Jump to content

downtemplate

Banned
  • Content Count

    33
  • Joined

  • Last visited

  • Days Won

    31

Everything posted by downtemplate

  1. Book Details Paperback: 186 pages Publisher: O’Reilly Media (September 2012) Language: English ISBN-10:1449333583 ISBN-13: 978-1449333584 File Size: 18.6 MB Run your entire corporate IT infrastructure in a cloud environment that you control completely-and do it inexpensively and securely with help from this hands-on book. All you need to get started is basic IT experience. You’ll learn how to use Amazon Web Services (AWS) to build a private Windows domain, complete with Active Directory, enterprise email, instant messaging, IP telephony, automated management, and other services. By the end of the book, you’ll have a fully functioning IT infrastructure you can operate for less than $300 per month. Learn about Virtual Private Cloud (VPC) and other AWS tools you’ll use Create a Windows domain and set up a DNS management system Install Active Directory and a Windows Primary Domain Controller Use Microsoft Exchange to set up an enterprise email service Import existing Windows Server-based virtual machines into your VPC Set up an enterprise-class chat/IM service, using the XMPP protocol Install and configure a VoIP PBX telephony system with Asterisk and FreePBX Keep your network running smoothly with automated backup and restore, intrusion detection, and fault alerting Table of Contents Chapter 1. To the Cloud! Chapter 2. Directories, Controllers, and Authorities-Oh My! Chapter 3. Let There Be Email! Chapter 4. Doing Things the Easy Way Chapter 5. Do You Have Some Time to Chat? Chapter 6. The Voice of a New Generation Chapter 7. Keeping Your Network Fit, Trim, and Healthy Chapter 8. For Those About to Grok, We Salute You Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  2. Book Details Paperback: 420 pages Publisher: O’Reilly Media (October 2012) Language: English ISBN-10:1449314538 ISBN-13: 978-1449314538 File Size: 39.9 MB Though Arista Networks is a relative newcomer in the data center and cloud networking markets, the company has already had considerable success. In this book, renowned consultant and technical author Gary Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s lineup of hardware, and explains why its network switches and Extensible Operating System (EOS) are so effective. Anyone with a CCNA or equivalent knowledge will benefit from this book, especially entrenched administrators, engineers, or architects tasked with building an Arista network. Is Arista right for your data center? Pick up this guide and find out. Topic highlights include: SysDB: the EOS system database that holds state, statuses, and variables Multichassis Link Aggregation (MLAG): for linking a port-channel to multiple switches instead of just one Latency Analyzer (LANZ): the interface-buffer troubleshooting tool with a reporting granularity of one millisecond VM Tracer: for adding, changing, and removing VLANs without human interaction Zero-Touch Provisioning (ZTP): for remote switch configuration Hardware advantages: including merchant silicon, low-latency networking, and power consumption Gotchas: issues with Arista switches or systems Table of Contents Chapter 1. Why Arista? Chapter 2. Buffers Chapter 3. Merchant Silicon Chapter 4. Fabric Speed Chapter 5. Arista Products Chapter 6. Introduction to EOS Chapter 7. Upgrading EOS Chapter 8. LLDP Chapter 9. Bash Chapter 10. SysDB Chapter 11. Python Chapter 12. MLAG Chapter 13. Spanning Tree Protocol Chapter 14. First Hop Redundancy Chapter 15. Routing Chapter 16. Access Lists Chapter 17. Quality of Service Chapter 18. Aboot Chapter 19. Email Chapter 20. LANZ Chapter 21. sFlow Chapter 22. VM Tracer Chapter 23. Scheduler Chapter 24. TCP Dump Chapter 25. Zero-Touch Provisioning Chapter 26. event-handler Chapter 27. Event Monitor Chapter 28. Extending EOS Chapter 29. CloudVision Chapter 30. Troubleshooting Chapter 31. Aristacisms Download E-Book Uploaded Link [Hidden Content]
  3. Book Details Paperback: 1488 pages Publisher: Wiley (October 2011) Language: English ISBN-10:0470947721 ISBN-13: 978-0470947722 File Size: 16.5 MB The definitive resource for the NRS II exams-three complete courses in a book Alcatel-Lucent is a world leader in designing and developing scalable systems for service providers. If you are a network designer or operator who uses Alcatel-Lucent’s 7750 family of service routers, prepare for certification as an A-L network routing specialist with this complete self-study course. You’ll get thorough preparation for the NRS II exams while you learn to build state-of-the-art, scalable IP/MPLS-based service networks. The book provides you with an in-depth understanding of the protocols and technologies involved in building an IP/MPLS network while teaching you how to avoid pitfalls and employ the most successful techniques available. Topics covered include interior routing protocols, multiprotocol label switching (MPLS), Layer2/Layer3 services and IPv6. The included CD features practice exam questions, sample lab exercises, and more. Prepares network professionals for Alcatel-Lucent Service Routing Certification (SRC) exams 4A0-101, 4A0-103, 4A0-104 and NRSII4A0 Covers content from Alcatel-Lucent’s SRC courses on Interior Routing Protocols, Multiprotocol Label Switching, and Services Architecture Specific topics include MPLS (RSVP-TE and LDP), services architecture, Layer2/Layer 3 services (VPWS/VPLS/VPRN/IES/service inter-working/IPv6 tunneling), and OSPF and IS-IS for traffic engineering and IPv6. CD includes practice exam questions, lab exercises and solutions. This Self-Study Guide is the authoritative resource for network professionals preparing for the Alcatel-Lucent NRS II certification exams. From the Back Cover This book is your official self-study guide for the Alcatel-Lucent Network Routing Specialist II (NRS II) Certification. The certification is designed to provide a solid understanding of IP/MPLS networks and their Layer 2 and Layer 3 service applications in today’s advanced networks. The book is loaded with many practical configuration and troubleshooting exercises and is an invaluable reference source to the working network engineer. Upon completing the book and obtaining your certification, you will have a valuable foundation of skills, knowledge, and best practices needed for operating an IP/MPLS services network. After reading this book, you will be able to: Design an address plan and configure interfaces for IPv4 and IPv6 Configure and verify routing for IPv6 Describe the operation of LDP and configure an LDP network Explain how OSPF and IS-IS are enhanced to support traffic engineering Configure and verify RSVP-TE LSPs for traffic engineering and high availability Describe the different services that can be implemented in an IP/MPLS network Configure and verify Layer 2 and Layer 3 VPN services Configure and verify IPv6 tunneling over an IP/MPLS network “I strongly recommend this book to any individual or organization needing to build their IP Service Routing knowledge and hands-on implementation skills and know-how. This comprehensive self-study guide not only leads to a valuable certification at the NRS II level, it covers a wide range of critical IP subject areas in a thorough and practical manner to help you better support your mission, business, and customers.” -Gary Horn, Vice President, Technology Services and CTO Advocate Health Care Download E-Book Uploaded Link [Hidden Content]
