Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2000-2004  (118)
  • 1980-1984
  • Upper Saddle River, N.J. : Prentice Hall PTR  (68)
  • Indianapolis, IN : Cisco Press  (50)
  • Electronic books ; local  (118)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 958 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Electronic data processing personnel ; Certification ; Telecommunication ; Switching systems ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Gain necessary hands-on experience implementing CCNP BCMSN concepts with this practical lab guide Lab configurations include explanations of equipment set-up and execution Valuable reference tool for Catalyst switches, including shortcuts, caveats, and application of the most advanced features Real-world scenarios represent the whole range of CCNP BCMSN 642-811 exam topics CCNP Practical Studies: Switching (CCNP Self-Study) provides CCNP candidates with an in-depth, hands-on experience in configuring Cisco Catalyst switches. This practical guide shows intermediate level networkers how to apply the theoretical knowledge they have gained through CCNP coursework and exam preparation. Configuration labs performed within this book will cover all technologies tested on the BCMSN 642-811 exam, as well as a number of real world scenarios that will test users' overall understanding of multilayer switching. The labs come complete with full explanations, highlighting why the chosen commands and techniques are recommended. In addition to applicable labs, this book also provides general information on various switching technologies, as well as tips, tricks, shortcuts, and caveats for deploying Cisco switching gear in production environments. This book also includes exercises (similar to traditional mathematics exercises) that will help readers internalize, practice, and memorize certain concepts and thought processes necessary to successfully deploy a switched network. Part of the Practical Studies series from the Cisco Press, CCNP Practical Studies: Switching provides self-study based hands-on experience. As such, it can be used in conjunction with other Cisco Press titles and is an excellent companion to instructor-led training from a Cisco Learning Partner.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 739 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Note: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 808 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Extranets (Computer networks) ; Electronic books ; local
    Abstract: Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN) Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues Refer to specially designed flowcharts to identify issues and find solutions fast Consolidate VPN troubleshooting knowledge through bonus hands-on labs Read and understand detailed analysis of all relevant VPN show and debug command output Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. This book not only shows you how to correct problems but also how to avoid them in the first place with expert VPN configuration guidance and optimization tips. Each chapter in Troubleshooting Virtual Private Networks includes a step-by-step, end-to-end troubleshooting approach to a different VPN technology. In-depth technical discussions and configuration reviews orient you to the VPN technology and get you ready to work. To help you access the answers you need, you'll find flowcharts in ea...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The only home networking book you'll ever need Setting up a home network doesn't need to be difficult. You can use this easy-to-understand reference to set up your home network, secure it, and turn it into an entertainment network. Don't be fooled by other guides-it can be this simple: It's Easy-Set up your home network with this visual step-by-step guide. Quit Wasting Time and Money-Buy the network gadgets and equipment you need. Make It Secure-Use simple tips to make your network secure. Wow the Neighbors-Turn your home network into an entertainment network. What Went Wrong-Fix common problems you might encounter while setting up your network.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 820 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. In addition to acting as a key study aid for the CCSP SECUR 642-501 exam, this book will be an invaluable theory and configuration guide for years to come. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a Cisco authorized, self-paced learning tool that helps you gain mastery over all security techniques and technologies, including newer topics such as Cisco Easy VPN and Security Device Manager (SDM). Chapter overviews bring you quickly up to speed on technologies you can use to secure your network. Configuration examples are designed to show you how to make Cisco IOS devices secure, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with Cisco IOS security or a study guide for the 642-501 exam, CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is the reference you are looking for. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is part of a recommended learning path from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products fro...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 455 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.67/8
    Keywords: Electronic data processing personnel ; Certification ; Extranets (Computer networks) ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-511 foundation learning Understand the underlying principles of VPNs Learn about and identify proper implementation of remote access and site-to-site VPNs Identify the features, functions, and benefits of the Cisco VPN 3000 Concentrator Series Configure and test a remote access VPN using preshared keys on the Cisco VPN 3000 Concentrator Work with the RIP and OSPF dynamic routing protocols Gain proficiency with the VPN Client Firewall Apply digital certificates on the Cisco VPN 3000 Concentrator Use the Cisco 3002 Hardware Client to configure and test a remote access VPN Implement advanced VPN client features such as load balancing, reverse route injection, and the appropriate use of backup servers Configure LAN-to-LAN VPNs on the Cisco 3000 Concentrator Offer granular user-level security with user and unit authentication Learn how to use VPN through NAT and resolve real-world implementation challenges Provide a sound level of support and administration skills for day-to-day management of a VPN 3000 Concentrator-based VPN by utilizing the tools resident in the Concentrator CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a complete reference for professionals who intend to work with virtual private networks (VPNs) using IPSec. It includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. In addition to acting as a valuable study aid for the CCSP CSVPN 642-511 exam, this book is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients. CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over all techniques and technologies related to Cisco Systems VPN products. Chapter overviews bring you quickly up to speed and prepare you to get to work on securing your network. Detailed configuration examples allow you to take advantage of Cisco VPN products in no time. Unique chapter-ending review questions reinforce key concepts and test your knowledge. Whether you are seeking a reference guide to plan, administer, and maintain a VPN based upon the Cisco VPN 3000 Concentrator or are looking for a study guide for the 642-511 exam, CCSP Self-Study: Cisco Secure Virtual P...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 292 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 004.67
    Keywords: Computer networks ; Management ; Network performance (Telecommunication) ; Electronic books ; local
    Abstract: Learn about the technologies that drive fast broadband access in the first mile and master the design of first mile access networks Understand the motivating forces behind first mile access networks and learn about the technology and business requirements for first mile access solutions Master the design of passive optical networks (PON) Build EPON solutions and differentiate them from BPON and GPON Enhance bandwidth capacity in the access area using CWDM technology Learn about and design DSL and power-line communication (PLC) networks Discover the use of WiFi in the first mile and study the subsystems involved in a WiFi solution Learn the importance of management in first mile access networks and create a business case for diverse first mile access networks First Mile Access Networks and Enabling Technologies provides a platform for showcasing first mile access technologies and associated network solutions. Using this book, you learn about the bandwidth bottleneck within the first mile and explore the resulting business prospects. Benefit from a thorough and thoughtful discussion of the business case for the first mile, which helps you approach the issue from multiple perspectives. Examine multiple access technologies, understand the diversity of solutions within this area, and take your solutions further using sound and unique management techniques. Utilize the solid and tested implementation method provided by this book to remove networking anomalies, such as the digital divide. This book helps you understand and capitalize on the market opportunity presented by the first mile. First Mile Access Networks and Enabling Technologies covers multiple technologies, protocols, and business methods and can be used to understand the growth of first mile access networks and resulting business opportunities. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442213 , 0132442213
    Language: English
    Pages: xv, 501 p , ill. , 25 cm
    Series Statement: Prentice Hall communications engineering and emerging technologies series
    Parallel Title: Erscheint auch als
    Keywords: Code division multiple access ; Standards ; Spread spectrum communications ; Mobile communication systems ; Electronic books ; local
    Abstract: cdma2000 in depth: architecture, protocols, design, and operation This is a complete guide to the architecture and operation of cdma2000 networks. Three leading experts begin by reviewing the theory of CDMA communications, then systematically discuss every component of a cdma2000 network, including radio access networks, packet core networks, mobile stations, and their reference points. The authors present in-depth coverage of the cdma2000 air interface protocols between mobile and base stations; physical layer design; media access control; layer 3 signaling; handoffs; power control; radio resource management for mixed voice and data services; radio access network performance; and end-to-end call flows for circuit switched voice, packet data, and concurrent services. Coverage includes: CDMA and spread spectrum fundamentals: modulation/demodulation, forward error correction, turbo coding, and diversity Applications and services, including conversational voice, Web browsing, file transfer, WAP, video streaming, and VoIP Evolution of integrated data and voice services (1xEV-DV) Handoff principles and types, including idle, access, soft, and hard handoffs Reverse and forward link power control principles, algorithms, and implementation aspects Algorithms and implementation aspects for radio resource management End-to-end network operations: location and state management, call processing, SMS, and more This is an ideal reference for professionals designing or building cdma2000 infrastructure and mobile stations, operators deploying and managing cdma2000 networks, and any wireless communications engineer who wants a thorough understanding of cdma2000 technology.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xix, 661 p. , ill. ; , 24 cm. +
    DDC: 006.3/7
    Keywords: Computer vision ; Electronic books ; local
    Abstract: The state-of-the art in computer vision: theory, applications, and programming Whether you're a working engineer, developer, researcher, or student, this is your single authoritative source for today's key computer vision innovations. Gerard Medioni and Sing Bing Kang present advances in computer vision such as camera calibration, multi-view geometry, and face detection, and introduce important new topics such as vision for special effects and the tensor voting framework. They begin with the fundamentals, cover select applications in detail, and introduce two popular approaches to computer vision programming. Camera calibration using 3D objects, 2D planes, 1D lines, and self-calibration Extracting camera motion and scene structure from image sequences Robust regression for model fitting using M-estimators, RANSAC, and Hough transforms Image-based lighting for illuminating scenes and objects with real-world light images Content-based image retrieval, covering queries, representation, indexing, search, learning, and more Face detection, alignment, and recognition--with new solutions for key challenges Perceptual interfaces for integrating vision, speech, and haptic modalities Development with the Open Source Computer Vision Library (OpenCV) The new SAI framework and patterns for architecting computer vision applications
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxx, 540 p. , ill. ; , 24 cm. +
    DDC: 005.72
    Keywords: Microsoft Office ; XML (Document markup language) ; Electronic books ; local
    Abstract: Co-authors are the world-renowned inventor of markup languages and a developer of the W3C XML Schema specification Detailed coverage of Office 2003 Professional XML features, plus all the XML knowledge you need to use them Learn to edit your XML document with Word, analyze its data with Excel, store it with Access, and publish it to the Web with FrontPage® Build dynamic custom XML forms with the remarkable new InfoPath™ 2003-structured data collection with word processing flexibility From the Foreword by Jean Paoli, Microsoft XML Architect and co-editor of the W3C XML specification: "XML enabled the transfer of information from server to server and server to client, even in cross-platform environments. But the desktop, where documents are created and analyzed by millions of information workers, could not easily participate. Business-critical information was locked inside data storage systems or individual documents, forcing companies to adopt inefficient and duplicative business processes. "This is a book on re-inventing the way millions of people write and interact with documents. It succeeds in communicating the novel underlying vision of Office 2003 XML while focusing on task-oriented, hands-on skills for using the product." Desktop XML affects every Office 2003 Professional Edition user! It transforms millions of desktop computers from mere word processors into rich clients for Web services, editing front-ends for XML content management systems, and portals for XML-based application integration. And this book shows you how to benefit from it. You'll learn exactly what XML can do for you, and you'll master its key concepts, all in the context of the Office products you already know and use. With 200 tested and working code and markup examples and over 150 screenshots and illustrations from the actual shipped product (not betas), you'll see step by step how: Office users can share documents more easily, without error-prone rework, re-keying, or cut-and-paste. Office data from your documents can be captured for enterprise databases. Office documents can be kept up-to-date with live data from Web Services and enterprise data stores. Office solutions can overcome traditional limitations by using XML and Smart Documents. BONUS XML SKILLS SECTION! All the XML expertise you'll need, adapted for Office 2003 users from the best-selling Charles F. Goldfarb's XML Handbook, Fifth Edition : the XML language, XML Schema, XPath, XSLT, Web services ... and m...
    Note: "CD-ROM with full-function trial of Microsoft InfoPath 2003"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxix, 641 p. , ill. ; , 24 cm
    DDC: 005.74
    Keywords: Computer network protocols ; Database management ; Internet ; Electronic books ; local
    Abstract: "The book that Microsoft should have written, but didn't." -Jeremy Allison, Samba Team "Your detailed explanations are clear and backed-up with source code-and the numerous bits of humor make a dry subject very enjoyable to read." -J.D. Lindemann, network engineer, Adaptec, Inc. The first developer's guide to Microsoft®'s Internet/Intranet file sharing standard For years, developers and administrators have struggled to understand CIFS, Microsoft's poorly documented standard for Internet file sharing. Finally, there is an authoritative, cross-platform guide to CIFS capabilities and behavior. Implementing CIFS not only delivers the priceless knowledge of a Samba Team member dedicated to investigating the inner workings of CIFS, it also identifies and describes crucial specifications and supporting documents. Provides essential information for designing and debugging large Windows® and/or Samba networks Offers clear, in-depth introductions to Server Message Block (SMB), NetBIOS over TCP/IP (NBT), browser services, and authentication Drills down into the internals of CIFS, exposing its behavior on the wire and at the desktop-and its strange quirks Presents illustrative code examples throughout Reflects years of work reviewing obscure documentation, packet traces, and sourcecode Includes the SNIA CIFS Technical Reference Implementing CIFS will be indispensable to every developer who wants to provide CIFS compatibility-and every administrator or security specialist who needs an in-depth understanding of how it really works.
    Note: Includes bibliographical references (p. 623-631) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco QOS 642-642 exam. The official study guide helps you master all the topics on the QOS exam, including QoS concepts, tools, and architectures Modular QoS CLI (MQC), QoS Policy Manager (QPM), and AutoQoS Classification and marking Congestion management Traffic shaping and policing Congestion avoidance through drop policies Compression tools and link fragmentation and interleaving (LFI) tools for link efficiency LAN QoS QoS best practices The CCVP certification validates a robust set of skills in implementing, operating, configuring, and troubleshooting a converged IP network. A solid understanding of quality-of-service (QoS) features and implementation is essential for CCVP certification and is also a core component of the CCIP® certification. Cisco QOS Exam Certification Guide , Second Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the QOS 642-642 exam. Senior instructor and best-selling author Wendell Odom and senior AVVID consultant Michael Cavanaugh share preparation hints and test-taking tips, helping you identify areas of weakness and improve your QoS knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Cisco QOS Exam Certification Guide , Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary tables, figures, and snapshot information make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. Cisco QOS Exam Certification Guide , Second Edition, is part of a recommended learning path from Cisco Syst...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HD...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the performance and availability of network applications and the network infrastructure with application performance management Understand how to identify applications critical to your business model Identify basic application characteristics and how they can be optimized for transmission Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications Improve service delivery and outsourcing decisions by utilizing meaningful SLAs Identify and solve network application performance problems, saving valuable time and money Includes real-world case studies that cover design and performance issues The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources. As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers. Yet networks remain congested, and applications continue to run slowly. Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle. Optimizing Applications on Cisco Networks takes a practical look at how application performance management can assist in the end-to-end application delivery model by proactively identifying hot spots within an organization. This book covers network dependent application delivery, with an emphasis on optimizing the underlying infrastructure, procedures, and methodologies to aid and measure delivery. The book also covers applications, delivery techniques, and QoS protocols. Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish service-level criteria, and ensure that these system configurations are continually assessed to maintain the desired level of service. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture. Cisco ASA and PIX Firewall Handbook is a guide for the most commonly implemented features of the popular Cisco Systems® firewall security solutions. This is the first book to cover the revolutionary Cisco ASA and PIX® version 7 security appliances. This book will help you quickly and easily configure, integrate, and manage the entire suite of Cisco® firewall products, including Cisco ASA, PIX version 7 and 6.3, the Cisco IOS router firewall, and the Catalyst Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Shaded thumbtabs mark each section for quick reference and each section provides information in a concise format, with background, configuration, and example...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 498 p. , ill. ; , 24 cm
    Keywords: Fiber optics ; Handbooks, manuals, etc ; Fiber optics ; Metropolitan area networks (Computer networks) ; Optical communications ; Handbooks, manuals, etc ; Optical communications ; Electronic books ; local
    Abstract: Plan, design, and configure high-speed fiber-optic networks Coverage includes: Configuring ONS 15454 and ONS 15327 platforms Architecture for building Metropolitan Ethernet Transparent LAN Services (TLS) Packet over SONET (PoS) network design, configuration, and verification Inner workings of dense wavelength division multiplexing (DWDM), including operability with the ONS 15216 product family Principles of Dynamic Packet Transport (DPT) SONET background, including structures, components, and network design Bonus case studies, which challenge you to select equipment and design a metro optical network Fiber-optic networking has several significant advantages over traditional wired and wireless networks: optical signals can travel much farther than electrical signals, are more secure, are resistant to electromagnetic interference, and have the potential to provide bandwidth in the terabits per second range (1000 Gbps). Service providers must satisfy the always-increasing networking demands of customers while keeping costs to a minimum. Optical networks must meet the challenge of supporting multiple types of transmissions including voice, video, and data traffic. Although time-division multiplexing (TDM) has provided a growth path for services, it is more constrained than IP + Optical strategies like the Cisco Dynamic Packet Transport (Resilient Packet Ring). The Cisco Systems® end-to-end IP + Optical networking strategy provides an intelligent converged network in which optical infrastructures can be used to their fullest potential. While most reference books focus on the theory involved in SONET and optical infrastructures, Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) focuses on the practical application of planning and configuring optical networks that involve SONET, DWDM, Metropolitan Ethernet, Packet over SONET, and Dynamic Packet Transport (Resilient Packet Ring). Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. This volume is in the Certification Self-Study Series offered by Cisco Press. Books in this series provide officially deve...
