- Publisher: Artech House Publishers
- Number Of Pages: 284
- Publication Date: 2002-11
- Sales Rank: 1378446
- ISBN / ASIN: 1580535054
- EAN: 9781580535052
- Binding: Hardcover
- Manufacturer: Artech House Publishers
- Studio: Artech House Publishers
- Book Description:
Gigabit Ethernet delivers the speed and high bandwidth that today's organizations demand from their local area networks. It is being chosen over other high-speed technologies because it is a flexible and cost-effective solution that can be used in a wide range of applications. This comprehensive guide gives you a clear picture of how Gigabit Ethernet works and how it can be used to support a broad range of services. You learn how Gigabit Ethernet can be used in the wide area and how it can support mobile systems.
The book also offers you a detailed understanding of how Gigabit Ethernet is used to build storage area networks, to scale up local area networks into total area networks, and to provide wireless solutions. By comparing Gigabit Ethernet to competing technologies, this guide helps you decide when Gigabit Ethernet is the right solution for your networking needs. This complete reference also provides you with a thorough treatment of the Ethernet standard and its many variants.
Download
Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers
By Peter T. Davis
* Publisher: AUERBACH
* Number Of Pages: 736
* Publication Date: 2002-05-15
* Sales Rank: 448860
* ISBN / ASIN: 0849312906
* EAN: 9780849312908
* Binding: Paperback
* Manufacturer: AUERBACH
* Studio: AUERBACH
Book Description:
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. In order to practice the material taught, the reader can log on to a real router and perform the commands.
Download
Mirror
CBT Nuggets 2005 Network + Series [Training Video]
CBT Nuggets 2005 Network + Series [Training Video]
contains the videos listed below:
- Network Topologies (Part 1)
- Network Topologies (Part 2)
- Media Connectors and Cabling
- Network Devices and Components (Part 1)
- Network Devices and Components (Part 2)
- OSI (Open Systems Interconnect) Model
- Media Access Control
- IP Addressing
- Network Layer Protocols
- TCP/IP Suite of Protocols and Services
- TCP/UDP Protocols and Services
- Additional Network Protocols and Services
- WAN Technologies
- Wireless Technologies
- Internet Access Technologies
- Remote Access Protocols and Services
- Server Remote Connectivity Configuration
- Security Protocols
- Authentication Protocols
- Network Operating Systems
- Client Workstation Connectivity
- Firewalls and Proxy Services
- VLAN's
- Intranets and Extranets
- Antivirus Protection
- Fault Tolerance and Disaster Recovery
- Troubleshooting Strategies
- Troubleshooting Utilities
- Physical Network Troubleshooting
- Shooting Trouble in Client/Server Environments
Rapidshare Part-1
Rapidshare Part-2
Rapidshare Part-3
Rapidshare Part-4
Rapidshare Part-5
Rapidshare Part-6
Rapidshare Part-7
Rapidshare Part-8
contains the videos listed below:
- Network Topologies (Part 1)
- Network Topologies (Part 2)
- Media Connectors and Cabling
- Network Devices and Components (Part 1)
- Network Devices and Components (Part 2)
- OSI (Open Systems Interconnect) Model
- Media Access Control
- IP Addressing
- Network Layer Protocols
- TCP/IP Suite of Protocols and Services
- TCP/UDP Protocols and Services
- Additional Network Protocols and Services
- WAN Technologies
- Wireless Technologies
- Internet Access Technologies
- Remote Access Protocols and Services
- Server Remote Connectivity Configuration
- Security Protocols
- Authentication Protocols
- Network Operating Systems
- Client Workstation Connectivity
- Firewalls and Proxy Services
- VLAN's
- Intranets and Extranets
- Antivirus Protection
- Fault Tolerance and Disaster Recovery
- Troubleshooting Strategies
- Troubleshooting Utilities
- Physical Network Troubleshooting
- Shooting Trouble in Client/Server Environments
Rapidshare Part-1
Rapidshare Part-2
Rapidshare Part-3
Rapidshare Part-4
Rapidshare Part-5
Rapidshare Part-6
Rapidshare Part-7
Rapidshare Part-8
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
By Jonathon Davidson
* Publisher: Cisco Press
* Number Of Pages: 450
* Publication Date: 2001-12
* Sales Rank: 110208
* ISBN / ASIN: 1587050307
* EAN: 9781587050305
* Binding: Hardcover
* Manufacturer: Cisco Press
* Studio: Cisco Press Book Description:
Learn real-world voice-over-IP deployment solutions and strategies from the Cisco experts
Deploying Cisco Voice over IP Solutions covers:
- Definitive guidelines on real-world VoIP deployments, the fundamentals of the latest VoIP solutions, and a look into the future of VoIP services
- Different techniques for engineering and properly sizing traffic-sensitive voice networks
- Basic concepts applicable to echo analysis, echo cancellation, and locating and eliminating echoes
- Various QoS features applicable to voice
- Detailed information on call admission control (CAC)
- Dial plan configuration recommendations on Cisco H.323 gateways and gatekeepers used to support large dial plans
- Basic tasks of designing a long-distance VoIP network
- The two classes of hosted voice networks: Managed Multiservice (MMS) networks and packet voice VPNs
- Fax services store and forward as well as real-time relay fax services
- Sample configurations and step-by-step examples to help you learn how to build a VoIP network
This book is a collaboration of Cisco Systems CCIE(r) engineers, technical marketing engineers, and systems engineers. You'll find design experience from people who have designed some of the world's largest VoIP networks.
Download
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
By Andy Oram
* Publisher: O'Reilly Media, Inc.
* Number Of Pages: 448
* Publication Date: 2001-03-15
* Sales Rank: 444698
* ISBN / ASIN: 059600110X
* EAN: 9780596001100
* Binding: Hardcover
* Manufacturer: O'Reilly Media, Inc.
* Studio: O'Reilly Media, Inc.
Book Description:
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users. While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it. This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field:
Download
By Andy Oram
* Publisher: O'Reilly Media, Inc.
* Number Of Pages: 448
* Publication Date: 2001-03-15
* Sales Rank: 444698
* ISBN / ASIN: 059600110X
* EAN: 9780596001100
* Binding: Hardcover
* Manufacturer: O'Reilly Media, Inc.
* Studio: O'Reilly Media, Inc.
Book Description:
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users. While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it. This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field:
- Nelson Minar and Marc Hedlund of target="new">Popular Power, on a history of peer-to-peer
- Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed
- Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions
- Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users
- David Anderson of SETI@home, on how SETI@Home created the world's largest computer
- Jeremie Miller of Jabber, on the Internet as a collection of conversations
- Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies
- Adam Langley of Freenet, on Freenet's present and upcoming architecture
- Alan Brown of Red Rover, on a deliberately low-tech content distribution system
- Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems
- Roger Dingledine, Michael J. Freedman, and David Molnar of Free Haven, on resource allocation and accountability in distributed systems
- Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata
- Theodore Hong of Freenet, on performance
- Richard Lethin of Reputation Technologies, on how reputation can be built online
- Jon Udell of BYTE and Nimisha Asthagiri and Walter Tuvell of Groove Networks, on security
- Brandon Wiley of Freenet, on gateways between peer-to-peer systems
Download
Troubleshooting Virtual Private Networks (VPN) (Networking Technology)
Troubleshooting Virtual Private Networks (VPN) (Networking Technology)
By Mark Lewis
* Publisher: Cisco Press
* Number Of Pages: 840
* Publication Date: 2004-05-27
* Sales Rank: 94934
* ISBN / ASIN: 1587051044
* EAN: 9781587051043
* Binding: Hardcover
* Manufacturer: Cisco Press
* Studio: Cisco Press
Book Description:
Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs
- Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs)
- Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs
- Master advanced troubleshooting tools and techniques for all applicable VPN types
- Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems
- Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN)
- Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues
- Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues
- Refer to specially designed flowcharts to identify issues and find solutions fast
- Consolidate VPN troubleshooting knowledge through bonus hands-on labs
- Read and understand detailed analysis of all relevant VPN show and debug command output
Each chapter in Troubleshooting Virtual Private Networks includes a step-by-step, end-to-end troubleshooting approach to a different VPN technology. In-depth technical discussions and configuration reviews orient you to the VPN technology and get you ready to work. To help you access the answers you need, you'll find flowcharts in each chapter that provide a roadmap for rapid issue resolution. Solutions to complex or unusual issues can be found in case studies at the end of each chapter, along with review questions that test your knowledge. Bonus troubleshooting labs are also included to help you consolidate the skills learned throughout the book.
Whether you are looking to update or hone your skills, Troubleshooting Virtual Private Networks is your first and last reference for mastering advanced VPN troubleshooting.
This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Download
Cisco books collection
Note: if link does not work in internet explorer, use mozila firefox browser .. You can get it from right top corner of this site cause links are tested only on mozila firefox.
Copy and paste the links in address bar and change 'hxxp' to 'http' and press enter:
Copy and paste the links in address bar and change 'hxxp' to 'http' and press enter:
Cisco Press - Cisco LAN Switching Fundamentals.chm 25-Oct-2004 08:47 4.2M
Cisco Press - Cisco Router Firewall Security.chm 25-Oct-2004 08:46 5.8M
Cisco Press - LAN Switching First-Step.chm 25-Oct-2004 08:44 5.3M
Cisco Press - Wireless Networks First-Step.chm 25-Oct-2004 08:47 1.2M
Configuring IPv6 for Cisco IOS.pdf 23-Dec-2003 22:52 4.2M
1. LAN Connectivity - Hardware/ 23-Dec-2003 13:49 -
2. Lan Technologies/ 23-Dec-2003 19:59 -
3. Repeaters, Bridges, and Switches/ 02-Jan-2004 17:11 -
3Com ATM Manual.pdf 02-Jan-2002 17:11 2.6M
4. Wan Technologies and Routing/ 06-Jan-2004 10:26 -
5. IP ADDRESSES.PPT 21-Jan-2004 18:49 375K
5.IP Addresses/ 21-Jan-2004 18:42 -
6. TCP IP.PPT 28-Jan-2004 16:51 344K
6. TCP IP/ 28-Jan-2004 02:26 -
7. Domain Name System/ 30-Jan-2004 18:18 -
8. High Speed Networks.ppt 01-Mar-2004 07:10 583K
8. High Speed Networks/ 06-Feb-2004 22:02 -
9.Web and Security/ 14-Feb-2004 11:46 -
10. Wireless Networks & Voice Over IP/ 28-Feb-2004 15:20 -
ACM News Service.htm 07-Jan-2004 17:07 52K
Autonomous Systems Areas.pdf 03-Jan-2004 15:26 11M
COURSE TOPICS.htm 11-Feb-2004 11:19 30K
Cisco 802.11.doc 07-Jan-2002 13:09 30K
Cisco Map.pot 27-Feb-2002 03:06 104K
Comcast Cable Modem.pdf 23-Dec-2003 12:53 162K