  4. Book Details Paperback: 280 pages Publisher: O’Reilly Media (December 2003) Language: English ISBN-10:0596002122 ISBN-13: 978-0596002121 File Size: 8.4 MB Postfix is a Mail Transfer Agent (MTA): software that mail servers use to route email. Postfix is highly respected by experts for its secure design and tremendous reliability. And new users like it because it’s so simple to configure. In fact, Postfix has been adopted as the default MTA on Mac OS X. It is also compatible with sendmail, so that existing scripts and programs continue to work seamlesslyafter it is installed. Postfix was written by well-known security expert Wietse Venema, who reviewed this book intensively during its entire development. Author Kyle Dent covers a wide range of Postfix tasks, from virtual hosting to controls for unsolicited commercial email. While basic configuration of Postfix is easy, every site has unique needs that call for a certain amount of study. This book, with careful background explanations and generous examples, eases readers from the basic configuration to the full power of Postfix. It discusses the Postfix interfaces to various tools that round out a fully scalable and highly secure email system. These tools include POP, IMAP, LDAP, MySQL, Simple Authentication and Security Layer (SASL), and Transport Layer Security (TLS, an upgrade of SSL). A reference section for Postfix configuration parameters and an installation guide are included. Topics include: Basic installation and configuration DNS configuration for email Working with POP/IMAP servers Hosting multiple domains (virtual hosting) Mailing lists Handling unsolicited email (spam blocking) Security through SASL and TLS From compiling and installing Postfix to troubleshooting, Postfix: The Definitive Guide offers system administrators and anyone who deals with Postfix an all-in-one, comprehensive tutorial and reference to this MTA. Table of Contents Chapter 1. Introduction Chapter 2. Prerequisites Chapter 3. Postfix Architecture Chapter 4. General Configuration and Administration Chapter 5. Queue Management Chapter 6. Email and DNS Chapter 7. Local Delivery and POP/IMAP Chapter 8. Hosting Multiple Domains Chapter 9. Mail Relaying Chapter 10. Mailing Lists Chapter 11. Blocking Unsolicited Bulk Email Chapter 12. SASL Authentication Chapter 13. Transport Layer Security Chapter 14. Content Filtering Chapter 15. External Databases Appendix A. Configuration Parameters Appendix B. Postfix Commands Appendix C. Compiling and Installing Postfix Appendix D. Frequently Asked Questions Download E-Book Uploaded Link [Hidden Content]
  5. Book Details Paperback: 288 pages Publisher: Packt Publishing (June 2012) Language: English ISBN-10:1849681120 ISBN-13: 978-1849681124 File Size: 16.3 MB VMware View is a desktop virtualization solution that helps organizations automate desktop and application management, reduce costs, and increase data security through centralization of the desktop environment. Written by VMware experts Jason Langone and Andre Leibovici, this book is meant as a guide for architects, solution providers, consultants, engineers and anyone planning to design and implement a solution based on VMware View 5. This book will pull information and expertise from real world scenarios so as to maximize practical learning. It will explain the settings and configurations needed to have a successful desktop virtualization solution as well as the ”˜why’ behind the decisions. This book is not meant to replace the official Administration or Installation Guides for VMware View or ThinApp published by the great people at VMware. The material in this book should be used during the design phase, which is before an implementation is underway. All components of a VMware View solution will be covered. This book uses case studies from the real world including: Hotel Kiosk: VDI solution used in a hotel lobby to provide basic connectivity to its guests Federal agency with classified and unclassified information: VDI used to allow analysts to securely connect to both a classified and unclassified network from the same device Remote Office: VDI used to provide connectivity to offshore developers Out-of-band Scientist: VDI used to provide a secure desktop environment to scientists fighting disease in remote locales What you will learn from this book Analyse the strategies and techniques used to migrate a user population from a physical desktop environment to a virtual desktop solution Decide whether to use persistent or non-persistent vDesktops, which impacts many areas of the overall VDI including storage, desktop pools and management Understand how end devices such as thick client, thin client, zero clients and other devices, such as the Apple iPad, are supported by VMware View Correctly size the VDI and avoid slow logons, poor PCoIP performance, authentication errors, random failures, and more Analyse all of the potential points of failure within a VDI and provide redundancy for each component Effectively plan the storage design for your VDI Ensure regular backups are taken to ensure a quick recovery in times of failure Understand various VDI design considerations for disaster recovery Approach This book will pull information and expertise from real world scenarios so as to maximize practical learning. It will explain the settings and configurations needed to have a successful desktop virtualization solution as well as the ”˜why’ behind the decisions. Who this book is for This book is meant as a guide for architects, solution providers, consultants, engineers and anyone planning to design and implement a solution based on VMware View 5. Download E-Book Uploaded Link [Hidden Content]
  6. Book Details Paperback: 528 pages Publisher: VMware Press (December 2011) Language: English ISBN-10:0321799925 ISBN-13: 978-0321799920 File Size: 45.5 MB The Complete, Hands-On Guide to Installing and Configuring VMware Site Recovery Manager 5.0 Administering VMware Site Recovery Manager 5.0 is the complete, technical, hands-on guide to VMware Site Recovery Manager (SRM) 5.0 installation and configuration for experienced VMware professionals. VMware forum moderator and vExpert Mike Laverick fully explains SRM 5.0’s failover/failback procedures, walks readers through configuring storage replication with hardware from several leading suppliers, and shows how to efficiently implement fast, automated, centralized disaster recovery. Drawing on his extensive experience with SRM and vSphere, Laverick identifies common pitfalls and errors, explains why they occur, and shows exactly how to fix them. Fully up to date for SRM 5.0, this book delivers “in-the-trenches” technical knowledge you won’t find anywhere else, including expert guidance for utilizing SRM 5.0’s advanced new vSphere Replication (VR). Coverage includes Going “under the hood” with SRM 5.0 to thoroughly understand its operation Configuring SRM 5.0 with Dell EqualLogic Replication, EMC Celerra Replicator, EMC CLARiiON MirrorView, HP StorageWorks P4000 Virtual SAN Appliance with Remote Copy, and NetApp SnapMirror Configuring multiple LUN/volumes with virtual machines and virtual disks Installing VMware SRM and configuring vSphere Replication (VR) Using VR to replicate VMs across locations without third-party storage array-based replication Using VR to replicate a single VM or groups of VMs to the Recovery Site Efficiently configuring protected and recovery sites Using Reprotect Mode to accelerate failback and enhance VM portability Using dependencies and priority orders to configure SRM based on your existing categories of applications and services Leveraging SRM 5.0’s scalability improvements to serve large-scale and/or cloud environments Defining custom recovery plans Working with alarms, export histories, and access control Implementing bidirectional relationships and shared site configurations Scripting automated site recovery Upgrading from SRM 4.1 to SRM 5.0 Download E-Book Uploaded Link [Hidden Content]
  7. Book Details Paperback: 480 pages Publisher: Cisco Press (August 2007) Language: English ISBN-10:1587053322 ISBN-13: 978-1587053320 File Size: 23.0 MB End-to-End Network Security: Defense-in-Depth Best practices for assessing and improving network defenses and responding to security incidents Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due to increased attack frequency, diverse attack sophistication, and the rapid nature of attack velocity-all blurring the boundaries between the network and perimeter. End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds. End-to-End Network Security provides you with a comprehensive look at the mechanisms to counter threats to each part of your network. The book starts with a review of network security technologies then covers the six-step methodology for incident response and best practices from proactive security frameworks. Later chapters cover wireless network security, IP telephony security, data center security, and IPv6 security. Finally, several case studies representing small, medium, and large enterprises provide detailed example configurations and implementation strategies of best practices learned in earlier chapters. Adopting the techniques and strategies outlined in this book enables you to prevent day-zero attacks, improve your overall security posture, build strong policies, and deploy intelligent, self-defending networks. “Within these pages, you will find many practical tools, both process related and technology related, that you can draw on to improve your risk mitigation strategies.” -Bruce Murphy, Vice President, World Wide Security Practices, Cisco Omar Santos is a senior network security engineer at Cisco®. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations. Guard your network with firewalls, VPNs, and intrusion prevention systems Control network access with AAA Enforce security policies with Cisco Network Admission Control (NAC) Learn how to perform risk and threat analysis Harden your network infrastructure, security policies, and procedures against security threats Identify and classify security threats Trace back attacks to their source Learn how to best react to security incidents Maintain visibility and control over your network with the SAVE framework Apply Defense-in-Depth principles to wireless networks, IP telephony networks, data centers, and IPv6 networks Download E-Book Uploaded Link [Hidden Content]
