|
Showing 1 - 4 of
4 matches in All Departments
This easy-to-follow text/reference presents a practical guide to
the configuration of Cisco routers, from tasks for beginners to
advanced operations. The work starts with the simple step-by-step
task of connecting the router and performing basic configuration,
before building up to complex and sensitive operations such as
router IOS upgrade and Site-to-Site VPNs. This updated and expanded
new edition has been enhanced with a more detailed treatment of
each topic, supported by a set of training scenarios. Features:
discusses basic configuration, domestic duties, standard and
advanced routing, WAN technologies, security, router management,
remote connectivity, and practical tips; explains in detail the
steps required to configure different protocols on Cisco routers;
includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and
timed-access lists, and configuration steps for IPv6 (NEW);
provides an extensive selection of training scenarios, designed to
offer hands-on practice in the relevant tasks (NEW).
This easy-to-follow text/reference presents a practical guide to
the configuration of Cisco routers, from tasks for beginners to
advanced operations. The work starts with the simple step-by-step
task of connecting the router and performing basic configuration,
before building up to complex and sensitive operations such as
router IOS upgrade and Site-to-Site VPNs. This updated and expanded
new edition has been enhanced with a more detailed treatment of
each topic, supported by a set of training scenarios. Features:
discusses basic configuration, domestic duties, standard and
advanced routing, WAN technologies, security, router management,
remote connectivity, and practical tips; explains in detail the
steps required to configure different protocols on Cisco routers;
includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and
timed-access lists, and configuration steps for IPv6 (NEW);
provides an extensive selection of training scenarios, designed to
offer hands-on practice in the relevant tasks (NEW).
This book offers a thorough yet easy-to-read reference guide to
various aspects of cloud computing security. It begins with an
introduction to the general concepts of cloud computing, followed
by a discussion of security aspects that examines how cloud
security differs from conventional information security and reviews
cloud-specific classes of threats and attacks. A range of varying
threats in cloud computing are covered, from threats of data loss
and data breaches, to threats to availability and threats posed by
malicious insiders. Further, the book discusses attacks launched on
different levels, including attacks on the hypervisor, and on the
confidentiality of data. Newer types, such as side-channel attacks
and resource-freeing attacks, are also described. The work closes
by providing a set of general security recommendations for the
cloud.
This work opens with an accessible introduction to computer
networks, providing general definitions of commonly used terms in
networking. This is followed by a detailed description of the OSI
model, including the concepts of connection-oriented and
connectionless communications. The text carefully elaborates the
specific functions of each layer, along with what is expected of
protocols operating at each layer. Next, the journey of a single
packet, from source to destination, is described in detail. The
final chapter is devoted to the TCP/IP model, beginning with a
discussion of IP protocols and the supporting ARP, RARP and In ARP
protocols. The work also discusses the TCP and UDP protocols
operating at the transport layer and the application layer
protocols HTTP, DNS, FTP, TFTP, SMTP, POP3 and Telnet. Important
facts and definitions are highlighted in gray boxes found
throughout the text.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
|