Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2000-2004  (106)
  • 1940-1944
  • Upper Saddle River, NJ : Prentice Hall PTR  (56)
  • Indianapolis, IN : Cisco Press  (50)
  • Electronic books ; local  (106)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1 〉 , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web servers ; Electronic books ; local
    Abstract: The J2EE(TM) Platform has become the technology of choice for developing professional e-commerce applications, interactive Web sites, and Web-enabled applications and services. Servlet and JSP(TM) technology is the foundation of this platform: it provides the link between Web clients and server-side applications. In this 2nd edition of the worldwide bestseller, the authors show you how to apply the latest servlet and JSP capabilities. Unlike other books that treat servlet or JSP technology in isolation, Core Servlets and JavaServer Pages provides a unified treatment, showing you when servlet technology is best, when the JSP approach is preferred, and when (and how) servlets and JSP should work together. Part I provides exhaustive coverage of the servlet 2.4 specification. It starts with server configuration, basic syntax, the servlet life cycle, and use of form data. It moves on to applying HTTP 1.1, cookies, and session tracking. Advanced topics include compressing Web content, incrementally updating results, dynamically generating images, and creating shopping carts. Part II gives an in-depth guide to JSP 2.0. It covers both the "classic" JSP scripting elements and the new JSP 2.0 expression language. It shows how to control the content type, designate error pages, include files, and integrate JavaBeans components. Advanced topics include sharing beans, generating Excel spreadsheets, and dealing with concurrency. Part III covers two key supporting technologies: HTML forms and database access with JDBC(TM). It explains every standard HTML input element and shows how to use appropriate JDBC drivers, perform database queries, process results, and perform updates. Advanced topics include parameterized queries, stored procedures, and transaction control. Design strategies include ways to integrate servlet and JSP technology, best practices for invoking Java code from JSP pages, plans for dealing with missing and malformed data, and application of the MVC architecture. Handy guides walk you through use of three popular servlet and JSP engines (Apache Tomcat, Macromedia JRun, and Caucho Resin) and some of the most widely used database systems (MySQL, Oracle9i, Microsoft Access). Volume 2 of this book covers advanced topics: filters, custom tag libraries, database connection pooling, Web application security, the JSP Standard Tag Library (JSTL), Apache Struts, JavaServer Faces (JSF), JAXB, and more. The same clear step-by-step explanations that made...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A guide to successful deployment of the Cisco IP Telephony solution Real-world case studies from the Cisco design consulting engineers who developed the PDIOO process provide practical advice on all stages of successful IPT deployment Concise understanding of the PDIOO phases enables architects and engineers to successfully deploy the Cisco IPT solution Division of the process into PDIOO phases provides a logical and defined guide for network engineers and architects as they proceed through each of the phases in deploying the Cisco IPT solution Includes detailed questionnaires for each phase of deployment in the PDIOO cycle-a great aid in understanding customer networks and requirements Network infrastructure design, call processing infrastructure design and applications, and voice-mail system design are covered in depth Cisco® IP Telephony (IPT) solutions are being deployed at an accelerated rate, and network architects and engineers need to understand the various phases involved in successful deployment: planning, design, implementation, operation, and optimization (PDIOO). On the road to that understanding, those involved need to collect information for each phase of deployment, and then follow through with the best architecture, deployment model, and implementation based on the data collected. Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization is a guide for network architects and engineers as they deploy the Cisco IPT solution. With this book, you will master the PDIOO phases of the IPT solution, beginning with the requirements necessary for effective planning of a large-scale IPT network. From there, you'll follow a step-by-step approach to choose the right architecture and deployment model. Real-world examples and explanations with technical details, design tips, network illustrations, and sample configurations illustrate each step in the process of planning, designing, implementing, operating, and optimizing a chosen architecture based on information you have collected. In-depth instruction on each PDIOO phase provides specific details about the tasks involved and best practices for successful implementation of the IPT solution. This book also contains predesigned questionnaires and PDIOO assistance tools that help you determine the requirements of each phase of the PDIOO cycle. Authors Ramesh Kaza and Salman Asadullah have been involved with Cisco IPT solutions from the beginning and have planned, design...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the performance and availability of network applications and the network infrastructure with application performance management Understand how to identify applications critical to your business model Identify basic application characteristics and how they can be optimized for transmission Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications Improve service delivery and outsourcing decisions by utilizing meaningful SLAs Identify and solve network application performance problems, saving valuable time and money Includes real-world case studies that cover design and performance issues The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources. As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers. Yet networks remain congested, and applications continue to run slowly. Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle. Optimizing Applications on Cisco Networks takes a practical look at how application performance management can assist in the end-to-end application delivery model by proactively identifying hot spots within an organization. This book covers network dependent application delivery, with an emphasis on optimizing the underlying infrastructure, procedures, and methodologies to aid and measure delivery. The book also covers applications, delivery techniques, and QoS protocols. Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish service-level criteria, and ensure that these system configurations are continually assessed to maintain the desired level of service. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English
    Pages: xiv, 462 p. , ill. ; , 25 cm
    DDC: 004
    Keywords: Computer capacity ; Planning ; Electronic digital computers ; Evaluation ; Electronic books ; local
    Abstract: Practical systems modeling: planning performance, availability, security, and more Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of QoS issues, and the implications of their decisions. Now, three leading experts present a complete, application-driven framework for understanding and estimating performance. You'll learn exactly how to map real-life systems to accurate performance models, and use those models to make better decisions--both up front and throughout the entire system lifecycle. Coverage includes: State-of-the-art quantitative analysis techniques, supported by extensive numerical examples and exercises QoS issues in requirements analysis, specification, design, development, testing, deployment, operation, and system evolution Specific scenarios, including e-Business and database services, servers, clusters, and data centers Techniques for identifying potential congestion at both software and hardware levels Performance Engineering concepts and tools Detailed solution techniques including exact and approximate MVA and Markov Chains Modeling of software contention, fork-and-join, service rate variability, and priority About the Web Site The accompanying Web site provides companion Excel workbooks that implement many of the book's algorithms and numerical examples.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The only home networking book you'll ever need Setting up a home network doesn't need to be difficult. You can use this easy-to-understand reference to set up your home network, secure it, and turn it into an entertainment network. Don't be fooled by other guides-it can be this simple: It's Easy-Set up your home network with this visual step-by-step guide. Quit Wasting Time and Money-Buy the network gadgets and equipment you need. Make It Secure-Use simple tips to make your network secure. Wow the Neighbors-Turn your home network into an entertainment network. What Went Wrong-Fix common problems you might encounter while setting up your network.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 958 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Electronic data processing personnel ; Certification ; Telecommunication ; Switching systems ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Gain necessary hands-on experience implementing CCNP BCMSN concepts with this practical lab guide Lab configurations include explanations of equipment set-up and execution Valuable reference tool for Catalyst switches, including shortcuts, caveats, and application of the most advanced features Real-world scenarios represent the whole range of CCNP BCMSN 642-811 exam topics CCNP Practical Studies: Switching (CCNP Self-Study) provides CCNP candidates with an in-depth, hands-on experience in configuring Cisco Catalyst switches. This practical guide shows intermediate level networkers how to apply the theoretical knowledge they have gained through CCNP coursework and exam preparation. Configuration labs performed within this book will cover all technologies tested on the BCMSN 642-811 exam, as well as a number of real world scenarios that will test users' overall understanding of multilayer switching. The labs come complete with full explanations, highlighting why the chosen commands and techniques are recommended. In addition to applicable labs, this book also provides general information on various switching technologies, as well as tips, tricks, shortcuts, and caveats for deploying Cisco switching gear in production environments. This book also includes exercises (similar to traditional mathematics exercises) that will help readers internalize, practice, and memorize certain concepts and thought processes necessary to successfully deploy a switched network. Part of the Practical Studies series from the Cisco Press, CCNP Practical Studies: Switching provides self-study based hands-on experience. As such, it can be used in conjunction with other Cisco Press titles and is an excellent companion to instructor-led training from a Cisco Learning Partner.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 455 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.67/8
    Keywords: Electronic data processing personnel ; Certification ; Extranets (Computer networks) ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-511 foundation learning Understand the underlying principles of VPNs Learn about and identify proper implementation of remote access and site-to-site VPNs Identify the features, functions, and benefits of the Cisco VPN 3000 Concentrator Series Configure and test a remote access VPN using preshared keys on the Cisco VPN 3000 Concentrator Work with the RIP and OSPF dynamic routing protocols Gain proficiency with the VPN Client Firewall Apply digital certificates on the Cisco VPN 3000 Concentrator Use the Cisco 3002 Hardware Client to configure and test a remote access VPN Implement advanced VPN client features such as load balancing, reverse route injection, and the appropriate use of backup servers Configure LAN-to-LAN VPNs on the Cisco 3000 Concentrator Offer granular user-level security with user and unit authentication Learn how to use VPN through NAT and resolve real-world implementation challenges Provide a sound level of support and administration skills for day-to-day management of a VPN 3000 Concentrator-based VPN by utilizing the tools resident in the Concentrator CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a complete reference for professionals who intend to work with virtual private networks (VPNs) using IPSec. It includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. In addition to acting as a valuable study aid for the CCSP CSVPN 642-511 exam, this book is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients. CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over all techniques and technologies related to Cisco Systems VPN products. Chapter overviews bring you quickly up to speed and prepare you to get to work on securing your network. Detailed configuration examples allow you to take advantage of Cisco VPN products in no time. Unique chapter-ending review questions reinforce key concepts and test your knowledge. Whether you are seeking a reference guide to plan, administer, and maintain a VPN based upon the Cisco VPN 3000 Concentrator or are looking for a study guide for the 642-511 exam, CCSP Self-Study: Cisco Secure Virtual P...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 292 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 004.67
    Keywords: Computer networks ; Management ; Network performance (Telecommunication) ; Electronic books ; local
    Abstract: Learn about the technologies that drive fast broadband access in the first mile and master the design of first mile access networks Understand the motivating forces behind first mile access networks and learn about the technology and business requirements for first mile access solutions Master the design of passive optical networks (PON) Build EPON solutions and differentiate them from BPON and GPON Enhance bandwidth capacity in the access area using CWDM technology Learn about and design DSL and power-line communication (PLC) networks Discover the use of WiFi in the first mile and study the subsystems involved in a WiFi solution Learn the importance of management in first mile access networks and create a business case for diverse first mile access networks First Mile Access Networks and Enabling Technologies provides a platform for showcasing first mile access technologies and associated network solutions. Using this book, you learn about the bandwidth bottleneck within the first mile and explore the resulting business prospects. Benefit from a thorough and thoughtful discussion of the business case for the first mile, which helps you approach the issue from multiple perspectives. Examine multiple access technologies, understand the diversity of solutions within this area, and take your solutions further using sound and unique management techniques. Utilize the solid and tested implementation method provided by this book to remove networking anomalies, such as the digital divide. This book helps you understand and capitalize on the market opportunity presented by the first mile. First Mile Access Networks and Enabling Technologies covers multiple technologies, protocols, and business methods and can be used to understand the growth of first mile access networks and resulting business opportunities. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 739 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Note: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of routing No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here! Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing! Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar. No routing experience needed! Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology, this book is for you!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 820 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. In addition to acting as a key study aid for the CCSP SECUR 642-501 exam, this book will be an invaluable theory and configuration guide for years to come. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a Cisco authorized, self-paced learning tool that helps you gain mastery over all security techniques and technologies, including newer topics such as Cisco Easy VPN and Security Device Manager (SDM). Chapter overviews bring you quickly up to speed on technologies you can use to secure your network. Configuration examples are designed to show you how to make Cisco IOS devices secure, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with Cisco IOS security or a study guide for the 642-501 exam, CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is the reference you are looking for. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is part of a recommended learning path from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products fro...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: l, 1078 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Series Statement: Networking technology series
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Internetworking (Telecommunication) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: The updated edition of the best-selling all-in-one networking reference provides coverage of essential and cutting-edge technologies Concise overviews of technologies essential to networking professionals at all levels, from novice to expert. New chapters include coverage of important topics like VoIP and EAP Coverage of cutting edge technologies like optical networking and storage Authored by Cisco Systems, worldwide leader in networking for the Internet. Internetworking Technologies Handbook , Fourth Edition, is a comprehensive reference that enables networking professionals to understand and implement contemporary internetworking technologies. Master the terms, concepts, technologies, and devices used in today's networking industry. Learn how to incorporate internetworking technologies into a LAN/WAN environment. Complete with new and updated chapters on security, storage, optical networking, scalability, and speed, this book is a complete and up-to-date reference to the topics that are essential to all networking professionals, regardless of expertise. Readers will obtain a greater understanding of LAN and WAN networking, particularly the hardware, protocols, and services involved. Fundamental technology information is provided on a broad range of integral systems and services, including detailed descriptions, review questions to ensure concept comprehension and retention, and additional resources for further study. Coverage is also extended not only to new networking concepts, but also to older, legacy systems, providing a more realistic picture of the real-world networking environments in which professionals operate. Tools and guidelines for optimizing system performance will increase productivity and improve efficiency, helping the reader make more intelligent, cost-efficient decisions for their networks. Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Cisco solutions, which include industry-leading publications from Cisco Press, educate and a provide competitive advantage to customers through more efficient and timely exchange of information, leading to cost saving, process efficiencies, and closer business relationships. These solutions form the networking foundation for many organizations worldwide.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 809 p. , ill. ; , 24cm
    DDC: 621.382/7
    Keywords: Optical communications ; Optoelectronics ; Electronic books ; local
    Abstract: A comprehensive guide to understanding and configuring multiservice DWDM, SONET, and SDH architectures Optical Network Design and Implementation provides in-depth coverage of the following: DS1/DS3/E1/E3 over SONET/SDH IEEE 802.17 Resilient Packet Ring (RPR) Fast/Gigabit Ethernet over SONET/SDH VRF virtual private networks Double-tagged 802.1Q VPNs SAN transport, FICON, and Fibre Channel over SONET/SDH DWDM infrastructures Analysis of DWDM, SONET, and SDH architectures Multiservice optical networking has multiple applications in service provider and enterprise environments. To help you make the most of these applications, Optical Network Design and Implementation provides a complete reference of technology solutions for next-generation optical networks. The book explains the differences among various MAN technologies, getting you up to speed on the solutions you need to use. Optical Network Design and Implementation contains a broad range of technical details on multiservice optical networking and covers optical networking theory, design, and configuration by providing informative text, illustrations, and examples. It can be used as a reference for anyone designing, implementing, or supporting an optical network. Even if you're not using Cisco ONS equipment, this book can increase your awareness and understanding of optical technologies and provide you with detailed design concepts and rules for building highly scalable multiservice optical networks. This book covers the entire spectrum of optical networking technologies from the physical layer to the network layer. If you are a network architect, network manager, or a consultant who designs, deploys, operates, or troubleshoots multiservice optical and DWDM networks, Optical Network Design and Implementation is your comprehensive guide to optical networking. "This represents the first book that offers a comprehensive and technical guide to unique IP+Optical innovations with Cisco COMET." -Jayshree V. Ullal, Senior Vice President, Optical Networking Group Cisco Systems, Inc. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers. 158705105203152004
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 452 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Wireless communication systems ; Electronic books ; local
    Abstract: Industrial-strength J2ME™ for enterprise developers, architects, and decision-makers J2ME offers an extraordinarily flexible and robust platform for developing mobile applications with enterprise-class performance, reliability, and value. Now, leading mobile developer Michael Yuan covers every aspect of building industrial-strength applications with J2ME: design, architecture, tools, processes, business issues, and more. Yuan introduces innovations that make the platform even more powerful, ranging from new J2ME profiles and wireless messaging APIs to mobile databases and web services tools. These innovations allow existing Java™ developers (especially J2EE™ developers) to leverage their skills and add mobility to enterprise applications. Yuan also presents more than a dozen complete sample applications-including the application that earned him the grand prize in Nextel, Sun, and Motorola's nationwide wireless developer contest. Coverage includes: Patterns and best practices for building end-to-end mobile applications Emerging mobile "killer applications": driving productivity and cost reduction "Smart client" applications: architecture and construction Advanced HTTP techniques for authentication and session tracking Overcoming hardware and network limitations Leading-edge mobile enterprise messaging techniques Mobile databases and synchronization engines XML and mobile web services, including the J2ME Web Services Optional Package New options for mobile security in the enterprise
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco QOS 642-642 exam. The official study guide helps you master all the topics on the QOS exam, including QoS concepts, tools, and architectures Modular QoS CLI (MQC), QoS Policy Manager (QPM), and AutoQoS Classification and marking Congestion management Traffic shaping and policing Congestion avoidance through drop policies Compression tools and link fragmentation and interleaving (LFI) tools for link efficiency LAN QoS QoS best practices The CCVP certification validates a robust set of skills in implementing, operating, configuring, and troubleshooting a converged IP network. A solid understanding of quality-of-service (QoS) features and implementation is essential for CCVP certification and is also a core component of the CCIP® certification. Cisco QOS Exam Certification Guide , Second Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the QOS 642-642 exam. Senior instructor and best-selling author Wendell Odom and senior AVVID consultant Michael Cavanaugh share preparation hints and test-taking tips, helping you identify areas of weakness and improve your QoS knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Cisco QOS Exam Certification Guide , Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary tables, figures, and snapshot information make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. Cisco QOS Exam Certification Guide , Second Edition, is part of a recommended learning path from Cisco Syst...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture. Cisco ASA and PIX Firewall Handbook is a guide for the most commonly implemented features of the popular Cisco Systems® firewall security solutions. This is the first book to cover the revolutionary Cisco ASA and PIX® version 7 security appliances. This book will help you quickly and easily configure, integrate, and manage the entire suite of Cisco® firewall products, including Cisco ASA, PIX version 7 and 6.3, the Cisco IOS router firewall, and the Catalyst Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Shaded thumbtabs mark each section for quick reference and each section provides information in a concise format, with background, configuration, and example...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 498 p. , ill. ; , 24 cm
    Keywords: Fiber optics ; Handbooks, manuals, etc ; Fiber optics ; Metropolitan area networks (Computer networks) ; Optical communications ; Handbooks, manuals, etc ; Optical communications ; Electronic books ; local
    Abstract: Plan, design, and configure high-speed fiber-optic networks Coverage includes: Configuring ONS 15454 and ONS 15327 platforms Architecture for building Metropolitan Ethernet Transparent LAN Services (TLS) Packet over SONET (PoS) network design, configuration, and verification Inner workings of dense wavelength division multiplexing (DWDM), including operability with the ONS 15216 product family Principles of Dynamic Packet Transport (DPT) SONET background, including structures, components, and network design Bonus case studies, which challenge you to select equipment and design a metro optical network Fiber-optic networking has several significant advantages over traditional wired and wireless networks: optical signals can travel much farther than electrical signals, are more secure, are resistant to electromagnetic interference, and have the potential to provide bandwidth in the terabits per second range (1000 Gbps). Service providers must satisfy the always-increasing networking demands of customers while keeping costs to a minimum. Optical networks must meet the challenge of supporting multiple types of transmissions including voice, video, and data traffic. Although time-division multiplexing (TDM) has provided a growth path for services, it is more constrained than IP + Optical strategies like the Cisco Dynamic Packet Transport (Resilient Packet Ring). The Cisco Systems® end-to-end IP + Optical networking strategy provides an intelligent converged network in which optical infrastructures can be used to their fullest potential. While most reference books focus on the theory involved in SONET and optical infrastructures, Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) focuses on the practical application of planning and configuring optical networks that involve SONET, DWDM, Metropolitan Ethernet, Packet over SONET, and Dynamic Packet Transport (Resilient Packet Ring). Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. This volume is in the Certification Self-Study Series offered by Cisco Press. Books in this series provide officially deve...
