Jump to content

downtemplate

Banned
  • Content Count

    33
  • Joined

  • Last visited

  • Days Won

    31

Everything posted by downtemplate

  1. Book Details Paperback: 400 pages Publisher: Sybex (February 2012) Language: English ISBN-10:1118195523 ISBN-13: 978-1118195529 File Size: 16.2 MB A full-color guide to key Windows 7 administration concepts and topics Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System Essentials is an ideal resource for anyone new to computer administration and looking for a career in computers. Delving into areas such as fundamental Windows 7 administration concepts and various desktop OS topics, this full-color book addresses the skills necessary for individuals looking to break into a career in IT. Each chapter begins with a list of topic areas to be discussed, followed by a clear and concise discussion of the core Windows 7 administration concepts and skills necessary so you can gain a strong understanding of the chapter topic areas. The chapters conclude with review questions and suggested labs, so you can gauge your understanding of the chapter’s contents. Offers in-depth coverage of operating system configurations Explains how to install and upgrade client systems Addresses managing applications and devices Helps you understand operating system maintenance Covers the topics you need to know for the MTA 98-349 exam The full-color Microsoft Windows 7 Essentials proves itself to be an invaluable resource on Windows 7 and features additional learning tutorials and tools. From the Back Cover Learn Windows Quickly and Easily This full-color guide covers the basics of the Microsoft Windows 7 operating system and prepares you to take the Microsoft Technology Associate Exam 98-349, Windows Operating System Fundamentals. The book starts with a practical overview, before walking you through such essentials as clean installs versus upgrades, configuration, security, file and device management, Group Policy, and more. Whether you’re preparing for the exam or just brushing up, this is the solid grounding you need to be successful managing Windows Desktop environments. Learn these Windows networking essentials-and more: Windows OS basics-history, architecture, installation Using the desktop, gadgets, shortcuts, and the Aero interface Viewing configuration settings and managing the Control Panel Working with PowerShell navigation and cmdlets Using Group Policy and understanding virtualization Setting up devices, file sharing, security, and storage Handling troubleshooting, backup and recovery, and updates Preparing for MTA Exam 98-349, Windows Operating System Fundamentals View full-color images of key Windows 7 features Practical illustrations help reinforce learning objectives This striking Essentials book features: Chapter-opening learning objectives Full coverage of all exam topics Four-color screenshots and illustrations Essentials and Beyond-summaries and additional suggested exercises Chapter review questions Download E-Book Uploaded Link [Hidden Content]
  2. Book Details Paperback: 1032 pages Publisher: Sams (June 2012) Language: English ISBN-10:067233612X ISBN-13: 978-0672336126 File Size: 110.8 MB This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and techniques you just won’t find anywhere else. You’ll learn how to use System Center’s powerful capabilities to build highly-efficient managed environments that encompass datacenters, cloud environments, client computers, mobile devices, and more. The authors address planning, design, implementation, integration, and administration, and cover every component, including Configuration Manager, Operations Manager, Data Protection Manager, Virtual Machine Manager, Service Manager, and Orchestrator. Use Configuration Manager 2012 to deliver software and updates in highly-distributed environments including datacenters, clouds, and mobile devices Reliably manage and report on assets with Configuration Manager 2012 Perform monitoring, alerting, operations, and security reporting with Operations Manager 2012 Use Data Protection Manager 2012to protect file systems, SQL, Microsoft Exchange, and SharePoint Leverage Data Protection Manager 2012’s improved central monitoring and remote recovery Run Hyper-V virtualized environments with VMM 2012-including new private clouds and mixed private/public fabrics Use Service Manager 2012 to provide top-down integration, and use Orchestrator 2012 for bottom-up process automation and integration “glue” Give users an efficient self-service portal for creating service and incident requests and browsing service catalogs Manage service offerings and implement enterprise-wide change control with Service Manager 2012 Ensure compliance by creating, executing, and repeating auditable, documented processes with Orchestrator 2012 Table of Contents Chapter 1. Overview of the System Center Suite Chapter 2. Configuration Manager 2012 Design and Planning Chapter 3. Configuration Manager 2012 Implementation and Administration Chapter 4. Using Configuration Manager 2012 to Distribute Applications, Updates, and Operating Systems Chapter 5. Using Configuration Manager 2012 for Asset Management and Reporting Chapter 6. Operations Manager 2012 Design and Planning Chapter 7. Operations Manager 2012 Implementation and Administration Chapter 8. Using Operations Manager 2012 for Monitoring and Alerting Chapter 9. Using Operations Manager 2012 for Operations and Security Reporting Chapter 10. Data Protection Manager 2012 Design, Planning, Implementation, and Administration Chapter 11. Using Data Protection Manager 2012 to Protect File Systems, Exchange, SQL, and SharePoint Chapter 12. Virtual Machine Manager 2012 Design, Planning, and Implementation Chapter 13. Managing a Hyper-V Environment with Virtual Machine Manager 2012 Chapter 14. Service Manager 2012 Design, Planning, and Implementation Chapter 15. Using Service Manager 2012 for Incident Tracking and Help Desk Support Chapter 16. Using Service Manager 2012 for Service Offerings and Change Control Management Chapter 17. System Center Orchestrator 2012 Design, Planning, and Implementation Download E-Book Uploaded Link [Hidden Content]
  3. Book Details Paperback: 208 pages Publisher: Packt Publishing (October 2012) Language: English ISBN-10:1849683905 ISBN-13: 978-1849683906 File Size: 21.0 MB Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems against threats with leading malware detection technologies. Built on Configuration Manager, it provides a unified infrastructure for client security and compliance management and “Microsoft System Center 2012 Endpoint Protection Cookbook” will help you get to grips with vital tasks for implementing this security tool. With the release of System Center 2012 Endpoint Protection, Microsoft is continuing its commitment to offering a cutting edge, enterprise- ready Anti-Virus solution. With its practical and easy to follow recipes, “Microsoft System Center 2012 Endpoint Protection Cookbook” fully prepares you for a simple, headache-free migration. This hands-on, practical cookbook will have you equipped with the knowledge to install and manage System Center 2012 Endpoint Protection like a pro in no time by following step by step recipes. You’ll gain insight into a wide range of management tasks, such as building your SCEP infrastructure, deploying SCEP clients and building the perfect AV policies for your workstation and servers. You’ll also benefit from a complete SCEP walk-through in a bonus appendix chapter. With “Microsoft System Center 2012 Endpoint Protection