Opis
książki
:
Cisco Cookbook
While several publishers (including O'Reilly) supply excellent documentation of router features, the trick is knowing when, why, and how to use these features There are often many different ways to solve any given networking problem using Cisco devices, and some solutions are clearly more effective than others. The pressing question for a network engineer is which of the many potential solutions is the most appropriate for a particular situation. Once you have decided to use a particular feature, how should you implement it? Unfortunately, the documentation describing a particular command or feature frequently does very little to answer either of these questions.Everybody who has worked with Cisco routers for any length of time has had to ask their friends and co-workers for example router configuration files that show how to solve a common problem. A good working configuration example can often save huge amounts of time and frustration when implementing a feature that you've never used before. The Cisco Cookbook gathers hundreds of example router configurations all in one place.As the name suggests, Cisco Cookbook is organized as a series of recipes. Each recipe begins with a problem statement that describes a common situation that you might face. After each problem statement is a brief solution that shows a sample router configuration or script that you can use to resolve this particular problem. A discussion section then describes the solution, how it works, and when you should or should not use it. The chapters are organized by the feature or protocol discussed. If you are looking for information on a particular feature such as NAT, NTP or SNMP, you can turn to that chapter and find a variety of related recipes. Most chapters list basic problems first, and any unusual or complicated situations last.The Cisco Cookbook will quickly become your "go to" resource for researching and solving complex router configuration issues, saving you time and making your network more efficient. It covers:
- Router Configuration and File Management
- Router Management
- User Access and Privilege Levels
- TACACS+
- IP Routing
- RIP
- EIGRP
- OSPF
- BGP
- Frame Relay
- Queueing and Congestion
- Tunnels and VPNs
- Dial Backup
- NTP and Time
- DLSw
- Router Interfaces and Media
- Simple Network Management Protocol
- Logging
- Access Lists
- DHCP
- NAT
- Hot Standby Router Protocol
- IP Multicast
Wybrane bestsellery
-
Promocja
Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly.Tha- ePub + Mobi 177 pkt
(120,78 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł (-15%) -
Dlatego właśnie napisano tę książkę. Na szczęście większość zadań konfiguracyjnych może zostać podzielona na kilka niezależnych etapów -- konfigurację interfejsu, mechanizmów obsługi protokołów routingu, łączy zapasowych, implementację algorytmów, filtrowania pakietów i włączanie innych systemów kontroli dostępu.
- Druk 149 pkt
Czasowo niedostępna
-
Promocja
This unique book offers a vendor-neutral approach for designing large local area networks according to business or organizational needs, rather than from a product perspective. Author and independent network design consultant Kevin Dooley outlines "top-down network design" for building a technological infrastructure to fit your organization's requi- ePub + Mobi 169 pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
Promocja
MikroTik, łotewska firma z siedzibą w Rydze, od lat produkuje sprzęt sieciowy. Przystępna cena i świetna jakość sprawiły, że urządzenia sygnowane logo MikroTik zdobyły niezwykłą popularność - po produkty łotewskiej marki sięga się coraz częściej. Jeśli planujesz zmodernizować lub zbudować sieć i chcesz w tym celu użyć urządzeń MikroTik, ta książka Ci w tym pomoże.- PDF + ePub + Mobi
- Druk 39 pkt
(37,89 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł (-50%) -
Promocja
Bezpieczeństwo sieci Cisco. Kurs video. Podstawy kryptografii, zabezpieczenia urządzeń i obsługa Kali Linux powstał z myślą o administratorach rozpoczynających przygodę z bezpieczeństwem w sieciach komputerowych. Zapewnia on praktyczną wiedzę o bezpieczeństwie sieci. Jeśli chcesz wejść w świat technologii Cisco Security i nauczyć się blokować ataki hakerów podczas tego szkolenia zyskasz solidne podstawy praktyczne oraz teoretyczne.- Videokurs 266 pkt
(39,90 zł najniższa cena z 30 dni)
266.00 zł
760.00 zł (-65%) -
Promocja
Description This simple, well organized book provides the theory as well as the practical aspects of computer network. It covers the pillars of a computer network, like transmission, data transfer, and communication. It covers foundational concepts, explaining the OSI and TCP/IP models, digital transmission, interfaces, modems, and media characteri- ePub + Mobi 80 pkt
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
Cisco CCNP Enterprise [350-401 ENCOR] jest certyfikatem, który odzwierciedla szeroką wiedzę zdającego – zarówno teoretyczną, jak i praktyczną. Trzeba się bowiem legitymować naprawdę szerokimi umiejętnościami, by zdobyć ten certyfikat. Ze względu na obszerność tematu kurs przygotowujący do egzaminu został podzielony na kilka części – to szkolenie jest ósmą odsłoną cyklu. Tym razem skupiamy się na kwestiach związanych z programowaniem i automatyzacją sieci komputerowych, istotnych przede wszystkim dla osób, które nadzorują pracę urządzeń sieciowych i konfigurują sprzęt sieciowy, opierając się na poszczególnych warstwach modelu OSI – czyli dla administratorów sieci komputerowych.- Videokurs 245 pkt
(39,90 zł najniższa cena z 30 dni)
245.00 zł