    Note: "Plan, design, and configure high-speed fiber-optic networks"--Cover. - Includes bibliographical references (p. 483) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM. Design and implement effective network solutions by mastering the design process that is used by successful networking professionals Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach Create effective and customizable security solutions across the spectrum of SMB types and sizes Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions Implement wireless LAN solutions that facilitate productivity and workforce optimization In today's business world, investing in technology solutions that improve productivity and save money is critical, but the road to a modern, technology-driven business is full of pitfalls. Cisco Network Design Solutions for Small-Medium Businesses zeros in on critical solutions for networking professionals who are deploying computer networks within a small-medium business (SMB). You'll learn about core networking issues and associated solutions, including security, IP telephony, unified communications, customer relations management (CRM), wireless LANs, and more within this complete design guide. Cisco Network Design Solutions for Small-Medium Businesses is separated into two parts. Part I helps you explore the network design process, survey the SMB landscape, and identify your network requirements from the edge to the core for an effective solution implementation. Part II delves into security, CRM, IP telephony, unified messaging, IP/TV, and wireless LAN solutions, which can save businesses critical time and money. For networking professionals, Cisco Network Design Solutions for Small-Medium Businesses is a one-stop reference and design guide for the effective implementation of SMB networking solutions that enhance the bottom-line. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Language: English
    Pages: xxx, 654 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: OpenView ; Client/server computing ; Computer networks ; Management ; Electronic books ; local
    Abstract: OpenView System Administration Handbook: Network Node Manager, Customer Views, Service Information Portal, OpenView Operations Tammy Zitello Deborah Williams Paul Weber Use OpenView tools to improve network performance, availability, and value Planning, installation, customization, security, optimization, scalability, troubleshooting, and more "I would recommend this book to my students." --Emil Velez, Technical Consultant - Education, HP The comprehensive, authoritative guide to OpenView administration This is the first comprehensive, hands-on guide to using OpenView administration tools to maximize network performance, availability, and value. You'll find expert guidance on planning, customization, automation, security, optimization, troubleshooting, and a whole lot more. After a practical review of network management and SNMP, three HP consultants walk you through using Network Node Manager (NNM) to monitor network connectivity -- and adapting NNM to your unique requirements. Next, you'll discover how to use Customer Views (CV) containers to manage your most important resources, from customers to Internet sites. The authors offer realistic guidance on managing networks across the Web using HP's Service Information Portal, and on monitoring computers and software with OpenView Operations (OVO). Coverage includes: Overcoming obstacles to successful network and system management Planning for deployment: a best-practices checklist Running NNM: discovery, symbols, objects, alarms, and queries Customizing NNM: submaps, application integration, custom symbols/fields, and more CV: providing a logical view of devices based on customer ownership SIP: making management information Web-accessible, step-by-step Managing data collection and event configuration Scalability and distribution: remote consoles, filters, and Distributed Internet Monitoring Roles, service levels, installation, configuration, agents, policies, and day-to-day administration Taking full advantage of Smart Plug-Ins (SPI) Improving flexibility by adding Multiple Management Servers Includes OpenView Command Quick Reference Guide If you're a network/system administrator running OpenView under HP-UX, Unix, or Windows, OpenView System Administration Handbook will make you more productive, more effective, and more valuable. COMPANION WEB SITE Contains scripts and files to simplify and automate OpenView administration PRENTICE HALL Upper Saddle River, NJ 07458 http://www.phptr.com ISBN: 0...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 685 p. , ill. ; , 24 cm
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Samba (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "The breadth of technical information provided in this book ensures that even the most demanding of administrators will find something they need." --Andrew Tridgell, President of the Samba Team and the original author of Samba The practical, authoritative, step-by-step guide to cutting IT costs with Samba-3! This is the definitive guide to using Samba-3 in production environments. It begins with the immense amount of HOWTO information published by the Samba Team and volunteers around the world . . . but that's just the beginning. The book's Samba Team editors have organized and edited this material around the practical needs of working Windows(R) administrators. UNIX(R)/Linux administrators will find all the answers they need as well. Whether you're deploying Samba for the first time, integrating Samba into a Windows 200x Active Directory environment, migrating from NT 4 or Samba 2.x, or using Samba in a UNIX/Linux environment, you'll find step-by-step solutions, carefully edited for accuracy, practicality, and clarity. You'll learn all you need to make intelligent deployment decisions, get running fast, and use Samba-3's powerful new features to maximize performance and minimize cost. Step-by-step installation techniques and proven configurations that work "right out of the box." Essential Samba-3 information that leverages your Windows networking knowledge Detailed coverage of Samba-3's powerful new user/machine account management, network browsing, and mapping capabilities Authoritative explanations of advanced features such as interdomain trusts and loadable VFS file system drivers Clear information on how Samba-3 handles Windows desktop/user policies and profiles Practical techniques for optimizing network printing Specific guidance for migration from Windows NT 4 or Samba 2.x Troubleshooting techniques that draw on the knowledge of the entire Samba community
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of routing No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here! Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing! Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar. No routing experience needed! Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology, this book is for you!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxv, 384 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: Your first step into the world of LAN switching No LAN switching experience required Includes clear and easily understood explanations Makes learning easy Your first step to LAN switching begins here! Learn local-area network (LAN) key concepts and terminology Identify key issues involved with designing and managing a switched LAN Answer the question: do I need a hub, a bridge, or a switch? Welcome to the world of LAN switching! Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed. No LAN switching experience needed! LAN Switching First-Step explains the basics of LAN switching in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the key concepts behind how bridges and switches work. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 860 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Firewalls (Computer security) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-521 foundation learning Gain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and more Learn the ins and outs of the PIX product family and its complete feature set Use the PIX Device Manager (PDM) 3.0 to configure and manage the PIX Firewall Use advanced techniques to control traffic on your network using ACLs (access control lists), content filtering, and object groups Improve security using PIX Firewall attack guards, intrusion detection, and shunning features Learn about techniques and security considerations for configuring OSPF on PIX Firewall version 6.3 Configure scalable site-to-site and client remote access VPNs using the PIX Firewall version 6.3 Configure high-availability solutions using stateful and LAN-based failover techniques Use logical interfaces and 802.1Q trunks to scale your PIX Firewall implementation Master enterprise management and maintenance techniques using CiscoWorks Management Center for Firewalls 1.2 and Auto Update Server 1.1 Configure the PIX Firewall Services Module (FWSM) The use of firewalls-devices residing at the network perimeter to protect against intrusion-is an essential building block to even the most basic security program. Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, offers in-depth configuration and deployment information for this popular and versatile firewall solution. CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, teaches you the skills needed to configure and operate the PIX Firewall product family. Chapter overviews bring you quickly up to speed and help you get to work right away. Lab exercises and scenario-based solutions allow you to adapt configurations to your network for rapid implementation, helping you make the most of your PIX Firewall. Chapter-ending review questions test your knowledge. PIX Device Manager (PDM) configuration procedures are presented to complement extensive...
    Note: Includes bibliographical references (p. [837]-841) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols Configure and troubleshoot AAA on Cisco routers Understand where to position and install the CSACS in your network Explore and customize the CSACS interface Configure CSACS user accounts, user groups, and shared profile components Add AAA clients and manage network connections Configure external databases and perform database replication and backup Explore the various reports and logs available in CSACS Learn how AAA models apply to service provider environments Install and configure Cisco Access Registrar As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains. Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar. Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for s...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: l, 1078 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Series Statement: Networking technology series
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Internetworking (Telecommunication) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: The updated edition of the best-selling all-in-one networking reference provides coverage of essential and cutting-edge technologies Concise overviews of technologies essential to networking professionals at all levels, from novice to expert. New chapters include coverage of important topics like VoIP and EAP Coverage of cutting edge technologies like optical networking and storage Authored by Cisco Systems, worldwide leader in networking for the Internet. Internetworking Technologies Handbook , Fourth Edition, is a comprehensive reference that enables networking professionals to understand and implement contemporary internetworking technologies. Master the terms, concepts, technologies, and devices used in today's networking industry. Learn how to incorporate internetworking technologies into a LAN/WAN environment. Complete with new and updated chapters on security, storage, optical networking, scalability, and speed, this book is a complete and up-to-date reference to the topics that are essential to all networking professionals, regardless of expertise. Readers will obtain a greater understanding of LAN and WAN networking, particularly the hardware, protocols, and services involved. Fundamental technology information is provided on a broad range of integral systems and services, including detailed descriptions, review questions to ensure concept comprehension and retention, and additional resources for further study. Coverage is also extended not only to new networking concepts, but also to older, legacy systems, providing a more realistic picture of the real-world networking environments in which professionals operate. Tools and guidelines for optimizing system performance will increase productivity and improve efficiency, helping the reader make more intelligent, cost-efficient decisions for their networks. Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Cisco solutions, which include industry-leading publications from Cisco Press, educate and a provide competitive advantage to customers through more efficient and timely exchange of information, leading to cost saving, process efficiencies, and closer business relationships. These solutions form the networking foundation for many organizations worldwide.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 809 p. , ill. ; , 24cm
    DDC: 621.382/7
    Keywords: Optical communications ; Optoelectronics ; Electronic books ; local
    Abstract: A comprehensive guide to understanding and configuring multiservice DWDM, SONET, and SDH architectures Optical Network Design and Implementation provides in-depth coverage of the following: DS1/DS3/E1/E3 over SONET/SDH IEEE 802.17 Resilient Packet Ring (RPR) Fast/Gigabit Ethernet over SONET/SDH VRF virtual private networks Double-tagged 802.1Q VPNs SAN transport, FICON, and Fibre Channel over SONET/SDH DWDM infrastructures Analysis of DWDM, SONET, and SDH architectures Multiservice optical networking has multiple applications in service provider and enterprise environments. To help you make the most of these applications, Optical Network Design and Implementation provides a complete reference of technology solutions for next-generation optical networks. The book explains the differences among various MAN technologies, getting you up to speed on the solutions you need to use. Optical Network Design and Implementation contains a broad range of technical details on multiservice optical networking and covers optical networking theory, design, and configuration by providing informative text, illustrations, and examples. It can be used as a reference for anyone designing, implementing, or supporting an optical network. Even if you're not using Cisco ONS equipment, this book can increase your awareness and understanding of optical technologies and provide you with detailed design concepts and rules for building highly scalable multiservice optical networks. This book covers the entire spectrum of optical networking technologies from the physical layer to the network layer. If you are a network architect, network manager, or a consultant who designs, deploys, operates, or troubleshoots multiservice optical and DWDM networks, Optical Network Design and Implementation is your comprehensive guide to optical networking. "This represents the first book that offers a comprehensive and technical guide to unique IP+Optical innovations with Cisco COMET." -Jayshree V. Ullal, Senior Vice President, Optical Networking Group Cisco Systems, Inc. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers. 158705105203152004
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 281 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: IEEE 802.11 (Standard) ; Wireless LANs ; Electronic books ; local
    Abstract: Master the basics in designing, building, and managing a Cisco Aironet WLAN. Master the basics of Wireless LANs with this concise design and deployment guide Understand implementation issues for a variety of environments including vertical, SOHO, and enterprise networks Learn design and troubleshooting advice from real-world case studies 802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations. Wireless LANs connect computer networks via radio transmissions instead of traditional phone lines or cables. Benefits to these systems go well beyond getting rid of all the cables and wires. Campus networks can grow geographically larger while still retaining all their efficiency and speed. Additionally, cost savings can be realized when third-party phone lines are no longer necessary, saving the cost of line rental and equipment upkeep. Finally, flexibility in campus network design increases significantly for the networking professional, while the network accessibility and usefulness increases for the individual users. 802.11 Wireless LAN Fundamentals helps networking professionals realize these benefits by helping them understand how to design, build, and maintain these networks, as well as how to justify their value within organizations.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xii, 401 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 658/.00285/5376
    Keywords: mySAP.com ; Business ; Computer programs ; Industrial management ; Computer programs ; Electronic books ; local
    Abstract: "A good book for people who deal with SAP systems for a living. I haven't read another book like this. It's technical but it's also an entertaining read. A pleasant departure from the norm." -David C. Gilliland, Senior Consultant, SAP America, Inc. "Clearly, this book could be used as an excellent development tool and could help a company like mine perfect performance tuning steps and standards." -Dennis Prince, SAP Development/Support Specialist, Hewlett-Packard "SAP optimization is one of those subjects that developers struggle to find time for and managers don't know is necessary. Presenting the value of the process up front serves to give the developer ammunition to win time for optimization and the manager an education in the value and necessity of optimization. Even if the manager types don't read past chapter 3, George's job is done. They should be convinced that someone technical in their IT department needs to be reading this book. Anderson explains the value, then the core technology, and then when we're all on the same page, the process. To me, that was very helpful." -Crew Reynolds, Software Development Manager, Daydots "This book features good discussion on performance tuning the mySAP suite that no other books have so far. This is the perfect book for SAP Stress Test Project Managers, SAP Stress Test Project Teams, SAP Basis Administrators, Oracle DBAs, Unix Administrators managing SAP systems, and project implementation teams. Those who stress test their systems well with the help of this book will have significant returns." -Sanjoy Rath, SAP Consultant Drive maximum performance and value from your SAP investment! In this book, a leading expert on SAP performance walks through every facet of tuning and optimizing mySAP Solutions, and the technology layers underpinning these solutions, to maximize performance and value. George W. Anderson covers the entire testing and tuning process: planning, staffing, developing, testing, executing, validating, evaluating... and acting on what you've learned. Anderson offers unparalleled guidance with regard to predicting the impact of system changes-from new hardware to updated NetWeaver-enabled business processes. Along the way, he shows how to make the most of countless optimization and monitoring tools-from free and low-cost technology stack-based utilities to comprehensive, automated SAP testing suites. His vendor-neutral, unbiased coverage includes: Quantifying concrete performance ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    ISBN: 0131433490
    Language: English
    Pages: xxvi, 530 p. , ill. ; , 24 cm
    DDC: 005.4/3
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Maximize the performance and value of any HP-UX 11i system HP-UX 11i Tuning and Performance takes the guesswork out of maximizing HP-UX 11i performance-so you can quickly maximize the value of any HP-UX system in any environment. Leading HP experts introduce a comprehensive, systematic performance management methodology that addresses every stage in the lifecycle of an HP-UX system. You'll find specific metrics, symptoms and solutions for every key element of an HP-UX 11i system, including hardware, the OS platform, and application development. From start to finish, the emphasis is on practical results-and on understanding the real-world cost/benefit tradeoffs that are central to every tuning project. Coverage includes: A comprehensive optimization methodology, direct from HP's performance labs New optimization opportunities and techniques made possible by HP-UX 11i All-new chapters on network performance and Java performance Rules of thumb for more cost-effective performance management Instrumenting HP-UX 11i systems to accurately reflect reality Choosing the right performance metrics, and using them correctly Key performance tradeoffs in both uniprocessor and SMP environments Practical techniques for resolving CPU, memory, and disk bottlenecks How to make the most of HP-UX specific and generic UNIX performance tools Performance enhancements available through compiler optimization and application profiling Extensive examples from actual HP performance consulting assignments Whether you're an HP-UX 11i sysadmin, netadmin, developer, capacity planner, or performance specialist, this is your complete guide to getting all the performance you paid for!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 412 p. , ill. ; , 24 cm
    DDC: 658.4038
    Keywords: Information resources management ; Miscellanea ; Information technology ; Management ; Management information systems ; Miscellanea ; Electronic books ; local
    Abstract: What it takes to be a truly great CIO... from the IT leaders who know best What does it take to get to the top in IT today, stay there, and thrive? How do you realign IT to maximize business value, and become a full strategic partner in the organization's most crucial decisions? CIO Wisdom brings together answers from 20 of the world's most successful senior IT executives. Based on their extraordinary private discussions over the past five years, it covers every facet of IT leadership: planning, budgeting, sourcing, architecture, strategy, and much more. If you're an IT leader-or you intend to become one-it's the most important book you'll read this year. What really works right now Taking charge: Creating a 90-day tactical plan-and an intelligent long-term strategy Refocusing IT on your company's core business drivers Leading IT in today's rapidly evolving "extended enterprise" Deciding what to outsource-and managing your outsourcing relationships Implementing the ten metrics most critical to IT success Setting priorities when infrastructure costs are rising and resources are declining Evolving the leadership style that works best for you-and your organization Coping with the incredible personal pressures of IT leadership Addressing the unique challenges that face women in IT's upper echelons The authors' profits from this book will support a scholarship program for underprivileged students planning IT careers
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Abstract: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Note: Includes bibliographical references (p. 413-414) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A guide to successful deployment of the Cisco IP Telephony solution Real-world case studies from the Cisco design consulting engineers who developed the PDIOO process provide practical advice on all stages of successful IPT deployment Concise understanding of the PDIOO phases enables architects and engineers to successfully deploy the Cisco IPT solution Division of the process into PDIOO phases provides a logical and defined guide for network engineers and architects as they proceed through each of the phases in deploying the Cisco IPT solution Includes detailed questionnaires for each phase of deployment in the PDIOO cycle-a great aid in understanding customer networks and requirements Network infrastructure design, call processing infrastructure design and applications, and voice-mail system design are covered in depth Cisco® IP Telephony (IPT) solutions are being deployed at an accelerated rate, and network architects and engineers need to understand the various phases involved in successful deployment: planning, design, implementation, operation, and optimization (PDIOO). On the road to that understanding, those involved need to collect information for each phase of deployment, and then follow through with the best architecture, deployment model, and implementation based on the data collected. Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization is a guide for network architects and engineers as they deploy the Cisco IPT solution. With this book, you will master the PDIOO phases of the IPT solution, beginning with the requirements necessary for effective planning of a large-scale IPT network. From there, you'll follow a step-by-step approach to choose the right architecture and deployment model. Real-world examples and explanations with technical details, design tips, network illustrations, and sample configurations illustrate each step in the process of planning, designing, implementing, operating, and optimizing a chosen architecture based on information you have collected. In-depth instruction on each PDIOO phase provides specific details about the tasks involved and best practices for successful implementation of the IPT solution. This book also contains predesigned questionnaires and PDIOO assistance tools that help you determine the requirements of each phase of the PDIOO cycle. Authors Ramesh Kaza and Salman Asadullah have been involved with Cisco IPT solutions from the beginning and have planned, design...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132441926 , 0132441926
    Language: English
    Pages: xiv, 544 p , ill. , 25 cm
    Edition: 4th ed.
