Monday, June 11, 2007

linux

  • Linux Admins Security Guide
  • Linux Security Howto: This book is designed to provide an overview of the steps needed to implement a secure environment on a Linux system and outlines some of the threats and how these weaknesses are exploited by some.
  • Linux Firewall Configuration, Packet Filtering & netfilter/iptables: This book was written as a guide through the setup process and to explain the iptables package. It includes information about the iptables and Netfilter functions in the new Linux 2.4.x kernels.
  • Linux Device Drivers, Third Edition - This is the web site for the Third Edition of Linux Device Drivers, by Jonathan Corbet, Alessandro Rubini, and Greg Kroah-Hartman. For the moment, only the finished PDF files are available; we do intend to make an HTML version and the DocBook source available as well. This book is available under the terms of the Creative Commons Attribution-ShareAlike 2.0 license. That means that you are free to download and redistribute it. The development of the book was made possible, however, by those who purchase a copy from O'Reilly or elsewhere.
  • GNU Bash Reference Manual - Bash is the shell, or command language interpreter, for the GNU operating system. The name is an acronym for the 'Bourne-Again SHell', a pun on Stephen Bourne, the author of the direct ancestor of the current Unix shell /bin/sh, which appeared in the Seventh Edition Bell Labs Research version of Unix.
  • Knowing Knoppix - a book for Knoppix beginners in PDF format
  • Linux Client Migration Cookbook - A Practical Planning and Implementation Guide for Migrating to Desktop Linux
  • Vi iMproved (VIM) - Vim is one of the most powerful text editors around. It is also extremely efficient, enabling the user to edit files with a minimum of key strokes. This power and functionality comes at a cost, however. When getting started, users face a steep learning curve.
  • Linux: Rute User's Tutorial and Exposition - Most IT books have to be rushed to keep up to date with the rapidly evolving trends in software. As technical books, they are usually of a low quality. Rute, on the other hand, was carefully mastered over three years to be a complete reference of Unix -- Unix itself has not changed fundamentally in many decades. The GNU project also tends toward enduring standards that evolve very slowly. On the other hand, there is much evolving with respect to RedHat, Debian, and Mandrake, so these peculiarities where written into the book as those distributions evolved. I believe there is here the best combination of reference and practical, current information. On another level, my working environment necessitated field experience that was ideal for a book like this. From rebuilding old 486 mail servers (while sitting on the floor in dusty filing rooms); to the creation of custom desktops and thin clients for word processing environments; to nation-wide WAN networks. My company's daring escapades tested human ingenuity and Linux dexterity in every conceivable environment. So quite simply, there is a lot more in Rute than you will find anywhere else.
  • The Book of Webmin - How I Learned to Stop Worrying and Love UNIX
  • Linux From Scratch - This book describes the process of creating a Linux system from scratch from an already installed Linux distribution, using nothing but the sources of software that are needed.
  • GNU Emacs manual - Emacs is the extensible, customizable, self-documenting real-time display editor. This Info file describes how to edit with Emacs and some of how to customize it.
  • Writing GNOME Applications - Programming with GNOME is no simple task for the uninitiated. GNOME is one of the larger desktop programming suites you'll find. It has taken two years and hundreds of programmers to become what it is now. GNOME covers a lot of ground and makes use of many, many supporting libraries. Despite its nec- essary complexity, however, GNOME is very well laid out. It makes sense when you see it as a whole. On a line-by-line basis the code is not arcane or obfuscated. It's actually well written and quite nicely formatted. There's just so much of it! This book will attempt to guide you through all the fundamental parts of GNOME, to explain how things work and why. Rather than taking you through an exhaustive listing of function calls and coding semantics, we'll concentrate on what makes GNOME tick. We'll certainly go into detail about the important function calls and how to use them, but you'll still want to keep the official GNOME and GTK+ documentation on hand. The official documents are free, just like the rest of GNOME, and should even be bundled with your GNOME distribution. When you finish with this book, you should have a very clear, intuitive understanding of the GNOME 1.2 framework. You'll be able to write a com- plete GNOME application, from front to back. If you run into problems, you'll know how to diagnose the problem and where to look for the answers. It's impossible to know absolutely everything, but this book should at least iden- tify everything you need to know.
  • KDE 2.0 Development - The K Desktop Environment (KDE) project is a worldwide collaboration of hundreds of software engineers and hobbyists who are working to create a free, modern desktop interface with a consistent graphical user interface (GUI) style across applications. The desktop is network transparent, meaning that remote and local files can all be viewed, edited, and managed in the same way; it has online hypertext help and features an integrated, full-featured Web browser. The purpose of this book is to teach you how to take advantage of all that the KDE libraries have to offer when you write your own applications.
  • GTK+/Gnome Application Development - GNOME application programming manual, available in book form and online.
  • GNU Autoconf, Automake and Libtool - free book on popular GNU tools
  • Advanced Linux Programming - If you are a developer for the GNU/Linux system, this book will help you to develop GNU/Linux software that works the way users expect it to, write more sophisticated programs with features such as multiprocessing, multi-threading, interprocess communication, and interaction with hardware devices, improve your programs by making them run faster, more reliably, and more securely, understand the preculiarities of a GNU/Linux system, including its limitations, special capabilities, and conventions.
  • Secure Programming for Linux and Unix - This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. Specific guidelines for C, C++, Java, Perl, PHP, Python, Tcl, and Ada95 are included.
  • The Art of Unix Programming - There is a vast difference between knowledge and expertise. Knowledge lets you deduce the right thing to do; expertise makes the right thing a reflex, hardly requiring conscious thought at all. This book has a lot of knowledge in it, but it is mainly about expertise. It is going to try to teach you the things about Unix development that Unix experts know, but aren't aware that they know. It is therefore less about technicalia and more about shared culture than most Unix books — both explicit and implicit culture, both conscious and unconscious traditions. It is not a ‘how-to’ book, it is a ‘why-to’ book. The why-to has great practical importance, because far too much software is poorly designed. Much of it suffers from bloat, is exceedingly hard to maintain, and is too difficult to port to new platforms or extend in ways the original programmers didn't anticipate. These problems are symptoms of bad design. We hope that readers of this book will learn something of what Unix has to teach about good design.
  • The Linux Development Platform - The Linux Development Platform shows how to choose the best open source and GNU development tools for your specific needs, and integrate them into a complete development environment that maximizes your effectiveness in any project. It covers editors, compilers, assemblers, debuggers, version control, utilities, LSB, Java, cross-platform solutions, and the entire Linux software development process.
  • Linux Device Drivers, 2nd Edition - As the popularity of the Linux system continues to grow, the interest in writing Linux device drivers steadily increases. Most of Linux is independent of the hardware it runs on, and most users can be (happily) unaware of hardware issues. But, for each piece of hardware supported by Linux, somebody somewhere has written a driver to make it work with the system. Without device drivers, there is no functioning system. Device drivers take on a special role in the Linux kernel. They are distinct "black boxes" that make a particular piece of hardware respond to a well-defined internal programming interface; they hide completely the details of how the device works. User activities are performed by means of a set of standardized calls that are independent of the specific driver; mapping those calls to device-specific operations that act on real hardware is then the role of the device driver. This programming interface is such that drivers can be built separately from the rest of the kernel, and "plugged in" at runtime when needed. This modularity makes Linux drivers easy to write, to the point that there are now hundreds of them available.

Saturday, June 2, 2007

Networking

Gigabit Ethernet Technology and Applications (Artech House Telecommunications Library)

Gigabit Ethernet Technology and Applications (Artech House Telecommunications Library)
  • Publisher: Artech House Publishers
  • Number Of Pages: 284
  • Publication Date: 2002-11
  • Sales Rank: 1378446
  • ISBN / ASIN: 1580535054
  • EAN: 9781580535052
  • Binding: Hardcover
  • Manufacturer: Artech House Publishers
  • Studio: Artech House Publishers
  • Book Description:

    Gigabit Ethernet delivers the speed and high bandwidth that today's organizations demand from their local area networks. It is being chosen over other high-speed technologies because it is a flexible and cost-effective solution that can be used in a wide range of applications. This comprehensive guide gives you a clear picture of how Gigabit Ethernet works and how it can be used to support a broad range of services. You learn how Gigabit Ethernet can be used in the wide area and how it can support mobile systems.

    The book also offers you a detailed understanding of how Gigabit Ethernet is used to build storage area networks, to scale up local area networks into total area networks, and to provide wireless solutions. By comparing Gigabit Ethernet to competing technologies, this guide helps you decide when Gigabit Ethernet is the right solution for your networking needs. This complete reference also provides you with a thorough treatment of the Ethernet standard and its many variants.



Download

Wednesday, May 30, 2007

Securing and Controlling Cisco Routers



Securing and Controlling Cisco Routers
By Peter T. Davis

* Publisher: AUERBACH
* Number Of Pages: 736
* Publication Date: 2002-05-15
* Sales Rank: 448860
* ISBN / ASIN: 0849312906
* EAN: 9780849312908
* Binding: Paperback
* Manufacturer: AUERBACH
* Studio: AUERBACH

Book Description:

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. In order to practice the material taught, the reader can log on to a real router and perform the commands.

Download

Mirror


CBT Nuggets 2005 Network + Series [Training Video]

CBT Nuggets 2005 Network + Series [Training Video]

contains the videos listed below:

- Network Topologies (Part 1)
- Network Topologies (Part 2)
- Media Connectors and Cabling
- Network Devices and Components (Part 1)
- Network Devices and Components (Part 2)
- OSI (Open Systems Interconnect) Model
- Media Access Control
- IP Addressing
- Network Layer Protocols
- TCP/IP Suite of Protocols and Services
- TCP/UDP Protocols and Services
- Additional Network Protocols and Services
- WAN Technologies
- Wireless Technologies
- Internet Access Technologies
- Remote Access Protocols and Services
- Server Remote Connectivity Configuration
- Security Protocols
- Authentication Protocols
- Network Operating Systems
- Client Workstation Connectivity
- Firewalls and Proxy Services
- VLAN's
- Intranets and Extranets
- Antivirus Protection
- Fault Tolerance and Disaster Recovery
- Troubleshooting Strategies
- Troubleshooting Utilities
- Physical Network Troubleshooting
- Shooting Trouble in Client/Server Environments

Rapidshare Part-1
Rapidshare Part-2
Rapidshare Part-3
Rapidshare Part-4
Rapidshare Part-5
Rapidshare Part-6
Rapidshare Part-7
Rapidshare Part-8

Deploying Cisco Voice over IP Solutions

Deploying Cisco Voice over IP Solutions
By Jonathon Davidson

* Publisher: Cisco Press
* Number Of Pages: 450
* Publication Date: 2001-12
* Sales Rank: 110208
* ISBN / ASIN: 1587050307
* EAN: 9781587050305
* Binding: Hardcover
* Manufacturer: Cisco Press
* Studio: Cisco Press Book Description:

Learn real-world voice-over-IP deployment solutions and strategies from the Cisco experts

Deploying Cisco Voice over IP Solutions covers:

  • Definitive guidelines on real-world VoIP deployments, the fundamentals of the latest VoIP solutions, and a look into the future of VoIP services
  • Different techniques for engineering and properly sizing traffic-sensitive voice networks
  • Basic concepts applicable to echo analysis, echo cancellation, and locating and eliminating echoes
  • Various QoS features applicable to voice
  • Detailed information on call admission control (CAC)
  • Dial plan configuration recommendations on Cisco H.323 gateways and gatekeepers used to support large dial plans
  • Basic tasks of designing a long-distance VoIP network
  • The two classes of hosted voice networks: Managed Multiservice (MMS) networks and packet voice VPNs
  • Fax services store and forward as well as real-time relay fax services
  • Sample configurations and step-by-step examples to help you learn how to build a VoIP network

Deploying Cisco Voice over IP Solutions provides networking professionals the knowledge, advice, and insight necessary to design and deploy voice over IP (VoIP) networks that meet customers' needs for scalability, services, and security. Beginning with an introduction to the important preliminary design elements that need to be considered before implementing VoIP, Deploying Cisco Voice over IP Solutions also demonstrates the basic tasks involved in designing an effective service provider-based VoIP network. You'll conclude with design and implementation guidelines for some of the more popular and widely requested VoIP services, such as prepaid services, fax services, and virtual private networks (VPNs).

This book is a collaboration of Cisco Systems CCIE(r) engineers, technical marketing engineers, and systems engineers. You'll find design experience from people who have designed some of the world's largest VoIP networks.

Download


Peer-to-Peer : Harnessing the Power of Disruptive Technologies

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
By Andy Oram

* Publisher: O'Reilly Media, Inc.
* Number Of Pages: 448
* Publication Date: 2001-03-15
* Sales Rank: 444698
* ISBN / ASIN: 059600110X
* EAN: 9780596001100
* Binding: Hardcover
* Manufacturer: O'Reilly Media, Inc.
* Studio: O'Reilly Media, Inc.

Book Description:

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users. While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it. This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field:

  • Nelson Minar and Marc Hedlund of target="new">Popular Power, on a history of peer-to-peer
  • Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed
  • Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions
  • Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users
  • David Anderson of SETI@home, on how SETI@Home created the world's largest computer
  • Jeremie Miller of Jabber, on the Internet as a collection of conversations
  • Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies
  • Adam Langley of Freenet, on Freenet's present and upcoming architecture
  • Alan Brown of Red Rover, on a deliberately low-tech content distribution system
  • Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems
  • Roger Dingledine, Michael J. Freedman, and David Molnar of Free Haven, on resource allocation and accountability in distributed systems
  • Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata
  • Theodore Hong of Freenet, on performance
  • Richard Lethin of Reputation Technologies, on how reputation can be built online
  • Jon Udell of BYTE and Nimisha Asthagiri and Walter Tuvell of Groove Networks, on security
  • Brandon Wiley of Freenet, on gateways between peer-to-peer systems
You'll find information on the latest and greatest systems as well as upcoming efforts in this book.

Download


Troubleshooting Virtual Private Networks (VPN) (Networking Technology)


Troubleshooting Virtual Private Networks (VPN) (Networking Technology)
By Mark Lewis

* Publisher: Cisco Press
* Number Of Pages: 840
* Publication Date: 2004-05-27
* Sales Rank: 94934
* ISBN / ASIN: 1587051044
* EAN: 9781587051043
* Binding: Hardcover
* Manufacturer: Cisco Press
* Studio: Cisco Press

Book Description:

Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs

  • Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs)
  • Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs
  • Master advanced troubleshooting tools and techniques for all applicable VPN types
  • Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems
  • Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN)
  • Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues
  • Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues
  • Refer to specially designed flowcharts to identify issues and find solutions fast
  • Consolidate VPN troubleshooting knowledge through bonus hands-on labs
  • Read and understand detailed analysis of all relevant VPN show and debug command output

Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. This book not only shows you how to correct problems but also how to avoid them in the first place with expert VPN configuration guidance and optimization tips.

Each chapter in Troubleshooting Virtual Private Networks includes a step-by-step, end-to-end troubleshooting approach to a different VPN technology. In-depth technical discussions and configuration reviews orient you to the VPN technology and get you ready to work. To help you access the answers you need, you'll find flowcharts in each chapter that provide a roadmap for rapid issue resolution. Solutions to complex or unusual issues can be found in case studies at the end of each chapter, along with review questions that test your knowledge. Bonus troubleshooting labs are also included to help you consolidate the skills learned throughout the book.

Whether you are looking to update or hone your skills, Troubleshooting Virtual Private Networks is your first and last reference for mastering advanced VPN troubleshooting.

This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Download


Tuesday, May 29, 2007

Cisco books collection

Note: if link does not work in internet explorer, use mozila firefox browser .. You can get it from right top corner of this site cause links are tested only on mozila firefox.

Copy and paste the links in address bar and change 'hxxp' to 'http' and press enter:

Cisco Press - Cisco LAN Switching Fundamentals.chm 25-Oct-2004 08:47 4.2M
Cisco Press - Cisco Router Firewall Security.chm 25-Oct-2004 08:46 5.8M
Cisco Press - LAN Switching First-Step.chm 25-Oct-2004 08:44 5.3M
Cisco Press - Wireless Networks First-Step.chm 25-Oct-2004 08:47 1.2M
Configuring IPv6 for Cisco IOS.pdf 23-Dec-2003 22:52 4.2M

hxxp://www.z4.cn/books/Cisco Press/

index of parent directory
1. LAN Connectivity - Hardware/ 23-Dec-2003 13:49 -
2. Lan Technologies/ 23-Dec-2003 19:59 -
3. Repeaters, Bridges, and Switches/ 02-Jan-2004 17:11 -
3Com ATM Manual.pdf 02-Jan-2002 17:11 2.6M
4. Wan Technologies and Routing/ 06-Jan-2004 10:26 -
5. IP ADDRESSES.PPT 21-Jan-2004 18:49 375K
5.IP Addresses/ 21-Jan-2004 18:42 -
6. TCP IP.PPT 28-Jan-2004 16:51 344K
6. TCP IP/ 28-Jan-2004 02:26 -
7. Domain Name System/ 30-Jan-2004 18:18 -
8. High Speed Networks.ppt 01-Mar-2004 07:10 583K
8. High Speed Networks/ 06-Feb-2004 22:02 -
9.Web and Security/ 14-Feb-2004 11:46 -
10. Wireless Networks & Voice Over IP/ 28-Feb-2004 15:20 -
ACM News Service.htm 07-Jan-2004 17:07 52K
Autonomous Systems Areas.pdf 03-Jan-2004 15:26 11M
COURSE TOPICS.htm 11-Feb-2004 11:19 30K
Cisco 802.11.doc 07-Jan-2002 13:09 30K
Cisco Map.pot 27-Feb-2002 03:06 104K
Comcast Cable Modem.pdf 23-Dec-2003 12:53 162K
DHCP2000.doc 07-Jan-2002 13:10 737K
ENCYCLOP.PDF 07-Jan-2002 14:09 12M
FINAL EXAM GUIDE W04.DOC 04-Mar-2004 09:36 29K
Gigabit Ethernet.pdf 07-Jan-2002 14:14 1.1M
HOME PAGE.doc 06-Jan-2004 13:50 30K
HOME PAGE.htm 29-Jan-2004 17:35 23K
Home IP Address.doc 06-Jan-2004 11:11 31K
Hub Manual.pdf 30-Dec-2001 09:27 558K
IEEE Web Engineering.pdf 07-Jan-2002 14:16 324K
IP Address.GIF 08-Feb-2001 13:16 94K
IP_Security.doc 07-Jan-2002 14:16 47K
IS3502 Lab 1.doc 09-Jan-2004 04:35 1.0M
IS3502 Lab 2.doc 03-Feb-2004 01:36 30K
IS3502 Lab 3.doc 07-Feb-2004 13:48 31K
IS3502 Lab 4.doc 24-Feb-2004 07:00 50K
IS3502 Lab 5.doc 02-Mar-2004 11:32 120K
Lab # 1 Briefing Notes.doc 09-Jan-2004 04:45 26K
MT W04 Guide.doc 23-Feb-2004 13:21 25K
MT W04 SOLUTIONS.DOC 02-Mar-2004 11:57 24K
Map Network Drive.doc 01-Mar-2002 08:40 26K
Mobile IP.doc 08-Mar-2004 14:13 25K
New Nps Backbone 10-07-02.vsd 17-Mar-2003 05:14 608K
Professor Bio.htm 07-Jan-2004 13:23 14K
Project.htm 07-Jan-2004 13:23 17K
QWS_FTP32/ 01-Mar-2002 19:18 -
ROUTER ATTACKS.DOC 07-Feb-2002 15:09 62K
Subnet Mask Operation.htm 06-Feb-2001 22:27 16K
Subnet Mask Process.vsd 02-Feb-2003 20:15 83K
W2KDNS.DOC 04-Mar-2002 15:05 2.2M
Web Site Instructions.htm 03-Jan-2003 15:18 11K
midmkt.exe 06-Feb-2002 07:53 43M