DHCP2000.doc 07-Jan-2002 13:10 737K
ENCYCLOP.PDF 07-Jan-2002 14:09 12M
FINAL EXAM GUIDE W04.DOC 04-Mar-2004 09:36 29K
Gigabit Ethernet.pdf 07-Jan-2002 14:14 1.1M
HOME PAGE.doc 06-Jan-2004 13:50 30K
HOME PAGE.htm 29-Jan-2004 17:35 23K
Home IP Address.doc 06-Jan-2004 11:11 31K
Hub Manual.pdf 30-Dec-2001 09:27 558K
IEEE Web Engineering.pdf 07-Jan-2002 14:16 324K
IP Address.GIF 08-Feb-2001 13:16 94K
IP_Security.doc 07-Jan-2002 14:16 47K
IS3502 Lab 1.doc 09-Jan-2004 04:35 1.0M
IS3502 Lab 2.doc 03-Feb-2004 01:36 30K
IS3502 Lab 3.doc 07-Feb-2004 13:48 31K
IS3502 Lab 4.doc 24-Feb-2004 07:00 50K
IS3502 Lab 5.doc 02-Mar-2004 11:32 120K
Lab # 1 Briefing Notes.doc 09-Jan-2004 04:45 26K
MT W04 Guide.doc 23-Feb-2004 13:21 25K
MT W04 SOLUTIONS.DOC 02-Mar-2004 11:57 24K
Map Network Drive.doc 01-Mar-2002 08:40 26K
Mobile IP.doc 08-Mar-2004 14:13 25K
New Nps Backbone 10-07-02.vsd 17-Mar-2003 05:14 608K
Professor Bio.htm 07-Jan-2004 13:23 14K
Project.htm 07-Jan-2004 13:23 17K
QWS_FTP32/ 01-Mar-2002 19:18 -
ROUTER ATTACKS.DOC 07-Feb-2002 15:09 62K
Subnet Mask Operation.htm 06-Feb-2001 22:27 16K
Subnet Mask Process.vsd 02-Feb-2003 20:15 83K
W2KDNS.DOC 04-Mar-2002 15:05 2.2M
Web Site Instructions.htm 03-Jan-2003 15:18 11K
midmkt.exe 06-Feb-2002 07:53 43M
en_CCNA2_SLM_v31.pdf 08-Nov-2006 17:46 7.6M
en_CCNA3_SLM_v31.pdf 08-Nov-2006 17:47 8.5M
en_CCNA4_SLM_v31.pdf 08-Nov-2006 17:47 2.4M
Cisco Networking Academy CCNP Semester 4 v3.0.rar 18-Oct-2004 14:31 0
Cisco Networking Academy CCNP Semester 2 v3.0/ 22-Apr-2003 12:46 -
Cisco Networking Academy CCNP Semester 2 v3.0.rar 18-Oct-2004 14:22 22M
Cisco Networking Academy CCNP Semester 1 v3.0/ 22-Apr-2003 12:46 -
Cisco Networking Academy CCNP Semester 1 v3.0.rar 18-Oct-2004 14:17 19M
640-607 Cisco Press CCNA 3.0 Study Guide (con indice).PDF 02-Jan-2005 13:16 12.3M
802.1D-1998.pdf 02-Jan-2005 13:16 1.7M
802.1Q-1998.pdf 02-Jan-2005 13:16 1.3M
802.1qTrunking.pdf 02-Jan-2005 13:16 56k
802.1sSpanningTree.pdf 02-Jan-2005 13:16 98k
Access VPNs And Tunneling Technologies.pdf 02-Jan-2005 13:16 569k
Acrc - Exam Certification Guide.ace 02-Jan-2005 13:16 6.3M
Acrc Study Guide.ace 02-Jan-2005 13:16 2.6M
ActualTests Cisco 640-801 ExamCheatSheet v12.23.03.pdf 02-Jan-2005 13:16 3.5M
CBT/ 02-Jan-2005 13:16
CCIE Certification Guide.pdf 02-Jan-2005 13:16 10.4M
CCNA v3 incl eLabs, CCNP v2, CCIE Full Curriculum Semesters 1-8.zip 02-Jan-2005 13:16 227M
CCNA_Exam_640-607_Certification_Guide.pdf 02-Jan-2005 13:18 13.2M
CCNA_WEB_EDITION.EXE 02-Jan-2005 13:18 35.4M
CCNP/ 02-Jan-2005 13:17 -
CISCO CCNA TRAINING KIT.RAR 02-Jan-2005 13:18 17.1M
Ccda Exam Certification Guide.ace 02-Jan-2005 13:18 5.9M
Cisco - Designing Network Security.pdf 02-Jan-2005 13:18 1.3M
Cisco - Network Consultants Handbook.pdf 02-Jan-2005 13:18 7.8M
Cisco - Skill Builder.zip 02-Jan-2005 13:18 70.6M
Cisco Access ISDN.ISO 02-Jan-2005 13:18 113M
Cisco As5x00 Case Study For Basic Ip Modem Services.pdf 02-Jan-2005 13:18 1.6M
Cisco CCIE Fundamentals Network Design.pdf 02-Jan-2005 13:18 2.3M
Cisco Ccna Training Kit.ace 02-Jan-2005 13:19 16.7M
Cisco Lan Switch Configuration Study Guide.ace 02-Jan-2005 13:19 8.1M
Cisco Networking Academy - Fundamentals of Voice and Data Cabling v1.1.zip 02-Jan-2005 13:19 168M
Cisco Press CCNA ICND 2004.pdf 02-Jan-2005 13:19 12.6M
Cisco Router Simulator (Sybex).zip 02-Jan-2005 13:19 10.0M
Cisco.IP.VC.Configuration.IVR.Utilities.V2.0/ 02-Jan-2005 13:18
Cisco.Inetworking.Troubleshooting/ 02-Jan-2005 13:18
Cisco.Packetized.Voice.and.Data.Integration.eBook-EEn.pdf 02-Jan-2005 13:19 10.3M
Cisco.Voice.over.Frame.Relay/ 02-Jan-2005 13:18
Cisco_Fundamentals_of_Java_v1.2_-_JGT.rar 02-Jan-2005 13:19 13.4M
Cisco_IP_Addressing_.zip 02-Jan-2005 13:19 3.0M
Cisco_The_Complete_Reference_NoFearLevenT.pdf 02-Jan-2005 13:19 10.5M
Ciscosims/ 02-Jan-2005 13:18
ELAB/ 02-Jan-2005 13:18
ELAB_SEM3_V1.ZIP 02-Jan-2005 13:19 4.7M
ISLFrameFormat.pdf 02-Jan-2005 13:19 17k
Internetworking Technology Overview 2nd Edition.pdf 02-Jan-2005 13:19 1.9M
SelfTest/ 02-Jan-2005 13:18
Sybex CCNA Virtual Test Center/ 02-Jan-2005 13:19
Sybex Complete Java 2 Certification Guide/ 02-Jan-2005 13:18
Test.King/ 02-Jan-2005 13:19
Troubleshooting Ethernet.pdf 02-Jan-2005 13:19 154k
Troubleshooting Serial Lines.pdf 02-Jan-2005 13:19 406k
Troubleshooting TCP_IP.pdf 02-Jan-2005 13:19 220k
ccna cisco manual+test sybex boson trascender full and crack.zip 02-Jan-2005 13:19 39.8M
cisco ccda self-study v2.pdf 02-Jan-2005 13:20 27.7M
cisco nuts/ 02-Jan-2005 13:18
cisco-642-821.pdf 02-Jan-2005 13:20 15.4M
cisco-ios-essentials/ 02-Jan-2005 13:18
cisco_exams_complete/ 02-Jan-2005 13:18
cisco_networking_academy_3.0_bridges_1-4.zip 02-Jan-2005 13:20 53.2M
en_CCNA1_v30.zip 02-Jan-2005 13:20 28.6M
en_CCNA2_v30.zip 02-Jan-2005 13:20 24.3M
en_CCNA3_v30.zip 02-Jan-2005 13:20 23.6M
en_CCNA4_v30.zip 02-Jan-2005 13:20 19.0M
exam_preparation/ 02-Jan-2005 13:18
igrp.pdf 02-Jan-2005 13:20 37k
lan-switch-cisco.pdf 02-Jan-2005 13:20 915k
Cisco IOS Access Lists_O'reilly press ok.pdf 11-May-2003 14:39 1.4M
BSCIv1.2 Configuring IS-IS Protocol.pdf 13-Jun-2003 11:52 5.7M
mpls_vpn/ 15-Jul-2004 22:50 -
mpls/ 15-Jul-2004 22:50 -
PPT/ 11-Nov-2005 16:43 -
ISP IXP Networking Workshop/ 17-Nov-2005 09:50 -
Certificate/ 17-Nov-2005 15:04 -
BSCIѧϺ±Ê¼Ç.pdf 14-Dec-2005 00:57 1.2M
Pix/ 21-Feb-2006 17:02 -
Cisco_VPN_Training.rar 17-Mar-2006 16:39 10.1M
TANDBERG Software Release - Endpoints MXP for Cisco CallManager (M1.3).pdf 30-Jun-2005 17:57 226K
TANDBERG Software Release - Endpoints MXP for Cisco CallManager (M2.1).pdf 23-Nov-2005 14:24 44K
hxxp://ftp.tandberg.net/pub/software/endpoints/cisco_call_manager_series/m-series/
index of parent directory
Cisco-Internetworking-Design-guide.pdf 07-Mar-2006 14:30 2.3M
Cisco-internetworking-case-studies.pdf 07-Mar-2006 14:29 833k
Parent Directory
Addison.Wesley.Professional.Practical.BGP.Jul.2004.eBook-DDU.chm
Addison.Wesley.Professional.Practical.BGP.Jul.2004.eBook-DDU.pdf
BGP4 Case Studies.pdf
Ccip - Configuring Bgp On Cisco Routers Vol 3.pdf
Cisco---Border-Gateway-Protocol-(BGP)-Student-Guide-v3.0-(2003).pdf
Cisco-Press---The-Definitive-BGP-Resource---Internet-Routing-Architectures-2nd-Edition-2000.pdf
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.chm
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.pdf
Cisco.Press.Cisco.BGP-4.Command.and.Configuration.Handbook.(CCIE.Professional.Development)-FOS.chm
Cisco.Press.Cisco.BGP-4.Command.and.Configuration.Handbook.(CCIE.Professional.Development)-FOS.pdf
Cisco Press Optimal Routing Design Jun 2005 Ebook-Ddu.chm
Cisco Press Optimal Routing Design Jun 2005 Ebook-Ddu.pdf
Configuring BGP on Cisco Routers Vol 1.pdf
Configuring BGP on Cisco Routers Vol 2.pdf
HTML/
John.Wiley.&.Sons.-.Juniper.and.Cisco.Routing.pdf
Juniper_Networks_Field_Guide_and_Reference_(2002).chm
Juniper_Networks_Field_Guide_and_Reference_(2002).pdf
Juniper and Cisco Routing - Policy and Protocols for Multivendor IP Networks [Wiley Publishing 2002].pdf
Sybex - Jncip - Juniper Networks - Certified Internet Professional - 2003.pdf
Syngress - Ip Addressing and Subnetting Including Ipv6 (2000).chm
Syngress IP Addressing and Subnetting including IPv6.pdf
Troubleshooting BGP (Networkers, 2001).pdf
[Cisco Press] CCIE Professional Development Troubleshooting IP Routing Protocols.chm
[Cisco Press] CCIE Professional Development Troubleshooting IP Routing Protocols.pdf
[PDF - Computer Science - ENG] Cisco - Bgp For Internet Service Providers.pdf
[ebook] BGP Best Path Selection Algorithm.pdf
(ebook pdf) Illustrated TCPIP.pdf 07-Mar-2005 07:01 6.1M
CH1 Cisco IOS.pdf 07-Mar-2005 07:09 104k
Cisco Advanced IP routing.ppt 30-Dec-2002 15:51 1.8M
Cisco Advanced Routing Technologies.pdf 30-Dec-2002 15:51 1.1M
Cisco CCIE Network Design.pdf 30-Dec-2002 15:51 3.3M
Cisco CCIE Tests.doc 30-Dec-2002 15:52 444k
Cisco CCIE.pdf 30-Dec-2002 15:52 4.6M
Cisco CH3 Network Design.pdf 30-Dec-2002 15:52 208k
Cisco CH4 IP Design.pdf 30-Dec-2002 15:52 130k
Cisco Configuring IP routing protocol independent features 010299.pdf 07-Mar-2005 07:09 86k
Cisco DOTU - IOS Undocumented.pdf 07-Mar-2005 07:09 100k
Cisco Designing Larce-Scale IP Internetworks.pdf 30-Dec-2002 15:52 373k
Cisco Designing Web-Based Network Management 280599.ppt 30-Dec-2002 15:52 1.8M
Cisco First_mile_Price.ppt 30-Dec-2002 15:52 1.9M
Cisco IOS Essentials 2-82.pdf 07-Mar-2005 07:11 588k
Cisco IOS Essentials 2-84.pdf 07-Mar-2005 07:12 1.1M
Cisco IOS Essentials 2-9.pdf 07-Mar-2005 07:10 985k
Cisco IOS Reference Guide 060899.pdf 07-Mar-2005 07:13 443k
Cisco IP design.pdf 30-Dec-2002 15:52 5.0M
Cisco IP routing Protocol-Independent commands 230399.pdf 07-Mar-2005 07:13 200k
Cisco Internetwork Design Guide.pdf 30-Dec-2002 15:52 5.8M
Cisco Internetworking Design Basics 221098.pdf 30-Dec-2002 15:52 274k
Cisco Introduction to Routing Protocols.pdf 30-Dec-2002 15:52 877k
Cisco SYSLOG analysis.pdf 07-Mar-2005 07:13 63k
Cisco Troubleshooting TCPIP 201297.pdf 07-Mar-2005 07:14 99k
Cisco loopback.pdf 07-Mar-2005 07:13 105k
Comparison TCPIP and Netware.doc 30-Dec-2002 15:52 136k
Cross Connection.gif 30-Dec-2002 15:52 14k
FAQ Cisco ISP MailingListI.doc 30-Dec-2002 15:52 9k
FAQ Comunicacao de Dados.pdf 30-Dec-2002 15:52 5.4M
FAQ Rede.doc 30-Dec-2002 15:52 49k
FAQ Redes de Alta Velocidade.doc 30-Dec-2002 15:52 110k
FAQ Snmp.doc 30-Dec-2002 15:52 152k
FAQ TCPIP UNIX and Ethernet.pdf 30-Dec-2002 15:52 49k
FAQ Tcpip.doc 30-Dec-2002 15:52 230k
McGraw-Hill - TCP-IP - Architecture, Protocols and Implementation With IPv6 and IP Security.chm 07-Mar-2005 06:53 6.0M
Multimedia H.245 in H.324 Overview.doc 06-Mar-2005 20:33 64k
Network Architecture.pdf 07-Mar-2005 07:14 56k
Numbering Convention.pdf 07-Mar-2005 07:14 20k
OReilly - TCPIP Network Administration.pdf 07-Mar-2005 07:20 5.1M
PROTOCOLOS.pdf 22-Jul-2003 16:24 167k
Paper CANET3.pdf 30-Dec-2002 15:52 800k
Paper CAnet5.ppt 30-Dec-2002 15:53 4.1M
Paper CCNA OSI Model.doc 30-Dec-2002 15:53 122k
Paper Capacity Planning.pdf 30-Dec-2002 15:53 90k
Paper Computer Networks.pdf 30-Dec-2002 15:53 134k
Paper Data Link Control.ppt 30-Dec-2002 15:53 359k
Paper Evolution of the Data Communication.pdf 07-Mar-2005 07:21 742k
Paper Experiments with a Layered Transmission over Internet.ps 30-Dec-2002 15:53 1.7M
Paper Fundamentals of Telecommunications.pdf 30-Dec-2002 15:53 163k
Paper Fundamentos Comunicaciones.pdf 30-Dec-2002 15:53 158k
Paper IP Livingston.html 30-Dec-2002 15:53 9k
Paper IP Network.pdf 30-Dec-2002 15:53 1.1M
Paper Intelligent Network.pdf 30-Dec-2002 15:53 115k
Paper Intenet Access.pdf 30-Dec-2002 15:53 165k
Paper Internet B%e1sico.pdf 30-Dec-2002 15:53 3.0M
Paper Juniper Graceful Restart.pdf 30-Dec-2002 15:53 260k
Paper NGN.ppt 0-Dec-2002 15:54 39k
Paper NSP_SR_100702.pdf 30-Dec-2002 15:54 588k
Paper Network Planning.pdf 07-Mar-2005 08:03 302k
Paper Network Topologies.ppt 30-Dec-2002 15:53 2.2M
Paper Novas Tecnologias.ppt 30-Dec-2002 15:54 354k
Paper OSI Model.ppt 30-Dec-2002 15:54 5.4M
Paper Platforms for Voice and Data Networks.pdf 30-Dec-2002 15:54 96k
Paper Rede IP.pdf 30-Dec-2002 15:55 114k
Paper Redes Multimidia.pdf 30-Dec-2002 15:55 649k
Paper Redes de Dados 1.pdf 30-Dec-2002 15:55 1.2M
Paper Redes de Dados 2.pdf 30-Dec-2002 15:55 1.6M
Paper Redes de Dados 3.pdf 30-Dec-2002 15:55 1.9M
Paper Redes de Dados.pdf 30-Dec-2002 15:55 4.0M
Paper Redes.doc 30-Dec-2002 15:55 4.7M
Paper Regular Expressions.pdf 30-Dec-2002 15:55 5.8M
Paper Roteamento na Internet.pdf 30-Dec-2002 15:55 250k
Paper Roteamento1.pdf 30-Dec-2002 15:55 106k