    Parallel Title: Erscheint auch als
    Keywords: Strength of materials ; Elasticity ; Electronic books ; local
    Abstract: This systematic exploration of real-world stress analysis has been completely revised and updated to reflect state-of-the-art methods and applications now in use throughout the fields of aeronautical, civil, and mechanical engineering and engineering mechanics. Distinguished by its exceptional visual interpretations of the solutions, it offers an in-depth coverage of the subjects for students and practicing engineers. The authors carefully balance comprehensive treatments of solid mechanics, elasticity, and computer-oriented numerical methods. In addition, a wide range of fully worked illustrative examples and an extensive problem sets-many taken directly from engineering practice-have been incorporated. Key additions to the Fourth Edition of this highly acclaimed textbook are materials dealing with failure theories, fracture mechanics, compound cylinders, numerical approaches, energy and variational methods, buckling of stepped columns, common shell types, and more. Contents include stress, strain and stress-strain relations, problems in elasticity, static and dynamic failure criteria, bending of beams and torsion of bars, finite difference and finite element methods, axisymmetrically loaded members, beams on elastic foundations, energy methods, elastic stability, plastic behavior of materials, stresses in plates and shells, and selected references to expose readers to the latest information in the field.
    Note: Includes bibliographical references (p. 528-532) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 598 p. , ill. ; , 24 cm. +
    DDC: 005.75/85
    Keywords: IBM Database 2 ; OS/390 ; Electronic data processing personnel ; Certification ; IBM software ; Examinations ; Study guides ; Electronic books ; local
    Abstract: IBM's definitive DB2 UDB V7.1 application development reference and exam study guide for the OS/390 and z/OS platforms An official IBM self-study guide for the DB2 UDB V7.1 Family Application Development Exam (#514) Expert DB2 programming tips, techniques, and guidelines from application development experts Covers data structures, SQL, stored procedures, programming/language environments, debugging, tuning, and more CD-ROM contains complete DB2 application development sample exam The definitive, authoritative guide to DB2 OS/390 application development certification Covers data structures, SQL, stored procedures, programming/language environments, debugging, tuning, and much more Includes a full section on object-relational programming and other advanced techniques Sample test questions help you prepare for the IBM DB2 UDB V7.1 Family Application Development Exam (#514) About the CD The CD-ROM included with this book contains a complete DB2 UDB V7.1 Family Application Development Exam (#514) sample exam. IBM DB2 UDB Version 7.1 for OS/390 and z/OS delivers unparalleled performance, scalability, and reliability in today's enterprise business environments. Now, there's a complete, authoritative guide to developing applications with DB2 UDB V7.1 in both OS/390 and z/OS environments-and preparing for the IBM DB2 UDB V7.1 Family Application Development Exam (#514). This comprehensive day-to-day guide to DB2 UDB application development is also the only book that delivers the depth of knowledge professionals need to pass IBM's challenging application development exam for the OS/390 and z/OS platforms. IBM Gold Consultant Susan Lawson presents hundreds of useful tips, practical techniques, and expert guidelines for every facet of DB2 UDB application development and every stage of the development process for both OS/390 and z/OS platforms Coverage includes: Foundations for effective DB2 development, including an overview of the DB2 UDB product family and DB2 for OS/390 data structures SQL: basic concepts and coding techniques through advanced OLAP features, star schemas, and star joins Stored procedures, including the SQL procedure language and IBM's Stored Procedure Builder Best practices for application testing, debugging, and performance tuning The full range of DB2 development tools, including ODBC/CLI, Java(tm), COBOL, C, C++, REXX, CAF, CICS, and RRSAF Object-relational programming, including user-defined functions, user-defined data types, and t...
    Note: Includes bibliographical references (p. 567-577) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 198 p. , ill. ; , 23 cm
    DDC: 658.4038
    Keywords: Business enterprises ; Computer networks ; Itanium (Microprocessor) ; Electronic books ; local
    Abstract: Leveraging the revolutionary power of the Itanium processor family. The Itanium processor family has come of age, giving high-end server and workstation buyers the powerful price/performance benefits that PC buyers have long taken for granted. In Itanium Rising , two leaders of HP's Itanium processor initiative present the first systematic guide for business and technical professionals who are implementing or evaluating Itanium technologies. Jim Carlson and Jerry Huck show why Itanium is so revolutionary-and offer a complete blueprint for translating its immense power into true competitive advantage. Why Itanium is uniquely well designed for today's high-bandwidth, networked applications Itanium as the foundation for an "always on," services-based Internet infrastructure Using Itanium to gain a unified "enterprise view" of the business Architecting IT systems and infrastructure to take full advantage of Itanium technology New opportunities and reasons to move away from the "desktop model" of computing The future of the Itanium processor family-and the technological changes it will trigger Whether you're an IT or business leader, developer, or technical computing specialist, Itanium will help you drive down costs, drive up productivity, and accomplish things that were simply impossible before. Itanium Rising will show you how.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 678 p. ; , 24 cm
    DDC: 005.2/768
    Keywords: COM (Computer architecture) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: .NET/COM interoperability in depth: comprehensive techniques and strategies The most in-depth guide to .NET/COM interoperability ever published! Covers every .NET/COM interop option, "gotcha," and workaround Offers practical strategies for .NET migration and long-term .NET/COM coexistence Compares .NET to COM and Java Addresses many advanced issues, including Interop marshaling, Primary Interop Assemblies, using ActiveX Controls from managed code, using COM+ Services from managed code, converting your COM+ Applications to XML Web Services and .NET Remoting The .NET and COM Interoperability Handbook will help you move your Windows(-based software into the future without abandoning the investments you've already made. Writing from the perspective of the experienced COM/COM+ developer, Alan Gordon offers the most realistic, in-depth coverage of .NET/COM interoperability ever presented. He illuminates all your .NET/COM interoperability options, offering practical advice for both migration and long-term coexistence. Coverage includes: What COM/COM+ developers must know first about .NET/COM interoperability Using the .NET/COM interoperability resources built into Visual Studio .NET Calling COM/COM+ components from .NET Calling .NET components from Win32/COM applications Using COM+ Services from .NET applications Turning your COM+ applications into an XML Web Service without writing any code Understanding the impact of COM apartment threading on .NET performance Overcoming mismatches between COM reference counting and .NET garbage collection Interop marshaling, ActiveX controls, .NET remoting, and much more
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxix, 746 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Privacy, Right of ; Electronic books ; local
    Abstract: The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
    Note: Includes bibliographical references (p. 691-725) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 322 p. , ill. ; , 25 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Standards ; Electronic information resources ; Access control ; Electronic books ; local
    Abstract: TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.
    Note: Includes bibliographical references (p. 305-308) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 222 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Ethernet (Local area network system) ; Metropolitan area networks (Computer networks) ; Electronic books ; local
    Abstract: The definitive guide to Enterprise and Carrier Metro Ethernet applications Discover the latest developments in metro networking, Ethernet, and MPLS services and what they can do for your organization Learn from the easy-to-read format that enables networking professionals of all levels to understand the concepts Gain from the experience of industry innovator and best-selling Cisco Press author, Sam Halabi, author of Internet Routing Architectures Metro networks will emerge as the next area of growth for the networking industry and will represent a major shift in how data services are offered to businesses and residential customers. The metro has always been a challenging environment for delivering data services because it has been built to handle the stringent reliability and availability needs for voice. Carriers will have to go through fundamental shifts to equip the metro for next-generation data services demanded by enterprise customers and consumers. This is not only a technology shift, but also a shift in the operational and business model that will allow the incumbent carriers to transform the metro to offer enhanced data services. Metro Ethernet from Cisco Press looks at the deployment of metro data services from a holistic view. It describes the current metro, which is based on TDM technology, and discusses the drivers and challenges carriers will face in transforming the metro to address data services. Metro Ethernet discusses the adoption of metro Ethernet services and how that has led carriers to the delivery of metro data services. With a changing mix of transport technologies, the book then examines current and emerging trends, and delves into the role of virtual private networks (VPN), virtual private local area networks (VLAN), virtual private LAN services (VPLS), traffic engineering, and MPLS and Generalized MPLS (GMPLS).