490.00 zł (-50%) -
Promocja
Kurs stworzony z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR] został – ze względu na dużą objętość materiału – podzielony na kilka części. Wynika to ze specyfiki samego egzaminu, który obejmuje niezwykle szeroki zakres tematyczny – zarówno w części teoretycznej, jak i praktycznej. Certyfikat zaświadcza więc o tym, że jego posiadacz dysponuje naprawdę zaawansowaną wiedzą na temat zagadnień związanych z administrowaniem sieciami komputerowymi i ich budową. Doceniają to także pracodawcy, a ponieważ bez sieci komputerowych trudno wyobrazić sobie w XXI wieku jakąkolwiek działalność, prawdziwi specjaliści mogą przebierać w ofertach.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Po omówieniu w poprzednich częściach serii kursów zagadnień dotyczących redundancji, routingu EIGRP, zabezpieczania sieci, konfiguracji protokołu routingu OSPF i sieci WAN w ramach tego szkolenia przedstawiamy tajniki działania, konfiguracji i testowania sieci Wi-Fi w przedsiębiorstwie. Cisco CCNP Enterprise (350-401 ENCOR). Kurs video. Część 6. Sieci bezprzewodowe i przeprowadzanie testów przygotowaliśmy przede wszystkim z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR], ale z zawartej tu wiedzy z powodzeniem skorzystają wszyscy zainteresowani tematyką sieci komputerowych. A ponieważ technologia nieustannie ewoluuje, zdobywanie na bieżąco nowych wiadomości jest konieczne, aby nie zostać z tyle i nadążać za dynamicznie zmieniającą się rzeczywistością. Nie maleje zatem na rynku pracy zapotrzebowanie na wykwalifikowanych specjalistów – w ofertach mogą przebierać zwłaszcza ci, których wiedza i umiejętności są poparte certyfikatem. Do szczególnie cenionych certyfikatów należy właśnie Cisco CCNP Enterprise [350-401 ENCOR], którego otrzymanie jest poprzedzone niezwykle obszernym egzaminem, obejmującym zarówno liczne zagadnienia teoretyczne, jak i – przede wszystkim – wiedzę dotyczącą sieciowej praktyki. Właśnie ta obfitość zagadnień jest powodem, dla którego kurs przygotowawczy został podzielony na kilka części.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Cisco CCNP Enterprise 350-401 ENCOR. Kurs video. Sieci WLAN i routing pomiędzy oddziałami jest kolejnym z serii szkoleń przeznaczonych dla administratorów sieci. W poprzednich omówione zostały zagadnienia związane między innymi z redundancją w warstwach drugiej i trzeciej, routingiem EIGRP, zabezpieczaniem sieci i konfiguracją protokołu routingu OSPF. Kurs został przygotowany głównie z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR], ale zawarta w nim wiedza przyda się wszystkim zajmującym się zagadnieniem sieci komputerowych. A jest to wiedza bardzo szeroka, co więcej, jej obszar szybko się powiększa, bo sieci podlegają nieustannym zmianom, związanym choćby z wprowadzaniem nowych technologii. Stąd nieustanne zapotrzebowanie na specjalistów na rynku pracy – w ofertach mogą przebierać zwłaszcza ci, których wiedza i umiejętności są poparte certyfikatem.- Videokurs 245 pkt
(39,90 zł najniższa cena z 30 dni)
245.00 zł
490.00 zł (-50%) -
Promocja
CCNP Enterprise (350-401 ENCOR). Kurs video. Część 4. Zaawansowana konfiguracja protokołu routingu OSPF to kolejna część szkolenia przeznaczonego dla administratorów sieci i osób zainteresowanych zdobyciem certyfikatu Cisco CCNP Enterprise. W poprzednich omówione zostały między innymi zagadnienia redundancji w warstwie trzeciej i drugiej, list dostępu, budowy i zabezpieczania sieci. Ta część natomiast skupia się na kwestii konfiguracji protokołu routingu OSPF, któremu poświęca się sporo miejsca na egzaminie certyfikującym. Jest to także niezwykle popularny protokół, często stosowany w sieciach komputerowych – nie tylko tych używających sprzętu firmy Cisco.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Umiejętność budowy sieci komputerowych i zarządzania nimi jest niezwykle ceniona na rynku pracy. Specjaliści w tej dziedzinie mogą przebierać w ofertach i nic nie wskazuje, by miało się to w najbliższym czasie zmienić. Nic dziwnego – sieci komputerowe mają dla sprawnego funkcjonowania organizacji fundamentalne znaczenie. Tym bardziej w czasach, w których szybki przepływ informacji i sprawna komunikacja są ważniejsze niż kiedykolwiek. Jednak sieć sieci nierówna – a ponieważ płyną przez nią dane wrażliwe i poufne, niebywale istotne jest, by powierzyć ją wykwalifikowanemu i godnemu zaufania specjaliście, który zadba należycie o jej bezpieczeństwo. Dobrze więc posiadać twarde umiejętności potwierdzone odpowiednim certyfikatem – a Cisco CCNP Enterprise [350-401 ENCOR] jest jednym z najbardziej znanych i renomowanych.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Cisco CCNP Enterprise [350-401 ENCOR] to bardzo ceniony na rynku egzamin certyfikacyjny poświadczający znajomość konstruowania sieci z wykorzystaniem sprzętu renomowanej firmy Cisco. Egzamin jest niebywale obszerny i obejmuje zarówno zagadnienia praktyczne, jak i teoretyczne; kładzie nacisk na umiejętność kojarzenia faktów i wyciągania logicznych wniosków, a nie tylko mechaniczne zapamiętywanie określonych czynności. Aby móc z dumą nazywać się prawdziwym sieciowcem, nie można jedynie wiedzieć, gdzie i jak podłączyć router, trzeba jeszcze mieć świadomość, dlaczego należy to zrobić właśnie tak.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%)
Kup polskie wydanie:
Ebooka "Cisco Cookbook" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Cisco Cookbook" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Cisco Cookbook" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły książki
- ISBN Ebooka:
- 978-14-493-9095-2, 9781449390952
