|
Showing 1 - 25 of
30 matches in All Departments
LEGO MINDSTORMS lets you design and program robots that can do just
about anything
The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS
users, that lets users design and program working robots - limited
only by their imagination. Initially designed for users 12 and up,
LEGO MINDSTORMS has taken off with LEGO enthusiasts of all ages.
10 Cool LEGO MINDSTORMS RIS 2.0 Projects: Amazing Projects You Can
Build in Under an Hour provides step-by-step instructions and
detailed illustrations for users of all skill levels and
proficiencies.
From out of the box to up and running in less than an hour.
8-page color insert. A color insert illustrates the complete
projects in full-detail.
Specifically targeted at new users of the LEGO MINDSTORMS RIS 2.0.
A firewall is as good as its policies and the security of its VPN
connections. The latest generation of firewalls offers a dizzying
array of powerful options; they key to success is to write concise
policies that provide the appropriate level of access while
maximizing security.
This book covers the leading firewall products: Cisco PIX, Check
Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and
SonicWall. It describes in plain English what features can be
controlled by a policy, and walks the reader through the steps for
writing the policy to fit the objective. Because of their
vulnerability and their complexity, VPN policies are covered in
more depth with numerous tips for troubleshooting remote
connections.
. The only book that focuses on creating policies that apply to
multiple products.
. Included is a bonus chapter on using Ethereal, the most popular
protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you
through the steps for writing the policy to fit the objective at
hand"
This book focuses on Check Point NG FP 4. FP 4, offers security
professionals an astounding array of products that upgrade and
enhance the security and communication features of Check Point NG.
Like Check Point NG Security Administration, this book provides
readers with the perfect balance of the theories and concepts
behind internet security, and the practical applications of Check
Point NG FP 4. Readers can learn how to use all of these products
to create a secure network with virtual private networking
features. Security professionals will buy, read, and keep this book
because it will cover all features of Check Point NG FP 4 like no
other book will.
- Covers all products, upgrades, and enhancements contained in FP 4
including: SMART, SecurePlatform, SecureXL, ClusterXL, and
Performance Pack
- Covers all objectives on Check Point's CCSA exam, and readers
will be able to download a free exam simulator from syngress.com.
- Check Point continues to dominate the Firewall space owning over
65% of the worldwide Firewall market. Syngress' book on the first
version of Check Point NG continues to be the market leading Check
Point book.
The National Security Agency's INFOSEC Assessment Methodology (IAM)
provides guidelines for performing an analysis of how information
is handled within an organization: looking at the systems that
store, transfer, and process information. It also analyzes the
impact to an organization if there is a loss of integrity,
confidentiality, or availability. This book shows how to do a
complete security assessment based on the NSA's guidelines.
This book also focuses on providing a detailed organizational
information technology security assessment using case studies. The
Methodology used for the assessment is based on the National
Security Agency's (NSA) INFOSEC Assessment Methodology (IAM).
Examples will be given dealing with issues related to military
organizations, medical issues, critical infrastructure (power
generation etc).
The book is intended to provide an educational and entertaining
analysis of an organization, showing the steps of the assessment
and the challenges faced during an assessment. It will also provide
examples, sample templates, and sample deliverables that readers
can take with them to help them be better prepared and make the
methodology easier to implement.
- Everything You Need to Know to Conduct a Security Audit of Your
Organization
- Step-by-Step Instructions for Implementing the National Security
Agency's Guidelines
- Special Case Studies Provide Examples in Healthcare, Education,
Infrastructure, and more
Cisco Systems, Inc. is the worldwide leader in networking for the
Internet, and its Intrusion Detection Systems line of products is
making in roads in the IDS market segment, with major upgrades
having happened in February of 2003. Cisco Security Professional's
Guide to Secure Intrusion Detection Systems is a comprehensive,
up-to-date guide to the hardware and software that comprise the
Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion
Detection Systems does more than show network engineers how to set
up and manage this line of best selling products ... it walks them
step by step through all the objectives of the Cisco Secure
Intrusion Detection System course (and corresponding exam) that
network engineers must pass on their way to achieving sought-after
CCSP certification.
This book introduces readers to mpls concepts, installation,
migration, operation, inspection, and troubleshooting.
It discusses specific router and switch platforms and includes such
topics as frame-mode mpls, cell-mode mpls, label distribution
protocol, tag distribution protocol, label distribution protocol
migration, mpls configuration, traffic engineering, mpls vpns, mpls
vpn deployment models, mpls vpn routing protocol support,
multi-protocol bgp, mpls vpn configurations, mpls vpn integration,
and mpls vpn management.
Readers will find complete ready-to-use configurations for
routers
Shows how to implement MPLS traffic engineering on a core network
and optimize traffic
Great for users studying for Cisco's Implementing Cisco MPLS exam,
640-910 and written by a Cisco internetworking expert who knows
everything about MPLS.
Includes coverage of Cisco Systems' newly released (October 7,
2002) Multiprotocol Label Switching (MPLS) Bandwidth Protection
software package. The new architecture uses MPLS Traffic
Engineering Fast Reroute and an offline application called Tunnel
Builder Pro to increase resiliency at a network-wide level.
Includes updated coverage of MPLS and GMPLS
The Best Damn Cisco Internetworking Book Period shows readers
everything they need to know about all Cisco internetworking
topics. The book provides an understanding of Cisco's current VoIP
solutions and the means to put them to work, showing how to
configure all of Cisco's core VoIP products among them Cisco
CallManager software, Cisco 7910 series phones, and server-based IP
PBXs. It discusses IPv6 Protocols, as well as IP Quality of Service
(QoS) and how it applies to Enterprise and Internet Service
Provider (ISP) environments.
In addition, Cisco wireless technologies are covered in detail.
Cisco has placed a high priority on security and here readers will
find complete coverage of all the Cisco Security products such as
the PIX firewall suite of products, Network Address Translation
(NAT), Cisco VPN Concentrator and IPSec, Cisco Authentication,
Authorization, and Accounting (AAA), Content Services Switch (CSS),
and the Cisco Secure Network Intrusion Detection System.
This book is sure to become a dog eared reference for all Cisco
engineers and administrators.
- The one book that covers all major Cisco Internetworking concepts
and configurations.
- The only book to cross reference Cisco internetworking topics:
Voice Over IP, Remote Access, Wireless, AVVID, and QoS. In
addition, new technologies are covered in depth: AVVID, SIP, MGCP,
and more.
- A 1-stop reference for Cisco professionals needing coverage of
core Cisco exam topics."
This is the only book that will teach system administrators how to
configure, deploy, and troubleshoot Symantec Enterprise Edition in
an enterprise network. The book will reflect Symantec's philosophy
of "Centralized Antivirus Management." For the same reasons that
Symantec bundled together these previously separate products, the
book will provide system administrators with a holistic approach to
defending their networks from malicious viruses. This book will
also serve as a Study Guide for those pursuing Symantec Product
Specialist Certifications.
Configuring Symantec AntiVirus Enterprise Edition contains
step-by-step instructions on how to Design, implement and leverage
the Symantec Suite of products in the enterprise.
OFirst book published on market leading product and fast-growing
certification. Despite the popularity of Symantec's products and
Symantec Product Specialist certifications, there are no other
books published or announced.
OLess expensive substitute for costly on-sight training. Symantec
offers week-long courses on this same product for approximately
$2,500. This book covers essentially the same content at a fraction
of the price, and will be an attractive alternative for network
engineers and administrators.
OFree practice exam from [email protected]. Syngress will
offer a free Symantec Product Specialist Certification practice
exam from syngress.com. Comparable exams are priced from $39.95 to
$59.95.
"Stealing the Network: How to Own the Box" is NOT intended to be a
"install, configure, update, troubleshoot, and defend book." It is
also NOT another one of the countless Hacker books out there. So,
what IS it? It is an edgy, provocative, attack-oriented series of
chapters written in a first hand, conversational style.
World-renowned network security personalities present a series of
25 to 30 page chapters written from the point of an attacker who is
gaining access to a particular system. This book portrays the
"street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success
of Steal this Computer Book with first hand, eyewitness
accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats," "Black Hats"
and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious
network intrusions
Cisco Security Specialist's Guide to PIX Firewall immerses the
reader in the highly complicated subject of firewall
implementation, deployment, configuration, and administration. This
guide will instruct the reader on the necessary information to pass
the CSPFA exam including protocols, hardware, software,
troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the
basic concepts of attack, explains the networking principals
necessary to effectively implement and deploy a PIX firewall,
covers the hardware and software components of the device, provides
multiple configurations and administration examples, and fully
describes the unique line syntax native to PIX firewall
configuration and administration.