    Note: "Plan, design, and configure high-speed fiber-optic networks"--Cover. - Includes bibliographical references (p. 483) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HD...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM. Design and implement effective network solutions by mastering the design process that is used by successful networking professionals Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach Create effective and customizable security solutions across the spectrum of SMB types and sizes Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions Implement wireless LAN solutions that facilitate productivity and workforce optimization In today's business world, investing in technology solutions that improve productivity and save money is critical, but the road to a modern, technology-driven business is full of pitfalls. Cisco Network Design Solutions for Small-Medium Businesses zeros in on critical solutions for networking professionals who are deploying computer networks within a small-medium business (SMB). You'll learn about core networking issues and associated solutions, including security, IP telephony, unified communications, customer relations management (CRM), wireless LANs, and more within this complete design guide. Cisco Network Design Solutions for Small-Medium Businesses is separated into two parts. Part I helps you explore the network design process, survey the SMB landscape, and identify your network requirements from the edge to the core for an effective solution implementation. Part II delves into security, CRM, IP telephony, unified messaging, IP/TV, and wireless LAN solutions, which can save businesses critical time and money. For networking professionals, Cisco Network Design Solutions for Small-Medium Businesses is a one-stop reference and design guide for the effective implementation of SMB networking solutions that enhance the bottom-line. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxv, 384 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: Your first step into the world of LAN switching No LAN switching experience required Includes clear and easily understood explanations Makes learning easy Your first step to LAN switching begins here! Learn local-area network (LAN) key concepts and terminology Identify key issues involved with designing and managing a switched LAN Answer the question: do I need a hub, a bridge, or a switch? Welcome to the world of LAN switching! Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed. No LAN switching experience needed! LAN Switching First-Step explains the basics of LAN switching in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the key concepts behind how bridges and switches work. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 860 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Firewalls (Computer security) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-521 foundation learning Gain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and more Learn the ins and outs of the PIX product family and its complete feature set Use the PIX Device Manager (PDM) 3.0 to configure and manage the PIX Firewall Use advanced techniques to control traffic on your network using ACLs (access control lists), content filtering, and object groups Improve security using PIX Firewall attack guards, intrusion detection, and shunning features Learn about techniques and security considerations for configuring OSPF on PIX Firewall version 6.3 Configure scalable site-to-site and client remote access VPNs using the PIX Firewall version 6.3 Configure high-availability solutions using stateful and LAN-based failover techniques Use logical interfaces and 802.1Q trunks to scale your PIX Firewall implementation Master enterprise management and maintenance techniques using CiscoWorks Management Center for Firewalls 1.2 and Auto Update Server 1.1 Configure the PIX Firewall Services Module (FWSM) The use of firewalls-devices residing at the network perimeter to protect against intrusion-is an essential building block to even the most basic security program. Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, offers in-depth configuration and deployment information for this popular and versatile firewall solution. CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, teaches you the skills needed to configure and operate the PIX Firewall product family. Chapter overviews bring you quickly up to speed and help you get to work right away. Lab exercises and scenario-based solutions allow you to adapt configurations to your network for rapid implementation, helping you make the most of your PIX Firewall. Chapter-ending review questions test your knowledge. PIX Device Manager (PDM) configuration procedures are presented to complement extensive...
    Note: Includes bibliographical references (p. [837]-841) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 236 p. , ill. ; , 24 cm
    DDC: 025.04
    Keywords: Internet addresses ; Internet searching ; Search engines ; Web search engines ; Web sites ; Electronic books ; local
    Abstract: Best-selling author and research expert Tara Calishain offers her insider tips and tricks for web searching in this title from Prentice Hall PTR's Garage Series. The book begins with an in-depth look at search engines and other online tools such as browsers. It describes several principles of web searching to help you leverage the scope of the Internet to discover information. The book also covers specific topic areas of Internet searching, both domestically and internationally. Finally, Web Search Garage includes a special technical support section to teach you how to find the support solutions you need on the Internet. Specific topics covered include Search engines Browsers The principles of web searching Searching for news, jobs, and local information Finding images and audio on the web Searching for people Genealogy research Consumer help Drugs and medical information Kid-safe searching Whether you're a newbie or an Internet search guru, Web Search Garage is a valuable resource for using the Internet wisely to find the information you're looking for. Calishain's thorough explanations and examples, combined with her entertaining wit will help you fine-tune your skills and search the Internet to find convenient solutions.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 281 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: IEEE 802.11 (Standard) ; Wireless LANs ; Electronic books ; local
    Abstract: Master the basics in designing, building, and managing a Cisco Aironet WLAN. Master the basics of Wireless LANs with this concise design and deployment guide Understand implementation issues for a variety of environments including vertical, SOHO, and enterprise networks Learn design and troubleshooting advice from real-world case studies 802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations. Wireless LANs connect computer networks via radio transmissions instead of traditional phone lines or cables. Benefits to these systems go well beyond getting rid of all the cables and wires. Campus networks can grow geographically larger while still retaining all their efficiency and speed. Additionally, cost savings can be realized when third-party phone lines are no longer necessary, saving the cost of line rental and equipment upkeep. Finally, flexibility in campus network design increases significantly for the networking professional, while the network accessibility and usefulness increases for the individual users. 802.11 Wireless LAN Fundamentals helps networking professionals realize these benefits by helping them understand how to design, build, and maintain these networks, as well as how to justify their value within organizations.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 808 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Extranets (Computer networks) ; Electronic books ; local
    Abstract: Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN) Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues Refer to specially designed flowcharts to identify issues and find solutions fast Consolidate VPN troubleshooting knowledge through bonus hands-on labs Read and understand detailed analysis of all relevant VPN show and debug command output Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. This book not only shows you how to correct problems but also how to avoid them in the first place with expert VPN configuration guidance and optimization tips. Each chapter in Troubleshooting Virtual Private Networks includes a step-by-step, end-to-end troubleshooting approach to a different VPN technology. In-depth technical discussions and configuration reviews orient you to the VPN technology and get you ready to work. To help you access the answers you need, you'll find flowcharts in ea...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 199 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computers ; Access control ; Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user. Topics covered include-- Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols Configure and troubleshoot AAA on Cisco routers Understand where to position and install the CSACS in your network Explore and customize the CSACS interface Configure CSACS user accounts, user groups, and shared profile components Add AAA clients and manage network connections Configure external databases and perform database replication and backup Explore the various reports and logs available in CSACS Learn how AAA models apply to service provider environments Install and configure Cisco Access Registrar As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains. Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar. Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for s...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 386 p. , ill. ; , 24 cm
    DDC: 005.4/3
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX 11i Internals Chris CooperChris Moore Invaluable information for optimizing HP-UX performance, reliability, and efficiency Find out how to approach system administration, tuning, and troubleshooting from a more informed perspective For every HP-UX sysadmin, programmer, and performance specialist HP Professional Books HP-UX 11i Internals HP-UX under the hood: practical insight for optimization and troubleshooting To maximize the performance, efficiency, and reliability of your HP-UX sysem, you need to know what's going on under the hood. HP-UX 11i Internals goes beyond generic UNIX internals, showing exactly how HP-UX works in PA-RISC environments. HP experts Cooper and Moore systematically illuminate HP-UX kernel data structures and algorithms for memory management, process and thread scheduling, I/O control, files and file systems, resource management, and more. They focus on HP-UX 11i, while also offering valuable insight for those using earlier versions. PA-RISC architecture: register set, virtual memory, key instructions, and procedure calling conventions HP-UX kernel organization: hardware-dependent and independent data structures Process and thread management: proc tables, memory management, scheduling, and the complete process/thread lifecycle System-wide memory resources: allocation and mapping to physical memory HP-UX paging and swapping Files and filesystems: traditional UNIX filesystems, HFS, VFS, and dynamic buffer cache I/O and device management: addressing, DMA, interrupts, device files, I/O configuration, device driver assignments, and I/O request pathways Logical Volume Management (LVM): abstracting physical disks from the disk I/O system HP-UX multiprocessing: challenges, data structures, and interfaces Kernel communication services: semaphores, message queues, shared memory, signals, and the kernel "callout" system Signaling in complex threaded environments System initialization, from vmunix to init: running HP-UX on diverse platforms Whether you administer HP-UX, tune it, troubleshoot it, or write kernel modules for it, you'll find HP-UX 11i Internals indispensable. U.S. $59.99 Canada $90.99 PRENTICE HALL Upper Saddle River, NJ 07458 www.phptr.com Hewlett-Packard(R) Professional Books A Prentice Hall Title www.hp.com/hpbooks ISBN: 0-13-032861-8
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 466 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Java (Computer program language) ; Software engineering ; Electronic books ; local
    Abstract: TechnicalJava™ Developing Scientific and Engineering Applications Grant Palmer The practical, example-rich guide to Java technical programming If you want to use Java todevelop scientific or engineering programs, Technical Java is the Java guide you'vebeen searching for. Using real-life examples, expert scientific programmerGrant Palmer shows how to build powerful, versatile, and flexible software forvirtually any technical application. Whether you're moving from FORTRAN,C, or C ++, or learning Java as your first language, Palmer covers all you needto know- Java, FORTRAN, C, and C ++, similarities, differences, and migration issues Java 1.4 syntax, objects, classes, methods, interfaces, variables, arrays, exceptions, packages, I/O, and more Working with java.math and creating your own math functions-including detailed trigonometric and transcendental examples Data modeling, in depth: class hierarchies, generic class libraries, least-squares fit, fitting to non-polynomial equations, and more Solving differential equations and systems of equations, including Gauss-Jordan and Gaussian elimination, lower-upper decomposition, and matrix inversion Solving integral equations with both proper and improper integrals Working with Fourier transforms (DFT and FFT) Building Web and GUI-based technical applications with Swing/AWT and servlets PRENTICE HALL Profession TechnicalReference Upper Saddle River, NJ 07458 www.phptr.com ISBN: 0-13-101815-9 UPC: 076092022398
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 346 p. , ill. ; , 24 cm. +
    DDC: 621.382/7
    Keywords: Computer networks ; Design and construction ; Optical communications ; Wavelength division multiplexing ; Electronic books ; local
    Abstract: A comprehensive book on DWDM network design and implementation solutions Design Software Included Study various optical communication principles as well as communication methodologies in an optical fiber Design and evaluate optical components in a DWDM network Learn about the effects of noise in signal propagation, especially from OSNR and BER perspectives Design optical amplifier-based links Learn how to design optical links based on power budget Design optical links based on OSNR Design a real DWDM network with impairment due to OSNR, dispersion, and gain tilt Classify and design DWDM networks based on size and performance Understand and design nodal architectures for different classification of DWDM networks Comprehend different protocols for transport of data over the DWDM layer Learn how to test and measure different parameters in DWDM networks and optical systems The demand for Internet bandwidth grows as new applications, new technologies, and increased reliance on the Internet continue to rise. Dense wavelength division multiplexing (DWDM) is one technology that allows networks to gain significant amounts of bandwidth to handle this growing need. DWDM Network Designs and Engineering Solutions shows you how to take advantage of the new technology to satisfy your network's bandwidth needs. It begins by providing an understanding of DWDM technology and then goes on to teach the design, implementation, and maintenance of DWDM in a network. You will gain an understanding of how to analyze designs prior to installation to measure the impact that the technology will have on your bandwidth and network efficiency. This book bridges the gap between physical layer and network layer technologies and helps create solutions that build higher capacity and more resilient networks. Companion CD-ROM The companion CD-ROM contains a complimentary 30-day demo from VPIphotonics™ for VPItransmissionMaker™, the leading design and simulation tool for photonic components, subsystems, and DWDM transmission systems. VPItransmissionMaker contains 200 standard demos, including demos from Chapter 10, that show how to simulate and characterize devices, amplifiers, and systems.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 529 p. , ill. ; , 24 cm
    DDC: 004.165
    Keywords: Itanium (Microprocessor) ; Electronic books ; local
    Abstract: Step-by-step guide to assembly language for the 64-bit Itanium processors, with extensive examples Details of Explicitly Parallel Instruction Computing (EPIC): Instruction set, addressing, register stack engine, predication, I/O, procedure calls, floating-point operations, and more Learn how to comprehend and optimize open source, Intel, and HP-UX compiler output Understand the full power of 64-bit Itanium EPIC processors Itanium® Architecture for Programmers is a comprehensive introduction to the breakthrough capabilities of the new 64-bit Itanium architecture. Using standard command-line tools and extensive examples, the authors illuminate the Itanium design within the broader context of contemporary computer architecture via a step-by-step investigation of Itanium assembly language. Coverage includes: The potential of Explicitly Parallel Instruction Computing (EPIC) Itanium instruction formats and addressing modes Innovations such as the register stack engine (RSE) and extensive predication Procedure calls and procedure-calling mechanisms Floating-point operations I/O techniques, from simple debugging to the use of files Optimization of output from open source, Intel, and HP-UX compilers An essential resource for both computing professionals and students of architecture or assembly language, Itanium Architecture for Programmers includes extensive printed and Web-based references, plus many numeric, essay, and programming exercises for each chapter.
