Saturday, January 26

IPv6.Advanced.Protocols.Implementation

This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Specifically, this book engages the readers in advanced topics such as routing, multicasting, DNS, DHCPv6, mobility, and security.
This two-volume series covers a wide spectrum of the IPv6 technology, help the readers establish solid and empirical understanding on IPv6 and the KAME reference implementation paralleled by none.
Key Features:* Extensive code listings with meticulous line-by-line explanation of rationale and use for KAME snapshot implementations on advanced IPv6 related protocols, including:-Unicast and multicast routing and DNS client based on KAME snapshot dated April 2003, which are a base of more recent versions of BSD variants.
Mobile IPv6 based on KAME snapshot dated July 2004, a predecessor version of the "SHISA" implementation-DHCPv6 based on KAME snapshot dated May 2005, a base of the WIDE-DHCPv6 implementation available at SourceForge today.
* Numerous diagrams and illustrations help in visualizing the implementation* In-depth discussion of the standards provides intrinsic understanding of the specifications.
* An introduction to the IP security protocols along with the use of the racoon key exchange daemon* Two CD-ROMs filled with the complete KAME IPv6 protocol stack and FreeBSD software.
*The only authoritative reference "cookbook" for anyone interested in advanced IPv6 topics and protocols. * Line-by-line walk through of real code helps the reader master IPv6 implementation* Comprehensive in scope, based on a working standard, and thoroughly illustrated to bring the protocols alive.

CCNP.BCMSN.Portable.Command.Guide

All the BCMSN 642-812 commands in one compact, portable resourcePreparing for the CCNP® certification? Working as a network professional? Here are all the CCNP-level commands for the BCMSN exam you need in one condensed, portable resource.
The CCNP BCMSN Portable Command Guide is filled with valuable, easy-to-access information and is portable enough for use whether you¡¯re in the server room or the equipment closet.
This book will help you memorize commands and concepts as you work to pass the CCNP BCMSN exam (642-812). The guide summarizes all CCNP certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Sample configurations throughout the book provide you with a better understanding of how these commands are used in simple network designs.
The topics in this portable command guide cover how to do the following:
Implement VLANs
Conduct the operation of Spanning Tree
Protocol and EtherChannel in a hierarchical
network
Implement inter-VLAN routing
Implement gateway redundancy technologies
Describe and configure wireless client access
Describe and configure security features in a switched network
Configure support for voice

Secure.Your.Network.for.Free

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn¡¯t want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.
• Compare Free Solutions with Commercial SolutionsIf you want to stay on the cutting edge, free open source software might be a better path than commercial solutions. • Implement FirewallsLearn about products such as SmoothWall, which turns a PC into a dedicated firewall appliance that is completely configurable without ever logging into the underlying Linux operating system.
• Harden Windows SystemsUsing GPOs is a means to provide centrally managed security configurations to all of your protected hosts.• Configure an Intrusion Detection SystemLearn how to install and configure Snort on both a Windows and a Linux operating system.• Secure Your Event LogsFind out about the tools available for log file collection, generation, import, export, and analysis.
• Determine the Security Status of Your SystemsFind complete coverage of Nessus, one of the best of class free vulnerability scanners.• Collect Data for AnalysisUnderstand sniffing and related tools like NetFlow.
• Keep Your Network Secure with Proper MaintenanceLearn the methods for maintenance, including patching software, upgrading hardware, and keeping IDS and antivirus signatures up to date.
Table of Contents :
Presenting the Business Case for Free
Solutions
Protecting Your PerimeterProtecting Network Resources
Configuring an Intrusion Detection System
Managing Event Logs
Testing and Auditing Your Systems
Network Reporting and Troubleshooting
Security as an Ongoing Process

Windows.Server.2003.Clustering.And.Load.Balancing

Learn to implement clustering and load balancing solutions with Windows 2000 and Windows Server 2003, and deliver nearly 100 percent uptime. With a focus on real world production-based problems, the author delivers detailed high availability solutions that will give you the tools to roll out and troubleshoot these technologies.

Windows.Server.2003 for.Enterprise.Deployments

Discover the fastest way to migrate to Windows Server 2003 and begin to profit from its enterprise-ready features. Learn how to use the parallel network - a migration approach that provides constant rollback and limited impact on your existing network. Build your new network from the ground up. Begin by designing your Enterprise Network Architecture and then move on to feature by feature implementations. Learn to make the most of Active Directory as an object management environment to remotely configure PCs, Servers, Users and Groups.