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 198 p. , ill. ; , 24 cm
    DDC: 005.4/465
    Keywords: Solaris (Computer file) ; UNIX Shells ; Computer networks ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems. Covers the new Solaris Secure Shell for all versions of Solaris. Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems. Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
    Note: "Sun Microsystems Press, A Prentice Hall Title". - Includes bibliographical references (p. 185-190) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 1390 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4/469
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Your complete single source for HP-UX system administration! Now, there's a single source for all the information HP-UX administrators needto succeed! Marty Poniatowski has updated the world's #1 HP-UX systemadministration guide to cover all the latest HP-UX 11i enhancements, plus all theUNIX commands HP-UX sysadmins need. This edition also contains comprehensive newcoverage of the latest options and tools for HP-UX partitioning! HP-UX in depth... System boot: PDC, ISL, hpux, GSP, Secure Web Console, and Virtual Partition Booting Installing HP-UX, Software Distributor, and Operating Environments HP-UX kernel-including kernel update procedure Device files Users/groups, Ignite-UX backup/restore, and startup/shutdown scripts System Administration Manager (SAM) Logical Volume Manager with extensive examples-plus Veritas Volume Manager Performance management: iostat, vmstat, netstat, top, sar, and more Networking: Ethernet, TCP/IP, DNS, NFS, CIFS/9000, Samba, and more CDE and GNOME UNIX commands and shells... File Types File Commands: cd, cp, file, ls, mv, mkdir, pwd, rm, rmdir, and more File Viewing: cat, head, tail, and more Advanced Commands: grep, sed, awk, find, cut, paste, split, sort, cmp, diff, comm, and more Bash, Korn, and C shells and shell programming Manual pages for many commonly used commands are included in the appendices New HP-UX partitioning coverage... vPars: preparation, creation, configuration, and commands nPartitions: creation, modification, cells, and commands HP Process Resource Manager (PRM) MC/ServiceGuard: background and examples Tear-out card included Superdome, rp8400, and rp7410 commands CD-ROM included Includes trial versions of Hewlett-Packard's latest HP-UXperformance tools, plus "Cheat Sheets" for key sysadmintasks.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 290 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Electronic commerce ; Web sites ; Design ; Electronic books ; local
    Abstract: "This book provides readers what they need to know to greatly enhance website usability and the customer online shopping experience" -Jakob Nielsen, author of best-selling title, Designing Web Usability To succeed on the web, companies must understand their customers' needs and goals more thoroughly than ever before-and use that information to build sites that deliver an outstanding shopping experience. Customer-Centered Design offers a systematic blueprint for doing just that. Leading marketing experts and usability professionals Kreta Chandler and Karen Hyatt bring together state-of-the-art techniques that address your goals for short- and long-term profitability and your customers' demands for convenience, simplicity, and satisfaction. This book reveals: What you must know about your customers-and how to get and use that information more efficiently Five views of the online store: as software system, catalog, communications vehicle, sales rep, and retail shopping experience Measuring your customers' experience with your site to stay on the leading edge Blending successful techniques from catalogs, retail and e-tail stores to create a new shopping environment Facilitating sales by helping your customers make buying decisions Understand how the products you sell influence your site's information architecture and design
    Note: Includes bibliographical references (p. 279) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 437 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Home computer networks ; Local area networks (Computer networks) ; Small business ; Computer networks ; Electronic books ; local
    Abstract: Choose the right network-wired or wireless Set up your hardware and Windows networking-step by step! Share your high-speed Internet connection Secure your network and protect your data Build a networked multimedia entertainment PC The quick, easy guide to networking your PCs-and making the most of your network! Own more than one PC? Now's the time to network them. Networked PCs are more powerful, more convenient, more cost-effective, more fun ... and networking is easier and cheaper than ever! In SOHO Networking , one of the world's most practical and experienced PC and networking professionals gives you all the help you'll need. Step by step, you'll learn how to choose equipment, set up your network, share your resources and Internet connections, and keep "prying eyes" out-whether they're inside your house or half a world away. Best of all, you'll learn how to do more with your network than you ever thought possible! Choose the right network for you: wired or wireless, peer-to-peer or server-based Set up your hardware and Windows networking Share high-speed Internet access throughout your home or office Protect your networks with firewalls and other security tools Set up reliable, secure telecommuting Build a networked multimedia entertainment PC-and listen to MP3s anywhere Use your network and VoIP telephony instead of an expensive PBX Troubleshoot network problems quickly and easily
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxx, 566 p. , ill. ; , 24 cm
    Keywords: Solaris (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Complete solutions for every Solaris OE sysadmin. Step-by-step solutions for every key Solaris OE system administration task From basic user administration to complex enterprise networking Filesystems, kernels, shells, Internet/DNS, email, PPP, NIS, backup/restore, and much more Extensive examples, sample output, and shell scripts Includes coverage of Solaris 8 and 9 Operating Environments You already have the man pages: what you need are the answers! With Solaris OE Boot Camp , the answers are right at your fingertips. Drawing on nearly 30 years of experience with Sun Microsystems hardware and software, David Rhodes and Dominic Butler walk you through every facet of Solaris OE system administration, from simple user management on standalone servers to building and managing a fully networked enterprise environment. Rhodes and Butler explain every task in detail-with sample commands, specific output, lists of impacted system files, and in some cases, complete shell scripts. Coverage includes: User Administration Permissions & Security Networking Filesystems, including NFS, DFS & Autofs Serial & SCSI Connections Internet & DNS Disk Quotas Shells Email Configuration & Management Backup/Restore System Boot/Halt PPP Remote Connections Kernels & Patches Naming Services & NIS Package Administration Time, Date, & NTP And much more... Whether you've been running the Solaris Operating Environment for a week or a decade, Solaris Operating Environment Boot Camp will help you do more, do it faster, and do it better!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives Overcome the challenges of working with NAT and PMTUD Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access Apply fault tolerance methods to IPSec VPN designs Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN) Add services to IPSec VPNs, including voice and multicast Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings. IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This ...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    ISBN: 0133536408
    Language: English
    Pages: xxix, 769 p. , ill. ; , 24 cm
    DDC: 670.42/7
    Keywords: Manufacturing processes ; Mathematical models ; Process control ; Mathematical models ; Electronic books ; local
    Abstract: Master process control hands on, through practical examples and MATLAB® simulations This is the first complete introduction to process control that fully integrates software tools-enabling professionals and students to master critical techniques hands on, through computer simulations based on the popular MATLAB environment. Process Control: Modeling, Design, and Simulation teaches the field's most important techniques, behaviors, and control problems through practical examples, supplemented by extensive exercises-with detailed derivations, relevant software files, and additional techniques available on a companion Web site. Coverage includes: Fundamentals of process control and instrumentation, including objectives, variables, and block diagrams Methodologies for developing dynamic models of chemical processes Dynamic behavior of linear systems: state space models, transfer function-based models, and more Feedback control; proportional, integral, and derivative (PID) controllers; and closed-loop stability analysis Frequency response analysis techniques for evaluating the robustness of control systems Improving control loop performance: internal model control (IMC), automatic tuning, gain scheduling, and enhancements to improve disturbance rejection Split-range, selective, and override strategies for switching among inputs or outputs Control loop interactions and multivariable controllers An introduction to model predictive control (MPC) Bequette walks step by step through the development of control instrumentation diagrams for an entire chemical process, reviewing common control strategies for individual unit operations, then discussing strategies for integrated systems. The book also includes 16 learning modules demonstrating how to use MATLAB and SIMULINK to solve several key control problems, ranging from robustness analyses to biochemical reactors, biomedical problems to multivariable control.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 346 p. , ill. ; , 24 cm. +
    DDC: 621.382/7
    Keywords: Computer networks ; Design and construction ; Optical communications ; Wavelength division multiplexing ; Electronic books ; local
    Abstract: A comprehensive book on DWDM network design and implementation solutions Design Software Included Study various optical communication principles as well as communication methodologies in an optical fiber Design and evaluate optical components in a DWDM network Learn about the effects of noise in signal propagation, especially from OSNR and BER perspectives Design optical amplifier-based links Learn how to design optical links based on power budget Design optical links based on OSNR Design a real DWDM network with impairment due to OSNR, dispersion, and gain tilt Classify and design DWDM networks based on size and performance Understand and design nodal architectures for different classification of DWDM networks Comprehend different protocols for transport of data over the DWDM layer Learn how to test and measure different parameters in DWDM networks and optical systems The demand for Internet bandwidth grows as new applications, new technologies, and increased reliance on the Internet continue to rise. Dense wavelength division multiplexing (DWDM) is one technology that allows networks to gain significant amounts of bandwidth to handle this growing need. DWDM Network Designs and Engineering Solutions shows you how to take advantage of the new technology to satisfy your network's bandwidth needs. It begins by providing an understanding of DWDM technology and then goes on to teach the design, implementation, and maintenance of DWDM in a network. You will gain an understanding of how to analyze designs prior to installation to measure the impact that the technology will have on your bandwidth and network efficiency. This book bridges the gap between physical layer and network layer technologies and helps create solutions that build higher capacity and more resilient networks. Companion CD-ROM The companion CD-ROM contains a complimentary 30-day demo from VPIphotonics™ for VPItransmissionMaker™, the leading design and simulation tool for photonic components, subsystems, and DWDM transmission systems. VPItransmissionMaker contains 200 standard demos, including demos from Chapter 10, that show how to simulate and characterize devices, amplifiers, and systems.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 538 p. ; , 23 cm
    DDC: 004.6/6
    Keywords: Internetworking (Telecommunication) ; Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: A complete, concise reference for implementing the most important features of the Cisco Catalyst family of switches Review detailed and comparative configuration steps for features of the COS and Cisco IOS Software operating systems Understand basic system and operating system management Configure Ethernet, EtherChannel, Token Ring, and ATM LANE interfaces Deploy VLANs, private VLANs, trunking, VTP, and dynamic port membership Understand STP operation, configuration, and tuning Configure and use Cisco Catalyst hardware for Layer 3 switching and redundancy Discover how Cisco Catalyst switches handle multicast traffic and interact with multicast routers Implement broadcast suppression, protocol filtering, user authentication, port security, and VLAN access lists Set up switches for logging, SNMP and RMON management, and port analysis Configure voice gateway modules, inline power, and QoS features needed to transport voice traffic Cisco Catalyst switches, a common ingredient in many campus, metropolitan, enterprise, and service provider networks, are complex devices that require many configuration steps for proper operation. Not only are the required commands difficult to remember, but locating reference material on them also requires extensive research that is both time- consuming and difficult to complete in the field. Cisco Field Manual: Catalyst Switch Configuration is a quick and portable reference guide to the most commonly used features that can be configured on Cisco Catalyst switches. Derived from the authors' notes about how to configure a variety of Cisco Catalyst features during the course of their preparation for the CCIE(r) exam, Cisco Field Manual: Catalyst Switch Configuration is an indispensable tool that helps you perform the most popular deployment tasks. From the first page, the authors zero in on quick facts, configuration steps, and explanations of configuration options in each Cisco Catalyst feature. The different variations of the Cisco Catalyst operating systems (COS and Cisco IOS(r) Software) are shown together for side-by-side comparison, making it easy to move from one Cisco Catalyst platform to another. The book presents concise implementation advice for families of Cisco Catalyst features, including configuration fundamentals, Layer 2 interface configuration, Layer 3 interface configuration, VLANs and trunking, Spanning Tree Protocol (STP), Layer 3 switching, multicast, server load balancing, access control, switch m...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 435 p. , ill. ; , 23 cm
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Sales presentations ; Handbooks, manuals etc ; Electronic books ; local
    Abstract: A technical handbook for network sales and customer service personnel Network Sales and Services Handbook covers the following: Foundational concepts and discussions of how networks interconnect The OSI model and its fundamental importance for moving information between computers on an internetwork Customer premises equipment, including a discussion of hardware commonly found at a customer site Threats to a network and methods for protecting a network against such threats Concepts of geographical networks and the three-tiered network hierarchy QoS and a network's capability to provide better service to select network traffic over various internetworking technologies Methods available to remote users for securely accessing organizational resources Public switched telephone network services and customer access Multiprotocol Label Switching (MPLS) and how it is used in a network backbone The fundamentals of fiber-optic networks, including Synchronous Optical Networks and Dense Wave Division Multiplexing One of the most significant challenges in any technical organization is knowledge transfer: getting the knowledge from those "in the know" (network engineers or consultants) to those on the "front lines" (those individuals who are selling and supporting a client's network services). Because these individuals tend to be quota driven, a sales/service team often does not have a lot of available time away from the field; potentially resulting in lost revenue. Understanding knowledge transfer is necessary for people working as customer service representatives and managers, engineering technicians, and presales account managers. Network Sales and Services Handbook provides sales and support professionals the fundamental technical knowledge necessary to understand customer needs. Designed as a complete reference guide, Network Sales and Services Handbook details networking basics, including foundational concepts and discussions of the many different LAN and WAN technologies and their functionality. Also included are fundamental discussions on quality of service (QoS), voice networks, and fiber optics, as well as a brief summary of the common routing protocols used in an internetwork. If you are a non-engineer associated with an engineering environment, Network Sales and Services Handbook is an essential part of your resource library.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 392 p. , ill. ; , 24 cm
    DDC: 004.67/8
    Keywords: Curl (Computer program language) ; Internet programming ; Object-oriented programming (Computer science) ; Programming languages (Electronic computers) ; Web site development ; Electronic books ; local
    Abstract: Breakthrough Curl techniques Build rich, robust, low-bandwidth Web applications Curl makes it easy to build Internet applications that use little bandwidth, integrate with existing Web standards, provide a rich graphical interface, and fit seamlessly into virtually any client environment. Enterprise Curl is the first book that shows how to take advantage of Curl for serious enterprise development. Through a start-to-finish case study, Paul Sheehan introduces powerfully effective design and development techniques that draw on his experience leading a Curl consulting teams. Coverage includes: Developing the key elements of a Curl-based application framework Creating search interfaces that accept and extract XML responses, then display them in flexible, powerful spreadsheet-like grids Using Curl to show data within 2D graphs Building Web-based data mining applications that can "drill down" to more detailed views of data Using Curl's built-in SOAP support to construct sophisticated Web services
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvi, 406 p. , ill. ; , 24 cm
    DDC: 005.75/8
    Keywords: ActiveX ; Database design ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Prentice Hall PTR's new ADO.NET Programming in Visual Basic .NET - The practical guide to database development with VB.NET and ADO.NET Includes detailed coverage of XML-based Web services Data providers, DataGrids, DataSets, data binding, and much more Complete case study application-building a robust ADO.NET data control Build powerful database apps and Web services fast, with VB.NET and ADO.NET! With ADO.NET, you can build database-enabled applications and Web services with more speed, flexibility, and power than ever before. ADO.NET Programming in Visual Basic .NET teaches you all you'll need to know to make the most of ADO.NET - whether you're an experienced Visual Basic database programmer or not. The authors' realistic code examples and practical insights illuminate ADO.NET from its foundations to state-of-the-art data binding and application optimization. Coverage includes - Understanding the ADO.NET class libraries Utilizing Visual Basic.NET's powerful database programming tools Connecting to databases using ADO.NET's wide range of data providers Using DataSets to read, store, and process XML data Mastering data binding with Windows Forms and ASP.NET Web Forms Building data-driven XML-based Web Services and Windows thin client applications The book concludes with a complete case study application - constructing a .NET version of the powerful ADO data control that VB 6 programmers loved, but isn't included in ADO.NET.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 379 p. , ill. ; , 25 cm
    DDC: 004.6
    Keywords: Computer networks ; Management ; Electronic books ; local
    Abstract: Network Management, MIBs and MPLS: Principles, Design and Implementation is the definitive guide to managing and troubleshooting enterprise and service provider networks. This in-depth tutorial from networking expert Stephen Morris delivers clear and concise instruction on networking with MIBs, SNMP, MPLS, and much more. Coverage includes SNMPv3, network management software components, IP routing, HP Openview Network Node Manager, NMS software components, among other key techniques and tools for managing large network systems.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 662 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: Build Oracle PL/SQL applications-now. Fully updated for Oracle 9i No Oracle PL/SQL experience necessary. Real-life labs and "Test Your Thinking" Q&As Start developing applications with Oracle PL/SQL-fast. This integrated book-and-Web learning solution teaches all the Oracle PL/SQL skills you need, hands on, through real-world labs, exercises, projects, and a complete Web-based training site. Completely updated for Oracle 9i, it covers all the fundamentals-and a whole lot more. Master PL/SQL syntax, iterative and conditional control, scoping, anchored datatypes, cursors, triggers, security, tables, and packaging-plus powerful new techniques for working with exceptions, cursors, collections, and records. Your free Web-based training module includes a Virtual Study Lounge where you can interact with other learners, work on new projects, and get updates. Totally integrated with a FREE, state-of-the-art Oracle 9i learning Web site. Every Prentice Hall Oracle Interactive Workbook is fully integrated with its own exclusive Web site, giving you all this and more: "Test Your Thinking" project solutions and detailed explanations Additional self-review exercises with instant feedback and explanations An exclusive Virtual Study Lounge where you can interact with other students. Just the facts. No endless, boring discussions here. You'll learn hands on through practical exercises, self-review questions, and real-world answers. Exclusive "Test Your Thinking" projects guarantee you'll go beyond rote knowledge to really master the subject. It's an integrated learning system that's proven to work. Dozens of exercises cover the real-world tasks that matter most. Hundreds of self-review questions and answers make sure you understand.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xi, 464 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Numerical analysis ; Data processing ; Electronic books ; local