    Note: Includes bibliographical references (p. 485-493) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 345 p. , ill. ; , 25 cm
    DDC: 621.382
    Keywords: Wireless communication systems ; Electronic books ; local
    Abstract: A practical, "first-principles" approach to space-time wireless channel design. A practical approach to space-time wireless channel design Integrates essential principles from communications, electromagnetics, and random process theory Includes detailed coverage of diversity, multipath applications, and antenna array design Contains extensive examples, illustrations, and problem sets Next-generation broadband radio systems must deliver unprecedented performance and higher data rates, while coping with increased spectral congestion. To achieve these goals, engineers need an in-depth understanding of radio channels that fade in time, frequency, and space. In Space-Time Wireless Channels , leading researcher Gregory D. Durgin presents a pragmatic, first-principles approach that integrates crucial concepts and techniques from communications, electromagnetics, and random process theory. Durgin focuses on comprehension and practicality, offering extensive examples, illustrations, and problem sets, while avoiding gratuitious mathematics and moving most derivations to end-of-chapter appendices. Coverage includes: Fundamentals of space, time, and frequency transmission and random process theory Electromagnetic description of space-time channels and the physics of small-scale fading First- and second-order statistics of fading channels Angle spectrum concepts and applications, including vector/scalar space and multipath shape factors Antenna diversity, temporal diversity, and bit error rates Multipath channels: separation, signaling, block coding, and antenna array design Appendices list special functions, Fourier transform examples, and random process theory concepts, as well as all relevant mathematical symbols, conventions, and acronyms.
    Note: Includes bibliographical references (p. 330-334) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 262 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Extranets (Computer networks) ; Security measures ; IPSec (Computer network protocol) ; Internet ; Security measures ; Intranets (Computer networks) ; Security measures ; Electronic books ; local
    Abstract: The insider's guide to IPSec for every network professional-updated for the newest standards, techniques, and applications. Using IPSec, companies can build VPNs and other Internet-centered applications with confidence that their data will remain secure. IPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date guide to IPSec technology. Two leading authorities in IPSec standardization and implementation cover every facet of IPSec architecture and deployment, review important technical advances since IPSec was first standardized, and present new case studies that show how IPSec can provide end-to-end security in real business environments. Coverage includes: New, in-depth deployment guidance: policy definition, representation, distribution, and management New IPSec enhancements: compression, multicast, key recovery, L2TP support, PKI integration, and more IPSec architecture and components: payloads, headers, Internet Key Exchange, security associations, and more Implementation architecture and techniques, including overlapping and shared security associations, nested and chained tunnels, and more IPSec security in host-to-host, host-to-gateway, and gateway-to-gateway scenarios Establishing secure VPN tunneling A detailed look inside the IPSec kernel IPSec, Second Edition delivers the techniques and insight you need to protect all your digital assets, wherever they are-on the Internet, your intranet, your extranet, or your VPN. Whether you're a networking or Web professional, software developer, or security specialist, you'll find it indispensable.
    Note: Includes bibliographical references (p. 245-250) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 222 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Ethernet (Local area network system) ; Metropolitan area networks (Computer networks) ; Electronic books ; local
    Abstract: The definitive guide to Enterprise and Carrier Metro Ethernet applications Discover the latest developments in metro networking, Ethernet, and MPLS services and what they can do for your organization Learn from the easy-to-read format that enables networking professionals of all levels to understand the concepts Gain from the experience of industry innovator and best-selling Cisco Press author, Sam Halabi, author of Internet Routing Architectures Metro networks will emerge as the next area of growth for the networking industry and will represent a major shift in how data services are offered to businesses and residential customers. The metro has always been a challenging environment for delivering data services because it has been built to handle the stringent reliability and availability needs for voice. Carriers will have to go through fundamental shifts to equip the metro for next-generation data services demanded by enterprise customers and consumers. This is not only a technology shift, but also a shift in the operational and business model that will allow the incumbent carriers to transform the metro to offer enhanced data services. Metro Ethernet from Cisco Press looks at the deployment of metro data services from a holistic view. It describes the current metro, which is based on TDM technology, and discusses the drivers and challenges carriers will face in transforming the metro to address data services. Metro Ethernet discusses the adoption of metro Ethernet services and how that has led carriers to the delivery of metro data services. With a changing mix of transport technologies, the book then examines current and emerging trends, and delves into the role of virtual private networks (VPN), virtual private local area networks (VLAN), virtual private LAN services (VPLS), traffic engineering, and MPLS and Generalized MPLS (GMPLS).
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 435 p. , ill. ; , 23 cm
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Sales presentations ; Handbooks, manuals etc ; Electronic books ; local
    Abstract: A technical handbook for network sales and customer service personnel Network Sales and Services Handbook covers the following: Foundational concepts and discussions of how networks interconnect The OSI model and its fundamental importance for moving information between computers on an internetwork Customer premises equipment, including a discussion of hardware commonly found at a customer site Threats to a network and methods for protecting a network against such threats Concepts of geographical networks and the three-tiered network hierarchy QoS and a network's capability to provide better service to select network traffic over various internetworking technologies Methods available to remote users for securely accessing organizational resources Public switched telephone network services and customer access Multiprotocol Label Switching (MPLS) and how it is used in a network backbone The fundamentals of fiber-optic networks, including Synchronous Optical Networks and Dense Wave Division Multiplexing One of the most significant challenges in any technical organization is knowledge transfer: getting the knowledge from those "in the know" (network engineers or consultants) to those on the "front lines" (those individuals who are selling and supporting a client's network services). Because these individuals tend to be quota driven, a sales/service team often does not have a lot of available time away from the field; potentially resulting in lost revenue. Understanding knowledge transfer is necessary for people working as customer service representatives and managers, engineering technicians, and presales account managers. Network Sales and Services Handbook provides sales and support professionals the fundamental technical knowledge necessary to understand customer needs. Designed as a complete reference guide, Network Sales and Services Handbook details networking basics, including foundational concepts and discussions of the many different LAN and WAN technologies and their functionality. Also included are fundamental discussions on quality of service (QoS), voice networks, and fiber optics, as well as a brief summary of the common routing protocols used in an internetwork. If you are a non-engineer associated with an engineering environment, Network Sales and Services Handbook is an essential part of your resource library.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvi, 584 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Electronic books ; local
    Abstract: The breakthrough solution for easier, faster, and more powerful Web development. Powerful techniques for accelerating, simplifying, and standardizing Web application development In-depth coverage of JSTL 1.0, including built-in tags, the new JSTL expression language, and custom tag development Written for both experienced Java platform developers and Web page authors By the best-selling author of Graphic Java and Advanced JavaServer Pages Using JSTL, software developers and Web page authors can create robust, flexible Web applications more quickly and easily than ever before. Now, best-selling author and JSTL expert David Geary presents the definitive guide to JSTL: its built-in tags, powerful expression language, and extensibility. Through practical examples and extensive sample code, Geary demonstrates how JSTL simplifies, streamlines, and standardizes a wide range of common Web development tasks and helps you build Web applications far more easily than JavaServer Pages technology alone. Key topics covered: Building HTML forms; accessing form data, JavaBeans components (beans), collections, and maps; constructing URLs and importing their content; redirecting HTTP responses; iterating over collections of objects; handling errors Localizing Web sites for multiple languages and countries, including localizing text and formatting and parsing numbers, currencies, percents, and dates. Creating and accessing data sources, making queries and iterating over the results; performing database inserts, updates, and deletes; executing database transactions Parsing XML documents; using XPath with JSTL custom actions; transforming XML with XSLT, filtering XML; accessing external entities Core JSTL shows you how to: Use JSTL to simplify Web development tasks Use the new JSTL expression language Access databases and execute transactions Develop internationalized Web sites Work with XML documents and JSP technology Extend JSTL with custom tags
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives Overcome the challenges of working with NAT and PMTUD Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access Apply fault tolerance methods to IPSec VPN designs Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN) Add services to IPSec VPNs, including voice and multicast Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings. IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This ...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 319 p. , ill. ; , 24 cm. +
    DDC: 621.36/7
    Keywords: LabVIEW ; Engineering instruments ; Data processing ; Image processing ; Digital techniques ; Electronic books ; local
    Abstract: The definitive tutorial on desktop image processing with NI's IMAQ Vision This book brings together everything you need to achieve superior results with PC-based image processing and analysis. Expert Thomas Klinger combines a highly accessible overview of the field's key concepts, tools, and techniques; the first expert introduction to NI's breakthrough IMAQ Vision software; and several start-to-finish application case studies. You also get an extensive library of code and image samples, as well as a complete trial version of IMAQ Vision for Windows®. Coverage includes: Defining what to measure and how to measure it Acquiring images: working with CCDs, cameras, frame grabber cards, and leading medical image sources, including ultrasound, CT, and MRI Distributing images: compression techniques, image format standards, and DICOM medical imaging Processing images: gray-scale operations, spatial image filtering, frequency filtering, and morphology functions Analyzing images: pixel value and quantitative analyses, shape and pattern matching, bar codes, and more With 300+ figures and 50+ exercises-all listed up front for easy access-this is the definitive image processing tutorial for every professional.
    Note: Includes bibliographical references (p. [309]-311) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 600 p. , ill. ; , 24 cm
    DDC: 005.2/82
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The definitive guide to Linux processes and IPC for programmers and system administrators Pipes, message queues, semaphores, shared memory, RPC, sockets, the /proc filesystem, and much more In-depth coverage of multithreading with POSIX compliant LinuxThreads Contains dozens of detailedprogram examples (GNU C/C++ 2.96/Red Hat Linux 7.3 & 8.0) Raves for Gray's companion UNIX® volume! "Concepts I only vaguely understood now make complete sense to me! The sample code and exercises are so good,they seem to clamp down on the concepts like a vise grip..."-S. Lee Henry, Johns HopkinsUniversity The expert, example-rich guide to Linuxprocesses and IPC Serious Linux software developers need a sophisticated understanding of processes, system level programming andinterprocess communication techniques. Now, John Shapley Gray, author of the widely praised Interprocess Communicationin UNIX, Second Edition, zeroes in on the core techniques Linux uses to manage processes and IPC. With exceptionalprecision and great clarity, Gray explains what processes are, how they're generated, how they access their environments,how they communicate- and how to use them to build robust, high-performance systems . Includes extensive coverage of named/unnamed pipes, message queues, semaphores, and shared memory. Provides C++ classes for System V IPC facilities. Offers an in-depth introduction to socket-basedcommunication. Demystifies Linux's /proc file system. Illuminates the LinuxThreads POSIX threadimplementation and its use in multithreaded applications. Provides valuable tips and warnings, plus insight intokey differences amongst Linux and Unix implementations. Includes problem sets and illustrations designed toreinforce key concepts. Gray presents dozens of standalone program examples; all compiled with the GNU C/C++ compiler 2.96 & 3.2, and fullytested on PC platforms running Red Hat Linux 7.3 & 8.0. http://authors.phptr.com/gray/
    Note: Includes bibliographical references (p. 587-590) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 692 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: ColdFusion ; Application software ; Development ; Internet programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: The first Java guide specifically for experienced ColdFusion developers and Web professionals! Leverage your Web and ColdFusion skills to develop powerful Java applications Master JSP, servlets, custom tags, JavaBeans, JDBC, and other key Java Web technologies Install and run Apache Tomcat 4 and JRun 4 application servers Build several complete applications, including an e-commerce site Includes handy Java glossary and JSP/servlet references Up-to-the-minute coverage of Java 1.4, JSP 1.2, servlet 2.3, and ColdFusion MX With ColdFusion MX and this book, any Web professional can leverage the power of Java to build robust, high-performance Web applications. Leading Web developer and columnist Eben Hewitt begins with a rapid-fire introduction to Java that builds on what you already know about ColdFusion to teach you exactly what you need to know about Java programming. Hewitt's focused examples, real-world insights, and code will take you from the basics of object-oriented programming to sophisticated JSP/servlet development, XML-based applications, and beyond! Master object-oriented application design and programming Build powerful servlets, JavaServer Pages, applets, and desktop applications Leverage XML & XSLT, exception handling, I/O, JDBC databases, and more Understand the similarities and key differences between CFML and Java development Integrate ColdFusion MX with J2EE and servlet technology Create JSP custom tags and use the brand-new JSP Standard Tag Library Includes complete references to JSP tags and the Servlet API, plus a handy Java glossary The bookÕs extensive code examples (downloadable from www.corecoldfusion.com) include a start-to-finish Java e-commerce application.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 249 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.13/3
    Keywords: Computer software ; Development ; Java (Computer program language) ; UML (Computer science) ; Electronic books ; local
    Abstract: UML for Java Programmers Robert C. Martin All the UML Java developers need to know You don't use UML in a vacuum: you use it to build software with a specific programming language. If that language is Java, you need UML for Java Programmers . In this book, one of the world's leading object design experts becomes your personal coach on UML 1&2 techniques and best practices for the Java environment. Robert C. Martin illuminates every UML 1&2 feature and concept directly relevant to writing better Java software--and ignores features irrelevant to Java developers. He explains what problems UML can and can't solve, how Java and UML map to each other, and exactly how and when to apply those mappings. Pragmatic coverage of UML as a working tool for Java developers Shows Java code alongside corresponding UML diagrams Covers every UML diagram relevant to Java programmers, including class, object, sequence, collaboration, and state diagrams Introduces dX, a lightweight, powerfully productive RUP & XP-derived process for successful software modeling Includes a detailed, start-to-finish case study: remote service client, server, sockets, and tests
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 893 p. , ill. ; , 25 cm
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: UNIX Systems Programming: Communication, Concurrency, and Threads by Kay A. Robbins and Steven Robbins UNIX processes, files, and special files Signals and timers POSIX threads, semaphores, and IPC TCP, UDP, multicast, and the Web Features projects on Internet radio, server performance, timers, web caching, and shells Learn how to design and implement reliable UNIX software whether you are using Linux, Solaris, Mac OS X, or another POSIX-based system. This completely updated classic (originally titled Practical UNIX Programming ) demonstrates how to design complex software to get the most from the UNIX operating system. UNIX Systems Programming provides a clear and easy-to-understand introduction to the essentials of UNIX programming. Starting with short code snippets that illustrate how to use system calls, Robbins and Robbins move quickly to hands-on projects that help readers expand their skill levels. This practical guide thoroughly explores communication, concurrency,and multithreading. Known for its comprehensive and lucid explanationsof complicated topics such as signals and concurrency, the bookfeatures practical examples, exercises, reusable code, and simplifiedlibraries for use in network communication applications. A self-contained reference that relies on the latest UNIX standards,UNIX Systems Programming provides thorough coverage of files, signals,semaphores, POSIX threads, and client-server communication. Thisedition features all-new chapters on the Web, UDP, and serverperformance. The sample material has been tested extensively in theclassroom. PRENTICE HALL Professional Technical Reference Upper Saddle River, NJ 07458 www.phptr.com ISBN: 0-13-042411-0
    Note: Previously published under title: Practical UNIX programming / Kay Robbins. Upper Saddle River, NJ : Prentice Hall, c1996. - Includes bibliographical references (p. 861-869) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 538 p. ; , 23 cm
    DDC: 004.6/6
    Keywords: Internetworking (Telecommunication) ; Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: A complete, concise reference for implementing the most important features of the Cisco Catalyst family of switches Review detailed and comparative configuration steps for features of the COS and Cisco IOS Software operating systems Understand basic system and operating system management Configure Ethernet, EtherChannel, Token Ring, and ATM LANE interfaces Deploy VLANs, private VLANs, trunking, VTP, and dynamic port membership Understand STP operation, configuration, and tuning Configure and use Cisco Catalyst hardware for Layer 3 switching and redundancy Discover how Cisco Catalyst switches handle multicast traffic and interact with multicast routers Implement broadcast suppression, protocol filtering, user authentication, port security, and VLAN access lists Set up switches for logging, SNMP and RMON management, and port analysis Configure voice gateway modules, inline power, and QoS features needed to transport voice traffic Cisco Catalyst switches, a common ingredient in many campus, metropolitan, enterprise, and service provider networks, are complex devices that require many configuration steps for proper operation. Not only are the required commands difficult to remember, but locating reference material on them also requires extensive research that is both time- consuming and difficult to complete in the field. Cisco Field Manual: Catalyst Switch Configuration is a quick and portable reference guide to the most commonly used features that can be configured on Cisco Catalyst switches. Derived from the authors' notes about how to configure a variety of Cisco Catalyst features during the course of their preparation for the CCIE(r) exam, Cisco Field Manual: Catalyst Switch Configuration is an indispensable tool that helps you perform the most popular deployment tasks. From the first page, the authors zero in on quick facts, configuration steps, and explanations of configuration options in each Cisco Catalyst feature. The different variations of the Cisco Catalyst operating systems (COS and Cisco IOS(r) Software) are shown together for side-by-side comparison, making it easy to move from one Cisco Catalyst platform to another. The book presents concise implementation advice for families of Cisco Catalyst features, including configuration fundamentals, Layer 2 interface configuration, Layer 3 interface configuration, VLANs and trunking, Spanning Tree Protocol (STP), Layer 3 switching, multicast, server load balancing, access control, switch m...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 319 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Series Statement: Prentice Hall PTR essential guide series
    DDC: 005.2/762
    Keywords: Internet programming ; JavaScript (Computer program language) ; Electronic books ; local
    Abstract: Build better Web sites with JavaScript-right now! Fully updated for the latest JavaScript standards and browser support Learn from real-world examples and two live practice Web sites Browser detection, dynamic content, CSS, rollovers, logins, navigation, debugging, and more! By award-winning Web developer Dan Barrett, whose clients have included Hewlett-Packard, Electronic Arts, and Pacific Bell. Don't waste your time or money on a gigantic JavaScript book! Learn the techniques you'll really use-right now, hands on, by example, from one of the world's top Web developers. You'll master JavaScript by building actual practice sites that sell products, educate visitors, offer subscriptions, display ads-even enforce security. Best of all, the finished sites are on the Web-so you can reuse the code, and see exactly how your pages should look and work Fully updated for the latest standards and browsers, Essential JavaScript for Web Professionals, Second Edition is simply the fastest way to gain the JavaScript skills you need most. You'll master all this and much more: Detecting browsers and platforms Creating dynamic content Making the most of CSS and layers Enforcing logins Creating rollovers Enhancing your site's navigation Adding error handling to your forms Generating and managing windows and frames Debugging your JavaScript code Writing code that's easy to maintain Rely on Essential Guides for ALL the Web Skills You Need!All these books share the same great format and the same dynamic Web site ... so once you've used one, they're all a piece of cake! Essential JavaScript for Web Professionals, Second Edition Essential XML for Web Professionals Essential XSL for Web Professionals Essential JSP for Web Professionals Essential CSS and DHTML for Web Professionals, Second Edition
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 830 p. , ill. ; , 24 cm
    DDC: 005.26/8
    Keywords: Microsoft Visual BASIC ; Application software ; Development ; BASIC (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Build industrial-strength .NET applications with Visual Basic. Experienced programmers: Quickly come up to speed on the new, powerful Visual Basic .NET Practical, hands-on coverage of the .NET Framework, CLR, ADO.NET, ASP.NET, Web services, security, interoperability, and more Running case study: see how concepts work together when you build .NET applications This book gives experienced developers the practical insight they need to build enterprise applications using Visual Basic .NET. Using extensive code examples and a running case study, the authors illuminate the .NET concepts and technologies that offer developers the greatest power and value. They cover the entire process of constructing a .NET application: developing a simple .NET console application; adding a Windows Forms interface; isolating functionality within components; providing database access via ADO.NET; securing your code; and using ASP.NET to create Web applications and services. .NET Framework and Common Language Runtime fundamentals for experienced programmers Key .NET features: interfaces, attributes, collections, I/O, threading, remoting, and more In-depth coverage of ADO.NET, ASP.NET Web Forms, and Web services Advanced user interface programming with Windows Forms and GDI+ Assemblies, component deployment, and versioning Ensuring interoperability with diverse and legacy systems Includes a self-contained Visual Basic .NET overview for those new to the language Part of The Integrated .NET Series from Object Innovations and Prentice Hall PTR.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 891 p. , ill. ; , 25 cm
    Edition: 4th ed.
