تبلیغات
Computer Book - مطالب شبکه

Greg Tomsho, “MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory (Exam #70-640) “

نوشته شده در تاریخ : جمعه 8 مهر 1390   06:18 ق.ظ

نوع مطلب :شبکه ،

 MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory (Exam #70 640)
C..rse T..chnology | 2009 | ISBN: 1423902351 | 656 pages | PDF | 28,8 MB

MCTS Guide to MicrosoftWindows Server 2008 Active Directory Configuration prepares students to develop the skills needed to manage a Windows Server 2008 system and to prepare to pass the MCTS 70-640 certification exam. While the focus of topics is on the configuration of Active Directory and related services, coverage of Windows foundational topics such as the file system andnetworking are also included. Extensive coverage begins with an introduction to Windows Server 2008 and goes on to active directory design, account management, group policy management and configuration, certificate services, AD LDS, AD RMS, AD FS, server core, Windows Hyper-V virtualization, and server management


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: guide، Microsoft Windows Server 2008،

(Cryptography and Network Security: Principles and Practice (5th Edition

نوشته شده در تاریخ : یکشنبه 27 شهریور 1390   05:55 ب.ظ

نوع مطلب :امنیت ،شبکه ،

 Cryptography and Network Security: Principles and Practice (5th Edition)
Pren tice H all | 2010 | ISBN: 0136097049 | 744 pages | PDF | 8 MB

William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: network، Security،

Bayesian Networks and Decision Graphs

نوشته شده در تاریخ : دوشنبه 21 شهریور 1390   03:05 ب.ظ

نوع مطلب :شبکه ،

26511389659 Bayesian Networks and Decision Graphs
Springer | 2007-06-06 | ISBN: 0387682813 | 448 pages | PDF | 2,7 MB

Probabilistic graphical models and decision graphs are powerful modeling tools for reasoning and decision making under uncertainty. As modeling languages they allow a natural specification of problem domains with inherent uncertainty, and from a computational perspective they support efficient algorithms for automatic construction and query answering. This includes belief updating, finding the most probable explanation for the observed evidence, detecting conflicts in the evidence entered into the , determining optimal strategies, analyzing for relevance, and performing sensitivity analysis.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: network،

Mega 26 Lab Collections with 47 CDs | 26.11 GB

نوشته شده در تاریخ : سه شنبه 8 شهریور 1390   06:30 ق.ظ

نوع مطلب :Cisco ،امنیت ،شبکه ،فیلم های آموزشی ،

Mega 26 Lab Collections with 47 CDs | 26.11 GB

Train Signals unique method of instructor led training has something for everyone.

Whether you are just starting out and dont have any networking experience or you are a Senior Administrator looking to refresh your skills and learn some new tips and tricks your going to find Train Signals training to be a priceless addition to your repertoire.

ISO Files Under this compilation can be downloaded individually.

Lab 01 – Active Directory (2CD)
Lab 02 – File Servers (2CD)
Lab 03 – Web Servers (2CD)
Lab 04 – DNS Infrastructures (2CD)
Lab 05 – DHCP Servers (2CD)
Lab 06 – WINS Infrastructure (2CD)
Lab 07 – Internet Gateways (1CD)
Lab 08 – Virtual Private Networks (1CD)
Lab 09 – Routers and Packet Filters (1CD)
Lab 10 – Server Security (2CD)
Lab 11 – Network Security (1CD)
Lab 12 – Advanced Security (1CD)
Lab 13 – Windows XP (2CD)
Lab 14 – Group Policy (2CD)
Lab 15 – RIS,Ghost and AD Disaster Recovery (2CD)
Lab 16 – Sites and Services (2CD)
Lab 17 – Exchange Server 2000 (2CD)
Lab 18 – Exchange Server 2003 (2CD)
Lab 19 – Cisco Routing (2CD)
Lab 20 – Wireless Networking (2CD)
Lab 21 – ISA Server 2004 (2CD)
Lab 22 – Linux Networks (2CD)
Lab 23 – CCNP-BSCI (2CD)
Lab 24 – CCNP Switched Networks (2CD)
Lab 25 – CCNP BCRAN (2CD)
Lab 26 – CCNP Cisco Internetwork Troubleshooting (2CD)


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری



MS CCNP BSCI Exam Cram 2

نوشته شده در تاریخ : دوشنبه 7 شهریور 1390   10:46 ب.ظ

نوع مطلب :Cisco ،امنیت ،شبکه ،


MS CCNP BSCI Exam Cram 2
English | AVI | Mpeg4 | 640×480 | 120 Min | 29.970 fps 85 kbps | MP3 128 kbps 48 KHz | 398 MB
Genre: Elearning

Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs!
The CCNP BSCI Exam Cram 2 (Exam 642-801) is focused on what you need to know to pass the CCNP BSCI exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam.
TrainSignal CCNP BSC


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: CCNP BSCI Exam،

Cisco ICND2 Exam 640 816 exam | 533 MB

نوشته شده در تاریخ : دوشنبه 7 شهریور 1390   10:27 ب.ظ

نوع مطلب :شبکه ،Cisco ،


Cisco ICND2 Exam 640 816 exam | 533 MB 
Video: avc1 MPEG4 (H264) .MP4 | 9h | Resolution: 800×600 | Audio: mp4a AAC 44100Hz
Genre: eLearning

The Cisco 640-816 exam is the follow-up exam to ICND1 (640-822).
Passing this exam in conjunction with the ICND1 exam will earn you the CCNA (Cisco Certified Network Associate) certification, which is Cisco’s enterprise network technician certification. In this VTC course, author Greg Dickinson will guide you through the requirements for the ICND2 exam. After following along with him, you should be prepared to pass the exam. To begin learning today, simply click on the movie links.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Cisco ICND2 Exam،

Network Safety: Network5 Safety Certification

نوشته شده در تاریخ : پنجشنبه 3 شهریور 1390   04:31 ب.ظ

نوع مطلب :شبکه ،گواهینامه / آموزش ،

001d2590 Network Safety: Network5 Safety Certification
EC-Council, “Network Safety: Network5 Safety Certification” 
Cou rse Tech nology | 2010 | ISBN: 1435483774 | 112 pages | PDF | 3,2 MB

Network Safety is a diverse introductory  book intended for anyone from the average home computer user to an office professional to someone looking to develop a career in information security. This book covers topics such as optimizing resource utilization, sharing infrastructure and making the best of technology. Those looking to learn about an economical balance for networked resources, make the most of the internet and add convenience using technology will benefit from this book. Whether a reader wants to learn about secure banking online, safely accessing work through the internet, or using a computer system at home, Network Safety will keep you up-to-date in this networked world.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Network5 Safety، Certification،

Penetration Testing and Network Defense

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   05:23 ب.ظ

نوع مطلب :امنیت ،شبکه ،

26511389672 Penetration Testing and Network Defense

Book Description

The practical guide to simulating, detecting, and responding to attacks

  • Create step-by-step testing plans
  • Learn to perform social engineering and host reconnaissance
  • Evaluate session hijacking methods
  • Exploit web  vulnerabilities
  • Detect attempts to breach database 
  • Use password crackers to obtain access information
  • Circumvent Intrusion Prevention Systems () and firewall protections and disrupt the service of routers and switches
  • Scan and penetrate wireless networks
  • Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
  • Test UNIX, Microsoft, and Novell servers for vulnerabilities
  • Learn the root cause of buffer overflows and how to prevent them
  • Perform and prevent Denial of Service attacks

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: cisco، IPS، Networking، Security،

Top-Down Network Design, 3rd Edition

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   05:22 ب.ظ

نوع مطلب :توسعه نرم افزار ،شبکه ،

26511389673 Top Down Network Design, 3rd Edition

Book Description

Objectives
The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, , and manageability.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: IPv6، Networking،

Deploying OpenStack

نوشته شده در تاریخ : چهارشنبه 19 مرداد 1390   04:12 ب.ظ

نوع مطلب :Cloud ،شبکه ،

813192573 Deploying OpenStack
Deploying  By Ken Pepple
Publisher: O’Rei.,lly Media 2011 | 86 Pages | ISBN: 1449311059 | EPUB + PDF + MOBI | 1 MB + 6 MB + 3 MB

OpenStack was created with the audacious goal of being the ubiquitous software choice for building public and private infrastructures. In just over a year, it’s become the most talked-about project in . This concise book introduces OpenStack’s general design and primary software components in detail, and shows you how to start using it to build cloud infrastructures.
If you’re a developer, technologist, or system administrator familiar with cloud offerings such as Rackspace Cloud or  Web Services, Deploying OpenStack shows you how to obtain and deploy OpenStack software in a few controlled scenarios.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Amazon، AWS، Cloud، Open Source، OpenStack،

Seven Deadliest Wireless Technologies Attacks

نوشته شده در تاریخ : شنبه 15 مرداد 1390   04:58 ب.ظ

نوع مطلب :شبکه ،

001cd3e5 Seven Deadliest Wireless Technologies Attacks
Seven Deadliest  Technologies Attacks By Brad Haines
Publisher: Sy.,ngr.,es,.s 2010 | 140 Pages | ISBN: 1597495417 | PDF | 2 MB

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.Attacks detailed in this book include:

  • 802.11 Wireless-Infrastructure Attacks
    • 802.11 Wireless-Client Attacks
    • Bluetooth Attacks
    • RFID Attacks
    • Analog Wireless Device Attacks
    • Bad Encryption
    • Attacks on Cell Phones, PDAs and Other Hybrid Devices

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: wireless، Seven Deadliest Wireless،

Microsoft BizTalk 2010: Line of Business Systems Integration

نوشته شده در تاریخ : پنجشنبه 13 مرداد 1390   10:23 ب.ظ

نوع مطلب :تجارت ،شبکه ،

6456821671 Microsoft BizTalk 2010: Line of Business Systems Integration

Book Description

  is an integration and connectivity server solution that allows businesses to connect disparate systems easily. In today’s  climate of mergers and acquisitions, more and more enterprises are forced to exchange data across disparate Line of  systems using integration brokers like BizTalk Server 2010. What is often overlooked when integrating these systems is the pre-requisite knowledge that ERP and systems demand in order to effectively integrate them. No longer is this knowledge locked up in the heads of expensive consultants. Gain an edge within your organization by developing valuable skills in the area of Line of  integration from this book.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: AppFabric، BizTalk، Business، microsoft، sql، WCF، Windows Azure،

Digital Forensics for Network, Internet, and Cloud Computing

نوشته شده در تاریخ : یکشنبه 9 مرداد 1390   05:47 ق.ظ

نوع مطلب :Cloud ،شبکه ،

1579002072 Digital Forensics for Network, Internet, and Cloud Computing

Book Description
 forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from  traffic. This book will help  and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in -based technology (e.g.,  networks,  , telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists.

  • Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering.
  • The current and future states of network forensics analysis tools are addressed.
  • The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Cloud، Computing، internet، Networking، TCP/IP،

The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight

نوشته شده در تاریخ : شنبه 8 مرداد 1390   10:51 ب.ظ

نوع مطلب :Cloud ،شبکه ،توسعه وب ،

1132 The Art of Enterprise Information Architecture: A Systems Based Approach for Unlocking Business Insight

Book Description
 for the Intelligent Enterprise: Powerful  Ways to Maximize the Real-time Value of Information

Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of , analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.

In this book, a team of IBM’s leading information management experts  you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”

Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically  the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”

Coverage Includes


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: academy، advanced، Architecture، Business، Cloud، Data، Experience، guide، IBM، Management، Marketing، master، new، Performance، Security، Service، Software، Unlock، Unlocking، web،

Cloud Computing Bible

نوشته شده در تاریخ : شنبه 8 مرداد 1390   06:13 ب.ظ

645682167125 Cloud Computing Bible

Book Description

The complete reference guide to the hot technology of computingIts potential for lowering IT costs makes computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you’ll be using or implementing cloud computing.

  • Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularity is expected to skyrocket when  introduces Office Web Apps
  • This comprehensive guide helps define what cloud computing is and thoroughly explores the technologies, protocols, platforms and infrastructure that make it so desirable
  • Covers mobile cloud computing, a significant area due to ever-increasing cell phone and smartphone use
  • Focuses on the platforms and technologies essential to cloud computing

Anyone involved with planning, implementing, using, or maintaining a cloud computing project will rely on the information in Cloud Computing Bible.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Amazon، Cloud، google، microsoft، Web Services،
  • تعداد کل: 5 
  • 1  
  • 2  
  • 3  
  • 4  
  • 5