![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Networking packages
Lab Manuals provide students enrolled in a Cisco Networking Academy course of the same name with a convenient, complete collection of all the course lab exercises that provide hands-on practice and challenges. The only authorized Labs & Study Guide for the Cisco Networking Academy Routing and Switching Essentials course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.
Technology has made it possible to conduct research and form research groups that are not limited by geographic location. The field of Collaborative and Distributed E-Research (CDER) studies this phenomenon, specifically focusing on the use of the Internet and Information Technology (IT) to develop international and distributed scientific research. Collaborative and Distributed E-Research: Innovations in Technologies, Strategies and Applications offers insight into practical and methodological issues related to collaborative e-research and furthers our understanding of current and future trends in online research and the types of technologies involved. This book provides a useful foundation for academics and professionals involved in Collaborative and Distributed E-Research, collaborative software development, and computer-supported collaborative work.
Enterprise Architecture is the inherent design and management approach essential for organizational coherence leading to alignment, agility, and assurance. Structured Enterprise Architecture approach is often used to plan and implement efficient and effective transformation efforts. However, the strongest driver for Enterprise Architecture is to improve service delivery and overall performance within the organization's business segments. Enterprise Architecture for Connected E-Government: Practices and Innovations addresses the gap in current literature in terms of linking and understanding the relationship between e-government and government Enterprise Architecture. Within this broader context, the focus is specifically on uncovering and comprehending the relationship between government Enterprise Architecture and connected government. Perfect for Government CIOs, IT/IS Managers, Chief Architects, Analysts and Designers seeking better, quicker, and easier approaches to respond to needs of their internal and external customers.
Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers- taking you from design and development to testing, deployment, governance, and compliance. About You This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible. Discover powerful new ways to: Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security
With the advent and advancement of E-Collaboration tools, our way of social interaction and online social behavior has altered drastically. With new ways of communicating and working together, we must understand how this affects human behavior. Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies addresses the design and implementation of e-collaboration technologies, assesses its behavioral impact on individuals and groups, and presents theoretical considerations on links between the use of e-collaboration technologies and behavioral patterns. An innovative collection of the latest research findings, this book covers significant topics such as Web-based chat tools, Web-based asynchronous conferencing tools, e-mail, listservs and many others, perfect for academics, researchers, and professionals alike.
With recent advances in IT in areas such as AI and IoT, collaboration systems such as business chat, cloud services, conferencing systems, and unified communications are rapidly becoming widely used as new IT applications in global corporations' strategic activities. Through in-depth longitudinal studies of global corporations, the book presents a new theoretical framework and implications for IT-enabled dynamic capabilities using collaboration systems from the perspective of micro strategy theory and organization theory. The content of the book is based on longitudinal analyses that employ various qualitative research methods including ethnography, participant observation, action research and in-depth case studies of global corporations in Europe, the United States and Asia that actively use collaboration systems. It presents a new concept of micro dynamism whereby dynamic "IT-enabled knowledge communities" such as "IT-enabled communities of practice" and "IT-enabled strategic communities" create "IT-enabled dynamic capabilities" through the integration of four research streams - an information systems view, micro strategy view, micro organization view and knowledge-based view. The book demonstrates that collaboration systems create, maintain and develop "IT-enabled knowledge communities" within companies and are strategic IT applications for enhancing the competitiveness of companies in the ongoing creation of new innovation and the realization of sustainable growth in a 21st century knowledge-based society. This book is primarily written for academics, researchers and graduate students, but will also offer practical implications for business leaders and managers. Its use is anticipated not only in business and management schools, graduate schools and university education environments around the world but also in the broad business environment including management and leadership development training.