Cookbook” in hand, you will have the confidence to tackle essential tasks like deployment, policy and much more for SCEP. What you will learn from this book Get up and running with a range of common tasks accomplished with the local SCEP client Learn how to design a SCEP architecture Create an effective SCEP client deployment plan Perform operational tasks via the SCCM console Take full advantage of the SCEP dashboard Prepare for Disaster Recovery scenarios using SCCM Understand how to fully configure and automate various reporting features Build effective and efficient SCEP client polices See these skills in action with a bonus appendix chapter: a complete SCEP walk-through covering the initial install, building the client package, deployment, policy and procedures Approach “Microsoft System Center 2012 Endpoint Protection Cookbook” is a highly practical cookbook for beginner-intermediate use to get you started with a variety of SCEP tasks, as well as providing a sneak peek at a full SCEP walkthrough to give you some real world context. Who this book is written for If you are a System Administrator or Engineer using System Center 2012 EndPoint Protection, then Microsoft System Center 2012 Endpoint Protection Cookbook is for you. You should have a good background with Microsoft products in general, although no knowledge of EndPoint Protection is required. Download E-Book Uploaded Link [Hidden Content]
  4. Book Details Paperback: 224 pages Publisher: Packt Publishing (September 2012) Language: English ISBN-10:1849684944 ISBN-13: 978-1849684941 File Size: 7.0 MB Microsoft System Center 2012 Configuration Manager (CM12) is a systems management application for managing large groups of Windows-based computer systems. System Center 2012 Configuration Manager provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory. This practical cookbook shows you how to administer System Center 2012 Configuration Manager and understand how to solve particular problems/scenarios Packed with over 50 task-based and immediately reusable recipes, this book starts by showing you how to design a System Center 2012 Configuration Manager Infrastructure. The book then dives into topics such as recommended SQL configuration for System Center 2012 Configuration Manager, deploying Windows 7 with Operating System Deployment (OSD), deploying Applications and Software Updates, managing Compliance Settings, managing Sites and managing Inventory amongst others. What will you learn from this book Install SQL before considering System Center 2012 Configuration Manager Set up security so administrators can’t see or touch each other’s machines Use the new System Center 2012 Configuration Manager features to set up monthly patching Create applications, deploy them, enforce them, and monitor them Create Security Baselines and Monitor Drift Use Compliance Settings instead of Hardware or Software Inventory Set up Discovery and Inventory with the least impact to the network Install SRS and edit the canned reports Flatten your hierarchy to get faster reporting back from your clients Deploy Windows 7 to your workstations Manage drivers for your images Leverage boundary groups to save you work Approach This cookbook is full of immediately useable recipes showing you how to administer System Center 2012 Configuration Manager and understand how to solve particular problems/scenarios. In addition to its cookbook style, which ensures the solutions are presented in a clear step-by-step manner, its explanations go into great detail, which makes it good learning material for everyone who has experience in System Center Configuration Manager and wants to improve. The book is designed in such a way that each recipe is presented as a separate, standalone entity and reading of other, prior recipes is not required. Who this book is written for If you are an intermediate to advanced administrator who wants to administer System Center 2012 Configuration Manager and understand how to solve particular problems/scenarios, then this book is for you. You should have a working knowledge of System Center Configuration Manager, however, knowledge of System Center 2012 Configuration Manager is not necessarily required. Download E-Book Uploaded Link [Hidden Content]
  5. Book Details Paperback: 268 pages Publisher: Packt Publishing (May 2012) Language: English ISBN-10:184968586X ISBN-13: 978-1849685863 File Size: 34.0 MB Microsoft Office 365 brings together cloud versions of the most trusted communications and collaboration products in a single desktop suite for businesses of all sizes. Microsoft Exchange Online gives you access to enterprise class email, calendar, and contacts from virtually anywhere, at any time, on desktops, laptops, tablets, and mobile devices. “Microsoft Office 365: Exchange Online Implementation and Migration” is a practical hands-on tutorial that shows small businesses to enterprises how to implement and migrate to Exchange Online in Office 365. This book also places an emphasis on setting up a Hybrid and migrating from Exchange on-premise to Exchange Online. “Microsoft Office 365: Exchange Online Implementation and Migration” will show small businesses to enterprises the steps to implement and migrate to Exchange Online in Office 365. The book starts by providing an overview of the Office 365 plans available and how to make a decision on what plan fits your organization. The book then dives into topics such as the Office 365 Admin Portal, integration options for professionals and small businesses, integration options for enterprises, preparing for a simple migration, performing a simple migration, and preparing for a hybrid deployment and migration amongst others. What you will learn from this book Determine the differences between the Office 365 license plans and the scenarios in which your organization may fit Set up and configure Office 365 for Exchange Online Perform a “simple” migration, for small businesses to enterprises Implement and configure Hybrid integration with Office 365 Perform an Exchange on-premise to Exchange Online migration Handle resource mailboxes, so that you can completely move off of Exchange on-premise Cut-over mail routing, to Exchange Online Approach A practical, hands-on tutorial that shows small businesses to enterprises how to implement and migrate to Exchange Online in Office 365. Who this book is for If you are an information technology (IT) professional; administrator, small business owner, manager or consultant who needs to implement and migrate to Exchange Online in Office 365 within your business, then this book is for you. Knowledge of Microsoft Office 365 is not required, however, experience with Microsoft Exchange Server and mail clients, role and delegation concept is required. Download E-Book Uploaded Link [Hidden Content]