  8. Book Details Paperback: 352 pages Publisher: Pearson IT Certification; 2nd Edition (December 2011) Language: English ISBN-10:0789748908 ISBN-13: 978-0789748904 File Size: 22.5 MB Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you’ve learned. Whether you’re a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options. Learn how to: Identify the worst threats to your network and assess your risks Get inside the minds of hackers, so you can prevent their attacks Implement a proven layered approach to network security Use basic networking knowledge to improve security Resist the full spectrum of Internet-based scams and frauds Defend against today’s most common Denial of Service (DoS) attacks Prevent attacks by viruses, spyware, and other malware Protect against low-tech social engineering attacks Choose the best encryption methods for your organization Select firewalls and other security technologies Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Understand cyberterrorism and information warfare Master basic computer forensics and know what to do after you’re attacked Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  9. Book Details Paperback: 296 pages Publisher: Packt Publishing (December 2012) Language: English ISBN-10:184951738X ISBN-13: 978-1849517386 File Size: 61.5 MB BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm. “BackTrack 5 Cookbook” provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks. The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests. We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics. “BackTrack 5 Cookbook” will serve as an excellent source of information for the security professional and novice alike. What will you learn from this book Install and set up BackTrack 5 on multiple platforms Customize BackTrack to fit your individual needs Exploit vulnerabilities found with Metasploit Locate vulnerabilities Nessus and OpenVAS Provide several solutions to escalate privileges on a compromised machine Learn how to use BackTrack in all phases of a penetration test Crack WEP/WPA/WPA2 Encryption Learn how to monitor and eavesdrop on VOIP networks Approach This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes. Who this book is written for This book is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers. Download E-Book Uploaded Link [Hidden Content]
  10. Book Details Paperback: 185 pages Publisher:Â Jesse Storimer (October 2012) Language: English ISBN-10:n/a ISBN-13: n/a File Size: 919.8 KB Do you know how your web server opens a socket, binds to an address, and accepts a connection? I did a lot of web programming before I had enough knowledge to dig in and figure this stuff out. I knew that other developers had a better grasp on the full stack than I did, but diving deep under the hood is one of the things that really made me a better developer all around. I recently read a great thread that asked “What did the really successful programmers do differently?”. This response really caught my eye: Be ready, willing, & able to deep dive multiple levels at any time. You must know what’s going on under the hood. There is a strong correlation between “number of levels of deepness understood” and “programming prowess”. In this book I’ll teach you these fundamentals using Ruby. I’ll start with the fundamentals that are portable to any environment. Then I’ll show you the beautiful abstractions that Ruby has layered on top of them. Learning this stuff doesn’t just apply to Ruby, or any other language. Every modern programming language has support for networking. Every language has their own way of doing things. But all modern languages support the Berkeley Sockets API. Ruby is no exception. There’s certainly plenty of syntactic sugar, but below the sugar you can use the same Sockets API that you would in C, Java, Python, whatever. This is portable knowledge that will serve you for many years to come. What you’ll learn: The steps in the lifecycle of servers and clients. The various ways that we can read and write data in Ruby, and when they’re appropriate. All the things you were never quite sure about: EOF, listen queues, TCPNODELAY, and tons more. The low level methods required for constructing sockets, as well as the syntactic sugar that Ruby provides. Known methods that will help you improve socket performance. Basics of SSL sockets. Should you write a lot of data at once or chunk it into smaller writes? Get comfortable with the socket programming API that’s available in any modern programming language. More example code than you shake a stick at! A look at 6 different architecture patterns for building concurrency into your network programs. A closer look at a few different protocols: FTP and Redis. Multiplexing connections, non-blocking IO, socket timeouts, socket options, and more… Download E-Book Uploaded Link [Hidden Content]
  11. Book Details Paperback: 364 pages Publisher: Packt Publishing (March 2012) Language: English ISBN-10:1849515468 ISBN-13: 978-1849515467 File Size: 17.3 MB web2py is a free open source full-stack framework for rapid development of fast, scalable, secure and portable database-driven web-based applications. It is written and programmable in Python, and straightforward to run. web2py implements Model-View-Controller design, server-side form validation, and postbacks that make the code more readable, scalable, and maintainable. Are you familiar with web2py, and interested in gaining more advanced knowledge? web2py Application Development Cookbook gives you the necessary knowledge to make you a web2py expert. Right from teaching you about the database abstraction layer to adding AJAX effects to recipes about recipe, the book will make you a master of web2py through advanced practical recipes without any drudgery or straining the brain. web2py Application Development Cookbook is the tool you will need to expand and enhance your web2py skills. This book begins with teaching you running web2py in various different systems followed by building simple applications. It focuses on database abstraction layer next and then explains building advanced forms. Adding stunning AJAX effects, using third party libraries and recipes on web services follow. Advanced recipes on authentication and authorization are taught and then routing and reporting recipes claim your attention. There is a final wrap-up with useful, interesting tips and tricks which you will really enjoy. In short, this book will make you an expert in web2py in a trouble-free, quick, and easy manner. What you will learn from this book Install web2py on windows from source code and run it on Apache, Lighttpd, and Nginx servers Build simple applications such as a contacts applications and a facebook clone Create a new model and batch upload your data Embed multiple forms in one page and create multi-table forms Improve the built-in AJAX function and AJAXify your search functions Generate PDF reports and charts Consume JSON service and integrate Paypal with web2py Debug with eclipse and PyDev, learn to build your own plugin Approach This is a cookbook and you may read the chapters in any order. The recipes need not be read sequentially. There are a good amount of code examples and relevant screenshots to ease learning pains. Who this book is for The target audience are Python developers with basic knowledge of web2py who want to gain further knowledge of web2py. Download E-Book Uploaded Link [Hidden Content]