Paper Roteamento2.pdf 30-Dec-2002 15:55 82k
Paper TCP-IP-Intro.ppt 30-Dec-2002 15:56 1020k
Paper TCPIP II.pdf 30-Dec-2002 15:56 236k
Paper TCPIP arp-rarp.ppt 30-Dec-2002 15:56 208k
Paper TCPIP suite part1.pdf 30-Dec-2002 15:56 968k
Paper TCPIP suite part2.pdf 16-Jul-2003 08:59 791k
Paper TCPIP suite part3.pdf 30-Dec-2002 15:56 849k
Paper Table Subnet.pdf 30-Dec-2002 15:56 62k
Paper Tcpip.pdf 30-Dec-2002 15:56 265k
Paper Tcpip1.pdf 30-Dec-2002 15:56 6.9M
Paper Tecnologia Comunicacao.pdf 30-Dec-2002 15:56 1.1M
Paper Telecommunication and Location.pdf 30-Dec-2002 15:56 297k
Paper Telecommunications Fundamentals.pdf 30-Dec-2002 15:56 227k
Paper Understanding IP Address 1.pdf 30-Dec-2002 15:56 67k
Paper Understanding IP Address 2.pdf 30-Dec-2002 15:56 92k
Paper Understanding IP Address 3.pdf 30-Dec-2002 15:56 56k
Paper Understanding IP Address.pdf 30-Dec-2002 15:56 147k
Paper Windows NT tcpip .pdf 30-Dec-2002 15:57 190k
Paper Windows NT tcpip.pdf 30-Dec-2002 15:57 190k
Paper Windows redes.pdf 30-Dec-2002 15:57 1.2M
Paper udp-tcp.ppt 30-Dec-2002 15:56 240k
RST-2111.pdf 7-Mar-2005 08:58 4.0M
RST-2112.pdf 07-Mar-2005 09:04 4.9M
RST-3031.pdf 07-Mar-2005 08:49 3.3M
Summary Cisco Command.pdf 07-Mar-2005 07:21 22k
Summary Cisco Modes.pdf 07-Mar-2005 07:21 30k
Summary Cisco Troubleshooting.pdf 07-Mar-2005 06:38 18k
Summary Show Screens.xls 07-Mar-2005 06:53 69k
Summary Table Routing.PDF 07-Mar-2005 06:38 79k
hxxp://www.inforede.net/Technical/Layer_3_and_4/Network/
Cisco IOS 12.2 Command Summary 1 of 3.pdf 17-Jul-2003 11:24 6.7M
Cisco IOS 12.2 Command Summary 2 of 3.pdf 17-Jul-2003 11:37 7.4M
Cisco IOS 12.2 Command Summary 3 of 3.pdf 17-Jul-2003 12:55 6.0M
Cisco Access Routers - Quick Reference Guide.pdf 30-Aug-2004 18:30 1.0M
Cisco_805_Series_SERIAL_Router.pdf 04-Nov-2003 01:02 366K
Cisco_806_Series_BROADBAND_Router.pdf 04-Nov-2003 01:02 570K
Cisco_1721_and_1720_Modular_Access_Routers.pdf 04-Nov-2003 01:01 313K
Cisco_1751_Modular_Access_Router.pdf 04-Nov-2003 01:02 644K
Cisco_1760_Modular_Access_Router.pdf 04-Nov-2003 01:02 299K
Cisco_1800_Series_Models_Comparison.pdf 24-Oct-2005 07:38 45K
Cisco_2800_Series_Models_Comparison.pdf 24-Oct-2005 07:38 49K
Cisco_3800_Series_Integrated_Services_Router.pdf 03-Oct-2006 17:27 175K
Cisco_3800_Series_Models_Comparison.pdf 03-Oct-2006 17:27 59K
Cisco_Aironet_802-11-a-b-g_CardBus_Wireless_LAN_Client_Adapter_ds.pdf 12-Oct-2004 16:40 258K
Cisco_Aironet_802-11-a-b-g_PCI_Wireless_LAN_Client_Adapter_ds.pdf 12-Oct-2004 16:43 256K
Cisco_Aironet_1000_Series_Lightweight_Access_Points.pdf 24-Oct-2005 08:18 196K
Cisco_Aironet_1100_Series_Access_Point_ds.pdf 11-Oct-2004 14:30 437K
Cisco_Aironet_1200_Series_Access_Point_ds.pdf 13-Oct-2004 16:49 591K
Cisco_Aironet_1200_Series_Access_Point_ds_New.pdf 10-May-2005 12:36 71K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_Power_Injector_ds_New.pdf 10-May-2005 12:42 91K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_Power_Injector _ds_New.pdf 10-May-2005 12:41 91K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_ds.pdf 18-Oct-2004 15:04 322K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_ds_New.pdf 10-May-2005 12:37 362K
Cisco_Aironet_1400_Series_Wireless_Bridge_ds.pdf 18-Oct-2004 14:39 286K
Cisco_Aironet_1500_Series_Lightweight_Outdoor_Mesh_Access_Points.pdf 23-Jan-2006 22:37 792K
Cisco_Aironet_Antenna_Reference_Guide_ds_New.pdf 14-Mar-2005 15:14 937K
Cisco_Aironet_Antennas_and_Accessories_ds.pdf 18-Oct-2004 14:40 621K
Cisco_Aironet_Lightning_Arrestor_ds.pdf 14-Mar-2005 17:32 101K
Cisco_Aironet_Power_Injectors_ds.pdf 18-Oct-2004 14:40 122K
Cisco_Aironet_Power_Injectors_ds_New.pdf 14-Mar-2005 15:14 122K
Cisco_Aironet_Wireless_Access_Points_Solution_Overview.pdf 26-Oct-2005 21:41 444K
Cisco_Catalyst_2950_-_Enhanced_Image.pdf 20-Jun-2005 12:53 135K
Cisco_Catalyst_2950_-_Standard_Image.pdf 20-Jun-2005 12:53 125K
Cisco_Catalyst_2950_Long-Reach_Ethernet_Switches.pdf 20-Jun-2005 23:54 279K
Cisco_Catalyst_2955_Series_Switches.pdf 20-Jun-2005 23:54 458K
Cisco_Catalyst_3560_Series_Switches.pdf 10-May-2005 13:15 254K
Cisco_Router_Guide_-_Winter_2004-mod.pdf 20-Jun-2005 23:41 967K
Cisco_Wireless_LAN_Controllers.pdf 15-Jun-2006 19:15 283K
Comparativo_CamIP.pdf 22-Jan-2006 23:45 50K
MultiVOIP_Gateways_Data_Sheet.pdf 14-Dec-2004 16:48 321K
Netgear_Familias_de_Productos.pdf 03-Oct-2006 18:08 765K
Network_IP_Camera_550703.pdf 08-Oct-2005 19:16 60K
Network_IP_Camera_550710.pdf 21-Oct-2004 01:06 87K
Nortel_BCM50.pdf 20-Oct-2005 23:48 225K
Cisco Press - Cisco Router Firewall Security.chm 25-Oct-2004 08:46 5.8M
Cisco Press - LAN Switching First-Step.chm 25-Oct-2004 08:44 5.3M
Cisco Press - Wireless Networks First-Step.chm 25-Oct-2004 08:47 1.2M
Configuring IPv6 for Cisco IOS.pdf 23-Dec-2003 22:52 4.2M
hxxp://www.z4.cn/books/Cisco Press/
index of parent directory1. LAN Connectivity - Hardware/ 23-Dec-2003 13:49 -
2. Lan Technologies/ 23-Dec-2003 19:59 -
3. Repeaters, Bridges, and Switches/ 02-Jan-2004 17:11 -
3Com ATM Manual.pdf 02-Jan-2002 17:11 2.6M
4. Wan Technologies and Routing/ 06-Jan-2004 10:26 -
5. IP ADDRESSES.PPT 21-Jan-2004 18:49 375K
5.IP Addresses/ 21-Jan-2004 18:42 -
6. TCP IP.PPT 28-Jan-2004 16:51 344K
6. TCP IP/ 28-Jan-2004 02:26 -
7. Domain Name System/ 30-Jan-2004 18:18 -
8. High Speed Networks.ppt 01-Mar-2004 07:10 583K
8. High Speed Networks/ 06-Feb-2004 22:02 -
9.Web and Security/ 14-Feb-2004 11:46 -
10. Wireless Networks & Voice Over IP/ 28-Feb-2004 15:20 -
ACM News Service.htm 07-Jan-2004 17:07 52K
Autonomous Systems Areas.pdf 03-Jan-2004 15:26 11M
COURSE TOPICS.htm 11-Feb-2004 11:19 30K
Cisco 802.11.doc 07-Jan-2002 13:09 30K
Cisco Map.pot 27-Feb-2002 03:06 104K
Comcast Cable Modem.pdf 23-Dec-2003 12:53 162K
DHCP2000.doc 07-Jan-2002 13:10 737K
ENCYCLOP.PDF 07-Jan-2002 14:09 12M
FINAL EXAM GUIDE W04.DOC 04-Mar-2004 09:36 29K
Gigabit Ethernet.pdf 07-Jan-2002 14:14 1.1M
HOME PAGE.doc 06-Jan-2004 13:50 30K
HOME PAGE.htm 29-Jan-2004 17:35 23K
Home IP Address.doc 06-Jan-2004 11:11 31K
Hub Manual.pdf 30-Dec-2001 09:27 558K
IEEE Web Engineering.pdf 07-Jan-2002 14:16 324K
IP Address.GIF 08-Feb-2001 13:16 94K
IP_Security.doc 07-Jan-2002 14:16 47K
IS3502 Lab 1.doc 09-Jan-2004 04:35 1.0M
IS3502 Lab 2.doc 03-Feb-2004 01:36 30K
IS3502 Lab 3.doc 07-Feb-2004 13:48 31K
IS3502 Lab 4.doc 24-Feb-2004 07:00 50K
IS3502 Lab 5.doc 02-Mar-2004 11:32 120K
Lab # 1 Briefing Notes.doc 09-Jan-2004 04:45 26K
MT W04 Guide.doc 23-Feb-2004 13:21 25K
MT W04 SOLUTIONS.DOC 02-Mar-2004 11:57 24K
Map Network Drive.doc 01-Mar-2002 08:40 26K
Mobile IP.doc 08-Mar-2004 14:13 25K
New Nps Backbone 10-07-02.vsd 17-Mar-2003 05:14 608K
Professor Bio.htm 07-Jan-2004 13:23 14K
Project.htm 07-Jan-2004 13:23 17K
QWS_FTP32/ 01-Mar-2002 19:18 -
ROUTER ATTACKS.DOC 07-Feb-2002 15:09 62K
Subnet Mask Operation.htm 06-Feb-2001 22:27 16K
Subnet Mask Process.vsd 02-Feb-2003 20:15 83K
W2KDNS.DOC 04-Mar-2002 15:05 2.2M
Web Site Instructions.htm 03-Jan-2003 15:18 11K
midmkt.exe 06-Feb-2002 07:53 43M
hxxp://web.nps.navy.mil/~nschneid/is3502/
en_CCNA1_SLM_v31.pdf 08-Nov-2006 17:46 4.2Men_CCNA2_SLM_v31.pdf 08-Nov-2006 17:46 7.6M
en_CCNA3_SLM_v31.pdf 08-Nov-2006 17:47 8.5M
en_CCNA4_SLM_v31.pdf 08-Nov-2006 17:47 2.4M
hxxp://allmostpro.net/samsum/CISCO%20CCNA/
index of parent directoryCisco Networking Academy CCNP Semester 4 v3.0.rar 18-Oct-2004 14:31 0
Cisco Networking Academy CCNP Semester 2 v3.0/ 22-Apr-2003 12:46 -
Cisco Networking Academy CCNP Semester 2 v3.0.rar 18-Oct-2004 14:22 22M
Cisco Networking Academy CCNP Semester 1 v3.0/ 22-Apr-2003 12:46 -
Cisco Networking Academy CCNP Semester 1 v3.0.rar 18-Oct-2004 14:17 19M
http://hyse.org/pdf/ccnp/?C=N;O=D
index of parent directory640-607 Cisco Press CCNA 3.0 Study Guide (con indice).PDF 02-Jan-2005 13:16 12.3M
802.1D-1998.pdf 02-Jan-2005 13:16 1.7M
802.1Q-1998.pdf 02-Jan-2005 13:16 1.3M
802.1qTrunking.pdf 02-Jan-2005 13:16 56k
802.1sSpanningTree.pdf 02-Jan-2005 13:16 98k
Access VPNs And Tunneling Technologies.pdf 02-Jan-2005 13:16 569k
Acrc - Exam Certification Guide.ace 02-Jan-2005 13:16 6.3M
Acrc Study Guide.ace 02-Jan-2005 13:16 2.6M
ActualTests Cisco 640-801 ExamCheatSheet v12.23.03.pdf 02-Jan-2005 13:16 3.5M
CBT/ 02-Jan-2005 13:16
CCIE Certification Guide.pdf 02-Jan-2005 13:16 10.4M
CCNA v3 incl eLabs, CCNP v2, CCIE Full Curriculum Semesters 1-8.zip 02-Jan-2005 13:16 227M
CCNA_Exam_640-607_Certification_Guide.pdf 02-Jan-2005 13:18 13.2M
CCNA_WEB_EDITION.EXE 02-Jan-2005 13:18 35.4M
CCNP/ 02-Jan-2005 13:17 -
CISCO CCNA TRAINING KIT.RAR 02-Jan-2005 13:18 17.1M
Ccda Exam Certification Guide.ace 02-Jan-2005 13:18 5.9M
Cisco - Designing Network Security.pdf 02-Jan-2005 13:18 1.3M
Cisco - Network Consultants Handbook.pdf 02-Jan-2005 13:18 7.8M
Cisco - Skill Builder.zip 02-Jan-2005 13:18 70.6M
Cisco Access ISDN.ISO 02-Jan-2005 13:18 113M
Cisco As5x00 Case Study For Basic Ip Modem Services.pdf 02-Jan-2005 13:18 1.6M
Cisco CCIE Fundamentals Network Design.pdf 02-Jan-2005 13:18 2.3M
Cisco Ccna Training Kit.ace 02-Jan-2005 13:19 16.7M
Cisco Lan Switch Configuration Study Guide.ace 02-Jan-2005 13:19 8.1M
Cisco Networking Academy - Fundamentals of Voice and Data Cabling v1.1.zip 02-Jan-2005 13:19 168M
Cisco Press CCNA ICND 2004.pdf 02-Jan-2005 13:19 12.6M
Cisco Router Simulator (Sybex).zip 02-Jan-2005 13:19 10.0M
Cisco.IP.VC.Configuration.IVR.Utilities.V2.0/ 02-Jan-2005 13:18
Cisco.Inetworking.Troubleshooting/ 02-Jan-2005 13:18
Cisco.Packetized.Voice.and.Data.Integration.eBook-EEn.pdf 02-Jan-2005 13:19 10.3M
Cisco.Voice.over.Frame.Relay/ 02-Jan-2005 13:18
Cisco_Fundamentals_of_Java_v1.2_-_JGT.rar 02-Jan-2005 13:19 13.4M
Cisco_IP_Addressing_.zip 02-Jan-2005 13:19 3.0M
Cisco_The_Complete_Reference_NoFearLevenT.pdf 02-Jan-2005 13:19 10.5M
Ciscosims/ 02-Jan-2005 13:18
ELAB/ 02-Jan-2005 13:18
ELAB_SEM3_V1.ZIP 02-Jan-2005 13:19 4.7M
ISLFrameFormat.pdf 02-Jan-2005 13:19 17k
Internetworking Technology Overview 2nd Edition.pdf 02-Jan-2005 13:19 1.9M
SelfTest/ 02-Jan-2005 13:18
Sybex CCNA Virtual Test Center/ 02-Jan-2005 13:19
Sybex Complete Java 2 Certification Guide/ 02-Jan-2005 13:18
Test.King/ 02-Jan-2005 13:19
Troubleshooting Ethernet.pdf 02-Jan-2005 13:19 154k
Troubleshooting Serial Lines.pdf 02-Jan-2005 13:19 406k
Troubleshooting TCP_IP.pdf 02-Jan-2005 13:19 220k
ccna cisco manual+test sybex boson trascender full and crack.zip 02-Jan-2005 13:19 39.8M
cisco ccda self-study v2.pdf 02-Jan-2005 13:20 27.7M
cisco nuts/ 02-Jan-2005 13:18
cisco-642-821.pdf 02-Jan-2005 13:20 15.4M
cisco-ios-essentials/ 02-Jan-2005 13:18
cisco_exams_complete/ 02-Jan-2005 13:18
cisco_networking_academy_3.0_bridges_1-4.zip 02-Jan-2005 13:20 53.2M
en_CCNA1_v30.zip 02-Jan-2005 13:20 28.6M
en_CCNA2_v30.zip 02-Jan-2005 13:20 24.3M
en_CCNA3_v30.zip 02-Jan-2005 13:20 23.6M
en_CCNA4_v30.zip 02-Jan-2005 13:20 19.0M
exam_preparation/ 02-Jan-2005 13:18
igrp.pdf 02-Jan-2005 13:20 37k
lan-switch-cisco.pdf 02-Jan-2005 13:20 915k
hxxp://svetulcho.org/docs/CISCO/
index of parent directoryCisco IOS Access Lists_O'reilly press ok.pdf 11-May-2003 14:39 1.4M
BSCIv1.2 Configuring IS-IS Protocol.pdf 13-Jun-2003 11:52 5.7M
mpls_vpn/ 15-Jul-2004 22:50 -
mpls/ 15-Jul-2004 22:50 -
PPT/ 11-Nov-2005 16:43 -
ISP IXP Networking Workshop/ 17-Nov-2005 09:50 -
Certificate/ 17-Nov-2005 15:04 -
BSCIѧϺ±Ê¼Ç.pdf 14-Dec-2005 00:57 1.2M
Pix/ 21-Feb-2006 17:02 -
Cisco_VPN_Training.rar 17-Mar-2006 16:39 10.1M
hxxp://www.huangjiaju.com/Network Technology/Cisco/
index of parent directoryTANDBERG Software Release - Endpoints MXP for Cisco CallManager (M1.3).pdf 30-Jun-2005 17:57 226K
TANDBERG Software Release - Endpoints MXP for Cisco CallManager (M2.1).pdf 23-Nov-2005 14:24 44K
hxxp://ftp.tandberg.net/pub/software/endpoints/cisco_call_manager_series/m-series/
index of parent directory
Cisco-Internetworking-Design-guide.pdf 07-Mar-2006 14:30 2.3M
Cisco-internetworking-case-studies.pdf 07-Mar-2006 14:29 833k
hxxp://tunggul.duniasemu.org/
index of parent directoryParent Directory
Addison.Wesley.Professional.Practical.BGP.Jul.2004.eBook-DDU.chm
Addison.Wesley.Professional.Practical.BGP.Jul.2004.eBook-DDU.pdf
BGP4 Case Studies.pdf
Ccip - Configuring Bgp On Cisco Routers Vol 3.pdf
Cisco---Border-Gateway-Protocol-(BGP)-Student-Guide-v3.0-(2003).pdf
Cisco-Press---The-Definitive-BGP-Resource---Internet-Routing-Architectures-2nd-Edition-2000.pdf
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.chm
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.pdf
Cisco.Press.Cisco.BGP-4.Command.and.Configuration.Handbook.(CCIE.Professional.Development)-FOS.chm
Cisco.Press.Cisco.BGP-4.Command.and.Configuration.Handbook.(CCIE.Professional.Development)-FOS.pdf
Cisco Press Optimal Routing Design Jun 2005 Ebook-Ddu.chm
Cisco Press Optimal Routing Design Jun 2005 Ebook-Ddu.pdf
Configuring BGP on Cisco Routers Vol 1.pdf
Configuring BGP on Cisco Routers Vol 2.pdf
HTML/
John.Wiley.&.Sons.-.Juniper.and.Cisco.Routing.pdf
Juniper_Networks_Field_Guide_and_Reference_(2002).chm
Juniper_Networks_Field_Guide_and_Reference_(2002).pdf
Juniper and Cisco Routing - Policy and Protocols for Multivendor IP Networks [Wiley Publishing 2002].pdf
Sybex - Jncip - Juniper Networks - Certified Internet Professional - 2003.pdf
Syngress - Ip Addressing and Subnetting Including Ipv6 (2000).chm
Syngress IP Addressing and Subnetting including IPv6.pdf
Troubleshooting BGP (Networkers, 2001).pdf
[Cisco Press] CCIE Professional Development Troubleshooting IP Routing Protocols.chm
[Cisco Press] CCIE Professional Development Troubleshooting IP Routing Protocols.pdf
[PDF - Computer Science - ENG] Cisco - Bgp For Internet Service Providers.pdf
[ebook] BGP Best Path Selection Algorithm.pdf
hxxp://gog.gateit.net/books/BGP/
index of parent directory(ebook pdf) Illustrated TCPIP.pdf 07-Mar-2005 07:01 6.1M
CH1 Cisco IOS.pdf 07-Mar-2005 07:09 104k
Cisco Advanced IP routing.ppt 30-Dec-2002 15:51 1.8M
Cisco Advanced Routing Technologies.pdf 30-Dec-2002 15:51 1.1M
Cisco CCIE Network Design.pdf 30-Dec-2002 15:51 3.3M
Cisco CCIE Tests.doc 30-Dec-2002 15:52 444k
Cisco CCIE.pdf 30-Dec-2002 15:52 4.6M
Cisco CH3 Network Design.pdf 30-Dec-2002 15:52 208k
Cisco CH4 IP Design.pdf 30-Dec-2002 15:52 130k
Cisco Configuring IP routing protocol independent features 010299.pdf 07-Mar-2005 07:09 86k
Cisco DOTU - IOS Undocumented.pdf 07-Mar-2005 07:09 100k
Cisco Designing Larce-Scale IP Internetworks.pdf 30-Dec-2002 15:52 373k
Cisco Designing Web-Based Network Management 280599.ppt 30-Dec-2002 15:52 1.8M
Cisco First_mile_Price.ppt 30-Dec-2002 15:52 1.9M
Cisco IOS Essentials 2-82.pdf 07-Mar-2005 07:11 588k
Cisco IOS Essentials 2-84.pdf 07-Mar-2005 07:12 1.1M
Cisco IOS Essentials 2-9.pdf 07-Mar-2005 07:10 985k
Cisco IOS Reference Guide 060899.pdf 07-Mar-2005 07:13 443k
Cisco IP design.pdf 30-Dec-2002 15:52 5.0M
Cisco IP routing Protocol-Independent commands 230399.pdf 07-Mar-2005 07:13 200k
Cisco Internetwork Design Guide.pdf 30-Dec-2002 15:52 5.8M
Cisco Internetworking Design Basics 221098.pdf 30-Dec-2002 15:52 274k
Cisco Introduction to Routing Protocols.pdf 30-Dec-2002 15:52 877k
Cisco SYSLOG analysis.pdf 07-Mar-2005 07:13 63k
Cisco Troubleshooting TCPIP 201297.pdf 07-Mar-2005 07:14 99k
Cisco loopback.pdf 07-Mar-2005 07:13 105k
Comparison TCPIP and Netware.doc 30-Dec-2002 15:52 136k
Cross Connection.gif 30-Dec-2002 15:52 14k
FAQ Cisco ISP MailingListI.doc 30-Dec-2002 15:52 9k
FAQ Comunicacao de Dados.pdf 30-Dec-2002 15:52 5.4M
FAQ Rede.doc 30-Dec-2002 15:52 49k
FAQ Redes de Alta Velocidade.doc 30-Dec-2002 15:52 110k
FAQ Snmp.doc 30-Dec-2002 15:52 152k
FAQ TCPIP UNIX and Ethernet.pdf 30-Dec-2002 15:52 49k
FAQ Tcpip.doc 30-Dec-2002 15:52 230k
McGraw-Hill - TCP-IP - Architecture, Protocols and Implementation With IPv6 and IP Security.chm 07-Mar-2005 06:53 6.0M
Multimedia H.245 in H.324 Overview.doc 06-Mar-2005 20:33 64k
Network Architecture.pdf 07-Mar-2005 07:14 56k
Numbering Convention.pdf 07-Mar-2005 07:14 20k
OReilly - TCPIP Network Administration.pdf 07-Mar-2005 07:20 5.1M
PROTOCOLOS.pdf 22-Jul-2003 16:24 167k
Paper CANET3.pdf 30-Dec-2002 15:52 800k
Paper CAnet5.ppt 30-Dec-2002 15:53 4.1M
Paper CCNA OSI Model.doc 30-Dec-2002 15:53 122k
Paper Capacity Planning.pdf 30-Dec-2002 15:53 90k
Paper Computer Networks.pdf 30-Dec-2002 15:53 134k
Paper Data Link Control.ppt 30-Dec-2002 15:53 359k
Paper Evolution of the Data Communication.pdf 07-Mar-2005 07:21 742k
Paper Experiments with a Layered Transmission over Internet.ps 30-Dec-2002 15:53 1.7M
Paper Fundamentals of Telecommunications.pdf 30-Dec-2002 15:53 163k
Paper Fundamentos Comunicaciones.pdf 30-Dec-2002 15:53 158k
Paper IP Livingston.html 30-Dec-2002 15:53 9k
Paper IP Network.pdf 30-Dec-2002 15:53 1.1M
Paper Intelligent Network.pdf 30-Dec-2002 15:53 115k
Paper Intenet Access.pdf 30-Dec-2002 15:53 165k
Paper Internet B%e1sico.pdf 30-Dec-2002 15:53 3.0M
Paper Juniper Graceful Restart.pdf 30-Dec-2002 15:53 260k
Paper NGN.ppt 0-Dec-2002 15:54 39k
Paper NSP_SR_100702.pdf 30-Dec-2002 15:54 588k
Paper Network Planning.pdf 07-Mar-2005 08:03 302k
Paper Network Topologies.ppt 30-Dec-2002 15:53 2.2M
Paper Novas Tecnologias.ppt 30-Dec-2002 15:54 354k
Paper OSI Model.ppt 30-Dec-2002 15:54 5.4M
Paper Platforms for Voice and Data Networks.pdf 30-Dec-2002 15:54 96k
Paper Rede IP.pdf 30-Dec-2002 15:55 114k
Paper Redes Multimidia.pdf 30-Dec-2002 15:55 649k
Paper Redes de Dados 1.pdf 30-Dec-2002 15:55 1.2M
Paper Redes de Dados 2.pdf 30-Dec-2002 15:55 1.6M
Paper Redes de Dados 3.pdf 30-Dec-2002 15:55 1.9M
Paper Redes de Dados.pdf 30-Dec-2002 15:55 4.0M
Paper Redes.doc 30-Dec-2002 15:55 4.7M
Paper Regular Expressions.pdf 30-Dec-2002 15:55 5.8M
Paper Roteamento na Internet.pdf 30-Dec-2002 15:55 250k
Paper Roteamento1.pdf 30-Dec-2002 15:55 106k
Paper Roteamento2.pdf 30-Dec-2002 15:55 82k
Paper TCP-IP-Intro.ppt 30-Dec-2002 15:56 1020k
Paper TCPIP II.pdf 30-Dec-2002 15:56 236k
Paper TCPIP arp-rarp.ppt 30-Dec-2002 15:56 208k
Paper TCPIP suite part1.pdf 30-Dec-2002 15:56 968k
Paper TCPIP suite part2.pdf 16-Jul-2003 08:59 791k
Paper TCPIP suite part3.pdf 30-Dec-2002 15:56 849k
Paper Table Subnet.pdf 30-Dec-2002 15:56 62k
Paper Tcpip.pdf 30-Dec-2002 15:56 265k
Paper Tcpip1.pdf 30-Dec-2002 15:56 6.9M
Paper Tecnologia Comunicacao.pdf 30-Dec-2002 15:56 1.1M
Paper Telecommunication and Location.pdf 30-Dec-2002 15:56 297k
Paper Telecommunications Fundamentals.pdf 30-Dec-2002 15:56 227k
Paper Understanding IP Address 1.pdf 30-Dec-2002 15:56 67k
Paper Understanding IP Address 2.pdf 30-Dec-2002 15:56 92k
Paper Understanding IP Address 3.pdf 30-Dec-2002 15:56 56k
Paper Understanding IP Address.pdf 30-Dec-2002 15:56 147k
Paper Windows NT tcpip .pdf 30-Dec-2002 15:57 190k
Paper Windows NT tcpip.pdf 30-Dec-2002 15:57 190k
Paper Windows redes.pdf 30-Dec-2002 15:57 1.2M
Paper udp-tcp.ppt 30-Dec-2002 15:56 240k
RST-2111.pdf 7-Mar-2005 08:58 4.0M
RST-2112.pdf 07-Mar-2005 09:04 4.9M
RST-3031.pdf 07-Mar-2005 08:49 3.3M
Summary Cisco Command.pdf 07-Mar-2005 07:21 22k
Summary Cisco Modes.pdf 07-Mar-2005 07:21 30k
Summary Cisco Troubleshooting.pdf 07-Mar-2005 06:38 18k
Summary Show Screens.xls 07-Mar-2005 06:53 69k
Summary Table Routing.PDF 07-Mar-2005 06:38 79k
hxxp://www.inforede.net/Technical/Layer_3_and_4/Network/
Cisco IOS 12.2 Command Summary 1 of 3.pdf 17-Jul-2003 11:24 6.7M
Cisco IOS 12.2 Command Summary 2 of 3.pdf 17-Jul-2003 11:37 7.4M
Cisco IOS 12.2 Command Summary 3 of 3.pdf 17-Jul-2003 12:55 6.0M
hxxp://library.andrew.net.au/Cisco/
index of parent directoryCisco Access Routers - Quick Reference Guide.pdf 30-Aug-2004 18:30 1.0M
Cisco_805_Series_SERIAL_Router.pdf 04-Nov-2003 01:02 366K
Cisco_806_Series_BROADBAND_Router.pdf 04-Nov-2003 01:02 570K
Cisco_1721_and_1720_Modular_Access_Routers.pdf 04-Nov-2003 01:01 313K
Cisco_1751_Modular_Access_Router.pdf 04-Nov-2003 01:02 644K
Cisco_1760_Modular_Access_Router.pdf 04-Nov-2003 01:02 299K
Cisco_1800_Series_Models_Comparison.pdf 24-Oct-2005 07:38 45K
Cisco_2800_Series_Models_Comparison.pdf 24-Oct-2005 07:38 49K
Cisco_3800_Series_Integrated_Services_Router.pdf 03-Oct-2006 17:27 175K
Cisco_3800_Series_Models_Comparison.pdf 03-Oct-2006 17:27 59K
Cisco_Aironet_802-11-a-b-g_CardBus_Wireless_LAN_Client_Adapter_ds.pdf 12-Oct-2004 16:40 258K
Cisco_Aironet_802-11-a-b-g_PCI_Wireless_LAN_Client_Adapter_ds.pdf 12-Oct-2004 16:43 256K
Cisco_Aironet_1000_Series_Lightweight_Access_Points.pdf 24-Oct-2005 08:18 196K
Cisco_Aironet_1100_Series_Access_Point_ds.pdf 11-Oct-2004 14:30 437K
Cisco_Aironet_1200_Series_Access_Point_ds.pdf 13-Oct-2004 16:49 591K
Cisco_Aironet_1200_Series_Access_Point_ds_New.pdf 10-May-2005 12:36 71K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_Power_Injector_ds_New.pdf 10-May-2005 12:42 91K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_Power_Injector _ds_New.pdf 10-May-2005 12:41 91K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_ds.pdf 18-Oct-2004 15:04 322K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_ds_New.pdf 10-May-2005 12:37 362K
Cisco_Aironet_1400_Series_Wireless_Bridge_ds.pdf 18-Oct-2004 14:39 286K
Cisco_Aironet_1500_Series_Lightweight_Outdoor_Mesh_Access_Points.pdf 23-Jan-2006 22:37 792K
Cisco_Aironet_Antenna_Reference_Guide_ds_New.pdf 14-Mar-2005 15:14 937K
Cisco_Aironet_Antennas_and_Accessories_ds.pdf 18-Oct-2004 14:40 621K
Cisco_Aironet_Lightning_Arrestor_ds.pdf 14-Mar-2005 17:32 101K
Cisco_Aironet_Power_Injectors_ds.pdf 18-Oct-2004 14:40 122K
Cisco_Aironet_Power_Injectors_ds_New.pdf 14-Mar-2005 15:14 122K
Cisco_Aironet_Wireless_Access_Points_Solution_Overview.pdf 26-Oct-2005 21:41 444K
Cisco_Catalyst_2950_-_Enhanced_Image.pdf 20-Jun-2005 12:53 135K
Cisco_Catalyst_2950_-_Standard_Image.pdf 20-Jun-2005 12:53 125K
Cisco_Catalyst_2950_Long-Reach_Ethernet_Switches.pdf 20-Jun-2005 23:54 279K
Cisco_Catalyst_2955_Series_Switches.pdf 20-Jun-2005 23:54 458K
Cisco_Catalyst_3560_Series_Switches.pdf 10-May-2005 13:15 254K
Cisco_Router_Guide_-_Winter_2004-mod.pdf 20-Jun-2005 23:41 967K
Cisco_Wireless_LAN_Controllers.pdf 15-Jun-2006 19:15 283K
Comparativo_CamIP.pdf 22-Jan-2006 23:45 50K
MultiVOIP_Gateways_Data_Sheet.pdf 14-Dec-2004 16:48 321K
Netgear_Familias_de_Productos.pdf 03-Oct-2006 18:08 765K
Network_IP_Camera_550703.pdf 08-Oct-2005 19:16 60K
Network_IP_Camera_550710.pdf 21-Oct-2004 01:06 87K
Nortel_BCM50.pdf 20-Oct-2005 23:48 225K
hxxp://www.lanet.com.mx/pdf/
TCP Performance over UMTS-HSDPA Systems
TCP Performance over UMTS-HSDPA Systems
By Mohamad Assaad, Djamal Zeghlache,
* Publisher: AUERBACH
* Number Of Pages: 211
* Publication Date: 2006-07-20
* Sales Rank: 797248
* ISBN / ASIN: 0849368383
* EAN: 9780849368387
* Binding: Hardcover
* Manufacturer: AUERBACH
* Studio: AUERBACH
Book Description:
TCP Performance over UMTS-HSDPA Systems provides a comprehensive study of the effect of TCP both on achieved application bit rate performance and system capacity. The book describes how to reduce, with or without modification of TCP implementations, the effect of wireless networks on TCP. Emphasizing the effect of scheduling to improve TCP performance over wireless systems, the authors focus on the performance of TCP traffic over HSDPA. This text is ideal for advanced undergraduate students, graduate students, and researchers with basic knowledge in wireless networks that are keen on learning more about the UMTS access network evolution and interactions of the wireless link with TCP.
