. The report also emphasizes the need to provide the right incentives to economic agents (e.g., promoting compliance through achievable requirements but with credible sanctions to violators, rather than trying to change behavior by threatening with criminal charges that are ultimately not enforced), and to engage civil society by improving information and participation mechanisms
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Country Environmental Analysis
    Abstract: El Salvador, a small country with limited national resources, needs to grow through its main comparative advantage, which is its strong culture of competitive businesses. To do so, however, the government needs to ensure that the best affordable environmental management is in place to secure sustainable economic development. The benefits of further improvements to the environmental institutional and regulatory frameworks will be substantial not only to facilitate and sustain trade and infrastructure expansion, but in terms of preserving the natural resource base on which economic growth depends. Moreover, while DR-CAFTA is expected to bring new possibilities for investment and trade, the agreement will also raise the scrutiny and monitoring by El Salvador's trade partners regarding environmental compliance. Maintaining low compliance rates would add unnecessary friction and raise the regulatory risks for investing in the country
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Other Environmental Study
    Abstract: Over the last five decades, Colombia has made substantial progress in protecting its environment. This includes restructuring its legal and regulatory landscape, undertaking policy initiatives, and strengthening its capacity for protecting and managing its natural resources and environmental quality, and establishing a system of national parks and forestry reserves that covers more than a quarter of the country. Colombia's environmental management framework has focused on three main environmental priorities: (a) river basin management and conservation of water resources, (b) reforestation, and (c) conservation o f biodiversity. The analysis of the cost of environmental degradation conducted as part of the Country Environmental Analysis (CEA), shows that the most costly problems associated with environmental degradation are urban and indoor air pollution; inadequate water supply, sanitation and hygiene; natural disasters (such as flooding and landslides); and land degradation. The burden of these costs falls most heavily on vulnerable segments of the population, especially poor children under age five. The effects of environmental degradation associated with these principal causes are estimated to cost more than 3.7 percent of Gross Domestic Product (GDP), mainly due to increased mortality and morbidity and decreased productivity. To identify alternatives aimed at abating the cost of environmental degradation, this CEA examines institutional and policy issues in the functioning of the country's environmental management system and suggests some cost-effective interventions
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Financial Sector Assessment Program
    Keywords: Deposit Insurance ; Finance and Financial Sector Development ; State-Owned Banks
    Abstract: The current system of deposit insurance is governed by two different pieces of legislation, each in turn elaborated by a separate National Bank of Belarus (NBB) resolution. The two legislations cover foreign exchange accounts in state owned banks and all other accounts, respectively. The first legislation was the presidential decree of April 20, 1998, which established full coverage for foreign exchange accounts in six state banks. The second legislation is Article 121 of the Banking Code which is the legal basis for coverage for all other deposits and which became effective October 12, 2000. The deposit insurance system is currently characterized by preferential treatment of the authorized banks and in particular Belarusbank and Belagroprombank
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Financial Sector Assessment Program
    Keywords: Autonomy ; Monetary Policy ; Transparency
    Abstract: This note examines the observance by the National Bank of the Republic of Belarus (NBRB) of the good practices on transparency in monetary policy. The transparency analysis was based on a review of relevant laws and regulations and the International Monetary Fund (IMF s) code of good practices on transparency in monetary and financial policies without carrying out a formal principle-by-principle assessment. It was conducted as part of the joint IMF-World Bank Financial Sector Assessment Program (FSAP) mission to Belarus that took place in November 2004. NBRB displays a satisfactory degree of transparency in formulation and implementation of its monetary policy although improvements are possible in several areas. The objectives and responsibilities of the NBRB, and the broad modalities of accountability and public dissemination of the information, are defined in the Statute of the National Bank of the Republic of Belarus and the Banking Code. The monetary policy process is generally well structured and open. In several areas, however, the NBRB should further improve its monetary policy transparency and accountability practices
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Financial Sector Assessment Program
    Keywords: Banking Law ; Finance and Financial Sector Development ; Financial Regulation and Supervision ; Law and Development ; Legal Framework
    Abstract: This detailed assessment of observance with the basel core principles for effective banking supervision is the first external comprehensive assessment of the system of banking supervision in Belarus. The assessment of observance of each of the core principles follows a qualitative approach and is based on the core principles methodology document (October 1999). The assessment method consisted of examining the degree of observance of each of a principle's essential criteria and, where the assessors judged necessary, of the additional criteria. The assessment included a review of the relevant, legally non-binding instruments of the National Bank of the Republic of Belarus (NBRB) under the form of recommendations, the internal provisions of the NBRB, the licensing documents and the bank examination reports prepared by the NBRB, annual reports, the NBRB website, and other relevant material. The assessment is also based on the self-assessment prepared by the NBRB and discussions with staff in the banking supervision area, and with banks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Other Education Study
    Abstract: This report describes an experience, developed jointly by the Uruguayan National Department of Public Education (ANEP) and the World Bank, of the implementation of an Inclusive Education component. The goal is to demonstrate a concrete example of what countries can do to implement such inclusive education in practice, within the framework of strategies proposed by the "Education for All" initiative and the Millennium Development Goals (MDGs).This document does not attempt to provide either details of the conceptual framework or political arguments for setting the international guidelines of inclusive education programs, but rather responds to the demand for practical examples that illustrate an operational strategy. One of the promising characteristics of the Uruguayan experience with the implementation of the Inclusive Education component was that it did not require additional programs or resources; rather, the process was incorporated as a new tool within an overall strategy for improving the quality of education in the country.Although the fact that the component has only recently been implemented (2003) prevents an exhaustive study of its results and impact thus far, publicizing the experience internationally is justifieddue to the need for documentation of actual experiences developed on a national scale. It is hoped that this will allow the public to envisage models for the implementation of inclusive education
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Financial Sector Assessment Program
    Keywords: Competition ; Economic Growth ; Fiscal and Monetary Policy ; Macroeconomics and Economic Growth ; Pension Reform ; Pensions and Retirement Systems ; Social Protections and Labor
    Abstract: This paper analyzes the performance and development of the Mexican pension annuity market in Mexico that stemmed from the 1997 pension reform. The Mexican experience displays interesting characteristics that provide lessons for other countries that still need to design the decumulation phase of their newly established second pillars. At the same, time it raises some technical and policy concerns that need addressing as they could hamper, in the future, the healthy development of the market. This paper benefited from interviews with officials in the Insurance Supervisory Authority (CNSF), the Ministry of Finance (SHCP), the Pension Supervisory Authority (CONSAR), and the Social Security Institute (IMSS) as well as with management of specialized annuity companies. The paper is structured as follows: section one gives introduction; section two briefly summarizes the 1992 and 1997 pension reforms from which the pension annuity market derives; section three analyzes the evolution of the industrial organization, annuity product design and competition, the evolution of assets and liabilities and investment, as well as the regulatory framework for the aforementioned items, and the performance of the market; section four analyzes the development prospects of the market in light of the more recent 2001 and 2002 reforms of the 1997 social security law; and section five gives conclusions and policy recommendations
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs. Part I, "VPNs," introduces the topic of VPNs and discusses today's main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, "Concentrators," provides detail on today's concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network. This security book is part of the Cisco Press® Networking Technology Serie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744 Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to: Understand the composition and deployment of the Cisco AVVID framework in network design Understand the composition and role of the Enterprise Composite Network Model in enterprise network design Design enterprise campus networks and their edge network connectivity to the Internet Understand and implement network management solutions in the network Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking Design and implement appropriate security solutions for enterprise networks Deploy wireless technologies within the enterprise Implement and design IP telephony solutions for the enterprise network CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending revie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 734 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Design and construction ; Computer networks ; Management ; Quality control ; Electronic books ; local
    Abstract: Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to the increased frequency and sophistication of denial-of-service (DoS) and worm attacks. End-to-End QoS Network Design is a detailed handbook for planning and deploying QoS solutions to address current business needs. This book goes beyond discussing available QoS technologies and considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN. The book starts with a brief background of network infrastructure evolution and the subsequent need for QoS. It then goes on to cover the various QoS features and tools currently available and comments on their evolution and direction. The QoS requirements of voice, interactive and streaming video, and multiple classes of data applications are presented, along with an overview of the nature and effects of various types of DoS and worm attacks. QoS best-practice design principles are introduced to show how QoS mechanisms can be strategically deployed end-to-end to address application requirements while mitigating network attacks. The next section focuses on how these strategic design principles are applied to campus LAN QoS design. Considerations and detailed design recommendations specific to the access, distribution, and core layers of an enterprise campus network are presented. Private WAN QoS design is discussed in the ...