  6. Book Details Paperback: 196 pages Publisher: Packt Publishing (December 2012) Language: English ISBN-10:1849687544 ISBN-13: 978-1849687546 File Size: 13.6 MB Because an ERP system like Microsoft Dynamics AX 2012 plays a central role in an organization, there will always be the need to integrate it with other applications. In many cases, services are the preferred way of doing this, and Microsoft Dynamics AX 2012 is now more flexible than ever when it comes to the creation and use of these services. Understanding these services will help you identify where they can be used, and do so effectively. “Microsoft Dynamics AX 2012 Services” is a hands-on guide that provides you with all the knowledge you will need to implement services with Microsoft Dynamics AX 2012. The step-by-step examples will walk you through many of the tasks that you need to perform frequently when creating and using services. “Microsoft Dynamics AX 2012 Services” provides detailed and practical examples for creating and using services that will make it a resource you will consult many times during your implementations. This book helps you to identify situations where services can be used for your implementations. By providing step-by-step instructions for many of the common tasks, you will gain practical know-how on to get the job done. Easy to follow instructions are provided for all types of services you will encounter. You will learn how to create document services using the AIF Document Service Wizard and how to use X++ to create custom services. You will also learn how to deploy services and web services and how you can consume them in both X++ and .NET. The services are also put to use in the SysOperation framework, which uses services to run business logic and is the new way to create batch processes in Microsoft Dynamics AX 2012. What you will learn from this book Processing business logic synchronously and asynchronously. Using the AIF Document Service Wizard. Creating custom services in X++. Configuring enhanced integration ports. Deploying services using a variety of protocols. Consuming your services in .NET. Using system services in your applications. Using the SysOperation framework to create batch processes. Approach It’s a tutorial guide that provides all the knowledge needed to implement services with Microsoft Dynamics AX 2012. Who this book is written for This book is aimed at Dynamics AX developers, both new and experienced with services and Microsoft Dynamics AX 2012. A basic understanding of MorphX and X++ is assumed, but the step-by-step instructions are easy to follow even for beginners. Some examples use C#.NET, so experience with Visual Studio is a plus but not a must. Download E-Book Uploaded Link [Hidden Content]
  7. Book Details Paperback: 296 pages Publisher: Microsoft Press (March 2012) Language: English ISBN-10:0735658102 ISBN-13: 978-0735658103 File Size: 10.4 MB Assess your readiness for MCTS Exam 70-662-and quickly identify where you need to focus and practice. This practical, streamlined guide walks you through each exam objective, providing “need to know” checklists, review questions, tips, and links to further study-all designed to help bolster your preparation. Reinforce your exam prep with a Rapid Review of these objectives: Installing and Configuring Exchange Servers Configuring Exchange Recipients and Public Folders Configuring Client Access Configuring Message Transport Monitoring and Reporting Implementing High Availability and Recovery Configuring Message Compliance and Security Features This book is an ideal complement to the in-depth training of the Microsoft Press® Training Kit and other exam-prep resources for Exam 70-662. Table of Contents Chapter 1. Installing and Configuring Exchange Servers Chapter 2. Configuring Exchange Recipients and Public Folders Chapter 3. Configuring Client Access Chapter 4. Configuring Message Transport Chapter 5. Monitoring and Reporting Chapter 6. Implementing High Availability and Recovery Chapter 7. Configuring Message Compliance and Security Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  8. Book Details Paperback: 744 pages Publisher: Sybex (January 2012) Language: English ISBN-10:1118089537 ISBN-13: 978-1118089538 File Size: 19.4 MB An in-depth guide on the leading Unified Communications platform Microsoft Lync Server 2010 maximizes communication capabilities in the workplace like no other Unified Communications (UC) solution. Written by experts who know Lync Server inside and out, this comprehensive guide shows you step by step how to administer the newest and most robust version of Lync Server. Along with clear and detailed instructions, learning is aided by exercise problems and real-world examples of established Lync Server environments. You’ll gain the skills you need to effectively deploy Lync Server 2010 and be on your way to gaining all the benefits UC has to offer. Gets you up and running with Lync Server-whether you are migrating from Office Communications Server or new to Lync Server. Walks you through all of the essential stages for deploying Lync Server Shows integration with Microsoft Exchange Server and Microsoft SharePoint Server Demonstrates how to monitor, diagnose, and troubleshoot problems more efficiently Mastering Lync Server 2010 is a must-have resource for anyone looking to manage all the various forms of communication from one user interface. From the Back Cover Unified Communications Made Easier with Lync and This Practical Guide If you’re in charge of Unified Communications (UC), this book is for you. Covering Microsoft Lync Server 2010 in detail, this practical guide shows you how to harness Lync’s new capabilities and streamlined tools to simplify the implementation of UC across your business, large or small. From handling installation, remote access, and security to coordinating video chats, VoIP, social media, web conferencing, and more, you’ll find a wealth of information and real-world examples on how to get the very most out of this high-demand UC technology. Coverage includes: Mastering Lync fundamentals such as tools, standards, protocols, and security Planning deployment, implementing, and handling upgrades from Office Communications Server Managing with Lync Control Panel and PowerShell Setting up Role-Based Access Control (RBAC) Monitoring, archiving, and troubleshooting Getting started with Telephony, connecting to the PSTN, and deploying your own conference bridge Integrating with Exchange, SharePoint®, and Group Chat as well as other non-Microsoft hardware and software products such as Gateways, PBXs, and other IM clouds Learn How to Plan, Install, Configure, and Troubleshoot Lync Understand All Client, Server, and Voice Features Coordinate Web and Video Conferences, Enterprise Telephony, and Desktop Sharing Find Invaluable Examples of Actual Lync Deployments Leverage Lync Server 2010 Mobility Service and Lync Mobile Clients Download E-Book Uploaded Link [Hidden Content]
  9. Book Details Paperback: 186 pages Publisher: Packt Publishing (February 2012) Language: English ISBN-10:184968538X ISBN-13: 978-1849685382 File Size: 13.5 MB While UAG is built to integrate with many environments and publish dozens of application types, many organizations require a certain level of customization to meet their needs. With this book in hand, you will be equipped to deal with these types of customization scenarios, and you will be confident in using such workarounds without hassle and trial and error. Written by some of the leading experts on UAG, “Mastering Microsoft Forefront UAG 2010 Customization” covers the most complex and challenging options for customizing UAG in a way that is friendly and easy to follow. It walks you through various customization tasks, including explanations and code samples, as well as creative ideas for troubleshooting your work. Until now, only a few of the extensions to UAG’s services have been publicly available, and most were only known to a select few. Now, this can include you! Throughout this book, you will tackle how to change the system’s look-and-feel, deal with advanced authentication schemes and write special functions that need to be executed as part of the client interaction. With “Mastering Microsoft Forefront UAG 2010 Customization”, you too can learn how to customize various