Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > Networking packages
Over 500 pages of original content based on the CCIE R&S lab exam 4.0 Believe me, I know how difficult it is to prepare for this exam. I designed this material for both the new CCIE lab candidates that are starting their studies, and struggling candidates that need to tune their study approach. To help you build a foundation or repair your foundation. You will find a balance of the details new candidates should know, plus presentations of the study techniques I used to finally reach the expert level required for the exam. Features: -How to get started in CCIE studies, building up from the CCNP level -Start your CCIE R&S lab exam studies in the right direction -Demonstrates how to self-study blueprint topics. Ultimately, self-study is what I relied on to pass the exam, so self-study is highly emphasized. -Guides you on specifically what to study and how deep to go into topics -Book references that include specific chapters to read -Failing CCIE R&S lab exam candidates: refocus and tune-up your studies -Loaded with many hints and tips like those found in boot camp presentations Covers: -Layer 2 Technologies -Implementing IPv4 -Implementing IPv6 -MPLS layer 3 VPNs -IP Multicast -Quality of Service -plus, a selection of six topics from the other sections of the exam (Network Security, Network Services, and Optimize the network), showing study approaches that can be used to master those topics and others like them.
Technology has made it possible to conduct research and form research groups that are not limited by geographic location. The field of Collaborative and Distributed E-Research (CDER) studies this phenomenon, specifically focusing on the use of the Internet and Information Technology (IT) to develop international and distributed scientific research. Collaborative and Distributed E-Research: Innovations in Technologies, Strategies and Applications offers insight into practical and methodological issues related to collaborative e-research and furthers our understanding of current and future trends in online research and the types of technologies involved. This book provides a useful foundation for academics and professionals involved in Collaborative and Distributed E-Research, collaborative software development, and computer-supported collaborative work.
The IBM Lotus Sametime 8.5.2 Administration Guide uses a practical, no-nonsense approach to give you the essential information you need. Using realistic scenarios, you learn how to configure and maintain your environment to meet your needs and take advantage of the flexibility offered in Sametime 8.5.2. If you are responsible for installing and administering Sametime 8.5.2, then this book is for you. If you're completely new to Sametime administration, this book will serve as your roadmap. If you're making the jump from a prior version of Sametime, then you'll see how Sametime 8.5.2 differs and how you work with the new configuration. Even if you already have Sametime 8.5.2 up and running, this guide will answer those questions you may still have of why and how the various server components work.
The book offers a self-contained discussion about file-sharing systems from an engineer's point of view. Its main scope is to rationalise the engineering process at the basis of peer-to-peer (p2p) file-sharing systems. The work analyses the architectural blueprints, the design choices, the internals, the core algorithms, their interaction with the underlying network infrastructure and some of the major findings of the scientific community. With such foundations, it will be straightforward to understand the main behaviours of these systems, their strengths and weaknesses and to correctly evaluate the resulting traffic patterns. As a consequence of the widespread diffusion of file-sharing applications, of their impact over the network in terms of traffic load, and of the kind of content conveyed, different parties are interested in the topic. Specifically: academics and researchers, students, network administrators and businessmen. The major topics covered in the book are: a quick historical revision of file-sharing applications; an introduction to the p2p communication paradigm, focusing on aspects strictly related to their adoption to engineer file-sharing applications; the analysis of the basic components and the core functionalities needed to implement an effective file-sharing service; a discussion about problems arising due to the lack of transparency in the modern Internet and the main traversal techniques available; the investigation of the most popular heuristics employed to force file-sharing users to play an active role within the overall service; a detailed dissertation on eMule and BitTorrent applications, "specialising" the theory presented in the rest of the book; client interface modifications, tweaks and optimisation applied to file-sharing architectures; traffic analysis of file sharing applications: results, methodologies and tools; a quick investigation of the source code of the most popular client interfaces (with hints at protocol implementation, possible modifications to enhance performances, and data gathering to conduct research and to exploit system optimisation).