hxxp://web.nps.navy.mil/~nschneid/is3502/

en_CCNA1_SLM_v31.pdf 08-Nov-2006 17:46 4.2M
en_CCNA2_SLM_v31.pdf 08-Nov-2006 17:46 7.6M
en_CCNA3_SLM_v31.pdf 08-Nov-2006 17:47 8.5M
en_CCNA4_SLM_v31.pdf 08-Nov-2006 17:47 2.4M

hxxp://allmostpro.net/samsum/CISCO%20CCNA/

index of parent directory
Cisco Networking Academy CCNP Semester 4 v3.0.rar 18-Oct-2004 14:31 0
Cisco Networking Academy CCNP Semester 2 v3.0/ 22-Apr-2003 12:46 -
Cisco Networking Academy CCNP Semester 2 v3.0.rar 18-Oct-2004 14:22 22M
Cisco Networking Academy CCNP Semester 1 v3.0/ 22-Apr-2003 12:46 -
Cisco Networking Academy CCNP Semester 1 v3.0.rar 18-Oct-2004 14:17 19M

http://hyse.org/pdf/ccnp/?C=N;O=D

index of parent directory
640-607 Cisco Press CCNA 3.0 Study Guide (con indice).PDF 02-Jan-2005 13:16 12.3M
802.1D-1998.pdf 02-Jan-2005 13:16 1.7M
802.1Q-1998.pdf 02-Jan-2005 13:16 1.3M
802.1qTrunking.pdf 02-Jan-2005 13:16 56k
802.1sSpanningTree.pdf 02-Jan-2005 13:16 98k
Access VPNs And Tunneling Technologies.pdf 02-Jan-2005 13:16 569k
Acrc - Exam Certification Guide.ace 02-Jan-2005 13:16 6.3M
Acrc Study Guide.ace 02-Jan-2005 13:16 2.6M
ActualTests Cisco 640-801 ExamCheatSheet v12.23.03.pdf 02-Jan-2005 13:16 3.5M
CBT/ 02-Jan-2005 13:16
CCIE Certification Guide.pdf 02-Jan-2005 13:16 10.4M
CCNA v3 incl eLabs, CCNP v2, CCIE Full Curriculum Semesters 1-8.zip 02-Jan-2005 13:16 227M
CCNA_Exam_640-607_Certification_Guide.pdf 02-Jan-2005 13:18 13.2M
CCNA_WEB_EDITION.EXE 02-Jan-2005 13:18 35.4M
CCNP/ 02-Jan-2005 13:17 -
CISCO CCNA TRAINING KIT.RAR 02-Jan-2005 13:18 17.1M
Ccda Exam Certification Guide.ace 02-Jan-2005 13:18 5.9M
Cisco - Designing Network Security.pdf 02-Jan-2005 13:18 1.3M
Cisco - Network Consultants Handbook.pdf 02-Jan-2005 13:18 7.8M
Cisco - Skill Builder.zip 02-Jan-2005 13:18 70.6M
Cisco Access ISDN.ISO 02-Jan-2005 13:18 113M
Cisco As5x00 Case Study For Basic Ip Modem Services.pdf 02-Jan-2005 13:18 1.6M
Cisco CCIE Fundamentals Network Design.pdf 02-Jan-2005 13:18 2.3M
Cisco Ccna Training Kit.ace 02-Jan-2005 13:19 16.7M
Cisco Lan Switch Configuration Study Guide.ace 02-Jan-2005 13:19 8.1M
Cisco Networking Academy - Fundamentals of Voice and Data Cabling v1.1.zip 02-Jan-2005 13:19 168M
Cisco Press CCNA ICND 2004.pdf 02-Jan-2005 13:19 12.6M
Cisco Router Simulator (Sybex).zip 02-Jan-2005 13:19 10.0M
Cisco.IP.VC.Configuration.IVR.Utilities.V2.0/ 02-Jan-2005 13:18
Cisco.Inetworking.Troubleshooting/ 02-Jan-2005 13:18
Cisco.Packetized.Voice.and.Data.Integration.eBook-EEn.pdf 02-Jan-2005 13:19 10.3M
Cisco.Voice.over.Frame.Relay/ 02-Jan-2005 13:18
Cisco_Fundamentals_of_Java_v1.2_-_JGT.rar 02-Jan-2005 13:19 13.4M
Cisco_IP_Addressing_.zip 02-Jan-2005 13:19 3.0M
Cisco_The_Complete_Reference_NoFearLevenT.pdf 02-Jan-2005 13:19 10.5M
Ciscosims/ 02-Jan-2005 13:18
ELAB/ 02-Jan-2005 13:18
ELAB_SEM3_V1.ZIP 02-Jan-2005 13:19 4.7M
ISLFrameFormat.pdf 02-Jan-2005 13:19 17k
Internetworking Technology Overview 2nd Edition.pdf 02-Jan-2005 13:19 1.9M
SelfTest/ 02-Jan-2005 13:18
Sybex CCNA Virtual Test Center/ 02-Jan-2005 13:19
Sybex Complete Java 2 Certification Guide/ 02-Jan-2005 13:18
Test.King/ 02-Jan-2005 13:19
Troubleshooting Ethernet.pdf 02-Jan-2005 13:19 154k
Troubleshooting Serial Lines.pdf 02-Jan-2005 13:19 406k
Troubleshooting TCP_IP.pdf 02-Jan-2005 13:19 220k
ccna cisco manual+test sybex boson trascender full and crack.zip 02-Jan-2005 13:19 39.8M
cisco ccda self-study v2.pdf 02-Jan-2005 13:20 27.7M
cisco nuts/ 02-Jan-2005 13:18
cisco-642-821.pdf 02-Jan-2005 13:20 15.4M
cisco-ios-essentials/ 02-Jan-2005 13:18
cisco_exams_complete/ 02-Jan-2005 13:18
cisco_networking_academy_3.0_bridges_1-4.zip 02-Jan-2005 13:20 53.2M
en_CCNA1_v30.zip 02-Jan-2005 13:20 28.6M
en_CCNA2_v30.zip 02-Jan-2005 13:20 24.3M
en_CCNA3_v30.zip 02-Jan-2005 13:20 23.6M
en_CCNA4_v30.zip 02-Jan-2005 13:20 19.0M
exam_preparation/ 02-Jan-2005 13:18
igrp.pdf 02-Jan-2005 13:20 37k
lan-switch-cisco.pdf 02-Jan-2005 13:20 915k

hxxp://svetulcho.org/docs/CISCO/

index of parent directory
Cisco IOS Access Lists_O'reilly press ok.pdf 11-May-2003 14:39 1.4M
BSCIv1.2 Configuring IS-IS Protocol.pdf 13-Jun-2003 11:52 5.7M
mpls_vpn/ 15-Jul-2004 22:50 -
mpls/ 15-Jul-2004 22:50 -
PPT/ 11-Nov-2005 16:43 -
ISP IXP Networking Workshop/ 17-Nov-2005 09:50 -
Certificate/ 17-Nov-2005 15:04 -
BSCIѧϺ±Ê¼Ç.pdf 14-Dec-2005 00:57 1.2M
Pix/ 21-Feb-2006 17:02 -
Cisco_VPN_Training.rar 17-Mar-2006 16:39 10.1M

hxxp://www.huangjiaju.com/Network Technology/Cisco/

index of parent directory
TANDBERG Software Release - Endpoints MXP for Cisco CallManager (M1.3).pdf 30-Jun-2005 17:57 226K
TANDBERG Software Release - Endpoints MXP for Cisco CallManager (M2.1).pdf 23-Nov-2005 14:24 44K

hxxp://ftp.tandberg.net/pub/software/endpoints/cisco_call_manager_series/m-series/

index of parent directory
Cisco-Internetworking-Design-guide.pdf 07-Mar-2006 14:30 2.3M
Cisco-internetworking-case-studies.pdf 07-Mar-2006 14:29 833k

hxxp://tunggul.duniasemu.org/

index of parent directory
Parent Directory
Addison.Wesley.Professional.Practical.BGP.Jul.2004.eBook-DDU.chm
Addison.Wesley.Professional.Practical.BGP.Jul.2004.eBook-DDU.pdf
BGP4 Case Studies.pdf
Ccip - Configuring Bgp On Cisco Routers Vol 3.pdf
Cisco---Border-Gateway-Protocol-(BGP)-Student-Guide-v3.0-(2003).pdf
Cisco-Press---The-Definitive-BGP-Resource---Internet-Routing-Architectures-2nd-Edition-2000.pdf
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.chm
Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.pdf
Cisco.Press.Cisco.BGP-4.Command.and.Configuration.Handbook.(CCIE.Professional.Development)-FOS.chm
Cisco.Press.Cisco.BGP-4.Command.and.Configuration.Handbook.(CCIE.Professional.Development)-FOS.pdf
Cisco Press Optimal Routing Design Jun 2005 Ebook-Ddu.chm
Cisco Press Optimal Routing Design Jun 2005 Ebook-Ddu.pdf
Configuring BGP on Cisco Routers Vol 1.pdf
Configuring BGP on Cisco Routers Vol 2.pdf
HTML/
John.Wiley.&.Sons.-.Juniper.and.Cisco.Routing.pdf
Juniper_Networks_Field_Guide_and_Reference_(2002).chm
Juniper_Networks_Field_Guide_and_Reference_(2002).pdf
Juniper and Cisco Routing - Policy and Protocols for Multivendor IP Networks [Wiley Publishing 2002].pdf
Sybex - Jncip - Juniper Networks - Certified Internet Professional - 2003.pdf
Syngress - Ip Addressing and Subnetting Including Ipv6 (2000).chm
Syngress IP Addressing and Subnetting including IPv6.pdf
Troubleshooting BGP (Networkers, 2001).pdf
[Cisco Press] CCIE Professional Development Troubleshooting IP Routing Protocols.chm
[Cisco Press] CCIE Professional Development Troubleshooting IP Routing Protocols.pdf
[PDF - Computer Science - ENG] Cisco - Bgp For Internet Service Providers.pdf
[ebook] BGP Best Path Selection Algorithm.pdf

hxxp://gog.gateit.net/books/BGP/

index of parent directory
(ebook pdf) Illustrated TCPIP.pdf 07-Mar-2005 07:01 6.1M
CH1 Cisco IOS.pdf 07-Mar-2005 07:09 104k
Cisco Advanced IP routing.ppt 30-Dec-2002 15:51 1.8M
Cisco Advanced Routing Technologies.pdf 30-Dec-2002 15:51 1.1M
Cisco CCIE Network Design.pdf 30-Dec-2002 15:51 3.3M
Cisco CCIE Tests.doc 30-Dec-2002 15:52 444k
Cisco CCIE.pdf 30-Dec-2002 15:52 4.6M
Cisco CH3 Network Design.pdf 30-Dec-2002 15:52 208k
Cisco CH4 IP Design.pdf 30-Dec-2002 15:52 130k
Cisco Configuring IP routing protocol independent features 010299.pdf 07-Mar-2005 07:09 86k
Cisco DOTU - IOS Undocumented.pdf 07-Mar-2005 07:09 100k
Cisco Designing Larce-Scale IP Internetworks.pdf 30-Dec-2002 15:52 373k
Cisco Designing Web-Based Network Management 280599.ppt 30-Dec-2002 15:52 1.8M
Cisco First_mile_Price.ppt 30-Dec-2002 15:52 1.9M
Cisco IOS Essentials 2-82.pdf 07-Mar-2005 07:11 588k
Cisco IOS Essentials 2-84.pdf 07-Mar-2005 07:12 1.1M
Cisco IOS Essentials 2-9.pdf 07-Mar-2005 07:10 985k
Cisco IOS Reference Guide 060899.pdf 07-Mar-2005 07:13 443k
Cisco IP design.pdf 30-Dec-2002 15:52 5.0M
Cisco IP routing Protocol-Independent commands 230399.pdf 07-Mar-2005 07:13 200k
Cisco Internetwork Design Guide.pdf 30-Dec-2002 15:52 5.8M
Cisco Internetworking Design Basics 221098.pdf 30-Dec-2002 15:52 274k
Cisco Introduction to Routing Protocols.pdf 30-Dec-2002 15:52 877k
Cisco SYSLOG analysis.pdf 07-Mar-2005 07:13 63k
Cisco Troubleshooting TCPIP 201297.pdf 07-Mar-2005 07:14 99k
Cisco loopback.pdf 07-Mar-2005 07:13 105k
Comparison TCPIP and Netware.doc 30-Dec-2002 15:52 136k
Cross Connection.gif 30-Dec-2002 15:52 14k
FAQ Cisco ISP MailingListI.doc 30-Dec-2002 15:52 9k
FAQ Comunicacao de Dados.pdf 30-Dec-2002 15:52 5.4M
FAQ Rede.doc 30-Dec-2002 15:52 49k
FAQ Redes de Alta Velocidade.doc 30-Dec-2002 15:52 110k
FAQ Snmp.doc 30-Dec-2002 15:52 152k
FAQ TCPIP UNIX and Ethernet.pdf 30-Dec-2002 15:52 49k
FAQ Tcpip.doc 30-Dec-2002 15:52 230k
McGraw-Hill - TCP-IP - Architecture, Protocols and Implementation With IPv6 and IP Security.chm 07-Mar-2005 06:53 6.0M
Multimedia H.245 in H.324 Overview.doc 06-Mar-2005 20:33 64k
Network Architecture.pdf 07-Mar-2005 07:14 56k
Numbering Convention.pdf 07-Mar-2005 07:14 20k
OReilly - TCPIP Network Administration.pdf 07-Mar-2005 07:20 5.1M
PROTOCOLOS.pdf 22-Jul-2003 16:24 167k
Paper CANET3.pdf 30-Dec-2002 15:52 800k
Paper CAnet5.ppt 30-Dec-2002 15:53 4.1M
Paper CCNA OSI Model.doc 30-Dec-2002 15:53 122k
Paper Capacity Planning.pdf 30-Dec-2002 15:53 90k
Paper Computer Networks.pdf 30-Dec-2002 15:53 134k
Paper Data Link Control.ppt 30-Dec-2002 15:53 359k
Paper Evolution of the Data Communication.pdf 07-Mar-2005 07:21 742k
Paper Experiments with a Layered Transmission over Internet.ps 30-Dec-2002 15:53 1.7M
Paper Fundamentals of Telecommunications.pdf 30-Dec-2002 15:53 163k
Paper Fundamentos Comunicaciones.pdf 30-Dec-2002 15:53 158k
Paper IP Livingston.html 30-Dec-2002 15:53 9k
Paper IP Network.pdf 30-Dec-2002 15:53 1.1M
Paper Intelligent Network.pdf 30-Dec-2002 15:53 115k
Paper Intenet Access.pdf 30-Dec-2002 15:53 165k
Paper Internet B%e1sico.pdf 30-Dec-2002 15:53 3.0M
Paper Juniper Graceful Restart.pdf 30-Dec-2002 15:53 260k
Paper NGN.ppt 0-Dec-2002 15:54 39k
Paper NSP_SR_100702.pdf 30-Dec-2002 15:54 588k
Paper Network Planning.pdf 07-Mar-2005 08:03 302k
Paper Network Topologies.ppt 30-Dec-2002 15:53 2.2M
Paper Novas Tecnologias.ppt 30-Dec-2002 15:54 354k
Paper OSI Model.ppt 30-Dec-2002 15:54 5.4M
Paper Platforms for Voice and Data Networks.pdf 30-Dec-2002 15:54 96k
Paper Rede IP.pdf 30-Dec-2002 15:55 114k
Paper Redes Multimidia.pdf 30-Dec-2002 15:55 649k
Paper Redes de Dados 1.pdf 30-Dec-2002 15:55 1.2M
Paper Redes de Dados 2.pdf 30-Dec-2002 15:55 1.6M
Paper Redes de Dados 3.pdf 30-Dec-2002 15:55 1.9M
Paper Redes de Dados.pdf 30-Dec-2002 15:55 4.0M
Paper Redes.doc 30-Dec-2002 15:55 4.7M
Paper Regular Expressions.pdf 30-Dec-2002 15:55 5.8M
Paper Roteamento na Internet.pdf 30-Dec-2002 15:55 250k
Paper Roteamento1.pdf 30-Dec-2002 15:55 106k
Paper Roteamento2.pdf 30-Dec-2002 15:55 82k
Paper TCP-IP-Intro.ppt 30-Dec-2002 15:56 1020k
Paper TCPIP II.pdf 30-Dec-2002 15:56 236k
Paper TCPIP arp-rarp.ppt 30-Dec-2002 15:56 208k
Paper TCPIP suite part1.pdf 30-Dec-2002 15:56 968k
Paper TCPIP suite part2.pdf 16-Jul-2003 08:59 791k
Paper TCPIP suite part3.pdf 30-Dec-2002 15:56 849k
Paper Table Subnet.pdf 30-Dec-2002 15:56 62k
Paper Tcpip.pdf 30-Dec-2002 15:56 265k
Paper Tcpip1.pdf 30-Dec-2002 15:56 6.9M
Paper Tecnologia Comunicacao.pdf 30-Dec-2002 15:56 1.1M
Paper Telecommunication and Location.pdf 30-Dec-2002 15:56 297k
Paper Telecommunications Fundamentals.pdf 30-Dec-2002 15:56 227k
Paper Understanding IP Address 1.pdf 30-Dec-2002 15:56 67k
Paper Understanding IP Address 2.pdf 30-Dec-2002 15:56 92k
Paper Understanding IP Address 3.pdf 30-Dec-2002 15:56 56k
Paper Understanding IP Address.pdf 30-Dec-2002 15:56 147k
Paper Windows NT tcpip .pdf 30-Dec-2002 15:57 190k
Paper Windows NT tcpip.pdf 30-Dec-2002 15:57 190k
Paper Windows redes.pdf 30-Dec-2002 15:57 1.2M
Paper udp-tcp.ppt 30-Dec-2002 15:56 240k
RST-2111.pdf 7-Mar-2005 08:58 4.0M
RST-2112.pdf 07-Mar-2005 09:04 4.9M
RST-3031.pdf 07-Mar-2005 08:49 3.3M
Summary Cisco Command.pdf 07-Mar-2005 07:21 22k
Summary Cisco Modes.pdf 07-Mar-2005 07:21 30k
Summary Cisco Troubleshooting.pdf 07-Mar-2005 06:38 18k
Summary Show Screens.xls 07-Mar-2005 06:53 69k
Summary Table Routing.PDF 07-Mar-2005 06:38 79k

hxxp://www.inforede.net/Technical/Layer_3_and_4/Network/

Cisco IOS 12.2 Command Summary 1 of 3.pdf 17-Jul-2003 11:24 6.7M
Cisco IOS 12.2 Command Summary 2 of 3.pdf 17-Jul-2003 11:37 7.4M
Cisco IOS 12.2 Command Summary 3 of 3.pdf 17-Jul-2003 12:55 6.0M