1881 KB
RAR'd PDF
Download
By Mohamad Assaad, Djamal Zeghlache,
* Publisher: AUERBACH
* Number Of Pages: 211
* Publication Date: 2006-07-20
* Sales Rank: 797248
* ISBN / ASIN: 0849368383
* EAN: 9780849368387
* Binding: Hardcover
* Manufacturer: AUERBACH
* Studio: AUERBACH
Book Description:
TCP Performance over UMTS-HSDPA Systems provides a comprehensive study of the effect of TCP both on achieved application bit rate performance and system capacity. The book describes how to reduce, with or without modification of TCP implementations, the effect of wireless networks on TCP. Emphasizing the effect of scheduling to improve TCP performance over wireless systems, the authors focus on the performance of TCP traffic over HSDPA. This text is ideal for advanced undergraduate students, graduate students, and researchers with basic knowledge in wireless networks that are keen on learning more about the UMTS access network evolution and interactions of the wireless link with TCP.
1881 KB
RAR'd PDF
Download
TCP/IP Foundations
TCP/IP Foundations
By Andrew G. Blank
* Publisher: Sybex
* Number Of Pages: 284
* Publication Date: 2004-09-17
* Sales Rank: 643199
* ISBN / ASIN: 0782143709
* EAN: 0025211443705
* Binding: Paperback
* Manufacturer: Sybex
* Studio: Sybex Book Description:
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor.
TCP/IP Foundations provides essential knowledge about the two protocols that form the basis for the Internet, as well as many other networks. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include:
- The origins of TCP/IP and the Internet
- The layers comprising the OSI and DoD models
- TCP/IP addressing
- Subnet masks
- Creating custom subnet masks
- Supernetting and Classless Inter-Domain Routing (CIDR)
- Name resolution
- The Domain Name System (DNS) and Dynamic DNS
- Windows Internet Naming Services (WINS)
- The Dynamic Host Configuration Protocol (DHCP)
- What to expect with IPv6
Total Area Networking: Atm, Ip, Frame Relay and Smds Explained
Total Area Networking: Atm, Ip, Frame Relay and Smds Explained
By John Atkins, Mark Norris,
* Publisher: Wiley
* Number Of Pages: 309
* Publication Date: 1998-04-15
* Sales Rank: 2401065
* ISBN / ASIN: 0471984647
* EAN: 9780471984641
* Binding: Hardcover
* Manufacturer: Wiley
* Studio: Wiley Book Description:
Total Area Networking ATM,IP, Frame Relay and SMDS Explained Second Edition John Atkins and Mark Norris BT, UK Total Area Networking explains how high-speed communications allow local facilities to become part of a more global network. This concept is the essential basis for super-connectivity, when the user sees a distributed set of network-based resources as one. This fully updated second edition of the highly successful Total Area Networking has been extended to include IP networks and now covers both network technology and its applications. It illustrates the practical implementation of a total area network using the principles developed for Intelligent Networks, Intranets and Virtual Private Networks.
* Main topics include ATM (Asynchronous Transfer Mode), IP (Internet Protocol), Frame Relay and SMDS (Switched Multi-magabit Data Service).
* Covers the whole spectrum of communications technology, from theory to implementation.
* Provides a clear understanding of what new technology can do and how it can best be deployed.
* Allows the non-expert to question both accurately and indepth.
Essential reading for a wide ranging audience, including professionals involved in the planning and implementation of information systems, undergraduate and postgraduate students of computer science, electrical engineering and telecommunications.
Download
Mirror
IPv6 Network Programming
IPv6 Network Programming
By Jun-ichiro itojun Hagino
* Publisher: Digital Press
* Number Of Pages: 376
* Publication Date: 2004-10-18
* Sales Rank: 968204
* ISBN / ASIN: 1555583180
* EAN: 9781555583187
* Binding: Paperback
* Manufacturer: Digital Press
* Studio: Digital Press Book Description:
This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP
Download
Rich Client Programming: Plugging into the NetBeans(TM) Platform
Rich Client Programming: Plugging into the NetBeans(TM) Platform
By Tim Boudreau, Jaroslav Tulach, Geertjan Wielenga,
* Publisher: Prentice Hall PTR
* Number Of Pages: 640
* Publication Date: 2007-04-30
* Sales Rank: 5961
* ISBN / ASIN: 0132354802
* EAN: 9780132354806
* Binding: Paperback
* Manufacturer: Prentice Hall PTR
* Studio: Prentice Hall PTR Book Description:
The open-source NetBeans Platform is an extraordinarily powerful framework for building "write once, run anywhere" rich client applications. Now, for the first time since the release of NetBeans IDE 5.0, there's a comprehensive guide to rich client development on the NetBeans Platform.
Written for Java developers and architects who have discovered that basic Swing components are not enough for them, this book will help you get started with NetBeans module development, master NetBeans' key APIs, and learn proven techniques for building reliable desktop software. Each chapter is filled with practical, step-by-step instructions for creating complete rich client applications on top of the NetBeans Platform and plugins for NetBeans IDE.
Rich Client Programming's wide-ranging content covers
- Why modular development makes sense for small, medium, and large applications
- Using NetBeans to accelerate development and improve efficiency
- Leveraging NetBeans productivity features, from the Component Palette to Code Completion
- Leveraging NetBeans' modular architecture in your own applications
- Implementing loosely coupled communication to improve code maintainability and robustness
- Managing user- and system-configuration data
- Building reloadable components with solid threading models
- Constructing sophisticated multiwindow applications and presenting rich data structures to users
- Adding user-configurable options
- Integrating Web services with NetBeans desktop applications
- Automating module updates and providing user help
Next Generation SDH/SONET: Evolution or Revolution
Next Generation SDH/SONET: Evolution or Revolution
By Huub van Helvoort
* Publisher: Wiley
* Number Of Pages: 254
* Publication Date: 2005-04-29
* Sales Rank: 953674
* ISBN / ASIN: 0470091207
* EAN: 9780470091203
* Binding: Hardcover
* Manufacturer: Wiley
* Studio: Wiley Book Description:
Since the turn of the twentieth century, telecommunications has shifted from traditional voice transport to data transport, although digitized voice is still a large contributor. Instead of an evolution of existing transport standards, a revolution was necessary in order to enable additional data-related transport.
Next Generation SDH/SONET provides a detailed description of the enablers of efficient data transport over any synchronous network. These include virtual concatenation (VCAT), the operation to provide more granularity, and the link capacity adjustment scheme (LCAS), an extension of VCAT that provides more flexibility. Equally, generic framing procedure (GFP), the methodology that efficiently transports asynchronous, or variable bit-rate data signals over a synchronous or constant bit-rate, is explored in detail.
● Describes new extensions to SDH/SONET standards to provide more granularity and flexibility in their structures, enabling the efficient transport of data-related signals such as Ethernet and FICON
● Presents comprehensive sections on the implementation of multi-service transport platforms (MSTP) enabled by VCAT, LCAS and GFP
● Provides valuable advice on how to exploit existing networks to create or extend LANs towards metro (MAN) or wide (WAN) area networks and also to support storage area (SAN) networks
This volume will appeal to manufacturers, engineers and all those involved in developing and deploying SDH, SONET and OTN technology. It will also be an invaluable resource for postgraduate students on network communications courses.
Download
Mirror
The Complete Cisco VPN Configuration Guide (Networking Technology)
The Complete Cisco VPN Configuration Guide (Networking Technology)
By Richard Deal
* Publisher: Cisco Press
* Number Of Pages: 1032
* Publication Date: 2005-12-15
* Sales Rank: 40132
* ISBN / ASIN: 1587052040
* EAN: 9781587052040
* Binding: Paperback
* Manufacturer: Cisco Press
* Studio: Cisco Press
Book Description:
Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution
- A complete resource for understanding VPN components and VPN design issues
- Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients
- Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience
- Filled with relevant configurations you can use immediately in your own network
With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.
Part I, “VPNs,” introduces the topic of VPNs and discusses today’s main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, “Concentrators,” provides detail on today’s concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network.
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Download Penetration Testing and Network Defense (Networking Technology)
Penetration Testing and Network Defense (Networking Technology)
By Andrew Whitaker, Daniel Newman,
* Publisher: Cisco Press
* Number Of Pages: 624
* Publication Date: 2005-10-31
* Sales Rank: 170911
* ISBN / ASIN: 1587052083
* EAN: 9781587052088
* Binding: Paperback
* Manufacturer: Cisco Press
* Studio: Cisco Press Book Description:
The practical guide to simulating, detecting, and responding to network attacks
- Create step-by-step testing plans
- Learn to perform social engineering and host reconnaissance
- Evaluate session hijacking methods
- Exploit web server vulnerabilities
- Detect attempts to breach database security
- Use password crackers to obtain access information
- Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches
- Scan and penetrate wireless networks
- Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
- Test UNIX, Microsoft, and Novell servers for vulnerabilities
- Learn the root cause of buffer overflows and how to prevent them
- Perform and prevent Denial of Service attacks
Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.
Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization’s network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks.
Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks.
Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources.
“This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade.�
–Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems®
Download Cisco IOS Access Lists
Cisco IOS Access Lists
By Jeff Sedayao
* Publisher: O'Reilly Media, Inc.
* Number Of Pages: 272
* Publication Date: 2001-06
* Sales Rank: 233003
* ISBN / ASIN: 1565923855
* EAN: 9781565923850
* Binding: Paperback
* Manufacturer: O'Reilly Media, Inc.
* Studio: O'Reilly Media, Inc. Book Description:
Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas:
- Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.
- Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.
- The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.