This book is aimed at the Notes/Domino application developer, and it will show you how to take advantage of the new application development and programming features of Domino Designer 7. Written by Lotus insiders, the book provides a practical guide to developing applications making use of the important features and enhancements introduced in Notes/Domino 7. These experienced experts use their own experiences to map out the benefits you could gain, and the dangers you may face, as you develop Domino applications in your business. Domino is an application server that can be used as a standalone web server or as the server component of IBM's Lotus Domino product which provides a powerful collaborative platform for development of customized business applications. It also provides enterprise-grade email, messaging, and scheduling capabilities. The book covers: . Understand the new features in Notes and Domino 7. . Use DB2 as a data store for Domino databases so as to bring the scalability features of DB2 and the flexibility of SQL into Domino applications. The chapter shows how to install, configure, map, and then access Domino data stored in DB2. . Domino Designer 7 to better manage Lotus Notes and Domino applications. Specifically we would be covering Autosave, Agent Profiling and remote Java debugging. . Chapter 5 shows how to ensure that critical applications continue to run smoothly after you upgrade your Notes/Domino installation, while taking advantage of the new features and functionality release 7 has to offer. . In chapter 6, we will tackle issues you need to consider when upgrading your @Formula language to Notes/Domino. We first detail a backup strategy and then take a tour through the new Notes/Domino @Formulas and the potential upgrade issues they raise. . Chapter 7 runs through the process of upgrading Domino based agents and LotusScript; we also cover the use of TeamStudio Analyzer, which is a third-party tool to assist with your upgrade. The second half of the chapter runs through the new features available to LotusScript developers in Domino Designer 7 . Web services can extend the reach of your existing Domino applications, as well as provide tools for integration with existing applications. implementation of one such web service. We cover the various tools Domino Designer 7 provides for interacting with WSDL and finish by examining the role UDDI plays in facilitating the adoption of web services. . Chapter 9 covers using best practices to optimize your Domino applications for performance; specifically we would see how to efficiently code database properties, views, and forms/agents to work well in a Domino environment. . In chapter 10, we will learn to use the new programming features offered in Lotus Notes/Domino 7 by actually implementing them in code. . In Chapter 11, we will examine two important new features Domino Domain Monitoring (DDM) and Agent Profiles, which are critical for troubleshooting your Notes/Domino applications. Additionally, the chapter runs through several tips and techniques for identifying and correcting problems in your Notes/Domino 7 applications. . In Appendix A, we review several vendor tools that you can use to help upgrade your applications to Lotus Notes/Domino 7. Plug-ins by PistolStar, Inc, CMT Inspector from Binary Tree, and FT Search Manager from IONET.
The primary goal of .NET Compact Framework is to bring the familiar experience of developing .NET applications for the desktop to the device world. Of the approximately six million Microsoft desktop developers in the world, it is estimated that perhaps two hundred thousand will turn their attention to the device world using the enabling technology of the .NET Compact Framework.To facilitate the goal of showing readers how to develop applications for the .NET Compact Framework, the book contains in-depth treatment in the following topic areas: Windows Forms and Threading, Network Programming, ADO.NET Dataset, XML Serialization, SQL CE, Web Services, and performance management. Each concept is accompanied with a sample application that illustrates its implementation on the .NET Compact Framework. For the convenience of the reader, each sample application will be offered in both C# and Visual Basic .NET. Developers can use this source code as a springboard for creating their own device side database applications.
From the exclusive publishers of Oracle Press Books, here is the only book available focusing exclusively on developing J2EE applications with the Oracle9i Application Server. Youll find coverage of Java Servlets, Java ServerPages (JSPs), JavaBeans, Web Services, SOAP, WSDL, UDDI--and much more.
Mission-Critical Microsoft Exchange 2003 provides a complete update
of Cochran's Mission-Critical Microsoft Exchange 2000, and
complements Tony Redmond's new book, the best-selling Microsoft
Exchange Server 2003. This book includes many of the same
high-availability topics as the first edition but also expands the
coverage of storage technology, server technology, management, and
security. The book meets the needs of an Exchange administrator or
system implementer who is striving to maintain a production
Exchange environment that delivers superior service levels, high
availability, manageability and scalability with the lowest cost of
ownership.
CCNP BSCI Exam Certification Guide (CCNP Self-Study) is a revised edition of the all-time best-selling CCNP BSCI/CCNP Routing title ever! With updated technology and testing content, this book provides exceptional tutorial learning and exam preparation on advanced routing techniques and practices. It matches all the objectives of the new 642-801 BSCI exam launched in April! Written in smaller, easier to absorb chapters, this book breaks down larger concepts into manageable blocks of learning. This, combined with other new learning elements and a complete re-writing of the material, make it even easier to comprehend and retain the large amount of learning required for this essential building block of learning for a networker. As part of the CCNP, CCDP, and CCIP certifications, routing is an important building block that all networking professionals must master. This book teaches and prepares candidates for this challenging professional-level exam with chapter quizzes, foundation reviews, in-depth topical learning materials, real-world case studies, and, of course, the 200-plus question electronic testing engine on the CD-ROM included in the back of the book. This testing engine even includes simulation-based questions, just like on the actual exam. New coverage includes more on IS-IS (Intermediate System to Intermediate System), NAT (Network Address Translation), and a solid introduction to IPv6.