    Note: Subtitle on cover: Quality of service in LANs, WANs, and VPNs. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System Secure your endpoint systems with host IPS Build and manipulate policies for the systems you wish to protect Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related Install local agent components on various operating systems Explore the event database on the management system to view and filter information Examine Cisco Security Agent reporting mechanisms for monitoring system activity Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs Collect detailed information on processes and see how they use and are used by system resources Create and tune policies to control your environment without impacting usability Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. By changing the focus to behavior, damaging activity can be detected and blocked-regardless of the attack. Cisco Security Agent is an innovative product in that it secures the portion of corporate networks that are in the greatest need of protection-the end systems. It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. Cisco Security Agent utilizes a unique architecture that correlates behavior occurring on the end systems by monitoring clues such as file and memory access, process behavior, COM object access, and access to shared libraries as well as other important indicators. Cisco Security Agent is the first book to explore the features and benefits of this powerful host IPS product. Divided into seven parts, the book provides a detailed overview of Cisco Security Agent features and deployment scenarios. Part...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    ISBN: 1587052024
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: A detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1 , Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1 , Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 374 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: The essential guide for understanding Ethernet switched networks Understand various Ethernet technologies from 10BASE-T to Gigabit Ethernet Learn about common switching modes, paths, and architectures Delve into the Cisco Catalyst switch architecture and examine the various Catalyst switch models, including the 6000/6500, 4500, and 3750 Become familiar with VLAN concepts, including types of trunks, VLAN Trunking Protocol (VTP), and private VLANs Understand Multilayer Switching (MLS) and the various hardware components that make MLS work Learn how to configure Cisco Catalyst switches in both native and hybrid mode Implement QoS on Cisco Catalyst switches Deploy multicast features and protocols, including PIM, IGMP snooping, and CGMP Utilize data link layer features such as BPDU Guard, BPDU Filter, Root Guard, Loop Guard, RSTP, and MST Evaluate design and configuration best practices Learn how to manage LANs and troubleshoot common problems Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment. Cisco LAN Switching Fundamentals presents an in-depth look at modern campus network requirements. It provides an easy-to-understand introduction to LAN switching best practices using Cisco Catalyst switches. This book provides you with a wealth of details on the architecture, operation, and configuration of the Cisco Catalyst family of switches. You learn about a wide range of topics, including quality of service (QoS), multicast, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Tree (MST), private virtual LANs (VLANs), and configuration using the native and hybrid software interfaces. Design advice and configuration examples are discussed liberally throughout the book to provide you with the best perspective on effective deployment techniques. Finally, the book wraps up with a discussion of steps necessary to troubleshoot common problems and optimize LAN performance. ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 238 p. , ill. ; , 23 cm
    DDC: 004.6/2
    Keywords: Wireless communication systems ; Electronic books ; local
    Abstract: Your First-Step into the World of Wireless Networks No experience required! Gain an understanding of wireless networking basics with this reader friendly guide The first book anyone should read about wireless networks with step-by-step instruction Learn from an author experienced in and known for writing to a generalist wireless audience with a clear, simple-to-understand style As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs. Wireless Networks First-Step , written by Jim Geier, begins with a basic introduction to wireless networks and an explanation of radio wave communications. It then reviews different types of wireless networks including WPANs (wireless personal area networks), WLANs (wireless local area networks), wireless MANs (metropolitan area networks), and WWANs (wireless wide area networks). The final section covers security threats to wireless networks, and solutions to combat these threats. 158720111903232004
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 401 p. , ill. ; , 23 cm
