eBooks-it.org Logo
eBooks-IT.org Inner Image

Cisco Press eBooks Page 34

Download free Cisco Press eBooks Page 34

Computer Networking First-Step

Computer Networking First-Step Image
Your first step into the world of computer networking No experience required Includes clear and easily understood explanations Makes learning easy Your first step to computer networking begins here! Learn basic networking terminology Understand how information is routed from place to place Explore Internet connectivity secrets Protect your computer from intrusion Build local-area networks (LANs) Welcome to the world of networking! Networking and the Internet touch our lives in untold ways every day. From connecting our computers together at home and surfing the net at high speeds to editing and sharing digital music and video, computer networking has become both ubiquitous and indispensable. No experience needed! Computer Networking First-Ste...

Computer Incident Response and Product Security

Computer Incident Response and Product Security Image
Computer Incident Response and Product Security The practical guide to building and running incident response and product security teams Damir Rajnovic Organizations increasingly recognize the urgent importance of effective, cohesive, and efficient security incident response. The speed and effectiveness with which a company can respond to incidents has a direct impact on how devastating an incident is on the company's operations and finances. However, few have an experienced, mature incident response (IR) team. Many companies have no IR teams at all; others need help with improving current practices. In this book, leading Cisco incident response expert Damir Rajnovic presents start-to-finish guidance for creating and operating effective IR team...

Comparing, Designing and Deploying VPNs

Comparing, Designing and Deploying VPNs Image
A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS Router, Cisco ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secur...

Cloud Computing

Automating the Virtualized Data Center
Cloud Computing Image
The complete guide to provisioning and managing cloud-based Infrastructure as a Service (IaaS) data center solutions Cloud computing will revolutionize the way IT resources are deployed, configured, and managed for years to come. Service providers and customers each stand to realize tremendous value from this paradigm shift-if they can take advantage of it. Cloud Computing brings together the realistic, start-to-finish guidance they need to plan, implement, and manage cloud solution architectures for tomorrow's virtualized data centers. It introduces cloud 'newcomers' to essential concepts, and offers experienced operations professionals detailed guidance on delivering Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as ...

Cisco Wireless LAN Security

Cisco Wireless LAN Security Image
Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore new security protocols in 802.11i and WPA and learn how they prevent attacks Review centralized deployment models for wired/wireless integration Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book Reference the next generation authentication standards and protocols Find out about mobility, hotspots, and campus wirele...



2007 - 2017 © eBooks-IT.org