- Data wydania ebooka :
- 2003-07-24 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 2MB
- Rozmiar pliku Mobi:
- 7MB
Spis treści książki
- Cisco Cookbook
- A Note Regarding Supplemental Files
- Preface
- Organization
- Whats in This Book
- Conventions
- Comments and Questions
- Acknowledgments
- Kevin Dooley
- Ian J. Brown
- 1. Router Configuration and File Management
- 1.0. Introduction
- 1.1. Configuring the Router via TFTP
- Problem
- Solution
- Discussion
- See Also
- 1.2. Saving Router Configuration to Server
- Problem
- Solution
- Discussion
- See Also
- 1.3. Booting the Router Using a Remote Configuration File
- Problem
- Solution
- Discussion
- See Also
- 1.4. Storing Configuration Files Larger than NVRAM
- Problem
- Solution
- Discussion
- See Also
- 1.5. Clearing the Startup Configuration
- Problem
- Solution
- Discussion
- See Also
- 1.6. Loading a New IOS Image
- Problem
- Solution
- Discussion
- See Also
- 1.7. Booting a Different IOS Image
- Problem
- Solution
- Discussion
- See Also
- 1.8. Booting Over the Network
- Problem
- Solution
- Discussion
- See Also
- 1.9. Copying an IOS Image to a Server
- Problem
- Solution
- Discussion
- See Also
- 1.10. Copying an IOS Image Through the Console
- Problem
- Solution
- Discussion
- 1.11. Deleting Files from Flash
- Problem
- Solution
- Discussion
- See Also
- 1.12. Partitioning Flash
- Problem
- Solution
- Discussion
- See Also
- 1.13. Using the Router as a TFTP Server
- Problem
- Solution
- Discussion
- See Also
- 1.14. Using FTP from the Router
- Problem
- Solution
- Discussion
- See Also
- 1.15. Generating Large Numbers of Router Configurations
- Problem
- Solution
- Discussion
- See Also
- 1.16. Changing the Configurations of Many Routers at Once
- Problem
- Solution
- Discussion
- See Also
- 1.17. Extracting Hardware Inventory Information
- Problem
- Solution
- Discussion
- See Also
- 1.18. Backing Up Router Configurations
- Problem
- Solution
- Discussion
- See Also
- 2. Router Management
- 2.0. Introduction
- 2.1. Creating Command Aliases
- Problem
- Solution
- Discussion
- 2.2. Managing the Routers ARP Cache
- Problem
- Solution
- Discussion
- 2.3. Tuning Router Buffers
- Problem
- Solution
- Discussion
- 2.4. Using the Cisco Discovery Protocol
- Problem
- Solution
- Discussion
- See Also
- 2.5. Disabling the Cisco Discovery Protocol
- Problem
- Solution
- Discussion
- See Also
- 2.6. Using the Small Servers
- Problem
- Solution
- Discussion
- See Also
- 2.7. Enabling HTTP Access to a Router
- Problem
- Solution
- Discussion
- See Also
- 2.8. Using Static Hostname Tables
- Problem
- Solution
- Discussion
- See Also
- 2.9. Enabling Domain Name Service
- Problem
- Solution
- Discussion
- See Also
- 2.10. Disabling Domain Name Lookups
- Problem
- Solution
- Discussion
- See Also
- 2.11. Specifying a Router Reload Time
- Problem
- Solution
- Discussion
- See Also
- 2.12. Creating Exception Dump Files
- Problem
- Solution
- Discussion
- See Also
- 2.13. Generating a Report of Interface Information
- Problem
- Solution
- Discussion
- See Also
- 2.14. Generating a Report of Routing Table Information
- Problem
- Solution
- Discussion
- See Also
- 2.15. Generating a Report of ARP Table Information
- Problem
- Solution
- Discussion
- See Also
- 2.16. Generating a Server Host Table File
- Problem
- Solution
- Discussion
- See Also
- 3. User Access and Privilege Levels
- 3.0. Introduction
- 3.1. Setting Up User IDs
- Problem
- Solution
- Discussion
- See Also
- 3.2. Encrypting Passwords
- Problem
- Solution
- Discussion
- See Also
- 3.3. Using Better Encryption Techniques
- Problem
- Solution
- Discussion
- See Also
- 3.4. Removing Passwords from a Router Configuration File
- Problem
- Solution
- Discussion
- See Also
- 3.5. Deciphering Ciscos Weak Password Encryption
- Problem
- Solution
- Discussion
- See Also
- 3.6. Displaying Active Users
- Problem
- Solution
- Discussion
- See Also
- 3.7. Sending Messages to Other Users
- Problem
- Solution
- Discussion
- See Also
- 3.8. Changing the Number of VTYs
- Problem
- Solution
- Discussion
- See Also
- 3.9. Changing VTY Timeouts
- Problem
- Solution
- Discussion
- See Also
- 3.10. Restricting VTY Access by Protocol
- Problem
- Solution
- Discussion
- See Also
- 3.11. Enabling Absolute Timeouts on VTY Lines
- Problem
- Solution
- Discussion
- See Also
- 3.12. Implementing Banners
- Problem
- Solution
- Discussion
- See Also
- 3.13. Disabling Banners on a Port
- Problem
- Solution
- Discussion
- See Also
- 3.14. Disabling Router Lines
- Problem
- Solution
- Discussion
- See Also
- 3.15. Reserving a VTY Port for Administrative Access
- Problem
- Solution
- Discussion
- See Also
- 3.16. Restricting Inbound Telnet Access
- Problem
- Solution
- Discussion
- See Also
- 3.17. Logging Telnet Access
- Problem
- Solution
- Discussion
- See Also
- 3.18. Setting the Source Address for Telnet
- Problem
- Solution
- Discussion
- 3.19. Automating the Login Sequence
- Problem
- Solution
- Discussion
- See Also
- 3.20. Using SSH for Secure Access
- Problem
- Solution
- Discussion
- See Also
- 3.21. Changing the Privilege Level of IOS Commands
- Problem
- Solution
- Discussion
- See Also
- 3.22. Defining Per-User Privileges
- Problem
- Solution
- Discussion
- See Also
- 3.23. Defining Per-Port Privileges
- Problem
- Solution
- Discussion
- See Also
- 4. TACACS+
- 4.0. Introduction
- 4.1. Authenticating Login IDs from a Central System
- Problem
- Solution
- Discussion
- See Also
- 4.2. Restricting Command Access
- Problem
- Solution
- Discussion
- See Also
- 4.3. Losing Access to the TACACS+ Server
- Problem
- Solution
- Discussion
- See Also
