by
Galis, Alex.
Call Number
004.6 22
Publication Date
2004
Format:
Electronic Resources
Relevance:
4.1248
by
Muller, Nathan J.
Call Number
004.6068 22
Publication Date
2003
Format:
Electronic Resources
Relevance:
4.0241
View Other Search Results
by
Karris, Steven T.
Call Number
004.6 22
Publication Date
2009
Summary
This book is primarily intended for those student and working professionals who have the desire to become network administrators. However, all practicing engineers will find it to be a very valuable source of information on this fascinating subject.
Format:
Electronic Resources
Relevance:
4.0022
by
Overton, David.
Call Number
004.6782 23
Publication Date
2012
Format:
Electronic Resources
Relevance:
3.9843
by
Ryder, Tom.
Call Number
005.4476
Publication Date
2013
Summary
This book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core.
Format:
Electronic Resources
Relevance:
3.9307
by
Orebaugh, Angela.
Call Number
004.6 22
Publication Date
2007
Summary
Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress' best-selling book Ethereal Packet Sniffing. This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building.
Format:
Electronic Resources
Relevance:
3.9123
7.
by
Mason, Brian.
Call Number
005.16
Publication Date
2012
Summary
Over 50 practical recipes to administer System Center 2012 Configuration Manager.
Format:
Electronic Resources
Relevance:
3.8472
by
NATO Advanced Networking Workshop on Creative and Innovative Network Management (2000 : Ohrid, Macedonia)
Call Number
004.6 22
Publication Date
2003
Summary
Networking methods and the needs for competence demand flexibility and adaptability of the education systems. This text argues that every country's authority should promote networking throughout the education process in order to create a suitable environment for life-long learning.
Format:
Electronic Resources
Relevance:
3.5124
by
White, Martin S. (Martin Scott), 1948-
Call Number
004.682068 22
Publication Date
2011
Summary
"Offers a wealth of practical advice on intranet management, based on the work of the author as an intranet consultant over the past fifteen years"--Provided by publisher.
Format:
Electronic Resources
Relevance:
3.4966
by
Farrel, Adrian.
Call Number
621.38216 22
Publication Date
2006
Summary
The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLSs place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers. + Written by two industry researchers at the forefront of the development of GMPLS. + Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering. + Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection. + Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs. + Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system.
Format:
Electronic Resources
Relevance:
3.4333
by
Kocjan, Wojciech.
Call Number
004.6 22
Publication Date
2010
Summary
Annotation Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving language.<br /><br />This book shows you how to create network-aware applications with Tcl language. Packed with practical examples, the book not only takes you through the implementation of network protocols in Tcl, but also key aspects of Tcl programming.<br /><br />The book starts with the basic element of Tcl programming as we take a look at the syntax and fundamental commands of the language. To get us ready for network programming, we look at important Tcl features such as object-oriented programming, accessing files, packaging in TCL, event driven programming, and multithreaded applications. To create standalone single-file executable applications with Tcl we take a look at the Starpack technology, and ensure that we_ll be able to create robust applications with a thorough coverage of troubleshooting and debugging Tcl applications.<br /><br />The book is really about network programming, and it will not let you down with its deep coverage of these topics. Of course we look at protocols, but there are plenty of practical examples to keep things moving along. We start with the TCP and UDP protocols, and look at some other protocols to see examples of synchronizing time with other servers, querying user information and authenticating users over LDAP and performing DNS queries.<br /><br />The book explains Simple Network Management Protocol (SNMP), which is often used for monitoring and gathering information from various devices, such as routers, gateways, printers and many other types of equipment. We_ll also look at web programming in Tcl; processing the requests coming from the clients via the HTTP protocol and responding to these requests. You_ll be able to create a complete solution for creating a client-server application in Tcl.<br /><br />To round things off, you_ll see how to secure your networked applications, build public key infrastructure into your application and use Tcl_s safe interpreter feature to reduce risk of running code from unknown source.<br /><br />This book will be help you discover a range of network protocols and concepts and show how to implement them in Tcl.
Format:
Electronic Resources
Relevance:
3.3958
by
Hobbs, Martyn.
Call Number
004.0684
Publication Date
2011
Summary
IT Asset Management: A Pocket Survival Guide is a quick reference style guide, addressing such serious issues with a fresh and pragmatic approach. Aimed at IT professionals who have been tasked with putting in place Asset Management disciplines, it first provides a commonsense introduction to the key processes outlined in the Information Technology Infrastructure Library (ITIL®), before proceeding to explain the various milestones of an Asset Management project.
Format:
Electronic Resources
Relevance:
3.1802
Limit Search Results