  12. Book Details Hardcover: 1616 pages Publisher: No Starch Press (October 2005) Language: English ISBN-10:159327047X ISBN-13: 978-1593270476 File Size: 46.5 MB From Charles M. Kozierok, the creator of the highly regarded www.pcguide.com, comes The TCP/IP Guide. This completely up-to-date, encyclopedic reference on the TCP/IP protocol suite will appeal to newcomers and the seasoned professional alike. Kozierok details the core protocols that make TCP/IP internetworks function and the most important classic TCP/IP applications, integrating IPv6 coverage throughout. Over 350 illustrations and hundreds of tables help to explain the finer points of this complex topic. The book’s personal, user-friendly writing style lets readers of all levels understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet, and much more. The TCP/IP Guide is a must-have addition to the libraries of internetworking students, educators, networking professionals, and those working toward certification. Table of Contents SECTION I: TCP/IP OVERVIEW AND BACKGROUND INFORMATION PART I-1: NETWORKING FUNDAMENTALS Chapter 1: Networking Introduction, Characteristics and Types Chapter 2: Network Performance Issues and Concepts Chapter 3: Network Standards and Standards Organizations Chapter 4: A Review of Data Representation and the Mathematics of Computing PART I-2: THE OPEN SYSTEM INTERCONNECTION (OSI) REFERENCE MODEL Chapter 5: General OSI Reference Model Issues and Concepts Chapter 6: OSI Reference Model Layers Chapter 7: OSI Reference Model Summary PART I-3: TCP/IP PROTOCOL SUITE AND ARCHITECTURE Chapter 8: TCP/IP Protocol Suite and Architecture SECTION II: TCP/IP LOWER-LAYER CORE PROTOCOLS PART II-1: TCP/IP NETWORK INTERFACE LAYER PROTOCOLS Chapter 9: TCP/IP Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) Overview and Fundamentals Chapter 10: PPP Core Protocols: Link Control, Network Control, and Authentication Chapter 11: PPP Feature Protocols Chapter 12: PPP Protocol Frame Formats PART II-2: TCP/IP NETWORK INTERFACE/INTERNET LAYER CONNECTION PROTOCOLS Chapter 13: Address Resolution and the TCP/IP Address Resolution Protocol (ARP) Chapter 14: Reverse Address Resolution and the TCP/IP Reverse Address Resolution Protocol (RARP) PART II-3: INTERNET PROTOCOL VERSION 4 (IP/IPV4) Chapter 15: Internet Protocol Versions, Concepts and Overview Chapter 16: IPv4 Addressing Concepts and Issues Chapter 17: IP “Classful” (Conventional) Addressing Chapter 18: IP Subnet Addressing (Subnetting) Concepts Chapter 19: IP Subnetting Practical Subnet Design and Address Determination Example Chapter 20: IP Classless Addressing: Classless Inter-Domain Routing (CIDR)/Supernetting Chapter 21: Internet Protocol Datagram Encapsulation and Formatting Chapter 22: IP Datagram Size, Fragmentation, and Reassembly Chapter 23: IP Routing and Multicasting PART II-4: INTERNET PROTOCOL VERSION 6 (IPV6) Chapter 24: IPv6 Overview, Changes, and Transition Chapter 25: IPv6 Addressing Chapter 26: IPv6 Datagram Encapsulation and Formatting Chapter 27: IPv6 Datagram Size, Fragmentation, Reassembly, and Routing PART II-5: IP-RELATED FEATURE PROTOCOLS Chapter 28: IP Network Address Translation (NAT) Protocol Chapter 29: IP Security (IPSec) Protocols Chapter 30: Internet Protocol Mobility Support (Mobile IP) PART II-6: IP SUPPORT PROTOCOLS (ICMP AND ND) Chapter 31: ICMP Concepts and General Operation Chapter 32: ICMPv4 Error Message Types and Formats Chapter 33: ICMPv4 Informational Message Types and Formats Chapter 34: ICMPv4 Error Message Types and Formats Chapter 35: ICMPv4 Iformational Message Types and Formats Chapter 36: IPv6 Neighbor Discovery (ND) Protocol PART II-7: TCP/IP ROUTING PROTOCOLS (GATEWAY PROTOCOLS) Chapter 37: Overview Of Key Routing Protocol Concepts Chatper 38: Routing Information Protocol (RIP, RIP-2, and RIPLNG) Chapter 39: Open Shortest Path First (OSPF) Chapter 40: Border Gateway Protocol (BGP/BGP-4) Chapter 41: Other Interior Routing Protocols PART II-8: TCP/IP TRANSPORT LAYER PROTOCOLS Chapter 42: Overview and Comparison of TCP and UDP Chapter 43: TCP and UDP Addressing: Ports and Sockets Chapter 44: TCP/IP User Datagram Protocol (UDP) Chapter 45: TCP Overview, Functions, and Characteristics Chapter 46: Transmission Control Protocol (TCP) Fundamentals and General Operation Chapter 47: TCP Basic Operation: Connection Establishment, Management, and Termination Chapter 48: TCP Message Formatting and Data Transfer Chapter 49: TCP Reliability and Flow Control Features SECTION III: TCP/IP APPLICATION LAYER PROTOCOLS PART III-1: NAME SYSTEMS AND TCP/IP NAME REGISTRATION AND NAME RESOLUTION Chapter 50: Name System Issues, Concepts, and Techniques Chapter 51: TCP/IP Name Systems Overview and the Host Tables Name System Chapter 52: Domain Name System (DNS) Overview, Functions, and Characteristics Chapter 53: DNS Name Space, Architecture, and Terminology Chapter 54: DNS Name Registration, Public Administration, Zones, and Authorities Chapter 55: DNS Name Server Concepts and Operation Chapter 56: DNS Resolution Concepts and Resolver Operations Chapter 57: DNS Messaging and Message, Resource Record, and Master File Formats PART III-2: NETWORK FILE AND RESOURCE SHARING PROTOCOLS AND THE TCP/IP NETWORK FILE SYSTEM (NFS) Chapter 58: Network File and Resource Sharing and the TCP/IP Network File System (NFS) PART III-3: HOST CONFIGURATION AND TCP/IP HOST CONFIGURATION PROTOCOLS (BOOTP AND DHCP) Chapter 59: Host Configuration Concepts, Issues, and Motivation Chapter 60: TCP/IP Bootstrap Protocol (BOOTP) Chapter 61: DHCP Address Allocation Concepts Chapter 62: DHCP Configuration and Operation Chapter 63: DHCP Messaging, Message Types, and Formats Chapter 64: DHCP Client/Server Implementation, Features, and IPV6 Support PART III-4: TCP/IP NETWORK MANAGEMENT FRAMEWORK AND PROTOCOLS (SNMP AND RMON) Chapter 65: TCP/IP Internet Standard Management Framework Overview Chapter 66: TCP/IP Structure of Management Information (SMI) and Management Information Bases (MIBs) Chapter 67: TCP/IP Simple Network Management Protocol (SNMP) Concepts and Operation Chapter 68: SNMP Protocol Messaging and Message Formats Chapter 69: TCP/IP Remote Network Monitoring (RMON) PART III-5: TCP/IP APPLICATION LAYER ADDRESSING AND APPLICATION CATEGORIES Chapter 70: TCP/IP Application Layer Addressing: Uniform Resource Identifiers, Locators, and Names (URIs, URLs and URNs) Chapter 71: File and Message Transfer Overview and Application Categories PART III-6: TCP/IP GENERAL FILE TRANSFER PROTOCOLS (FTP AND TFTP) Chapter 72: File Transfer Protocol (FTP) Chapter 73: Trivial File Transfer Protocol (TFTP) PART III-7: TCP/IP ELECTRONIC MAIL SYSTEM: CONCEPTS AND PROTOCOLS Chapter 74: TCP/IP Electronic Mail System Overview and Concepts Chapter 75: TCP/IP Electronic Mail Addresses and Addressing Chapter 76: TCP/IP Electronic Mail Message Formats and Message Processing: RFC 822 and MIME 1245 Chapter 77: TCP/IP Electronic Mail Delivery Protocol: The Simple Mail Transfer Protocol (SMTP) Chapter 78: TCP/IP Electronic Mail Access and Retrieval Protocols and Methods PART III-8: TCP/IP WORLD WIDE WEB AND THE HYPERTEXT TRANSFER PROTOCOL (HTTP) Chapter 79: World Wide Web and Hypertext Overview and Concepts Chapter 80: HTTP General Operation and Connections Chapter 81: HTTP Messages, Methods, and Status Codes Chapter 82: HTTP Message Headers Chapter 83: HTTP Entities, Transfers, Coding Methods, and Content Management Chapter 84: HTTP Features, Capabilities, and Issues PART III-9: OTHER FILE AND MESSAGE TRANSFER APPLICATIONS Chapter 85: Usenet (Network News) and the TCP/IP Network News Transfer Protocol (NNTP) Chapter 86: Gopher Protocol (Gopher) PART III-10: INTERACTIVE AND ADMINISTRATIVE UTILITIES AND PROTOCOLS Chapter 87: TCP/IP Interactive and Remote Application Protocols Chapter 88: TCP/IP Administration and Troubleshooting Utilities and Protocols Download E-Book Uploaded Link [Hidden Content]
  13. Book Details Hardcover: 370 pages Publisher: Wiley; 2nd Edition (February 2012) Language: English ISBN-10:1119994357 ISBN-13: 978-1119994350 File Size: 4.8 MB system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protocols and solve the challenge of massive scalability of machine-to-machine communication for mission-critical applications, based on the next generation machine-to-machine ETSI M2M architecture. The authors demonstrate, using the example of the smartgrid use case, how the next generation utilities, by interconnecting and activating our physical environment, will be able to deliver more energy (notably for electric vehicles) with less impact on our natural resources. Key Features: Offers a comprehensive overview of major existing M2M and AMI protocols Covers the system aspects of large scale M2M and smart grid applications Focuses on system level architecture, interworking, and nationwide use cases Explores recent emerging technologies: 6LowPAN, ZigBee SE 2.0 and ETSI M2M, and for existing technologies covers recent developments related to interworking Relates ZigBee to the issue of smartgrid, in the more general context of carrier grade M2M applications Illustrates the benefits of the smartgrid concept based on real examples, including business cases This book will be a valuable guide for project managers working on smartgrid, M2M, telecommunications and utility projects, system engineers and developers, networking companies, and home automation companies. It will also be of use to senior academic researchers, students, and policy makers and regulators. Download E-Book Uploaded Link [Hidden Content]