Download

Securing.Windows.2000.Step.by.Step

This guide is the joint product of a community of Windows security managers and experts, who have voluntarily shared their experiences in this field so that others may benefit. The guide can be used to substantially improve the security of Windows 2000 computers and networks. Download

Windows.Server.2003.Security.Infrastructures

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.
*Explains nuts and bolts of Windows Server 2003 security
*Provides practical insights into how to deploy and administer secure Windows Server 2003
infrastructures
*Draws on the experience of a lead consultant in the Microsoft security area .

Microsoft.Systems.Management.Server.2003.Administrasion

Deliver mission-critical software and updates¡ªand help maximize your organization¡¯s productivity¡ªwith the essential administrator¡¯s reference to planning, deploying, and maintaining Microsoft Systems Management Server 2003. Download

Microsoft.Windows.Small.Business.Server.2003.Administrators.Companion

This comprehensive administrator¡¯s reference delivers the details you need to successfully deploy, manage, and support Microsoft Windows Small Business Server 2003. The authors, experts in Microsoft operating systems and server technologies, provide easy-to-follow procedures, practical workarounds, and key troubleshooting tactics for everyday, on-the-job results. Delve into system features and capabilities¡ªand get hands-on insights for implementing messaging and collaboration, Internet access, data storage, printing, faxing, support for line-of-business applications, and end-to-end network administration for your small business. This book covers all Small Business Server 2003 components, including Microsoft Windows Server™ 2003,Microsoft Exchange Server 2003 technology, Microsoft Office Outlook® 2003, and Windows® SharePoint™ technologies, in a single volume¡ªalong with time-saving tools and scripts for performing security assessments and penetration testing, plus a complete eBook, on CD-ROM. Download

Fedora.6.and.Red.Hat.Enterprise.Linux.Bible

More than a quarter of a million copies sold in previous editions! From home desktop to enterprise server, here's all the Linux you need. With Fedora Core 6, you get the latest Linux technology and previews of upcoming Red Hat Enterprise Linux software. Run Fedora Core 6 live (no install required), install it to hard disk when you're ready, and add hundreds of Fedora Extras packages. Everything comes on the DVD and two CDs included with this book. Use the latest Linux desktop, server, and systems administration features as you learn skills that scale up to professional, commercial-quality Linux systems. Configure Fedora or Red Hat Enterprise Linux to: * Create documents, presentations, and spreadsheets with OpenOffice.org productivity applications * Manage and play music (Rythmbox), video (Totem), and digital images (GIMP) on the desktop * Communicate over the internet using Evolution e-mail, Firefox Web browser, and GAIM instant messanger Try out cutting edge Fedora 6 features: * Add 3D eye candy to your Fedora Desktop with AIGLX * Install Fedora 6 on an Intel-based Mac to dual boot with Mac OS X * Run Xen virtualization for multiple systems on your desktop What's on the DVD and CD-ROMs? * Install the complete Fedora Core 6 from the DVD. * Boot Fedora 6 live and try it before installing it to your hard drive, or run a Fedora network install from CD #1. * Add hundreds of Fedora Extras packages for gaming, multimedia, and more from CD #2. System Requirements: Please see the Preface and Appendix A for details and complete system requirements. Open for more! * Explore the latest Fedora 6 features * Find ten cool things to do with Fedora Linux * Try out the Fedora 6 Quick Install Explore the Latest Fedora 6 Features Intriguing new features for Fedora Linux 6 include support for 3D accelerated desktop animations (with AIGLX) and software from the Mono Project, to run .NET applications created for Windows and Linux systems. Play with 3D desktop animations Experimental 3D software lets you rotate workspaces on a 3D cube, choose 3D minimalize effects, and use 3D fade effects. Run Mono applications in Linux Mono Project software in Fedora will bring thousands of .NET applications in Linux. For now, try Tomboy sticky notes, Beagle desktop search tool, and F-Spot photo manager. Download From Here

Microsoft.Exchange-Server-2007-Administrators-Pocket-Consultant

The fast-answers, daily administration guide to Microsoft Exchange Server 2007. This pocket-sized reference features concise tables, listings, and step-by-step instructions for concise, accurate answers on the spot. Download From Here