- 4.4. Disabling TACACS+ Authentication on a Particular Line
- Problem
- Solution
- Discussion
- See Also
- 4.5. Capturing User Keystrokes
- Problem
- Solution
- Discussion
- See Also
- 4.6. Logging System Events
- Problem
- Solution
- Discussion
- See Also
- 4.7. Setting the IP Source Address for TACACS+ Messages
- Problem
- Solution
- Discussion
- See Also
- 4.8. Obtaining Free TACACS+ Server Software
- Problem
- Solution
- Discussion
- See Also
- 4.9. Sample Server Configuration Files
- Problem
- Solution
- Discussion
- See Also
- 5. IP Routing
- 5.0. Introduction
- Unregistered Addresses
- 5.1. Finding an IP Route
- Problem
- Solution
- Discussion
- 5.2. Finding Types of IP Routes
- Problem
- Solution
- Discussion
- 5.3. Converting Different Mask Formats
- Problem
- Solution
- Discussion
- 5.4. Using Static Routing
- Problem
- Solution
- Discussion
- See Also
- 5.5. Floating Static Routes
- Problem
- Solution
- Discussion
- See also
- 5.6. Using Policy-Based Routing to Route Based on Source Address
- Problem
- Solution
- Discussion
- See Also
- 5.7. Using Policy-Based Routing to Route Based on Application Type
- Problem
- Solution
- Discussion
- See Also
- 5.8. Examining Policy-Based Routing
- Problem
- Solution
- Discussion
- See Also
- 5.9. Changing Administrative Distances
- Problem
- Solution
- Discussion
- See Also
- 5.10. Routing Over Multiple Paths with Equal Costs
- Problem
- Solution
- Discussion
- 5.0. Introduction
- 6. RIP
- 6.0. Introduction
- 6.1. Configuring RIP Version 1
- Problem
- Solution
- Discussion
- See Also
- 6.2. Filtering Routes with RIP
- Problem
- Solution
- Discussion
- See Also
- 6.3. Redistributing Static Routes into RIP
- Problem
- Solution
- Discussion
- See Also
- 6.4. Redistributing Routes Using Route Maps
- Problem
- Solution
- Discussion
- See Also
- 6.5. Creating a Default Route in RIP
- Problem
- Solution
- Discussion
- See Also
- 6.6. Disabling RIP on an Interface
- Problem
- Solution
- Discussion
- See Also
- 6.7. Unicast Updates for RIP
- Problem
- Solution
- Discussion
- See Also
- 6.8. Applying Offsets to Routes
- Problem
- Solution
- Discussion
- 6.9. Adjusting Timers
- Problem
- Solution
- Discussion
- See Also
- 6.10. Configuring Interpacket Delay
- Problem
- Solution
- Discussion
- See Also
- 6.11. Enabling Triggered Updates
- Problem
- Solution
- Discussion
- See Also
- 6.12. Increasing the RIP Input Queue
- Problem
- Solution
- Discussion
- See Also
- 6.13. Configuring RIP Version 2
- Problem
- Solution
- Discussion
- 6.14. Enabling RIP Authentication
- Problem
- Solution
- Discussion
- See Also
- 6.15. RIP Route Summarization
- Problem
- Solution
- Discussion
- 6.16. Route Tagging
- Problem
- Solution
- Discussion
- See Also
- 7. EIGRP
- 7.0. Introduction
- 7.1. Configuring EIGRP
- Problem
- Solution
- Discussion
- See Also
- 7.2. Filtering Routes with EIGRP
- Problem
- Solution
- Discussion
- See Also
- 7.3. Redistributing Routes into EIGRP
- Problem
- Solution
- Discussion
- See Also
- 7.4. Redistributing Routes into EIGRP Using Route Maps
- Problem
- Solution
- Discussion
- See Also
- 7.5. Creating a Default Route in EIGRP
- Problem
- Solution
- Discussion
- See Also
- 7.6. Disabling EIGRP on an Interface
- Problem
- Solution
- Discussion
- See Also
- 7.7. EIGRP Route Summarization
- Problem
- Solution
- Discussion
- See Also
- 7.8. Adjusting EIGRP Metrics
- Problem
- Solution
- Discussion
- 7.9. Adjusting Timers
- Problem
- Solution
- Discussion
- See Also
- 7.10. Enabling EIGRP Authentication
- Problem
- Solution
- Discussion
- See Also
- 7.11. Logging EIGRP Neighbor State Changes
- Problem
- Solution
- Discussion
- See Also
- 7.12. Limiting EIGRPs Bandwidth Utilization
- Problem
- Solution
- Discussion
- See Also
- 7.13. EIGRP Stub Routing
- Problem
- Solution
- Discussion
- See Also
- 7.14. Route Tagging
- Problem
- Solution
- Discussion
- See Also
- 7.15. Viewing EIGRP Status
- Problem
- Solution
- Discussion
- 8. OSPF
- 8.0. Introduction
- 8.1. Configuring OSPF
- Problem
- Solution
- Discussion
- 8.2. Filtering Routes in OSPF
- Problem
- Solution
- Discussion
- See Also
- 8.3. Adjusting OSPF Costs
- Problem
- Solution
- Discussion
- 8.4. Creating a Default Route in OSPF
- Problem
- Solution
- Discussion
- See Also
- 8.5. Redistributing Static Routes into OSPF
- Problem
- Solution
- Discussion
- 8.6. Redistributing External Routes into OSPF
- Problem
- Solution
- Discussion
- See Also
- 8.7. Manipulating DR Selection
- Problem
- Solution
- Discussion
- See Also
- 8.8. Setting the OSPF RID
- Problem
- Solution
- Discussion
- See Also
- 8.9. Enabling OSPF Authentication
- Problem
- Solution
- Discussion
- See Also
- 8.10. Selecting the Appropriate Area Types
- Problem
- Solution
- Discussion
- See Also
- 8.11. Summarizing Routes in OSPF
- Problem
- Solution
- Discussion
- See Also
- 8.12. Disabling OSPF on Certain Interfaces
- Problem
- Solution
- Discussion
- 8.13. OSPF Route Tagging
- Problem
- Solution
- Discussion
- See Also
- 8.14. Logging OSPF Adjacency Changes
- Problem
- Solution
- Discussion
- See Also
- 8.15. Adjusting OSPF Timers
- Problem
- Solution
- Discussion
- See Also
- 8.16. Viewing OSPF Status with Domain Names
- Problem
- Solution
- Discussion
- See Also
- 8.17. Debugging OSPF
- Problem
- Solution
- Discussion
- 9. BGP
- 9.0. Introduction
- Basic Terminology
- BGP Attributes
- Route Selection
- 9.1. Configuring BGP
- Problem
- Solution
- Discussion
- See Also
- 9.2. Using eBGP Multihop
- Problem
- Solution
- Discussion
- See Also
- 9.3. Adjusting the Next-Hop Attribute
- Problem
- Solution
- Discussion
- 9.4. Connecting to Two ISPs