    DDC: 004.6
    Keywords: Computer networks ; Electronic books ; local
    Abstract: The world's leading introduction to networking-fully updated for tomorrow's key technologies. Computer Networks, Fourth Edition is the ideal introduction to today's networks-and tomorrow's. This classic best seller has been thoroughly updated to reflect the newest and most important networking technologies with a special emphasis on wireless networking, including 802.11, Bluetooth, broadband wireless, ad hoc networks, i-mode, and WAP. But fixed networks have not been ignored either with coverage of ADSL, gigabit Ethernet, peer-to-peer networks, NAT, and MPLS. And there is lots of new material on applications, including over 60 pages on the Web, plus Internet radio, voice over IP, and video on demand.Finally, the coverage of network security has been revised and expanded to fill an entire chapter. Author, educator, and researcher Andrew S. Tanenbaum, winner of the ACM Karl V. Karlstrom Outstanding Educator Award, carefully explains how networks work on the inside, from underlying hardware at the physical layer up through the top-level application layer. Tanenbaum covers all this and more: Physical layer (e.g., copper, fiber, wireless, satellites, and Internet over cable) Data link layer (e.g., protocol principles, protocol verification, HDLC, and PPP) MAC Sublayer (e.g., gigabit Ethernet, 802.11, broadband wireless, and switching) Network layer (e.g., routing algorithms, congestion control, QoS, IPv4, and IPv6) Transport layer (e.g., socket programming, UDP, TCP, RTP, and network performance) Application layer (e.g., e-mail, the Web, PHP, wireless Web, MP3, and streaming audio) Network security (e.g., AES, RSA, quantum cryptography, IPsec, and Web security) The book gives detailed descriptions of the principles associated with each layer and presents many examples drawn from the Internet and wireless networks.
    Note: Includes bibliographical references (p. 835-868) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 391 p. , ill. ; , 25 cm
    Series Statement: Prentice Hall PTR series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and former UUNet network architect Allan Liska addresses every facet of network security, from risk profiling through access control, Web/email security through day-to-day monitoring. He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 458 p. , ill. ; , 25 cm
    DDC: 658.4/032
    Keywords: Object-oriented methods (Computer science) ; System analysis ; Electronic books ; local
    Abstract: The complete guide to requirements analysis for every system analyst and project team member. Thousands of software projects are doomed from the start because they're based on a faulty understanding of the business problem that must be solved. The solution is effective requirements analysis. In Requirements Analysis: From Business Views to Architecture , David C. Hay gives you a comprehensive overview of the world's best requirements analysis practices, organized coherently to help you choose and execute the best approach for every project. In addition, he guides you through the process of defining an architecture-from gaining a full understanding of what business people need to the creation of a complete enterprise architecture. Practical solutions will help you: Focus more clearly on the goals of requirements analysis Represent the fundamental structures and systems environment of any enterprise more accurately Identify key information processing gaps and discover which information technologies can best address them Clarify the goals of your new system and reflect them more accurately in your models Understand crucial people-related issues that impact requirements Plan smooth transitions to new systems Requirements Analysis: From Business Views to Architecture provides the complete process of defining an architecture-so that you can build a rock-solid foundation for your next software project.
    Note: Includes bibliographical references (p. 443-448) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Realize productivity gains from network-driven communication, training, and assessment What sets apart The Business Case for E-Learning? Unified approach to e-learning. Covering knowledge sharing, training, and assessment. E-learning components such as online testing and certifications are uniquely combined. Productivity. The cause for rather than a consequence of e-learning. The Business Case for E-Learning demonstrates cases and methods in e-learning to those seeking productivity advantages for their organizations and ecosystems. Focus on ecosystem. Those seeking productivity advantages across the entire supply chain or value chain of delivery can benefit from the presented perspective. Recommendations go beyond organizational gains to cover resellers and customers. Results and returns. See case studies and empirical evidence of the value and return on investment (ROI) that demonstrate the success of a cohesive e-learning program. Learn how Cisco Systems saved $142 million in one year using e-learning. I have always truly believed that the Internet and education are the two great equalizers in life, and this book provides information about how to combine the two for productivity and profitability gains, based on real successes. -John Chambers, President and CEO of Cisco Systems The Business Case for E-Learning is the first book that demonstrates the productivity gains provided by Internet learning through a unique approach combining e-communication, e-training, and e-assessment. Beyond theory, The Business Case for E-Learning is based on practical experience in developing and deploying programs that bolster profitability. This book offers you practical recommendations for best practices and return on investment and provides lessons learned from real-world experiences. The Business Case for E-Learning presents several case studies that range from the challenges of learning in Africa to the emergence of corporate knowledge-sharing communities. Case studies on Toyota, BearingPoint, Element K, and other e-learning leaders demonstrate how e-learning best practices can yield value for any organization. One case study quantifies how Cisco Systems in one year generated $16 in value for every dollar spent on an e-learning program. Managers need to prove to companies that an e-learning program can result in demonstrable productivity gains. Through The Business Case for E-Learning , you learn to avoid unnecessary trial and error with e-learning and tak...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 529 p. , ill. ; , 23 cm
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The Oracle SQL every DBA needs-fast and easy! Covers all the core day-to-day tasks DBAs are responsible for Quick access to SQL commands, operators, functions, data dictionary views, and more Includes dozens of easy-to-understand syntax diagrams The fast, practical Oracle SQL reference for every Oracle DBA! If you're a working Oracle DBA, here's the Oracle SQL reference you've been searching for-simple, straightforward, and incredibly easy to use! There's no faster way to discover the exact syntax you need...refresh your memory about that option you haven't used lately...find the name of that view you know exists...start using that new Oracle 9 i feature you haven't tried yet. Keep it by your desk, near your server...wherever you need fast, reliable answers right this minute! Covers Oracle SQL through Oracle9 i Release 2 Clear, well-organized tables of operators, functions, format models, privileges, and reserved words Complete command reference: syntax and options for every Oracle SQL command Standard "railroad" syntax diagrams make it easy to write correct syntax Handy listings of data dictionary views and dynamic performance tables
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xix, 301 p. , ill. ; , 24 cm
    Series Statement: Cisco Press networking technologies series
    Keywords: Storage area networks (Computer networks) ; Electronic books ; local
    Abstract: A guide to planning, implementing, managing, and using storage area networks to increase the efficiency of your network infrastructure Gain in-depth coverage of SAN fundamentals, topologies, implementation and management techniques, and products Build and sharpen your troubleshooting skills for data-mining, online transaction processing, imaging, data warehousing, and other highly data-intensive applications Understand how to implement the Fibre Channel and iSCSI protocols, which are key to any SAN solution Learn current industry implementation and application standards, as well as future advances During the last decade, a multitude of changes in computing technology and the globalization of business through the Internet have resulted in a tremendous growth in storage requirements. This has forced many organizations around the world to reassess the way they view their storage environment. Many applications, such as e-commerce, imaging, data warehousing, Enterprise Resource Planning (ERP), and Customer Relationship Management (CRM), fill storage media quickly. Data accessibility and availability for these applications has to be fast and efficient. Clearly, the ever-increasing information access requirements have had a profound effect on most data centers. As a result, many organizations are searching for cost-effective ways to ensure high data availability and reliability. Storage Area Network Fundamentals presents the benefits of storage area networks (SANs) to corporate users and enables them to deploy SAN technology effectively. Designed as an introduction to SANs, Storage Area Network Fundamentals develops an understanding of SAN basics and shows how to plan, implement, and manage a SAN. This book covers the topologies, protocols, and products required to implement and manage efficient SANs.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxii, 259 p. , ill. ; , 24 cm. +
    Series Statement: Cisco Press networking technologies series
    DDC: 004.6
    Keywords: Internet telephony ; Electronic books ; local
    Abstract: Create applications that deliver interactive content to Cisco IP Phones Learn information and techniques vital to building and integrating third-party services for Cisco IP Phones Understand the development process using XML and HTTP client and server applications to successfully build a service Discover advanced services information about objects, advanced runtime generation, and other XML development tools Utilize the provided CallManager Simulator to support an IP phone for development purposes Get the most out of your IP phone systems with strategies and solutions direct from the Cisco team Services on Cisco IP Phones help you enhance productivity, gain the competitive advantage, and even help generate revenue. Services are simply applications that run on the phone rather than on a PC or a web browser. By developing services tailored to your particular needs, you can achieve unlimited goals. Cisco AVVID IP Telephony provides an end-to-end voice-over-IP solution for enterprises. Part of that solution are Cisco IP Phones, a family of IP-based phones. Cisco IP Phones feature a large display, an XML micro browser capable of retrieving content from web servers, and the ability to deploy custom services tailored to your organization's or enterprise's needs. Developing Cisco IP Phone Services uses detailed code samples to explain the tools and processes used to develop custom phone services. You'll learn about XML, CallManager, Cisco IP Phones, and the history behind why Cisco chose XML to deploy phone services. You'll find detailed information to help you learn how to build a service, how to build a directory, and how to integrate your service with Cisco CallManager. This book complements and expands on the information provided in the Cisco IP Phone Services Software Developer's Kit (SDK). With the information in this book, you can maximize your productivity using the tools provided in the SDK and the custom tools provided on the companion CD-ROM. Beginner and advanced service developers alike benefit from the information in this book. Developing Cisco IP Phone Services represents the most comprehensive resource available for developing services for Cisco IP Phones. Companion CD-ROM The CD-ROM contains the sample services that are covered in the book, development utilities from the Cisco IP Phone Services SDK, and new tools written specifically for this book such as XML Validator. One of the most useful applications on the CD-ROM is the CallMana...
    Note: "A Cisco AVVID solution."--cover and spine. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 872 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: Electronic data processing personnel ; Certification ; Microsoft software ; Examinations ; Study guides ; Routers (Computer networks) ; TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: The comprehensive, hands-on guide for resolving IP routing problems Understand and overcome common routing problems associated with BGP, IGRP, EIGRP, OSPF, IS-IS, multicasting, and RIP, such as route installation, route advertisement, route redistribution, route summarization, route flap, and neighbor relationships Solve complex IP routing problems through methodical, easy-to-follow flowcharts and step-by-step scenario instructions for troubleshooting Obtain essential troubleshooting skills from detailed case studies by experienced Cisco TAC team members Examine numerous protocol-specific debugging tricks that speed up problem resolution Gain valuable insight into the minds of CCIE engineers as you prepare for the challenging CCIE exams As the Internet continues to grow exponentially, the need for network engineers to build, maintain, and troubleshoot the growing number of component networks has also increased significantly. IP routing is at the core of Internet technology and expedient troubleshooting of IP routing failures is key to reducing network downtime and crucial for sustaining mission-critical applications carried over the Internet. Though troubleshooting skills are in great demand, few networking professionals possess the knowledge to identify and rectify networking problems quickly and efficiently. Troubleshooting IP Routing Protocols provides working solutions necessary for networking engineers who are pressured to acquire expert-level skills at a moment's notice. This book also serves as an additional study aid for CCIE candidates. Authored by Cisco Systems engineers in the Cisco Technical Assistance Center (TAC) and the Internet Support Engineering Team who troubleshoot IP routing protocols on a daily basis, Troubleshooting IP Routing Protocols goes through a step-by-step process to solving real-world problems. Based on the authors' combined years of experience, this complete reference alternates between chapters that cover the key aspects of a given routing protocol and chapters that concentrate on the troubleshooting steps an engineer would take to resolve the most common routing problems related to a variety of routing protocols. The book provides extensive, practical coverage of BGP, IGRP, EIGRP, OSPF, IS-IS, multicasting, and RIP as run on Cisco IOS Software network devices. Troubleshooting IP Routing Protocols offers you a full understanding of invaluable troubleshooting techniques that help keep your network operating at ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xvi, 255 p. , ill. ; , 25 cm
    Keywords: Digital subscriber lines ; Electronic books ; local
    Abstract: The ultimate DSL deployment guides and reference Teaches the reader how to design and implement the network to offer services such as voice, video, and data Explains the various access and core architectures for xDSL technologies Details how to do mass provisioning and how to manage an end-to-end network Includes case studies that depict some of the most common deployed architectures, how they evolved, problems they faced, and how they were overcome Design and Implementation of DSL-Based Access Solutions addresses various architectures for DSL-based networks. It focuses on how to design and implement an end-to-end solution for service providers, considering various business models such as retail, wholesale, VPN, etc. This book depicts the different architectures, and helps you understand the key design principles in deploying them. It covers both access encapsulations such as bridging, PPPoA, PPPoE, and routing, as well as core architectures such as IP, L2TP, MPLS/VPN, and ATM. Because it focuses on end-to-end solutions, Design and Implementation of DSL-Based Access Solutions talks about how to do mass provisioning of subscribers and how to manage networks in the most efficient way. It also includes discussions of real-life deployments, their design-related issues, and their implementation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 392 p. , ill. ; , 24 cm
    Keywords: IS-IS (Computer network protocol) ; Electronic books ; local
    Abstract: The definitive IS-IS reference and design guide Extensive coverage of both underlying concepts and practical applications of the IS-IS protocol Detailed explanation of how the IS-IS database works and relevant insights into the operation of the shortest path first (SPF) algorithm Comprehensive tutorial on configuring and troubleshooting IS-IS on Cisco routers Advanced information on IP network design and performance optimization strategies using IS-IS Network design case studies provide a practical perspective of various design strategies Comprehensive overview of routing and packet-switching mechanisms on modern routers A collection of IS-IS packet formats and analyzer decodes useful for mastering the nuts and bolts of the IS-IS protocol and troubleshooting complex problems Interior gateway protocols such as Intermediate System-to-Intermediate System (IS-IS) are used in conjunction with the Border Gateway Protocol (BGP) to provide robust, resilient performance and intelligent routing capabilities required in large-scale and complex internetworking environments. Despite the popularity of the IS-IS protocol, however, networking professionals have depended on router configuration manuals, protocol specifications, IETF RFCs, and drafts. Mastering IS-IS, regardless of its simplicity, has been a daunting task for many. IS-IS Network Design Solutions provides the first comprehensive coverage available on the IS-IS protocol. Networking professionals of all levels now have a single source for all the information needed to become true experts on the IS-IS protocol, particularly for IP routing applications. You will learn about the origins of the IS-IS protocol and the fundamental underlying concepts and then move to complex protocol mechanisms involving building, maintaining, and dissemination of the information found in the IS-IS database on a router. Subsequent discussions on IP network design issues include configuration and troubleshooting techniques, as well as case studies with practical design scenarios.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xv, 600 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Configuring, programming, and administering mixed Linux/Windows environments Practical Linux/Windows network design and implementation Covers all key interoperability issues Internet/intranet, directory services, backup/restore, security, remote access, file/print, and much more Enterprises depend increasingly on both Linux and Windows technologies to maximize the performance and value of their IT infrastructures. Now one book presents all of today's best practices for managing Linux and Windows together. In Linux and Windows Interoperability Guide , leading consultants Ed Bradford and Lou Mauget deliver comprehensive guidance for the entire IT lifecycle: network planning, configuration, deployment, application development, scripting, system administration, optimization, and much more. Includes up-to-the-minute coverage of Windows XP and Windows 2000 Covers every key Windows/Linux interoperability issue Delivering Web, intranet, and other TCP/IP-based services Providing remote access and thin-client support Managing software and user interface compatibility Integrating and streamlining backup and restore Designing enterprise domains for maximum performance and security Integrating directory services to provide single-sign-on and easy management Providing robust file and print services Linux and Windows Interoperability Guide -it's your total solutions resource for maximizing the reliability, performance, and cost-effectiveness of any Linux/Windows environment.