The Most Comprehensive Apache Server 2.0 Resource Available Install, configure, administer, and secure Apache Server 2.0 using this practical guide. You'll find all the information you need to successfully run Apache in various environments--including Windows, UNIX, and Mac OS X. Expert Ryan Bloom offers you insightful advice for avoiding common errors and reveals valuable debugging techniques. From basic topics such as downloading and installing Apache to more advanced topics that include daily administration, virtual hosting, and proxy configuration, this all-inclusive resource is ideal--even if you're a newcomer to this powerful, reliable, and scalable Web server.Configure, compile, and install Apache on Windows, UNIX, and Mac OS X Learn the standard module structure and write simple modules Set up a basic HTTP server and customize error pages Discover where to store password information and learn how passwords are stored and checked Build a Web site with DAV clients Run CGI scripts and write a content generator Understand how input/output filters work Know how to load balance one site across multiple machines Deal with logs as well as name-based and IP-based virtual hosts Write protocol modules and learn how protocols get mapped to a request Debug your Apache setup and avoid common mistakes and errors Optimize site performance and learn advanced administration techniques
A comprehensive and authoritative guide to development with ASP.NET, Microsoft's ActiveServer Pages. It covers all the features and syntax of ASP.NET, and a special "ASP.NET in Action" part features the development of three full-fledged applications, including a product catalogue, shopping cart, and customer customization. This guide also addresses the critical issues of debugging and security. The CD contains all the code from the book, ready to run, plus additional application solutions not provided in the book.
This hands-on implementation guide will show you how to implement Cisco-based virtual private networks step-by-step. It not only provides a detailed overview of the various VPN technologies available, it also compares them and discusses how each technology works.
Implement and manage Microsoft’s leading messaging and collaboration system using this instructive guide. You’ll quickly learn everything you need to deploy and administer the system effectively, and learn about migration and coexistence with Exchange 5.5 Server. If you are a Windows administrator new to Exchange 2000 Server, this is the book for you.
Scaling Microsoft Exchange 2000 is the definitive book on how to
design, maintain, and optimize large-scale Exchange Server
messaging systems that meet the needs of demanding and rapidly
growing organizations. Written by one of the industry's leading
experts on Exchange Server performance optimization and
scalability, Scaling Microsoft Exchange 2000 is a reference book
for designing Exchange servers. It shows you how to maintain and
operate your server according to ever more stringent service
levels, while meeting the demand for increasing data growth and
manageability. Bijaoui provides information on key technologies
such as storage and systems architecture that can meet demands for
greater availability. The book also explains the determining
factors in designing large-scale Exchange 2000 deployments, and
provides a methodology for getting the best out of your messaging
and collaboration infrastructure.
Get up-to-speed quickly on running a network using Apache Server with this introductory guide. Aimed at administrators new to Apache, this practical guide offers tips for running Apache on multiple platforms--including UNIX-based systems, Windows NT/2000, and Mac OS--and contains clear, straightforward advice for administering Apache effectively in todays Web environment.
Install, configure, and manage Microsoft's Exchange 2000 Server Build, maintain, and troubleshoot a scaleable, reliable messaging infrastructure using Exchange 2000 Server. Logically organized into task-based sections, Administering Exchange 2000 Server explains how to manage sites, clients, address lists, and Internet protocols. The book also covers the new features of Exchange, such as Active Directory integration, the Windows 2000 security model, instant messaging, and video conferencing services. The step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots make this the perfect day-to-day reference for administrators working with or migrating to Exchange 2000 Server.
-- The hands-on daily bible for administrators working with SMS on
large-scale Microsoft networks. Task-by-task instruction rather
than overviews of the software and tools. Other essential tasks are
covered in detail to get the network administrator quickly up to
speed and on to the next job in their inbox.
