مشاهده نسخه کامل : دانلود بهترين كتاب الكترونيكي راهنماي قطعات شبكه network device guid

04-01-09, 23:12
Only the registered members can see the link (Only the registered members can see the link)

Only the registered members can see the link (Only the registered members can see the link) دانلود با حجم 1.350 مگابايت (Only the registered members can see the link)

09-01-09, 16:40
Only the registered members can see the link
Creative and Innovative Network Management (Nato Series)
By Macedonia) NATO Advanced Networking Workshop on Creative and Innovative Network Management (2000 : Ohrid

* Publisher: IOS Press
* Number Of Pages: 159
* Publication Date: 2003-08
* ISBN-10 / ASIN: 1586033409
* ISBN-13 / EAN: 9781586033408
* Binding: Hardcover

Product Description:

Research and education are essential and critical factors for the development of any society, particularly the information society, which is based on the free flow of information and knowledge. The prosperity of the citizens in this type of society is a function of the scientific research, the technological development and the general education. They include a wide variety of skills and problem solving methods and techniques that give rise to the appropriate professional performance and competence. Networking methods and the evolving needs for competence on all levels of life demand flexibility and adaptability of the education systems. Every country's authority should promote networking at all levels of the education process in order to create a suitable environment for life-long learning.
Code: Only the registered members can see the link

09-01-09, 16:41
Only the registered members can see the link
Network Security Fundamentals
By Gert DeLaet, Gert Schauwers

* Publisher: Cisco Press
* Number Of Pages: 480
* Publication Date: 2004-09-18
* ISBN-10 / ASIN: 1587051672
* ISBN-13 / EAN: 9781587051678

Product Description:

An introduction to the key tools and technologies used to secure network access

* Examine common security vulnerabilities and the defenses used to protect network resources
* Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates
* Learn how to design, adopt, and enforce security policies
* Evaluate the nuances of secure network design
* Secure HTTP traffic by hardening operating systems, servers, and browsers
* Protect routers through administrative access policies and services
* Understand what firewalls do and how to implement them to maximum effect
* Inspect and monitor network activity with IDS
* Utilize VPNs for secure remote access
* Learn about PKI technologies
* Examine secure wireless design techniques
* Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions.

Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems.

Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies.

Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.
Code: Only the registered members can see the link

09-01-09, 16:41
Guide to Computer Network Security

Only the registered members can see the link
Only the registered members can see the link
Author: Joseph Migga Kizza
Hardcover: 576 pages
Publisher: Springer; 1 edition (December 17, 2008)
Language: English
ISBN-10: 184800916X
ISBN-13: 978-1848009165
Format: pdf
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to suffer at the hands of cyber criminals, vandals and hackers.
This authoritative Guide to Computer Network Security explores computer network infrastructures and protocol design security flaws, and discusses current security solutions and best practices in both fixed and mobile computer networks. The book broadly surveys thought-provoking security issues, discussing and raising questions about the impact of new technologies and protocols (with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies). It further explores the security threats and vulnerabilities in the current network infrastructure and protocols, and outlines current security efforts. The text assumes a modest familiarity with basic computer programming and networking.

Only the registered members can see the link
Code: Only the registered members can see the link