    Note: "Configuring, programming, and administering mixed Linux/Windows environments"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 627 p. , ill. ; , 26 cm
    Edition: 2nd ed.
    DDC: 005.1/17
    Keywords: Object-oriented methods (Computer science) ; System analysis ; System design ; UML (Computer science) ; Electronic books ; local
    Abstract: "People often ask me which is the best book to introduce them to the world of OO design. Ever since I came across it Applying UML and Patterns has been my unreserved choice." - Martin Fowler , author, UML Distilled and Refactoring The first edition of Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design quickly emerged as the leading OOA/D introduction; it has been translated into seven languages and adopted in universities and businesses worldwide. In this second edition, well-known object technology and iterative methods leader Craig Larman refines and expands this text for developers and students new to OOA/D, the UML, patterns, use cases, iterative development, and related topics. Put simply, the book shows newcomers to OOA/D how to "think in objects." It does so by presenting three iterations of a single, cohesive case study, incrementally introducing the requirements and OOA/D activities, principles, and patterns that are most critical to success. It introduces the most frequently used UML diagramming notation, while emphasizing that OOA/D is much more than knowing UML notation. All case study iterations and skills are presented in the context of an "agile" version of the Unified Process -- a popular, modern iterative approach to software development. Throughout, Larman presents the topics in a fashion designed for learning and comprehension. Among the topics introduced in Applying UML and Patterns are: * requirements and use cases, * domain object modeling, * core UML, * designing objects with responsibilities, * "Gang of Four" and other design patterns, * mapping designs to code (using Java as an example), * layered architectures, * architectural analysis, * package design, * iterative development, and * the Unified Process. For a more detailed list of topics, please see the accompanying table of contents. Foreword by Philippe Kruchten, the lead architect of the Rational Unified Process. "Too few people have a knack for explaining things. Fewer still have a handle on software analysis and design. Craig Larman has both." - John Vlissides , author, Design Patterns and Pattern Hatching "This edition contains Larman's usual accurate and thoughtful writing. It is a very good book made even better." - Alistair Cockburn , author, Writing Effective Use Cases and Surviving OO Projects
    Note: Includes bibliographical references (p. 609-613) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 485 p. , ill. ; , 24 cm
    DDC: 620.8
    Keywords: Disasters ; System failures (Engineering) ; Electronic books ; local
    Abstract: Praise from readers "A superb book on how to prevent and minimize technological disasters." -P. Roy Vagelos, M.D. Retired Chairman and CEO, Merck & Co., Inc. "If you want to know how serious technological disasters can be, how poorly we tend to handle them, and what can be done to reduce or eliminate the dangers associated with them, this is the book for you." -Russell L. Ackoff, Professor Emeritus of Management Science at The Wharton School, University of Pennsylvania "A thorough compendium of technological disasters, complete with detailed descriptions, analyses of what happened, what went wrong, and why. This lucid book candidly addresses human and societal failings that need to be corrected if future disasters are to be prevented." -Severo Ornstein, Internet Pioneer and Founder of Computer Professionals for Social Responsibility "Minding the Machines provides us with insights that are greatly needed to cope with the major technological disasters that are endemic to our times." -David A. Hounshell, David M. Roderick Professor of Technology and Social Change, Carnegie Mellon University "An excellent, balanced, and highly readable book emphasizing human, social, and organizational elements universally present in technological disasters." -Carver Mead, Gordon and Betty Moore Professor Emeritus of Engineering and Applied Science at the California Institute of Technology, 1999 Lemelson-MIT Prize Winner "This book presents a systematic analysis of the root causes of technological disasters, accompanied by many riveting examples. More importantly, the authors provide the reader with an enlightening discussion on how we can prevent them." -David J. Farber, The Alfred Fitler Moore Professor of Telecommunication Systems in the School of Engineering and Applied Sciences and Professor of Business and Pubic Policy at The Wharton School, University of Pennsylvania Description A complete blueprint for preventing technological disasters in the 21st century. Why do technological disasters occur, and how can we prevent them? How do we design technological systems that enhance human life rather than imperil it? How do we live with the technology we have created? In Minding the Machines , William M. Evan and Mark Manion offer a systematic and provocative guide to preventing technological disasters. They reveal the hidden patterns and commonalities beneath more than 30 of the worst technological tragedies of recent history-and identify powerful preventive measu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 554 p. , ill. ; , 24 cm
    DDC: 004.67/8
    Keywords: Cisco Systems, Inc ; Examinations ; Study guides ; Computer networks ; Examinations ; Study guides ; Internetworking (Telecommunication) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Practice for the CCNP BSCI exam with hands-on, networking lab scenarios〉 Ramp up your routing know-how with more than 40 practical lab scenarios Reinforce your CCNP exam preparation with step-by-step, hands-on router configuration Get up to speed with advanced OSPF and IS-IS configuration, summarization, and redistribution Gain proficiency in an advanced BGP environment with synchronization, communities and peer groups, and static and policy-based routing Perfect your EIGRP configuration and summarization skills Apply proficiency gained throughout the book with RIP to OSPF migration Use VLSMs to extend the use of IP addresses Test routing connectivity using accepted troubleshooting techniques Take your preparation to the next level with a bonus CCIE lab, written by a prominent member of the CCIE team at Cisco Systems Indispensable as both a router configuration guide and a preparation tool for the CCNP BSCI exam, CCNP Practical Studies: Routing will prepare you for the exam and give you the hands-on experience to apply your knowledge on the job. CCNP Practical Studies: Routing provides you with routing and configuration information from IP basics to advanced routing concepts and protocols, such as BGP and IS-IS, which is the newest addition to the BSCI exam. Each chapter focuses on a specific routing technology or protocol with a battery of scenarios and practical exercises that you can either configure using your home, work, or remote-access lab equipment or follow along by reviewing the book's example tasks. The five lab scenarios in each chapter serve to challenge your understanding of the chapter topics and measure your aptitude as a CCNP candidate, while providing concrete examples of the challenges faced in real-world configuration. CCNP Practical Studies: Routing provides you with practical information on all of the important concepts central to the CCNP Routing exam, including basic and advanced BGP and OSPF, EIGRP, route reflectors, IP routing principles, and IS-IS. Begin with basic lab scenarios that cover displaying and analyzing IP routing tables and using show and debug commands. Then graduate to more advanced lab scenarios, such as routing between a classful and a classless network; configuring VLSM; and working with multihomed BGP and connections to ISPs. Lab scenarios at the end of the book take you step-by-step through route optimization and redistribution. This book also contains a bonus CCIE®-level lab, which takes you beyon...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 274 p. , ill. ; , 24 cm
    DDC: 658
    Keywords: Corporate culture ; Case studies ; Corporate culture ; Customer loyalty ; Organizational effectiveness ; Case studies ; Organizational effectiveness ; Quality of work life ; Electronic books ; local
    Abstract: Everyone talks about creating a "customer-centered culture." In CustomerCulture: How FedEx and Other Great Companies Put Their Customer First Every Day , the executive who pioneered FedExÕs legendary customer culture shows exactly how to go beyond talk and make it happen Ñ for real! Drawing on lessons learned at FedEx, Michael Basch identifies key cultural obstacles and leadership failures that dilute customer focus, and demonstrates exactly how to build systems and structures that help good people deliver outstanding service.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: ix, 208 p. , ill. ; , 23 cm. +
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: Software planning and specification development: no fluff-just results! Create better specifications-with less complexity, and less work! Best practices that work with any language or development environment CD-ROM exclusive: Software Blueprinter, a powerful software application for real-world specification development For all software team members: developers, architects, managers, clients, and software quality specialists Planning Smarter demystifies software planning, cuts out to the chase, and shows exactly how to create higher quality, more useful specifications with less complexity and less work! Tyson Gill presents a complete blueprint for improving the quality of your software specifications, reducing errors and omissions, simplifying planning, and establishing a rock-solid foundation for any software development project. Coverage includes: Understanding the planning process-and why it so often fails Getting the planning process "just right" and identifying the best lifecycle approach Optimizing the communication that is critical to successful planning 13 powerful strategies for more effective requirements development Planning in the context of leading software process models: CMM, MSF, UML, and RUP Recognizing and making effective use of planning metadata Planning Smarter is an invaluable resource for every member of the software development project team. It will help executives and clients understand the key factors associated with success-and it will give planners, developers, architects, and team leaders the proven techniques they need to build specifications that work. CD-ROM INCLUDED The accompanying CD-ROM contains Software Blueprinter, a powerful specification development application that embodies the key principles in this book.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 965 p. , ill. ; , 23 cm
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Network Consultants Handbook is a resource to consultants and engineers to assess, audit, analyze, and evaluate any existing or future network environment. Resources include form templates to complete during a network audit, important device commands to aid in obtaining vital information, and additional forms to aid in documentation. Real-world case studies serve as valuable examples, and network diagramming tips help you prepare consistent drawings for in-house documentation. Network audit and evaluation guidelines aid in data gathering and analysis of network environments Real-world case studies serve as valuable and relevant examples Network diagramming tips aid consultants and engineers in preparing consistent drawings for in-house documentation
    Note: Includes bibliographical references (p. [923]-925) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 623 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: C# (Computer program language) ; Computer software ; Development ; System design ; Electronic books ; local
    Abstract: Build industrial-strength .NET applications with C#! Practical, useful information on the .NET Framework, the Common Language Runtime, ADO.NET, ASP.NET, Web Services, security, interoperability, and more Running case study: see how concepts work together when you build .NET applications Experienced C++, Java, and Visual Basic programmers: become effective with .NET! This book gives experienced developers all the practical insight they need to build enterprise applications for Microsoft's .NET platform using C#. Using extensive code examples and a running case study, the authors illuminate the .NET concepts and technologies that offer the greatest power and value. They cover the entire process of constructing a .NET application: creating a monolithic C# console application; enhancing it with a Windows Forms interface; isolating functionality inside components, adding database access and security; and finally, delivering functionality through ASP.NET and Web Services. .NET Framework and Common Language Runtime fundamentals for experienced programmers Key .NET features: interfaces, attributes, collections, threading, remoting, assemblies, and more Hands-on coverage of ADO.NET, ASP.NET, Web Services, and user interface programming Component deployment and versioning Ensuring interoperability with diverse and legacy systems Includes a self-contained C# overview for those new to the language Part of The Integrated .NET series from Object Innovations.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 391 p. , ill. ; , 23 cm. +
    DDC: 0056.2/76
    Keywords: Cross-platform software development ; Internet programming ; Object-oriented programming (Computer science) ; Simple Object Access Protocol (Computer network protocol) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: Leverage the power of SOAP on any platform, with any leading programming language! Integrate your enterprise applications across the Web! The platform-independent guide to SOAP SOAP programming with C++, Perl, C#, Visual Basic, and Java Build an industrial-strength SOAP system from scratch CD-ROM: SOAP for Windows, Linux and Unix, plus extensive source code library! Technical Reviewers: Yves LaFon, Chair of the SOAP W3C Committee John Montgomery, Lead SOAP Developer, Microsoft Kent Sharkey, .NET Frameworks Technical Evangelist, Microsoft SOAP is the universal "glue" that can integrate virtually any distributed system, helping enterprises streamline processes and communications across the Internet as never before. SOAP: Cross Platform Web Services Development Using XML is the practical, hands-on introduction to using SOAP on Windows, Linux, and UNIX platforms, using any of five leading programming languages. Discover how SOAP leverages key Internet standards such as XML and HTTP to solve distributed computing problems that DCOM and CORBA can't! Coverage includes: All the XML you need to get started with SOAP SOAP's basic syntax: HTTP headers, SOAP payloads, error handling, data types, encoding structures, and more Extending SOAP to support heterogeneous and legacy environments SOAP programming with C++, C#, Perl, Visual Basic, and Java Comparing today's leading SOAP servers The last six chapters of this book present a start-to-finish SOAP case study application-from requirements and design through coding. Whether you're constructing Internet applications, integrating existing applications within or between enterprises, or simply evaluating SOAP, this book contains the insights-and practical examples-you're looking for. CD-ROM INCLUDED The accompanying CD-ROM contains complete SOAP implementations for Windows, Linux, and UNIX, plus all source code from the book.