A guide to the current technologies related to the delivery process for both live and on-demand services within IPTV delivery networks IPTV Delivery Networks is an important resource thatoffers an in-depth discussion to the IPTV (Internet Protocol Television) delivery networks for both live and on demand IPTV services.This important book also includes a review of the issues and challenges surrounding the delivery of IPTV over various emerging networking and communications technologies. The authors -- an international team of experts -- introduce a framework for delivery network applicable for live and video-on-demand services. They review the fundamental issues of IPTV delivery networks and explore the QoS (Quality of Service) issue for IPTV delivery networks that highlights the questions of security and anomaly detection as related to quality. IPTV Delivery Networks also contains a discussion of the mobility issues and next-generation delivery networks. This guide captures the latest available and usable technologies in the field and: Explores the technologies related to delivery process for both live (real time) and on demand services in highly accessible terms Includes information on the history, current state and future of IPTV delivery Reviews all the aspects of delivery networks including storage management, resource allocation, broadcasting, video compression, QoS and QoE Contains information on current applications including Netflix (video on demand), BBC iPlayer (time-shifted IPTV) and live (real time) streaming Written for both researchers and industrial experts in the field of IPTV delivery networks. IPTV Delivery Networks is a groundbreaking book that includes the most current information available on live and on demand IPTV services.
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. LEARN HOW TO Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today's most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you're attacked Learn how cyberterrorism and information warfare are evolving
Imagine that it's the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with SAP NetWeaver is that daunting. NetWeaver is both an application platform and an integration platform. It integrates your current IT systems to enable portals, collaboration, data management, and development environments. To grasp the complexities and possibilities of SAP ASAP, dig in with "SAP NetWeaver For Dummies" and explore: MySAP Business SuiteSAP Enterprise Planning Resource (ERP), Customer Relationship Management (CRM), Supply Chain Management (SCM), Human Capital Management (HCM), Product Lifecycle Management (PLM), Supplier Relationship Management (SRM), and moreMobile Infrastructure that performs like a universal translator for mobile interfaces, including laptops, wireless phones, and PDAsMaster Data Management, including using the content consolidation technique to "clean up" data, master data harmonization to distribute it, and central master data management to maintain a data repositoryWeb Application Service and NetWeaver Developer Studio--tools that let you integrate and create your own customized applications Written by Dan Woods, former CTO of The Street.com and CapitalThinking, and Jeffrey Word, the Director of Technology Strategy for SAP, this guide features real-life stories from businesses and examples of typical uses to help you cut through the complexities and get up and running. It includes a CD-ROM with: Detailed white papers and product overviewsStores from customers using SAP NetWeaver todayDemos that show SAP NetWeaver in actionA directory of resources for additional information Like that interstate system, SAP NetWeaver doesn't have to be integrated all at once. You choose the applications that have the most potential to benefit your company's operations and bottom line. "SAP NetWeaver For Dummies" even gives you recommendations for rolling it out and suggests practical ways to get started and get quick returns on your SAP investment. Then you're going full-speed ahead on the road to success
Waste no time with the unimportant odds and ends of Lotus Notes -- start completing your tasks right away. From using super-fast Notes-enhanced information searches to organizing your calendar, this superb, bite-sized reference, Lotus Notes R5 For Dummies Quick Reference, gives you the information you need in order to use all the important features of Lotus Notes R5. E-mail, calendars, databases, and more all are at your disposal, and all these can be stress free after you flip through this handy guide. Take advantage of this product's new-and-improved, user-friendly interface and discover its easy compatibility with Windows 98 and NT. Find out about your options for using Notes on-site or on the go. All this information (and more) is at your fingertips in Lotus Notes R5 For Dummies Quick Reference and can easily be accessed thanks to this book's lay-flat binding.
SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G's openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments. This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. You'll find all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge "quantum proofing." Throughout, practical examples and real-life scenarios help you apply Nair's insights---whether you're a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment. Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience---from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams. Explore new 5G security challenges---and why you still need external controls, even with recent 3GPP improvements Implement network component security controls for RAN, Transport, 5GC, and devices Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT Protect Public and Non-Public Networks (Private 5G) deployment scenarios Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases Optimize end-to-end 5G security architecture across all 5G domains based on zero trust Prioritize 5G security investments in service provider or enterprise environments Preview emerging 5G use cases and ML/AI-based security enhancements
|
You may like...
Designing and Developing Secure Azure…
Michael Howard, Simone Curzi, …
Paperback
R827
Discovery Miles 8 270
Creating Web Portals with BEA WebLogic
Rob Castle, Howard Block, …
Paperback
Enterprise Level Security 2 - Advanced…
Kevin E. Foltz, William R. Simpson, …
Paperback
R1,397
Discovery Miles 13 970
Right Way to Select Technology - Get the…
Tony Byrne, Jarrod Gingras
Paperback
R1,268
Discovery Miles 12 680
|