    Keywords: TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: Your first step into the world of TCP/IP No TCP/IP experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding TCP/IP begins here! Learn TCP/IP basics Discover the power of TCP/IP components and subcomponents Use hands-on activities to understand TCP/IP Benefit from examples that illustrate the power of TCP/IP Welcome to the world of TCP/IP! TCP/IP is the world's de facto communications protocol. It is the official protocol of the Internet and, consequently, has become the predominant communications protocol suite in many private networks and internetworks. No TCP/IP experience needed! TCP/IP First-Step explores TCP/IP concepts in a reader-friendly manner that assumes no previous experience. Learn about packetized data transfer, open networking, reference models, and standards bodies. Understand the architecture of the TCP/IP protocol suite and learn about its components, functions, and respective uses. TCP/IP First-Step helps you understand TCP/IP's role in the network. Learn more about the First-Step Series at www.ciscopress.com/firststep.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Field-proven MPLS designs covering MPLS VPNs, pseudowire, QoS, traffic engineering, IPv6, network recovery, and multicast Understand technology applications in various service provider and enterprise topologies via detailed design studies Benefit from the authors' vast experience in MPLS network deployment and protocol design Visualize real-world solutions through clear, detailed illustrations Design studies cover various operator profiles including an interexchange carrier (IXC), a national telco deploying a multiservice backbone carrying Internet and IP VPN services as well as national telephony traffic, an international service provider with many POPs all around the globe, and a large enterprise relying on Layer-3 VPN services to control communications within and across subsidiaries Design studies are thoroughly explained through detailed text, sample configurations, and network diagrams Definitive MPLS Network Designs provides examples of how to combine key technologies at the heart of IP/MPLS networks. Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects. The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and-where applicable-multicast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives. Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrat...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company's valuable information. Build the Best Data Center Facility for Your Business answers your individual questions in one flexible step-by-step reference guide. Benefit from the author's concise and practical approach to data center design and management. The author distills this complex topic by sharing his first-hand and worldwide experience and expertise. Regardless of your experience level, you can fill your knowledge gaps on how to safeguard your company's valuable equipment and intellectual property. This easy-to-navigate book is divided into two parts: Part I covers data center design and physical infrastructure details, and Part II covers data center management and operations. You can also access supplementary online materials for installation instructions, which include customizable data center design templates, written cabling specifications, and sample drawings. If you need a starting point for designing your first data center, regardless of size; if you need to prepare yourself with comprehensive strategies to retrofit or improve an existing one; or if you need proven methods to manage a d...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: World Bank East Asia and Pacific Economic Update
    Abstract: Economic growth in Emerging East Asia reached a cyclical peak of 7.2 percent in 2004 from which it is expected to slow only moderately to about 6 percent in 2005 and 2006. The tragic tsunami disaster, while it had a horrendous impact in terms of loss of life, is expected to have only a limited impact on overall economic growth in the two most seriously affected East Asian economies, Indonesia and Thailand. Among the developing economies in the region growth is expected to ease from over 8 percent - the highest since before the financial crisis - to around 7 percent in the coming period
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Country Environmental Analysis
    Abstract: In 1992, the Government of Egypt endorsed its first National Environment Action Plan (NEAP) which marked a turning point in tackling the challenge of environment and development in Egypt. NEAP was the first policy instrument that has mobilized efforts and investments of both the Government and international donors towards addressing major environmental issues in this country, and building its environmental infrastructure. An Environment Protection Law was enacted in 1994, and a Minister of State for Environment Affairs was appointed in 1997, as the key spokesperson in the Egyptian Council of Ministers. The Egyptian Environmental Affairs Agency, the official environmental operating agency, has expanded its functions and responsibilities in all field of the environment. As a result, the state of the environment has improved particularly in the provision of water supply, in waste water treatment and solid waste management, and in decreasing air and water pollution
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Other Environmental Study
    Abstract: The objective of this report is to provide an estimate of the cost of environmental degradation in Iran. Despite the difficulties involved in assigning monetary values to environmental degradation, such estimates can be a powerful tool to raise awareness about environmental issues and facilitate progress toward sustainable development. It is hoped that this study will provide an instrument for policymakers to better integrate the environment into economic development decisions. In 2002, the annual cost of environmental degradation in Iran was estimated at 4.8 to 10 percent of GDP, with a mean estimate of 7.4 percent (equivalent to USD 8.4 billion or IRR 67,300 billion)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Policy Notes
    Keywords: Affordability ; Health Economics and Finance ; Health Insurance ; Health Systems Development and Reform ; Health, Nutrition and Population ; Private Health Insurance ; Private Sector Development ; Private Sector Economics
