eBooks-it.org Logo
eBooks-IT.org Inner Image

Networking eBooks Page 39

Download free Networking eBooks Page 39

OSPF and IS-IS

Choosing an IGP for Large-Scale Networks
OSPF and IS-IS Image
The practical guide to large-scale networking with OSPF and IS-IS This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting experience, offering realistic advice and straight answers on every aspect of working with link-state protocols--from scalability, reliability, and security to area design and database synchronization. This book is organized to help network engineers and architects compare OSPF and IS-IS. One feature at a time, Doyle first demonstrates how a topic or feature is implemented in OSPF, and then walks through a similar implementation using IS-IS. Professionals who are relatively new to large-scale ...

OSPF

Anatomy of an Internet Routing Protocol
OSPF Image
OSPF gives an introduction to the Internet and its routing protocols covering unicast and multicast routing protocols and techniques for monitoring and debugging routing in a TCP/IP network. This book provides a detailed description of OSPF (Open Shortest Path First), which was developed by the author, and explains why OSPF was developed and how it greatly improves network efficiency. Each chapter contains exercises to help you get a better understanding of how to efficiently implement algorithms used in OSPF....

Juniper Networks Reference Guide

JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide Image
Juniper Networks is the second largest provider of high-end networking routers, owning 27% of the $466 million market to Cisco's 67%, according to Dell'Oro Group, a firm that tracks networking equipment sales. This implementation guide to Juniper Network routers, teaches readers how to configure, deploy, and maintain Juniper routing solutions. It provides concise explanations of internetworking theory and contains detailed examples that will enable a network engineer to configure products. The case studies are taken from real world router configurations and there are numerous templates that can be easily applied to the reader's own network....

HTML5 Developer's Cookbook

HTML5 Developer's Cookbook Image
2012 Jolt Productivity Award winner! Using HTML5, web developers can create standards-based browser applications with extraordinary richness and power, incorporating everything from drag-and-drop to native audio and videoall without any third-party plug-ins. Simply put, every web developer needs to master HTML5and the sooner you do so, the greater advantage you'll have. HTML5 Developer's Cookbook provides all the expert advice and proven code you need to start building production-quality HTML5 applications right now. Authors Chuck Hudson and Tom Leadbetter present tested, modular recipes at beginner, intermediate, and advanced levels. You'll learn exactly how to deliver state-of-the-art user experiences by integrating HTML5's new and enhanced e...

Exploiting Software

How to Break Code
Exploiting Software Image
Praise for Exploiting Software 'Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the designa key change fro...



2007 - 2017 © eBooks-IT.org