Configuring Windows Server 2008 Network Infrastructure – MCTS Self-Paced Training Kit (Exam 70-642)
فهرست مطالب:
Chapter 1: Understanding and Configuring TCP/IP
Chapter 2: Configuring Name Resolution
Chapter 3: Configuring a DNS Zone Infrastructure
Chapter 4: Creating a DHCP Infrastructure
Chapter 5: Configuring IP Routing
Chapter 6: Protecting Network Traffic with IPsec
Chapter 7: Connecting to Networks
Chapter 8: Configuring Windows Firewall and Network Access Protection
Chapter 9: Managing Software Updates
Chapter 10: Monitoring Computers
Chapter 11: Managing Files
Chapter 12: Managing Printers
Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)
فهرست مطالب:
Part One: Background
Part Two: Symmetric Ciphers
Part Three: Asymmetric Ciphers
Part Four: Cryptographic Data Integrity Algorithms
Part Five: Mutual Trust
Part Six: Network and Internet Security
CWNA Certified Wireless Network Administrator Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1 Overview of Wireless Standards and Organizations
Chapter 2 Radio Frequency Fundamentals
Chapter 3 Radio Frequency Components, Measurements, and Mathematics
Chapter 4 Radio Frequency Signal and Antenna Concepts
Chapter 5 IEEE 802.11 Standards
Chapter 6 Wireless Networks and Spread Spectrum Technologies
Chapter 7 Wireless LAN Topologies
Chapter 8 802.11 Medium Access
Chapter 9 802.11 MAC Architecture
Chapter 10 Wireless Devices
Chapter 11 Network Design, Implementation, and Management
Chapter 12 WLAN Troubleshooting
Chapter 13 802.11 Network Security Architecture
Chapter 14 Wireless Attacks, Intrusion Monitoring, and Policy
Chapter 15 Radio Frequency Site Survey Fundamentals
Chapter 16 Site Survey Systems and Devices
Glossary
Index
Data Center Virtualization Fundamentals
فهرست مطالب:
Introduction
Part I: What Is Virtualization?
Part II: Virtualization in Network Technologies
Part III: Virtualization in Storage Technologies
Part IV: Virtualization in Server Technologies
Part V: End-to-End Virtualization
Part VI: Appendixes
Deploying Juniper Data Centers with EVPN VXLAN
فهرست مطالب:
Contents
1 Introducing the Juniper Ecosystem
2 Overview of Data Center Architecture
3 BGP for the Data Center
4 VXLAN as a Network Virtualization Overlay
5 Bridged Overlay in an EVPN VXLAN Fabric
6 MAC-VRFs
7 Centrally Routed Bridging
8 Edge-Routed Bridging
9 Routed Overlay and Host-Routed Bridging
10 DHCP in EVPN VXLAN Fabrics
11 Data Center Interconnect
12 Building Data Centers with Juniper Apstra, Part I—Apstra Foundation
13 Building Data Centers with Juniper Apstra, Part II—Advanced Apstra Deployments
14 Building Virtual Fabrics with vJunos, Containerlab, and Juniper Apstra
15 Large-Scale Fabrics, Inter-VRF Routing, and Security Policies in Apstra
Acronym Legend
Designing Real-World Multi-domain Networks
فهرست مطالب:
Part 1 – Introduction
1 Multi-Domain Networks
Part 2 – Multi-Domain Design
2 SD-Access and Campus Fabric
3 SD-WAN and DMVPN
4 Application Centric Infrastructure (ACI) – Integration and MultiDomain Capabilities
5 Enterprise MPLS
6 Carrier Neutral Facilities (CNF)
7 Cloud Connectivity
8 Security
9 Automation
Part 3 – Real World Use Cases
10 Global Manufacturing Use Case with SDA, SDWAN and CNFs
11 Financial Industry with ACI, MPLS and Security
12 Retail Use Case with Cloud, SDWAN and SDA
13 Public Sector Use Case
14 Transportation Use Case
Detecting, Troubleshooting, and Preventing Congestion in Storage Networks
فهرست مطالب:
1 Introduction to Congestion in Storage Networks
2 Understanding Congestion in Fibre Channel Fabrics
3 Detecting Congestion in Fibre Channel Fabrics
4 Troubleshooting Congestion in Fibre Channel Fabrics
5 Solving Congestion by Storage I/O Performance Monitoring
6 Preventing Congestion in Fibre Channel Fabrics
7 Congestion Management in Ethernet Storage Networks
8 Congestion Management in TCP Storage Networks
9 Congestion Management in Cisco UCS Servers
DevOps with Windows Server 2016: Obtain Enterprise Agility and Continuous Delivery by Implementing DevOps with Windows Server 2016
فهرست مطالب:
Preface
Chapter 1: Introducing DevOps 9
Chapter 2: DevOps Tools and Technologies
Chapter 3: DevOps Automation Primer
Chapter 4: Nano, Containers, and Docker Primer
Chapter 5: Building a Sample Application
Chapter 6: Source Code Control
Chapter 7: Configuration Management
Chapter 8: Configuration Management and Operational Validation
Chapter 9: Continuous Integration
Chapter 10: Continuous Delivery and Deployment
Chapter 11: Monitoring and Measuring
Index
End-to-End Network Security: Defense-in-Depth
فهرست مطالب:
Introduction
Part I Introduction to Network Security Solutions
Part II Security Lifecycle: Frameworks and Methodologies
Part III Defense-In-Depth Applied
Part IV Case Studies
Index
Exam Ref 70-698: Installing and Configuring Windows 10
فهرست مطالب:
Introduction
CHAPTER 1 Prepare for installation requirements
CHAPTER 2 Install Windows 10
CHAPTER 3 Configure devices and device drivers
CHAPTER 4 Post-installation configuration
CHAPTER 5 Implement Windows in an enterprise environment
CHAPTER 6 Configure networking
CHAPTER 7 Configure storage
CHAPTER 8 Configure data access and usage
CHAPTER 9 Implement Apps
CHAPTER 10 Configure remote management
CHAPTER 11 Configure updates
CHAPTER 12 Monitor Windows
CHAPTER 13 Configure system and data recovery
CHAPTER 14 Configure authorization and authentication
CHAPTER 15 Configure advanced management tools
Index
GNS3 Network Simulation Guide
فهرست مطالب:
Preface
Clearing the First Hurdle
Creating your First GNS3 Simulation
Enhancing GNS3
Unleashing Other Emulators
The Cisco Connection
Peeking under the GNS3 Hood
Tips for Teachers, Troubleshooters, and Team Leaders
Index