    Abstract: There is little current information available on private health facilities in Bihar. Government has little to do with the private sector and no recent attempts have been made to survey the private formal or informal sectors. However, we know that the private sector is the dominant force in health care provision both for outpatient and inpatient services. During site visits to Patna and the neighboring districts, author saw a number of private health clinics clustered by main roads in secondary towns, most of which cater to maternal and child health. Patna is home to a number of impressive private for profit and voluntary facilities. Such facilities have moved in to the fill the vacuum left by a non-performing public sector. In conclusion, the gap between demand and supply has been filled by various private providers, who are seen to be either better or in many cases the only alternative to the public health facilities. They include a range of providers such as informal unqualified providers, Traditional Birth Attendants (TBAs), faith healers, pharmacists or pharmacy assistants in medicine shops, qualified physicians, and Non Government Organization (NGO) clinics and for-profit nursing homes and hospitals. It is important to understand that the private sector does not represent a homogenous group
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Foreign Trade, Foreign Direct Investment, and Capital Flows Study
    Keywords: Access To Information ; Adverse Effects ; Advocacy ; Collective Action ; Coping Strategies ; Discrimination ; Employment ; Food Safety ; Health, Nutrition and Population ; Marketing ; Migration ; Pesticides ; Private Sector ; Productivity ; Public Health ; Public Sector ; Quality Control ; Risk Management ; Rural Development ; Transaction Costs ; World Health Organization
    Abstract: This report summarizes a program of research coordinated by the World Bank and carried out from October 2002 to May 2004. The objectives of the program have been to: 1) Highlight the major dynamics in the evolution of important sanitary and phytosanitary standards (SPS) in selected industrialized countries. 2) Explore the room for maneuver of suppliers of agri-food products in developing countries in the context of evolving regulatory (and commercial) changes and consider the range, appropriateness, and effectiveness of various strategic responses to those changes. 3) Develop a better understanding of the nature and level of the costs of achieving and maintaining compliance (or non-compliance) with international and country-specific SPS standards. The research also identifies and quantifies direct and indirect benefits that may flow from the adoption of the rules, systems, skills, and facilities required to comply with standards. 4) Develop a better understanding of the implications of emerging standards for market and industry structure and wider socio-economic effects. Evidence is sought on how compliance strategies (or the failure to comply with standards) have affected participation by smaller enterprises and farmers in export-oriented supply chains and their impact on employment patterns. 5) Review the scope and nature of ongoing programs of international development agencies to provide technical assistance and other support for capacity-building in trade-related SPS management in low- and middle-income countries, and draw operational lessons from that experience. 6) Draw out the operational implications of these research findings and identify entry points for the World Bank and other development agencies working in this field
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: World Bank E-Library Archive
    Series Statement: Other papers
    Abstract: A solid waste management (SWM) preparation mission was carried out mid-2004 for the World Bank Coastal Cities Environmental Sanitation Project (CCESP). The purpose of the mission was to assess the SEM needs of the cities of Dong Hoi, Nha Trang, and Quy Nhon over a fifteen-year planning horizon, taking into account the quantity, character, and distribution of solid wastes, disposal alternatives and management systems governing administration and finance. The World Bank is now supporting a consultancy, the objectives of which are to present a range of options for use of the private sector in solid waste collection and septage management, to agree a preferred approach for each CCESP city, and then to develop a detailed implementation program. The consultancy is to be conducted over two separate trips to the three project cities. The first trip was conducted between 13 and 30 September, 2005 and included a visit to Da Nang to discuss private sector participation initiatives introduced in that city as part of the World Bank's Three Cities Sanitation Project. This paper presents the initial findings of the public-private partnership (PPP) consultancy team and addresses each key activity. The findings of the visit to Da Nang are also included in this paper
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Policy Notes
    Keywords: Burden Of Disease ; Health and Poverty ; Health Economics and Finance ; Health Insurance ; Health Outcomes ; Health, Nutrition and Population ; Private Sector Development ; Private Sector Economics
