Author: Scott Ballew
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923201
Category : Computers
Languages : en
Pages : 364
Book Description
The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.
Managing IP Networks with Cisco Routers
Author: Scott Ballew
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923201
Category : Computers
Languages : en
Pages : 364
Book Description
The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923201
Category : Computers
Languages : en
Pages : 364
Book Description
The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.
Managing IP Networks with Cisco Routers
Author: Scott M. Ballew
Publisher:
ISBN: 9788173660276
Category :
Languages : en
Pages : 352
Book Description
Routers are the glue that connects the pieces of your network. Even in the simplest networks, this isn't a simple task. Routers have evolved into highly specialized computing platforms, with extremely flexible but complex capabilities.
Publisher:
ISBN: 9788173660276
Category :
Languages : en
Pages : 352
Book Description
Routers are the glue that connects the pieces of your network. Even in the simplest networks, this isn't a simple task. Routers have evolved into highly specialized computing platforms, with extremely flexible but complex capabilities.
Managing Cisco Network Security
Author: Michael J. Wenstrom
Publisher:
ISBN: 9781578701032
Category : Bilgisayar ağları- Güvenlik önlemleri
Languages : en
Pages : 0
Book Description
Learn how to secure your network with the official MCNS Coursebook
Publisher:
ISBN: 9781578701032
Category : Bilgisayar ağları- Güvenlik önlemleri
Languages : en
Pages : 0
Book Description
Learn how to secure your network with the official MCNS Coursebook
Essential SNMP
Author: Douglas R. Mauro
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596000202
Category : Computers
Languages : en
Pages : 340
Book Description
A practical introduction to SNMP for system network administrators. Starts with the basics of SNMP, how it works and provides the technical background to use it effectively.
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596000202
Category : Computers
Languages : en
Pages : 340
Book Description
A practical introduction to SNMP for system network administrators. Starts with the basics of SNMP, how it works and provides the technical background to use it effectively.
PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565920989
Category : Computers
Languages : en
Pages : 442
Book Description
Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565920989
Category : Computers
Languages : en
Pages : 442
Book Description
Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.
Exim: The Mail Transfer Agent
Author: Philip Hazel
Publisher: "O'Reilly Media, Inc."
ISBN: 1491947462
Category : Computers
Languages : en
Pages : 644
Book Description
Exim delivers electronic mail, both local and remote. It has all the virtues of a good postman: it's easy to talk to, reliable, efficient, and eager to accommodate even the most complex special requests. It's the default mail transport agent installed on some Linux systems, runs on many versions of Unix, and is suitable for any TCP/IP network with any combination of hosts and end-user mail software.Exim is growing in popularity because it is open source, scalable, and rich in features such as the following: Compatibility with the calling interfaces and options of Sendmail (for which Exim is usually a drop-in replacement) Lookups in LDAP servers, MySQL and PostgreSQL databases, and NIS or NIS+ services Support for many kinds of address parsing, including regular expressions that are compatible with Perl 5 Sophisticated error handling Innumerable tuning parameters for improving performance and handling enormous volumes of mail Best of all, Exim is easy to configure. You never have to deal with ruleset 3 or worry that a misplaced asterisk will cause an inadvertent mail bomb.While a basic configuration is easy to read and can be created quickly, Exim's syntax and behavior do get more subtle as you enter complicated areas like virtual hosting, filtering, and automatic replies. This book is a comprehensive survey that provides quick information for people in a hurry as well as thorough coverage of more advanced material.
Publisher: "O'Reilly Media, Inc."
ISBN: 1491947462
Category : Computers
Languages : en
Pages : 644
Book Description
Exim delivers electronic mail, both local and remote. It has all the virtues of a good postman: it's easy to talk to, reliable, efficient, and eager to accommodate even the most complex special requests. It's the default mail transport agent installed on some Linux systems, runs on many versions of Unix, and is suitable for any TCP/IP network with any combination of hosts and end-user mail software.Exim is growing in popularity because it is open source, scalable, and rich in features such as the following: Compatibility with the calling interfaces and options of Sendmail (for which Exim is usually a drop-in replacement) Lookups in LDAP servers, MySQL and PostgreSQL databases, and NIS or NIS+ services Support for many kinds of address parsing, including regular expressions that are compatible with Perl 5 Sophisticated error handling Innumerable tuning parameters for improving performance and handling enormous volumes of mail Best of all, Exim is easy to configure. You never have to deal with ruleset 3 or worry that a misplaced asterisk will cause an inadvertent mail bomb.While a basic configuration is easy to read and can be created quickly, Exim's syntax and behavior do get more subtle as you enter complicated areas like virtual hosting, filtering, and automatic replies. This book is a comprehensive survey that provides quick information for people in a hurry as well as thorough coverage of more advanced material.
Computer Security Basics
Author: Deborah Russell
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175712
Category : Computers
Languages : en
Pages : 486
Book Description
Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175712
Category : Computers
Languages : en
Pages : 486
Book Description
Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".
IP Routing
Author: Ravi Malhotra
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596002756
Category : Business & Economics
Languages : en
Pages : 246
Book Description
This is a straightforward, jargon-free introduction to the basic concepts of IP Routing. The book begins with the simplest routing protocol--RIP. Each chapter adds a new concept, building from the simplest to the most complex.
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596002756
Category : Business & Economics
Languages : en
Pages : 246
Book Description
This is a straightforward, jargon-free introduction to the basic concepts of IP Routing. The book begins with the simplest routing protocol--RIP. Each chapter adds a new concept, building from the simplest to the most complex.
Cisco IOS in a Nutshell
Author: James Boney
Publisher: "O'Reilly Media, Inc."
ISBN: 0596553110
Category : Computers
Languages : en
Pages : 799
Book Description
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly. Fortunately, there's help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596553110
Category : Computers
Languages : en
Pages : 799
Book Description
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly. Fortunately, there's help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.
Information Assurance
Author: Andrew Blyth
Publisher: Springer Science & Business Media
ISBN: 144713706X
Category : Computers
Languages : en
Pages : 335
Book Description
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information Assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35 years old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the more recent past, the term Information Warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations - after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the three classes of Information Warfare: Class 1- Personal Information Warfare. Class 2 - Corporate Information Warfare. Class 3 - Global Information Warfare. Political sensitivities lead to "warfare" being replaced by "operations", a much more "politically correct" word. Unfortunately, "operations" also has an offensive connotation and is still the terminology of the military and governments.
Publisher: Springer Science & Business Media
ISBN: 144713706X
Category : Computers
Languages : en
Pages : 335
Book Description
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information Assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35 years old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the more recent past, the term Information Warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations - after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the three classes of Information Warfare: Class 1- Personal Information Warfare. Class 2 - Corporate Information Warfare. Class 3 - Global Information Warfare. Political sensitivities lead to "warfare" being replaced by "operations", a much more "politically correct" word. Unfortunately, "operations" also has an offensive connotation and is still the terminology of the military and governments.