    Abstract: Non-theoretical explanations of practical numerical algorithms Algorithms in action with animated, interactive graphical Java programs and applets Computational errors and how to remove them from your code Understand "computer math" and get the numbers you expect, reliably. In Java Number Cruncher , author Ronald Mak explains how to spot-and how to avoid-the subtle programming miscues that can cause vexing calculation errors in your applications. An authority on mapping pure math to computer math, he explains how to use the often-overlooked computational features of Java, and does so in a clear, non-theoretical style. Without getting lost in mathematical detail, you'll learn practical numerical algorithms for safely summing numbers, finding roots of equations, interpolation and approximation, numerical integration, solving differential equations, matrix operations, and solving sets of simultaneous equations. You'll also enjoy intriguing topics such as searching for patterns in prime numbers, generating random numbers, computing thousands of digits of pi, and creating intricately beautiful fractal images. Java Number Cruncher includes: Practical information all Java programmers should know Popular computational algorithms in Java-without excessive mathematical theory Interactive graphical programs that bring the algorithms to life on the computer screen Rounding errors, the pitfalls of integer arithmetic, Java's implementation of the IEEE 754 floating-point standard, and more This book is useful to all Java programmers, especially for those who want to learn about numerical computation, and for developers of scientific, financial, and data analysis applications.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xix, 339 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: PHP (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: Build complex, PHP-driven Web sites-fast! Discover powerful new PHP techniques, hands on! Learn all-new techniques based on PHP-GTK and PEAR::DB Master XML parsing, user authentication, forms processing, data mining, and much more Take your PHP programming skills to the next level! In this concise, hands-on tutorial, PHP expert Christopher Cosentino delivers dozens of powerful new techniques for building serious Web applications. Through professional-quality examples drawn from his six years as a PHP developer, Cosentino walks you through building friendlier, more usable sites; improving user authentication; generating dynamic graphics; parsing XML documents; building database-independent Web applications; and much more! Take PHP to the limit... and beyond! Manage sessions more effectively Interact with multiple databases via PEAR::DB Improve your form processing scripts Parse large files and perform data mining Authenticate users by IP address, database query, or HTTP authentication Create custom error handlers Dump database contents into XML files Use PHP-GTK to build client-side cross-platform GUI applications And more...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Realize productivity gains from network-driven communication, training, and assessment What sets apart The Business Case for E-Learning? Unified approach to e-learning. Covering knowledge sharing, training, and assessment. E-learning components such as online testing and certifications are uniquely combined. Productivity. The cause for rather than a consequence of e-learning. The Business Case for E-Learning demonstrates cases and methods in e-learning to those seeking productivity advantages for their organizations and ecosystems. Focus on ecosystem. Those seeking productivity advantages across the entire supply chain or value chain of delivery can benefit from the presented perspective. Recommendations go beyond organizational gains to cover resellers and customers. Results and returns. See case studies and empirical evidence of the value and return on investment (ROI) that demonstrate the success of a cohesive e-learning program. Learn how Cisco Systems saved $142 million in one year using e-learning. I have always truly believed that the Internet and education are the two great equalizers in life, and this book provides information about how to combine the two for productivity and profitability gains, based on real successes. -John Chambers, President and CEO of Cisco Systems The Business Case for E-Learning is the first book that demonstrates the productivity gains provided by Internet learning through a unique approach combining e-communication, e-training, and e-assessment. Beyond theory, The Business Case for E-Learning is based on practical experience in developing and deploying programs that bolster profitability. This book offers you practical recommendations for best practices and return on investment and provides lessons learned from real-world experiences. The Business Case for E-Learning presents several case studies that range from the challenges of learning in Africa to the emergence of corporate knowledge-sharing communities. Case studies on Toyota, BearingPoint, Element K, and other e-learning leaders demonstrate how e-learning best practices can yield value for any organization. One case study quantifies how Cisco Systems in one year generated $16 in value for every dollar spent on an e-learning program. Managers need to prove to companies that an e-learning program can result in demonstrable productivity gains. Through The Business Case for E-Learning , you learn to avoid unnecessary trial and error with e-learning and tak...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xix, 487 p , 24 cm
    DDC: 005.2/76
    Keywords: Microsoft .NET ; Electronic books ; local
    Abstract: Find out how to migrate your legacy software to the powerful Microsoft .NET framework Provides for a complete, efficient, and elegant migration-with no surprises Covers the technologies you need: Visual Basic, Visual C++, and Active Server Pages Move to .NET-and bring your legacy apps along! Microsoft's .NET Web services platform offers a wide range of exciting new programming opportunities. The new methods found in .NET also mean you'll be in for a lot of aggravation and wasted time-unless you have a proven migration plan in place for your legacy applications. In Migrating to .NET , subject experts Dhananjay Katre, Prashant Halari, Narayana Rao Surapaneni, Manu Gupta, and Meghana Deshpande guide you every step of the way, from planning to migration to follow-through. Migrate legacy Visual Basic, Visual C++, and ASP applications to .NET Draws on the real-world experience of .NET migration experts Rich with code examples and case studies Covers component migration and interoperability issues Part of the integrated .NET series from Object Innovations and Prentice Hall PTR.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 703 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: JavaBeans ; Java (Computer program language) ; Electronic books ; local
    Abstract: The definitive guide to industrial-strength EJB 2.0 development. A comprehensive guide to enterprise-class EJB 2.0 development In-depth coverage of transactions, security, performance, and Web services Features a full-scale, real-world case study Applied Enterprise JavaBeans Technology takes you under the hood of EJB 2.0, offering unprecedented insight into how EJB really works-and shows you how to leverage its full power to build industrial-strength distributed applications. EJB expert Kevin Boone starts from first principles and progresses to state-of-the-art approaches for building Java applications that are distributed, transactional, and secure. Along the way, Boone reveals aspects of the EJB architecture that are normally hidden but offer even more power to developers who understand them. Applied Enterprise JavaBeans Technology offers all this and more: Demonstrates powerful techniques for maximizing distributed application security Introduces high-performance resource pooling and optimization strategies Helps developers choose and implement the best approach to distributed transaction processing Presents in-depth coverage of integration with related technologies, including servlets, Web services, messaging, directories, and CORBA Includes extensive cross-references to the official EJB 2.0 specifications From EJB "first principles" to the state of the art Emphasizes accuracy, depth, and comprehensiveness: never oversimplifies! Focuses on mission-critical development techniques that other books ignore Illuminates powerful capabilities typically left "transparent" to the programmer Shows how to use EJB to implement comprehensive security policies Contains in-depth coverage of automatically generated EJB proxies
    Note: "Sun Microsystems Press, a Prentice Hall title". - Includes bibliographical references (p. 691) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 480 p. , ill. ; , 24 cm
    DDC: 658.812
    Keywords: Customer relations ; Management ; Electronic books ; local
    Abstract: Build a winning CRM program-one step at a time. This book presents a complete, step-by-step blueprint for designing, implementing, and managing a successful CRM program. The former Director of HP's enterprise-wide CRM initiative shows how to identify the elements of CRM most crucial to your organization, then implement infrastructure to deliver on your key priorities, whatever they are. Through real-world case studies drawing on her extensive experience as a CRM leader and consultant, Judith W. Kincaid addresses both the managerial and technical challenges of CRM. Kincaid's authoritative process examples and detailed templates make it easier to get started-and get results. Developing realistic strategic plans and roadmaps customized to your organization Getting started fast, and iterating small steps to powerful success Addressing all customer touchpoints: Web, e-mail, call centers, direct mail, sales contacts, tech support, and more Establishing realistic expectations and metrics Translating your CRM objectives into essential organizational changes Designing integrated customer databases and infrastructure Understanding the crucial interactions between the technical and management aspects of CRM
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 208 p. , ill. ; , 24 cm
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Data warehousing ; Electronic books ; local
    Abstract: The definitive, real-world guide to Oracle data warehousing Maximizing performance, flexibility, and manageability in production environments Hardware/software architectures, star schema design, partitioning, and more Industrial strength data loading and query optimization techniques By the world-renowned architect of 7-Eleven's multi-terabyte datawarehouse Maximize Oracle data warehouse performance, flexibility, and manageability Oracle DBAs finally have a definitive guide to every aspect of designing, constructing, tuning, and maintaining star schema data warehouses with Oracle 8i and 9i. Bert Scalzo, one of the world's leading Oracle data warehousing experts, offers practical, hard-won lessons and breakthrough techniques for maximizing performance, flexibility, and manageability in any production environment. Coverage includes: Data warehousing fundamentals for DBAs--including what a data warehouse isn't Planning software architecture: business intelligence, user interfaces, Oracle versions, OS platforms, and more Planning hardware architecture: CPUs, memory, disk space, and configuration Radically different star schema design for radically improved performance Tuning ad-hoc queries for lightning speed Industrial-strength data loading techniques Aggregate tables: maximizing performance benefits, minimizing complexity tradeoffs Improving manageability: The right ways to partition Data warehouse administration: Backup/recovery, space and extent management, updates, patches, and more
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Language: English
    Pages: xxii, 294 p. , ill. ; , 24 cm. +
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Tools for high-efficiency Linux development in enterprise environments. Linux developers have access to an extraordinary array of GNU and open source tools. Now, two leading Linux developers show how to choose the best tools for your specific needs, and integrate them into a complete development environment that maximizes your effectiveness in any project-no matter how large or complex. This book's example-rich coverage includes: The Linux software development process: research, requirements, coding, debugging, deployment, maintenance, and beyond Choosing and implementing editors, compilers, assemblers, debuggers, version control systems, utilities, and more Using Linux Standard Base (LSB) to deliver applications that run reliably on a wide range of Linux systems Comparing Java development options for Linux platforms Using Linux in cross-platform and embedded development environments Whatever your environment, The Linux Development Platform will help you find, choose, configure, and maintain the right tools-and use them to deliver outstanding Linux software. CD-ROM INCLUDED The accompanying CD-ROM contains all the open source software you need to build and customize your own Linux development environment. Bruce Perens' Open Source Series is a definitive series of Linux and Open Source books by the world's leading Linux software developers, all edited by Bruce Perens, the former Debian GNU/Linux Project Leader who helped launch the Open Source movement.
    Note: "The accompanying CD-ROM contains all the open source software you need to build and customize your own Linux development environment"--Cover p. 4. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780137155880 , 0137155883
    Language: English
    Pages: xxvi, 713 p , ill. , 24 cm
    Edition: 2nd ed.
    Series Statement: Prentice Hall series in computer networking and distributed systems
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Computers ; Access control ; Electronic data processing departments ; Security measures ; Electronic books ; local
    Abstract: The classic guide to network security-now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Prentice Hall Series in Computer Networking and Distributed Systems
    Note: "Now includes IPsec, SSL, PKI, AES, and Web security"--Cover. - Includes bibliographical references (p. 675-684) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442701 , 0132442701
    Language: English
    Pages: xx, 302 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Wireless communication systems ; Ad hoc networks (Computer networks) ; Electronic books ; local
    Abstract: The authoritative guide to the state of the art in ad hoc wireless networking. Reflects the field's latest breakthroughs Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much more Includes a complete narration of prototype implementation with communication performance results from practical field trials Introduces key applications for home, business, auto, and defense "Ad hoc" wireless networks eliminate the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly"-anywhere, anytime, for virtually any application. The field is rapidly coming of age, reflecting powerful advances in protocols, systems, and real-world implementation experience. In Ad Hoc Mobile Wireless Networks , one of the field's leading researchers brings together these advances in a single consolidated and comprehensive archive. C.K. Toh covers all this, and more: Key challenges: device heterogeneity, diverse traffic profiles, mobility, and power conservation Routing protocols for ad hoc networks, including Associativity Based Routing (ABR) and other IETF MANET protocols Real-world implementation issues-including a complete prototype implementation Ad hoc wireless network performance: results obtained from the latest field trials Leading approaches to service discovery Addressing TCP over an ad hoc wireless network environment Support for multicast communications The role of Bluetooth and WAP Ad Hoc Mobile Wireless Networks introduces detailed application scenarios ranging from home and car to office and battlefield. C.K. Toh also introduces several of the field's leading projects, from Motorola's PIANO platform to UC Berkeley's "Smart Dust." Whether you're a researcher, scientist, implementer, consultant, technical manager, CTO, or student, you won't find a more authoritative and comprehensive guide to the new state of the art in ad hoc networking.
    Note: Includes bibliographical references (p. 289-298) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxii, 481 p. , ill. ; , 24 cm
    Edition: CCIP ed.
    Series Statement: Certification and training series
    DDC: 004.6/5
    Keywords: Computer network architectures ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Prepare for CCIP certification as you learn to design and deploy MPLS-based VPNs Assists in preparation for the CCIP MPLS elective exam with detailed technology coverage and review questions Offers in-depth analysis of MPLS architecture Helps you learn how MPLS scales to support tens of thousands of virtual private networks (VPNs) Provides extensive case studies that guide you through the design and deployment of real-world MPLS/VPN networks Presents configuration examples and guidelines that assist you in configuring MPLS on Cisco devices Provides design and implementation options that help you build various VPN topologies Multiprotocol Label Switching (MPLS) is an innovative technique for high-performance packet forwarding. The most widely deployed usage of MPLS today is the enabling of VPNs. With the introduction of MPLS-enabled VPNs, network designers can better scale their networks than ever before. MPLS and VPN Architectures, CCIP Edition , is a practical guide to understanding, designing, and deploying MPLS-based VPNs. This book covers MPLS theory and configuration, network design issues, and one major MPLS application: MPLS-based VPNs. The MPLS/VPN architecture and all its mechanisms are explained with configuration examples, suggested design and deployment guidelines, and extensive case studies. This book has been revised from the first edition to include coverage of the CCIP MPLS elective exam. New chapters cover MPLS troubleshooting and MPLS/VPN troubleshooting; self-assessment questions at the end of each chapter help you prepare for the CCIP MPLS elective exam. CCIP candidates choosing to follow the MPLS elective will find this book to be a valuable self-study component in their exam preparation. MPLS and VPN Architectures, CCIP Edition , is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 495 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Open Shortest Path First (Computer network protocol) ; Routers (Computer networks) ; Electronic books ; local
    Abstract: The comprehensive, hands-on guide to all Cisco IOS Software OSPF commands Stands as the complete OSPF command reference -- invaluable for network designers, engineers, and architects Provides configuration, troubleshooting, and verification scenarios for every possible OSPF command supported by Cisco IOS Software that can be implemented on a minimum number of routers Groups OSPF commands by area of implementation -- area configuration, redistribution, neighbor relationships, and route filtering, just to name a few Provides clear and concise commentary on the initial release, purpose, syntax, and usage of each OSPF command Offers excellent CCIE certification preparation from one of the CCIE Program Managers Constructed as a portable field guide with easily navigable content so you can quickly find the information you need when you need it As one of the most predominantly deployed Interior Gateway Protocols, Open Shortest Path First (OSPF) demands a wealth of knowledge on the part of internetworking professionals working with it on a daily basis. Unfortunately, publicly available documentation on the OSPF command set varies from being too thin on coverage to being too demanding on the required equipment needed to test what the documentation covers. Cisco OSPF Command and Configuration Handbook is a clear, concise, and complete source of documentation for all Cisco IOS Software OSPF commands. The way you use this book will depend on your objectives. If you are preparing for the CCIE written and lab exams, then this book can be used as a laboratory guide to learn the purpose and proper use of every OSPF command. If you are a network designer, then this book can be used as a ready reference for any OSPF command. Cisco OSPF Command and Configuration Handbook provides example scenarios that demonstrate the proper use of every OSPF command that can be implemented on a minimum number of routers. This will enable you to learn each command without requiring an extensive and expensive lab configuration. The scenarios clearly present the purpose and use of each command. Some of the examples lead you into common non-working situations in order to reinforce the understanding of the operation of the particular OSPF command. Author Bill Parkhurst provides concise snapshots of every command with regard to command purpose, usage, syntax explanation, initial introduction in Cisco IOS Software, and cross references to related commands also covered in the book. Thi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xvi, 255 p. , ill. ; , 25 cm
    Keywords: Digital subscriber lines ; Electronic books ; local
    Abstract: The ultimate DSL deployment guides and reference Teaches the reader how to design and implement the network to offer services such as voice, video, and data Explains the various access and core architectures for xDSL technologies Details how to do mass provisioning and how to manage an end-to-end network Includes case studies that depict some of the most common deployed architectures, how they evolved, problems they faced, and how they were overcome Design and Implementation of DSL-Based Access Solutions addresses various architectures for DSL-based networks. It focuses on how to design and implement an end-to-end solution for service providers, considering various business models such as retail, wholesale, VPN, etc. This book depicts the different architectures, and helps you understand the key design principles in deploying them. It covers both access encapsulations such as bridging, PPPoA, PPPoE, and routing, as well as core architectures such as IP, L2TP, MPLS/VPN, and ATM. Because it focuses on end-to-end solutions, Design and Implementation of DSL-Based Access Solutions talks about how to do mass provisioning of subscribers and how to manage networks in the most efficient way. It also includes discussions of real-life deployments, their design-related issues, and their implementation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xix, 301 p. , ill. ; , 24 cm
    Series Statement: Cisco Press networking technologies series
    Keywords: Storage area networks (Computer networks) ; Electronic books ; local
    Abstract: A guide to planning, implementing, managing, and using storage area networks to increase the efficiency of your network infrastructure Gain in-depth coverage of SAN fundamentals, topologies, implementation and management techniques, and products Build and sharpen your troubleshooting skills for data-mining, online transaction processing, imaging, data warehousing, and other highly data-intensive applications Understand how to implement the Fibre Channel and iSCSI protocols, which are key to any SAN solution Learn current industry implementation and application standards, as well as future advances During the last decade, a multitude of changes in computing technology and the globalization of business through the Internet have resulted in a tremendous growth in storage requirements. This has forced many organizations around the world to reassess the way they view their storage environment. Many applications, such as e-commerce, imaging, data warehousing, Enterprise Resource Planning (ERP), and Customer Relationship Management (CRM), fill storage media quickly. Data accessibility and availability for these applications has to be fast and efficient. Clearly, the ever-increasing information access requirements have had a profound effect on most data centers. As a result, many organizations are searching for cost-effective ways to ensure high data availability and reliability. Storage Area Network Fundamentals presents the benefits of storage area networks (SANs) to corporate users and enables them to deploy SAN technology effectively. Designed as an introduction to SANs, Storage Area Network Fundamentals develops an understanding of SAN basics and shows how to plan, implement, and manage a SAN. This book covers the topologies, protocols, and products required to implement and manage efficient SANs.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 0130422320 , 9780130422323
    Language: English
    Pages: xxiii, 707 p , ill. , 25 cm
    Edition: 2nd ed.