aspects of UAG’s functionality to enhance your organization or customers’ experience. What you will learn from this book Get to grips with customizing the look-and-feel of the log in and portal pages Configure UAG for custom authentication, including certificate authentication Create custom endpoint detection and policies based on your own scripts Take advantage of adjusting content on-the-fly to address application compatibility issues Understand how to inject functionality into the log in process Go further by performing various text, language, theme and image customizations Soak up the knowledge of UAG experts to utilize extension and customization secrets Approach “Mastering Microsoft Forefront UAG 2010 Customization” is a hands-on guide with step-by-step instructions for enhancing the functionality of UAG through customization. Each topic details one key aspect of functionality and the operative mechanism behind it, and suggests functionality that can be achieved with customization, along with helpful code samples. Who this book is for Whether you are a seasoned UAG consultant, deployment and support engineer or a UAG customer, this book is for you. Consultants will be able to enhance the services you can provide for UAG customization, while the book helps customers to achieve tasks that have been restricted to the realm of expert consultants until now. You should have a strofng understanding of the regular functionality of UAG, as well as a solid background in web development (ASP, HTML, CSS and Javascript) for this book to take you to the next level. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  10. Book Details Paperback: 290 pages Publisher: Packt Publishing (March 2012) Language: English ISBN-10:1849691487 ISBN-13: 978-1849691482 File Size: 26.9 MB With the recent boom in the smartphone market, users are demanding access to the latest consumer technology in the business, and that means you need to be able to integrate Apple’s iPhone and iPad into your business in a way you can manage. Microsoft’s Exchange Server provides a solution for integrating iPhone into your business and this book will show you exactly how to implement this solution. iPhone with Microsoft Exchange Server 2010: Business Integration and Deployment takes you through the basics of Apple mobile devices, and teaches you how to plan a basic, highly available Exchange environment. You will then be taught how to secure your environment, provision and manage iDevices. Have you been tasked with getting iPhones into the hands of your business executives, and need to ensure they can reliably and securely access corporate email? This book will teach you what you need to know about getting Exchange 2010 set up and then help you deploy iPhones in a secure, manageable way. Starting with the basics, you’ll learn about what Apple mobile devices have to offer and how they have evolved into devices suitable for business use. If you’re new to Exchange Server 2010, you’ll learn the basics of Microsoft’s world leading messaging suite, before learning how to plan, install and configure a highly available Exchange environment. You will also understand how to configure Office 365 and learn how both can be configured to apply policies to iPhone, iPad and the iPod Touch. You’ll also learn how to configure advanced features, like certificate authentication, how to create and deploy configuration profiles for devices and how to manage your devices once they are in the hands of your users. After reading this book, you will be confident about introducing Apple mobile devices into your organization. What you will learn from this book The roles and features of Exchange Server 2010 Capacity planning for an Exchange environment and how to plan a new installation Certificate and namespace requirements for an external facing Exchange organization Install Exchange Server 2010 and build a database availability group Why you should consider Office 365 and what’s involved in getting it set up Use policies to control what users can do with iDevices connected to Exchange Why certificate authentication can make your life easier and how to set it up Use Apple’s iPhone Configuration Utility to create and deploy configuration profiles to mobile devices What’s involved with sharing mailboxes and calendars with Apple devices Troubleshooting and managing devices in use Approach iPhone with Microsoft Exchange Server 2010: Business Integration and Deployment is a practical, step-by-step tutorial on planning, installing and configuring Exchange Server to deploy iPhones into your business. Who this book is for This book is aimed at system administrators who don’t necessarily know about Exchange Server 2010 or ActiveSync-based mobile devices. A basic level of knowledge around Windows Servers is expected, and knowledge of smartphones and email systems in general will make some topics a little easier. Download E-Book Uploaded Link [Hidden Content]
  11. Book Details Paperback: 258 pages Publisher: Microsoft Press (September 2012) Language: English ISBN-10:073567535X ISBN-13: 978-0735675353 File Size: 41.5 MB Get a head start evaluating Window Server 2012-with technical insights from a Microsoft MVP who’s worked extensively with the beta release. This practical introduction illuminates new features and capabilities, with scenarios demonstrating how the platform can meet the needs of your business. Based on final, release-to-manufacturing (RTM) software, this book provides the high-level information you need to begin preparing now for deployment and management. Topics include: Virtualization and cloud solutions Availability Provisioning and storage management Security and scalability Infrastructure options Server configuration and administration Table of Contents Chapter 1. The business need for Windows Server 2012 Chapter 2. Foundation for building your private cloud Chapter 3. Highly available, easy-to-manage multi-server platform Chapter 4. Deploy web applications on premises and in the cloud Chapter 5. Enabling the modern workstyle Download E-Book Uploaded Link [Hidden Content]
  12. Book Details Paperback: 336 pages Publisher: Cisco Press (November 2011) Language: English ISBN-10:1587204347 ISBN-13: 978-1587204340 File Size: 66.9 MB The complete guide to provisioning and managing cloud-based Infrastructure as a Service (IaaS) data center solutions Cloud computing will revolutionize the way IT resources are deployed, configured, and managed for years to come. Service providers and customers each stand to realize tremendous value from this paradigm shift-if they can take advantage of it. Cloud Computing brings together the realistic, start-to-finish guidance they need to plan, implement, and manage cloud solution architectures for tomorrow’s virtualized data centers. It introduces cloud “newcomers” to essential concepts, and offers experienced operations professionals detailed guidance on delivering Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). This book’s replicable solutions and fully-tested best practices will help enterprises, service providers, consultants, and Cisco partners meet the challenge of provisioning end-to-end cloud infrastructures. Drawing on extensive experience working with leading cloud vendors and integrators, the authors present detailed operations workflow examples, proven techniques for operating cloud-based network, compute, and storage infrastructure; a comprehensive management reference architecture; and a complete case study demonstrating rapid, lower-cost solutions design. Cloud Computing will be an indispensable resource for all network/IT professionals and managers involved with planning, implementing, or managing the next generation of cloud computing services. Review the key concepts needed to successfully deploy clouds and cloud-based services Transition common enterprise design patterns and use cases to the cloud Master architectural principles and infrastructure designs for “real-time” managed IT services Understand the Cisco approach to cloud-related technologies, systems, and services Develop a cloud management architecture using ITIL, TMF, and ITU-TMN standards Implement best practices for cloud service provisioning, activation, and management Automate cloud infrastructure to simplify service delivery, monitoring, and assurance Choose and implement the right billing/chargeback approaches for your business Design and build IaaS services, from start to finish Manage the unique capacity challenges associated with sporadic, real-time demand Provide a consistent and optimal cloud user experience This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers. Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  13. Book Details Paperback: 368 pages Publisher: Packt Publishing (April 2012) Language: English ISBN-10:1849684340 ISBN-13: 978-1849684347 File Size: 43.8 MB BizTalk enables the integration and managment of automated business processes within or across organizational boundaries. To build a solid BizTalk solution, deploy a robust environment, and keep it running smoothly you sometimes need to broaden your spectrum, explore all possibilities, and choose the best solution for your purpose. By following the recipes in this book you will gain required knowledge and succeed in your implementation. With BizTalk Server 2010 Cookbook, you can leverage and hone your skills. More than 50 recipes will guide you in implementing BizTalk solutions, setting up a robust and well performing BizTalk environment, and choosing the right solution for monitoring it. As a developer or administrator you greatly benefit from taking these recipes to work. In this book a developer and administrator will see how to deploy, build, and maintain a BizTalk environment. How to apply patterns for robust orchestrations, messaging and testing. Administrators will learn to set up an environment using Microsoft best practices and tools to deliver a robust, performing and durable BizTalk environment. Besides setting up their environments administrators can also decide through a number of recipes how to monitor and maintain the environment. A developer can contribute to a healthy environment by implementing instrumentation in artefacts, applying well suited pattern(s) and testing the solutions built. What you will learn from this book Deploy a robust, durable, and performing BizTalk Environment Broaden you knowledge on implementing BizTalk orchestration patterns Enhance your toolset in instrumenting BizTalk solutions Deepen your knowledge and skillset on messaging security Apply SOA patterns with your BizTalk solution Extend the reach of BizTalk to the Cloud Leverage SCOM and other tools in supporting your BizTalk environment Pragmatic use of Business Rules with BizTalk Server Deploy a robust and smooth performing BizTalk environment Approach This book will explain step-by-step in each recipe how to, for example, implement a certain orchestration pattern, test a BizTalk artifact, monitor BizTalk with a third party tool, or secure a message. The recipes in this book are easy to understand and follow as the author discusses real-world scenarios. The range of topics covered in this book will bring out the forward-thinking BizTalk developer in you. The examples are supported by relevant background information for ease of understanding. Who this book is for This book is for professional BizTalk Developers and administrators to take their skills to the next level and explore the numerous BizTalk capabilities. This book assumes that you have a basic understanding of BizTalk and SOA and Windows Azure AppFabric concepts. Download E-Book Uploaded Link [Hidden Content]
  14. Book Details Paperback: 448 pages Publisher: O’Reilly Media; 3rd Edition (January 2007) Language: English ISBN-10:0596007698 ISBN-13: 978-0596007690 File Size: 3.1 MB This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba’s authentication with that of a Windows domain? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting! The range of this book knows few bounds. Using Samba takes you from basic installation and configuration — on both the client and server side, for a wide range of systems — to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether users see the folder they expect or a cryptic error message. The current edition covers such advanced 3.x features as: Integration with Active Directory and OpenLDAP Migrating from Windows NT 4.0 domains to Samba Delegating administrative tasks to non-root users Central printer management Advanced file serving features, such as making use of Virtual File System (VFS) plugins. Samba is a cross-platform triumph: robust, flexible and fast, it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. This book will help you make your file and print sharing as powerful and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Whether you’re playing on your personal computer or an enterprise network, on one note or a full three-octave range, Using Samba will give you an efficient and secure server. Table of Contents Chapter 1. An Introduction to Samba Chapter 2. Installing Samba on a Unix System Chapter 3. Configuring Windows Clients Chapter 4. The Samba Configuration File Chapter 5. Accounts, Authentication, and Authorization Chapter 6. Advanced Disk Shares Chapter 7. Printing Chapter 8. Name Resolution and Network Browsing Chapter 9. Domain Controllers Chapter 10. Domain Member Servers Chapter 11. Unix Clients Chapter 12. Troubleshooting Samba Appendix A. Summary of Samba Daemons and Commands Appendix B. Downloading Samba with Subversion Appendix C. Configure Options Download E-Book Uploaded Link [Hidden Content]
  15. Book Details Paperback: 1066 pages Publisher: O’Reilly Media (December 2005) Language: English ISBN-10:0596002556 ISBN-13: 978-0596002558 File Size: 20.8 MB If you’ve ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols — or if you just want to learn about modern networking through real-life examples — Understanding Linux Network Internals is for you. Like the popular O’Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book’s code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing. Part of the difficulty in understanding networks — and implementing them — is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include: Key problems with networking Network interface card (NIC) device drivers System initialization Layer 2 (link-layer) tasks and implementation Layer 3 (IPv4) tasks and implementation Neighbor infrastructure and protocols (ARP) Bridging Routing ICMP Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book’s understandability. Table of Contents Part I: General Background Chapter 1. Introduction Chapter 2. Critical Data Structures Chapter 3. User-Space-to-Kernel Interface Part II: System Initialization Chapter 4. Notification Chains Chapter 5. Network Device Initialization Chapter 6. The PCI Layer and Network Interface Cards Chapter 7. Kernel Infrastructure for Component Initialization Chapter 8. Device Registration and Initialization Part III: Transmission and Reception Chapter 9. Interrupts and Network Drivers Chapter 10. Frame Reception