  14. Book Details Paperback: 528 pages Publisher: Prentice Hall; 5th Edition (June 2012) Language: English ISBN-10:0137058918 ISBN-13: 978-0137058914 File Size: 39.8 MB A Completely Revised Bestseller with an Updated Industry Overview and New Coverage of Mobile Networks, LTE, Spectrum, Cloud Computing, and More! The #1 Telecom Guide for Businesspeople and Nontechnical Professionals, Fully Updated for Cloud Services, Social Media, and Advanced Mobile Networks Completely updated for the newest trends and technologies, The Essential Guide to Telecommunications, Fifth Edition, is the world’s top-selling nontechnical guide to today’s fast-changing telecommunications industry. More than 170,000 copies of previous editions are in print, and this indispensible resource has been translated into nine languages. Writing in plain language, Dodd demystifies today’s most significant technologies, standards, and architectures. She introduces the industry-leading providers worldwide, explains where they fit in a fast-changing marketplace, and presents their key strategies. Coverage includes Assessing the massive business and technical implications of the cloud computing revolution How traffic from ubiquitous tools like Skype, Facebook, and smartphones are transforming networks Understanding recent radical changes in data centers How mobile carriers are balancing performance and cost in timing 4G upgrades How new concerns about regulation, security, and privacy are reshaping the industry This indispensable guide provides everything you need to know about telecommunications now-whether you’re a salesperson, marketer, investor, or customer. Review Praise for The Essential Guide to Telecommunications “Dodd’s The Essential Guide to Telecommunications provides the history and context that make a fundamental underpinning of modern business more accessible to technologists and businesspeople alike. This new edition of her primer is an essential reference in the continuously evolving communications landscape.” -Tom Hopcroft, President and CEO, Mass Technology Leadership Council “Annabel Dodd has created a mainstay resource in The Essential Guide to Telecommunications. All editions have been written in such a way that nonengineers and engineers alike will benefit from reading. She does the BEST job that I have seen in assimilating all of the changes that are constantly occurring in the telecommunications industry, both technical and regulatory, into one text. When I walk through telecommunications offices, I always see various editions of her book on multiple shelves. If you want one book that provides a concise and encompassing view of telecommunications, THIS is it!” -Ronny Puckett, Southwest Region Director, National Exchange Carrier Association “I have used previous editions of The Essential Guide to Telecommunications for some time in my introductory courses in our Information and Telecommunications Systems degree program. As this is a stand-alone IT degree program, we need a textbook with broad coverage of technical, management, and regulatory/policy topics. The Essential Guide to Telecommunications provides that coverage in an accessible and accurate manner. It is one of a very small number of books that I have been comfortable using as a required text in my courses.” -Hans Kruse, Professor of Information and Telecommunications Systems, Ohio University “Like many words in our ”˜high-tech,’ ”˜hard sell,’ ”˜order now’ society today, the word ”˜essential’ becomes worn and overused. However, in the case of Annabel Dodd’s The Essential Guide to Telecommunications, there is no other word that describes the impact and critical importance of this definitive work. For everyone from laymen in IT and new technologists to experienced network and telecom engineers, this book is a must-have, and therefore essential.” -Bob Warren, IT Infrastructure Analyst, Parsons “The Essential Guide to Telecommunications is probably one of the most useful and well-written books on our telecom bookshelf. Annabel Z. Dodd does a great job of capturing a snapshot of the current telecom industry. Even those with little or no technical training should be able to understand the text. This is the perfect book for salespeople who want to learn more about the products and services they are selling, or for those who just want to keep up to date on the latest in telecom technology.” -William Van Hefner, President, Vantek Communications, Inc. “The Essential Guide to Telecommunications is a fine guide to the field, readable by anyone, useful to everyone. As a first guide to the field, as a reference, and as a commentary on the history and strategy of telecommunications, it is simply superb.” -Andrew Allentuck, Columnist, Financial Post, Toronto “Ms. Dodd continues to provide an excellent and thorough text on the telecommunications industry. As in her previous editions, she presents a good balance of technical and business-related information that is readily understandable by anyone with an interest in this key component of today’s business environment. In her new edition, she has captured many of the recent changes in this dynamic field, which will affect every company in the years ahead. I strongly recommend her book to anyone who wants a better understanding of telecommunications.” -Joe McGrath, SVP, Information Technologies, Sunovion Pharmaceuticals, Inc. “Dodd’s work has been very helpful in the past in taking complex technical topics and translating them into actionable business items for my MBA students. Her book doesn’t gloss over the details, but rather explains why they are important in the twenty-first century information age.” -Andrew Urbaczewski, Ph.D., Chair, Department of Management Studies, Associate Professor of MIS, College of Business, University of Michigan-Dearborn Table of Contents Part I: Enabling Technologies, Data Centers, and VoIP PBXs Chapter 1. Computing and Enabling Technologies Chapter 2. Data Centers and IP Private Branch Exchanges Part II: Industry Overview Chapter 3. Competition, Industry Structures, and Regulations Part III: Wide Area Networks and the Internet Chapter 4. Carrier Networks Chapter 5. Broadband and Wide Area Network Services Chapter 6. The Internet Part IV: Mobile Networks and Mobile Carriers Worldwide Chapter 7. Mobile and Wi-Fi Networks Chapter 8. Mobile Carriers Worldwide Download E-Book Uploaded Link [Hidden Content]
  15. Book Details Hardcover: 1056 pages Publisher: Addison-Wesley Professional; 2nd Edition (November 2011) Language: English ISBN-10:0321336313 ISBN-13: 978-0321336316 File Size: 74.8 MB “For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.” -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There’s no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens’ classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP’s core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP’s structure and function from the bottom up: from link layer protocols such as Ethernet and Wi-Fi through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. Review “What makes this book unique, in my estimation, is the level of detail and attention to history. It provides background and a sense for the ways in which solutions to networking problems have evolved. It is relentless in its effort to achieve precision and to expose remaining problem areas. For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable. The authors deserve credit for a thorough rendering of the technology of today’s Internet.” -Vint Cerf “This is sure to be the bible for TCP/IP developers and users. Within minutes of picking up the text, I encountered several scenarios that had tripped up both my colleagues and myself in the past. Stevens reveals many of the mysteries