OCoverage of the Latest Versions of PIX Firewalls. This book
includes coverage of the latest additions to the PIX Firewall
family including the CiscoSecure PIX Firewall (PIX) Software
Release 6.0.
OMust-have desk reference for the serious security professional. In
addition to the foundation information and dedicated text focused
on the exam objectives for the CSPFA, this book offers real-world
administration and configuration support. This book will not only
help readers pass the exam; it will continue to assist them with
their duties on a daily basis.
OFirewall administration guides? Syngress wrote the book. Syngress
has demonstrated a proficiency to answer the market need for
quality information pertaining to firewall administration guides.
Configuring ISA Server 2000: Building Firewalls for Windows 2000
(ISBN: 1-928994-29-6) and Checkpoint Next Generation Security
Administration (ISBN: 1-928994-74-1) are currently best sellers in
the security market."
"By building IPv6 into Cisco IOS software, we are enabling
continued growth of the Internet and its expansion into new
applications and capabilities in a way that maintains compatibility
with existing Internet services." -- Stephen Deering, Cisco Fellow
and lead designer of the protocol
Internetworking Protocol (IP) addresses are the unique numeric
identifiers required of every device connected to the Internet. Two
years ago, in response to the exponential increase in demand for
new IP addresses, the Internet Engineering Task Force finalized its
revision on IP addressing, called IP Version 6 and key hardware
vendors such as Cisco and major Internet Service Providers like AOL
announced plans to migrate to IP Version 6. That is now happening.
Cisco Systems began incorporating Internet Protocol version 6
(IPv6) in its Cisco IOS Software in June, 2001. Cisco is currently
the only major networking vendor to deliver IPv6 across multiple
platforms.
This book provides complete coverage of IPv6 strategies,
configuration scenarios, and techniques to successfully deploy an
IPv6 addressing and subnetting scheme on your network. It also
covers:
Increasing the IP address size from 32 bits to 128 bits
Supporting more levels of addressing hierarchy
Supporting an increased number of addressable nodes
Supporting simpler auto-configuration of addresses
Improving the scalability of multicast routing by adding a "scope"
field to multicast addresses
Use a new "anycast address" to send a packet to any one of a group
of nodes
Prepare for the next generation of the internet with this in-depth,
developer's guide to the .Net framework that utilizes XML to
achieve greater flexibility of information and increased
interoperability.
Developing .Net Web Services with XML introduces readers to the
foundation for the .Net platform. The book covers the history,
applications and implementation of the Extensible Markup Language
within Microsoft's .NET framework. Readers will be given a thorough
introduction to .NET and its XML building blocks while acquiring a
firm grasp of how those blocks can be used to build any Web site or
service so that it will federate and collaborate seamlessly with
others
.Equips developers with the tool necessary to take advantage of the
next generation of the internet
.This book will provide web developers with a firm understanding of
XML, the building block of the .Net framework
.Includes practical, real-life applications using XML
.Unrivalled web based support: Readers can receive up-to-the minute
links, white papers and analysis for two years at
[email protected]."
An in-depth knowledge of how to configure Cisco IP network security
is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are
increasing in frequency and sophistication..."-Mike Fuhrman, Cisco
Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and
revised information covering many of Cisco's security products that
provide protection from threats, detection of network security
incidents, measurement of vulnerability and policy compliance and
management of security policy across an extended organization.
These are the tools that network administrators have to mount
defenses against threats. Chapters also cover the improved
functionality and ease of the Cisco Secure Policy Manger software
used by thousands of small-to-midsized businesses and a special
section on the Cisco Aironet Wireless Security Solutions.
Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco
including: 500 series of Cisco PIX Firewall, Cisco Intrusion
Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified
Internetwork Professional) students
Expanded to include separate chapters on each of the security
products offered by Cisco Systems
The only way to stop a hacker is to think like one
ColdFusion is a Web application development tool that allows
programmers to quickly build robust applications using server-side
markup language. It is incredibly popular and has both an
established user base and a quickly growing number of new
adoptions. It has become the development environment of choice for
e-commerce sites and content sites where databases and transactions
are the most vulnerable and where security is of the utmost
importance.