Chapter 11. Frame Transmission Chapter 12. General and Reference Material About Interrupts Chapter 13. Protocol Handlers Part IV: Bridging Chapter 14. Bridging: Concepts Chapter 15. Bridging: The Spanning Tree Protocol Chapter 16. Bridging: Linux Implementation Chapter 17. Bridging: Miscellaneous Topics Part V: Internet Protocol Version 4 (IPv4) Chapter 18. Internet Protocol Version 4 (IPv4): Concepts Chapter 19. Internet Protocol Version 4 (IPv4): Linux Foundations and Features Chapter 20. Internet Protocol Version 4 (IPv4): Forwarding and Local Delivery Chapter 21. Internet Protocol Version 4 (IPv4): Transmission Chapter 22. Internet Protocol Version 4 (IPv4): Handling Fragmentation Chapter 23. Internet Protocol Version 4 (IPv4): Miscellaneous Topics Chapter 24. Layer Four Protocol and Raw IP Handling Chapter 25. Internet Control Message Protocol (ICMPv4) Part VI: Neighboring Subsystem Chapter 26. Neighboring Subsystem: Concepts Chapter 27. Neighboring Subsystem: Infrastructure Chapter 28. Neighboring Subsystem: Address Resolution Protocol (ARP) Chapter 29. Neighboring Subsystem: Miscellaneous Topics Part VII: Routing Chapter 30. Routing: Concepts Chapter 31. Routing: Advanced Chapter 32. Routing: Li nux Implementation Chapter 33. Routing: The Routing Cache Chapter 34. Routing: Routing Tables Chapter 35. Routing: Lookups Chapter 36. Routing: Miscellaneous Topics Download E-Book Uploaded Link [Hidden Content]
  16. Book Details Paperback: 642 pages Publisher: O’Reilly Media (November 2007) Language: English ISBN-10:0596102488 ISBN-13: 978-0596102487 File Size: 8.8 MB This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you’re new to the job or have years of experience. With Linux Networking Cookbook, you’ll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn’t mean you have all the answers. Networking is a complex subject with reams of reference material that’s difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you. You will find recipes for: Building a gateway, firewall, and wireless access point on a Linux network Building a VoIP server with Asterisk Secure remote administration with SSH Building secure VPNs with OpenVPN, and a Linux PPTP VPN server Single sign-on with Samba for mixed Linux/Windows LANs Centralized network directory with OpenLDAP Network monitoring with Nagios or MRTG Getting acquainted with IPv6 Setting up hands-free networks installations of new systems Linux system administration via serial console And a lot more. Each recipe includes a clear, hands-on solution with tested code, plus a discussion on why it works. When you need to solve a network problem without delay, and don’t have the time or patience to comb through reference books or the Web for answers, Linux Networking Cookbook gives you exactly what you need. Table of Contents Chapter 1. Introduction to Linux Networking Chapter 2. Building a Linux Gateway on a Single-Board Computer Chapter 3. Building a Linux Firewall Chapter 4. Building a Linux Wireless Access Point Chapter 5. Building a VoIP Server with Asterisk Chapter 6. Routing with Linux Chapter 7. Secure Remote Administration with SSH Chapter 8. Using Cross-Platform Remote Graphical Desktops Chapter 9. Building Secure Cross-Platform Virtual Private Networks with OpenVPN Chapter 10. Building a Linux PPTP VPN Server Chapter 11. Single Sign-on with Samba for Mixed Linux/Windows LANs Chapter 12. Centralized Network Directory with OpenLDAP Chapter 13. Network Monitoring with Nagios Chapter 14. Network Monitoring with MRTG Chapter 15. Getting Acquainted with IPv6 Chapter 16. Setting Up Hands-Free Network Installations of New Systems Chapter 17. Linux Server Administration via Serial Console Chapter 18. Running a Linux Dial-Up Server Chapter 19. Troubleshooting Networks Appendix A. Essential References Appendix B. Glossary of Networking Terms Appendix C. Linux Kernel Building Reference Download E-Book Uploaded Link [Hidden Content]
  17. Book Details Paperback: 364 pages Publisher: O’Reilly Media; 3rd Edition (February 2005) Language: English ISBN-10:0596005482 ISBN-13: 978-0596005481 File Size: 2.4 MB The Linux Network Administrator’s Guide, Third Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system–including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems. But as the follow-up to a classic, the third edition of the Linux Network Administrator’s Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services: Wireless hubs OpenLDAP FreeS/WAN IMAP Spam filtering OpenSSH BIND IPv6 Featuring a litany of insider tips and techniques, the Linux Network Administrator’s Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environmentAuthored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator’s Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP’s goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux. Table of Contents Chapter 1. Introduction to Networking Chapter 2. Issues of TCP/IP Networking Chapter 3. Configuring the Serial Hardware Chapter 4. Configuring TCP/IP Networking Chapter 5. Name Service and Configuration Chapter 6. The Point-to-Point Protocol Chapter 7. TCP/IP Firewall Chapter 8. IP Accounting Chapter 9. IP Masquerade and Network Address Translation Chapter 10. Important Network Features Chapter 11. Administration Issues with Electronic Mail Chapter 12. sendmail Chapter 13. Configuring IPv6 Networks Chapter 14. Configuring the Apache Web Server Chapter 15. IMAP Chapter 16. Samba Chapter 17. OpenLDAP Chapter 18. Wireless Networking Download E-Book Uploaded Link [Hidden Content]
  18. Book Details Paperback: 336 pages Publisher: No Starch Press (September 2007) Language: English ISBN-10:1593271417 ISBN-13: 978-1593271411 File Size: 6.4 MB System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You’ll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics: Passive network authentication and OS fingerprinting iptables log analysis and policies Application layer attack detection with the iptables string match extension Building an iptables ruleset that emulates a Snort ruleset Port knocking vs. Single Packet Authorization (SPA) Tools for visualizing iptables logs Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you’re responsible for keeping a network secure, you’ll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises. Visit the book’s companion site for supporting files, downloads, errata, and more. Table of Contents Chapter 1. Care and Feeding of iptables Chapter 2. Network Layer Attacks and Defense Chapter 3. Transport Layer Attacks and Defense Chapter 4. Application Layer Attacks and Defense Chapter 5. Introducing psad. The Port Scan Attack Detector Chapter 6. psad Operations. Detecting Suspicious Traffic Chapter 7. Advanced psad Topics. From Signature Matching to OS Fingerprinting Chapter 8. Active Response with psad Chapter 9. Translating Snort Rules into iptables Rules Chapter 10. Deploying Fwsnort Chapter 11. Combining psad and Fwsnort Chapter 12. Port-Knocking vs. Single Packet Authorization Chapter 13. Introducing fwknop Chapter 14. Visualizing iptables Logs Appendix A. Attack Spoofing Appendix B. A Complete fwsnort Script Download E-Book Uploaded Link [Hidden Content]