    Series Statement: Prentice Hall communications engineering and emerging technologies series
    Keywords: Wireless communication systems ; Mobile communication systems ; Telecommunication systems ; Electronic books ; local
    Abstract: The indispensable guide to wireless communications-now fully revised and updated! Wireless Communications: Principles and Practice , Second Edition is the definitive modern text for wireless communications technology and system design. Building on his classic first edition, Theodore S. Rappaport covers the fundamental issues impacting all wireless networks and reviews virtually every important new wireless standard and technological development, offering especially comprehensive coverage of the 3G systems and wireless local area networks (WLANs) that will transform communications in the coming years. Rappaport illustrates each key concept with practical examples, thoroughly explained and solved step by step. Coverage includes: An overview of key wireless technologies: voice, data, cordless, paging, fixed and mobile broadband wireless systems, and beyond Wireless system design fundamentals: channel assignment, handoffs, trunking efficiency, interference, frequency reuse, capacity planning, large-scale fading, and more Path loss, small-scale fading, multipath, reflection, diffraction, scattering, shadowing, spatial-temporal channel modeling, and microcell/indoor propagation Modulation, equalization, diversity, channel coding, and speech coding New wireless LAN technologies: IEEE 802.11a/b, HIPERLAN, BRAN, and other alternatives New 3G air interface standards, including W-CDMA, cdma2000, GPRS, UMTS, and EDGE Bluetooth wearable computers, fixed wireless and Local Multipoint Distribution Service (LMDS), and other advanced technologies Updated glossary of abbreviations and acronyms, and a thorough list of references Dozens of new examples and end-of-chapter problems Whether you're a communications/network professional, manager, researcher, or student, Wireless Communications: Principles and Practice , Second Edition gives you an in-depth understanding of the state of the art in wireless technology-today's and tomorrow's.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442749 , 0132442744
    Language: English
    Pages: xvi, 339 p , ill. , 25 cm
    Parallel Title: Erscheint auch als
    Keywords: Real-time programming ; Object-oriented programming (Computer science) ; Software engineering ; Mechatronics ; Mechanical engineering ; Computer programs ; Electronic books ; local
    Abstract: This book is about the design and implementation of real times software for the control of mechanical systems. The most appealing aspect of this book is the inclusion of useable C & C++ code, Matlab applications, and BridgeVIEW.
    Note: Includes bibliographical references (p. 331-332) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442510 , 0132442515
    Language: English
    Pages: xix, 552 p , ill. , 25 cm
    Parallel Title: Erscheint auch als
    Keywords: Environmental chemistry ; Industrial applications ; Environmental management ; Sustainable engineering ; Electronic books ; local
    Abstract: A chemical engineer's guide to managing and minimizing environmental impact. Chemical processes are invaluable to modern society, yet they generate substantial quantities of wastes and emissions, and safely managing these wastes costs tens of millions of dollars annually. Green Engineering is a complete professional's guide to the cost-effective design, commercialization, and use of chemical processes in ways that minimize pollution at the source, and reduce impact on health and the environment. This book also offers powerful new insights into environmental risk-based considerations in design of processes and products. First conceived by the staff of the U.S. Environmental Protection Agency, Green Engineering draws on contributions from many leaders in the field and introduces advanced risk-based techniques including some currently in use at the EPA. Coverage includes: Engineering chemical processes, products, and systems to reduce environmental impacts Approaches for evaluating emissions and hazards of chemicals and processes Defining effective environmental performance targets Advanced approaches and tools for evaluating environmental fate Early-stage design and development techniques that minimize costs and environmental impacts In-depth coverage of unit operation and flowsheet analysis The economics of environmental improvement projects Integration of chemical processes with other material processing operations Lifecycle assessments: beyond the boundaries of the plant Increasingly, chemical engineers are faced with the challenge of integrating environmental objectives into design decisions. Green Engineering gives them the technical tools they need to do so.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 872 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: Electronic data processing personnel ; Certification ; Microsoft software ; Examinations ; Study guides ; Routers (Computer networks) ; TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: The comprehensive, hands-on guide for resolving IP routing problems Understand and overcome common routing problems associated with BGP, IGRP, EIGRP, OSPF, IS-IS, multicasting, and RIP, such as route installation, route advertisement, route redistribution, route summarization, route flap, and neighbor relationships Solve complex IP routing problems through methodical, easy-to-follow flowcharts and step-by-step scenario instructions for troubleshooting Obtain essential troubleshooting skills from detailed case studies by experienced Cisco TAC team members Examine numerous protocol-specific debugging tricks that speed up problem resolution Gain valuable insight into the minds of CCIE engineers as you prepare for the challenging CCIE exams As the Internet continues to grow exponentially, the need for network engineers to build, maintain, and troubleshoot the growing number of component networks has also increased significantly. IP routing is at the core of Internet technology and expedient troubleshooting of IP routing failures is key to reducing network downtime and crucial for sustaining mission-critical applications carried over the Internet. Though troubleshooting skills are in great demand, few networking professionals possess the knowledge to identify and rectify networking problems quickly and efficiently. Troubleshooting IP Routing Protocols provides working solutions necessary for networking engineers who are pressured to acquire expert-level skills at a moment's notice. This book also serves as an additional study aid for CCIE candidates. Authored by Cisco Systems engineers in the Cisco Technical Assistance Center (TAC) and the Internet Support Engineering Team who troubleshoot IP routing protocols on a daily basis, Troubleshooting IP Routing Protocols goes through a step-by-step process to solving real-world problems. Based on the authors' combined years of experience, this complete reference alternates between chapters that cover the key aspects of a given routing protocol and chapters that concentrate on the troubleshooting steps an engineer would take to resolve the most common routing problems related to a variety of routing protocols. The book provides extensive, practical coverage of BGP, IGRP, EIGRP, OSPF, IS-IS, multicasting, and RIP as run on Cisco IOS Software network devices. Troubleshooting IP Routing Protocols offers you a full understanding of invaluable troubleshooting techniques that help keep your network operating at ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 682 p. , ill. ; , 24 cm. +
    Keywords: Client/server computing ; Electronic commerce ; Java (Computer program language) ; Web servers ; Electronic books ; local
    Abstract: Authoritative guidance and high-performance code-straight from BEA WebLogic's product team! Step-by-step, example-rich coverage of every major J2EE API Case study: Build a complete e-Commerce application from scratch CD-ROM: Complete BEA WebLogic Server 6evaluation version, plus extensive code library The insider's guide to J2EE development with the world's #1 Java application server-BEA WebLogic Server 6! BEA's WebLogic Server is the de facto industry standard for developing and deploying industrial strength Java E-commerce applications. This book delivers authoritative guidance for J2EE application development with the most powerful version of WebLogic ever: WebLogic Server 6. Authored by members of BEA's WebLogic project team, the book covers every aspect of real-world WebLogic J2EE development, from start to finish, through an industrial-strength case study application. You'll find coverage of all this, and more: BEA WebLogic Server: Fundamental concepts and configuration techniques Designing robust, high-performance J2EE applications-including detailed coverage of capacity planning and performance testing Effective use of RMI and distributed naming Building presentation logic with WebLogic Server servlets and JavaServer Pages Using session, entity, and message-driven Enterprise JavaBeans Interfacing with Internet Mail using WebLogic Server JavaMail Establishing database connectivity with JDBC and implementing transactions with JTA Developing security with WebLogic Server JNDI and the Java Authentication and Authorization Service (JAAS) Packaging, deploying, and testing WebLogic Server applications Ready to move from "Java programmer" to "expert enterprise developer"? You won't find a more useful tool than BEA WebLogic Server-or a more useful book than J2EE Applications and BEA WebLogic Server . GREAT RESOURCES ON CD-ROM! All code from the book, including a complete enterprise application Complete evaluation version of BEA WebLogic Server Release 6 Bonus WebLogic Server tools and utilities
    Note: CD-ROM includes: WebLogic Server 6.0 evaluation copy, EJB 2.0 upgrade, WebLogic Server Console, administrative tools & utilities, example code & build scripts for each chapter, source code for the WebAuction application, & WebAuction application data, etc. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1416 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/469
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The in-depth UNIX guide for every end-user: completely updated and full of examples! For every key UNIX platform: practical examples, real depth! Covers all basic UNIX commands, plus sed , grep , awk , vi , and more Complete shell programming coverage-plus NEW programming section covering C/C++, Java(tm), and Internet development KornShell, Bash, C Shell, and Shell Programming Windows interoperability, in depth: Samba, NFS, Windows 2000 Services for UNIX, and much more UNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn't just list them! In UNIX User's Handbook, Second Edition , best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master-with exceptional clarity and practical, real-world examples. Part I brings together thorough coverage of virtually every key aspect of day-to-day UNIX operation and end-user administration. Part II presents an in-depth programming reference. Part III covers every leading option for Windows interoperability. You'll find fast, easy answers for all this and more: Getting started: login, mail, Internet access, and key UNIX file management commands All basic UNIX commands and a complete UNIX file system overview (cd, cp, file, ls, mv, pwd, rm, rmdir, cut, paste, split, sort, diff, and more) Key UNIX tools-including in-depth coverage of find, vi, find, grep, sed, and awk Shells and shell programming: Bash, Korn, and C Full programming section-including a NEW user-centered introduction to C/C++ and Java End-user administration: processes, startup, shutdown, users/groups, backup, software management, printing, and more Networking and Internet protocols UNIX/Windows interoperability: Samba, X Window, NFS, Posix, Windows 2000 Services for UNIX, and other alternatives Performance and monitoring This new edition has been updated throughout and redesigned for even faster, easier access to information. Whatever your experience, whatever UNIX version you use, you won't find a more useful reference!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 583 p. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Completely updated with hundreds of new examples! The only Linux reference with examples for every command All-new chapters on the Apache Web server, tc shell, and Emacs editor Organized by task, so you can find it fast! The practical, handy desk reference for every Linux user-now completely updated! Linux Desk Reference, Second Edition packs information about every command Linux users need-organized for maximum value and convenience. Scott Hawkins has updated entries throughout the book, and added four new chapters-including all-new coverage of the tc shell, Emacs editor, and Apache Web server. This friendly reference is organized by task so you can find what you need even if you don't know what it's called! Unlike other Linux references, this one delivers practical examples for every command it contains-plus hundreds of invaluable tips, warnings, diagrams, and sample outputs. And if you're a Linux expert, you'll love the "roadmap-style" alphabetical fast-find reference section! No matter what you need to know about Linux, it's here... Files and the filesystem Sessions, users, and groups Networking I/O, devices, and disks Apache Web services Windows connectivity Security X Window System Printers and print queues Text editors-including vi and Emacs The Linux kernel Scripting Email Comparing and merging files Scheduling Archiving and compression Performance monitoring Startup/shutdown Daemons Shells-including bash and tc Pattern matching Processes Diagnostics Tuning NIS/NFS Development resources And more! Whether you're a sysadmin, developer, power user, or newbie, get the most convenient, up-to-date Linux reference you can buy: Linux Desk Reference, Second Edition ! Praise for the first edition "Hawkins provides a superior combination of explanations, descriptions, and examples. Every Linux user, whether novice or experienced administrator, will value the organization and contents of the Linux Desk Reference." - SysAdmin magazine (Sept. 2000)
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442435 , 0132442434
    Language: English
    Pages: xvi, 275 p , ill. , 24 cm
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    Keywords: Multimedia systems ; Electronic books ; local
    Abstract: The state-of-the-art in multimedia content analysis, media foundations, and compression Covers digital audio, images, video, graphics, and animation Includes real-world project sets that help you build and test your expertise By two of the world's leading experts in advanced multimedia systems development The practical, example-rich guide to media coding and content processing for every multimedia developer. From DVDs to the Internet, media coding and content processing are central to the effective delivery of high-quality multimedia. In this book, two of the field's leading experts introduce today's state-of-the-art, presenting realistic examples and projects designed to help implementers create multimedia systems with unprecedented performance. Ralf Steinmetz and Klara Nahrstedt introduce the fundamental characteristics of digital audio, images, video, graphics, and animation; demonstrate powerful new approaches to content analysis and compression; and share expert insights into system and end-user issues every advanced multimedia professional must understand. Coverage includes: Generic characteristics of multimedia and data streams, and their impact on multimedia system design Essential audio concepts and representation techniques: sound perception, psychoacoustics, music, MIDI, Speech signals, and related I/O and transmission issues Graphics and image characteristics: image formats, analysis, synthesis, reconstruction, and output Video signals, television formats, digitization, and computer-based animation issues Fundamental compression methods: run-length, Huffman, and subband coding Multimedia compression standards: JPEG, H.232, and various MPEG techniques Optical storage technologies and techniques: CD-DA, CD-ROM, DVD, and beyond Content processing techniques: Image analysis, video processing, cut detection, and audio analysis First in an authoritative 3-volume set on tomorrow's robust multimedia desktop: real-time audio, video, and streaming media. Multimedia Fundamentals offers a single, authoritative source for the knowledge and techniques you need to succeed with any advanced multimedia development project. Look for Volume 2 focusing on networking and operating system-related issues, and Volume 3 focusing on service and application issues.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442381 , 0132442388
    Language: English
    Pages: xix, 311 p. , ill. , 24 cm
    Edition: 2nd ed.
    Series Statement: Essential guide series
    Parallel Title: Erscheint auch als
    Keywords: Radio ; Equipment and supplies ; Radio circuits ; Wireless communication systems ; Electronic books ; local
    Abstract: The only easy-to-understand guide to the wireless revolution! The easy-to-understand guide to the wireless revolution-fully updated for the latest technologies! New and expanded coverage: broadband fixed wireless, WLANs, wireless Internet, Bluetooth, smart antennas, and more Updated coverage of CDMA, GPS, LMDS, and WLL systems Concepts, terminology, components, and systems-plus new wireless glossary Perfect for marketers, investors, tech writers, PR specialists, and other non-engineers! There's a wireless revolution underway! With The Essential Guide to RF and Wireless, Second Edition , you can understand it, join it, and help drive it-even if you don't have a technical background. Leading consultant Carl J. Weisman has thoroughly updated this bestseller to reflect new market realities and breakthrough technologies-from wireless 802.11 LANs to broadband fixed wireless, and beyond. Mr. Weisman covers wireless at every level you need to understand: concepts, terminology, building blocks, and above all, how complete wireless systems actually work. Drawing on his extensive experience training sales professionals, he explains the essence of every key wireless/RF technology-clearly, comprehensibly, and with just the right touch of humor. Spread spectrum and CDMA: how they work and why they're important New! Detailed section on broadband fixed wireless: the new "last mile" solution for residential subscribers New! Satellite Internet delivery New! Smart antenna and superconducting filter technologies and their implications New! Wireless Internet, m-commerce, and Bluetooth Expanded! Global Positioning Systems: technologies and applications Updated! Preview the future of mobile telephony Updated! Wireless LANs and home networking From its all-new glossary to its extensive collection of charts, diagrams, and photographs, no other wireless/RF book is as accessible or as friendly! Whether you're a sales or marketing pro, customer, investor, tech writer, PR specialist, trade press writer, analyst, planner, or student, here's the up-to-the-minute briefing you've been searching for!