- Problem
- Solution
- Discussion
- See Also
- 9.5. Connecting to Two ISPs with Redundant Routers
- Problem
- Solution
- Discussion
- See Also
- 9.6. Restricting Networks Advertised to a BGP Peer
- Problem
- Solution
- Discussion
- See Also
- 9.7. Adjusting Local Preference Values
- Problem
- Solution
- Discussion
- See Also
- 9.8. Load Balancing
- Problem
- Solution
- Discussion
- 9.9. Removing Private ASNs from the AS Path
- Problem
- Solution
- Discussion
- 9.10. Filtering BGP Routes Based on AS Paths
- Problem
- Solution
- Discussion
- See Also
- 9.11. Reducing the Size of the Received Routing Table
- Problem
- Solution
- Discussion
- See Also
- 9.12. Summarizing Outbound Routing Information
- Problem
- Solution
- Discussion
- See Also
- 9.13. Prepending ASNs to the AS Path
- Problem
- Solution
- Discussion
- See Also
- 9.14. Redistributing Routes with BGP
- Problem
- Solution
- Discussion
- See Also
- 9.15. Using Peer Groups
- Problem
- Solution
- Discussion
- 9.16. Authenticating BGP Peers
- Problem
- Solution
- Discussion
- See Also
- 9.17. Putting It All Together
- Problem
- Solution
- Discussion
- See Also
- 9.0. Introduction
- 10. Frame Relay
- 10.0. Introduction
- Frame Relay QoS Features
- 10.1. Setting Up Frame Relay with Point-to-Point Subinterfaces
- Problem
- Solution
- Discussion
- See Also
- 10.2. Adjusting LMI Options
- Problem
- Solution
- Discussion
- 10.3. Setting Up Frame Relay with Map Statements
- Problem
- Solution
- Discussion
- See Also
- 10.4. Using Multipoint Subinterfaces
- Problem
- Solution
- Discussion
- See Also
- 10.5. Configuring Frame Relay SVCs
- Problem
- Solution
- Discussion
- See Also
- 10.6. Simulating a Frame Relay Cloud
- Problem
- Solution
- Discussion
- See Also
- 10.7. Compressing Frame Relay Data on a Subinterface
- Problem
- Solution
- Discussion
- See Also
- 10.8. Compressing Frame Relay Data with Maps
- Problem
- Solution
- Discussion
- See Also
- 10.9. Viewing Frame Relay Status Information
- Problem
- Solution
- Discussion
- 10.0. Introduction
- 11. Queueing and Congestion
- 11.0. Introduction
- Queueing Algorithms
- Fast Switching
- 11.1. Fast Switching and CEF
- Problem
- Solution
- Discussion
- 11.2. Setting the DSCP or TOS Field
- Problem
- Solution
- Discussion
- See Also
- 11.3. Using Priority Queueing
- Problem
- Solution
- Discussion
- See Also
- 11.4. Using Custom Queueing
- Problem
- Solution
- Discussion
- 11.5. Using Custom Queues with Priority Queues
- Problem
- Solution
- Discussion
- See Also
- 11.6. Using Weighted Fair Queueing
- Problem
- Solution
- Discussion
- See Also
- 11.7. Using Class-Based Weighted Fair Queueing
- Problem
- Solution
- Discussion
- See Also
- 11.8. Controlling Congestion with WRED
- Problem
- Solution
- Discussion
- See Also
- 11.9. Using RSVP
- Problem
- Solution
- Discussion
- See Also
- 11.10. Using Generic Traffic Shaping
- Problem
- Solution
- Discussion
- See Also
- 11.11. Using Frame-Relay Traffic Shaping
- Problem
- Solution
- Discussion
- See Also
- 11.12. Using Committed Access Rate
- Problem
- Solution
- Discussion
- 11.13. Implementing Standards-Based Per-Hop Behavior
- Problem
- Solution
- Discussion
- See Also
- 11.14. Viewing Queue Parameters
- Problem
- Solution
- Discussion
- 11.0. Introduction
- 12. Tunnels and VPNs
- 12.0. Introduction
- 12.1. Creating a Tunnel
- Problem
- Solution
- Discussion
- See Also
- 12.2. Tunneling Foreign Protocols in IP
- Problem
- Solution
- Discussion
- See Also
- 12.3. Tunneling with Dynamic Routing Protocols
- Problem
- Solution
- Discussion
- See Also
- 12.4. Viewing Tunnel Status
- Problem
- Solution
- Discussion
- See Also
- 12.5. Creating an Encrypted Router-to-Router VPN
- Problem
- Solution
- Discussion
- See Also
- 12.6. Generating RSA Keys
- Problem
- Solution
- Discussion
- See Also
- 12.7. Creating a Router-to-Router VPN with RSA Keys
- Problem
- Solution
- Discussion
- See Also
- 12.8. Creating a VPN Between a Workstation and a Router
- Problem
- Solution
- Discussion
- See Also
- 12.9. Check IPSec Protocol Status
- Problem
- Solution
- Discussion
- 13. Dial Backup
- 13.0. Introduction
- Analog Modems
- Switched 56Kbps Digital Service
- ISDN
- Estimating How Many Dialup Lines You Need
- 13.1. Automating Dial Backup
- Problem
- Solution
- Discussion
- See Also
- 13.2. Using Dialer Interfaces
- Problem
- Solution
- Discussion
- See Also
- 13.3. Using an Async Modem on the AUX Port
- Problem
- Solution
- Discussion
- See Also
- 13.4. Using Backup Interfaces
- Problem
- Solution
- Discussion
- See Also
- 13.5. Using Dialer Watch
- Problem
- Solution
- Discussion
- See Also
- 13.6. Ensuring Proper Disconnection
- Problem
- Solution
- Discussion
- 13.7. View Dial Backup Status
- Problem
- Solution
- Discussion
- 13.8. Debugging Dial Backup
- Problem
- Solution
- Discussion
- 13.0. Introduction
- 14. NTP and Time
- 14.0. Introduction
- 14.1. Timestamping Router Logs
- Problem
- Solution
- Discussion
- 14.2. Setting the Time
- Problem
- Solution
- Discussion
- 14.3. Setting the Time Zone
- Problem
- Solution
- Discussion
- See Also
- 14.4. Adjusting for Daylight Saving Time
- Problem
- Solution
- Discussion
- See Also
- 14.5. Synchronizing the Time on All Routers (NTP)
- Problem
- Solution
- Discussion
- 14.6. Configuring NTP Redundancy
- Problem
- Solution
- Discussion
- 14.7. Setting the Router as the NTP Master for the Network
- Problem
- Solution
- Discussion
- See Also
- 14.8. Changing NTP Synchronization Periods
- Problem
- Solution
- Discussion
- 14.9. Using NTP to Send Periodic Broadcast Time Updates
- Problem
- Solution
- Discussion
- See also