The definitive professional's guide to the Cisco next-gen 9800 wireless controllers As wireless networks, applications, and services rapidly evolve, they grow increasingly business critical, with steeper requirements for performance, latency, deployment density, and device support. The advanced Catalyst 9800 wireless controllers from Cisco meet these challenges, delivering exceptional adaptability, security, performance, scalability, and programmability. Based on the modern and secure Cisco IOS XE operating system, their support for Cisco intent-based networking will help you continually leverage new innovation. Now, four Cisco experts offer end-to-end guidance, practical tips, and proven recommendations for designing, deploying, and managing wireless networks with the Catalyst 9800. For technical decision makers, this guide delivers a deep understanding of Catalyst 9800 hardware and software, tightly linked to business value. Architects will find essential details for both upfront network design and feature implementation. Network operators and other IT professionals will discover tested tools and methods for reliable and efficient setup, configuration, monitoring, and troubleshooting. Whatever your role, this guide will help you maximize the value of any Catalyst 9800 network, and serve as your indispensable reference for years to come. Understand Catalyst 9800 benefits, capabilities, roles, and architecture Learn the new C9800 Configuration Model, with key design considerations and best practices Deploy and configure the C9800 in private and public clouds Systematically secure the C9800: from AAA and ACLs to rogue detection and wireless intrusion prevention (WIPS) Establish and optimize seamless client roaming in enterprise environments Learn how the C9800 implements key RF concepts Plan and implement an end-to-end architecture for QoS, and design/ deploy for high availability and network services like multicast Discover value-added wireless services available through Cisco DNA Spaces Drive agility and value via network programmability with YANG, Python, RESTCONF, and NETCONF Make the most out of the rich data models of Model-Driven Telemetry and Programmability using open-source tools Walk through wireless network troubleshooting, backup/restore, and upgrades
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management - all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsoft's Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, they'll help you address new security challenges far more effectively-and save hours, days, or even weeks. Two of Microsoft's leading cloud security experts show how to: Assess new threat landscapes, the MITRE ATT&CK framework, and the implications of ''assume-breach'' Explore Defender for Cloud architecture, use cases, and adoption considerations including multicloud with AWS and GCP Plan for effective governance, successful onboarding, and maximum value Fully visualize complex cloud estates and systematically reduce their attack surfaces Prioritize risks with Secure Score, and leverage at-scale tools to build secure cloud-native apps Establish consistent policy enforcement to avoid drift Use advanced analytics and machine learning to identify attacks based on signals from all cloud workloads Enhance security posture by integrating with the Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft Defender for Endpoint Leverage just-in-time VM access and other enhanced security capabilities About This Book For architects, designers, implementers, SecOps professionals, developers, and security specialists working in Microsoft Azure environments For all IT professionals and decision-makers concerned with securing modern hybrid/multicloud environments, cloud-native apps, and PaaS services
The only authorized Labs & Study Guide for the Cisco Networking Academy Introduction to Networks course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: * Vocabulary Matching Exercises * Concept Questions Exercises * Skill-Building Activities and Scenarios * Configuration Scenarios * Packet Tracer Exercises * Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.
Practical strategies and techniques for automating network infrastructure As networks grow ever more complex, network professionals are seeking to automate processes for configuration, management, testing, deployment, and operation. Using automation, they aim to lower expenses, improve productivity, reduce human error, shorten time to market, and improve agility. In this guide, expert practitioner Ivo Pinto presents all the concepts and techniques you'll need to move your entire physical and virtual infrastructure towards greater automation and maximize the value it delivers. Writing for experienced professionals, the author reviews today's leading use cases for automation, compares leading tools, and presents a deep dive into using the open source Ansible engine to automate common tasks. You'll find everything you need: from practical code snippets to real-world case studies to a complete methodology for planning strategy. This guide is for everyone seeking to improve network operations and productivity, including system, network, storage, and virtualization administrators, network and security engineers, and many other technical professionals and managers. You can apply its vendor-neutral concepts throughout your entire environment-from servers to the cloud, switches to security. Explore modern use cases for network automation, and compare today's most widely used automation tools Capture essential data for use in network automation, using standard formats such as JSON, XML, and YAML Get more value from the data your network can provide Install Ansible and master its building blocks, including plays, tasks, modules, variables, conditionals, loops, and roles Perform common networking tasks with Ansible playbooks: manage files, devices, VMs, cloud constructs, APIs, and more See how Ansible can be used to automate even the largest global network architectures Discover how NetDevOps can transform your approach to automation--and create a new NetDevOps pipeline, step by step Build a network automation strategy from the ground up, reflecting lessons from the world's largest enterprises
Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: * Understand cloud security boundaries and responsibilities * Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection * Explore Azure's defense-in-depth security architecture * Use Azure network security patterns and best practices * Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security * Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines * Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information * Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite * Effectively model threats and plan protection for IoT systems * Use Azure security tools for operations, incident response, and forensic investigation
Thousands of people have already discovered that Made Simple Computer Books gives them what they want fast! " I haven't found any other books worth recommending until these." " Clear, accurate, well presented, jargon free, well targeted." " Easy to follow to perform a task." " Ideal for the first time user." By a combination of tutorial approach, with tasks to do and easy steps, the MADE SIMPLE series of Computer Books from British publisher Butterworth-Heinemann, using British authors and designed for a European audience, stands above all others. Let this book, endorsed by CompuServe, as the official CompuServe book show you how to get the most out of CompuServe.
This book introduces workflow application development in the Lotus Notes/Domino environment. Workflow concepts are explained and the Domino features are demonstrated for developing workflow-enabled applications. A complete, reusable, and customizable workflow application is provided, with annotated source code utilizing UML, XML, and Java. Illustrations throughout.
You get so much more done when you Slack! Ever wondered what it would be like to be less overwhelmed, more efficient, and much more engaged at work? A way you can make all that happen is, of course, to Slack. Actually, it's to use Slack, the business communications platform that's revolutionized how groups work together. This comprehensive guide shows how--as well as why--there are now millions of users of this flexible, fun, and intuitive workspace tool. Presented in a clear, easy-to-follow style, Slack For Dummies takes you from the basics of getting started with the service all the way through how to get your teams Slacking together for all they're worth. You'll also find case studies showing how Slack increases productivity and how to replicate that in your organization, as well as tips on getting buy-in from the boss. Introduce Slack to your workflo wUnderstand roles and feature sAnalyze user dat aKeep your Slacking secure So, take a peek inside and discover how you can cut the slack using Slack--and clue your teams in on how there is actually a way to Slack off for improved results!
Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you step-by-step through planning, deployment, and operations, helping you use Microsoft Sentinel to escape the complexity and scalability challenges of traditional solutions. Fully updated for the latest enhancements, this edition introduces new use cases for investigation, hunting, automation, and orchestration across your enterprise and all your clouds. The authors clearly introduce each service, concisely explain all new concepts, and present proven best practices for maximizing Microsoft Sentinel's value throughout security operations. Three of Microsoft's leading security operations experts show how to: Review emerging challenges that make better cyberdefense an urgent priority See how Microsoft Sentinel responds by unifying alert detection, threat visibility, proactive hunting, and threat response Explore components, architecture, design, and initial configuration Ingest alerts and raw logs from all sources you need to monitor Define and validate rules that prevent alert fatigue Use threat intelligence, machine learning, and automation to triage issues and focus on high-value tasks Add context with User and Entity Behavior Analytics (UEBA) and Watchlists Hunt sophisticated new threats to disrupt cyber kill chains before you're exploited Enrich incident management and threat hunting with Jupyter notebooks Use Playbooks to automate more incident handling and investigation tasks Create visualizations to spot trends, clarify relationships, and speed decisions Simplify integration with point-and-click data connectors that provide normalization, detection rules, queries, and Workbooks About This Book For cybersecurity analysts, security administrators, threat hunters, support professionals, engineers, and other IT professionals concerned with security operations For both Microsoft Azure and non-Azure users at all levels of experience
Apache Tomcat is the most popular open-source de-facto Java Web application server, standard for today's Web developers using JSP/Servlets. Apache Tomcat 7 covers details on installation and administration of Apache Tomcat 7. It explains key parts of the Tomcat architecture, and provides an introduction to Java Servlet and JSP APIs in the context of the Apache Tomcat server. In addition to basic concepts and administration tasks, Apache Tomcat 7 covers some of the most frequently used advanced features of Tomcat, including security, Apache web server integration, load balancing, and embedding Tomcat server in Java applications. Finally, through a practical primer, it shows how to integrate and use some of the most popular Java technologies with Apache Tomcat. In summary, Apache Tomcat 7 offers both novice and intermediate Apache Tomcat users a practical and comprehensive guide to this powerful software.What you'll learn * Install and set up Tomcat 7 on Windows and Unix platforms * Manage and deploy application deployed on Tomcat 7 using Manager Application * Secure Tomcat 7 server using security realms or HTTPS protocol * Embed Tomcat 7 server into your desktop Java application * Efficiently configure Tomcat 7 with Apache Web server * Configure data sources and mail sessions using JNDI in Tomcat * Configure logging for web applications deployed on Tomcat server Who this book is for This book is for those Web developers and/or Java programmers new to the open-source Apache Tomcat Web server. It's also for those new to the latest release, version 7. Table of Contents * Introduction to Apache Tomcat 7 * Deploying Web Applications to Tomcat * Servlets, JSPs, and ServletContext * Using Tomcat's Manager Web Application * HTTP Sessions * Configuring Security Realms * Securing Tomcat with SSL * Valves and Servlet Filters * Embedding Tomcat * Integrating Apache Web Server * Integrating Spring MVC Framework * Logging in Tomcat * Configuring JNDI in Tomcat * Server.xml File * The Web.xml File
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 8th International Middleware Conference 2007, held in Newport Beach, CA, USA, in November 2007. The 22 revised full papers presented were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on component-based middleware, mobile and ubiquitous computing, grid and cluster computing, enhancing communication, resource management, reliability and fault tolerance, as well as asynchronous communication.
Since Microsofts release of BizTalk Server 2006, there is a serious need for more documentation on this product. "Foundations of BizTalk Server 2006" fills that void. The book will take you from novice to professional, equipping you with the tools youll need to get started in the world of BizTalk server integration. From installation to deployment, you will grow increasingly more comfortable with the product as you work through a multitude of hands-on examples and demo applications. This book will demystify the product and emphasize the new 2006 BizTalk Server features. So even if youre a reluctant reader at first, youll gain full confidence in the product by books end.
"Practical .NET 2.0 Networking Projects" demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a straightforward and direct way. The book begins by discussing background theory so youll get comfortable with the layout of the .NET Framework and Compact Framework from a networking perspective. Then youll use the APIs within these frameworks to build a variety of cutting-edge networking applications that cover everything from Bluetooth and RFID communication to sockets programming and chat servers. Youll build working examples for each project, which you can also customize and use for your own purposes. The featured projects cover Basic introduction to network programming in .NET 2.0 Sockets programming Serial communication Bluetooth and GPS Infrared networking to mobile devices RFID |
![]() ![]() You may like...
The Deck Book - Enjoy Life....Outdoors
Drew John Cunningham, Tom Jacques
Hardcover
R1,248
Discovery Miles 12 480
Digital Communication Systems…
Alexander M. Wyglinski, Di Pu
Hardcover
R3,597
Discovery Miles 35 970
|