Download
Managing A Network Vulnerability Assessment
Managing A Network Vulnerability Assessment
By Thomas R. Peltier, Justin Peltier, John A. Blackley,
* Publisher: AUERBACH
* Number Of Pages: 312
* Publication Date: 2003-05-28
* Sales Rank: 743092
* ISBN / ASIN: 0849312701
* EAN: 9780849312700
* Binding: Paperback
* Manufacturer: AUERBACH
* Studio: AUERBACH Book Description:
Managing A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
Download
Windows Server 2003 Pocket Administrator
Windows Server 2003 Pocket Administrator
By Nelson Ruest, Danielle Ruest,
* Publisher: McGraw-Hill Osborne Media
* Number Of Pages: 256
* Publication Date: 2003-09-30
* Sales Rank: 294231
* ISBN / ASIN: 0072229772
* EAN: 0783254042377
* Binding: Paperback
* Manufacturer: McGraw-Hill Osborne Media
* Studio: McGraw-Hill Osborne Media
Book Description:
This handy resource offers busy network administrators clear and concise information for daily on-the-job tasks--all in a portable format. Key management tasks are presented in logically organized sections. You’ll get details on file, print, application, mail, terminal, streaming media, and remote servers--and much more.
Download
Local Area High Speed Networks (MTP)
Local Area High Speed Networks (MTP)
By Dr. Sidnie Feit
* Publisher: Sams
* Number Of Pages: 700
* Publication Date: 2000-01-15
* Sales Rank: 1293085
* ISBN / ASIN: 1578701139
* EAN: 0619472701133
* Binding: Hardcover
* Manufacturer: Sams
* Studio: Sams
By Dr. Sidnie Feit
* Publisher: Sams
* Number Of Pages: 700
* Publication Date: 2000-01-15
* Sales Rank: 1293085
* ISBN / ASIN: 1578701139
* EAN: 0619472701133
* Binding: Hardcover
* Manufacturer: Sams
* Studio: Sams
Book Description:
There is a great deal of change happening in the technology being used for local networks. As Web intranets have driven bandwidth needs through the ceiling, inexpensive Ethernet NICs and switches have come into the market. As a result, many network professionals are interested in evaluating these new technologies for implementation consideration. If you are looking for advice from experts who can help you realistically compare and decide how to use the options before you. Often, books on this subject are too varied in subject matter, attempting to cover to many subjects in the book. This book addresses the topic of Ethernet Networking from a planning perspective to a bit analysis of the Ethernet packets. It explains in detail information in the new network administrator would find it necessary to know.
Global Mobile: Connecting without walls, wires, or borders
Global Mobile: Connecting without walls, wires, or borders
By Fred Johnson
* Publisher: Peachpit Press
* Number Of Pages: 144
* Publication Date: 2005-01-12
* Sales Rank: 816161
* ISBN / ASIN: 0321278712
* EAN: 0785342278712
* Binding: Paperback
* Manufacturer: Peachpit Press
* Studio: Peachpit Press Book Description:
With the proliferation of Wi-Fi hotspots and advances in mobile-phone technology, there aren't many excuses today for not being in contact with your friends, family and business associates when you travel. Using just your laptop computer and cell phone, you can stay connected from all around the globe. But not so fast -- do you "really" know how to use your gadgets when traveling? And furthermore, do you have the RIGHT gadgets?
Enter Global Mobile. This slim, compact guide outlines how to choose and use the gear you’ll need to stay connected no matter where you’re going. Author Fred Johnson walks you through all things wireless -- from getting online while you sip your favorite latte at Starbucks, to swapping SIM cards in your GSM phone, to learning the ins and outs of new technologies like Bluetooth, you’ll learn how simple it is to stay "plugged-in" during a business trip or an international adventure.
Crammed with helpful tips on choosing services, useful charts (such as international phone numbers and GSM coverage), a helpful packing checklist, and priceless advice, this handy guide should be packed with your laptop before you leave on your next trip.
Download
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks (Wireless Networks and Mobile Communications)
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks (Wireless Networks and Mobile Communications)
ByPublisher: AUERBACH
Number Of Pages: 664
Publication Date: 2007-03-28
Sales Rank: 543853
ISBN / ASIN: 0849392543
EAN: 9780849392542
Binding: Hardcover
Manufacturer: AUERBACH
Studio: AUERBACH
Book Description:
With state-of-the-art research, Wireless Ad Hoc Networking provides wide coverage of key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures, localization and location tracking, power management and energy-efficient design, power and topology control, time synchronization, coverage issues, middleware and software design, data gathering and processing, embedded network-oriented operating systems, mobility management, self-organization and governance, QoS and real-time issues, security and dependability issues, applications, modeling and performance evaluation, implementation and experience, and much more.
DOwnload
With state-of-the-art research, Wireless Ad Hoc Networking provides wide coverage of key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures, localization and location tracking, power management and energy-efficient design, power and topology control, time synchronization, coverage issues, middleware and software design, data gathering and processing, embedded network-oriented operating systems, mobility management, self-organization and governance, QoS and real-time issues, security and dependability issues, applications, modeling and performance evaluation, implementation and experience, and much more.
DOwnload
Building a Monitoring Infrastructure with Nagios
Building a Monitoring Infrastructure with Nagios
Pages:264
This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David Josephsen goes far beyond the basics, demonstrating how to use third-party tools and plug-ins to solve the specific problems in your unique environment. Josephsen introduces Nagios ?from the ground up,? showing how to plan for success and leverage today’s most valuable monitoring best practices. Then, using practical examples, real directives, and working code, Josephsen presents detailed monitoring solutions for Windows, Unix, Linux, network equipment, and other platforms and devices. You’ll find thorough discussions of advanced topics, including the use of data visualization to solve complex monitoring problems. This is also the first Nagios book with comprehensive coverage of using Nagios Event Broker to transform and extend Nagios.
Understand how Nagios works, in depth: the host and service paradigm, plug-ins, scheduling, and notification Configure Nagios successfully: config files, templates, timeperiods, contacts, hosts, services, escalations, dependencies, and more Streamline deployment with scripting templates, automated discovery, and Nagios GUI tools Use plug-ins and tools to systematically monitor the devices and platforms you need to monitor, the way you need to monitor them
Establish front-ends, visual dashboards, and management interfaces with MRTG and RRDTool
Build new C-based Nagios Event Broker (NEB) modules, one step at a time Contains easy-to-understand code listings in Unix shell, C, and Perl
Rapidshare
Pages:264
This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David Josephsen goes far beyond the basics, demonstrating how to use third-party tools and plug-ins to solve the specific problems in your unique environment. Josephsen introduces Nagios ?from the ground up,? showing how to plan for success and leverage today’s most valuable monitoring best practices. Then, using practical examples, real directives, and working code, Josephsen presents detailed monitoring solutions for Windows, Unix, Linux, network equipment, and other platforms and devices. You’ll find thorough discussions of advanced topics, including the use of data visualization to solve complex monitoring problems. This is also the first Nagios book with comprehensive coverage of using Nagios Event Broker to transform and extend Nagios.
Understand how Nagios works, in depth: the host and service paradigm, plug-ins, scheduling, and notification Configure Nagios successfully: config files, templates, timeperiods, contacts, hosts, services, escalations, dependencies, and more Streamline deployment with scripting templates, automated discovery, and Nagios GUI tools Use plug-ins and tools to systematically monitor the devices and platforms you need to monitor, the way you need to monitor them
Establish front-ends, visual dashboards, and management interfaces with MRTG and RRDTool
Build new C-based Nagios Event Broker (NEB) modules, one step at a time Contains easy-to-understand code listings in Unix shell, C, and Perl
Rapidshare
Advances in Pervasive Computing and Networking
Advances in Pervasive Computing and Networking
Pages:270
Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications.
Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters.
The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.
Rapidshare
Pages:270
Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications.
Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters.
The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.
Rapidshare
Endpoint Security
Endpoint Security
Pages:384
A Comprehensive, Proven Approach to Securing All Your Network Endpoints Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’ s newest threats, and prepare yourself for tomorrow’ s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to “ trusted computing.” Unlike traditional “ one-size-fits-all” solutions, Kadrich’ s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You’ ll learn how to: Recognize dangerous limitations in conventional endpoint security strategies Identify the best products, tools, and processes to secure your specific devices and infrastructure Configure new endpoints securely and reconfigure existing endpoints to optimize security Rapidly identify and remediate compromised endpoint devices Systematically defend against new endpoint-focused malwareand viruses Improve security at the point of integration between endpoints and your network Whether you’ re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ ve been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec’ s Senior Manager of Network and Endpoint Security.
Rapidshare
DepositFiles
Pages:384
A Comprehensive, Proven Approach to Securing All Your Network Endpoints Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’ s newest threats, and prepare yourself for tomorrow’ s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to “ trusted computing.” Unlike traditional “ one-size-fits-all” solutions, Kadrich’ s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You’ ll learn how to: Recognize dangerous limitations in conventional endpoint security strategies Identify the best products, tools, and processes to secure your specific devices and infrastructure Configure new endpoints securely and reconfigure existing endpoints to optimize security Rapidly identify and remediate compromised endpoint devices Systematically defend against new endpoint-focused malwareand viruses Improve security at the point of integration between endpoints and your network Whether you’ re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ ve been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec’ s Senior Manager of Network and Endpoint Security.
Rapidshare
DepositFiles
Wireless Ad Hoc Networking
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Pages:664
With state-of-the-art research, Wireless Ad Hoc Networking provides wide coverage of key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures, localization and location tracking, power management and energy-efficient design, power and topology control, time synchronization, coverage issues, middleware and software design, data gathering and processing, embedded network-oriented operating systems, mobility management, self-organization and governance, QoS and real-time issues, security and dependability issues, applications, modeling and performance evaluation, implementation and experience, and much more.
Rapidshare
DepositFiles
Pages:664
With state-of-the-art research, Wireless Ad Hoc Networking provides wide coverage of key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures, localization and location tracking, power management and energy-efficient design, power and topology control, time synchronization, coverage issues, middleware and software design, data gathering and processing, embedded network-oriented operating systems, mobility management, self-organization and governance, QoS and real-time issues, security and dependability issues, applications, modeling and performance evaluation, implementation and experience, and much more.
Rapidshare
DepositFiles
Fundamentals of WiMAX
Fundamentals of WiMAX: Understanding Broadband Wireless Networking
(Communications Engineering and Emerging Technologies)
Pages:496
WiMAX is today's most promising new technology for broadband wireless access to IP services. It can serve an extraordinary range of applications and environments: data, voice, and multimedia; fixed and mobile; licensed and unlicensed. However, until now, wireless professionals have found little reliable information to guide them. Fundamentals of WiMAX is the first comprehensive guide to WiMAX—its technical foundations, features, and standards.
The authors systematically cut through the hype surrounding WiMAX and illuminate the realities. They combine deep, complete information for wireless professionals and basic, accessible knowledge for non-experts. Professionals will especially appreciate their detailed discussion of performance in WiMAX and competitive networks, based on comprehensive link and system level simulations.
Topics include
* Applications, history, evolution, technical and business challenges, and spectrum options
* 802.16 standards: physical and MAC layers, channel access, QoS, security, multicast, power, mobility, and more
* Performance enhancement: advanced antennas, multiple antennas, Hybrid-ARQ, and frequency reuse
* Broadband wireless channels: path loss, shadowing, cellular systems, sectoring, and fading—including modeling and mitigation
* OFDM: from basic multicarrier concepts to synchronization, PAR reduction, and clipping
* OFDMA: multiple access, multiuser diversity, adaptive modulation, and resourceallocation
* End-to-end service: QoS, session management, security, and mobility
* Predicting performance at the physical layer, MAC layer, link level, and system level
* Architecting WiMAX networks: design principles, reference models, authentication, QoS, and mobility management
Whether you're a wireless engineer, network architect, manager, or software developer, this book delivers essential information for succeeding with WiMAX—from planning through deployment.
Rapidshare
Mirror
Depositfiles
(Communications Engineering and Emerging Technologies)
Pages:496
WiMAX is today's most promising new technology for broadband wireless access to IP services. It can serve an extraordinary range of applications and environments: data, voice, and multimedia; fixed and mobile; licensed and unlicensed. However, until now, wireless professionals have found little reliable information to guide them. Fundamentals of WiMAX is the first comprehensive guide to WiMAX—its technical foundations, features, and standards.
The authors systematically cut through the hype surrounding WiMAX and illuminate the realities. They combine deep, complete information for wireless professionals and basic, accessible knowledge for non-experts. Professionals will especially appreciate their detailed discussion of performance in WiMAX and competitive networks, based on comprehensive link and system level simulations.
Topics include
* Applications, history, evolution, technical and business challenges, and spectrum options
* 802.16 standards: physical and MAC layers, channel access, QoS, security, multicast, power, mobility, and more
* Performance enhancement: advanced antennas, multiple antennas, Hybrid-ARQ, and frequency reuse
* Broadband wireless channels: path loss, shadowing, cellular systems, sectoring, and fading—including modeling and mitigation
* OFDM: from basic multicarrier concepts to synchronization, PAR reduction, and clipping
* OFDMA: multiple access, multiuser diversity, adaptive modulation, and resourceallocation
* End-to-end service: QoS, session management, security, and mobility
* Predicting performance at the physical layer, MAC layer, link level, and system level
* Architecting WiMAX networks: design principles, reference models, authentication, QoS, and mobility management
Whether you're a wireless engineer, network architect, manager, or software developer, this book delivers essential information for succeeding with WiMAX—from planning through deployment.
Rapidshare
Mirror
Depositfiles
Neural Network Control of Nonlinear Discrete-Time Systems
Neural Network Control of Nonlinear Discrete-Time Systems
Pages:624
Neural Network Control of Nonlinear Discrete-Time Systems presents powerful modern control techniques based on the parallelism and adaptive capabilities of biological nervous systems. After an introduction to neural networks, dynamical systems, control of nonlinear systems, and feedback linearization, the book builds systematically from actuator nonlinearities and strict feedback in nonlinear systems to nonstrict feedback, system identification, model reference adaptive control, and novel optimal control using the Hamilton-Jacobi-Bellman formulation. The author concludes by developing a framework for implementing intelligent control in actual industrial systems using embedded hardware.
Table of Contents:
1 Background on neural networks 1
2 Background and discrete-time adaptive control 75
3 Neural network control of nonlinear systems and feedback linearization 139
4 Neural network control of uncertain nonlinear discrete-time systems with actuator nonlinearities 265
5 Output feedback control of strict feedback nonlinear MIMO discrete-time systems 343
6 Neural network control of nonstrict feedback nonlinear systems 371
7 System identification using discrete-time neural networks 423
8 Discrete-time model reference adaptive control 447
9 Neural network control in discrete-time using Hamilton-Jacobi-Bellman formulation 473
10 Neural network output feedback controller design and embedded hardware implementation 511
Rapidshare
MIHD
Pages:624
Neural Network Control of Nonlinear Discrete-Time Systems presents powerful modern control techniques based on the parallelism and adaptive capabilities of biological nervous systems. After an introduction to neural networks, dynamical systems, control of nonlinear systems, and feedback linearization, the book builds systematically from actuator nonlinearities and strict feedback in nonlinear systems to nonstrict feedback, system identification, model reference adaptive control, and novel optimal control using the Hamilton-Jacobi-Bellman formulation. The author concludes by developing a framework for implementing intelligent control in actual industrial systems using embedded hardware.
