Xem 1-20 trên 815 kết quả Your network
  • Welcome to Network Access Control For Dummies. It's a scary networking world out there, and this book provides you with a working reference for understanding and deploying what type of network access control (NAC) is best suited for your network and you. Because you're holding this book, you already know that security issues exist out there — and you've probably, maybe frantically, attempted to protect the network you're responsible for from the scenarios that get printed on the front page....

    doc251p thangnguyen0704 28-02-2013 51 16   Download

  • This is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn how to break into someone else’s system as well, and therein lies much of the controversy surrounding hacking.

    pdf495p maiphuong 11-08-2009 261 136   Download

  • Orion Network Performance Monitor (Orion NPM) delivers comprehensive fault and network performance management that scales with rapid network growth and expands with your network monitoring needs, allowing you to collect and view availability and realtime and historical statistics directly from your web browser. While monitoring, collecting, and analyzing data from routers, switches, firewalls, servers, and any other SNMP-enabled devices, Orion NPM successfully offers you a simple-to-use, scalable network monitoring solution for IT professionals juggling any size network....

    pdf360p caothang2609 19-06-2010 351 112   Download

  • Administering Cisco QoS in IP Networks discusses IP Quality of Service (QoS) and how it applies to Enterprise and Service Provider environments. It reviews routing protocols and quality of service mechanisms available today on Cisco network devices (routers, switches, etc.).This guide provides examples and exercises for a hands-on experience to give you the background and necessary details to implement these capabilities in your network today.

    pdf561p daokim 10-08-2009 294 83   Download

  • Tham khảo sách 'hack proofing your network', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf495p nguyen2 10-11-2009 107 61   Download

  • Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.

    pdf2690p muathu_102 28-01-2013 72 44   Download

  • Longhorn, Windows Vista, and WindowsXP-sp2 that allow a computer administrator to develop and enforce compliance with health policies for network access and communication. NAP provides administrator-defined requirements for system health policy enforcement that help ensure computers connecting to a network or communicates on a network meet these policy requirements. NAP also provides an Application Programming Interface (API) to help administrators, developers and vendors enforce compliance with health policies for network access and communication....

    pdf9p huyhoang 06-08-2009 172 30   Download

  • This chapter covers the actual process of sitting down and designing your OSPF network. The real process of putting the pen to paper and the true process behind it is covered. It is this chapter's intention to take the mystery out of designing any type of network. The concepts and steps discussed have universal application whether your network is BGP or OSPF; of course, the latter is emphasized. Chapter 6, "Advanced OSPF Design Concepts," covered many of the commands necessary for configuring OSPF.

    pdf58p laquang 03-09-2009 96 28   Download

  • While I was writing this document a book "Hack Proofing Your Network" was released. I haven't been able to read it (dunno if its in print yet, and besides - everything takes a while to get to South Africa). I did however read the first chapter, as it is available to the public. In this chapter the author writes about different views on IT security - hackers, crackers, script kiddies and everything in between. I had some thoughts about this and decided that it was a good starting point for this document....

    pdf82p duypha 07-08-2009 129 27   Download

  • The objectives of this course are to introduce you to the fundamentals and benefits of using tcpdump as a tool to analyze your network traffic. We’ll start with introducing concepts and output of tcpdump. One of the most important aspects of using tcpdump is being able to write tcpdump filters to look for specific traffic. Filter writing is fairly basic unless you want to examine fields in an IP datagram that don’t fall on byte boundaries. So, that is why an entire section is devoted to the art of writing filters....

    pdf76p huyhoang 07-08-2009 149 27   Download

  • Configuring and Testing Your Network. Learning Objectives Upon completion of this chapter, you will be able to: Define the role of the InternetworkOperating System (IOS). Define the purpose of a configuration file. Identify several classes of devices that have the IOS embedded. Identify the factors contributing to the set of IOS commands available to a device. Identify the IOS modes of operation. Identify the basic IOS commands. Compare and contrast the basic show commands.

    pdf65p thanhtung_hk 03-11-2010 89 27   Download

  • Tham khảo tài liệu 'chapter 11 - configuring and testing your network', tài liệu phổ thông, tin học phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf70p thangvu89 15-04-2010 62 21   Download

  • If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue! A network will make your life easier, and Home Networking All-In-One Desk Reference For Dummies makes it easier to create one.

    pdf723p stingdau_123 21-01-2013 37 18   Download

  • An unauthorized DHCP server may either lease incorrect IP addresses to clients or negatively acknowledging DHCP clients. Clients that obtain a configuration lease from the unauthorized server can fail to locate valid domain controllers, preventing clients from successfully logging on to the network. For the directory authorization process to work properly, it is necessary that the first DHCP server introduced on to your network participate in the Active Directory service. The server must be installed as either a domain controller or a member server.

    pdf54p batoan 07-08-2009 97 17   Download

  • The Oracle Advanced Networking Option is an optional product that provides enhanced functionality to SQL*Net and Net8. Its set of features provides enhanced security and authentication to your network and enables integration with a Distributed Computing Environment (DCE). This guide provides generic information on all these features of the Advanced Networking Option. For information about installation of the Oracle Advanced Networking Option and platform-specific details of the configuration and use of its features, refer also to your Oracle platform-specific documentation....

    pdf186p kieuoanh 12-08-2009 60 13   Download

  • Learning Objectives Learning Objectives Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter Explain Windows 2000 capabilities as a server operating system

    pdf11p batoan 07-08-2009 121 10   Download

  • You just received another late evening page from the help desk. “I have a problem with my network access, it just doesn’t work!” What should you do next? Troubleshoot! Troubleshooting is a necessary part of supporting any network installation. Determining and repairing problems can consume a lot of time, especially if you don’t know what to do or how to do it correctly and quickly. In this paper, I will explain how you might consider troubleshooting different problems that could exist in your network.

    pdf13p huyhoang 06-08-2009 49 9   Download

  • Reduce costs; increase revenues; satisfy customers—the tenets of service providers as they balance today’s tenuous financial climate with the promise of next-generation products and services. And as networks migrate and expand to include more complex services, reliability and flexibility become even more vital to their success. That is why digital system cross-connect (DSX) solutions remain the best option for connecting network elements.

    pdf4p halanh 13-08-2009 76 5   Download

  • Upon completing this module, you will be able to: Use the command-line interface to accurately determine network operational status and network performance Manage operating system image files to maintain an accessible operating system file and according to best practices, given a network topology Use Cisco IOS commands to manage device configuration files to reduce device downtime and according to best practices Execute an add, move, or change so that the network functions in accordance with the new requirement, given a new network requirement...

    ppt15p trinhvang 25-01-2013 16 5   Download

  • To help ensure security, passwords should be used carefully. These recommendations will help protect your passwords: • Never write down your password. • Never share your password with anyone. • Never use your network logon password for another purpose. • Use different passwords for your network logon and the Administrator account on your computer. • Change your network password every 60 to 90 days or as often as required in your specific environment. • Change your password immediately if you think it has been compromised....

    doc4p maiyeuanh_10081990 10-04-2013 26 5   Download

Đồng bộ tài khoản