    Note: Includes bibliographical references (p. 297) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 428 p. , ill. ; , 24 cm
    Series Statement: Cisco Press networking technologies series
    Keywords: Computer networks ; Internet service providers ; Internet ; Electronic books ; local
    Abstract: A comprehensive guide to the best common practices for Internet service providers Learn the best common practices for configuring routers on the Internet from experts who helped build the Internet Gain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS Software Understand the Cisco IOS tools essential to building and maintaining reliable networks Increase your knowledge of network security Learn how to prevent problems and improve performance through detailed configuration examples and diagrams Cisco IOS Software documentation is extensive and detailed and is often too hard for many Internet service providers (ISPs) who simply want to switch on and get going. Cisco ISP Essentials highlights many of the key Cisco IOS features in everyday use in the major ISP backbones of the world to help new network engineers gain understanding of the power of Cisco IOS Software and the richness of features available specifically for them. Cisco ISP Essentials also provides a detailed technical reference for the expert ISP engineer, with descriptions of the various knobs and special features that have been specifically designed for ISPs. The configuration examples and diagrams describe many scenarios, ranging from good operational practices to network security. Finally a whole appendix is dedicated to using the best principles to cover the configuration detail of each router in a small ISP Point of Presence.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxii, 259 p. , ill. ; , 24 cm. +
    Series Statement: Cisco Press networking technologies series
    DDC: 004.6
    Keywords: Internet telephony ; Electronic books ; local
    Abstract: Create applications that deliver interactive content to Cisco IP Phones Learn information and techniques vital to building and integrating third-party services for Cisco IP Phones Understand the development process using XML and HTTP client and server applications to successfully build a service Discover advanced services information about objects, advanced runtime generation, and other XML development tools Utilize the provided CallManager Simulator to support an IP phone for development purposes Get the most out of your IP phone systems with strategies and solutions direct from the Cisco team Services on Cisco IP Phones help you enhance productivity, gain the competitive advantage, and even help generate revenue. Services are simply applications that run on the phone rather than on a PC or a web browser. By developing services tailored to your particular needs, you can achieve unlimited goals. Cisco AVVID IP Telephony provides an end-to-end voice-over-IP solution for enterprises. Part of that solution are Cisco IP Phones, a family of IP-based phones. Cisco IP Phones feature a large display, an XML micro browser capable of retrieving content from web servers, and the ability to deploy custom services tailored to your organization's or enterprise's needs. Developing Cisco IP Phone Services uses detailed code samples to explain the tools and processes used to develop custom phone services. You'll learn about XML, CallManager, Cisco IP Phones, and the history behind why Cisco chose XML to deploy phone services. You'll find detailed information to help you learn how to build a service, how to build a directory, and how to integrate your service with Cisco CallManager. This book complements and expands on the information provided in the Cisco IP Phone Services Software Developer's Kit (SDK). With the information in this book, you can maximize your productivity using the tools provided in the SDK and the custom tools provided on the companion CD-ROM. Beginner and advanced service developers alike benefit from the information in this book. Developing Cisco IP Phone Services represents the most comprehensive resource available for developing services for Cisco IP Phones. Companion CD-ROM The CD-ROM contains the sample services that are covered in the book, development utilities from the Cisco IP Phone Services SDK, and new tools written specifically for this book such as XML Validator. One of the most useful applications on the CD-ROM is the CallMana...
    Note: "A Cisco AVVID solution."--cover and spine. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 459 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: C# (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Enterprise-class .NET programming in C#-from a developer's perspective. Internals of the .NET Framework-learn to get the most from its services Build professional applications using C#-quickly and efficiently Hands-on approach covering the Base Class Library, Remoting, ASP .NET Web Services, concurrency, security, enterprise services, dealing with legacy code, and much more .NET developers need more than buzzwords to get the job done. To tackle enterprise-class projects, they need both a real understanding of the .NET architecture and a working knowledge of how to put its services to work. In .NET Programming: A Practical Guide Using C# , .NET authority Pradeep Tapadiya takes a straightforward, hands-on approach to explain everything you need to know from development to deployment and maintenance for this platform-all from a developer's perspective. Using C# as the primary language, and with plenty of code examples throughout, this book is an excellent way to learn: The .NET infrastructure-packaging and deployment, the common language runtime and its services, and the .NET Framework class libraries Distributed computing-develop object-remoting applications for intranets and Web services for the Internet How to develop thread-safe code using the .NET synchronization infrastructure and learn asynchronous programming Interoperability with native DLLs and COM applications How to develop secure applications using role-based security and enforce security for third-party applications using code access permissions Enterprise services-develop scalable applications, support transactions, and more. Appropriate for experienced developers, .NET Programming will help you get the most from the .NET architecture-today.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442503 , 0132442507
    Language: English
    Pages: xx, 618 p , 24 cm
    Edition: 3rd ed.
    Parallel Title: Erscheint auch als
    Keywords: Integrated circuits ; Very large scale integration ; Design and construction ; Computers ; Circuits ; Design and construction ; System design ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0137145004 ISBN-13: 9780137145003 For Electrical Engineering and Computer Engineering courses that cover the design and technology of very large scale integrated (VLSI) circuits and systems. May also be used as a VLSI reference for professional VLSI design engineers, VLSI design managers, and VLSI CAD engineers. Modern VSLI Design provides a comprehensive "bottom-up" guide to the design of VSLI systems, from the physical design of circuits through system architecture with focus on the latest solution for system-on-chip (SOC) design. Because VSLI system designers face a variety of challenges that include high performance, interconnect delays, low power, low cost, and fast design turnaround time, successful designers must understand the entire design process. The Third Edition also provides a much more thorough discussion of hardware description languages, with introduction to both Verilog and VHDL. For that reason, this book presents the entire VSLI design process in a single volume.
    Note: Includes bibliographical references (p. 599-606) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132441940 , 0132441942
    Language: English
    Pages: xix, 625 p , ill. , 25 cm
    Edition: 2nd ed.
    Series Statement: Prentice-Hall international series in the physical and chemical engineering sciences
    Parallel Title: Erscheint auch als
    Keywords: Chemical plants ; Safety measures ; Electronic books ; local
    Abstract: Combines academic theory with practical industry experience Updated to include the latest regulations and references Covers hazard identification, risk assessment, and inherent safety Case studies and problem sets enhance learning Long-awaited revision of the industry best seller. This fully revised second edition of Chemical Process Safety: Fundamentals with Applications combines rigorous academic methods with real-life industrial experience to create a unique resource for students and professionals alike. The primary focus on technical fundamentals of chemical process safety provides a solid groundwork for understanding, with full coverage of both prevention and mitigation measures. Subjects include: Toxicology and industrial hygiene Vapor and liquid releases and dispersion modeling Flammability characterization Relief and explosion venting In addition to an overview of government regulations, the book introduces the resources of the AICHE Center for Chemical Process Safety library. Guidelines are offered for hazard identification and risk assessment. The book concludes with case histories drawn directly from the authors' experience in the field. A perfect reference for industry professionals, Chemical Process Safety: Fundamentals with Applications, Second Edition is also ideal for teaching at the graduate and senior undergraduate levels. Each chapter includes 30 problems, and a solutions manual is now available for instructors.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxv, 514 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local
    Abstract: Practice for the new CCNA exam #640-801, as well as #640-607, with hands-on networking lab scenarios Build your own home internetworking lab from the ground up and use it to master essential internetworking skills Select Cisco router components and navigate within Cisco IOS(r) Software Gain access to Cisco routers and switches and configure a terminal server to access each lab router Configure hostnames and set passwords Configure router interfaces such as Ethernet, Token Ring, Loopback, and Serial Configure multiple routing protocols, including RIP, IGRP, and EIGRP Implement route redistribution to share routing information between routing domains Connect remote offices to the main network with ISDN DDR Integrate IPX into the network Control access with standard and extended access lists Troubleshoot common network failures Understanding the concepts covered on the Cisco Certified Network Associate exam is no longer sufficient to succeed on the test. In order to be completely prepared to succeed on the exam, as well as in your daily job as a CCNA engineer, you must be able to apply conceptual knowledge effectively in a production environment. CCNA Practical Studies is the first book of its kind, providing you with a series of detailed lab scenarios that illustrate the application of key internetworking topics. CCNA Practical Studies is a comprehensive reference that helps you gain essential hands-on experience in home-, work-, or remote access-based lab environments. An equally effective supplement to concept-based study guides or stand-alone reference for applying CCNA knowledge pre- or post-test, this book presents numerous examples that cover the entire range of CCNA topics. Starting at the physical layer of the OSI model, you use a layered approach to learn how to build a small network. Each chapter tackles a major subject area such as router configuration, routing protocols, bridging and switching, ISDN, access lists, IPX, and more. Each subject presents a mini-lab, walking you through the lab scenario and explaining in detail the commands used, why the authors chose the specific commands, and the resulting configurations. Comprehensive configuration and troubleshooting labs are added to the end of the book, allowing you to understand how routing technologies interact. This step-by-step lab scenario approach is designed to teach you how to apply the knowledge acquired in the process of becoming a CCNA. Whether you are preparing for the C...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 965 p. , ill. ; , 23 cm
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Network Consultants Handbook is a resource to consultants and engineers to assess, audit, analyze, and evaluate any existing or future network environment. Resources include form templates to complete during a network audit, important device commands to aid in obtaining vital information, and additional forms to aid in documentation. Real-world case studies serve as valuable examples, and network diagramming tips help you prepare consistent drawings for in-house documentation. Network audit and evaluation guidelines aid in data gathering and analysis of network environments Real-world case studies serve as valuable and relevant examples Network diagramming tips aid consultants and engineers in preparing consistent drawings for in-house documentation
    Note: Includes bibliographical references (p. [923]-925) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 392 p. , ill. ; , 24 cm
    Keywords: IS-IS (Computer network protocol) ; Electronic books ; local
    Abstract: The definitive IS-IS reference and design guide Extensive coverage of both underlying concepts and practical applications of the IS-IS protocol Detailed explanation of how the IS-IS database works and relevant insights into the operation of the shortest path first (SPF) algorithm Comprehensive tutorial on configuring and troubleshooting IS-IS on Cisco routers Advanced information on IP network design and performance optimization strategies using IS-IS Network design case studies provide a practical perspective of various design strategies Comprehensive overview of routing and packet-switching mechanisms on modern routers A collection of IS-IS packet formats and analyzer decodes useful for mastering the nuts and bolts of the IS-IS protocol and troubleshooting complex problems Interior gateway protocols such as Intermediate System-to-Intermediate System (IS-IS) are used in conjunction with the Border Gateway Protocol (BGP) to provide robust, resilient performance and intelligent routing capabilities required in large-scale and complex internetworking environments. Despite the popularity of the IS-IS protocol, however, networking professionals have depended on router configuration manuals, protocol specifications, IETF RFCs, and drafts. Mastering IS-IS, regardless of its simplicity, has been a daunting task for many. IS-IS Network Design Solutions provides the first comprehensive coverage available on the IS-IS protocol. Networking professionals of all levels now have a single source for all the information needed to become true experts on the IS-IS protocol, particularly for IP routing applications. You will learn about the origins of the IS-IS protocol and the fundamental underlying concepts and then move to complex protocol mechanisms involving building, maintaining, and dissemination of the information found in the IS-IS database on a router. Subsequent discussions on IP network design issues include configuration and troubleshooting techniques, as well as case studies with practical design scenarios.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online
    ISBN: 0130668397 , 9780130668394
    Language: English
    Pages: xxix, 358 p , ill. , 24 cm. +
    Keywords: Object-oriented methods (Computer science) ; Electronic books ; local
    Abstract: A rigorous and practical framework for modeling business systems Pares object modeling down to its core concepts, making it easier than ever. Twelve object collaboration patterns that address virtually any business scenario Powerful techniques-not fancy notation! Streamlined Object Modeling presents the first rigorous, practical framework for object modeling complex business domains, rules, and systems. Three world-renowned leaders in object development have pared object modeling down to the core concepts for all business domains, business rules, and business services. Starting from the first principles of "object think," the authors offer a fully integrated approach to building, validating, and critiquing object models. Coverage includes: Proven principles and techniques for successfully modeling the structure and operations of any business domain. Guidelines for finding and associating objects, assembling object models, and distributing system behavior among objects. Rigorous methods for discovering, organizing, and implementing business rules around objects. Twelve all-encompassing "collaboration patterns"-what they represent, how they relate, and how to apply them. Five kinds of business rules, three types of services, and six categories of properties completely specify object-oriented business requirements From start to finish, the book makes extensive use of examples drawn from real commercial applications. To illustrate how streamlined object modeling flows from analysis to code, it also presents a complete case study derived from a real-world application, and implemented in two leading object-oriented languages-Java, and the Squeak implementation of Smalltalk.
    Note: Includes bibliographical references (p. 343-344) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 510 p. , ill. ; , 23 cm
    DDC: 005.3
    Keywords: Microsoft Office ; Microsoft Visual Basic for applications ; Integrated software ; Electronic books ; local
    Abstract: Create custom business solutions with Microsoft Office XP and Office 2000! Extend Word, Excel, Outlook, and other Office applications. Learn all aspects of Office development, including security and distribution. Leverage Office's powerful collaboration, intranet, and Web capabilities For novice developers and Office power users! Discover the power of Office programming Applies to both Office XP and Office 2000 Master the Visual Basic for Applications (VBA) language and development environment Understand the powerful components in the Office object model Build custom tools that leverage email and the Web Construct four Office applications - step-by-step No Microsoft Office programming experience necessary! Developing robust custom solutions with Microsoft Office XP/2000!Microsoft Office is far more than the world's leading office productivity suite. Itspowerful capabilities are organized into hundreds of programmable components, all available to any developer who needs to create custom business solutions. Bycombining these components with the powerful Visual Basic for Applications (VBA) programming language, you can construct powerful applications far more quickly than if you built them from scratch. These components and VBA are available in both Office XP and Office 2000, which means you can use them whether or not you upgraded. In this book, expert developer and consultant Peter G. Aitken shows exactly how toleverage the power of Microsoft Office in custom application development. Whetheryou're an experienced developer or a business professional with a problem that needssolving, Aitken will show you how to do it with Office - step by step. Aitken begins by reviewing each key Office application - Word, Excel, Access,PowerPoint, Frontpage, and Outlook - and the shared components accessible to all ofthem. You'll discover powerful opportunities for extending and automating Office to increase efficiency and improve collaboration throughout your organization. Then, onestep at a time, Aitken teaches the key VBA skills you'll need to achieve your goals. Finally, this book walks you through the construction of four real-world Office applications, emphasizing the potential value of Office custom solutions in real-world business situations.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 554 p. , ill. ; , 24 cm
    DDC: 004.67/8
    Keywords: Cisco Systems, Inc ; Examinations ; Study guides ; Computer networks ; Examinations ; Study guides ; Internetworking (Telecommunication) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Practice for the CCNP BSCI exam with hands-on, networking lab scenarios〉 Ramp up your routing know-how with more than 40 practical lab scenarios Reinforce your CCNP exam preparation with step-by-step, hands-on router configuration Get up to speed with advanced OSPF and IS-IS configuration, summarization, and redistribution Gain proficiency in an advanced BGP environment with synchronization, communities and peer groups, and static and policy-based routing Perfect your EIGRP configuration and summarization skills Apply proficiency gained throughout the book with RIP to OSPF migration Use VLSMs to extend the use of IP addresses Test routing connectivity using accepted troubleshooting techniques Take your preparation to the next level with a bonus CCIE lab, written by a prominent member of the CCIE team at Cisco Systems Indispensable as both a router configuration guide and a preparation tool for the CCNP BSCI exam, CCNP Practical Studies: Routing will prepare you for the exam and give you the hands-on experience to apply your knowledge on the job. CCNP Practical Studies: Routing provides you with routing and configuration information from IP basics to advanced routing concepts and protocols, such as BGP and IS-IS, which is the newest addition to the BSCI exam. Each chapter focuses on a specific routing technology or protocol with a battery of scenarios and practical exercises that you can either configure using your home, work, or remote-access lab equipment or follow along by reviewing the book's example tasks. The five lab scenarios in each chapter serve to challenge your understanding of the chapter topics and measure your aptitude as a CCNP candidate, while providing concrete examples of the challenges faced in real-world configuration. CCNP Practical Studies: Routing provides you with practical information on all of the important concepts central to the CCNP Routing exam, including basic and advanced BGP and OSPF, EIGRP, route reflectors, IP routing principles, and IS-IS. Begin with basic lab scenarios that cover displaying and analyzing IP routing tables and using show and debug commands. Then graduate to more advanced lab scenarios, such as routing between a classful and a classless network; configuring VLSM; and working with multihomed BGP and connections to ISPs. Lab scenarios at the end of the book take you step-by-step through route optimization and redistribution. This book also contains a bonus CCIE®-level lab, which takes you beyon...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 323 p. , ill. ; , 24 cm
    DDC: 658.4/038/0285574
    Keywords: Data warehousing ; Electronic books ; local
    Abstract: The complete guide to building tomorrow's CRM-focused data warehouses. A complete methodology for building CRM-focused data warehouses Planning, ROI, conceptual and logical models, physical implementation, project management, and beyond For database developers, architects, consultants, project managers, and decision-makers Today's next-generation data warehouses are being built with a clear goal: to maximize the power of Customer Relationship Management. To make CRM-focused data warehousing work, you need new techniques, and new methodologies. In this book, Dr. Chris Todman-one of the world's leading data warehouse consultants-delivers the first start-to-finish methodology for defining, designing, and implementing CRM-focused data warehouses. Todman covers all this, and more: Critical design challenges unique to CRM-focused data warehousing A new look at data warehouse conceptual models, logical models, and physical implementation The crucial implications of time in data warehouse modeling and querying Project management: deliverables, assumptions, risks, and team-building-including a full breakdown of work Estimating the ROI of CRM-focused data warehouses up front Choosing software for loading, extraction, transformation, querying, data mining, campaign management, personalization, and metadata DW futures: temporal databases, OLAP SQL extensions, active decision support, integrating external and unstructured data, search agents, and more If you want to leverage the full power of your CRM system, you need a data warehouse designed for the purpose. One book shows you exactly how to build one: Designing Data Warehouses by Dr. Chris Todman.