once held tightly by the ever-elusive networking gurus. Having been involved in the implementation of TCP/IP for some years now, I consider this by far the finest text to date.” -Robert A. Ciampa, network engineer, Synernetics, division of 3COM “While all of Stevens’ books are readable and technically excellent, this new opus is awesome. Although many books describe the TCP/IP protocols, Stevens provides a level of depth and real-world detail lacking from the competition. He puts the reader inside TCP/IP using a visual approach and shows the protocols in action.” -Steven Baker, networking columnist, Unix Review “TCP/IP Illustrated, Volume 1, is an excellent reference for developers, network administrators, or anyone who needs to understand TCP/IP technology. TCP/IP Illustrated is comprehensive in its coverage of TCP/IP topics, providing enough details to satisfy the experts while giving enough background and commentary for the novice.” -Bob Williams, vice president, Marketing, NetManage, Inc. “. . . [T]he difference is that Stevens wants to show as well as tell about the protocols. His principal teaching tools are straightforward explanations, exercises at the ends of chapters, byte-by-byte diagrams of headers and the like, and listings of actual traffic as examples.” -Walter Zintz, UnixWorld “Much better than theory only. . . . W. Richard Stevens takes a multihost-based configuration and uses it as a travelogue of TCP/IP examples with illustrations. TCP/IP Illustrated, Volume 1, is based on practical examples that reinforce the theory-distinguishing this book from others on the subject, and making it both readable and informative.” -Peter M. Haverlock, consultant, IBM TCP/IP Development “The diagrams he uses are excellent and his writing style is clear and readable. In sum, Stevens has made a complex topic easy to understand. This book merits everyone’s attention. Please read it and keep it on your bookshelf.” -Elizabeth Zinkann, sys admin “W. Richard Stevens has produced a fine text and reference work. It is well organized and very clearly written with, as the title suggests, many excellent illustrations exposing the intimate details of the logic and operation of IP, TCP, and the supporting cast of protocols and applications.” -Scott Bradner, consultant, Harvard University OIT/NSD Download E-Book Uploaded Link [Hidden Content]
  16. Book Details Paperback: 384 pages Publisher: Cisco Press (June 2008) Language: English ISBN-10:1587052423 ISBN-13: 978-1587052422 File Size: 18.7 MB Cisco® SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection. SSL Remote Access VPNs provides you with a basic working knowledge of SSL virtual private networks on Cisco SSL VPN-capable devices. Design guidance is provided to assist you in implementing SSL VPN in existing network infrastructures. This includes examining existing hardware and software to determine whether they are SSL VPN capable, providing design recommendations, and guiding you on setting up the Cisco SSL VPN devices. Common deployment scenarios are covered to assist you in deploying an SSL VPN in your network. SSL Remote Access VPNs gives you everything you need to know to understand, design, install, configure, and troubleshoot all the components that make up an effective, secure SSL VPN solution. Jazib Frahim, CCIE® No. 5459, is currently working as a technical leader in the Worldwide Security Services Practice of the Cisco Advanced Services for Network Security. He is responsible for guiding customers in the design and implementation of their networks, with a focus on network security. He holds two CCIEs, one in routing and switching and the other in security. Qiang Huang, CCIE No. 4937, is a product manager in the Cisco Campus Switch System Technology Group, focusing on driving the security and intelligent services roadmap for market-leading modular Ethernet switching platforms. During his time at Cisco, Qiang has played an important role in a number of technology groups, including the Cisco TAC security and VPN team, where he was responsible for trouble-shooting complicated customer deployments in security and VPN solutions. Qiang has extensive knowledge of security and VPN technologies and experience in real-life customer deployments. Qiang holds CCIE certifications in routing and switching, security, and ISP Dial. Understand remote access VPN technologies, such as Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPsec), Layer 2 Forwarding (L2F), Layer 2 Tunneling (L2TP) over IPsec, and SSL VPN Learn about the building blocks of SSL VPN, including cryptographic algorithms and SSL and Transport Layer Security (TLS) Evaluate common design best practices for planning and designing an SSL VPN solution Gain insight into SSL VPN functionality on Cisco Adaptive Security Appliance (ASA) and Cisco IOS® routers Install and configure SSL VPNs on Cisco ASA and Cisco IOS routers Manage your SSL VPN deployment using Cisco Security Manager This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Download E-Book Uploaded Link [Hidden Content]
  17. Book Details Paperback: 118 pages Publisher: Springer (July 2012) Language: English ISBN-10:1447142004 ISBN-13: 978-1447142003 File Size: 1.7 MB The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required. Despite being developed in parallel, and with minor direct connections perceived between them, self-* properties and P2P can be used concurrently. In Self-* and P2P for Network Management: Design Principles and Case Studies, the authors explore the issues behind the joint use of self-* properties and P2P, and present: a survey relating autonomic computing and self-* properties, P2P, and network and service management; the design of solutions that explore parallel and cooperative behavior of management peers; the change in angle of network management solution development from APIs, protocols, architectures, and frameworks to the design of management algorithms. Table of Contents Foreword. Preface. Introduction. State of the Art. Principles of the Self * P2P Design. Case Study I: Reliability of Monitoring Platforms. Case Study II: Resource Management of Network Virtualization. Results Discussion. Conclusions. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  18. Book Details Paperback: 544 pages Publisher: Sams; 5th Edition (October 2011) Language: English ISBN-10:0672335719 ISBN-13: 978-0672335716 File Size: 21.6 MB In just 24 sessions of one hour or less, you’ll discover how to implement, monitor, and manage a TCP/IP network even the latest cloud-based and IPv6 networks. Using this book’s straightforward, step-by-step approach, you’ll uncover the essentials of TCP/IP and put that knowledge to work through practical examples. Each lesson builds on what you’ve already learned, giving you a strong real-world foundation for success. Expert author and network engineer Joe Casad guides you from the basics to advanced techniques-including TCP/IP’s architecture, layers, subnetting, CIDR, routing, security, utilities, remote access, web services, streaming, and much more. Practical discussions provide an inside look at TCP/IP components and protocols. Step-by-step instructions walk you through many common tasks. Q&As at the end of each hour help you test your knowledge. Notes and tips point out shortcuts and solutions and help you steer clear of potential problems. If you’re looking for a smart, concise introduction to the protocols that power the Internet, start your clock and look inside. Sams Teach Yourself TCP/IP in 24 Hours is your guide to the secrets of TCP/IP. Learn how to”¦ Understand what TCP/IP is, and how it works Discover how IPv6 differs from IPv4, and how to migrate or coexist with IPv6 Work with TCP/IP’s Network Access, Internet, Transport, and Application layers Implement flexible addressing with subnetting and CIDR Establish efficient and reliable routing Implement name resolution Secure TCP/IP networks-detect and prevent attacks Automatically configure TCP/IP clients and hosts Provide classic TCP/IP services and powerful new Web services Use TCP/IP in advanced cloud-based environments Support efficient media streaming and webcasting Capitalize on the benefits of the new HTML5 standard Run TCP/IP protocols over wireless networks Troubleshoot TCP/IP networks with ping, traceroute, and other tools Provide for monitoring and remote access Deploy efficient email systems with POP3, IMAP4, and SMTP Walk through all facets of implementing a TCP/IP network Download E-Book Uploaded Link [Hidden Content]
