Xem 1-20 trên 538 kết quả Enterprise Networks
  • This book is designed to be a definitive work for your use in understanding the concepts of protection, the terminology and pieces of the demilitarized zone (DMZ) structure, and design of the DMZ for the enterprise.A DMZ is a method of providing segregation of networks and services that need to be provided to users, visitors, or part- ners through the use of firewalls and multiple layers of filtering and control to protect internal systems.

    pdf0p trannhu 08-08-2009 89 20   Download

  • How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. ...

    pdf248p stingdau_123 19-01-2013 22 4   Download

  • Today, there is an ever-growing dependency on computer networks for business transac- tions. With the free flow of information and the high availability of many resources, managers of enterprise networks have to understand all the possible threats to their networks. These threats take many forms, but all result in loss of privacy to some degree and possibly malicious destruction of information or resources that can lead to large monetary losses.

    pdf49p cao_can 02-01-2013 17 2   Download

  • In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).

    pdf157p youcanletgo_01 04-01-2016 7 2   Download

  • In this chapter, you learned to: Describe the general methods used to mitigate security threats to Enterprise networks, configure Basic Router Security, explain how to disable unused Cisco router network services and interfaces, explain how to use Cisco SDM, manage Cisco IOS devices.

    ppt30p youcanletgo_01 30-12-2015 4 1   Download

  • We would like to acknowledge the following people for their kindness and support in making this book possible. Richard Kristof, Duncan Anderson, David Marini, Jennifer Gould, Kevin Murray, Dale Leatherwood, Laura Cervoni, and Rhonda Harmon of Global Knowledge, for their generous access to the IT industry’s best courses, instructors, and training facilities. Ralph Troupe, Rhonda St. John, Emlyn Rhodes, and the team at Callisma for their invaluable insight into the challenges of designing, deploying and supporting worldclass enterprise networks....

    pdf561p trinhhiephoa 30-12-2010 80 33   Download

  • Network Security. Objectives: In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).

    pdf61p thanhtung_hk 05-11-2010 197 25   Download

  • Objectives In this chapter, you will learn to: Describe how the Cisco enterprise architecture provides integrated services over an enterprise network. Describe key WAN technology concepts. Select the appropriate WAN technology to meet different enterprise business requirements.

    pdf45p thanhtung_hk 05-11-2010 81 20   Download

  • The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies.

    pdf2793p truongnghen 21-01-2013 48 17   Download

  • Each partition is logically isolated from the others, and must provide the same services that are available in a traditional dedicated enterprise network. The end user experience should be as if connected to a dedicated network providing privacy, security, an independent set of policies, service level, and even routing decisions. At the same time, the network administrator can easily create and modify virtual work environments for various user groups, and adapt to changing business requirements adequately.

    pdf160p minhthanh 11-08-2009 91 15   Download

  • The iPhone and iPad have made a powerful impact on the business world. Developers creating iOS apps for the enterprise face unique challenges involving networking, system integration, security, and device management. This Wrox guide provides everything you need to know to write iOS apps that integrate with enterprise network resources, providing options for networking iOS devices to enterprise systems and to each other.

    pdf364p titatu_123 01-03-2013 41 15   Download

  • This document provides network architects with a general understanding of how to leverage network virtualization to make a centralized NAC Appliance deployment easier. This document allows the network architect to select a design and reference the specific implementation details in the associated design guides. The foundation technologies associated with enterprise network virtualization architecture are divided into the following three functional areas: • Access control • Path isolation • Services edge...

    pdf14p batoan 10-08-2009 86 13   Download

  • This document provides design recommendations, configuration examples, and scalability test results for implementing a next-generation WAN for Voice and Video Enabled IPsec VPN (V3PN) based on a service provider WAN interface handoff using Ethernet at the enterprise campus and branch locations. This document provides the enterprise network manager with configuration and performance guidance to successfully implement or migrate to a WAN architecture using Ethernet as an access technology to a service provider network....

    pdf73p batoan 11-08-2009 99 13   Download

  • Module 2- Configuring EIGRP in an Enterprise Network

    pdf0p danhson1409 02-12-2010 32 7   Download

  • Wireless mesh networks (WMNs) have recently received a great deal of attention as a promising cost-effective solution to provide coverage and broadband wireless connectivity for mobile users to get access to different IP applications and services. The factor that has helped WMNs become attractive is the wide application prospects from the wireless community, home and enterprise networking.

    pdf260p orchid_1 17-09-2012 32 7   Download

  • Learn how to integrate iPhone, iPod touch, and iPad with your enterprise systems. This guide is for system administrators. It provides information about deploying and supporting iPhone, iPod touch, and iPad in enterprise environments.

    pdf90p tailieuvip13 19-07-2012 21 6   Download

  • CHALLENGE A major global enterprise-network service provider needs to deploy both metro- and regional-access rings to meet a customer’s demand for a highly reliable network to support critical enterprise applications. This includes interconnection of its mainframe systems and storagearea networks. STRATEGY Engage a professional services partner with in-depth technical expertise and proven experience to complete the project on-time, on-budget while delivering superior quality to meet the end customer’s needs.

    pdf4p thuyvan 13-08-2009 61 5   Download

  • The purpose of this paper is to define the issues related to optimizing an enterprise network, identify several new network technologies related to networking, and draw some conclusions on how best to satisfy the requirements defined. The paper uses the following format: 1. Definition of roles and examples of the relationship of corporate objectives and goals to network technology and optimization 2. Mission-critical network technology examples 3.

    pdf16p thuyvan 12-08-2009 72 3   Download

  • Cisco Unified Contact Center Enterprise (UCCE) integrates multiple components and can serve a wide spectrum of business requirements. In this book, Gary Ford, an experienced Cisco UCCE consultant brings together all the guidance you need to optimally configure and manage UCCE in any environment. The author shares in-depth insights covering both the enterprise and hosted versions of UCCE. He presents an administrator’s view of how to perform key UCCE tasks and why they work as they do.

    pdf306p stingdau_123 26-01-2013 25 3   Download

  • This chapter describe how a hierarchical network model is used to design networks; Explain the structured engineering principles for network design: Hierarchy, Modularity, Resiliency, Flexibility; Describe the three layers of a hierarchical network and how they are used in network design;...

    pdf31p kiepnaybinhyen_02 29-12-2015 12 2   Download

Đồng bộ tài khoản