eBooks-it.org Logo
eBooks-IT.org Inner Image

Cisco Press eBooks Page 24

Download free Cisco Press eBooks Page 24

TCP/IP First-Step

TCP/IP First-Step Image
Your first step into the world of TCP/IP No TCP/IP experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding TCP/IP begins here! Learn TCP/IP basics Discover the power of TCP/IP components and subcomponents Use hands-on activities to understand TCP/IP Benefit from examples that illustrate the power of TCP/IP Welcome to the world of TCP/IP! TCP/IP is the world's de facto communications protocol. It is the official protocol of the Internet and, consequently, has become the predominant communications protocol suite in many private networks and internetworks. No TCP/IP experience needed! TCP/IP First-Step explores TCP/IP concepts in a reader-friendly manner that assumes no previous e...

Signaling System No. 7

Protocol, Architecture, and Services
Signaling System No. 7 Image
A complete, practical guide to the world's most popular signaling system, including SIGTRAN, GSM-MAP, and Intelligent Networks.Provides in-depth coverage of the SS7 protocols, including implementation detailsCovers SS7 over IP (SIGTRAN) using real-world examplesCovers SS7/C7 from both a North American and European perspective, providing a broad international understanding of the technology and associated standardsExplains mobile wireless concepts and signaling, including mobile application part (MAP)Provides a thorough explanation of the Intelligent Network (IN) and associated protocols (INAP/AIN)Signaling System No. 7 (SS7) is a signaling network and protocol that is used globally to bring telecommunications networks, both fixed-line and cellular, t...

SSL Remote Access VPNs

SSL Remote Access VPNs Image
SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib Frahim, CCIE No. 5459 Qiang Huang, CCIE No. 4937 Cisco SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection. SSL Remote Access VPNs provides you with a basic working knowledge of SSL virtual private networks on Cisco SSL VPN-capable devices. Design guidance is provided to assist you in implementing SSL VPN in ...

Routing First-Step

Routing First-Step Image
Your first step into the world of routing No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here! Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing! Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar. No routing experience needed! Ro...

Router Security Strategies

Securing IP Network Traffic Planes
Router Security Strategies Image
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking. The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. Techniques to secure the IP data plane, IP control plane, IP man...



2007 - 2017 © eBooks-IT.org