  19. Book Details Paperback: 464 pages Publisher: No Starch Press (May 2005) Language: English ISBN-10:1593270364 ISBN-13: 978-1593270360 File Size: 4.9 MB The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer network, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable business system for a small business or a large corporation. The book includes information on how to build a high-availability server pair using the Heartbeat package, how to use the Linux Virtual Server load balancing software, how to configure a reliable printing system in a Linux cluster environment, and how to build a job scheduling system in Linux with no single point of failure. The book also includes information on high availability techniques that can be used with or without a cluster, making it helpful for System Administrators even if they are not building a cluster. Anyone interested in deploying Linux in an environment where low cost computer reliability is important will find this book useful. The CD-ROM includes the Linux kernel, ldirectord software, the Mon monitoring package, the Ganglia package, OpenSSH, rsync, SystemImager, Heartbeat, and all the figures and illustrations used in the book. Table of Contents PART ONE: INTRODUCTION TO THE LINUX SERVER Chapter 1. Starting the Services Chapter 2. Handling the Packets Chapter 3. Compiling the Kernel PART TWO: HIGH AVAILABILITY LINUX Chapter 4. Synchronizing Servers with Rsync and SSH Chapter 5. Cloning Systems with SystemImager Chapter 6. Heartbeat Introduction and Theory Chapter 7. A Sample Heartbeat Configuration Chapter 8. Heartbeat Resources and Maintenance Chapter 9. Stonith and Ipfail PART THREE: CLUSTER THEORY AND PRACTICE Chapter 10. The Ideal Cluster Chapter 11. The Linux Virtual Server Introduction and Theory Chapter 12. The Linux Virtual Server Network Address Translation Cluster Chapter 13. The Linux Virtual Server Direct Routing Cluster Chapter 14. LVS and Netfilter Chapter 15. The High Availability Cluster Chapter 16. The Cluster File System PART FOUR: MAINTENANCE AND MONITORING Chapter 17. Simple Network Management Protocol and Mon Chapter 18. Batch Job Scheduling with Ganglia Chapter 19. Cluster Maintenance and Operation Chapter 20. Architecture of the Linux Enterprise. A Pictography Glossary APPENDICES Appendix A. Downloading Software Appendix B. Introduction to VI Appendix C. Tcpdump Appendix D. Adding Network Interface Cards to Your System Appendix E. Compiling Heartbeat from CVS Appendix F. Compiling and Installing the Perl SNMP Package Appendix G. Sample Mon Init Script for Red Hat Appendix H. Kernel Options Download E-Book Uploaded Link [Hidden Content]
  20. Book Details Paperback: 316 pages Publisher: Packt Publishing (October 2008) Language: English ISBN-10:1847195180 ISBN-13: 978-1847195180 File Size: 3.4 MB Nagios is a tool for system and network monitoring. It constantly checks other machines and various services on those machines. The main purpose of system monitoring is to detect and report any system not working properly as soon as possible so that you are aware of problems before a user runs into them. It is a modular and flexible solution that uses plug-ins to do its job. The book is an introduction to Nagios that will teach readers to use Nagios with its advanced features. At the same time, readers who have already used earlier versions of Nagios will also benefit because they will learn about the new and advanced features of Nagios 3. This book focuses on the new features of Nagios and will teach readers to secure their systems in a much improved manner. What you will learn from this book Understand system monitoring and how Nagios works Install and configure Nagios to administer your network and system Deploy agents and plug-ins, and monitor assets with advanced features of Nagios Notify users of current and future incidents to protect the availability, performance, and security of monitored assets Configure and work your way around Nagios’s web interface Pass service and host check results over the network using NSCA Set up a working and usable distributed monitoring system using NSClient++ and NC_Net. Develop custom plug-ins responsible for doing the checks and analyzing results Use the web interface to manage scheduled downtimes for hosts and services Monitor UPS status over the network Use adaptive monitoring to modify various check-related parameters Use SSH and NRPE for doing remote checks Use SNMP to retrieve information from a device, set options, and also cover means for a device to notify other machines about a failure Approach This is a beginner-level book, which will introduce Nagios to System Administrators who are interested in monitoring their systems. The focus is on teaching system administrators to secure their systems in a much improved manner incorporating the newer features of Nagios. It will teach Nagios beginners the basics of installation and configuration of version 3; it will show professionals who have already worked on earlier versions of Nagios the new features of Nagios like inheritance and also the new internal functions like better check scheduling. Who this book is for The target readers for this book are System Administrators interested in using Nagios. This book will introduce Nagios with the new features of Version 3 for System Administrators. Download E-Book Uploaded Link [Hidden Content]
  21. Book Details Paperback: 408 pages Publisher: For Dummies; 2nd Edition (October 2011) Language: English ISBN-10:0470891890 ISBN-13: 978-0470891896 File Size: 2.6 MB Learn to use JUNOS to make your network reliable! Providing network administrators with a reliable network operating system, JUNOS software is an award-winning network operating system that focuses on security and the avoidance of down time. This easy-to-understand book starts with the basics of JUNOS and walks you through its features so that you can quickly learn how to set up, operate, and add key services. Since the various JUNOS features are constantly being updated to provide your network with the best security possible, this new edition shares must-know information, helpful advice, handy tips, and essential cautions for working with JUNOS. Plus, you’ll find out how to set up a routing protocol that automates configuration of routing tables for greater efficiency and how you can set up individual or group user accounts locally on the route, or on remote centralized authentication servers. Starts with the basics and introduces you to JUNOS Explains how to connect, manage, and troubleshoot routers and other Juniper appliances Offers tips for making your network more efficient and reveals essential cautions Walks you through setting up, operating, and adding key services Details ways to configure JUNOS default security features as well as restricted physical access to protect routers Breaks down advanced concepts into easy-to-understand segments so you can build your knowledge gradually This new edition gets you started using the sophisticated features and techniques of JUNOS today. From the Back Cover Here’s just what you need to get your network running smoothly and securely on Junos As a network operating system, Junos is all about keeping your network secure and avoiding downtime. This book is all about how Junos works, how to configure it and add key services, and how to connect, manage, and troubleshoot routers and other Juniper appliances. It even shows you how to enhance security and make your network more efficient. Jump right in - explore the Junos CLI and work with the operational and configuration modes The great migration - see how to migrate your LAN, IGP, and security policies from IOS Get serious about security - explore the default security features in Junos, monitor who’s logged on, and don’t forget physical security Make the network hum - work with the Border Gateway Patrol, enable Class of Service, and know when to use Multi Protocol Level Switching Keep it out of trouble - monitor network operations so you can identify and fix problems when they arise Open the book and find: How to set up Junos devices The ten most-used Junoscommands How to save time with J-Web Suggestions for effective monitoring methods How to deploy a router, an EX switch, and an SRX Ways that Junos can help secure your network How to construct routing policies Ten tips for migrating from another network OS “Mike, Cathy, and Walter have managed to synthesize the key principles that are fundamental to the One Junos concept of running and operating Juniper Network devices with a single, unified, robust, and operator-friendly operating system. If you want to know something about the network OS that is driving the New Network, start here.” -Michel Langlois, Senior Vice President, Junos Software, Juniper Networks Learn to: Work with the Junos network operating system Set up and configure a Juniper Networks device and add security Connect, manage, and troubleshoot routers and other Juniper appliances Make your network more efficient Download E-Book Uploaded Link [Hidden Content]