Several security concerns exist for ColdFusion due to its unique
approach of designing pages using dynamic-page templates rather
than static HTML documents. Because ColdFusion does not require
that developers have expertise in Visual Basic, Java and C++; Web
applications created using ColdFusion Markup language are
vulnerable to a variety of security breaches.
Hack Proofing ColdFusion 5.0 is the seventh edition in the popular
Hack Proofing series and provides developers with step-by-step
instructions for developing secure web applications.
.Teaches strategy and techniques: Using forensics-based analysis
this book gives the reader insight to the mind of a hacker
.Interest in topic continues to grow: Network architects, engineers
and administrators are scrambling for security books to help them
protect their new networks and applications powered by
ColdFusion
.Unrivalled Web-based support: Up-to-the minute links, white papers
and analysis for two years at [email protected]"
An expert guide to Ruby, a popular new Object-Oriented Programming
Language
Ruby is quickly becoming a favourite among developers who need a
simple, straight forward, portable programming language. Ruby is
ideal for quick and easy object-oriented programming such as
processing text files or performing system management. Having been
compared with other programming languages such as Perl, Python,
PCL, Java, Eiffel, and C++; Ruby is popular because of its straight
forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby
Developer's Guide is designed for programmers and developer's
looking to embrace the object-oriented features and functionality
of this robust programming language. Readers will learn how to
develop, implement, organize and deploy applications using Ruby.
Ruby is currently experiencing a rapid rise in popularity in the
object-oriented programming community
Readers receive up-to-the minute links, white papers, and analysis
for two years at [email protected]
Comes with a wallet-sized CD containing a printable HTML version of
the book, all of the source code examples and demos of popular Ruby
third-party programming tools and applications
Unparalleled security management that IT professionals have been
waiting for.
Check Point Software Technologies is the worldwide leader in
securing the Internet. The company's Secure Virtual Network (SVN)
architecture provides the infrastructure that enables secure and
reliable Internet communications. CheckPoint recently announced a
ground-breaking user interface that meets the computer industry's
Internet security requirements. The Next Generation User Interface
is easy to use and offers unparalleled security management
capabilities by creating a visual picture of security
operations.
CheckPoint Next Generation Security Administration will be a
comprehensive reference to CheckPoint's newest suite of products
and will contain coverage of: Next Generation User Interface, Next
Generation Management, Next Generation Performance, Next Generation
VPN Clients, and Next Generation Systems.
CheckPoint are a company to watch, they have captured over 50% of
the VPN market and over 40% of the firewall market according to IDC
Research
Over 29,000 IT professionals are CheckPont Certified
This is the first book to covers all components of CheckPoint's new
suite of market-leading security products - it will be in demand
Understand NGX R65 Operational Changes:
SVN Architecture, New VPN-1 Features, Additional Features, VPN-1
Power VSX
Deploy SmartClients and SmartManagement:
SmartDashboard, SmartMap, SmartView Tracker, SmartView Monitor,
SmartUpdate, SmartLSM, Secure Client Packaging Tool, Management
Plug-Ins, Check Point Configuration/cpconfig
Drive the Management Portal:
A Tour of the Dashboard, What s New in SmartDashboard NGX, Your
First Security Policy, Other Useful Controls on the Dashboard,
Managing Connectra and Interspect Gateways, Smart Portal
Master Advanced Authentication:
Authentication Overview, Users and Administrators, SmartDirectory,
User Authentication, Session Authentication, Client
Authentication
Use Advanced VPN Concepts for Tunnel Monitoring:
Encryption Overview, VPN Communities, Policy-Based VPN, Route-Based
VPN
Configure Advanced VPN Client Installations:
SecuRemote, Secure Client, Office Mode, Visitor Mode, Windows L2TP
Integration, SSL Network Extender, Backup Gateways, Multiple Entry
Point VPNs
Deploy and Configure SmartDefense:
Network Security, Application Intelligence, Web Intelligence
Get Inside Secure Platform:
Installation, Configuration, Secure Platform Shell, Secure
Shell
Learn Advanced Troubleshooting Techniques:
NGX Debugging, Packet Analysis, Log Troubleshooting, VPN Analysis,
VPN Client Analysis, ClusterXL Troubleshooting"
A new edition the most popular Hack Proofing book around
IT professionals who want to run secure networks, or build secure
software, need to know about the methods of hackers. The second
edition of the best seller Hack Proofing Your Network, teaches
about those topics, including:
.The Politics, Laws of Security, Classes of Attack, Methodology,
Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun,
Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes,
Trojans and Viruses, Reporting Security Problems, Choosing Secure
Systems
The central idea of this book is that it's better for you to find
the holes in your network than it is for someone else to find them,
someone that would use them against you. The complete,
authoritative guide to protecting your Windows 2000 Network.