    Abstract: This paper presents a rapid private health sector assessment for Karnataka. Karnataka is a middle-tier Indian state with most state-wide health indicators mirroring those for the nation as a whole. In addition to these health statistics, more than half of Karnataka's children suffer from malnutrition. Improving primary health care services is a key to improving these health indicators. Improving health outcomes will depend on improving the quality, outreach and responsiveness of primary health care providers. Government can consider scaling up the successful experiences of community health care financing. More specifically the findings of this study and the discussion that it engenders will be used to inform the design of the proposed Karnataka Health Nutrition and Population (HNP) project. Karnataka currently has 1,685 Primary Health Center's (PHCs) and 583 Primary Health Units (PHUs). The PHC is intended to serve a population of 30,000 with smaller populations in the more remote rural or hilly areas and larger populations covered in urban areas. It is reported that the PHCs are not currently able to fulfill all these functions, many of which have a strong public good component. As such, the private sector can still play a role in delivering these services, although they will have to be funded by the public sector. Some services will have a mixture of public and private good characteristics, while others will be purely private goods. It is the latter group of services that are most amenable to privately-funded, privately provided health care. In general, the public health care system is managed and overseen by the district health officers. Although they are qualified doctors, they have little or no training in public health management and are transferred frequently. Moreover, even if they had the training they do not have the flexibility to reallocate financial, capital and human resources to achieve better outcomes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Financial Sector Assessment Program
    Keywords: Banking Law ; Banking Sector ; Finance and Financial Sector Development ; Law and Development ; Legal Framework ; Profitability
    Abstract: The banking sector is the backbone of the Sudan's financial system and will continue to play an important role as financial intermediary and primary source of financing for the domestic economy. As of December 31, 2003, there were 26 commercial and specialized banking institutions in Sudan which comprised 23 domestic banks and 3 foreign banks. The operations of these banks are based on Islamic principles. The Sudanese financial sector is small relative to Gross domestic product (GDP), but is rapidly growing. Deposits in the banking sector currently represent a little over 10 percent of GDP, and credit to the private sector has been rapidly expanding, driven by a strong economy. At present, the banking system is small enough that a crisis would not have much immediate impact on the overall economy
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Governance ; Inflation ; Investment Climate ; Legal Reform ; Macroeconomics and Economic Growth ; Monitoring and Evaluation ; Poverty Monitoring and Analysis ; Poverty Reduction ; Social Service Delivery
    Abstract: This report was prepared for the PRSP Implementation Forum (November 15-17), in Dhaka, Bangladesh. It covers recent macroeconomic developments and draws on recent and ongoing World Bank research and analysis undertaken in the areas of Governance, Finance and Trade, Public Administration, Infrastructure and Human Development. The report notes that Bangladesh has some impressive and sustained socio-economic trends - which outperform many South Asian and other developing countries, but formidable challenges remain notably on governance issues. However, the Government is beginning to implement a broad-based reform program to tackle governance issues, with donor support and in the area of economic management, it has maintained macroeconomic stability and pushed forward the structural reform agenda despite a difficult political environment. These efforts have produced relatively favorable development outcomes. The report specifically details Bangladesh's progress on the governance agenda, including actions to improve transparency and public expenditure efficiency, responsiveness, revenue mobilization, anti-corruption, and the justice system reform. It also focuses on progress in reducing governance impediments to improve investment climate and empowering the poor. Besides describing preliminary PRSP implementation measures, the report spotlights the country's export growth and competitiveness
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Corporate Governance Assessment
    Keywords: Access To Information ; Accountability ; Authority ; Banking Sector ; Capital Markets ; Cash Flow ; Central Bank ; Charter ; Commercial Banks ; Company ; Conflict of Interest ; Conflicts of Interests ; Finance and Financial Sector Development ; Governance ; Governance and the Financial Sector ; Governance Indicators ; Industry ; National Governance
    Abstract: This report assesses Macedonia's corporate governance policy framework, and enforcement and compliance practices. It highlights recent improvements in corporate governance regulation, makes policy recommendations, and provides investors with a benchmark against which to measure corporate governance in Macedonia. The report identifies a number of key recommendations as follows. The disclosure framework should be overhauled, as part of the on-going revision of the Securities Law. Shareholders should be required to disclose all direct and indirect ownership. The law should increase authority of the Macedonian Securities and Exchange Commission (MSEC), and especially its powers to impose sanctions, while MSEC should develop a strategy to use its new authority to improve corporate governance and shareholder rights. The Macedonian Stock Exchange (MSE) should complete the process of drafting a corporate governance code, should revise its listing rules in line with the Code and the new Securities Law, and consider the development of a "corporate governance tier". The exchange should fully implement a system of electronic information dissemination
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...