    Note: CD-ROM includes: SOAP implementations for Microsoft Windows, Linux, & UNIX, plus all of the source code from the book. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 849 p. , ill. ; , 25 cm
    Series Statement: IMSC Press multimedia series
    DDC: 621.388
    Keywords: MPEG (Video coding standard) ; Video compression ; Standards ; Electronic books ; local
    Abstract: The most complete, focused guide to MPEG-4-the breakthrough standard for interactive multimedia. The comprehensive, focused, up-to-the-minute guide to MPEG-4 Practical solutions for next-generation multimedia applications In-depth coverage of natural and synthetic audiovisual object coding, description, composition and synchronization Binary and textual scene description Transport and storage of MPEG-4 content MPEG-4 profiles and levels; verification tests MPEG-4 represents a breakthrough in multimedia, delivering not just outstanding compression but also a fully interactive user experience. In The MPEG-4 Book , two leaders of the MPEG-4 standards community offer a comprehensive, targeted guide to the MPEG-4 standard-and its use in cutting-edge applications. Fernando Pereira and Touradj Ebrahimi, together with a unique collection of key MPEG experts, demonstrate how MPEG-4 addresses tomorrow's multimedia applications more successfully than any previous standard. They review every element of the standard to offer you a book that covers: Synthetic and natural audio and video object coding, description and synchronization BIFS-the MPEG-4 language for scene description and interaction The extensible MPEG-4 textual format XMT Transport and delivery of MPEG-4 content MPEG-J: using Java classes within MPEG-4 content A complete overview of MPEG-4 Profiles and Levels Verification tests The authors also walk through the MPEG-4 Systems Reference Software ?offering powerful real-world insights for every product developer, software professional, engineer, and researcher involved with MPEG-4 and state-of-the-art multimedia delivery. Part of the new IMSC Press Series from the Integrated Multimedia System Center at the University of Southern California, a federally funded center specializing in cutting-edge multimedia research.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvi, 348 p. , ill. ; , 24 cm
    DDC: 658.4/04
    Keywords: Project management ; Electronic books ; local
    Abstract: Project management for today's complex, chaotic business environments. XPM: the first radically new approach to project management in decades! Designed from the ground up for today's high-speed, fast-changing projects Refocusing project management focused on people, relationships, and adding value! Innovative new XPM tools: how to make them work in your organization Traditional project management doesn't work any more: it's inward-looking, static, and just can't respond to rapid, constant change. Radical Project Management looks outward to stakeholders, management, and clients-and thoroughly involves them from start to finish. Moreover, it assumes that everything will change-and defines a flexible, ongoing project management process that encompasses both project development and support. In this book, Rob Thomsett, one of the world's leading project management consultants, presents XPM from start to finish-and introduces every tool and technique you need to make it work in your organization. Refocusing project management on what matters most: people, relationships, and adding value 11 radically new rules for project managers to live by Innovative new XPM tools, and how to use them "Open Planning" and stakeholder ownership: the heart of successful project management New XPM metrics and project-tracking techniques Why project managers don't need to know the gory technical details Detailed case studies: how XPM is enabling creative people to do truly great work If you've always suspected there's a more agile, flexible, intelligent way to manage projects, you're right-and XPM is it. Discover for yourself, with the most authoritative, complete, useful XPM guide ever written: Radical Project Management by Rob Thomsett.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 400 p. , ill. ; , 24 cm. +
    DDC: 621.381
    Keywords: LabVIEW ; Electronic circuits ; Computer-aided design ; Electronics ; Electronic books ; local
    Abstract: The hands-on, simulation-based introduction to analog electronics. Analog Electronics with LabVIEW is the first comprehensive introduction to analog electronics that makes full use of computer simulation. Kenneth L. Ashley introduces analog electronics through a series of theory/project sections, in which theoretical presentations correlate directly with circuit measurement and analysis projects. The results of experiments are used to extract device model parameters used in subsequent electronic circuit analysis, providing a significant enhancement in the understanding of modern, computer-based electronic-circuit simulation. Readers will master not only the fundamentals of analog electronics, but also data acquisition and circuit simulation with LabVIEW, basic circuit-solution computation with Mathcad, and circuit simulation with Cadence Schematics or Capture. Coverage includes: Elementary analog circuit analysis, including the resistor voltage divider and MOSFET DC gate voltage, MOSFET drain current-source equivalent, amplifier frequency response, and more Fundamentals of transistors and voltage amplification Characterization of MOS transistors for circuit simulation Common-source amplifiers, MOSFET source-follower buffer stage, differential amplifier stage, and MOSFET current sources Operational amplifiers: resistor negative feedback approaches and capacitor-based applications Development of a Basic CMOS Operational Amplifier LabVIEW tutorial with emphasis on analog electronics, the discrete nature of compute data acquisition, and LabVIEW measurement VIs such as the autoranging DC voltmeter Characterization of the BJT for circuit simulation including linear modeling BJT NPN common-emitter amplifier, including emitter degeneration and current-source PNP load with emitter degeneration For those new to LabVIEW, the book also contains a complete introductory tutorial with emphasis relevant to analog-electronics applications. CD-ROM INCLUDED The accompanying CD-ROM includes a complete copy of LabVIEW 6 Student Edition Software, along with all the LabVIEW, Mathcad, and Schematics (or Capture) files you need to perform the experiments and exercises in this book, plus samples of all project measurement and data files for measurement simulation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxii, 481 p. , ill. ; , 24 cm
    Edition: CCIP ed.
    Series Statement: Certification and training series
    DDC: 004.6/5
    Keywords: Computer network architectures ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Prepare for CCIP certification as you learn to design and deploy MPLS-based VPNs Assists in preparation for the CCIP MPLS elective exam with detailed technology coverage and review questions Offers in-depth analysis of MPLS architecture Helps you learn how MPLS scales to support tens of thousands of virtual private networks (VPNs) Provides extensive case studies that guide you through the design and deployment of real-world MPLS/VPN networks Presents configuration examples and guidelines that assist you in configuring MPLS on Cisco devices Provides design and implementation options that help you build various VPN topologies Multiprotocol Label Switching (MPLS) is an innovative technique for high-performance packet forwarding. The most widely deployed usage of MPLS today is the enabling of VPNs. With the introduction of MPLS-enabled VPNs, network designers can better scale their networks than ever before. MPLS and VPN Architectures, CCIP Edition , is a practical guide to understanding, designing, and deploying MPLS-based VPNs. This book covers MPLS theory and configuration, network design issues, and one major MPLS application: MPLS-based VPNs. The MPLS/VPN architecture and all its mechanisms are explained with configuration examples, suggested design and deployment guidelines, and extensive case studies. This book has been revised from the first edition to include coverage of the CCIP MPLS elective exam. New chapters cover MPLS troubleshooting and MPLS/VPN troubleshooting; self-assessment questions at the end of each chapter help you prepare for the CCIP MPLS elective exam. CCIP candidates choosing to follow the MPLS elective will find this book to be a valuable self-study component in their exam preparation. MPLS and VPN Architectures, CCIP Edition , is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxv, 514 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local
    Abstract: Practice for the new CCNA exam #640-801, as well as #640-607, with hands-on networking lab scenarios Build your own home internetworking lab from the ground up and use it to master essential internetworking skills Select Cisco router components and navigate within Cisco IOS(r) Software Gain access to Cisco routers and switches and configure a terminal server to access each lab router Configure hostnames and set passwords Configure router interfaces such as Ethernet, Token Ring, Loopback, and Serial Configure multiple routing protocols, including RIP, IGRP, and EIGRP Implement route redistribution to share routing information between routing domains Connect remote offices to the main network with ISDN DDR Integrate IPX into the network Control access with standard and extended access lists Troubleshoot common network failures Understanding the concepts covered on the Cisco Certified Network Associate exam is no longer sufficient to succeed on the test. In order to be completely prepared to succeed on the exam, as well as in your daily job as a CCNA engineer, you must be able to apply conceptual knowledge effectively in a production environment. CCNA Practical Studies is the first book of its kind, providing you with a series of detailed lab scenarios that illustrate the application of key internetworking topics. CCNA Practical Studies is a comprehensive reference that helps you gain essential hands-on experience in home-, work-, or remote access-based lab environments. An equally effective supplement to concept-based study guides or stand-alone reference for applying CCNA knowledge pre- or post-test, this book presents numerous examples that cover the entire range of CCNA topics. Starting at the physical layer of the OSI model, you use a layered approach to learn how to build a small network. Each chapter tackles a major subject area such as router configuration, routing protocols, bridging and switching, ISDN, access lists, IPX, and more. Each subject presents a mini-lab, walking you through the lab scenario and explaining in detail the commands used, why the authors chose the specific commands, and the resulting configurations. Comprehensive configuration and troubleshooting labs are added to the end of the book, allowing you to understand how routing technologies interact. This step-by-step lab scenario approach is designed to teach you how to apply the knowledge acquired in the process of becoming a CCNA. Whether you are preparing for the C...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 428 p. , ill. ; , 24 cm
    Series Statement: Cisco Press networking technologies series
    Keywords: Computer networks ; Internet service providers ; Internet ; Electronic books ; local
    Abstract: A comprehensive guide to the best common practices for Internet service providers Learn the best common practices for configuring routers on the Internet from experts who helped build the Internet Gain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS Software Understand the Cisco IOS tools essential to building and maintaining reliable networks Increase your knowledge of network security Learn how to prevent problems and improve performance through detailed configuration examples and diagrams Cisco IOS Software documentation is extensive and detailed and is often too hard for many Internet service providers (ISPs) who simply want to switch on and get going. Cisco ISP Essentials highlights many of the key Cisco IOS features in everyday use in the major ISP backbones of the world to help new network engineers gain understanding of the power of Cisco IOS Software and the richness of features available specifically for them. Cisco ISP Essentials also provides a detailed technical reference for the expert ISP engineer, with descriptions of the various knobs and special features that have been specifically designed for ISPs. The configuration examples and diagrams describe many scenarios, ranging from good operational practices to network security. Finally a whole appendix is dedicated to using the best principles to cover the configuration detail of each router in a small ISP Point of Presence.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 294 p. , ill. ; , 24 cm
    DDC: 658.8/12
    Keywords: Customer relations ; Data processing ; Customer relations ; Marketing ; Electronic books ; local
    Abstract: Barton Goldenberg shares his unparalleled practical expertise on everything from security to internationalization, helping you avoid disastrous missteps-and transform the potential of CRM into long-lasting competitive advantage. Identify your goals and customize a CRM strategy for your enterprise Understand the 8 key issues that will make or break your CRM initiative Learn about the top 30 CRM software offerings Find out what 12 crucial questions you should ask before selecting a software vendor Preview tomorrow's advances in CRM-to better position yourself and take advantage of a ever-changing environment. "This is the only book on CRM that has made it to my credenza." -Stan Davis, Author of Blur and Lessons from the Future "CRM Automation is a blueprint for a successful CRM implementation." -Ken Blanchard, Coauthor, The One Minute Manager "Barton Goldenberg's bottom-line approach to CRM makes this book a necessity to any company concerned with ROI." -Beth Struckell, VP general manager of food service and vendor sales, a division of PepsiCo "CRM Automation gets to the heart of what a successful CRM implementation is all about-People, Process, and Technology. You can save hundreds of hours and thousands of dollars by reading this book before launching a CRM initiative." -Bob McLaughlin, former vice-president, McGraw-Hill "Goldenberg's 18 years of experience and 300 deployments are wrapped up between the two covers of CRM Automation." -Wolfgang Martin, independent analyst and research fellow, METAGroup "Barton Goldenberg understands the CRM marketplace and the needs of businesses seeking a competitive edge. CRM Automation is a valuable resource for companies pursuing truly customer-centric business strategies." -Carol Burch, senior vice president of global business development for CRM, SAP AG "Barton Goldenberg proves once again that he is ahead of the curve in understanding the direction and future of customer relationship management." -Patrick Bultema, CEO and president, FrontRange Solutions, Inc.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 632 p. , ill. ; , 24 cm. +
    Keywords: IBM Database 2 ; DB2 (Computer file) ; Examinations ; Study guides ; Database management ; Certification ; Study guides ; Electronic books ; local
    Abstract: IBM's definitive, authoritative DB2 for OS/390 and z/OS reference and self-study guide! The only comprehensive IBM(r) DB2 UDB V7.1 for OS/390 certification prep guide Covers administration, security, SQL, application development, tuning, and much more Contains dozens of expert DB2 tips, techniques and guidelines CD-ROM contains complete DB2 for OS/390 sample exam Written by IBM Gold Consultants for DB2 and S/390 The total resource for every professional running DB2 UDB V7.1 in OS/390 and z/OS environments Database administration, security, monitoring, tuning, SQL, and application development Sample test questions help you prepare for IBM's new DB2 UDB V7.1 for OS/390 exams The CD-ROM included with this book contains a complete IBM DB2 for OS/390 certification sample exam. IBM's DB2 Universal Database Version 7.1 for OS/390 delivers unparalleled performance, scalability, and reliability in today's enterprise e-business environments! Now, there's a complete, authoritative guide to deploying, managing, and developing applications with DB2 UDB V7.1 in both OS/390 and z/OS environments-and preparing for IBM's updated DB2 UDB V7.1 for OS/390 certification exam! Direct from IBM, this comprehensive day-to-day reference for running DB2 UDB in OS/390 and z/OS environments is also the only book with the in-depth knowledge professionals need in order to pass IBM's latest DB2 for OS/390DBA certification exam. Full of expert tips, techniques, and guidelines, it covers virtually every aspect of working with DB2 UDB in enterprise server: administration, connectivity, development, and much more. IBM Gold Consultants Richard Yevich and Susan Lawson present start-to-finish coverage of DB2's latest and most powerful enhancements, tools, and utilities, showing how to make the most of DB2 running on both OS/390 and next-generation z/OS platforms. Coverage includes: An overview of the DB2 UDB product family DB2 in OS/390 and z/OS environments: address spaces, attachments, interfaces, commands, and utilities Comprehensive security coverage, including access controls and auditing techniques SQL in depth: DB2 data structures, database objects, basic database design, and advanced coding DB2 UDB administration: maintaining data, backup/recovery, and more Performance monitoring and optimization: access paths, indexes, parallelism, buffer pool tuning, and subsystem tuning Data sharing: architecture and implementation in a Parallel Sysplex environment Detailed application d...
    Note: Includes bibliographical references (p. 605-618) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Language: English
    Pages: xii, 376 p. ; , 24 cm
    DDC: 658.4/07124
    Keywords: Employees ; Training of ; Management ; Executive ability ; Executives ; Training of ; Leadership ; Promotions ; Electronic books ; local
    Abstract: Today's enterprises face a profound leadership crisis - and the speed of business has far outstripped conventional executive development systems. In Grow Your Own Leaders , three world-renowned experts introduce an entirely new approach for identifying tomorrow's leaders within your own organization, accelerating their development, and deploying them immediately, to address new challenges wherever they emerge.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 495 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Open Shortest Path First (Computer network protocol) ; Routers (Computer networks) ; Electronic books ; local
    Abstract: The comprehensive, hands-on guide to all Cisco IOS Software OSPF commands Stands as the complete OSPF command reference -- invaluable for network designers, engineers, and architects Provides configuration, troubleshooting, and verification scenarios for every possible OSPF command supported by Cisco IOS Software that can be implemented on a minimum number of routers Groups OSPF commands by area of implementation -- area configuration, redistribution, neighbor relationships, and route filtering, just to name a few Provides clear and concise commentary on the initial release, purpose, syntax, and usage of each OSPF command Offers excellent CCIE certification preparation from one of the CCIE Program Managers Constructed as a portable field guide with easily navigable content so you can quickly find the information you need when you need it As one of the most predominantly deployed Interior Gateway Protocols, Open Shortest Path First (OSPF) demands a wealth of knowledge on the part of internetworking professionals working with it on a daily basis. Unfortunately, publicly available documentation on the OSPF command set varies from being too thin on coverage to being too demanding on the required equipment needed to test what the documentation covers. Cisco OSPF Command and Configuration Handbook is a clear, concise, and complete source of documentation for all Cisco IOS Software OSPF commands. The way you use this book will depend on your objectives. If you are preparing for the CCIE written and lab exams, then this book can be used as a laboratory guide to learn the purpose and proper use of every OSPF command. If you are a network designer, then this book can be used as a ready reference for any OSPF command. Cisco OSPF Command and Configuration Handbook provides example scenarios that demonstrate the proper use of every OSPF command that can be implemented on a minimum number of routers. This will enable you to learn each command without requiring an extensive and expensive lab configuration. The scenarios clearly present the purpose and use of each command. Some of the examples lead you into common non-working situations in order to reinforce the understanding of the operation of the particular OSPF command. Author Bill Parkhurst provides concise snapshots of every command with regard to command purpose, usage, syntax explanation, initial introduction in Cisco IOS Software, and cross references to related commands also covered in the book. Thi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 500 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 384
    Keywords: Telecommunication ; Electronic books ; local
    Abstract: The completely updated nontechnical telecom guide for business people and other professionals. Advanced cellular networks Optical technologies Globalization Convergence The Internet Cable modems and DSL In the past two years, the telecommunications industry has undergone major changes. The Essential Guide to Telecommunications, Third Edition , is your complete guide to the new realities of telecommunications. This new edition reflects all of today's most critical issues, trends and technologies. In addition to providing crucial insights into the fast-changing competitive landscape, Annabel Dodd provides important information about the structure of, and key players in, the industry. The Essential Guide to Telecommunications, Third Edition will give you an easy-to-comprehend, broad understanding of this fast-changing industry. Coverage includes: Optical technologies expanded Advanced cellular networks: 2.5G and 3G standards Speech recognition, call centers and PBXs Comprehensive coverage of key players and the state of telecommunications in Europe, Asia, and Latin America Updated and expanded coverage of the Internet and convergence What readers of the previous editions had to say: "With jargon-free definitions, clear schematic drawings and its steady narrative drive,The Essential Guide to Telecommunications is a reassuring testament to the human ability to comprehend and communicate at some fundamental level even the most bewildering technology." -David Warsh, The Boston Globe "This book cuts through all the jargon and mysterious acronyms to give easily understood explanations of telecommunications, from the basics to the latest technology. I refer to it on a regular basis and constantly recommend it to others." -Michael Rieke, Editor of the Dow Jones Bandwidth Intelligence Alert "It is fair to say that Annabel Dodd has done more to demystify the industry for more people than anyone else in Massachusetts. For those who don't know bandwidth from a band saw or optical networks from an ophthalmologist, Dodd's book offers valuable insights into the products and services that fall under the telecommunications umbrella." -Katherine Raphaelson, Director, Massachusetts Telecommunications Council "This book is written for those who have little or no technical background. It's an easy-to-read overview of much of the technology available now and great if you have no patience for technical terminology." -George Runkle, The Motley Fool, Inc.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: 2 v. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Computer network architectures ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks With MPLS and VPN Architectures, Volume II, you'll learn: How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers The new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT) How VRFs can be extended into a customer site to provide separation inside the customer network The latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backbone How to carry customer multicast traffic inside a VPN The latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier MPLS VPN services Advanced troubleshooting techniques including router outputs to ensure high availability MPLS and VPN Architectures, Volume II , builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN. MPLS and VPN Architectures, Volume II , begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting. MPLS and VPN Architectures, Volume II , also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index. - Vol. 2 also by Jeff Apcar
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xli, 1234 p. , ill. ; , 25 cm. +
    DDC: 006.6/6
    Keywords: DirectDraw ; Microsoft Win32 ; Microsoft Windows (Computer file) ; Computer graphics ; Electronic books ; local
    Abstract: The world's most complete guide to Windows graphics programming! Win32 GDI and DirectDraw: Accurate, under the hood, and in depth Beyond the API: Internals, restrictions, performance, and real-life problems Complete: Pixel, lines, curves, filled area, bitmap, image processing, fonts, text, metafile, printing, and more Up to date: Windows 2000 and Windows 98 graphics enhancements CD-ROM: Exclusive and professional quality generic C++ classes, reusable functions, demonstration programs, kernel mode drivers, GDI exploration tools, and more! Hewlett-Packard Professional Books To deliver high-performance Windows applications, you need an in-depth understanding of the Win32 GDI and DirectDraw-but until now, it's been virtually impossible to discover what's going on "behind" Microsoft's API calls. This book rips away the veil, giving experienced Windows programmers all the information and techniques they need to maximize performance, efficiency, and reliability! You'll discover how to make the most of Microsoft's Windows graphics APIs-including the important new graphics capabilities built into Windows 2000. Coverage includes: Uncovering the Windows system architecture and graphics system internal data structure Building graphics API "spies" that show what's going on "under the hood" Detecting GDI resource leaks and other powerful troubleshooting techniques Expert techniques for working with the Win32 GDI and DirectDraw APIs Device context, coordinate space and transformation, pixels, lines, curves, and area fills Bitmaps, image processing, fonts, text, enhanced metafiles, printing, and more Windows Graphics Programming delivers extensive code, practical techniques, and unprecedented insight-plus an exclusive CD-ROM containing original system-level tools, kernel mode drivers, sample code, and generic C++ classes for Windows graphics programming without MFC. If you want to build Windows graphics applications that deliver breakthrough performance and reliability, you'll find this book indispensable.