Updated coverage of an international bestseller and series
flagship
Covers more methods of attack and hacker secrets
Interest in topic continues to grow - network architects, engineers
and administrators continue to scramble for security books
Written by the former security manager for Sybase and an expert
witness in the Kevin Mitnick trials
.A great addition to the bestselling "Hack Proofing..."
series
.Windows 2000 sales have surpassed those of Windows NT
.Critical topic. The security of an organization's data and
communications is crucial to its survival and these topics are
notoriously difficult to grasp
.Unrivalled web support at [email protected]"
The only way to stop a hacker is to think like one
Wireless technology is a new and rapidly growing field of
concentration for network engineers and administrators. Innovative
technology is now making the communication between computers a
cordless affair. Wireless devices and networks are vulnerable to
additional security risks because of their presence in the mobile
environment.
Hack Proofing Your Wireless Network is the only book written
specifically for architects, engineers, and administrators
responsible for securing their wireless networks. From making sense
of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC)
to the implementation of security policies, plans, and recovery
protocols, this book will help users secure their wireless network
before its security is compromised. The only way to stop a hacker
is to think like one...this book details the multiple ways a hacker
can attack a wireless network - and then provides users with the
knowledge they need to prevent said attacks.
Uses forensic-based analysis to give the reader an insight into the
mind of a hacker
With the growth of wireless networks architects, engineers and
administrators will need this book
Up to the minute Web based support at [email protected]
"Bluetooth (enabled devices) will ship in the billions of units
once it gains momentum." - Martin Reynolds, Gartner Group
Bluetooth is the most exciting development in wireless computing
this decade Bluetooth enabled devices can include everything from
network servers, laptop computers and PDAs, to stereos and home
security systems. Most Bluetooth products to hit the market in 2001
will be PC cards for laptop computers and access points, which
allow up to seven Bluetooth devices to connect to a network.
Reports indicate that by the end of 2003 there will be over 2
billion Bluetooth-enabled devices.
Bluetooth-enabled devices communicate with each other through
embedded software applications. Bluetooth Developer's Guide to
Embedded Applications will provide embedded applications developers
with advanced tutorials and code listings written to the latest
Bluetooth's latest specification, version 1.1. Written by Bluetooth
pioneers from market leaders in Bluetooth software development,
Extended Systems and Cambridge Silicon Radio, this is the first
advanced level Bluetooth developer title on the market.
White Hot Topic .While other books introduce readers to the
possibilities of Bluetooth, this is the first comprehensive,
advanced level programming book written specifically for embedded
application developers
Authors are responsible for SDK, the market-leading development
tool for Bluetooth
Comes with Syngress' revolutionary Credit Card CD containing a
printable HTML version of the book, all of the source code and
sample applications from Extended Systems and Cambridge Silicon
Radio
Choosing the right mobile phone and service plan can be
overwhelming, particularly if you travel abroad - this truly
international guide is ideal for the mobile executive
Experts estimate that by 2005 there will be over 1.26 billion
wireless phone users around the world. (Source: Cellular
Telecommunications Industry Association). It's overwhelming to
think of the options available to the consumer when it comes to
buying mobile phones, phone accessories, and service plans. So many
people are confused by the myriad of wireless phone claims, the
endless advertised rates and the countless service plans with all
their options. The Consumer's Guide to Cell Phones is designed to
help consumers choose what program may best suit them. This book
helps streamline the wireless-buying process by providing a
complete listing of all wireless providers and the details of their
plans.
International listings cover USA, Africa, Asia-Pacific, Australia,
Europe, Latin America, and the Middle East. As an example, in
Ireland there is coverage of Digiphone and other plans, in
Australia of Telstra, in the UK Cellnet, Orange, etc.
The companion web site for the book includes a service provider
database
As the mobile market continues to grow more people are looking to
use their phone for fax, e-mail or mobile computing - this book has
the answers
Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a
solid guide to developing mobile applications using Microsoft
technologies. The focus of this book is on using ASP.NET and the
.NET mobile SDK. It provides an introduction to the .NET platform
and goes into moderate details on ASP.NET to allow readers to start
developing ASP.NET applications. In addition, this book will give
the readers the insight to use the various Microsoft technologies
for developing mobile applications.
