• The Book of PF 2nd Edition

    The Book of PF 2nd Edition

    This is a book about building the network you need. We’ll dip into the topics of firewalls and related functions, starting from a little theory. You’ll see plenty of examples of filtering and other ways to direct network traffic. I’ll assume that you have a basic to intermediate command of TCP/IP networking concepts and Unix administration.

     220 p cit 09/05/2013 147 1

  • TCP/IP For Dummies 6th Edition

    TCP/IP For Dummies 6th Edition

    TCP/IP is the glue that holds together the Internet and the World Wide Web. To be well connected (network-wise, that is), sooner or later you have to become familiar with TCP/IP applications and services. If you want to understand what TCP/IP is, what it’s for, why you need it, and what to do with it, and you just don’t know where to start — this book is for you.

     458 p cit 09/05/2013 157 2

  • SIP Trunking Migrating from TDM to IP for Business to Business Communication

    SIP Trunking Migrating from TDM to IP for Business to Business Communication

    Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there's a key missing link: most businesses still connect to their service providers via old-fashioned, inflexible TDM trunks. Now, three Cisco experts show how to use Session Initiation Protocol (SIP) trunking to eliminate legacy interconnects and gain the full benefits of end-to-end VoIP. Written for...

     352 p cit 09/05/2013 175 1

  • Security Power tools

    Security Power tools

    Security Power Tools is written by members of the Juniper Networks’ J-Security Team as well as two guests:Jennifer Granick of Stanford University and Philippe Bionde, an independent developer in France. It took a group effort because network security issues keep us rather busy in our day jobs, and the scope of this book requires the experiences of a diverse group of security professionals. We split up the different tools after several...

     858 p cit 08/05/2013 142 1

  • Security Monitoring

    Security Monitoring

    Our security team found a new way to make money. In 2006, after perfecting our enterprise malware monitoring, we began to deploy tools for monitoring Cisco’s infrastructure more deeply. In doing so, we found our team positioned to monitor applications in new ways. Weary of ignoring the risk presented by new ventures, we offered a solution: fund staff to monitor targeted risk areas, and handle the infrastructure ourselves. The solution paid...

     248 p cit 08/05/2013 126 2

  • Nonprofit Internet Strategies Best Practices for Marketing, Communications, and Fundraising Success

    Nonprofit Internet Strategies Best Practices for Marketing, Communications, and Fundraising Success

    The first e-mail was sent in March 1972. The origins of the Internet began in the 1960s and evolved over the next 10 to 15 years. By April 1993, the World Wide Web made it possible for corporations, government entities, and nonprofit organizations to create a presence to the world on the Internet. It is estimated that in the year 2000, there were 475 million e-mail boxes worldwide, through which 500 to 600 billion e-mail messages flowed....

     360 p cit 07/05/2013 149 2

  • Network Protocols Handbook Second Edition

    Network Protocols Handbook Second Edition

    We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with others, use it as a super-encyclopedia and find anything that they are interested in via search...

     359 p cit 07/05/2013 148 1

  • Networking For Dummies 10th Edition

    Networking For Dummies 10th Edition

    Welcome to the tenth edition of Networking For Dummies, the book that’s written especially for people who have this nagging feeling in the back of their minds that they should network their computers but haven’t a clue about how to start or where to begin.

     459 p cit 07/05/2013 156 1

  • Network Warrior 2nd Edition

    Network Warrior 2nd Edition

    The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

     785 p cit 07/05/2013 157 1

  • Network Security with OpenSSL

    Network Security with OpenSSL

    OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. Focused on the practical, this book provides only the information that is necessary to use OpenSSL safely and...

     338 p cit 07/05/2013 161 4

  • Network security auditing

    Network security auditing

    This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security...

     517 p cit 07/05/2013 141 1

  • Nagios Core Administration Cookbook

    Nagios Core Administration Cookbook

    Nagios Core, the open source version of the Nagios monitoring framework, is an industry standard for network monitoring hosted on Unix-like systems, such as GNU/Linux or BSD. It is very often used by network and system administrators for checking connectivity between hosts and ensuring that network services are running as expected.

     366 p cit 07/05/2013 117 1

Hướng dẫn khai thác thư viện số