Put your phone system on your computer network and see the savings See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "e;voice over Internet protocol,"e; but it could spell "e;saving big bucks"e; for your business!
A step-by-step guide to managing critical technologies of today's converged services IP networks Effective IP Address Management (IPAM) has become crucial to maintaining high-performing IP services such as data, video, and voice over IP.
The official study guide for the Certified Wireless Analysis Professional certification from CWNP Four leading wireless experts thoroughly prepare you for the vendor-neutral CWAP exam administered by CWNP, the industry leader for enterprise Wi-Fi training and certification.
The official study guide for the Certified Wireless Analysis Professional certification from CWNP Four leading wireless experts thoroughly prepare you for the vendor-neutral CWAP exam administered by CWNP, the industry leader for enterprise Wi-Fi training and certification.
Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratchPurchase of the print or Kindle book includes a free eBook in PDF format.
Build robust, production-ready microservices in gRPC Go to enhance the scalability and efficiency of your APIs in real-world applicationsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDiscover essential guidelines to steer clear of pitfalls when designing and evolving your gRPC servicesDevelop your understanding of advanced gRPC concepts such as authentication and securityPut your knowledge into action as you build, test, and deploy a TODO list microserviceBook DescriptionIn recent years, the popularity of microservice architecture has surged, bringing forth a new set of requirements.
Build robust, production-ready microservices in gRPC Go to enhance the scalability and efficiency of your APIs in real-world applicationsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDiscover essential guidelines to steer clear of pitfalls when designing and evolving your gRPC servicesDevelop your understanding of advanced gRPC concepts such as authentication and securityPut your knowledge into action as you build, test, and deploy a TODO list microserviceBook DescriptionIn recent years, the popularity of microservice architecture has surged, bringing forth a new set of requirements.
The Illustrated Network: How TCP/IP Works in a Modern Network, Second Edition presents an illustrated explanation on how TCP/IP works, using consistent examples from a working network configuration that includes servers, routers and workstations.
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.
Your essential guide to deploying IPv6 on Windows networks Get in-depth technical information to put IPv6 technology to work-including networks with hardware running Windows 8 and Windows Server 2012.
Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers.
LPI Linux Certification in a Nutshell,Second Edition is an invaluable resource for determining what you needto practice to pass the Linux Professional Institute exams.
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience.
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet.
Written by a leading developer and maintainer of the Linux kernel,Linux Kernel in a Nutshell is a comprehensiveoverview of kernel configuration and building, a critical task forLinux users and administrators.
DNS and BIND tells you everything you need to work with one of the Internet's fundamental building blocks: the distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard.
The Juniper Networks routing platforms are becoming the go-to solution for core, edge, metro and remote office networks, and JUNOS software is behind it all.
The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry.
Simple Network Management Protocol (SNMP) provides a "e;simple"e; set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more.
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991.
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly.
This unique book offers a vendor-neutral approach for designing large local area networks according to business or organizational needs, rather than from a product perspective.
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing environments.
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared!
Reliable, flexible, and configurable enough to solve the mail routing needs of any web site, sendmail has withstood the test of time, but has become no less daunting in its complexity.
Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more.
The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry.
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.