This book assumes the readers have experience in developing web
applications and are familiar with any one of the server-side
technologies like ASP, JSP or PHP.
The first book available on Microsoft's cornerstone wireless
development tool
Best selling, high profile authors. Wei Meng Lee and Shelley Powers
are frequent speakers at all of the major developer conferences
have previously authored best selling books for O'Reilly &
Associates, Wrox Press, SAMS and Que
Comes with wallet-sized CD containing a printable HTML version of
the book, all of the source code examples and demos of popular ASP
.NET and .NET Mobile programming tools
Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for
Mobile Web developers
Microsoft's flagship ISA Server delivers the Internet to your
customers
As the demand for Internet connectivity reaches a fever pitch,
system administrators are being challenged to connect more and more
systems to the Internet without compromising security or network
performance. ISA Server 2000 provides system administrators with a
revolutionary management infrastructure that addresses the two
greatest needs of Enterprise-wide Internet connectivity: Security
and speed.
Written by best-selling author of several MCSE 2000 study guides,
this book will provide the system administrators with an in depth
understanding of all the critiacl features of Microsoft's flag ship
Internet Server. Configuring ISA Server 2000 shows network
administrators how to connect a network to the Internet, maintain
the connection, and troubleshoot remote users' hardware and
software configuration problems.
* Up-to-date coverage of new products specific to Windows
2000
* Shows network administrators how to supply e-mail whilst
maintaining network security
* Focuses on providing secure remote access to a network
The only way to stop a hacker is to think like one
Sun Microsystem's venerable and well-respected operating system
Solaris is currently in version 8, and runs on both Intel and Sun
Hardware. Solaris is one of the most comprehensive and popular UNIX
operating systems available. Hundreds of thousands of business
enterprises, both small and large, depend on Sun Solaris to keep
their business alive - but have they protected themselves against
hackers?
Hack Proofing Sun Solaris 8 is the latest addition to the popular
Hack Proofing series from Syngress Publishing. Providing hands-on
information written by both security professionals and
self-proclaimed hackers, this book will give system administrators
the edge they need to fortify their Sun Solaris operating system
against the never-ending threat of hackers.
The fifth title in the popular series that brought us the
bestseller Hack Proofing Your Network
Teaches strategy and techniques using forensic-based analysis
Up to the minute Web-based support with [email protected]
Business is on the move - mobile computing must keep up
Innovative technology is making the communication between computers
a cordless affair. Mobile computing with laptops, hand helds and
mobile phones is increasing the demand for reliable and secure
wireless networks. Network engineers and consultants need to create
and build cutting-edge wireless networks in both the small business
and multi-million dollar corporations.
Designing Wireless Networks provides the necessary information on
how to design and implement a wireless network. Beginning with
detailed descriptions of the various implementations and
architectures of wireless technologies and moving to the
step-by-step instructions on how to install and deploy a fixed
wireless network; this book will teach users with no previous
wireless networking experience how to design and build their own
wireless network based on the best practices of the Enhanced
Services from Lucent Technologies.
* Timely coverage of new technologies: Communication without cables
is the future of netwoking
* Advocates wireless networking solutions for any user, regardless
of location, device or connection.
* Written by Experts. The authors are leading WAN authorities at
Lucent Technologies.
* No previous wireless experience is assumed, however, readers
should have a basic understanding of networking and TCP/IP
protocols
Updated coverage of the most confusing Windows 2000 component in
this new edition of a Syngress bestseller.
Active Directory Services dramatically changes the way IT
professionals design, plan, configure and administer their Windows
NT networks. The primary benefits of Active Directory Services are
its extensibility, scalability, and ease of management as compared
to prior generations of Windows NT. Systems Engineers will probably
spend much of their time over the next several years planning for
and deploying Active Directory Services in many different
environments. Windows 2000 Active Directory, Second Edition gives
IT professionals a head start; it provides updated coverage of
everything they will need to succeed.
Many Windows 2000 administrators are struggling with Active
Directory and need a comprehensive book on the subject
The first completely updated book on Active Directory to hit the
market
|
You may like...
The Survivors
Jane Harper
Paperback
R441
R365
Discovery Miles 3 650
|