hxxp://library.andrew.net.au/Cisco/

index of parent directory
Cisco Access Routers - Quick Reference Guide.pdf 30-Aug-2004 18:30 1.0M
Cisco_805_Series_SERIAL_Router.pdf 04-Nov-2003 01:02 366K
Cisco_806_Series_BROADBAND_Router.pdf 04-Nov-2003 01:02 570K
Cisco_1721_and_1720_Modular_Access_Routers.pdf 04-Nov-2003 01:01 313K
Cisco_1751_Modular_Access_Router.pdf 04-Nov-2003 01:02 644K
Cisco_1760_Modular_Access_Router.pdf 04-Nov-2003 01:02 299K
Cisco_1800_Series_Models_Comparison.pdf 24-Oct-2005 07:38 45K
Cisco_2800_Series_Models_Comparison.pdf 24-Oct-2005 07:38 49K
Cisco_3800_Series_Integrated_Services_Router.pdf 03-Oct-2006 17:27 175K
Cisco_3800_Series_Models_Comparison.pdf 03-Oct-2006 17:27 59K
Cisco_Aironet_802-11-a-b-g_CardBus_Wireless_LAN_Client_Adapter_ds.pdf 12-Oct-2004 16:40 258K
Cisco_Aironet_802-11-a-b-g_PCI_Wireless_LAN_Client_Adapter_ds.pdf 12-Oct-2004 16:43 256K
Cisco_Aironet_1000_Series_Lightweight_Access_Points.pdf 24-Oct-2005 08:18 196K
Cisco_Aironet_1100_Series_Access_Point_ds.pdf 11-Oct-2004 14:30 437K
Cisco_Aironet_1200_Series_Access_Point_ds.pdf 13-Oct-2004 16:49 591K
Cisco_Aironet_1200_Series_Access_Point_ds_New.pdf 10-May-2005 12:36 71K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_Power_Injector_ds_New.pdf 10-May-2005 12:42 91K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_Power_Injector _ds_New.pdf 10-May-2005 12:41 91K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_ds.pdf 18-Oct-2004 15:04 322K
Cisco_Aironet_1300_Series_Outdoor_Access_Point_Bridge_ds_New.pdf 10-May-2005 12:37 362K
Cisco_Aironet_1400_Series_Wireless_Bridge_ds.pdf 18-Oct-2004 14:39 286K
Cisco_Aironet_1500_Series_Lightweight_Outdoor_Mesh_Access_Points.pdf 23-Jan-2006 22:37 792K
Cisco_Aironet_Antenna_Reference_Guide_ds_New.pdf 14-Mar-2005 15:14 937K
Cisco_Aironet_Antennas_and_Accessories_ds.pdf 18-Oct-2004 14:40 621K
Cisco_Aironet_Lightning_Arrestor_ds.pdf 14-Mar-2005 17:32 101K
Cisco_Aironet_Power_Injectors_ds.pdf 18-Oct-2004 14:40 122K
Cisco_Aironet_Power_Injectors_ds_New.pdf 14-Mar-2005 15:14 122K
Cisco_Aironet_Wireless_Access_Points_Solution_Overview.pdf 26-Oct-2005 21:41 444K
Cisco_Catalyst_2950_-_Enhanced_Image.pdf 20-Jun-2005 12:53 135K
Cisco_Catalyst_2950_-_Standard_Image.pdf 20-Jun-2005 12:53 125K
Cisco_Catalyst_2950_Long-Reach_Ethernet_Switches.pdf 20-Jun-2005 23:54 279K
Cisco_Catalyst_2955_Series_Switches.pdf 20-Jun-2005 23:54 458K
Cisco_Catalyst_3560_Series_Switches.pdf 10-May-2005 13:15 254K
Cisco_Router_Guide_-_Winter_2004-mod.pdf 20-Jun-2005 23:41 967K
Cisco_Wireless_LAN_Controllers.pdf 15-Jun-2006 19:15 283K
Comparativo_CamIP.pdf 22-Jan-2006 23:45 50K
MultiVOIP_Gateways_Data_Sheet.pdf 14-Dec-2004 16:48 321K
Netgear_Familias_de_Productos.pdf 03-Oct-2006 18:08 765K
Network_IP_Camera_550703.pdf 08-Oct-2005 19:16 60K
Network_IP_Camera_550710.pdf 21-Oct-2004 01:06 87K
Nortel_BCM50.pdf 20-Oct-2005 23:48 225K

hxxp://www.lanet.com.mx/pdf/


Monday, May 28, 2007

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems
By Mohamad Assaad, Djamal Zeghlache,

* Publisher: AUERBACH
* Number Of Pages: 211
* Publication Date: 2006-07-20
* Sales Rank: 797248
* ISBN / ASIN: 0849368383
* EAN: 9780849368387
* Binding: Hardcover
* Manufacturer: AUERBACH
* Studio: AUERBACH
Book Description:

TCP Performance over UMTS-HSDPA Systems provides a comprehensive study of the effect of TCP both on achieved application bit rate performance and system capacity. The book describes how to reduce, with or without modification of TCP implementations, the effect of wireless networks on TCP. Emphasizing the effect of scheduling to improve TCP performance over wireless systems, the authors focus on the performance of TCP traffic over HSDPA. This text is ideal for advanced undergraduate students, graduate students, and researchers with basic knowledge in wireless networks that are keen on learning more about the UMTS access network evolution and interactions of the wireless link with TCP.

1881 KB

RAR'd PDF

Download

TCP/IP Foundations


TCP/IP Foundations
By Andrew G. Blank

* Publisher: Sybex
* Number Of Pages: 284
* Publication Date: 2004-09-17
* Sales Rank: 643199
* ISBN / ASIN: 0782143709
* EAN: 0025211443705
* Binding: Paperback
* Manufacturer: Sybex
* Studio: Sybex More...Book Description:

The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor.

TCP/IP Foundations provides essential knowledge about the two protocols that form the basis for the Internet, as well as many other networks. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include:

  • The origins of TCP/IP and the Internet
  • The layers comprising the OSI and DoD models
  • TCP/IP addressing
  • Subnet masks
  • Creating custom subnet masks
  • Supernetting and Classless Inter-Domain Routing (CIDR)
  • Name resolution
  • The Domain Name System (DNS) and Dynamic DNS
  • Windows Internet Naming Services (WINS)
  • The Dynamic Host Configuration Protocol (DHCP)
  • What to expect with IPv6

Download


Saturday, May 26, 2007

Total Area Networking: Atm, Ip, Frame Relay and Smds Explained


Total Area Networking: Atm, Ip, Frame Relay and Smds Explained
By John Atkins,&nbspMark Norris,

* Publisher: Wiley
* Number Of Pages: 309
* Publication Date: 1998-04-15
* Sales Rank: 2401065
* ISBN / ASIN: 0471984647
* EAN: 9780471984641
* Binding: Hardcover
* Manufacturer: Wiley
* Studio: Wiley More...Book Description:

Total Area Networking ATM,IP, Frame Relay and SMDS Explained Second Edition John Atkins and Mark Norris BT, UK Total Area Networking explains how high-speed communications allow local facilities to become part of a more global network. This concept is the essential basis for super-connectivity, when the user sees a distributed set of network-based resources as one. This fully updated second edition of the highly successful Total Area Networking has been extended to include IP networks and now covers both network technology and its applications. It illustrates the practical implementation of a total area network using the principles developed for Intelligent Networks, Intranets and Virtual Private Networks.
* Main topics include ATM (Asynchronous Transfer Mode), IP (Internet Protocol), Frame Relay and SMDS (Switched Multi-magabit Data Service).
* Covers the whole spectrum of communications technology, from theory to implementation.
* Provides a clear understanding of what new technology can do and how it can best be deployed.
* Allows the non-expert to question both accurately and indepth.
Essential reading for a wide ranging audience, including professionals involved in the planning and implementation of information systems, undergraduate and postgraduate students of computer science, electrical engineering and telecommunications.

Download

Mirror


IPv6 Network Programming


IPv6 Network Programming
By Jun-ichiro itojun Hagino

* Publisher: Digital Press
* Number Of Pages: 376
* Publication Date: 2004-10-18
* Sales Rank: 968204
* ISBN / ASIN: 1555583180
* EAN: 9781555583187
* Binding: Paperback
* Manufacturer: Digital Press
* Studio: Digital Press More...Book Description:

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.

* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Download



Rich Client Programming: Plugging into the NetBeans(TM) Platform


Rich Client Programming: Plugging into the NetBeans(TM) Platform
By Tim Boudreau, Jaroslav Tulach,&nbspGeertjan Wielenga,

* Publisher: Prentice Hall PTR
* Number Of Pages: 640
* Publication Date: 2007-04-30
* Sales Rank: 5961
* ISBN / ASIN: 0132354802
* EAN: 9780132354806
* Binding: Paperback
* Manufacturer: Prentice Hall PTR
* Studio: Prentice Hall PTR More...Book Description:

The open-source NetBeans Platform is an extraordinarily powerful framework for building "write once, run anywhere" rich client applications. Now, for the first time since the release of NetBeans IDE 5.0, there's a comprehensive guide to rich client development on the NetBeans Platform.

Written for Java developers and architects who have discovered that basic Swing components are not enough for them, this book will help you get started with NetBeans module development, master NetBeans' key APIs, and learn proven techniques for building reliable desktop software. Each chapter is filled with practical, step-by-step instructions for creating complete rich client applications on top of the NetBeans Platform and plugins for NetBeans IDE.

Rich Client Programming's wide-ranging content covers

  • Why modular development makes sense for small, medium, and large applications
  • Using NetBeans to accelerate development and improve efficiency
  • Leveraging NetBeans productivity features, from the Component Palette to Code Completion
  • Leveraging NetBeans' modular architecture in your own applications
  • Implementing loosely coupled communication to improve code maintainability and robustness
  • Managing user- and system-configuration data
  • Building reloadable components with solid threading models
  • Constructing sophisticated multiwindow applications and presenting rich data structures to users
  • Adding user-configurable options
  • Integrating Web services with NetBeans desktop applications
  • Automating module updates and providing user help

Download


Next Generation SDH/SONET: Evolution or Revolution


Next Generation SDH/SONET: Evolution or Revolution
By Huub van Helvoort

* Publisher: Wiley
* Number Of Pages: 254
* Publication Date: 2005-04-29
* Sales Rank: 953674
* ISBN / ASIN: 0470091207
* EAN: 9780470091203
* Binding: Hardcover
* Manufacturer: Wiley
* Studio: Wiley More...Book Description:

Since the turn of the twentieth century, telecommunications has shifted from traditional voice transport to data transport, although digitized voice is still a large contributor. Instead of an evolution of existing transport standards, a revolution was necessary in order to enable additional data-related transport.

Next Generation SDH/SONET provides a detailed description of the enablers of efficient data transport over any synchronous network. These include virtual concatenation (VCAT), the operation to provide more granularity, and the link capacity adjustment scheme (LCAS), an extension of VCAT that provides more flexibility. Equally, generic framing procedure (GFP), the methodology that efficiently transports asynchronous, or variable bit-rate data signals over a synchronous or constant bit-rate, is explored in detail.

● Describes new extensions to SDH/SONET standards to provide more granularity and flexibility in their structures, enabling the efficient transport of data-related signals such as Ethernet and FICON

● Presents comprehensive sections on the implementation of multi-service transport platforms (MSTP) enabled by VCAT, LCAS and GFP

● Provides valuable advice on how to exploit existing networks to create or extend LANs towards metro (MAN) or wide (WAN) area networks and also to support storage area (SAN) networks

This volume will appeal to manufacturers, engineers and all those involved in developing and deploying SDH, SONET and OTN technology. It will also be an invaluable resource for postgraduate students on network communications courses.

Download

Mirror



The Complete Cisco VPN Configuration Guide (Networking Technology)


The Complete Cisco VPN Configuration Guide (Networking Technology)
By Richard Deal

* Publisher: Cisco Press
* Number Of Pages: 1032
* Publication Date: 2005-12-15
* Sales Rank: 40132
* ISBN / ASIN: 1587052040
* EAN: 9781587052040
* Binding: Paperback
* Manufacturer: Cisco Press
* Studio: Cisco Press More...

Book Description:

Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution

  • A complete resource for understanding VPN components and VPN design issues
  • Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients
  • Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience
  • Filled with relevant configurations you can use immediately in your own network

With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.

Part I, “VPNs,” introduces the topic of VPNs and discusses today’s main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, “Concentrators,” provides detail on today’s concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network.

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Download


Friday, May 18, 2007

Penetration Testing and Network Defense (Networking Technology)


Penetration Testing and Network Defense (Networking Technology)
By Andrew Whitaker, Daniel Newman,

* Publisher: Cisco Press
* Number Of Pages: 624
* Publication Date: 2005-10-31
* Sales Rank: 170911
* ISBN / ASIN: 1587052083
* EAN: 9781587052088
* Binding: Paperback
* Manufacturer: Cisco Press
* Studio: Cisco Press More...Book Description:

The practical guide to simulating, detecting, and responding to network attacks

  • Create step-by-step testing plans
  • Learn to perform social engineering and host reconnaissance
  • Evaluate session hijacking methods
  • Exploit web server vulnerabilities
  • Detect attempts to breach database security
  • Use password crackers to obtain access information
  • Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches
  • Scan and penetrate wireless networks
  • Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
  • Test UNIX, Microsoft, and Novell servers for vulnerabilities
  • Learn the root cause of buffer overflows and how to prevent them
  • Perform and prevent Denial of Service attacks

Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.

Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization’s network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks.

Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks.

Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources.

“This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade.�

–Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems®

Download


Thursday, May 17, 2007

Cisco IOS Access Lists


Cisco IOS Access Lists
By Jeff Sedayao

* Publisher: O'Reilly Media, Inc.
* Number Of Pages: 272
* Publication Date: 2001-06
* Sales Rank: 233003
* ISBN / ASIN: 1565923855
* EAN: 9781565923850
* Binding: Paperback
* Manufacturer: O'Reilly Media, Inc.
* Studio: O'Reilly Media, Inc. More...Book Description:

Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas:

  • Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.

  • Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.
  • The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.

Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.

Download


Managing A Network Vulnerability Assessment


Managing A Network Vulnerability Assessment
By Thomas R. Peltier, Justin Peltier,&nbspJohn A. Blackley,

* Publisher: AUERBACH
* Number Of Pages: 312
* Publication Date: 2003-05-28
* Sales Rank: 743092
* ISBN / ASIN: 0849312701
* EAN: 9780849312700
* Binding: Paperback
* Manufacturer: AUERBACH
* Studio: AUERBACH More...Book Description:

Managing A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Download


Windows Server 2003 Pocket Administrator


Windows Server 2003 Pocket Administrator
By Nelson Ruest, Danielle Ruest,

* Publisher: McGraw-Hill Osborne Media
* Number Of Pages: 256
* Publication Date: 2003-09-30
* Sales Rank: 294231
* ISBN / ASIN: 0072229772
* EAN: 0783254042377
* Binding: Paperback
* Manufacturer: McGraw-Hill Osborne Media
* Studio: McGraw-Hill Osborne Media More...

Book Description:

This handy resource offers busy network administrators clear and concise information for daily on-the-job tasks--all in a portable format. Key management tasks are presented in logically organized sections. You’ll get details on file, print, application, mail, terminal, streaming media, and remote servers--and much more.

Download


Local Area High Speed Networks (MTP)


Local Area High Speed Networks (MTP)
By Dr. Sidnie Feit

* Publisher: Sams
* Number Of Pages: 700
* Publication Date: 2000-01-15
* Sales Rank: 1293085
* ISBN / ASIN: 1578701139
* EAN: 0619472701133
* Binding: Hardcover
* Manufacturer: Sams
* Studio: Sams More...

Book Description:

There is a great deal of change happening in the technology being used for local networks. As Web intranets have driven bandwidth needs through the ceiling, inexpensive Ethernet NICs and switches have come into the market. As a result, many network professionals are interested in evaluating these new technologies for implementation consideration. If you are looking for advice from experts who can help you realistically compare and decide how to use the options before you. Often, books on this subject are too varied in subject matter, attempting to cover to many subjects in the book. This book addresses the topic of Ethernet Networking from a planning perspective to a bit analysis of the Ethernet packets. It explains in detail information in the new network administrator would find it necessary to know.

Download



Global Mobile: Connecting without walls, wires, or borders


Global Mobile: Connecting without walls, wires, or borders
By Fred Johnson

* Publisher: Peachpit Press
* Number Of Pages: 144
* Publication Date: 2005-01-12
* Sales Rank: 816161
* ISBN / ASIN: 0321278712
* EAN: 0785342278712
* Binding: Paperback
* Manufacturer: Peachpit Press
* Studio: Peachpit Press More...Book Description:
With the proliferation of Wi-Fi hotspots and advances in mobile-phone technology, there aren't many excuses today for not being in contact with your friends, family and business associates when you travel. Using just your laptop computer and cell phone, you can stay connected from all around the globe. But not so fast -- do you "really" know how to use your gadgets when traveling? And furthermore, do you have the RIGHT gadgets?

Enter Global Mobile. This slim, compact guide outlines how to choose and use the gear you’ll need to stay connected no matter where you’re going. Author Fred Johnson walks you through all things wireless -- from getting online while you sip your favorite latte at Starbucks, to swapping SIM cards in your GSM phone, to learning the ins and outs of new technologies like Bluetooth, you’ll learn how simple it is to stay "plugged-in" during a business trip or an international adventure.

Crammed with helpful tips on choosing services, useful charts (such as international phone numbers and GSM coverage), a helpful packing checklist, and priceless advice, this handy guide should be packed with your laptop before you leave on your next trip.

Download



Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks (Wireless Networks and Mobile Communications)


Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks (Wireless Networks and Mobile Communications)

ByPublisher: AUERBACH

Number Of Pages: 664

Publication Date: 2007-03-28

Sales Rank: 543853

ISBN / ASIN: 0849392543

EAN: 9780849392542

Binding: Hardcover

Manufacturer: AUERBACH

Studio: AUERBACH

Book Description:
With state-of-the-art research, Wireless Ad Hoc Networking provides wide coverage of key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures, localization and location tracking, power management and energy-efficient design, power and topology control, time synchronization, coverage issues, middleware and software design, data gathering and processing, embedded network-oriented operating systems, mobility management, self-organization and governance, QoS and real-time issues, security and dependability issues, applications, modeling and performance evaluation, implementation and experience, and much more.
DOwnload

Building a Monitoring Infrastructure with Nagios

Building a Monitoring Infrastructure with Nagios
Pages:264

This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David Josephsen goes far beyond the basics, demonstrating how to use third-party tools and plug-ins to solve the specific problems in your unique environment. Josephsen introduces Nagios ?from the ground up,? showing how to plan for success and leverage today’s most valuable monitoring best practices. Then, using practical examples, real directives, and working code, Josephsen presents detailed monitoring solutions for Windows, Unix, Linux, network equipment, and other platforms and devices. You’ll find thorough discussions of advanced topics, including the use of data visualization to solve complex monitoring problems. This is also the first Nagios book with comprehensive coverage of using Nagios Event Broker to transform and extend Nagios.

Understand how Nagios works, in depth: the host and service paradigm, plug-ins, scheduling, and notification Configure Nagios successfully: config files, templates, timeperiods, contacts, hosts, services, escalations, dependencies, and more Streamline deployment with scripting templates, automated discovery, and Nagios GUI tools Use plug-ins and tools to systematically monitor the devices and platforms you need to monitor, the way you need to monitor them
Establish front-ends, visual dashboards, and management interfaces with MRTG and RRDTool
Build new C-based Nagios Event Broker (NEB) modules, one step at a time Contains easy-to-understand code listings in Unix shell, C, and Perl

Rapidshare

Friday, May 18, 2007

Advances in Pervasive Computing and Networking

Advances in Pervasive Computing and Networking
Pages:270

Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications.

Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters.

The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.

Rapidshare

Thursday, May 17, 2007

Endpoint Security

Endpoint Security
Pages:384

A Comprehensive, Proven Approach to Securing All Your Network Endpoints Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’ s newest threats, and prepare yourself for tomorrow’ s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to “ trusted computing.” Unlike traditional “ one-size-fits-all” solutions, Kadrich’ s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You’ ll learn how to: Recognize dangerous limitations in conventional endpoint security strategies Identify the best products, tools, and processes to secure your specific devices and infrastructure Configure new endpoints securely and reconfigure existing endpoints to optimize security Rapidly identify and remediate compromised endpoint devices Systematically defend against new endpoint-focused malwareand viruses Improve security at the point of integration between endpoints and your network Whether you’ re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ ve been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec’ s Senior Manager of Network and Endpoint Security.

Rapidshare
DepositFiles

Tuesday, May 15, 2007

Wireless Ad Hoc Networking

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Pages:664

With state-of-the-art research, Wireless Ad Hoc Networking provides wide coverage of key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures, localization and location tracking, power management and energy-efficient design, power and topology control, time synchronization, coverage issues, middleware and software design, data gathering and processing, embedded network-oriented operating systems, mobility management, self-organization and governance, QoS and real-time issues, security and dependability issues, applications, modeling and performance evaluation, implementation and experience, and much more.

Rapidshare
DepositFiles

Wednesday, May 9, 2007

Fundamentals of WiMAX

Fundamentals of WiMAX: Understanding Broadband Wireless Networking
(Communications Engineering and Emerging Technologies)
Pages:496

WiMAX is today's most promising new technology for broadband wireless access to IP services. It can serve an extraordinary range of applications and environments: data, voice, and multimedia; fixed and mobile; licensed and unlicensed. However, until now, wireless professionals have found little reliable information to guide them. Fundamentals of WiMAX is the first comprehensive guide to WiMAX—its technical foundations, features, and standards.

The authors systematically cut through the hype surrounding WiMAX and illuminate the realities. They combine deep, complete information for wireless professionals and basic, accessible knowledge for non-experts. Professionals will especially appreciate their detailed discussion of performance in WiMAX and competitive networks, based on comprehensive link and system level simulations.

Topics include

* Applications, history, evolution, technical and business challenges, and spectrum options
* 802.16 standards: physical and MAC layers, channel access, QoS, security, multicast, power, mobility, and more
* Performance enhancement: advanced antennas, multiple antennas, Hybrid-ARQ, and frequency reuse
* Broadband wireless channels: path loss, shadowing, cellular systems, sectoring, and fading—including modeling and mitigation
* OFDM: from basic multicarrier concepts to synchronization, PAR reduction, and clipping
* OFDMA: multiple access, multiuser diversity, adaptive modulation, and resourceallocation
* End-to-end service: QoS, session management, security, and mobility
* Predicting performance at the physical layer, MAC layer, link level, and system level
* Architecting WiMAX networks: design principles, reference models, authentication, QoS, and mobility management

Whether you're a wireless engineer, network architect, manager, or software developer, this book delivers essential information for succeeding with WiMAX—from planning through deployment.

Rapidshare
Mirror
Depositfiles

Saturday, May 5, 2007

Neural Network Control of Nonlinear Discrete-Time Systems

Neural Network Control of Nonlinear Discrete-Time Systems
Pages:624

Neural Network Control of Nonlinear Discrete-Time Systems presents powerful modern control techniques based on the parallelism and adaptive capabilities of biological nervous systems. After an introduction to neural networks, dynamical systems, control of nonlinear systems, and feedback linearization, the book builds systematically from actuator nonlinearities and strict feedback in nonlinear systems to nonstrict feedback, system identification, model reference adaptive control, and novel optimal control using the Hamilton-Jacobi-Bellman formulation. The author concludes by developing a framework for implementing intelligent control in actual industrial systems using embedded hardware.

Table of Contents:

1 Background on neural networks 1
2 Background and discrete-time adaptive control 75
3 Neural network control of nonlinear systems and feedback linearization 139
4 Neural network control of uncertain nonlinear discrete-time systems with actuator nonlinearities 265
5 Output feedback control of strict feedback nonlinear MIMO discrete-time systems 343
6 Neural network control of nonstrict feedback nonlinear systems 371
7 System identification using discrete-time neural networks 423
8 Discrete-time model reference adaptive control 447
9 Neural network control in discrete-time using Hamilton-Jacobi-Bellman formulation 473
10 Neural network output feedback controller design and embedded hardware implementation 511

Rapidshare
MIHD

Monday, April 30, 2007

EIGRP Network Design Solutions

EIGRP Network Design Solutions
The Definitive Resource for EIGRP Design, Deployment, and Operation
Pages:366

EIGRP Network Design Solutions provides readers with in-depth knowledge of EIGRP, the Cisco routing protocol that runs many large enterprise and service provider networks. It covers the theory of EIGRP, network design issues, configuration of EIGRP on Cisco IOS routers, and detailed troubleshooting information. Case studies and configuration examples help readers put the concepts into practice. Design and usage rules for various EIGRP features allow network engineers to design and implement EIGRP networks resulting in efficient, optimal, and trouble-free network operation. The book addresses issues with various types of networks, such as: hierarchical and meshed enterprise networks, dial-up networks, and service provider networks. Ideal for network technicians, network engineers, and network design consultants who are designing, implementing or troubleshooting enterprise, dial-up, or service provider networks with EIGRP who need the practical knowledge presented in this book.

Table of Contents:

Part I: EIGRP Technology

Chapter 1: EIGRP Concepts and Technology
Chapter 2: Advanced EIGRP Concepts, Data Structures, and Protocols
Chapter 3: IPX EIGRP
Chapter 4: AppleTalk EIGRP

Part II: Designing Enterprise EIGRP Networks

Chapter 5: Scalability Issues in Large Enterprise Networks
Chapter 6: EIGRP Route Summarization
Chapter 7: Route Filters
Chapter 8: Default Routers
Chapter 9: Integrating EIGRP with Other Enterprise Routing Protocols
Chapter 10: Designing Scalable IPX EIGRP Networks
Chapter 11: Designing Scalable AppleTalk EIGRP Networks

Part III: Running EIGRP over Switched WAN and Dial-Up Networks

Chapter 12: Switched WAN Networks and Their Impact on EIGRP
Chapter 13: Running EIGRP over WAN Networks
Chapter 14: EIGRP and Dial-Up Networks
Chapter 15: Secure EIGRP Operation

Rapidshare
MIHD

Saturday, April 28, 2007

Secure Your Network for Free

Secure Your Network for Free
Pages:480

This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.

* Teachers you how to implement best of breed security using tools for free
* Ideal for anyone recomending and implementing new technologies within the company
* Companion Web site contains dozens of working scripts and tools

Table of Contents:

Presenting the Business Case for Free Solutions 1
Introduction 2
The Costs of Using Free Security Solutions 2
Training Costs 3
Hardware Costs 3
Consulting Costs 4
Hidden Costs 5
The Savings of Using Free Security Solutions 6
Purchase Costs 6
Maintenance Costs 7
Customization Costs 7
Comparing Free Solutions with Commercial Solutions 8
Strengths of Free Solutions 9
Weaknesses of Free Solutions 10
Evaluating Individual Solutions 12
"Selling" a Free Solution 16
Selling by Doing 17
Presenting a Proposal 17
Summary 19
Solutions Fast Track 19
Frequently Asked Questions 21
Protecting Your Perimeter 23
Introduction 24
Firewall Types 24
Firewall Architectures 27
Screened Subnet 27
One-Legged 28
True DMZ 30
Implementing Firewalls 31
Hardware versus Software Firewalls 32
Configuring netfilter 32
Choosing a Linux Version 32
Choosing Installation Media 33
Linux Firewall Operation 36
Configuration Examples 42
GUIs 55
Smoothwall 76
Configuring Windows Firewall 85
Providing Secure Remote Access 86
Providing VPN Access 87
Using Windows as a VPN Concentrator 89
iPig 93
OpenSSL VPN 98
Providing a Remote Desktop 108
Windows Terminal Services 109
VNC 113
Using the X Window System 119
Providing a Remote Shell 125
Using Secure Shell 126
Using a Secure Shell GUI Client 128
Summary 130
Solutions Fast Track 131
Frequently Asked Questions 132
Protecting Network Resources 133
Introduction 134
Performing Basic Hardening 134
Defining Policy 135
Access Controls 137
Authentication 137
Authorization 138
Auditing 138
Hardening Windows Systems 139
General Hardening Steps 139
Users and Groups 142
File-Level Access Controls 147
Additional Steps 152
Using Microsoft Group Policy Objects 153
Account Lockout Policy 159
Audit Policy 160
User Rights Assignment 160
Hardening Linux Systems 164
General Hardening Steps 164
Users and Groups 165
File-Level Access Controls 168
Using the Bastille Hardening Script 172
Using SELinux 173
Hardening Infrastructure Devices 175
Patching Systems 176
Patching Windows Systems 177
Patching Linux Systems 179
Personal Firewalls 180
Windows Firewall 180
Netfilter Firewall 187
Configuring TCP Wrappers 187
Providing Antivirus and Antispyware Protection 188
Antivirus Software 189
Clam AntiVirus 189
Using Online Virus Scanners 196
Antispyware Software 196
Microsoft Windows Defender 197
Microsoft Malicious Software Removal Tool 200
Encrypting Sensitive Data 201
EFS 202
Summary 209
Solutions Fast Track 209
Frequently Asked Questions 212
Configuring an Intrusion Detection System 215
Introduction 216
Intrusion Detection Systems 216
Configuring an Intrusion Detection System 217
Hardware Requirements 218
Placing Your NIDS 218
Configuring Snort on a Windows System 221
Installing Snort 222
Configuring Snort Options 225
Using a Snort GUI Front End 231
Configuring IDS Policy Manager 232
Configuring Snort on a Linux System 240
Configuring Snort Options 240
Using a GUI Front End for Snort 246
Basic Analysis and Security Engine 246
Other Snort Add-Ons 254
Using Oinkmaster 254
Additional Research 256
Demonstrating Effectiveness 257
Summary 258
Solutions Fast Track 259
Frequently Asked Questions 261
Managing Event Logs 263
Introduction 264
Generating Windows Event Logs 264
Using Group Policy to Generate Windows Events Logs 267
Generating Custom Windows Event Log Entries 274
Collecting Windows Event Logs 275
Analyzing Windows Event Logs 277
Generating Syslog Event Logs 279
Windows Syslog 282
Generating Syslog Events 282
Receiving Syslog Events 295
Linux Syslog 297
Generating Syslog Events 297
Encrypting Syslog Traffic 298
Receiving Syslog Events on a Linux Host 311
Analyzing Syslog Logs on Windows and Linux 312
Windows Log Analysis 313
Linux Log Analysis 321
Securing Your Event Logs 327
Ensuring Chain of Custody 328
Ensuring Log Integrity 329
Applying Your Knowledge 331
Summary 333
Solutions Fast Track 333
Frequently Asked Questions 335
Testing and Auditing Your Systems 337
Introduction 338
Taking Inventory 338
Locating and Identifying Systems 339
Nmap 341
Super Scanner 347
Angry IP Scanner 351
Scanline 352
Special-Purpose Enumerators 355
Locating Wireless Systems 357
Network Stumbler 358
Documentation 361
Network Topology Maps 362
Access Request Forms 364
Business Continuity and Disaster Recovery Plans 365
IT Security Policies/Standards/Procedures 365
Vulnerability Scanning 366
Nessus 367
Running Nessus on Windows 368
Running Nessus on Linux 371
X-Scan 375
Microsoft Baseline Security Analyzer 379
OSSTMM 382
Summary 386
Solutions Fast Track 386
Frequently Asked Questions 387
Network Reporting and Troubleshooting 389
Introduction 390
Reporting on Bandwidth Usage and Other Metrics 390
Collecting Data for Analysis 392
Understanding SNMP 394
Configuring Multi Router Traffic Grapher 397
Configuring MZL & Novatech TrafficStatistic 400
Configuring PRTG Traffic Grapher 403
Configuring ntop 412
Enabling SNMP on Windows Hosts 418
Enabling SNMP on Linux Hosts 421
Troubleshooting Network Problems 424
Using a GUI Sniffer 425
Using a Command-Line Sniffer 433
Additional Troubleshooting Tools 438
Netcat 439
Tracetcp 439
Netstat 440
Summary 442
Solutions Fast Track 442
Frequently Asked Questions 444
Security as an Ongoing Process 447
Introduction 448
Patch Management 448
Network Infrastructure Devices 452
Operating System Patches 453
Application Patches 453
Change Management 454
Change Causes Disruption 454
Inadequate Documentation Can Exacerbate Problems 455
Change Management Strategy 455
Antivirus 459
Antispyware 459
Intrusion Detection Systems 460
Vulnerability Scanning 460
Vulnerability Management Cycle 461
Roles and Responsibilities 463
Penetration Testing 463
Obtaining the Support of Senior Management 464
Clarify What You Are Buying 464
Policy Review 465
Physical Security 466
Cert Team 468
Summary 470
Solutions Fast Track 470
Frequently Asked Questions 472
Index 475

Rapidshare

Sunday, April 1, 2007

Learnkey Wireless Networking 15 Hours of Interactive Training

Learnkey Wireless Networking 5 sessions
5 Sessions - 15 Hours of Interactive Training

The popularity of wireless networks is exploding, and with it, demand for trained wireless IT professionals. In the Wireless Networking course from LearnKey, you'll learn the fundamentals of wireless LANs from a vendor-neutral perspective. Expert instructor Michael Storm takes you through radio frequency (RF) technologies, industry standards, site surveys, wireless security issues and much more. At the conclusion of this course you'll be prepared to implement, manage, and troubleshoot wireless networks, and be prepared to pass the Certified Wireless Network Administrator (CWNA) exam.

Session 1

Section A: CWNP Introduction
· CWNP Certification Program
· Levels of Certification
· Course Overview
· Course Objectives

Section B: Wireless Application
· History
· Standards
· Roles
· Last Mile Delivery
· Mobility
· Wireless LANs

Section C: Radio Frequency Technology
· Radio Frequency
· Behaviors
· Gain/Loss
· Reflection/Refraction
· Diffraction/Scattering
· Absorption
· VSWR
· VSWR Measurements

Section D: Antennas
· Principals
· Line of Sight/Fresnel Zone
· Obstructions
· Antenna Gain
· Intentional Radiator
· EIRP

Section E: RF Mathematics
· Power Calculation
· Units of Measure
· Power Gain/Loss
· dBm
· dBi
· Sample Calculation

Section F: Spread Spectrum
· Overview
· Narrowband/High Power
· Wideband/Low Power
· Usage
· Wireless LANs
· Wireless PANs
· Wireless MANs

Session 2

Section A: Spread Spectrum Technologies
· FCC Specifications
· FHSS
· FHSS Interference
· FHSS Channel
· Timing
· DSSS
· DSSS Channels
· DSSS Interference

Section B: FHSS vs. DSSS
· Comparison Factors
· Interference/Cost
· Co-location
· Equipment
· Data Rates
· Security
· Standards Support

Section C: Wireless Access Points
· Device Types
· Access Points
· Access Modes
· Access Point Options
· Antenna Options
· Filtering/Modular Cards
· Variable Power/Wired Connectivity
· Mounting Access Points

Section D: Access Point Features
· SOHOs
· Enterprises
· Management

Section E: Client Devices
· LAN Devices
· Adaptors
· USB
· PCI & ISA Adaptors
· Configuring Devices

Section F: Infrastructure Devices
· Wireless Bridges
· Workgroup Bridges
· Common Options
· Residential Gateways
· Enterprise Wireless Gateways
· Device Management

Section G: Antenna Types
· Antenna Selection
· Dipole
· Semidirectional
· Highly Directional

Session 3

Section A: Tuning Antennas
· RF Antenna Concepts
· Polarization
· Antenna Gain/Beamwidth
· Free Space Path Loss
· Installation
· Orientation/Alignment
· Safety

Section B: Power Over Ethernet
· Usage
· Compatibility
· Voltage Pinout Standards

Section C: RF Accessories
· Accessory Types
· RF Amplifier
· RF Attenuators
· Lightning Arrestors
· RF Splitters
· RF Connectors
· RF Cables
· RF Pigtail

Section D: Organizations
· Organizational Roles
· FCC Role
· ISM vs. U-NII
· IEEE
· IEEE 802-11b
· IEEE 802.11a/IEEE 802.11g
· Other Organizations
· Competition

Section E: Locating Access Points
· 802.11 Architectures
· SSIDs
· Beacons
· Passive Scanning
· Active Scanning

Session 4

Section A: Authentication
· Authentication Process
· Association Process
· States
· Authentication Methods
· Authentication Security
· EAP Types
· VPN Solutions

Section B: Service Sets
· Service Sets Overview
· Roaming
· Roaming Standards
· Connections
· Limitations
· Load Balancing

Section C: WAN Communication
· Frames
· Management Frames
· Collision Handling
· Fragmentation
· Fragment Bursting
· DCF & PCF
· Interframe Spacing
· Random Backoff/Slot Time

Section D: Troubleshooting
· RF Environments
· Multipath Problems
· Multipath Solutions
· Hidden Node Problem
· Hidden Node Solutions
· Near/Far Problems
· Near/Far Solution
· Co-location Problems
· Co-location Solutions

Session 5

Section A: WEP/TKIP
· Wireless Security
· WEP
· WEP Attacks
· WEP Implementation
· WEP Keys
· WEP Key Deployment
· Usage
· TKIP

Section B: Security Options
· AES
· Filtering
· SSID Filtering
· MAC Address Filtering
· Protocol Filtering

Section C:Wireless Attacks
· Attacks on Wireless LANs
· Passive Attacks
· Active Attacks
· Jamming
· Man-in-the-Middle Attacks

Section D: Corporate Security Policy
· Security Policies
· Public Wireless Networks
· Security Recommendations

Section E: Site Survey
· Specifications
· Preparation/Facility Analysis
· Networks & Network Needs
· Area Usage & Towers
· Requirements
· Available Resources
· Security Requirements

Section F: Preparation
· Preparation Checklist
· Site Survey Equipment
· Site Survey Kit Checklist
· Gathering RF Information
· Site Survey Reporting
· Additional Information

Download 35 Parts:

01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 | 32 |33 | 34 | 35 |

Wednesday, March 21, 2007

From P2P to Web Services and Grids: Peers in a Client/Server World

From P2P to Web Services and Grids: Peers in a Client/Server World
Pages:275

From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but also other technologies, such as client/server based systems and distributed-object technologies.

A wide range of middleware and application-based technologies are covered, such as Jxta, Jini, Globus, Web services, OGSA, WSRF, SOAP,WSDL, Napster and Gnutella, with emphasis given on the architecture employed and security model chosen. Each technology and its capabilities are analyzed in the context of the degree of centralization or decentralization they employ.

A resulting taxonomy is created giving a context in which to consider the most advanced and broad ranging distributed systems available today, and provides an essential reference text for designing new distributed systems.

Rapidshare