  19. Book Details Paperback: 92 pages Publisher: O’Reilly Media (December 2012) Language: English ISBN-10:1449339328 ISBN-13: 978-1449339326 File Size: 7.1 MB Puppet’s true power exists in the simple resource model it uses to manage the state of complex operating systems. This concise guide shows you how to extend that model and implement custom functionality on top of Puppet by working with the type and provider APIs. Two experts from Puppet Labs explain the concepts behind these APIs, and provide instructions and examples to help you write your own fully functional types and providers. You’ll also delve into Puppet’s source code to get a better understanding of how types and providers are implemented internally. If you’re familiar with basic Puppet concepts, you’re ready to get started. Learn the fundamental concepts behind resources, and become familiar with the structure of Puppet’s Resource Model Discover how the type API is used to create new resource types that Puppet can manage Understand how providers interact with the system to achieve the desired state of a declared resource Explore advanced features to get a more complete understanding of how Puppet works Simplify the troubleshooting process when developing types and providers Table of Contents Chapter 1. Puppet Resources Chapter 2. Types Chapter 3. Providers Chapter 4. Advanced Types and Providers Appendix A. Installing Puppet Appendix B. Modules Appendix C. Troubleshooting and Debugging Download E-Book Uploaded Link [Hidden Content]
  20. Book Details Hardcover: 810 pages Publisher: Wiley (December 2011) Language: English ISBN-10:0470744316 ISBN-13: 978-0470744314 File Size: 6.4 MB Addressing the fundamental technologies and theories associated with designing complex communications systems and networks, Principles of Communications Networks and Systemsprovides models and analytical methods for evaluating their performance. Including both the physical layer (digital transmission and modulation) and networking topics, the quality of service concepts belonging to the different layers of the protocol stack are interrelated to form a comprehensive picture. The book is designed to present the material in an accessible but rigorous manner. It jointly addresses networking and transmission aspects following a unified approach and using a bottom up style of presentation, starting from requirements on transmission links all the way up to the corresponding quality of service at network and application layers. The focus is on presenting the material in an integrated and systematic fashion so that students will have a clear view of all the principal aspects and of how they interconnect with each other. A comprehensive introduction to communications systems and networks, addressing both network and transmission topics Structured for effective learning, with basic principles and technologies being introduced before more advanced ones are explained Features examples of existing systems and recent standards as well as advanced digital modulation techniques such as CDMA and OFDM Contains tools to help the reader in the design and performance analysis of modern communications systems Provides problems at the end of each chapter, with answers on an accompanying website Table of Contents Chapter 1. Introduction to Telecommunication Services, Networks and Signaling Chapter 2. Deterministic and Random Signals Chapter 3. Sources of Digital Information Chapter 4. Characterization of Transmission Media and Devices Chapter 5. Digital Modulation Systems Chapter 6. Channel Coding and Capacity Chapter 7. Markov Chains Theory Chapter 8. Queueing Theory Chapter 9. Data Link Layer Chapter 10. Network Layers Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  21. Book Details Paperback: 272 pages Publisher: Apress (April 2012) Language: English ISBN-10:1430236809 ISBN-13: 978-1430236801 File Size: 33.7 MB The emergence of the cloud and modern, fast corporate networks demands that you perform judicious balancing of computational loads. Practical Load Balancing presents an entire analytical framework to increase performance not just of one machine, but of your entire infrastructure. Practical Load Balancing starts by introducing key concepts and the tools you’ll need to tackle your load-balancing issues. You’ll travel through the IP layers and learn how they can create increased network traffic for you. You’ll see how to account for persistence and state, and how you can judge the performance of scheduling algorithms. You’ll then learn how to avoid performance degradation and any risk of the sudden disappearance of a service on a server. If you’re concerned with running your load balancer for an entire network, you’ll find out how to set up your network topography, and condense each topographical variety into recipes that will serve you in different situations. You’ll also learn about individual servers, and load balancers that can perform cookie insertion or improve your SSL throughput. You’ll also explore load balancing in the modern context of the cloud. While load balancers need to be configured for high availability once the conditions on the network have been created, modern load balancing has found its way into the cloud, where good balancing is vital for the very functioning of the cloud, and where IPv6 is becoming ever more important. You can read Practical Load Balancing from end to end or out of sequence, and indeed, if there are individual topics that interest you, you can pick up this book and work through it once you have read the first three chapters. What you’ll learn Judge network load balancing algorithms and when to use them Plan your network for optimal load balancing performance Configure single servers to take advantage of modern load balancing software Learning to use load balancing software like HAproxy, STunnel etc. Become familiar with implications of IPv6 and the cloud Improve SSL throughput and seamless application cookie insertion Who this book is for Network engineers, developers and IT managers. Table of Contents Part I: Getting Started Chapter 1. Introduction Chapter 2. How websites work: what makes them slow Chapter 3. Content Caching: keeping the load light Chapter 4. DNS based load balancing Chapter 5. Content Delivery Networks Chapter 6. Planning for Performance and Reliability Part II: Load Balancing Essentials Chapter 7. Essential concepts you need to know Chapter 8. HTTP load balancing Chapter 9. Database load balancing Chapter 10. Load balancing your network connection Chapter 11. SSL Load Balancing Part III: Load balancing situations Chapter 12. Clustering the Load Balancers for High Availability Chapter 13. Load balancing in the cloud Chapter 14. IPv6: Implications and concepts Chapter 15. Where to go next… Appendix. Common Terms and Concepts Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  22. Book Details Paperback: 464 pages Publisher: Apress (January 2012) Language: English ISBN-10:1430241586 ISBN-13: 978-1430241584 File Size: 17.0 MB This book introduces the tools you’ll need to program with the packetC language. packetC speeds the development of applications that live within computer networks, the kind of programs that provide network functionality for connecting “clients” and “servers” and “clouds.” The simplest examples provide packet switching and routing while more complex examples implement cyber security, broadband policies or cloud-based network infrastructure. Network applications, such as those processing digital voice and video, must be highly scalable, secure and maintainable. Such application requirements translate to requirements for a network programming language that leverages massively-parallel systems and ensures a high level of security, while representing networking protocols and transactions in the simplest way possible. packetC meets these requirements with an intuitive approach to coarse-grained parallelism, with strong-typing and controlled memory access for security and with new data types and operators that express the classic operations of the network-oriented world in familiar programming terms. No other language has addressed the full breadth of requirements for tractable parallelism, secure processing and usable constructs.The packetC language is growing in adoption and has been used to develop solutions operating in some of the world’s largest networks. This important new language, packetC, has now been successfully documented in this book, in which the language’s authors provide the materials and tools you’ll