Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information.
The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats.
Microsoft Hybrid Cloud Unleashed brings together comprehensive and practical insights into hybrid cloud technologies, complete CloudOps and DevOps implementation strategies, and detailed guidance for deploying Microsoft Azure Stack in your environment.
Designing Networks and Services for the Cloud Delivering business-grade cloud applications and services A rapid, easy-to-understand approach to delivering a secure, resilient, easy-to-manage, SLA-driven cloud experience Designing Networks and Services for the Cloud helps you understand the design and architecture of networks and network services that enable the delivery of business-grade cloud services.
Using the open source Asterisk platform, you can deploy a state-of-the-art VoIP PBX on a low-cost PC or server for a fraction of the cost of conventional PBX systems.
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers.
Assess and improve your networking skillset with proven Sybex practice tests In the freshly revised Second Edition of CompTIA Network+ Practice Tests Exam N10-008, IT expert and author Craig Zacker delivers a set of accessible and useful practice tests for the updated Network+ Exam N10-008.
The complete guide to Cisco(R) Intercloud: use cases, planning, and deployment Using Cisco Intercloud technologies, you can seamlessly integrate private, hybrid, and public clouds-securely providing the right resources at will, with consistent control.
Prepare for Microsoft Exam 70-342--and demonstrate your real-world mastery of advanced Microsoft Exchange Server 2013 solution design, configuration, implementation, management, and support.
Manage all the mobile devices your workforce relies on Learn how to use Microsoft's breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android.
Sams Teach Yourself iCloud in 10 Minutes, Second Edition, offers straightforward, practical information designed to get you up and running quickly and easily.
Advanced real-world Cisco Application Centric Infrastructure (ACI) monitoring and troubleshooting Forewords written by Yusuf Bhaiji, Director of Certifications, Cisco Systems; and Ronak Desai, VP of Engineering for the Data Center Networking Business Unit, Cisco Systems.
Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today's challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career In today's dangerous world, failures in information security can be catastrophic.
Since Microsoft introduced System Center 2012 Configuration Manager, it has released two sets of important changes and improvements: Service Pack 1 and R2.
Prepare for the Network+ certification and a new career in network installation and administration In the newly revised Fifth Edition of CompTIA Network+ Study Guide Exam N10-008, bestselling author and network expert Todd Lammle delivers thorough coverage of how to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols.
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco(R) firewall security solutions.
Master designing, developing, and operating secure infrastructures on Google cloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets.
As networks, devices, and systems continue to evolve, software engineers face the unique challenge of creating reliable distributed applications within frequently changing environments.
THE ONLY AUTHORITATIVE, COMPREHENSIVE GUIDE TO VSPHERE STORAGE IMPLEMENTATION AND MANAGEMENT Effective VMware virtualization storage planning and management has become crucial-but it can be extremely complex.
The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats.
Design and develop great solutions using SharePoint 2013 Develop your business collaboration solutions quickly and effectively with the rich set of tools, classes, libraries, and controls available in Microsoft SharePoint 2013.
"e;In this updated and expanded edition of her excellent telecommunications primer, Lili explains in just the right detail everything you need to know to become fluent in this most important and fascinating industry.
Using TRILL, FabricPath, and VXLAN Designing Massively Scalable Data Centers with Overlays TRILL, FabricPath, and VXLAN overlays help you distribute data traffic far more effectively, dramatically improving utilization in even the largest data center networks.
This hands-on guide steers you through how to navigate the home screen; launch, run, and switch between apps; use the magical Smart Cover to put to sleep and wake your iPad; change and lock screen orientation, adjust screen brightness; and conserve battery life.
With a focus on mailbox and high availability features, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment.