Greg Tomsho, “MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory (Exam #70-640) “
MCTS Guide to MicrosoftWindows Server 2008 Active Directory Configuration prepares students to develop the skills needed to manage a Windows Server 2008 system and to prepare to pass the MCTS 70-640 certification exam. While the focus of topics is on the configuration of Active Directory and related services, coverage of Windows foundational topics such as the file system andnetworking are also included. Extensive coverage begins with an introduction to Windows Server 2008 and goes on to active directory design, account management, group policy management and configuration, certificate services, AD LDS, AD RMS, AD FS, server core, Windows Hyper-V virtualization, and server management
برچسب ها: guide، Microsoft Windows Server 2008،
William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
برچسب ها: network، Security،
Probabilistic graphical models and decision graphs are powerful modeling tools for reasoning and decision making under uncertainty. As modeling languages they allow a natural specification of problem domains with inherent uncertainty, and from a computational perspective they support efficient algorithms for automatic construction and query answering. This includes belief updating, finding the most probable explanation for the observed evidence, detecting conflicts in the evidence entered into the network, determining optimal strategies, analyzing for relevance, and performing sensitivity analysis.
برچسب ها: network،
Mega 26 Lab Collections with 47 CDs | 26.11 GB
Train Signals unique method of instructor led training has something for everyone.
Whether you are just starting out and dont have any networking experience or you are a Senior Administrator looking to refresh your skills and learn some new tips and tricks your going to find Train Signals training to be a priceless addition to your repertoire.
ISO Files Under this compilation can be downloaded individually.
Lab 01 – Active Directory (2CD)
Lab 02 – File Servers (2CD)
Lab 03 – Web Servers (2CD)
Lab 04 – DNS Infrastructures (2CD)
Lab 05 – DHCP Servers (2CD)
Lab 06 – WINS Infrastructure (2CD)
Lab 07 – Internet Gateways (1CD)
Lab 08 – Virtual Private Networks (1CD)
Lab 09 – Routers and Packet Filters (1CD)
Lab 10 – Server Security (2CD)
Lab 11 – Network Security (1CD)
Lab 12 – Advanced Security (1CD)
Lab 13 – Windows XP (2CD)
Lab 14 – Group Policy (2CD)
Lab 15 – RIS,Ghost and AD Disaster Recovery (2CD)
Lab 16 – Sites and Services (2CD)
Lab 17 – Exchange Server 2000 (2CD)
Lab 18 – Exchange Server 2003 (2CD)
Lab 19 – Cisco Routing (2CD)
Lab 20 – Wireless Networking (2CD)
Lab 21 – ISA Server 2004 (2CD)
Lab 22 – Linux Networks (2CD)
Lab 23 – CCNP-BSCI (2CD)
Lab 24 – CCNP Switched Networks (2CD)
Lab 25 – CCNP BCRAN (2CD)
Lab 26 – CCNP Cisco Internetwork Troubleshooting (2CD)
MS CCNP BSCI Exam Cram 2
English | AVI | Mpeg4 | 640×480 | 120 Min | 29.970 fps 85 kbps | MP3 128 kbps 48 KHz | 398 MB
Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs!
The CCNP BSCI Exam Cram 2 (Exam 642-801) is focused on what you need to know to pass the CCNP BSCI exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam.
TrainSignal CCNP BSC
برچسب ها: CCNP BSCI Exam،
Cisco ICND2 Exam 640 816 exam | 533 MB
Video: avc1 MPEG4 (H264) .MP4 | 9h | Resolution: 800×600 | Audio: mp4a AAC 44100Hz
The Cisco 640-816 exam is the follow-up exam to ICND1 (640-822).
Passing this exam in conjunction with the ICND1 exam will earn you the CCNA (Cisco Certified Network Associate) certification, which is Cisco’s enterprise network technician certification. In this VTC course, author Greg Dickinson will guide you through the requirements for the ICND2 exam. After following along with him, you should be prepared to pass the exam. To begin learning today, simply click on the movie links.
برچسب ها: Cisco ICND2 Exam،
Cou rse Tech nology | 2010 | ISBN: 1435483774 | 112 pages | PDF | 3,2 MB
Network Safety is a diverse introductory networking book intended for anyone from the average home computer user to an office professional to someone looking to develop a career in information security. This book covers topics such as optimizing resource utilization, sharing infrastructure and making the best of technology. Those looking to learn about an economical balance for networked resources, make the most of the internet and add convenience using technology will benefit from this book. Whether a reader wants to learn about secure banking online, safely accessing work through the internet, or using a computer system at home, Network Safety will keep you up-to-date in this networked world.
برچسب ها: Network5 Safety، Certification،
The practical guide to simulating, detecting, and responding tonetwork attacks
- Create step-by-step testing plans
- Learn to perform social engineering and host reconnaissance
- Evaluate session hijacking methods
- Exploit web server vulnerabilities
- Detect attempts to breach database security
- Use password crackers to obtain access information
- Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches
- Scan and penetrate wireless networks
- Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
- Test UNIX, Microsoft, and Novell servers for vulnerabilities
- Learn the root cause of buffer overflows and how to prevent them
- Perform and prevent Denial of Service attacks
برچسب ها: cisco، IPS، Networking، Security،
The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability.
برچسب ها: IPv6، Networking،
Publisher: O’Rei.,lly Media 2011 | 86 Pages | ISBN: 1449311059 | EPUB + PDF + MOBI | 1 MB + 6 MB + 3 MB
OpenStack was created with the audacious goal of being the ubiquitous software choice for building public and private cloudinfrastructures. In just over a year, it’s become the most talked-about project in open source. This concise book introduces OpenStack’s general design and primary software components in detail, and shows you how to start using it to build cloud infrastructures.
If you’re a developer, technologist, or system administrator familiar with cloud offerings such as Rackspace Cloud or Amazon Web Services, Deploying OpenStack shows you how to obtain and deploy OpenStack software in a few controlled scenarios.
برچسب ها: Amazon، AWS، Cloud، Open Source، OpenStack،
Publisher: Sy.,ngr.,es,.s 2010 | 140 Pages | ISBN: 1597495417 | PDF | 2 MB
Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.Attacks detailed in this book include:
- 802.11 Wireless-Infrastructure Attacks
- 802.11 Wireless-Client Attacks
- Bluetooth Attacks
- RFID Attacks
- Analog Wireless Device Attacks
- Bad Encryption
- Attacks on Cell Phones, PDAs and Other Hybrid Devices
برچسب ها: wireless، Seven Deadliest Wireless،
Microsoft BizTalk is an integration and connectivity server solution that allows businesses to connect disparate systems easily. In today’s business climate of mergers and acquisitions, more and more enterprises are forced to exchange data across disparate Line of Business systems using integration brokers like BizTalk Server 2010. What is often overlooked when integrating these systems is the pre-requisite knowledge that ERP and CRMsystems demand in order to effectively integrate them. No longer is this knowledge locked up in the heads of expensive consultants. Gain an edge within your organization by developing valuable skills in the area of Line of Business integration from this book.
برچسب ها: AppFabric، BizTalk، Business، microsoft، sql، WCF، Windows Azure،
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists.
- Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and decipheringTCP/IP.
- The current and future states of network forensics analysis tools are addressed.
- The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
برچسب ها: Cloud، Computing، internet، Networking، TCP/IP،
The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight
Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.
In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”
Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”
برچسب ها: academy، advanced، Architecture، Business، Cloud، Data، Experience، guide، IBM، Management، Marketing، master، new، Performance، Security، Service، Software، Unlock، Unlocking، web،
The complete reference guide to the hot technology of cloudcomputingIts potential for lowering IT costs makes cloudcomputing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office WebApps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you’ll be using or implementing cloud computing.
- Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularity is expected to skyrocket when Microsoft introduces Office Web Apps
- This comprehensive guide helps define what cloud computing is and thoroughly explores the technologies, protocols, platforms and infrastructure that make it so desirable
- Covers mobile cloud computing, a significant area due to ever-increasing cell phone and smartphone use
- Focuses on the platforms and technologies essential to cloud computing
Anyone involved with planning, implementing, using, or maintaining a cloud computing project will rely on the information in Cloud Computing Bible.
برچسب ها: Amazon، Cloud، google، microsoft، Web Services،
Beginning Database Design: From Novice to Professional, 2 edition جمعه 3 شهریور 1391
Fundamentals of Robotic Mechanical Systems: Theory, Methods, and Algorithms - 3rd edition جمعه 3 شهریور 1391
Ian H. Witten, “Data Mining: Practical Machine Learning Tools and Techniques” جمعه 3 شهریور 1391
Algorithms and Computation جمعه 3 شهریور 1391
Oracle Business Intelligence Enterprise Edition 11g: A Hands-On Tutorial شنبه 28 مرداد 1391
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook شنبه 28 مرداد 1391
Windows Phone 7.5: Building Location-aware Applications شنبه 28 مرداد 1391
Mastering Prezi for Business Presentations شنبه 28 مرداد 1391
Node Cookbook شنبه 28 مرداد 1391
Oracle Database XE 11gR2 Jump Start Guide پنجشنبه 26 مرداد 1391
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology پنجشنبه 26 مرداد 1391
Joomla! Search Engine Optimization پنجشنبه 26 مرداد 1391
Drupal 7 Cookbook پنجشنبه 26 مرداد 1391
لیست آخرین پستها