  22. Book Details Paperback: 432 pages Publisher: O’Reilly Media (November 2012) Language: English ISBN-10:1449316638 ISBN-13: 978-1449316631 File Size: 18.1 MB In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long “travelogue” follows a team of Juniper Networks warriors as they solve specific needs with emerging network platform architectures. In these case studies, Southwick and his fellow warriors analyze a client’s particular situation, arrive at an architectural solution, and work through the deployment details. For anyone who operates, installs, designs, or works in IT, this book provides an intimate and entertaining look at what’s changing and why. Among the case studies, you’ll discover how: A service provider protected customers from malicious traffic with Juniper Networks IDP systems SRX5800s improved connectivity and security in a data center Ethernet WAN technology was chosen as a storage solution, rather than a proprietary design on dark fiber An enterprise severed communications between different departments to comply with government personal credit card standards Core network and edge devices helped a power company serve local customers and ISPs in the data services market A hosting company migrated its core, datacenter, edge, and access domains to a state-of-the-art network “In this uniquely written book, you will get a detailed view of life in the data center, the edge, the core, and the office of the customer’s CIO.” –Steve Fazio, CEO, TorreyPoint Table of Contents Chapter 1. An Enterprise VPN Chapter 2. Maintaining IDP Systems Chapter 3. Data Center Security Design Chapter 4. Layer 3 to Layer 2 Conversion Chapter 5. Internet Access Redress Chapter 6. Service Provider Engagement Chapter 7. A PCI-Compliant Data Center Chapter 8. Facilitating Dark Fiber Replacement Using a QFX3500 Chapter 9. MX Network Deployment Chapter 10. A Survivable Internet Solution for a Fully Distributed Network Chapter 11. Internet Access Rebuild Download E-Book Uploaded Link [Hidden Content]
  23. Book Details Paperback: 902 pages Publisher: O’Reilly Media (September 2012) Language: English ISBN-10:1449319718 ISBN-13: 978-1449319717 File Size: 60.0 MB Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection, Multi-chassis LAG, Inline NAT, IPFIX/J-Flow, and many other Juniper MX features. Written by Juniper Network engineers, each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you learn. Delve into the Juniper MX architecture, including the next generation Junos Trio chipset Explore Juniper MX’s bridging, VLAN mapping, and support for thousands of virtual switches Add an extra layer of security by combining Junos DDoS protection with firewall filters Create a firewall filter framework that only applies filters specific to your network Discover the advantages of hierarchical scheduling Combine Juniper MX routers, using a virtual chassis or Multi-chassis LAG Install network services such as Network Address Translation (NAT) inside the Trio chipset Examine Junos high availability features and protocols on Juniper MX “For the no-nonsense engineer who likes to get down to it, The Juniper MX Series targets both service providers and enterprises with an illustrative style supported by diagrams, tables, code blocks, and CLI output. Readers will discover features they didn’t know about before and can’t resist putting them into production.” -Ethan Banks, CCIE #20655, Packet Pushers Podcast Host Table of Contents Chapter 1. Juniper MX Architecture Chapter 2. Bridging, VLAN Mapping, IRB, and Virtual Switches Chapter 3. Stateless Filters, Hierarchical Policing, and Tri-Color Marking Chapter 4. Routing Engine Protection and DDoS Prevention Chapter 5. Trio Class of Service Chapter 6. MX Virtual Chassis Chapter 7. Trio Inline Services Chapter 8. Multi-Chassis Link Aggregation Chapter 9. Junos High Availability on MX Routers Download E-Book Uploaded Link [Hidden Content]
  24. Book Details Paperback: 704 pages Publisher: Microsoft Press (December 2012) Language: English ISBN-10:0735662754 ISBN-13: 978-0735662759 File Size: 36.0 MB Your 2-in-1 Self-Paced Training Kit EXAM PREP GUIDE Ace your preparation for the skills measured by CompTIA Network+ Exam N10-005. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and practice exercises. This guide is designed to help make the most of your study time. Maximize your performance on the exam by mastering these objectives: Network Concepts Network Installation and Configuration Network Media and Topologies Network Management Network Security PRACTICE TESTS Assess your skills with practice tests on CD. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers-including a customized learning path that describes how and where to focus your studies. Table of Contents Chapter 1. Networking Basics Chapter 2. The Physical Layer Chapter 3. Network Devices Chapter 4. The Data-Link Layer Chapter 5. Wireless Networking Chapter 6. The Network Layer Chapter 7. Routing and Switching Chapter 8. The Transport Layer Chapter 9. The Application Layer Chapter 10. Wide Area Networking Chapter 11. Network Security Chapter 12. Network Management Chapter 13. Network Troubleshooting Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
  25. Book Details Paperback: 648 pages Publisher: Pearson IT Certification; 4th Edition (November 2011) Language: English ISBN-10:078974905X ISBN-13: 978-0789749055 File Size: 36.4 MB CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, wireless, and voice networking. The book contains an extensive set of preparation tools, such as quizzes, Exam Alerts, and a practice exam, while the CD’s state-of-the-art test engine provides real-time practice and feedback. Covers the critical information you’ll need to know to score higher on your Network+ (N10-005) exam! Understand modern network topologies, protocols, and models Work effectively with DNS and DHCP Monitor and analyze network traffic Understand IP addressing, routing, and switching Perform basic router/switch installation and configuration Manage networks and utilize basic optimization techniques Plan and implement a small office/home office network Master essential LAN, WAN, and wireless technologies Install, configure, secure, and troubleshoot wireless networks Safeguard networks with VPNs, authentication, firewalls, and security appliances Troubleshoot common problems with routers, switches, and physical connectivity Download E-Book Uploaded Link [Hidden Content] Uploaded Link [Hidden Content]
×
×
  • Create New...