Table of Contents:
1 Background on neural networks 1
2 Background and discrete-time adaptive control 75
3 Neural network control of nonlinear systems and feedback linearization 139
4 Neural network control of uncertain nonlinear discrete-time systems with actuator nonlinearities 265
5 Output feedback control of strict feedback nonlinear MIMO discrete-time systems 343
6 Neural network control of nonstrict feedback nonlinear systems 371
7 System identification using discrete-time neural networks 423
8 Discrete-time model reference adaptive control 447
9 Neural network control in discrete-time using Hamilton-Jacobi-Bellman formulation 473
10 Neural network output feedback controller design and embedded hardware implementation 511
Rapidshare
MIHD
EIGRP Network Design Solutions
EIGRP Network Design Solutions
The Definitive Resource for EIGRP Design, Deployment, and Operation
Pages:366
EIGRP Network Design Solutions provides readers with in-depth knowledge of EIGRP, the Cisco routing protocol that runs many large enterprise and service provider networks. It covers the theory of EIGRP, network design issues, configuration of EIGRP on Cisco IOS routers, and detailed troubleshooting information. Case studies and configuration examples help readers put the concepts into practice. Design and usage rules for various EIGRP features allow network engineers to design and implement EIGRP networks resulting in efficient, optimal, and trouble-free network operation. The book addresses issues with various types of networks, such as: hierarchical and meshed enterprise networks, dial-up networks, and service provider networks. Ideal for network technicians, network engineers, and network design consultants who are designing, implementing or troubleshooting enterprise, dial-up, or service provider networks with EIGRP who need the practical knowledge presented in this book.
Table of Contents:
Part I: EIGRP Technology
Chapter 1: EIGRP Concepts and Technology
Chapter 2: Advanced EIGRP Concepts, Data Structures, and Protocols
Chapter 3: IPX EIGRP
Chapter 4: AppleTalk EIGRP
Part II: Designing Enterprise EIGRP Networks
Chapter 5: Scalability Issues in Large Enterprise Networks
Chapter 6: EIGRP Route Summarization
Chapter 7: Route Filters
Chapter 8: Default Routers
Chapter 9: Integrating EIGRP with Other Enterprise Routing Protocols
Chapter 10: Designing Scalable IPX EIGRP Networks
Chapter 11: Designing Scalable AppleTalk EIGRP Networks
Part III: Running EIGRP over Switched WAN and Dial-Up Networks
Chapter 12: Switched WAN Networks and Their Impact on EIGRP
Chapter 13: Running EIGRP over WAN Networks
Chapter 14: EIGRP and Dial-Up Networks
Chapter 15: Secure EIGRP Operation
Rapidshare
MIHD
The Definitive Resource for EIGRP Design, Deployment, and Operation
Pages:366
EIGRP Network Design Solutions provides readers with in-depth knowledge of EIGRP, the Cisco routing protocol that runs many large enterprise and service provider networks. It covers the theory of EIGRP, network design issues, configuration of EIGRP on Cisco IOS routers, and detailed troubleshooting information. Case studies and configuration examples help readers put the concepts into practice. Design and usage rules for various EIGRP features allow network engineers to design and implement EIGRP networks resulting in efficient, optimal, and trouble-free network operation. The book addresses issues with various types of networks, such as: hierarchical and meshed enterprise networks, dial-up networks, and service provider networks. Ideal for network technicians, network engineers, and network design consultants who are designing, implementing or troubleshooting enterprise, dial-up, or service provider networks with EIGRP who need the practical knowledge presented in this book.
Table of Contents:
Part I: EIGRP Technology
Chapter 1: EIGRP Concepts and Technology
Chapter 2: Advanced EIGRP Concepts, Data Structures, and Protocols
Chapter 3: IPX EIGRP
Chapter 4: AppleTalk EIGRP
Part II: Designing Enterprise EIGRP Networks
Chapter 5: Scalability Issues in Large Enterprise Networks
Chapter 6: EIGRP Route Summarization
Chapter 7: Route Filters
Chapter 8: Default Routers
Chapter 9: Integrating EIGRP with Other Enterprise Routing Protocols
Chapter 10: Designing Scalable IPX EIGRP Networks
Chapter 11: Designing Scalable AppleTalk EIGRP Networks
Part III: Running EIGRP over Switched WAN and Dial-Up Networks
Chapter 12: Switched WAN Networks and Their Impact on EIGRP
Chapter 13: Running EIGRP over WAN Networks
Chapter 14: EIGRP and Dial-Up Networks
Chapter 15: Secure EIGRP Operation
Rapidshare
MIHD
Secure Your Network for Free
Secure Your Network for Free
Pages:480
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.
Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.
* Teachers you how to implement best of breed security using tools for free
* Ideal for anyone recomending and implementing new technologies within the company
* Companion Web site contains dozens of working scripts and tools
Table of Contents:
Presenting the Business Case for Free Solutions 1
Introduction 2
The Costs of Using Free Security Solutions 2
Training Costs 3
Hardware Costs 3
Consulting Costs 4
Hidden Costs 5
The Savings of Using Free Security Solutions 6
Purchase Costs 6
Maintenance Costs 7
Customization Costs 7
Comparing Free Solutions with Commercial Solutions 8
Strengths of Free Solutions 9
Weaknesses of Free Solutions 10
Evaluating Individual Solutions 12
"Selling" a Free Solution 16
Selling by Doing 17
Presenting a Proposal 17
Summary 19
Solutions Fast Track 19
Frequently Asked Questions 21
Protecting Your Perimeter 23
Introduction 24
Firewall Types 24
Firewall Architectures 27
Screened Subnet 27
One-Legged 28
True DMZ 30
Implementing Firewalls 31
Hardware versus Software Firewalls 32
Configuring netfilter 32
Choosing a Linux Version 32
Choosing Installation Media 33
Linux Firewall Operation 36
Configuration Examples 42
GUIs 55
Smoothwall 76
Configuring Windows Firewall 85
Providing Secure Remote Access 86
Providing VPN Access 87
Using Windows as a VPN Concentrator 89
iPig 93
OpenSSL VPN 98
Providing a Remote Desktop 108
Windows Terminal Services 109
VNC 113
Using the X Window System 119
Providing a Remote Shell 125
Using Secure Shell 126
Using a Secure Shell GUI Client 128
Summary 130
Solutions Fast Track 131
Frequently Asked Questions 132
Protecting Network Resources 133
Introduction 134
Performing Basic Hardening 134
Defining Policy 135
Access Controls 137
Authentication 137
Authorization 138
Auditing 138
Hardening Windows Systems 139
General Hardening Steps 139
Users and Groups 142
File-Level Access Controls 147
Additional Steps 152
Using Microsoft Group Policy Objects 153
Account Lockout Policy 159
Audit Policy 160
User Rights Assignment 160
Hardening Linux Systems 164
General Hardening Steps 164
Users and Groups 165
File-Level Access Controls 168
Using the Bastille Hardening Script 172
Using SELinux 173
Hardening Infrastructure Devices 175
Patching Systems 176
Patching Windows Systems 177
Patching Linux Systems 179
Personal Firewalls 180
Windows Firewall 180
Netfilter Firewall 187
Configuring TCP Wrappers 187
Providing Antivirus and Antispyware Protection 188
Antivirus Software 189
Clam AntiVirus 189
Using Online Virus Scanners 196
Antispyware Software 196
Microsoft Windows Defender 197
Microsoft Malicious Software Removal Tool 200
Encrypting Sensitive Data 201
EFS 202
Summary 209
Solutions Fast Track 209
Frequently Asked Questions 212
Configuring an Intrusion Detection System 215
Introduction 216
Intrusion Detection Systems 216
Configuring an Intrusion Detection System 217
Hardware Requirements 218
Placing Your NIDS 218
Configuring Snort on a Windows System 221
Installing Snort 222
Configuring Snort Options 225
Using a Snort GUI Front End 231
Configuring IDS Policy Manager 232
Configuring Snort on a Linux System 240
Configuring Snort Options 240
Using a GUI Front End for Snort 246
Basic Analysis and Security Engine 246
Other Snort Add-Ons 254
Using Oinkmaster 254
Additional Research 256
Demonstrating Effectiveness 257
Summary 258
Solutions Fast Track 259
Frequently Asked Questions 261
Managing Event Logs 263
Introduction 264
Generating Windows Event Logs 264
Using Group Policy to Generate Windows Events Logs 267
Generating Custom Windows Event Log Entries 274
Collecting Windows Event Logs 275
Analyzing Windows Event Logs 277
Generating Syslog Event Logs 279
Windows Syslog 282
Generating Syslog Events 282
Receiving Syslog Events 295
Linux Syslog 297
Generating Syslog Events 297
Encrypting Syslog Traffic 298
Receiving Syslog Events on a Linux Host 311
Analyzing Syslog Logs on Windows and Linux 312
Windows Log Analysis 313
Linux Log Analysis 321
Securing Your Event Logs 327
Ensuring Chain of Custody 328
Ensuring Log Integrity 329
Applying Your Knowledge 331
Summary 333
Solutions Fast Track 333
Frequently Asked Questions 335
Testing and Auditing Your Systems 337
Introduction 338
Taking Inventory 338
Locating and Identifying Systems 339
Nmap 341
Super Scanner 347
Angry IP Scanner 351
Scanline 352
Special-Purpose Enumerators 355
Locating Wireless Systems 357
Network Stumbler 358
Documentation 361
Network Topology Maps 362
Access Request Forms 364
Business Continuity and Disaster Recovery Plans 365
IT Security Policies/Standards/Procedures 365
Vulnerability Scanning 366
Nessus 367
Running Nessus on Windows 368
Running Nessus on Linux 371
X-Scan 375
Microsoft Baseline Security Analyzer 379
OSSTMM 382
Summary 386
Solutions Fast Track 386
Frequently Asked Questions 387
Network Reporting and Troubleshooting 389
Introduction 390
Reporting on Bandwidth Usage and Other Metrics 390
Collecting Data for Analysis 392
Understanding SNMP 394
Configuring Multi Router Traffic Grapher 397
Configuring MZL & Novatech TrafficStatistic 400
Configuring PRTG Traffic Grapher 403
Configuring ntop 412
Enabling SNMP on Windows Hosts 418
Enabling SNMP on Linux Hosts 421
Troubleshooting Network Problems 424
Using a GUI Sniffer 425
Using a Command-Line Sniffer 433
Additional Troubleshooting Tools 438
Netcat 439
Tracetcp 439
Netstat 440
Summary 442
Solutions Fast Track 442
Frequently Asked Questions 444
Security as an Ongoing Process 447
Introduction 448
Patch Management 448
Network Infrastructure Devices 452
Operating System Patches 453
Application Patches 453
Change Management 454
Change Causes Disruption 454
Inadequate Documentation Can Exacerbate Problems 455
Change Management Strategy 455
Antivirus 459
Antispyware 459
Intrusion Detection Systems 460
Vulnerability Scanning 460
Vulnerability Management Cycle 461
Roles and Responsibilities 463
Penetration Testing 463
Obtaining the Support of Senior Management 464
Clarify What You Are Buying 464
Policy Review 465
Physical Security 466
Cert Team 468
Summary 470
Solutions Fast Track 470
Frequently Asked Questions 472
Index 475
Rapidshare
Pages:480
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.
Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.