    Note: Includes bibliographical references (p. 313) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xix, 504 p. , ill. ; , 24 cm. +
    DDC: 005.7/2
    Keywords: Application software ; Enterprise application integration (Computer systems) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Abstract: High-value solutions for integrating enterprise and legacy systems XML, Enterprise JavaAPIs, and much more Techniques for building flexible, extensible EIA solutions Easy-to-read, fully-documented code throughout CD-ROM includes leading-edge software and code library for XML/Java integration! "XML is the amazing new web standard for universal data interchange. With this book and XML you can integrate your applications without converting the code!" -Charles F. Goldfarb Integrate your enterprise with XML and Java! Enterprise Application Integration (EAI) links diverse applications, platforms, and operating systems so they work as one-and deliver powerful business results seamlessly. Platform-independent Java is one powerful tool for building EAI applications, and XML adds the missing link: robust mechanisms to exchange data with non-Java applications. Now there's a complete, step-by-step guide to using Java and XML together to deliver enterprise integration solutions that work! Enterprise Application Integration With XML and Java covers all this, and more: Demonstrating why XML is such a powerful EAI infrastructure solution Identifying your key requirements for sharing and exchanging data Building robust, high-performance Java applications for parsing and processing XML documents Moving data between Java and non-Java applications Integrating XML with relational databases Serializing Java objects into XML, and asynchronous messaging with XML Providing convenient references to XML 1.0 grammar and the W3C Document Object Model Whether you're a technical manager planning for enterprise application integration, or a Java developer tasked with delivering it, Enterprise Application Integration With XML and Java delivers the in-depth solutions and real-world expertise you need. CD-ROM INCLUDED The CD-ROM contains extensive source code from the book, plus a remarkable library of leading-edge software and trialware, including: Bluestone Visual-XML desktop XML development environment; IBM XML4J Java-based parser; and Push-technologies SpiritWAVE2 implementation of the Java Messaging Service!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 291 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Computer networks ; Computer storage devices ; Information storage and retrieval systems ; Electronic books ; local
    Abstract: Evaluating, planning, and migrating to SAN storage architectures SAN concepts, components, and applications-in depth Management, backup, disaster recovery, and day-to-day administration Includes an overview of Fibre Channel, the SAN enabler The complete guide to SAN technology for every implementer and manager! Every month, enterprises require more information, delivered faster, with greater reliability-and traditional data storage methods no longer suffice. Enter the Storage Area Network (SAN), which can store enormous amounts of data, serve it at lightning speed, scale to meet accelerating growth, and deliver unprecedented reliability. Now, there's a complete guide to SAN technology for every IT professional and decision-maker. Storage Area Networks covers it all: key concepts, components, applications, implementation examples, management, and much more. Coverage includes: What SANs are, what they can do, and how they overcome the critical limitations of earlier data storage systems Evolving to SANs: best practices for building SANs from your legacy storage topologies An overview of Fibre Channel, the key enabling technology for SANs SAN configuration, device, and connectivity options-in depth Well-managed SANs: day-to-day administration, backup, restore, and disaster recovery A detailed review of Hewlett-Packard's market-leading SAN product line: Fibre Channel chips, host bus adapters, hubs, arrays, tape libraries, bridges, switches, and more Storage Area Networks also previews the future of SAN technology: policy-based SANs, emerging applications, and more. Whether you're considering a SAN for the first time, or you want a comprehensive management reference for the SAN you've already invested in, this book offers the insights, techniques, and guidance you need right now.
    Note: Includes bibliographical references (p. 281-283) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 499 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Abstract: Must-have security strategies using Cisco's complete solution to network security The only book to cover interoperability among the Cisco Secure product family to provide the holistic approach to Internet security The first book to provide Cisco proactive solutions to common Internet threats A source of industry-ready pre-built configurations for the Cisco Secure product range Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a detailed explanation with examples of the preferred configurations required for securing Internet connections. The Cisco Secure PIX Firewall is covered in depth from an architectural point of view, and a reference of the PIX commands explains their use in the real world. Although Cisco Secure Internet Security Solutions is primarily concerned with Internet security, the information inside is also applicable to many general network security scenarios
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 276 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Internet programming ; World Wide Web ; Electronic books ; local
    Abstract: Get results from ASP with server-side JavaScript-today! Learn from practical real-world examples with downloadable reusable code Key techniques-quick, clear, and handy! Build shopping carts, guest books, and other applications Database integration, e-mail processing, and much more This compact, example-rich guide teaches Web developers exactly what they need to know to build great dynamic sites and applications with Microsoft's ASP and JavaScript, the world's #1 Web scripting language. Endorsed by the World Organization of Webmasters, Essential ASP for Web Professionals offers no-nonsense, practical coverage built around real-world examples on a live sample Web site. Every chapter includes real-world overviews of key ASP and JavaScript features, reinforcing what you've learned and demonstrating how to adapt it quickly to your own applications. From the basics of embedding ASP code in HTML pages to full-blown database application development, this book delivers practical answers, usable code, and real solutions-fast! Use ASP and JavaScript to do all this, and more! Deliver dynamic content on any Web or intranet site Create database applications that publish content and enable users to edit it Build shopping carts, guest books, and other applications Send e-mail automatically from your Web pages Embed dates and other variable data in your pages Request and check user passwords Look to Essential Books for ALL the Web Skills You Need! All these books share the same great format and similar Web sites containing downloadable code-so once you've used one, learning from the others is a piece of cake! Essential CSS and DHTML for Web Programmers Essential Flash 4 for Web Programmers Essential Perl 5 for Web Professionals Essential Photoshop for Web Designers Essential JavaScript for Web Programmers Essential PHP for Web Professionals Essential Flash 5 for Web Professionals , Essential Design for Web Professionals , and more coming soon!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: 2 v. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Computer network architectures ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks With MPLS and VPN Architectures, Volume II, you'll learn: How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers The new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT) How VRFs can be extended into a customer site to provide separation inside the customer network The latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backbone How to carry customer multicast traffic inside a VPN The latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier MPLS VPN services Advanced troubleshooting techniques including router outputs to ensure high availability MPLS and VPN Architectures, Volume II , builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN. MPLS and VPN Architectures, Volume II , begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting. MPLS and VPN Architectures, Volume II , also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index. - Vol. 2 also by Jeff Apcar
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 469 p. , ill. ; , 24 cm
    Keywords: Computer network protocols ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: An in-depth guide to understanding advanced MPLS implementation, including packet-based VPNs, ATM-based VPNs, traffic engineering, and quality of service Advanced MPLS Design and Implementation enables you to: Understand MPLS through a detailed analysis of MPLS architecture and operation Design and implement packet-based MPLS Virtual Private Networks (VPNs) using label switching routers (LSRs) Design and implement ATM-based MPLS VPNs using WAN-switched ATM LSRs Implement MPLS traffic engineering on your core network and optimize traffic flows dynamically Implement MPLS QoS and provide hard service guarantees with multiple classes of service Acquire practical design and implementation knowledge of real-world MPLS VPNs, TE, and QoS through case studies and configuration examples Multiprotocol Label Switching (MPLS) is a highly scalable, high-performance forwarding technology that has multiple applications in the service provider and enterprise environment. This book is intended for internetwork engineers and administrators who are responsible for designing, implementing, and supporting service provider or enterprise MPLS backbone networks. It contains a broad range of technical details on MPLS and its associated protocols, packet-based MPLS, ATM-based MPLS, MPLS traffic engineering, MPLS QoS, MPLS design, and advanced MPLS architectures. This book contains MPLS theory, design, configuration, and various case studies. Use this book as a reference and guide for designing, implementing, and supporting an MPLS network. Even if you're not using Cisco(r) equipment, this book can increase your awareness and understanding of MPLS technology as well as provide you with detailed design concepts and rules for building scalable MPLS networks. Advanced MPLS Design and Implementation is your guide to understanding, designing, and implementing MPLS VPNs, WAN-switched MPLS VPNs, MPLS traffic engineering, and MPLS QoS.
    Note: "An in-depth guide to understanding advanced MPLS implementation, including packet-based VPNs, ATM-based VPNs, traffic engineering, and quality of service"--Cover. - "First printing September 2001"--T.p. verso. - Includes bibliographical references [449]-451 and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 344 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Cisco IOS ; Internetworking (Telecommunication) ; Routers (Computer networks) ; Software configuration management ; Electronic books ; local
    Abstract: A Practical Introduction to Cisco IOS 12.0 Configuration Written by senior managers of Digital Island, the e-Business solutions company that counts AOL, MSNBC, CNBC, Mastercard International, the LA Times, and National Semiconductor among its customers Extensive case study of an entire internetwork complete with Cisco IOS configurations Practical examples explaining the basics of Cisco router configuration get readers up-to-speed quicklyCisco IOS output is detailed with numerous examples and clear explanations Cisco Router Configuration, Second Edition helps novice Cisco users with the basic administration of their internetworking devices. Using straightforward case studies and practical examples, this book teaches IOS software fundamentals for configuring, operating, and maintaining internetworking devices. Cisco Router Configuration, Second Edition provides an overview of Cisco IOS software. It describes basic information on Cisco devices and device interfaces (Ethernet, Token Ring, FDDI, Frame Relay, ATM). The basics of IP, IPX, and AppleTalk are explained, and the book shows how to use Cisco IOS software to configure addresses, routes, and routing protocols within these three protocols. Additionally, the book provides an elaborate example of an entire network setup with complete Cisco IOS configurations. All information in this second edition contains IOS 12.0 syntax.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 266 p. ; , 24 cm
    DDC: 004.2/1
    Keywords: Management information systems ; System analysis ; System design ; Electronic books ; local
    Abstract: The complete "how-to guide" for maximizing the availability of enterprise systems. Training, support, backup, and maintenance account for nearly 80 percent of the total cost of today's enterprise applications-and much of that money is spent trying to squeeze increased availability out of applications in spite of weak design and management processes. In High Availability, two leading IT experts bring together best practices for every people and process-related issue associated with maximizing application availability. The goal: to help enterprises dramatically improve the value of their strategic applications, without investing a dime more than necessary. Enhancing all four key elements of availability: reliability, recoverability, serviceability, and manageability Understanding how your users define availability Planning achievable service level agreements-and delivering on them Strategies for multiple platforms, from the mainframe to the desktop Lowering administrative costs through standardization and other techniques Redundancy, backup, fault tolerance, partitioning, automation, and other high availability solutions Leveraging availability features built into your existing hardware and operating systems Discover how to create systems that will be easier to maintain, anticipate and prevent problems, and define ongoing availability strategies that account for business change. Whatever your IT role, whatever your IT architecture, this book can help you deliver the breakthrough availability levels your organization needs right now.
    Note: Includes indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 1154 p. , ill. ; , 24 cm. +
    Edition: 1st ed.
    DDC: 005.2/765
    Keywords: WebSphere ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: WebSphere Application Server V3.5 is the latest version of the IBM open standards-based e-business application deployment environment. This redbook provides detailed insights into the product's architecture and a wealth of practical advice about how best to exploit WebSphere. At the heart of the book are detailed step-by-step descriptions of the tasks you carry out to deploy and execute your applications. The redbook places these task descriptions in a broader context by providing discussions of possible application architectures, deployment topologies, best practices and problem determination. These discussions are underpinned by clear descriptions of concepts and technologies including the Servlet, JSP and EJB APIs, security, and transactions. The redbook also contains details of the support for the Servlet API V2.2 and JSP V1.1 APIs introduced by WebSphere V3.5 Fix Pack 2.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xv, 579 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/76
    Keywords: WebSphere ; Handbooks, manuals, etc ; Application software ; Development ; Handbooks, manuals, etc ; Web servers ; Computer programs ; Handbooks, manuals, etc ; Web site development ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Complete guide for WebSphere application development How to make the best use of available tools Product experts reveal their secrets Complete guide for WebSphere application development How to make the best use of available tools Product experts reveal their secrets This IBM Redbook provides detailed information on how to develop Web applications for IBM WebSphere Application Server Version 4 using a variety of application development tools. The target audience for this book includes team leaders and developers, who are setting up a new J2EE development project using WebSphere Application Server and related tools. It also includes developers with experience of earlier versions of the WebSphere products, who are looking to migrate to the Version 4 environment. This book is split into four parts, starting with an introduction, which is followed by parts presenting topics relating to the high-level development activities of analysis and design, code, and unit test. A common theme running through all parts of the book is the use of tooling and automation to improve productivity and streamline the development process. In Part 1 we introduce the WebSphere programming model, the application development tools, and the example application we use in our discussions. In Part 2 we cover the analysis and design process, from requirements modeling through object modeling and code generation to the usage of frameworks. In Part 3 we cover coding and building an application using the Java 2 Software Development Kit, WebSphere Studio Version 4, and VisualAge for Java Version 4. We touch on Software Configuration Management using Rational ClearCase and provide coding guidelines for WebSphere applications. We also cover coding using frameworks, such as Jakarta Struts and WebSphere Business Components. In Part 4 we cover application testing from simple unit testing through application assembly and deployment to debugging and tracing. We also investigate how unit testing can be automated using JUnit. In our examples we often refer to the PiggyBank application. This is a very simple J2EE application we created to help illustrate the use of the tools, concepts and principles we describe throughout the book.
    Note: Includes bibliographical references (p. 563-567) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 372 p. , ill. ; , 24 cm
    Keywords: BGP (Computer network protocol) ; Routers (Computer networks) ; Software configuration management ; Electronic books ; local
    Abstract: The comprehensive, hands-on guide to all Cisco IOS(r) Software BGP-4 commands The complete BGP-4 command reference invaluable for network designers, engineers, and architects Provides configuration, troubleshooting, and verification scenarios for every possible BGP-4 command supported by Cisco IOS Software that can be implemented on a minimum number of routers Groups BGP-4 commands by area of implementation route aggregation, auto-summary, route filtering, and route advertisement, just to name a few Provides clear and concise commentary on the initial release, purpose, syntax, and usage of each BGP-4 command Offers excellent CCIE certification preparation from one of the CCIE Program Managers Includes supplementary information on regular expressions, route map logic, and RFC 1771, A Border Gateway Protocol 4 (BGP-4) Cisco BGP-4 Command and Configuration Handbook is an exhaustive practical reference to the commands contained within BGP-4. For each command/subcommand, author Bill Parkhurst explains the intended use or function and how to properly configure it. Then he presents scenarios to demonstrate every facet of the command and its use, along with appropriate show and debug commands. Through the discussion of functionality and the scenario-based configuration examples, Cisco BGP-4 Command and Configuration Handbook will help you gain a thorough understanding of the practical side of BGP-4.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...