    Note: Includes bibliographical references (p. 1198) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvi, 303 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: Bluetooth technology ; Computer network protocols ; Telecommunication ; Equipment and supplies ; Electronic books ; local
    Abstract: The authoritative guide to Bluetooth! From two contributors to the Bluetooth specification! For users, the new Bluetooth wireless standard will cut through the complexity of wireless communications, enabling devices to communicate seamlessly. Bluetooth Revealed offers the first insider's view of the Bluetooth standards: crucial information and insight professionals need to start implementing Bluetooth solutions-now. Written by leaders of the Bluetooth community, it presents the entire specification in unprecedented depth: its goals, scope, structure, interrelationships, and applications. Coverage includes: Design challenges: 2.4 GHz spectrum characteristics, power consumption, global standardization, and other key issues Usage models: cordless computing, advanced headsets, file transfer/sync, dial-up networking, conferencing, hidden computing, and more The entire Bluetooth protocol stack: radio, baseband, and software layers; hardware and interfaces; and Link Manager and Logical Link Control and Adaptation Protocol (L2CAP) Bluetooth profiles: generic, telephony, networking, serial, and object exchange Bluetooth Revealed previews Bluetooth's future, including next-generation vertical and horizontal applications, and introduces today's resources for Bluetooth development, including silicon and developer's kits, as well as legacy product enablers. If you're intending to build, deploy, or market Bluetooth solutions, start right here.
    Note: Includes bibliographical references (p. 295-296) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 356 p. , ill. ; , 24 cm
    Series Statement: Essential guide series
    DDC: 004.5
    Keywords: Computer storage devices ; Electronic books ; local
    Abstract: The complete decision-maker's guide to choosing-and using-the right data storage technologies Personal and small business storage: hard drives, DVD, CD, Zip, Jaz, and more Enterprise storage: SAN, NAS, Fibre Channel, RAID, and beyond New Web-based storage alternatives Start-to-finish backup and disaster recovery tips Choosing reliable, cost-effective data storage solutions-and making the most of them! Whether you're an IT professional, enterprise manager, small business owner, or home PC user, you've got more data than ever-and choosing reliable, cost-effective storage has never been more important. Now, a leading data storage expert explains all your options, and shows you exactly how to make the most of them. Dr. Andrei Khurshudov reviews the capabilities, advantages, and underlying technologies associated with every current storage alternative, offering expert tips for buying, interfacing, scalability, recovery, and much more. Data storage interfaces: UDMA, USB, IEEE 1394 "FireWire," SCSI, FC-AL, and Serial Storage Architecture In-depth coverage of magnetic media: hard disks, tapes, and removables Up-to-date comparisons of removable storage: Superdisk, HiFD, Zip, Jaz, Orb, external hard disk drives, and more Tape alternatives: DAT, Travan, Mammoth, AIT, DLT, LTO, and beyond Optical storage: CD-RW, CD-R, and today's competing DVD formats Other storage solutions: Magneto-optical, Flash memory, and solid-state disk drives Enterprise storage strategies: storage area networks (SAN), network attached storage (NAS), RAID, and more Storage for digital cameras, PDAs, MP3 players, Personal Video Recorders, and other next-generation devices Storage on the Web: alternatives, limitations, and case studies Preventing data loss-and what to do if the disaster has already happened If you're planning for business growth and disaster recovery, or simply want the best storage "bang for the buck," The Essential Guide to Computer Data Storage delivers objective guidance-and realistic solutions.
    Note: Includes bibliographical references (p. 349) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 234 p. , ill. ; , 25 cm
    DDC: 004/.068
    Keywords: Electronic data processing ; Management ; Information technology ; Electronic books ; local
    Abstract: The complete "best practices" guide to IT problem resolution! No matter how professional your IT organization, if you can't resolve problems quickly and effectively, you'll lose your stakeholders' confidence-and fail. Nowadays, help desk s aren't enough: companies want true service centers capable of delivering complex, strategic solutions. IT Problem Management is the first single source for building world-class problem management processes. Drawing upon his extensive consulting e xperience, Gary Walker presents specific improvements you can make to achieve breakthrough results in any help desk or service center-in-house or out-sourced. Coverage includes: Problem identification, customer validation, problem lo gging, service delivery, knowledge capture and sharing, and management oversight The Immediate Response Model: accounting for problem variability, complexity, and volume Detailed metrics for measuring your responsiveness Bett er ways to create and use service level agreements State-of-the-art tools for customer interaction, service delivery, and proactive monitoring New Internet and knowledge base systems: empowering users to solve their own problems The human side: staffing, retention, and motivation IT Problem Management isn't just theory: it delivers real-world case studies, detailed benchmarks, and practical solutions for turning your help desk into a high-performance I T service center, starting today.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 700 p. , ill. ; , 24 cm. +
    Edition: 3rd ed.
    Keywords: Microsoft Win32 ; Microsoft Windows (Computer file) ; Microsoft Windows NT ; Application software ; Development ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Win32 best-seller, fully updated for Windows 2000 and Windows 98! Master every key Win32 system service Processes, threads, synchronization, and much more Includes extensive coverage of network programming The #1 guide to Win32 system services, totally updated! Includes hundreds of proven code examples - Comprehensive coverage of RPCs and other network programming topics Processes, threads, and synchronization - in depth Expert techniques for effective large-scale development Leveraging Windows 2000's security capabilities Get up-to-speed on the Win32 API, fast! The #1 best-seller - now completely updated! For years, Marshall Brain's Win32 System Services has been the world's #1 resource for Windows developers seeking to master Win32 services in real-world application development. Now, this worldwide bestseller has been fully updated to reflect the latest Win32 enhancements in Windows 2000 and Windows 98! Each self-contained chapter covers a different API service: Win32 files, directory and drive structure, processes and threads, synchronization mechanisms, network communications, Remote Procedure Calls, security, consoles, communications ports, accessing system information, using DLLs to modularize programs, and much more. You'll find practical guidance on when to use each service, today's best techniques for integrating services into complex, enterprise-class applications, and extensive proven code examples. Whether you're an experienced Windows developer seeking to deepen your system programming skills, or you're porting applications from other environments, Win32 System Services - The Heart of Windows 98 and Windows 2000, Third Edition will be your most valuable resource.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 499 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Abstract: Must-have security strategies using Cisco's complete solution to network security The only book to cover interoperability among the Cisco Secure product family to provide the holistic approach to Internet security The first book to provide Cisco proactive solutions to common Internet threats A source of industry-ready pre-built configurations for the Cisco Secure product range Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a detailed explanation with examples of the preferred configurations required for securing Internet connections. The Cisco Secure PIX Firewall is covered in depth from an architectural point of view, and a reference of the PIX commands explains their use in the real world. Although Cisco Secure Internet Security Solutions is primarily concerned with Internet security, the information inside is also applicable to many general network security scenarios
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 372 p. , ill. ; , 24 cm
    Keywords: BGP (Computer network protocol) ; Routers (Computer networks) ; Software configuration management ; Electronic books ; local
    Abstract: The comprehensive, hands-on guide to all Cisco IOS(r) Software BGP-4 commands The complete BGP-4 command reference invaluable for network designers, engineers, and architects Provides configuration, troubleshooting, and verification scenarios for every possible BGP-4 command supported by Cisco IOS Software that can be implemented on a minimum number of routers Groups BGP-4 commands by area of implementation route aggregation, auto-summary, route filtering, and route advertisement, just to name a few Provides clear and concise commentary on the initial release, purpose, syntax, and usage of each BGP-4 command Offers excellent CCIE certification preparation from one of the CCIE Program Managers Includes supplementary information on regular expressions, route map logic, and RFC 1771, A Border Gateway Protocol 4 (BGP-4) Cisco BGP-4 Command and Configuration Handbook is an exhaustive practical reference to the commands contained within BGP-4. For each command/subcommand, author Bill Parkhurst explains the intended use or function and how to properly configure it. Then he presents scenarios to demonstrate every facet of the command and its use, along with appropriate show and debug commands. Through the discussion of functionality and the scenario-based configuration examples, Cisco BGP-4 Command and Configuration Handbook will help you gain a thorough understanding of the practical side of BGP-4.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 339 p. , ill. ; , 24 cm
    Series Statement: Essential guide series
    DDC: 004.6
    Keywords: Computer software ; Home computer networks ; Electronic books ; local
    Abstract: Covers all the latest home networking technologies Phoneline, powerline, and wireless networks Shared broadband Internet technologies Residential gateways Middleware and APIs: HAVi(r), Jini, UPnP, and more For consumers, investors, executives, marketing/PR professionals, and developers Your complete guide to the home networking revolution! Home networking is a market that's about to explode-and whether you're a consumer, investor, executive, marketing/PR professional, or developer, you need to understand it. Only one book covers all you need to know: The Essential Guide to Home Networking Technologies. This book starts where other home networking guides leave off, with thorough, expert coverage of every issue and technology driving home networking. Coverage includes: Home networking benefits: convenience, time savings, entertainment, security, and more How home networks work-and how they're different from business networks Who's competing in this market-in the U.S. and worldwide Phoneline networks, including Home Phoneline Networking Alliance systems Powerline networks: X10, CEBus, Enikia, and Inari Wireless networks: RF and infrared Home control and automation systems, including LonWorks(r) Connecting to phone and cable providers: cable modems, digital set-top boxes, personal video recorders, game consoles, home servers, and more Connecting to the Internet: DSL, HFC, wireless cable, satellite, B-ISDN, and powerline wide area networks Home networking middleware and APIs: HAVi, Jini, UPnP, HomeAPI, OSGi, and HomePnP As millions of households buy additional computers, electronics giants introduce networkable home entertainment devices, and Internet connections show up throughout the house, home networks bring it all together-delivering compelling new consumer benefits along the way. Whether you're building a network at home-or a home network business strategy-this is your complete guide to the home networking revolution.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 469 p. , ill. ; , 24 cm
    Keywords: Computer network protocols ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: An in-depth guide to understanding advanced MPLS implementation, including packet-based VPNs, ATM-based VPNs, traffic engineering, and quality of service Advanced MPLS Design and Implementation enables you to: Understand MPLS through a detailed analysis of MPLS architecture and operation Design and implement packet-based MPLS Virtual Private Networks (VPNs) using label switching routers (LSRs) Design and implement ATM-based MPLS VPNs using WAN-switched ATM LSRs Implement MPLS traffic engineering on your core network and optimize traffic flows dynamically Implement MPLS QoS and provide hard service guarantees with multiple classes of service Acquire practical design and implementation knowledge of real-world MPLS VPNs, TE, and QoS through case studies and configuration examples Multiprotocol Label Switching (MPLS) is a highly scalable, high-performance forwarding technology that has multiple applications in the service provider and enterprise environment. This book is intended for internetwork engineers and administrators who are responsible for designing, implementing, and supporting service provider or enterprise MPLS backbone networks. It contains a broad range of technical details on MPLS and its associated protocols, packet-based MPLS, ATM-based MPLS, MPLS traffic engineering, MPLS QoS, MPLS design, and advanced MPLS architectures. This book contains MPLS theory, design, configuration, and various case studies. Use this book as a reference and guide for designing, implementing, and supporting an MPLS network. Even if you're not using Cisco(r) equipment, this book can increase your awareness and understanding of MPLS technology as well as provide you with detailed design concepts and rules for building scalable MPLS networks. Advanced MPLS Design and Implementation is your guide to understanding, designing, and implementing MPLS VPNs, WAN-switched MPLS VPNs, MPLS traffic engineering, and MPLS QoS.