- 14.10. Using NTP to Send Periodic Multicast Time Updates
- Problem
- Solution
- Discussion
- See Also
- 14.11. Enabling and Disabling NTP Per Interface
- Problem
- Solution
- Discussion
- See Also
- 14.12. NTP Authentication
- Problem
- Solution
- Discussion
- 14.13. Limiting the Number of Peers
- Problem
- Solution
- Discussion
- See Also
- 14.14. Restricting Peers
- Problem
- Solution
- Discussion
- See Also
- 14.15. Setting the Clock Period
- Problem
- Solution
- Discussion
- 14.16. Checking the NTP Status
- Problem
- Solution
- Discussion
- 14.17. Debugging NTP
- Problem
- Solution
- Discussion
- 15. DLSw
- 15.0. Introduction
- Service Access Points (SAP and LSAP)
- Explorers and RIFs
- Cisco IOS Code Sets
- 15.1. Configuring DLSw
- Problem
- Solution
- Discussion
- The peers
- Ring groups, ring numbers, and bridge numbers
- Explorer options
- Other features
- 15.2. Using DLSw to Bridge Between Ethernet and Token Ring
- Problem
- Solution
- Discussion
- Ethernet II or 802.3 framing
- See Also
- 15.3. Converting Ethernet and Token Ring MAC Addresses
- Problem
- Solution
- Discussion
- See Also
- 15.4. Configuring SDLC
- Problem
- Solution
- Discussion
- See Also
- 15.5. Configuring SDLC for Multidrop Connections
- Problem
- Solution
- Discussion
- See Also
- 15.6. Using STUN
- Problem
- Solution
- Discussion
- See Also
- 15.7. Using BSTUN
- Problem
- Solution
- Discussion
- See Also
- 15.8. Controlling DLSw Packet Fragmentation
- Problem
- Solution
- Discussion
- See Also
- 15.9. Tagging DLSw Packets for QoS
- Problem
- Solution
- Discussion
- See Also
- 15.10. Supporting SNA Priorities
- Problem
- Solution
- Discussion
- See Also
- 15.11. DLSw+ Redundancy and Fault Tolerance
- Problem
- Solution
- Discussion
- See Also
- 15.12. Viewing DLSw Status Information
- Problem
- Solution
- Discussion
- See Also
- 15.13. Viewing SDLC Status Information
- Problem
- Solution
- Discussion
- See Also
- 15.14. Debugging DSLw
- Problem
- Solution
- Discussion
- See Also
- 15.0. Introduction
- 16. Router Interfaces and Media
- 16.0. Introduction
- 16.1. Viewing Interface Status
- Problem
- Solution
- Discussion
- See Also
- 16.2. Configuring Serial Interfaces
- Problem
- Solution
- Discussion
- See Also
- 16.3. Using an Internal T1 CSU/DSU
- Problem
- Solution
- Discussion
- See Also
- 16.4. Using an Internal ISDN PRI Module
- Problem
- Solution
- Discussion
- See Also
- 16.5. Using an Internal 56Kbps CSU/DSU
- Problem
- Solution
- Discussion
- See Also
- 16.6. Configuring an Async Serial Interface
- Problem
- Solution
- Discussion
- See Also
- 16.7. Configuring ATM Subinterfaces
- Problem
- Solution
- Discussion
- See Also
- 16.8. Setting Payload Scrambling on an ATM Circuit
- Problem
- Solution
- Discussion
- See Also
- 16.9. Configuring Ethernet Interface Features
- Problem
- Solution
- Discussion
- 16.10. Configuring Token Ring Interface Features
- Problem
- Solution
- Discussion
- See Also
- 16.11. Connecting VLAN Trunks With ISL
- Problem
- Solution
- Discussion
- See Also
- 16.12. Connecting VLAN Trunks with 802.1Q
- Problem
- Solution
- Discussion
- See Also
- 17. Simple Network Management Protocol
- 17.0. Introduction
- SNMP Management Model
- MIBs and OIDs
- 17.1. Configuring SNMP
- Problem
- Solution
- Discussion
- See Also
- 17.2. Extracting Router Information via SNMP Tools
- Problem
- Solution
- Discussion
- See Also
- 17.3. Recording Important Router Information for SNMP Access
- Problem
- Solution
- Discussion
- See Also
- 17.4. Extracting Inventory Information from a List of Routers with SNMP
- Problem
- Solution
- Discussion
- See Also
- 17.5. Using Access Lists to Protect SNMP Access
- Problem
- Solution
- Discussion
- See Also
- 17.6. Logging Unauthorized SNMP Attempts
- Problem
- Solution
- Discussion
- See Also
- 17.7. Limiting MIB Access
- Problem
- Solution
- Discussion
- See Also
- 17.8. Using SNMP to Modify a Routers Running Configuration
- Problem
- Solution
- Discussion
- See Also
- 17.9. Using SNMP to Copy a New IOS Image
- Problem
- Solution
- Discussion
- See Also
- 17.10. Using SNMP to Perform Mass Configuration Changes
- Problem
- Solution
- Discussion
- See Also
- 17.11. Preventing Unauthorized Configuration Modifications
- Problem
- Solution
- Discussion
- See Also
- 17.12. Making Interface Table Numbers Permanent
- Problem
- Solution
- Discussion
- See Also
- 17.13. Enabling SNMP Traps and Informs
- Problem
- Solution
- Discussion
- See Also
- 17.14. Sending syslog Messages as SNMP Traps and Informs
- Problem
- Solution
- Discussion
- See Also
- 17.15. Setting SNMP Packet Size
- Problem
- Solution
- Discussion
- 17.16. Setting SNMP Queue Size
- Problem
- Solution
- Discussion
- 17.17. Setting SNMP Timeout Values
- Problem
- Solution
- Discussion
- 17.18. Disabling Link Up/Down Traps per Interface
- Problem
- Solution
- Discussion
- See Also
- 17.19. Setting the IP Source Address for SNMP Traps
- Problem
- Solution
- Discussion
- 17.20. Using RMON to Send Traps
- Problem
- Solution
- Discussion
- See Also
- 17.21. Enabling SNMPv3
- Problem
- Solution
- Discussion
- Using the SNMPv3 Security Levels
- See Also
- 17.22. Using SAA
- Problem
- Solution
- Discussion
- 17.0. Introduction
- 18. Logging
- 18.0. Introduction
- 18.1. Enabling Local Router Logging
- Problem
- Solution
- Discussion
- See Also
- 18.2. Setting the Log Size
- Problem
- Solution
- Discussion
- See Also
- 18.3. Clearing the Routers Log
- Problem
- Solution
- Discussion
- 18.4. Sending Log Messages to Your Screen
- Problem
- Solution
- Discussion
- 18.5. Using a Remote Log Server
- Problem
- Solution
- Discussion
- See Also
- 18.6. Enabling Syslog on a Unix Server
- Problem
- Solution
- Discussion
- See Also
- 18.7. Changing the Default Log Facility
- Problem
- Solution
- Discussion
- See Also
- 18.8. Restricting What Log Messages Are Sent to the Server
- Problem
- Solution
- Discussion
- 18.9. Setting the IP Source Address for Syslog Messages
- Problem
- Solution
- Discussion
- See Also
- 18.10. Logging Router Syslog Messages in Different Files
- Problem
- Solution
- Discussion
- See Also
- 18.11. Maintaining Syslog Files on the Server
- Problem
- Solution
- Discussion
- 18.12. Testing the Syslog Sever Configuration
- Problem
- Solution
- Discussion
- See Also
- 18.13. Preventing the Most Common Messages from Being Logged
- Problem
- Solution
- Discussion
- 18.14. Rate-Limiting Syslog Traffic
- Problem
- Solution
- Discussion
- 19. Access Lists
- 19.0. Introduction
- 19.1. Filtering by Source or Destination IP Address
- Problem
- Solution
- Discussion
- See Also
- 19.2. Adding a Comment to an ACL
- Problem
- Solution
- Discussion
- See Also
- 19.3. Filtering by Application
- Problem
- Solution
- Discussion
- See Also
- 19.4. Filtering Based on TCP Header Flags
- Problem
- Solution
- Discussion
- See Also
- 19.5. Restricting TCP Session Direction
- Problem
- Solution
- Discussion
- See Also
- 19.6. Filtering Multiport Applications
- Problem
- Solution
- Discussion
- See Also
- 19.7. Filtering Based on DSCP and TOS
- Problem
- Solution
- Discussion
- See Also
- 19.8. Logging when an Access List Is Used
- Problem
- Solution
- Discussion
- See Also
- 19.9. Logging TCP Sessions
- Problem
- Solution
- Discussion
- See Also
- 19.10. Analyzing ACL Log Entries
- Problem
- Solution
- Discussion
- See Also
- 19.11. Using Named and Reflexive Access Lists
- Problem
- Solution
- Discussion
- See Also
- 19.12. Dealing with Passive Mode FTP
- Problem
- Solution
- Discussion
- See Also
- 19.13. Using Context-Based Access Lists
- Problem
- Solution
- Discussion
- See Also
- 20. DHCP
- 20.0. Introduction
- 20.1. Using IP Helper Addresses for DHCP
- Problem
- Solution
- Discussion
- See Also
- 20.2. Limiting the Impact of IP Helper Addresses
- Problem
- Solution
- Discussion
- See Also
- 20.3. Using DHCP to Dynamically Configure Router IP Addresses
- Problem
- Solution
- Discussion
- 20.4. Dynamically Allocating Client IP Addresses via DHCP
- Problem
- Solution
- Discussion
- See Also
- 20.5. Defining DHCP Configuration Options
- Problem
- Solution
- Discussion
- See Also
- 20.6. Defining DHCP Lease Periods
- Problem
- Solution
- Discussion
- See Also
- 20.7. Allocating Static IP Addresses with DHCP
- Problem
- Solution
- Discussion
- See Also
- 20.8. Configuring a DHCP Database Client
- Problem
- Solution
- Discussion
- See Also
- 20.9. Configuring Multiple DHCP Servers per Subnet
- Problem
- Solution
- Discussion
- See Also
- 20.10. Showing DHCP Status
- Problem
- Solution
- Discussion
- See Also
- 20.11. Debugging DHCP
- Problem
- Solution
- Discussion
- 21. NAT
- 21.0. Introduction
- 21.1. Configuring Basic NAT Functionality
- Problem
- Solution
- Discussion
- 21.2. Allocating External Addresses Dynamically
- Problem
- Solution
- Discussion
- See Also
- 21.3. Allocating External Addresses Statically
- Problem
- Solution
- Discussion
- See Also
- 21.4. Translating Some Addresses Statically and Others Dynamically
- Problem
- Solution
- Discussion
- See Also
- 21.5. Translating in Both Directions Simultaneously
- Problem
- Solution
- Discussion
- See Also
- 21.6. Rewriting the Network Prefix
- Problem
- Solution
- Discussion
- 21.7. Adjusting NAT Timers
- Problem
- Solution
- Discussion
- See Also
- 21.8. Changing TCP Ports for FTP
- Problem
- Solution
- Discussion
- 21.9. Checking NAT Status
- Problem
- Solution
- Discussion
- 21.10. Debugging NAT
- Problem
- Solution
- Discussion
- 22. Hot Standby Router Protocol
- 22.0. Introduction
- 22.1. Configuring Basic HSRP Functionality
- Problem
- Solution
- Discussion
- See Also
- 22.2. Using HSRP Preempt
- Problem
- Solution
- Discussion
- See Also
- 22.3. Making HSRP React to Problems on Other Interfaces
- Problem
- Solution
- Discussion
- See Also
- 22.4. Load Balancing with HSRP
- Problem
- Solution
- Discussion
- See Also
- 22.5. Redirecting ICMP with HSRP
- Problem
- Solution
- Discussion
- 22.6. Manipulating HSRP Timers
- Problem
- Solution
- Discussion
- See Also
- 22.7. Using HSRP on a Token Ring Network
- Problem
- Solution
- Discussion
- See Also
- 22.8. HSRP SNMP Support
- Problem
- Solution
- Discussion
- See Also
- 22.9. Increasing HSRP Security
- Problem
- Solution
- Discussion
- See Also
- 22.10. Showing HSRP State Information
- Problem
- Solution
- Discussion
- 22.11. Debugging HSRP
- Problem
- Solution
- Discussion
- 23. IP Multicast
- 23.0. Introduction
- IGMP and CGMP
- Multicast Routing Protocols
- PIM-DM and PIM-SM
- DVMRP
- MOSPF
- MBGP
- 23.1. Configuring Basic Multicast Functionality with PIM-DM
- Problem
- Solution
- Discussion
- 23.2. Routing Multicast Traffic with PIMSM and BSR
- Problem
- Solution
- Discussion
- 23.3. Routing Multicast Traffic with PIM-SM and Auto-RP
- Problem
- Solution
- Discussion
- See Also
- 23.4. Configuring Routing for a Low Frequency Multicast Application
- Problem
- Solution
- Discussion
- See Also
- 23.5. Configuring CGMP
- Problem
- Solution
- Discussion
- 23.6. Static Multicast Routes and Group Memberships
- Problem
- Solution
- Discussion
- See Also
- 23.7. Routing Multicast Traffic with MOSPF
- Problem
- Solution
- Discussion
- See Also
- 23.8. Routing Multicast Traffic with DVMRP
- Problem
- Solution
- Discussion
- See Also
- 23.9. DVMRP Tunnels
- Problem
- Solution
