Avoid MFA pitfalls-learn how to choose, implement, and troubleshoot MFA in your companyKey FeaturesGain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domainThwart authentication breaches using pragmatic strategies and lessons derived from real-world scenariosChoose the right MFA solutions to enhance your organization's securityBook DescriptionMFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity.
Among the many configuration management tools available, Ansible has some distinct advantagesits minimal in nature, you dont need to install anything on your nodes, and it has an easy learning curve.
Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology.
Become well-versed with basic networking concepts such as routing, switching, and subnetting, and prepare for the Microsoft 98-366 examKey FeaturesBuild a strong foundation in networking conceptsExplore both the hardware and software aspects of networkingPrepare by taking mock tests with up-to-date exam questionsBook DescriptionA network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data.
The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science.
The definitive guide to troubleshooting today's complex BGP networks This is today's best single source for the techniques you need to troubleshoot BGP issues in modern Cisco IOS, IOS XR, and NxOS environments.
From smart sensors to cloud integration and the world of TinyML, this book is your comprehensive guide to the IoT ecosystem, using the ESP32 and industry-standard tools and technologiesKey FeaturesBuild IoT projects from scratch using ESP32Customize solutions, take them to cloud, visualize real-time data, implement security featuresPractice using a variety of hands-on projects such as an audio player, smart home, and moreBook DescriptionESP32, a low-cost and energy-efficient system-on-a-chip microcontroller, has become the backbone of numerous WiFi devices, fueling IoT innovation.
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991.
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world.
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet.
Key FeaturesExplore the power of Python libraries to tackle difficult network problems efficiently and effectivelyUse Python for network device automation, DevOps, and software-defined networkingBecome an expert in implementing advanced network-related tasks with PythonBook DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced.
Understand the nitty-gritty of Cybersecurity with easeKey FeaturesAlign your security knowledge with industry leading concepts and toolsAcquire required skills and certifications to survive the ever changing market needsLearn from industry experts to analyse, implement, and maintain a robust environmentBook DescriptionIt's not a secret that there is a huge talent gap in the cybersecurity industry.
The current diversity of transport services, as well as the complexity resulting from the deployment of specific transport protocols or mechanisms over the different services provided by heterogeneous networks, demand a novel design of the transport layer.
Provides options for implementing IPv6 and IPv6 multicast in service provider networks New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm.
State-of-the-art SIP primerSIP (Session Initiation Protocol) is the open standard that will make IP telephony an irresistible force in communications, doing for converged services what http does for the Web.
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfullyConduct a digital forensic examination and document the digital evidence collectedPerform a variety of Windows forensic investigations to analyze and overcome complex challengesBook DescriptionA computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation.
Simple Network Management Protocol (SNMP) provides a "e;simple"e; set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more.
IP Multicast Volume I: Cisco IP Multicast Networking Design, deploy, and operate modern Cisco IP multicast networks IP Multicast, Volume I thoroughly covers basic IP multicast principles and routing techniques for building and operating enterprise and service provider networks to support applications ranging from videoconferencing to data replication.
Understand the world of modern network automation with Go and deepen your knowledge with insights from 10+ experts who have real-world hands-on experience with network automation and/or are using Go for network-related tasksKey FeaturesA comprehensive guide to the world of modern network automationUse Go to build anything from repetitive task automation to complex distributed systemsOver 30 practical, ready-to-use sample programsBook DescriptionGo's built-in first-class concurrency mechanisms make it an ideal choice for long-lived low-bandwidth I/O operations, which are typical requirements of network automation and network operations applications.
Discover how different QRadar components fit together and explore its features and implementations based on your platform and environmentPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGet to grips with QRadar architecture, components, features, and deploymentsUtilize IBM QRadar SIEM to respond to network threats in real timeLearn how to integrate AI into threat management by using QRadar with WatsonBook DescriptionThis comprehensive guide to QRadar will help you build an efficient security operations center (SOC) for threat hunting and need-to-know software updates, as well as understand compliance and reporting and how IBM QRadar stores network data in real time.
Build robust, production-ready microservices in gRPC Go to enhance the scalability and efficiency of your APIs in real-world applicationsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDiscover essential guidelines to steer clear of pitfalls when designing and evolving your gRPC servicesDevelop your understanding of advanced gRPC concepts such as authentication and securityPut your knowledge into action as you build, test, and deploy a TODO list microserviceBook DescriptionIn recent years, the popularity of microservice architecture has surged, bringing forth a new set of requirements.
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet.
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world.
This practical, systems architecture-founded approach to the cryptographic and protocol-based tools for Internet security is ideal for students and practitioners.
Put your phone system on your computer network and see the savings See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "e;voice over Internet protocol,"e; but it could spell "e;saving big bucks"e; for your business!
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Develop technical skills and expertise to automate AWS networking tasksKey FeaturesA fast paced guide that will help you pass the exam with confidenceLearn advanced skill sets to build effective AWS networking solutions Enhance your AWS skills with practice exercises and mock testsBook DescriptionAmazon has recently come up a with specialty certifications which validates a particular user's expertise that he/she would want to build a career in.
A step-by-step guide to managing critical technologies of today's converged services IP networks Effective IP Address Management (IPAM) has become crucial to maintaining high-performing IP services such as data, video, and voice over IP.
Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments.
If your organization is gearing up for IPv6, this in-depth book provides the practical information and guidance you need to plan for, design, and implement this vastly improved protocol.
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991.