Hi Guest! My blog's stoped update material! Please visit http://downeb.com

Monday, August 30, 2010


Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, 2nd Edition

Cisco Press | ISBN: 1587058197 | 2010 | 1151 pages | PDF | 28 MB

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples.

Readers will learn about the Cisco ASA Firewall solution and capabilities; secure configuration and troubleshooting of site-to-site and remote access VPNs; Intrusion Prevention System features built into Cisco ASA's Advanced Inspection and Prevention Security Services Module (AIP-SSM); and Anti-X features in the ASA Content Security and Control Security Services Module (CSC-SSM). This new edition has been updated with detailed information on the latest ASA models and features.
Download Here:
http://www.fileserve.com/file/YJRDMwA
Or
http://hotfile.com/dl/65924851/5976349/Cisco_ASA_All-in-One_Firewall_IPS_Anti-X_and_VPN_Adaptive_Security_Appliance_2nd_Ed_.pdf.html




CISSP® All-in-One Exam Guide Fifth Edition
Book Details
Harcover:1008 pages
Dimensions(in inches): 2.25 x 9.25 x 7.50
Publisher:McGraw-Hill Osborne Media; 5th edition (February 8, 2010)
Language:English
ISBN:0071602178 (OR) 978-0071602174


Shon Harris, CISSP, MCSE, is a security consultant, a former engineer in the Air Force Information Warfare Unit, an instructor, an author, and President of Logical Security.

She has written two best selling CISSP books, and co-authored Hacker's Challenge and Gray Hat Hacking. Shon has developed a new security book series, being published by McGraw-Hill, which will be sold to corporations, universities, colleges, and professionals throughout the world. This series will set the new standards in security training, education, and industry practices.

She is an active contributor for Information Security Magazine and Windows 2000 Magazine. Shon has taught computer and information security to a wide range of clients including RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, and more.

Shon was recently recognized by Information Security Magazine as one of the top 25 women technologists, researchers and executives reshaping information security today.
Table of Contents:
Chapter 1: Reasons to Becoming a CISSP
Chapter 2: Security Trends
Chapter 3: Security Management Practices
Chapter 4: Access Control
Chapter 5: Security Architecture and Models
Chapter 6: Physical Security
Chapter 7: Telecommunications and Network Security
Chapter 8: Cryptography
Chapter 9: Business Continuity Planning and Disaster Recovery
Chapter 10: Laws, Investigations, and Ethics
Chapter 11: Applications and Systems Development Security
Chapter 12: Operations Security
Appendix: About the CD-ROM
Index
Download Here:
http://hotfile.com/dl/65903636/9d121dd/CISSP_All-in-One_Exam_Guide_5th_Edition.part1.rar.html
http://hotfile.com/dl/65905988/699ff08/CISSP_All-in-One_Exam_Guide_5th_Edition.part2.rar.html
http://hotfile.com/dl/65909185/7c0014c/CISSP_All-in-One_Exam_Guide_5th_Edition.part3.rar.html
http://hotfile.com/dl/65910966/6ec73b3/CISSP_All-in-One_Exam_Guide_5th_Edition.part4.rar.html
http://hotfile.com/dl/65913634/d1e9fdf/CISSP_All-in-One_Exam_Guide_5th_Edition.part5.rar.html
http://hotfile.com/dl/65917668/0c51084/CISSP_All-in-One_Exam_Guide_5th_Edition.part6.rar.html
http://hotfile.com/dl/65924270/b7d24f3/CISSP_All-in-One_Exam_Guide_5th_Edition.part7.rar.html
Or
http://www.fileserve.com/file/E3vyrjD
http://www.fileserve.com/file/bGFefpZ
http://www.fileserve.com/file/E6VduZ8
http://www.fileserve.com/file/mka6R9t
http://www.fileserve.com/file/bhptrpB
http://www.fileserve.com/file/FwQK3jr
http://www.fileserve.com/file/dkNkVvC