- Discussion
- See Also
- 23.10. Controlling Multicast Scope with TTL
- Problem
- Solution
- Discussion
- See Also
- 23.11. Using Administratively Scoped Addressing
- Problem
- Solution
- Discussion
- See Also
- 23.12. Exchanging Multicast Routing Information with MBGP
- Problem
- Solution
- Discussion
- See Also
- 23.13. Using MSDP to Discover External Sources
- Problem
- Solution
- Discussion
- See Also
- 23.14. Converting Broadcasts to Multicasts
- Problem
- Solution
- Discussion
- See Also
- 23.15. Showing Multicast Status
- Problem
- Solution
- Discussion
- See Also
- 23.16. Debugging Multicast Routing
- Problem
- Solution
- Discussion
- 23.0. Introduction
- A. External Software Packages
- A.1. Perl
- A.2. Expect
- A.3. NET-SNMP
- A.4. PuTTY
- A.5. OpenSSH
- A.6. Ethereal
- B. IP Precedence, TOS, and DSCP Classifications
- B.1. Combining TOS and IP Precedence to Mimic DSCP
- B.2. RSVP
- B.3. Queueing Algorithms
- Weighted Fair Queueing
- Priority Queueing
- Custom Queueing
- B.4. Dropping Packets and Congestion Avoidance
- Index
- About the Authors
- Colophon
- Copyright
O'Reilly Media - inne książki
-
Nowość Promocja
Business decisions in any context—operational, tactical, or strategic—can have considerable consequences. Whether the outcome is positive and rewarding or negative and damaging to the business, its employees, and stakeholders is unknown when action is approved. These decisions are usually made under the proverbial cloud of uncertainty.With this pra- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Nowość Promocja
If you're a developer looking to build a distributed, resilient, scalable, high-performance application, you may be evaluating distributed SQL and NoSQL solutions. Perhaps you're considering the Aerospike database.This practical book shows developers, architects, and engineers how to get the highly scalable and extremely low-latency Aerospike datab- ePub + Mobi 254 pkt
Aerospike: Up and Running. Developing on a Modern Operational Database for Globally Distributed Apps
(228,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Nowość Promocja
Reinforcement learning (RL) has led to several breakthroughs in AI. The use of the Q-learning (DQL) algorithm alone has helped people develop agents that play arcade games and board games at a superhuman level. More recently, RL, DQL, and similar methods have gained popularity in publications related to financial research.This book is among the fir- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Nowość Promocja
Learn how to use Go's strengths to develop services that are scalable and resilient even in an unpredictable environment. With this book's expanded second edition, Go developers will explore the composition and construction of cloud native applications, from lower-level Go features and mid-level patterns to high-level architectural considerations.E- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
To ensure that applications are reliable and always available, more businesses today are moving applications to AWS. But many companies still struggle to design and build these cloud applications effectively, thinking that because the cloud is resilient, their applications will be too. With this practical guide, software, DevOps, and cloud engineer- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Performance tuning is an experimental science, but that doesn't mean engineers should resort to guesswork and folklore to get the job done. Yet that's often the case. With this practical book, intermediate to advanced Java technologists working with complex platforms will learn how to tune Java cloud applications for performance using a quantitativ- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Today, investment in financial technology and digital transformation is reshaping the financial landscape and generating many opportunities. Too often, however, engineers and professionals in financial institutions lack a practical and comprehensive understanding of the concepts, problems, techniques, and technologies necessary to build a modern, r- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Until recently, infrastructure was the backbone of organizations operating software they developed in-house. But now that cloud vendors run the computers, companies can finally bring the benefits of agile custom-centricity to their own developers. Adding product management to infrastructure organizations is now all the rage.But how's that possible- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Promocja
Cloud services and SaaS software permeate every company's IT landscape, requiring a shift from manually provisioned services to a more structured approach, with codification at its core. Terraform provides tools to manage the lifecycle of your IT landscape across thousands of different cloud providers and SaaS platforms.By defining your infrastruct- ePub + Mobi 211 pkt
(194,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
Promocja
Using machine learning for products, services, and critical business processes is quite different from using ML in an academic or research setting—especially for recent ML graduates and those moving from research to a commercial environment. Whether you currently work to create products and services that use ML, or would like to in the future, this- ePub + Mobi 254 pkt
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%)
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Książka drukowana
Oceny i opinie klientów: Cisco Cookbook Kevin Dooley, Ian Brown (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.