    Note: "An in-depth guide to understanding advanced MPLS implementation, including packet-based VPNs, ATM-based VPNs, traffic engineering, and quality of service"--Cover. - "First printing September 2001"--T.p. verso. - Includes bibliographical references [449]-451 and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 344 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Cisco IOS ; Internetworking (Telecommunication) ; Routers (Computer networks) ; Software configuration management ; Electronic books ; local
    Abstract: A Practical Introduction to Cisco IOS 12.0 Configuration Written by senior managers of Digital Island, the e-Business solutions company that counts AOL, MSNBC, CNBC, Mastercard International, the LA Times, and National Semiconductor among its customers Extensive case study of an entire internetwork complete with Cisco IOS configurations Practical examples explaining the basics of Cisco router configuration get readers up-to-speed quicklyCisco IOS output is detailed with numerous examples and clear explanations Cisco Router Configuration, Second Edition helps novice Cisco users with the basic administration of their internetworking devices. Using straightforward case studies and practical examples, this book teaches IOS software fundamentals for configuring, operating, and maintaining internetworking devices. Cisco Router Configuration, Second Edition provides an overview of Cisco IOS software. It describes basic information on Cisco devices and device interfaces (Ethernet, Token Ring, FDDI, Frame Relay, ATM). The basics of IP, IPX, and AppleTalk are explained, and the book shows how to use Cisco IOS software to configure addresses, routes, and routing protocols within these three protocols. Additionally, the book provides an elaborate example of an entire network setup with complete Cisco IOS configurations. All information in this second edition contains IOS 12.0 syntax.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 487 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: JavaServer pages ; Web site development ; Computer programs ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: Design and implement flexible, extensible, and maintainable applications with servlets and JSP technology Master powerful authentication and internationalization techniques Learn how to integrate industry-standard XML and XSLT with JSP technology Use JSP technology-based templates to develop robust applications from modular components Advanced JavaServer Pages delivers: Web application design techniques based on JSP and servlets technology Proven strategies for achieving enterprise-class robustness and scalability with JSP technology Expert guidance on implementing JSP technology-based applications with reusable components To fully exploit the power of JavaServer Pages technology in Web application development, based on J2EE technology, you need to master the sophisticated server-side techniques that David Geary presents in Advanced JavaServer Pages . Geary tackles JavaServer Pages technology with the same exhaustive, authoritative approach that made his Graphic Java books into worldwide best sellers. He presents in-depth coverage of advanced topics including: Implementing custom JSP technology tags Designing scalable and extensible Web applications Using authentication to build secure JSP technology-based applications Internationalizing JSP technology-based applications for global environments Advanced JavaServer Pages features detailed chapters on internationalization, authentication, JSP technology templates, design, and XML. It concludes with a comprehensive case study that ties together key topics developed in the book and demonstrates how to integrate advanced techniques based on JSP technology. This book is a must-have resource for every developer of Java technology creating server-side applications with JSP technology and servlets.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 508 p. , ill. ; , 23 cm. +
    Series Statement: Prentice Hall PTR Microsoft technologies series
    DDC: 005.4/469
    Keywords: Microsoft Windows (Computer file) ; Application software ; Development ; Electronic books ; local
    Abstract: Windows CE 3.0 programming for Pocket PC, handheld PC, and embedded devices Enterprise computing including COM, DCOM, database access using ADOCE, and Microsoft Message Queue Communications, including Internet Web access with HTTP, TCP/IP, sockets, serial communications, and desktop synchronization with ActiveSync 3.0 Build and run applications in Visual C++ using Microsoft Foundation Classes CD-ROM with eMbedded Visual C++ 3.0 and Pocket PC SDK Beyond the user interface to hard-core programming Full-scale networking and enterprise computing Global communications from Pocket PCs All the new features of Windows CE 3.0 Advanced techniques for serious Windows CE programmers. Get beyond user interface programming and discover the behind-the-scenes operating system facilities that will let you make the most of the new features in Windows CE 3.0. This hot technology lets you control Pocket PCs, handheld PCs, and the embedded devices in hundreds of commercial products. Learn the lean and mean techniques that keep your programs humming on portable devices with limited memory, and the key data storage methods that make them possible. Master the communications protocols that keep Windows CE devices in contact with desktop computers and the Internet. In addition: Build and run applications in Visual C++ 6.0 and eMbedded Visual C++ 3.0 Use the Windows CE API and Microsoft Foundation Classes Communicate via HTTP, TCP/IP, sockets, remote access, and telephony Access standard Windows CE databases and Microsoft SQL Server for Windows CE Interface between desktop systems and Windows CE devices This book is for serious developers with real programming experience. Besides familiarity with Windows CE devices and general Windows API programming, a basic knowledge of C and C++ is needed to understand the code samples. About the Software The accompanying CD-ROM contains all the code examples from the book, as well as a fully searchable index of all the book's examples, programs, and tutorials. The CD-ROM also contains a complete working copy of eMbedded Visual C++ 3.0 and Pocket PC SDK.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 459 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Over the last few years, Java 2 Platform, Enterprise Edition (J2EE) technology has emerged and matured as a standard platform for building enterprise applications. While the platform has matured into a solid offering for developing and deploying enterprise applications, it does offer its challenges. As developers, often we confuse learning the technology with learning to design with the technology. In this book, senior architects from the Sun Java Center, Sun's Java consulting organization share with the reader their cumulative design experience with and expertise on J2EE technology. The primary focus of the book is on patterns, best practices, design strategies, and proven solutions using the key J2EE technologies including JavaServer Pages (JSP), Servlets, Enterprise Java Beans (EJB), and Java Message Service (J.M.S) API. Other ancillary technologies like JDBC and JNDI are also discussed as relevant to their usage in these patterns. The J2EE Patterns catalog with 16 patterns and numerous strategies is presented to document and promote best practices for these technologies. In addition to the patterns and strategies, the book offers the following: Presents various design strategies for the presentation tier and business tier design. Identifies bad practices in presentation, business, and integration tiers, and offers directions to remedy them by using certain patterns, strategies, and refactorings. Refactorings for various tiers and mechanics to move away from a bad implementation to a better solution. Sample code and examples for patterns, strategies, and refactorings. Core J2EE Patterns delivers: Proven solutions for enterprise applications J2EE Patterns Catalog with patterns for JSP technology, EJB technology, and J.M.S. Identifies bad practices and recommends solutions Refactorings to improve existing designs using patterns, strategies, and best practices UML Diagrams illustrate structure and behavior of each pattern
    Note: Includes bibliographical references (p. 439-442) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xii, 449 p. , ill. ; , 25 cm
    DDC: 658.8/4
    Keywords: Electronic commerce ; Electronic books ; local
    Abstract: Foreword by Jim Gray Microsoft Research and 1998 ACM Turing Award Recipient The Complete Guide to Techniques and Models to Evaluate and Plan E-Business Sites! Avoid losing customers due to site crashes Performance modeling and capacity planning for e-business infrastructure Build and analyze customer behavior models Plan your e-business site to avoid frequent upgrades and migrations "E-business is transforming every element of business in many unknown ways. This book will give its readers a headstart in understanding the quantitative underpinnings of the new environment." - Howard Frank, Dean, Robert H. Smith School of Business University of Maryland at College Park Solid analysis of performance modeling and capacity planning for your e-business site! S low e-commerce sites cost their owners billions and embarrass and degrade their owners' brands. Don't let it happen to you! Scaling for E-Business presents analysis techniques for quantifying and projecting every element of your e-business site's performance-and planning for the capacity you need, no matter what! Discover how to... Characterize e-commerce workloads more accurately Analyze the performance of authentication and payment services Model contention for software servers, and ensure scalability Model and plan for communications infrastructure Forecast and cope with peak demand Project the impact of agent technologies and non-PC devices You can't turn to your vendors for these state-of-the-art techniques. But you can turn to Scaling for E-Business-and if you plan to succeed, you'd better!
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 222 p. , ill. ; , 24 cm
    Keywords: Cisco IOS ; Computer network architectures ; Software architecture ; Systems software ; Electronic books ; local
    Abstract: An essential guide to understanding the Cisco IOS architecture In-depth coverage of Cisco's IOS Software architecture provides crucial information to: Prevent network problems and optimize performance through more efficient design and configuration Isolate and resolve network problems more quickly and easily Apply the appropriate packet switching method, such as process switching, fast switching, optimum switching, or Cisco Express Forwarding (CEF) Understand the hardware architecture, packet buffering, and packet switching processes for shared memory routers (Cisco 1600, 2500, 3600, 4000, 4500, and 4700 series) Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco 7200 series routers Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco 7500 series routers Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco GSR 12000 series routers Further your knowledge of how IOS Software implements Quality of Service (QoS) Inside Cisco IOS Software Architecture offers crucial and hard-to-find information on Cisco's Internetwork Operating System (IOS) Software. IOS Software provides the means by which networking professionals configure and manage Cisco networking devices. Beyond understanding the Cisco IOS command set, comprehending what happens inside Cisco routers will help you as a network designer or engineer to perform your job more effectively. By understanding the internal operations of IOS Software, you will be able to take architectural considerations into account when designing networks and isolate problems more easily when troubleshooting networks. Inside Cisco IOS Software Architecture provides essential information on the internal aspects of IOS Software at this level, and it is an invaluable resource for better understanding the intricacies of IOS Software and how it affects your network. Inide Cisco IOS Software Architecture begins with an overview of operating system concepts and the IOS Software infrastructure, including processes, memory management, CPU scheduling, packet buffers, and device drivers, as well as a discussion of packet switching architecture with detailed coverage of the various platform-independent switching methods, including process switching, fast switching, optimum switching, and Cisco Express Forwarding (CEF). The book then delves into the intricate details of the design and ope...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 480 p. , ill. ; , 25 cm
    DDC: 658.8/12
    Keywords: Customer relations ; Electronic books ; local
    Abstract: Leverage people, processes, activities, information, and technologies to... Acquire new, more profitable customers Build long-term customer loyalty Serve every customer as an individual Drive powerful marketing opportunities Increase profits and shareholder value! The start-to-finish guide to breakthrough customer relationship management! In Accelerating Customer Relationships , a world-renowned CRM expert shows you how to build knowledge "infostructures" that deliver breakthrough profitability and customer loyalty. Ronald S. Swift walks you step by step through integrating every customer touchpoint: retail, Web, call center, and beyond. Swift covers every aspect of enterprise-wide relationship management-strategies, processes, partnerships, platforms, software, methodologies, and more. Through proven methods, practical examples, and case studies, you'll discover how to create the customer-centric environment to: Identify what your most profitable customers share in common-then find more customers just like them! Shorten your sales cycle by anticipating your customer's requirements and expectations more accurately Manage your channel partnerships and other relationships more profitably Maintain customer privacy and confidentiality while gaining the benefits of profiling Calculate the economic value of customer relationship management Discover the key factors that make or break CRM for your organization The high-value, loyal customer is the #1 key focal point for growth organizations worldwide! Today's relationship technologies give you an unprecedented opportunity to strengthen and deepen the customer relationships you care about most. Ronald S. Swift can show you how to do it-before your competitors do! " Ron Swift's book is designed to help you tie the loyalty knot with your customers. It has the tools, the framework, and the know-how to deliver customers and profits ." - Martha Rogers, Ph.D., Peppers and Rogers Group and co-author of The One to One Future and One to One B2B "When your customers know you know them, your business is bound for success. Ron Swift's book provides the tools, the framework, and the know-how to build rock solid CRM and DW strategies to deliver customers and profits. Ron continues his excellence with profound and practical knowledge and advice." - Bill Inmon, Father of the Data Warehousing concept, and author of 30 books on Data Warehousing, Decision Support, and Database Technology
    Note: Includes bibliographical references (p. [432]-456) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 930 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: Java foundation classes ; Swing (Computer file) ; Graphical user interfaces (Computer systems) ; Java (Computer program language) ; Electronic books ; local
    Abstract: 8329B-3 The experienced developer's guide to the Swing classes! Core Swing helps you deliver the sophisticated Java GUI applications your users demand-with Java Swing techniques that start where other books leave off! Building on his bestseller Core Java Foundation Classes, Kim Topley takes on the toughest Swing issues raised by programmers throughout the Java community and addresses crucial topics first-generation Swing books completely missed. With Core Swing , you'll discover how to exploit the Swing tree and table controls to the fullest, customize and create your own text fields with features that sophisticated users expect, build your own editors and file viewers, and much more. There is complete and in-depth coverage of Swing's HTML support, a topic barely addressed in other Swing books. You'll also find detailed coverage of undo/redo and drag-and-drop, with lengthy, fully documented code examples, in the book and on the accompanying CD-ROM. Every Core Series book: DEMONSTRATES how to write commercial quality code FEATURES dozens of nontrivial programs and examples-no toy code! FOCUSES on the features and functions most important to real developers PROVIDES objective, unbiased coverage of cutting-edge technologies-no hype! Core Swing: Advanced Programming delivers: State-of-the-art insights into the Swing classes that other books can't touch Practical techniques for building the Swing components you really need Fast-track techniques for making the most of text controls, editors, tables, and drag-and-drop Hundreds of professional-level code examples CD-ROM The accompanying CD-ROM includes all of the book's detailed code examples a bonus chapter taken from Kim Topley's first book, Core Java Foundation Classes, and trial versions of SwingBuilder from SwingSoft and Netbeans.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiii, 172 p. , ill. ; , 25 cm
    DDC: 658/.05
    Keywords: Client/server computing ; Management ; Information technology ; Management ; Electronic books ; local
    Abstract: 2229H-4 Organizing IT for excellence in 21st century distributed environments Few organizations are achieving their goals for reliability, availability, and serviceability in distributed environments-and the obstacles aren't technical, they're organizational . How does one structure an IT organization to succeed with today's tools and architectures? IT Organization: Building a World-Class Infrastructure delivers realistic, specific answers that draw upon the experiences of more than 40 leading companies. You'll discover how to: Design your organization to deliver "any data, anywhere, anytime" Combine mainframe-class discipline with 21st century flexibility Treat your network like you treat your data center Organize around business-critical support functions instead of trendy technologies Establish standards without imposing rigidity -- and achieve discipline without bureaucracy Overcome the myths that prevent IT organizations from succeeding Harris Kern and his colleagues have built a worldwide reputation for evaluating IT organizations and identifying solutions -- fast . This concise, to-the-point book will help you do the same. Here are the right questions to ask, specific "people and process" techniques that work, sample SLAs and internal support agreements -- everything you need to make change happen, now!
    Note: Includes bibliographical references (p. 163-167) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    ISBN: 9780132492508 , 0132492504
    Language: English
    Pages: 1 online resource (xiii, 222 p.) , ill.
    Series Statement: CCIE professional development
    Parallel Title: Erscheint auch als
    Keywords: Cisco IOS ; Computer network architectures ; Systems software ; Software architecture ; Electronic books ; local
    Abstract: "Inside Cisco IOS Software Architecture begins with an overview of operating system concepts and the IOS Software infrastructure, including processes, memory management, CPU scheduling, packet buffers, and device drivers, as well as a discussion of packet switching architecture with detailed coverage of the various platform-independent switching methods, including process switching, fast switching, optimum switching, and Cisco Express Forwarding (CEF). The book then delves into the intricate details of the design and operation of platform-specific features, including the 1600, 2500, 4x00, 3600, 7200, 7500, and GSR Cisco routers. Finally, an overview of IOS Quality of Service (QoS) is provided, including descriptions of several QoS methods, such as priority queuing, custom queuing, weighted fair queuing, and modified deficit round robin"--Resource description page.
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 570 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Management ; Quality control ; Electronic books ; local
    Abstract: A comprehensive guide for designing and implementing effective strategies for network performance and management Design and implement performance and fault monitoring that will measure and report the effectiveness of your Cisco network Generate reports and alerts that provide network information and status Learn to navigate Cisco's documentation and MIBs to determine which elements of a specific technology you should manage Study the key aspects of systems and VLAN management of Cisco devices Discover best practices and related configurations for implementing network management on Cisco routers and switches Performance and Fault Management is a comprehensive guide to designing and implementing effective strategies for monitoring performance levels and correctng problems in Cisco networks. It provides an overview of router and LAN switch operations to help you understand how to manage such devices, as well as guidance on the essential MIBs, traps, syslog messages, and show commands for managing Cisco routers and switches. Written by a team of network management experts, this book details how to implement the practice of network management through documentation, process reviews, and network baselining. It explains various management commands, data, protocols, and resources in Cisco routers and switches. With this book, you will discover how to achieve optimum performance and fault management results on your Cisco network.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 575 p. , ill. ; , 24 cm
    Series Statement: Java 2 platform, enterprise edition series
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web servers ; Electronic books ; local
    Abstract: Practical guide to using Java for Web-enabled applications and dynamic Web sites In-depth coverage of the latest J2EE standards: servlets version 2.2 and JSP 1.1 Hundreds of completely portable, fully documented, industrial-strength examples Configuration details for Apache Tomcat, Sun's JSWDK, and the Java Web Server Servlets and JavaServer Pages provide a powerful, efficient, portable, and secure alternative to CGI programming for developing professional e-commerce sites and other Web-enabled applications. Here's all you need to leverage the latest J2EE servlet 2.2 and JSP 1.1 standards: real-world insight, advanced techniques, industrial-strength code, and hands-on coverage of three top servlet/JSP engines, including Apache Tomcat. Part I gives exhaustive coverage of servlets 2.1 and 2.2. Starts with basic syntax, the servlet life cycle, and use of form data. Moves on to leveraging HTTP 1.1, cookies, and session tracking. Advanced topics include compressed Web content, persistent connections, dynamically generated images, and shopping carts for e-commerce. Part II provides an in-depth guide to JSP 1.0 and 1.1, including advice on when to use servlets, JSP, or a combination of the two. Discusses every standard JSP element, including approaches for integrating JavaBeans. Advanced techniques include sharing beans, generating Excel spreadsheets, and defining custom JSP tag libraries. Part III covers key supporting technologies: HTML forms, JDBC and database connection pooling, and the use of applets to communicate with servlets. Servlet and JSP Quick Reference provides a handy syntax and usage summary. Every Core Series book: Demonstrates practical techniques used by professional developers Features robust, thoroughly tested sample code and realistic examples Focuses on the cutting-edge technologies you need to master today Provides expert advice that will help you build superior software Core Servlets and JavaServer Pages delivers: Practical techniques for streamlining Web-enabled application development Proven strategies for optimizing servlet and JSP performance In-depth, hands-on coverage of the latest standards: servlets 2.2 and JSP 1.1 On-line access to all source code, available free for unrestricted use
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...