Pass Unrar: thuanngo.blogspot.com

Friday, August 27, 2010

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services

This practical introduction to OpenLDAP for Application Developers emphasizes how to get things done, going into Lightweight Directory Access Protocol (LDAP) theory only to answer practical questions. It demystifies OpenLDAP, providing a solid understanding of how to use its directory and covering building directory services, integrating directory services, and developing directory-enabled PHP or Python applications. Readers need only basic Linux system administration experience, not LDAP experience. Open-source OpenLDAP directory server is included in all major Linux distributions; many open-source and proprietary applications can use OpenLDAP's services. Client applications use LDAP to connect to OpenLDAP, search the directory, and (if authorized) modify and manipulate records. Most often used to provide network-based authentication services for users, LDAP servers have many other uses: address book, DNS database, organizational tool, even network object store for applications.
Download:
http://hotfile.com/dl/65024184/3fd876b/Mastering_OpenLDAP.pdf.html
Or
http://www.fileserve.com/file/RW4YxCE

CBT Nuggets: Cisco Security - Exam-Pack 642-515 SNAA | ISO | 1.24GB

Take your ASA skills to the next level! In this video series, Jeremy Cioara focuses on ASA's graphic interface (called the ASDM).
By the time you've finished watching, you'll feel like a network star on SSLVPNs (the next-generationVPN connection for remote users), Certificate-based VPNs and application layer inspection.
Plus, you'll be fully prepared to add killer SSLVPN technology to your cooperate network, feel a lot more comfortable working with Cisco's graphic interface and be ready for the 642-515 SNAA certification exam.

Exam-Pack 642-515 SNAA - Securing Networks with ASA Advanced contents:
* Cisco Security: Cisco Certification and Getting the Most from this Series
* Foundations: Access Lists and NAT
* Foundations: Access Lists and NAT, Part 2
* Controlling Traffic: Cisco Modular Policy Framework
* Controlling Traffic: Cisco Modular Policy Framework, Part 2
* Protocol Inspection: Advanced Protocols
* Protocol Inspection: Advanced Protocols, Part 2
* Routing and Switching: ASA VLAN Interaction
* Routing and Switching: Dynamic Routing Protocols
* VPN Technology: IPSec and Digital Certificates
* VPN Technology: Configuring Site-to-Site VPNs with Digital Certificates
* VPN Technology: Certificate-Based Remote Access VPNs
* VPN Technology: Advanced Remote Access VPN Features
* VPN Technology: ASA5505 as Easy VPN & VPN Quality of Service
* SSL VPNs: Understanding SSL / WebVPN Technology
* SSL VPNs: Configuring Clientless VPNs
* SSL VPNs: Configuring Anyconnect VPNs
* SSL VPNs: Configuring Anyconnect VPNs, Part 2
* SSL VPNs: Understanding and Installing Cisco Secure Desktop
* SSL VPNs: Configuring Cisco Secure Desktop
* SSMs: Understanding AIP-SSM and CSC-SSM

Download Here:
http://hotfile.com/dl/64824118/9508bc9/642-515_Securing_Networks_with_ASA_Advanced.part1.rar.html
http://hotfile.com/dl/64824250/376f31d/642-515_Securing_Networks_with_ASA_Advanced.part2.rar.html
http://hotfile.com/dl/64823895/38ebe7e/642-515_Securing_Networks_with_ASA_Advanced.part3.rar.html
http://hotfile.com/dl/64972163/f12ef91/642-515_Securing_Networks_with_ASA_Advanced.part4.rar.html
http://hotfile.com/dl/64974576/af6719f/642-515_Securing_Networks_with_ASA_Advanced.part5.rar.html
http://hotfile.com/dl/64977455/91624e1/642-515_Securing_Networks_with_ASA_Advanced.part6.rar.html
http://hotfile.com/dl/64982289/502b287/642-515_Securing_Networks_with_ASA_Advanced.part7.rar.html

Or
http://www.fileserve.com/file/qrq68w5
http://www.fileserve.com/file/DmJeSQN
http://www.fileserve.com/file/m5kteuu
http://www.fileserve.com/file/j35kH7j
http://www.fileserve.com/file/y9zMS84
http://www.fileserve.com/file/sZTZyKg
http://www.fileserve.com/file/vP5Pt3A
















CCNP Routing and Switching Foundation Learning Library: Foundation Learning for CCNP ROUTE, SWITCH, and TSHOOT (642-902, 642-813, 642-832)


Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide: Foundation learning for the ROUTE 642-902

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813

Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: Foundation learning for the CCNP TSHOOT 642-832


Download Here:
http://hotfile.com/dl/65011459/81be68a/CCNP_Routing_and_Switching_Foundation_Learning_Library.rar.html
Or
http://shareflare.net/download/63772.633731caf1f98ac7ba75880b6b3fbc933/CCNP_Routing_and_Switching_Foundation_Learning_Library.rar.html

Or
http://www.fileserve.com/file/td8hN4e



Thursday, August 26, 2010


Cisco Networkers 2009 - Firewall Design and Deployment | 1.22 GB
This session addresses Cisco firewalls and how they are used to enforce security policy around the network. It includes best practices as part of a case study that illustrates these various techniques in practice and options on how they can be implemented. Common design scenarios are covered for both the ASA firewall appliance and the Cisco Firewall Services Module, including virtualization and transparent (Layer 2) mode. Pros and cons of each design are discussed in depth. Participants should have a working knowledge of TCP/IP and understand general networking and packet flow. This session focuses on the Cisco ASA Adaptive Security Appliance and Firewall Services Module and does not cover any Cisco IOS based firewall solutions.

Download Here:
http://hotfile.com/dl/64781657/02b3f2c/Firewall_Design_and_Deployment.part1.rar.html
http://hotfile.com/dl/64785084/b50f243/Firewall_Design_and_Deployment.part2.rar.html

http://hotfile.com/dl/64790055/02b70e9/Firewall_Design_and_Deployment.part3.rar.html

http://hotfile.com/dl/64791020/4b3ca27/Firewall_Design_and_Deployment.part4.rar.html

http://hotfile.com/dl/64794707/ad731e3/Firewall_Design_and_Deployment.part5.rar.html

http://hotfile.com/dl/64794694/b5e149a/Firewall_Design_and_Deployment.part6.rar.html

http://hotfile.com/dl/64796173/d40c21c/Firewall_Design_and_Deployment.part7.rar.html

Or
http://www.fileserve.com/file/hSczXuC
http://www.fileserve.com/file/hXxTkz6
http://www.fileserve.com/file/Mce62KY
http://www.fileserve.com/file/yaHVvU8
http://www.fileserve.com/file/bdc548Y
http://www.fileserve.com/file/Ez77rB5
http://www.fileserve.com/file/5Ue2NbZ

Pass Unrar: thuanngo.blogspot.com

Wednesday, August 25, 2010

Cacti 0.8 Network Monitoring

Cacti is a network monitoring tool that provides graphic solutions to your everyday monitoring issues. It has a wide variety of features and misusing them can mean that you are not monitoring your network as closely as you think. This book takes you through all of the key features of Cacti and shows how to use them for maximum effectiveness.

This book will teach you how to use Cacti effectively to monitor your network through its web interface leaving aside all the heavy chunks of code. You will be introduced to all the features of Cacti in an easy-to-understand format.

Beginning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL mechanisms for authentication and encryption. This book is an easy introduction to this popular VPN application. After introducing the basics of security and VPN, it moves on to cover using OpenVPN, from installing it on various platforms, through configuring basic tunnels, to more advanced features, such as using the application with firewalls, routers, proxy servers, and OpenVPN scripting.

What you will learn from this book

  • Install OpenVPN on Windows Server, Vista, and Mac OS X and also on different Linux versions and FreeBSD
  • Learn basic security concepts necessary to understand VPNs and OpenVPN in particular
  • Take a look at encryption matters, symmetric and asymmetric keying, and certificates
  • Connect Windows and Linux systems and safely transfer the necessary encryption keys using WinSCP
  • Learn about OpenVPN, its development, features, resources, advantages, and disadvantages compared to other VPN solutions, especially IPsec
  • Discuss non-standard and advanced methods of installing OpenVPN by compiling the source code provided by the OpenVPN project
  • Create an encryption key for OpenVPN and use it to set up an OpenVPN tunnel between two Windows systems in the same network
  • Create X.509 server and client certificates for use with OpenVPN and learn how to use tools to debug and monitor VPN tunnels
  • Create and administer certificates that have to be transferred to the machines that are supposed to take part in the VPN
  • Configure two different firewall networks that connect to each other through the secure OpenVPN tunnel
  • Install and use XCA and TinyCA2 to generate certificate revocation lists that are used to block unwanted connections by formerly authorized clients
  • Install OpenVPN on Windows Mobile and Smartphones running embedded Linux, like Nokia’s Maemo platform
  • Analyze the flow of datagrams between the VPN servers and the connected networks with tools like ifconfig, ping, traceroute, and mtr
Download Here:
http://hotfile.com/dl/64727028/22d8860/Packtpub.Beginning.OpenVPN.2.0.9.Dec.2009.rar.html

Or
http://www.fileserve.com/file/8QEj6xM

Pass Unrar: thuanngo.blogspot.com


ModSecurity 2.5

Overview

  • Secure your system by knowing exactly how a hacker would break into it
  • Covers writing rules in-depth and Modsecurity rule language elements such as variables, actions, and request phases
  • Covers the common attacks in use on the Web, and ways to find the geographical location of an attacker and send alert emails when attacks are discovered
  • Packed with many real-life examples for better understanding
O'reilly.LPI.Linux.Certification.in.a.Nutshell.Jun.2010

* Paperback: 528 pages
* Publisher: O'Reilly Media; 3 edition (June 22, 2010)
* Language: English

Book Description
Linux deployment continues to increase, and so does the demand for qualified and certified Linux system administrators. If you're seeking a job-based certification from the Linux Professional Institute (LPI), this updated guide will help you prepare for the technically challenging LPIC Level 1 Exams 101 and 102.

The third edition of this book is a meticulously researched reference to these exams, written by trainers who work closely with LPI. You'll find an overview of each exam, a summary of the core skills you need, review questions and exercises, as well as a study guide, a practice test, and hints to help you focus.

Major topics include:

* Critical GNU and Unix commands
* Linux installation and package management
* Devices and filesystems
* Text editing, processing, and printing
* The X Window System
* Networking and security
* Mail transfer agents
* Email, FTP, and web services

Download:
http://www.fileserve.com/file/BwF4Vxh
Or
http://hotfile.com/dl/64708810/6da5695/Oreilly.LPI.Linux.Certification.in.a.Nutshell.Jun.2010.rar.html


Pass Unrar: thuanngo.blogspot.com

New CCNP Books 2010 (Route/Switch/Tshoot)

CCNP Certification
Cisco Certified Network Professional (CCNP®) validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions. The CCNP certification is appropriate for those with at least one year of networking experience who are ready to advance their skills and work independently on complex network solutions. Those who achieve CCNP have demonstrated the skills required in enterprise roles such as network technician, support engineer, systems engineer or network engineer.

642-902 ROUTE
ROUTE 642-902 Course Administration Guide
ROUTE 642-902 Lab Guide
ROUTE 642-902 Student Guide Volume-I
ROUTE 642-902 Student Guide Volume-II
ROUTE 642-902 Student Guide Volume-III

642-813 SWITCH
SWITCH 642-813 Course Administration Guide
SWITCH 642-813 Lab Guide
SWITCH 642-813 Student Guide Volume-I
SWITCH 642-813 Student Guide Volume-II

643-832 TSHOOT
TSHOOT 642-832 Course Administration Guide
TSHOOT 642-832 Lab Guide
TSHOOT 642-832 Student Guide Volume-I
TSHOOT 642-832 Student Guide Volume-II

Download Here:
http://www.fileserve.com/file/w2y4g7m
http://www.fileserve.com/file/5T6P3sU
http://www.fileserve.com/file/uJ2JNxq
Or
http://hotfile.com/dl/64541112/11de65a/ROUTING_V1.0.rar.html
http://hotfile.com/dl/62906774/7095342/SWITCHING_V1.0.rar.html
http://hotfile.com/dl/62913094/3a08d62/TROUBLESHOOTING_V1.0.rar.html

Zabbix 1.8 Network Monitoring By Rihards Olups
Publisher: Packt Publishing 2010 | 428 Pages | ISBN: 184719768X | PDF | 9 MB

Imagine you’re celebrating the start of the weekend with Friday-night drinks with a few friends. And then suddenly your phone rings — one of the servers you administer has gone down, and it needs to be back up before tomorrow morning. So you drag yourself back to the office, only to discover that some log files have been growing more than usual over the past few weeks and have filled up the hard drive.

Download:
http://hotfile.com/dl/64518430/a409a23/Zabbix_1.8_Network_Monitoring.pdf.html

Or
http://www.fileserve.com/file/DeyusKT

Or
http://shareflare.net/download/73500.736589c8c213b4e879b2516f640e8a7ec/Zabbix_1.8_Network_Monitoring.pdf.html

Tuesday, August 24, 2010
















Implementing Cisco Data Center Network Infrastructure I & II

PDF | English | 826.07 MB
Implementing Cisco Data Center Network Infrastructure 1 (DCNI-1) v2.0
Course Outline
1. Implementing the Catalyst 6500, 4900 and Blade Switches.
2. Implementing Firewall Services Module for a Data Center Network Infrastructure.
3. Implementing Network Analysis with NAM.
4. Implementing High Availability Data Center Features.
Implementing Cisco Data Center Network Infrastructure 2 (DCNI-2) v3.0
Module 1: Deploying the Nexus 7000
Course Outline
* Lesson 1: Overview of the Cisco Nexus 7000.
* Lesson 2: Introduction to Virtual Device Contexts in the Cisco Nexus 7000 / NX-OS.
* Lesson 3: Managing the Cisco Nexus 7000 / NX-OS.
* Lesson 4: Nexus 7000 and NX-OS Layer 2 Protocols & Features.
* Lesson 5: Nexus 7000 and NX-OS Layer 3 Protocols & Features
* Lesson 6: Nexus 7000 Fabric Switching.
* Lesson 7: Nexus 7000 / NX-OS Quality of Service.
* Lesson 8: Nexus 7000 / NX-OS Security.
* Lesson 9: Troubleshooting.

Module 2: Overview of the Nexus 5000
* Lesson 1: Overview of the Nexus 5000.
* Lesson 2: Implementing an FCoE Network Using Nexus 5000 Switches.
* Lesson 3: Understanding Fibre Channel.
* Lesson 4: Understanding the FCoE Protocol.

Download Here:
http://www.fileserve.com/file/N3TTJK7
http://www.fileserve.com/file/mtUgPD9
http://www.fileserve.com/file/bzXEUb3
http://www.fileserve.com/file/eZnZDyF
http://www.fileserve.com/file/ZqjxxkB
http://www.fileserve.com/file/a7fje3y
http://www.fileserve.com/file/98pwuzF
http://www.fileserve.com/file/BnMQDJ3
http://www.fileserve.com/file/WnSafZr
Or
http://hotfile.com/dl/64281898/4e8fda2/DCNI_SG_V2-3.part01.rar.html
http://hotfile.com/dl/64285065/f641f58/DCNI_SG_V2-3.part02.rar.html
http://hotfile.com/dl/64288163/a2b5407/DCNI_SG_V2-3.part03.rar.html
http://hotfile.com/dl/64294129/1ee7e61/DCNI_SG_V2-3.part04.rar.html
http://hotfile.com/dl/64296843/34b468e/DCNI_SG_V2-3.part05.rar.html
http://hotfile.com/dl/64300063/000148d/DCNI_SG_V2-3.part06.rar.html
http://hotfile.com/dl/64303371/0a22353/DCNI_SG_V2-3.part07.rar.html
http://hotfile.com/dl/64475701/8507c0a/DCNI_SG_V2-3.part08.rar.html
http://hotfile.com/dl/64479364/3b3d064/DCNI_SG_V2-3.part09.rar.html


Monday, August 23, 2010


ModSecurity Handbook
Author: Ivan Ristic

* Publisher: Feisty Duck
* Publication date: Feb 2010 (estimate)
* Pages: 280 (estimate)
* Paperback ISBN: 978-1-907117-02-2
* Digital format: PDF

The definitive guide to the popular open source web application firewall, by Ivan Ristic, the original author of the tool.

* Step-by-step instructions for those just starting out.
* Detailed explanations of the internals, and advanced techniques for advanced users.
* Includes the official ModSecurity Reference Manual and Data Formats Guide.
* Available as PDF and paperback (pre-order).
* Continually updated as ModSecurity evolves.
* Interact with the author to shape the contents.
* Covers ModSecurity 2.5, 2.6 and beyond.
* One year of updates included with the digital book.
Download Here:
http://www.fileserve.com/file/nmxFMBZ
Or
http://shareflare.net/download/01482.01713fd4cd77ea98d5202c6fc171c3715/Modsecurity_handbook_2009_2010.pdf.html
CCIE Routing and Switching Exam Certification Guide (4th Edition) Publisher: Cisco Press | 2009 | 4th Edition | English | PDF | 1081 Pages | ISBN: 1587059800 | 13.2 Mb

CCIE Routing and Switching Certification Guide, Fourth Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCIE® Routing and Switching written exam. Well-respected networking professionals Wendell Odom, Rus Healy, and Denise Donohue share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
CCIE Routing and Switching Certification Guide, Fourth Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks sections help drill you on key concepts you must know thoroughly.

Download Here:
http://www.fileserve.com/file/b7nMBT6
More CCIE_RSv4_Guide_CDROM
http://www.fileserve.com/file/NR6Rcv5

CCNP TSHOOT 642-832 Official Certification Guide
Cisco Press | 2010 | ISBN: 1587202433 |
614 pages | PDF | 12 MB


Master the CCNP® ROUTE 642-902 exam with this official study guide
CCNP ROUTE 642-902 Official Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® ROUTE exam. Senior instructor and best-selling author Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.


CCNP SWITCH 642-813 Official Certification Guide
Cisco Press | 2010 | ISBN: 1587202433 | 504 pages | PDF | 14 MB


CCNP SWITCH 642-813 Official Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® SWITCH exam. Network architect and best-selling author Dave Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

Wendell Odom, "CCNP ROUTE 642-902 Official Certification Guide"
Cisco Press | 2010 | 768 Pages | ISBN: 1587202530 | PDF | 63 MB


Master the CCNP® ROUTE 642-902 exam with this official study guide
Assess your knowledge with chapter-opening quizzes
Review key concepts with Exam Preparation Tasks

CCNP ROUTE 642-902 Official Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® ROUTE exam. Senior instructor and best-selling author Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

TOM JACKIEWICZ is currently responsible for global LDAP and e-mail architecture at aFortune
100 company. Over the past 12 years, he has worked on the e-mail and LDAP capabilities of
Palm VII, helped architect many large-scale ISPs servicing millions of active e-mail users, and
audited security for anumber of Fortune 500 companies.
Tom has held management, engineering, and consulting positions at Applied Materials,
Motorola, TAOS, and WinStar GoodNet. Jackiewicz has also published articles on network
security and monitoring, IT infrastructure, Solaris, Linux, DNS, LDAP, and LDAP security. He
lives in San Francisco’s Mission neighborhood, where he relies on public transportation plus
abicycle to transport himself to the office—fashionably late.
Introduction
CHAPTER 1 Assessing Your Environment
CHAPTER 2 Understanding Data Definitions
CHAPTER 3 Implementing Deployment,Operations,and Administration Strategies
CHAPTER 4 Installing OpenLDAP
CHAPTER 5 Implementing OpenLDAP
CHAPTER 6 Scripting and Programming LDAP
CHAPTER 7 Integrating at the System Level
CHAPTER 8 Integrating OpenLDAP with Applications,User Systems, and Client Tools
Index
Download Here:
http://www.fileserve.com/file/WmwtUzC

Sunday, August 22, 2010

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Wiley | 2009 | ISBN: 0470456566, 0470594063 | 984 pages | PDF | 12,7 MB

Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data.

Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service to customers, the operator can focus on providing high throughput, highly available Ethernet bridging services and leave the layer 3 routing decision up to the customer.

Download Here:

http://shareflare.net/download/31852.311538a248d73be3195c65882a7cc62aa/Designing_and_Implementing_IP_MPLS.pdf.html

Or

http://hotfile.com/dl/64206723/8dda914/Designing_and_Implementing_IP_MPLS.pdf.html