* Teachers you how to implement best of breed security using tools for free
* Ideal for anyone recomending and implementing new technologies within the company
* Companion Web site contains dozens of working scripts and tools
Table of Contents:
Presenting the Business Case for Free Solutions 1
Introduction 2
The Costs of Using Free Security Solutions 2
Training Costs 3
Hardware Costs 3
Consulting Costs 4
Hidden Costs 5
The Savings of Using Free Security Solutions 6
Purchase Costs 6
Maintenance Costs 7
Customization Costs 7
Comparing Free Solutions with Commercial Solutions 8
Strengths of Free Solutions 9
Weaknesses of Free Solutions 10
Evaluating Individual Solutions 12
"Selling" a Free Solution 16
Selling by Doing 17
Presenting a Proposal 17
Summary 19
Solutions Fast Track 19
Frequently Asked Questions 21
Protecting Your Perimeter 23
Introduction 24
Firewall Types 24
Firewall Architectures 27
Screened Subnet 27
One-Legged 28
True DMZ 30
Implementing Firewalls 31
Hardware versus Software Firewalls 32
Configuring netfilter 32
Choosing a Linux Version 32
Choosing Installation Media 33
Linux Firewall Operation 36
Configuration Examples 42
GUIs 55
Smoothwall 76
Configuring Windows Firewall 85
Providing Secure Remote Access 86
Providing VPN Access 87
Using Windows as a VPN Concentrator 89
iPig 93
OpenSSL VPN 98
Providing a Remote Desktop 108
Windows Terminal Services 109
VNC 113
Using the X Window System 119
Providing a Remote Shell 125
Using Secure Shell 126
Using a Secure Shell GUI Client 128
Summary 130
Solutions Fast Track 131
Frequently Asked Questions 132
Protecting Network Resources 133
Introduction 134
Performing Basic Hardening 134
Defining Policy 135
Access Controls 137
Authentication 137
Authorization 138
Auditing 138
Hardening Windows Systems 139
General Hardening Steps 139
Users and Groups 142
File-Level Access Controls 147
Additional Steps 152
Using Microsoft Group Policy Objects 153
Account Lockout Policy 159
Audit Policy 160
User Rights Assignment 160
Hardening Linux Systems 164
General Hardening Steps 164
Users and Groups 165
File-Level Access Controls 168
Using the Bastille Hardening Script 172
Using SELinux 173
Hardening Infrastructure Devices 175
Patching Systems 176
Patching Windows Systems 177
Patching Linux Systems 179
Personal Firewalls 180
Windows Firewall 180
Netfilter Firewall 187
Configuring TCP Wrappers 187
Providing Antivirus and Antispyware Protection 188
Antivirus Software 189
Clam AntiVirus 189
Using Online Virus Scanners 196
Antispyware Software 196
Microsoft Windows Defender 197
Microsoft Malicious Software Removal Tool 200
Encrypting Sensitive Data 201
EFS 202
Summary 209
Solutions Fast Track 209
Frequently Asked Questions 212
Configuring an Intrusion Detection System 215
Introduction 216
Intrusion Detection Systems 216
Configuring an Intrusion Detection System 217
Hardware Requirements 218
Placing Your NIDS 218
Configuring Snort on a Windows System 221
Installing Snort 222
Configuring Snort Options 225
Using a Snort GUI Front End 231
Configuring IDS Policy Manager 232
Configuring Snort on a Linux System 240
Configuring Snort Options 240
Using a GUI Front End for Snort 246
Basic Analysis and Security Engine 246
Other Snort Add-Ons 254
Using Oinkmaster 254
Additional Research 256
Demonstrating Effectiveness 257
Summary 258
Solutions Fast Track 259
Frequently Asked Questions 261
Managing Event Logs 263
Introduction 264
Generating Windows Event Logs 264
Using Group Policy to Generate Windows Events Logs 267
Generating Custom Windows Event Log Entries 274
Collecting Windows Event Logs 275
Analyzing Windows Event Logs 277
Generating Syslog Event Logs 279
Windows Syslog 282
Generating Syslog Events 282
Receiving Syslog Events 295
Linux Syslog 297
Generating Syslog Events 297
Encrypting Syslog Traffic 298
Receiving Syslog Events on a Linux Host 311
Analyzing Syslog Logs on Windows and Linux 312
Windows Log Analysis 313
Linux Log Analysis 321
Securing Your Event Logs 327
Ensuring Chain of Custody 328
Ensuring Log Integrity 329
Applying Your Knowledge 331
Summary 333
Solutions Fast Track 333
Frequently Asked Questions 335
Testing and Auditing Your Systems 337
Introduction 338
Taking Inventory 338
Locating and Identifying Systems 339
Nmap 341
Super Scanner 347
Angry IP Scanner 351
Scanline 352
Special-Purpose Enumerators 355
Locating Wireless Systems 357
Network Stumbler 358
Documentation 361
Network Topology Maps 362
Access Request Forms 364
Business Continuity and Disaster Recovery Plans 365
IT Security Policies/Standards/Procedures 365
Vulnerability Scanning 366
Nessus 367
Running Nessus on Windows 368
Running Nessus on Linux 371
X-Scan 375
Microsoft Baseline Security Analyzer 379
OSSTMM 382
Summary 386
Solutions Fast Track 386
Frequently Asked Questions 387
Network Reporting and Troubleshooting 389
Introduction 390
Reporting on Bandwidth Usage and Other Metrics 390
Collecting Data for Analysis 392
Understanding SNMP 394
Configuring Multi Router Traffic Grapher 397
Configuring MZL & Novatech TrafficStatistic 400
Configuring PRTG Traffic Grapher 403
Configuring ntop 412
Enabling SNMP on Windows Hosts 418
Enabling SNMP on Linux Hosts 421
Troubleshooting Network Problems 424
Using a GUI Sniffer 425
Using a Command-Line Sniffer 433
Additional Troubleshooting Tools 438
Netcat 439
Tracetcp 439
Netstat 440
Summary 442
Solutions Fast Track 442
Frequently Asked Questions 444
Security as an Ongoing Process 447
Introduction 448
Patch Management 448
Network Infrastructure Devices 452
Operating System Patches 453
Application Patches 453
Change Management 454
Change Causes Disruption 454
Inadequate Documentation Can Exacerbate Problems 455
Change Management Strategy 455
Antivirus 459
Antispyware 459
Intrusion Detection Systems 460
Vulnerability Scanning 460
Vulnerability Management Cycle 461
Roles and Responsibilities 463
Penetration Testing 463
Obtaining the Support of Senior Management 464
Clarify What You Are Buying 464
Policy Review 465
Physical Security 466
Cert Team 468
Summary 470
Solutions Fast Track 470
Frequently Asked Questions 472
Index 475
Rapidshare
Learnkey Wireless Networking 15 Hours of Interactive Training
Learnkey Wireless Networking 5 sessions
5 Sessions - 15 Hours of Interactive Training
The popularity of wireless networks is exploding, and with it, demand for trained wireless IT professionals. In the Wireless Networking course from LearnKey, you'll learn the fundamentals of wireless LANs from a vendor-neutral perspective. Expert instructor Michael Storm takes you through radio frequency (RF) technologies, industry standards, site surveys, wireless security issues and much more. At the conclusion of this course you'll be prepared to implement, manage, and troubleshoot wireless networks, and be prepared to pass the Certified Wireless Network Administrator (CWNA) exam.
Session 1
Section A: CWNP Introduction
· CWNP Certification Program
· Levels of Certification
· Course Overview
· Course Objectives
Section B: Wireless Application
· History
· Standards
· Roles
· Last Mile Delivery
· Mobility
· Wireless LANs
Section C: Radio Frequency Technology
· Radio Frequency
· Behaviors
· Gain/Loss
· Reflection/Refraction
· Diffraction/Scattering
· Absorption
· VSWR
· VSWR Measurements
Section D: Antennas
· Principals
· Line of Sight/Fresnel Zone
· Obstructions
· Antenna Gain
· Intentional Radiator
· EIRP
Section E: RF Mathematics
· Power Calculation
· Units of Measure
· Power Gain/Loss
· dBm
· dBi
· Sample Calculation
Section F: Spread Spectrum
· Overview
· Narrowband/High Power
· Wideband/Low Power
· Usage
· Wireless LANs
· Wireless PANs
· Wireless MANs
Session 2
Section A: Spread Spectrum Technologies
· FCC Specifications
· FHSS
· FHSS Interference
· FHSS Channel
· Timing
· DSSS
· DSSS Channels
· DSSS Interference
Section B: FHSS vs. DSSS
· Comparison Factors
· Interference/Cost
· Co-location
· Equipment
· Data Rates
· Security
· Standards Support
Section C: Wireless Access Points
· Device Types
· Access Points
· Access Modes
· Access Point Options
· Antenna Options
· Filtering/Modular Cards
· Variable Power/Wired Connectivity
· Mounting Access Points
Section D: Access Point Features
· SOHOs
· Enterprises
· Management
Section E: Client Devices
· LAN Devices
· Adaptors
· USB
· PCI & ISA Adaptors
· Configuring Devices
Section F: Infrastructure Devices
· Wireless Bridges
· Workgroup Bridges
· Common Options
· Residential Gateways
· Enterprise Wireless Gateways
· Device Management
Section G: Antenna Types
· Antenna Selection
· Dipole
· Semidirectional
· Highly Directional
Session 3
Section A: Tuning Antennas
· RF Antenna Concepts
· Polarization
· Antenna Gain/Beamwidth
· Free Space Path Loss
· Installation
· Orientation/Alignment
· Safety
Section B: Power Over Ethernet
· Usage
· Compatibility
· Voltage Pinout Standards
Section C: RF Accessories
· Accessory Types
· RF Amplifier
· RF Attenuators
· Lightning Arrestors
· RF Splitters
· RF Connectors
· RF Cables
· RF Pigtail
Section D: Organizations
· Organizational Roles
· FCC Role
· ISM vs. U-NII
· IEEE
· IEEE 802-11b
· IEEE 802.11a/IEEE 802.11g
· Other Organizations
· Competition
Section E: Locating Access Points
· 802.11 Architectures
· SSIDs
· Beacons
· Passive Scanning
· Active Scanning
Session 4
Section A: Authentication
· Authentication Process
· Association Process
· States
· Authentication Methods
· Authentication Security
· EAP Types
· VPN Solutions
Section B: Service Sets
· Service Sets Overview
· Roaming
· Roaming Standards
· Connections
· Limitations
· Load Balancing
Section C: WAN Communication
· Frames
· Management Frames
· Collision Handling
· Fragmentation
· Fragment Bursting
· DCF & PCF
· Interframe Spacing
· Random Backoff/Slot Time
Section D: Troubleshooting
· RF Environments
· Multipath Problems
· Multipath Solutions
· Hidden Node Problem
· Hidden Node Solutions
· Near/Far Problems
· Near/Far Solution
· Co-location Problems
· Co-location Solutions
Session 5
Section A: WEP/TKIP
· Wireless Security
· WEP
· WEP Attacks
· WEP Implementation
· WEP Keys
· WEP Key Deployment
· Usage
· TKIP
Section B: Security Options
· AES
· Filtering
· SSID Filtering
· MAC Address Filtering
· Protocol Filtering
Section C:Wireless Attacks
· Attacks on Wireless LANs
· Passive Attacks
· Active Attacks
· Jamming
· Man-in-the-Middle Attacks
Section D: Corporate Security Policy
· Security Policies
· Public Wireless Networks
· Security Recommendations
Section E: Site Survey
· Specifications
· Preparation/Facility Analysis
· Networks & Network Needs
· Area Usage & Towers
· Requirements
· Available Resources
· Security Requirements
Section F: Preparation
· Preparation Checklist
· Site Survey Equipment
· Site Survey Kit Checklist
· Gathering RF Information
· Site Survey Reporting
· Additional Information
Download 35 Parts:
01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 | 32 |33 | 34 | 35 |
5 Sessions - 15 Hours of Interactive Training
The popularity of wireless networks is exploding, and with it, demand for trained wireless IT professionals. In the Wireless Networking course from LearnKey, you'll learn the fundamentals of wireless LANs from a vendor-neutral perspective. Expert instructor Michael Storm takes you through radio frequency (RF) technologies, industry standards, site surveys, wireless security issues and much more. At the conclusion of this course you'll be prepared to implement, manage, and troubleshoot wireless networks, and be prepared to pass the Certified Wireless Network Administrator (CWNA) exam.
Session 1
Section A: CWNP Introduction
· CWNP Certification Program
· Levels of Certification
· Course Overview
· Course Objectives
Section B: Wireless Application
· History
· Standards
· Roles
· Last Mile Delivery
· Mobility
· Wireless LANs
Section C: Radio Frequency Technology
· Radio Frequency
· Behaviors
· Gain/Loss
· Reflection/Refraction
· Diffraction/Scattering
· Absorption
· VSWR
· VSWR Measurements
Section D: Antennas
· Principals
· Line of Sight/Fresnel Zone
· Obstructions
· Antenna Gain
· Intentional Radiator
· EIRP
Section E: RF Mathematics
· Power Calculation
· Units of Measure
· Power Gain/Loss
· dBm
· dBi
· Sample Calculation
Section F: Spread Spectrum
· Overview
· Narrowband/High Power
· Wideband/Low Power
· Usage
· Wireless LANs
· Wireless PANs
· Wireless MANs
Session 2
Section A: Spread Spectrum Technologies
· FCC Specifications
· FHSS
· FHSS Interference
· FHSS Channel
· Timing
· DSSS
· DSSS Channels
· DSSS Interference
Section B: FHSS vs. DSSS
· Comparison Factors
· Interference/Cost
· Co-location
· Equipment
· Data Rates
· Security
· Standards Support
Section C: Wireless Access Points
· Device Types
· Access Points
· Access Modes
· Access Point Options
· Antenna Options
· Filtering/Modular Cards
· Variable Power/Wired Connectivity
· Mounting Access Points
Section D: Access Point Features
· SOHOs
· Enterprises
· Management
Section E: Client Devices
· LAN Devices
· Adaptors
· USB
· PCI & ISA Adaptors
· Configuring Devices
Section F: Infrastructure Devices
· Wireless Bridges
· Workgroup Bridges
· Common Options
· Residential Gateways
· Enterprise Wireless Gateways
· Device Management
Section G: Antenna Types
· Antenna Selection
· Dipole
· Semidirectional
· Highly Directional
Session 3
Section A: Tuning Antennas
· RF Antenna Concepts
· Polarization
· Antenna Gain/Beamwidth
· Free Space Path Loss
· Installation
· Orientation/Alignment
· Safety
Section B: Power Over Ethernet
· Usage
· Compatibility
· Voltage Pinout Standards
Section C: RF Accessories
· Accessory Types
· RF Amplifier
· RF Attenuators
· Lightning Arrestors
· RF Splitters
· RF Connectors
· RF Cables
· RF Pigtail
Section D: Organizations
· Organizational Roles
· FCC Role
· ISM vs. U-NII
· IEEE
· IEEE 802-11b
· IEEE 802.11a/IEEE 802.11g
· Other Organizations
· Competition
Section E: Locating Access Points
· 802.11 Architectures
· SSIDs
· Beacons
· Passive Scanning
· Active Scanning
Session 4
Section A: Authentication
· Authentication Process
· Association Process
· States
· Authentication Methods
· Authentication Security
· EAP Types
· VPN Solutions
Section B: Service Sets
· Service Sets Overview
· Roaming
· Roaming Standards
· Connections
· Limitations
· Load Balancing
Section C: WAN Communication
· Frames
· Management Frames
· Collision Handling
· Fragmentation
· Fragment Bursting
· DCF & PCF
· Interframe Spacing
· Random Backoff/Slot Time
Section D: Troubleshooting
· RF Environments
· Multipath Problems
· Multipath Solutions
· Hidden Node Problem
· Hidden Node Solutions
· Near/Far Problems
· Near/Far Solution
· Co-location Problems
· Co-location Solutions
Session 5
Section A: WEP/TKIP
· Wireless Security
· WEP
· WEP Attacks
· WEP Implementation
· WEP Keys
· WEP Key Deployment
· Usage
· TKIP
Section B: Security Options
· AES
· Filtering
· SSID Filtering
· MAC Address Filtering
· Protocol Filtering
Section C:Wireless Attacks
· Attacks on Wireless LANs
· Passive Attacks
· Active Attacks
· Jamming
· Man-in-the-Middle Attacks
Section D: Corporate Security Policy
· Security Policies
· Public Wireless Networks
· Security Recommendations
Section E: Site Survey
· Specifications
· Preparation/Facility Analysis
· Networks & Network Needs
· Area Usage & Towers
· Requirements
· Available Resources
· Security Requirements
Section F: Preparation
· Preparation Checklist
· Site Survey Equipment
· Site Survey Kit Checklist
· Gathering RF Information
· Site Survey Reporting
· Additional Information
Download 35 Parts:
01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 | 32 |33 | 34 | 35 |
From P2P to Web Services and Grids: Peers in a Client/Server World
From P2P to Web Services and Grids: Peers in a Client/Server World
Pages:275
From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but also other technologies, such as client/server based systems and distributed-object technologies.
A wide range of middleware and application-based technologies are covered, such as Jxta, Jini, Globus, Web services, OGSA, WSRF, SOAP,WSDL, Napster and Gnutella, with emphasis given on the architecture employed and security model chosen. Each technology and its capabilities are analyzed in the context of the degree of centralization or decentralization they employ.
A resulting taxonomy is created giving a context in which to consider the most advanced and broad ranging distributed systems available today, and provides an essential reference text for designing new distributed systems.
Rapidshare
Pages:275
From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but also other technologies, such as client/server based systems and distributed-object technologies.
A wide range of middleware and application-based technologies are covered, such as Jxta, Jini, Globus, Web services, OGSA, WSRF, SOAP,WSDL, Napster and Gnutella, with emphasis given on the architecture employed and security model chosen. Each technology and its capabilities are analyzed in the context of the degree of centralization or decentralization they employ.
A resulting taxonomy is created giving a context in which to consider the most advanced and broad ranging distributed systems available today, and provides an essential reference text for designing new distributed systems.
Rapidshare
Tidak ada komentar:
Posting Komentar