need in a readable and accessible form. What you’ll learn This book is the primary document specifying the language from a developer’s point of view and act as the formal language user’s guide. It covers: How to program applications in packetC. The parallel programming model of packetC Deviations from C99 and the unique aspects of packetC How to leverage existing C code and the applicability of the C standard libraries Who this book is for packetC Programming is written for a wide variety of potential programmers. Most importantly, it’s for people who need to use packetC to program for the Internet backbone. Still, knowledge of the packetC language will help a much wider array of programmers who need to write effective code that will be optimized for the cloud and work effectively and efficiently through complex network structures. Finally, readers will learn about how and why packetC is needed, and to better understand the technologies, standards and issues surrounding the ‘net. If you really want to understand this level of programming, this book is a must-have! Table of Contents Part 1: packetC Background Chapter 1: Origins of packetC Chapter 2: Introduction to packetC Language Chapter 3: Style Guidelines for packetC Programs Chapter 4: Construction of a packetC Program Part 2: Language Reference Chapter 5: Variables-Identifiers, Basic Scalar Data Types, and Literals Chapter 6: Data Initialization and Mathematical Expressions Chapter 7: Functions Chapter 8: packetC Data Type Fundamentals Chapter 9: C-Style Data Types Chapter 10. Basic Packet Interaction and Operations Chapter 11. Selection Statements Chapter 12. Loops and Flow Control Chapter 13. Exception Handling Chapter 14. Databases Types and Operations Chapter 15. Search Set Types and Operations Chapter 16. Reference Type and Operations Chapter 17. Lock and Unlock Operators Chapter 18. Packet Information Block and System Packet Operations Chapter 19. Descriptor Type and Operations Part 3: Developing Applications Chapter 20. Control Plane and System Interaction Chapter 21. packetC Pre-Processor Chapter 22. Pragmas and Other Key Compiler Directives Chapter 23. Developing Large Applications in packetC Chapter 24. Construction of a packetC Executable Chapter 25. packetC Standard Networking Descriptors Chapter 26. Developing For Performance Chapter 27. Standard Libraries Part 4: Industry Reprints Appendix A. Reference Tables Appendix B. Open Systems Vendors for packetC Appendix C. Glossary Appendix D. CloudShield Products Supporting packetC Download E-Book Uploaded Link [Hidden Content]
  23. Book Details Paperback: 912 pages Publisher: For Dummies; 5th Edition (November 2012) Language: English ISBN-10:1118380983 ISBN-13: 978-1118380987 File Size: 18.6 MB The bestselling guide for network administrators, fully updated for Windows 8 If you’re responsible for a network, large or small, this book is your one-stop resource for all the essential details you need to know. Fully updated to cover Windows 8 and Windows Server 2012, it features the latest on broadband technologies, storage, backup procedures, and all the current networking trends. Nine handy minibooks cover the basics, building a network, administration and security, TCP/IP and the Internet, wireless networking, mobile networking, Windows Server 2012, using other Windows servers, and managing Linux systems. A proven bestseller, with more than 111,000 copies sold in four previous editions Written by veteran IT expert Doug Lowe, who has more than 50 technology books to his credit Provides one-stop shopping for everything networking professionals need to keep large or small networks functioning efficiently Updated with the latest information on building and administering a network, security, wireless and mobile networking, using Windows servers, working with Linux systems, and much more Networking All-in-One For Dummies, 5th Edition provides what network administrators need to know in a handy, easy-to-use reference. From the Back Cover Handling a network? This one handy book covers all the essentials you need to know! If you’re in charge of a network, here’s all the basic information you need to get it up and running and keep it, and your users, happy. Neatly divided into self-contained minibooks so you can quickly find what you need, this new edition covers the latest on mobile networking, Windows Server 2012, security, and much more, in one convenient package! Networking 101 - if you’re new to networking, here’s an overview of standards, hardware, network operating systems, and other essentials Get started - create a plan, install the hardware and operating system, configure Windows, and explore VMWare® Administrative tasks - keep software updated, manage user accounts, and implement solid security Internet access - learn the ins and outs of TCP/IP Skip the wires - set up, secure, and troubleshoot a wireless network Smartphone smarts - safely manage iPhones, iPads, Android phones, BlackBerry devices, and netbooks on your network Serving up servers - learn about the latest version of Windows Server 2012, IIS Web Server, Exchange Server 2010, and others Love Linux - all about installing, managing, and configuring Linux for networking Open the book and find: Network protocols and standards How virtualization technologies help manage servers The five most common network bottlenecks All about DHCP and DNS Security tips for wireless networks How to configure VPN access What Active Directory® does for you Basic Linux network configuration 9 books in 1 Networking Basics Building a Network Network Administration and Security TCP/IP and the Internet Wireless Networking Mobile Networking Windows Server® 2012 Reference Using Other Windows Servers Managing Linux Systems Download E-Book Uploaded Link [Hidden Content]
  24. Book Details Hardcover: 362 pages Publisher: Springer (July 2012) Language: English ISBN-10:1441967680 ISBN-13: 978-1441967688 File Size: 7.3 MB Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the “next-generation” Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. Table of Contents Part I: Foundations of Network Embedded Management and Applications Chapter 1. Motivation: The Dawn of the Age of Network Embedded Applications Chapter 2. A Brief History of Network Programmability and Related Fields Chapter 3. Network Embedded Management Chapter 4. Improving Manageability through Network Embedded Management Part II: Infrastructure, Case Studies, Research Areas Chapter 5. On the Relevance and Adoption of Network Automation Chapter 6. Embedding Operational Intelligence into Junos Devices through On Box Scripts Chapter 7. Developing Innovative Embedded Applications in the Network with the Junos SDK Chapter 8. Using Embedded Scripting to Define a Protocol for High Available Data Center Interconnect Chapter 9. Enabling IP Based Smart Services Chapter 10. Network Embedded Social Network Protocols Chapter 11. OpenFlow: A Perspective for Building Versatile Networks Chapter 12. Application and Network Resource Access Control Chapter 13. Protocols for Distributed Embedded Management Chapter 14. Peer to Peer (P2P) Based Network Management Chapter 15. Scalable and Robust Decentralized IP Traffic Flow Collection and Analysis (SCRIPT) Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  25. Book Details Hardcover: 576 pages Publisher: Prentice Hall (June 2012) Language: English ISBN-10:0132564718 ISBN-13: 978-0132564717 File Size: 61.5 MB “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.” Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. “It’s like a symphony meeting an encyclopedia meeting a spy novel.” Michael Ford, Corero Network Security On the Internet, every action leaves a mark in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history and cached web pages, too from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensicsand find out. Table of Contents Part I: Foundation Chapter 1. Practical Investigative Strategies Chapter 2. Technical Fundamentals Chapter 3. Evidence Acquisition Part II: Traffic Analysis Chapter 4. Packet Analysis Chapter 5. Statistical Flow Analysis Chapter 6. Wireless: Network Forensics Unplugged Chapter 7. Network Intrusion Detection and Analysis Part III: Network Devices and Servers Chapter 8. Event Log Aggregation, Correlation, and Analysis Chapter 9. Switches, Routers, and Firewalls Chapter 10. Web Proxies Part IV: Advanced Topics Chapter 11. Network Tunneling Chapter 12. Malware Forensics Download E-Book Uploaded Link [Hidden Content]
×
×
  • Create New...