LPI Linux Certification in a Nutshell,Second Edition is an invaluable resource for determining what you needto practice to pass the Linux Professional Institute exams.
Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more.
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly.
This unique book offers a vendor-neutral approach for designing large local area networks according to business or organizational needs, rather than from a product perspective.
Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers.
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991.
Reliable, flexible, and configurable enough to solve the mail routing needs of any web site, sendmail has withstood the test of time, but has become no less daunting in its complexity.
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet.
This practical, systems architecture-founded approach to the cryptographic and protocol-based tools for Internet security is ideal for students and practitioners.
Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage-and what can be done to prevent this from happening Examines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets
Put your phone system on your computer network and see the savings See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "e;voice over Internet protocol,"e; but it could spell "e;saving big bucks"e; for your business!
Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly into the most important new area of ATM--IP switching, which allows communications companies to combine IP routing with ATM switching Offers the reader a clear understanding of the evolutionary trends in the development of ATM A Wiley-IEEE Press publication
All you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructure This book provides a comprehensive and practical overview of the technology behind Internet Telephony (IP), providing essential information to Network Engineers, Designers, and Managers who need to understand the protocols.
Create real-time, highly interactive apps quickly with the powerful XMPP protocol XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search.
Create real-time, highly interactive apps quickly with the powerful XMPP protocol XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search.
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.
An essential reference for deploying IPv6 in broadband networks With the exponential growth of the Internet and increasing number of end users, service providers are increasingly looking for ways to expand their networks to meet the scalability requirements of the growing number of Internet-ready appliances or "e;always-on"e; devices.
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation.
A comprehensive reference on understanding, designing, and implementing IP Mobility This authoritative reference provides readers with a thorough understanding of IP Mobility using Mobile IPv6 and companion advanced mobility protocols including network mobility and fast handovers.
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.
TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite.
New edition of the bestselling guide to mastering Python Networking, updated to Python 3 and including the latest on network data analysis, Cloud Networking, Ansible 2.
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security techniques with the help of hands-on labsMaster the art of securing a Linux environment with this end-to-end practical guideBook DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades.