Budowa sieci

41
Wird geladen...
E-BOOK

Książka Packet Tracer 6 dla kursów CISCO Tom 5 - ACL, routing statyczny oraz zaawansowane technologie sieciowe

Jerzy Kluczewski

Książka Packet Tracer 6 dla kursów CISCO Tom 5 – ACL, routing statyczny oraz zaawansowane technologie sieciowe jest kontynuacją poprzednich tomów. Tom 5 zawiera przykłady, ćwiczenia, zadania problemowe obejmujące zagadnienia takie jak: routing statyczny, listy kontroli dostępu (ACL), praca z urządzeniami typu Chmura, technologia VoIP, protokoły STP, RSTP, VTP, Frame Relay, HDLC, PPP, technologie RADIUS i NETFLOW.

42
Wird geladen...
E-BOOK

Managing Mission - Critical Domains and DNS. Demystifying nameservers, DNS, and domain names

Mark E.Jeftovic

Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers.

43
Wird geladen...
E-BOOK

Mastering Enterprise Platform Engineering. A practical guide to platform engineering and generative AI for high-performance software delivery

Mark Peters, Gautham Pallapa, James Watters

Modern organizations must deliver software faster, ensure platform stability, and adopt AI, all while reducing operational complexity and cost. But fragmented tooling, scaling challenges, and limited developer enablement hinder progress – driving engineering leaders to seek a cohesive strategy for efficiency, resilience, and innovation.In this book, Dr. Mark Peters and Dr. Gautham Pallapa join forces to resolve these complexities by showing you how to build scalable platforms, operate them efficiently through automation and AI, and optimize software delivery pipelines for continuous value. The chapters cover core principles, including platform architecture, self-service enablement, and developer experience. You’ll explore proven frameworks for cultural transformation, strategic alignment, and continuous improvement, along with 10 bold predictions about the future of platform engineering to help you anticipate trends and lead through change with confidence.By the end of this book, you’ll be able to design and implement resilient, intelligent platforms, accelerate innovation, and drive measurable business impact, positioning you and your organization as leaders in the next era of platform engineering.

44
Wird geladen...
E-BOOK

Mastering Windows Server 2022. Comprehensive administration of your Windows Server environment - Fourth Edition

Jordan Krause

Written by a 10-time Microsoft MVP award winner with over 20 years of IT experience, Mastering Windows Server 2022 is a practical guide to deploying, securing, and optimizing your server infrastructure. Whether you’re new to server administration or an experienced professional sharpening your skills, this book is designed to be referenced on a regular basis instead of gathering dust on your shelf.Updated for Windows Server 2022, this book covers versions, licensing models, and the latest features while guiding you through single-pane-of-glass administration with tools like Server Manager, PowerShell, and Windows Admin Center. While the primary focus is on Windows Server 2022 LTSC, we also explore SAC server releases, Containers, Nano Server, and OS release cadences.You’ll gain hands-on expertise in remote access technologies, PKI and certificate management, virtualization with Hyper-V, and deploying a Remote Desktop Services farm. Plus, you’ll master Server Core, built-in redundancy, and troubleshooting techniques – all while reinforcing core infrastructure skills like Active Directory, DNS, DHCP, and Group Policy.

45
Wird geladen...
E-BOOK

Microsoft System Center Virtual Machine Manager 2012. Poradnik praktyczny

Edvaldo Alessandro Cardoso

Microsoft System Center 2012 jest wszechstronną platformą wirtualizacji, chmury i zarządzania infrastrukturą IT. Poprzez System Center 2012 możesz dużo łatwiej i wydajniej zarządzać swoimi aplikacjami i usługami w obrębie kilku różnych hiperwizorów oraz infrastruktur chmur publicznych i prywatnych w celu dostarczenia elastycznych i oszczędnych usług IT dla Twojego biznesu. Treść niniejszej książki obejmuje projekt architektury i planowanie, a przy tym zawiera wiele różnych porad, technik i rozwiązań wdrożeniowych, które pokażą Ci, w jaki sposób możesz usprawnić VMM 2012 w praktycznych scenariuszach. Poprowadzi Cię ona przez etapy tworzenia, wdrażania i zarządzania Twoją chmurą prywatną, zbudowaną w oparciu o różne hiperwizory: Hyper-V, VMware ESXi oraz Citrix XenServer. Uwzględnia ona także funkcje zawarte w VMM 2012 SP1. Dla kogo jest ta książka? Książka ta przeznaczona jest dla projektantów rozwiązań, konsultantów technicznych, administratorów, a także dla każdego innego miłośnika wirtualizacji, który musi korzystać na co dzień z Microsoft System Center Virtual Machine Manager 2012. Dzięki tej książce nauczysz się - Korzystać z architektury VMM oraz planować praktyczne wdrożenia - Wykorzystywać wirtualizację sieci, bramy czy magazynu, dławienie zasobów oraz opcje dostępności - Wdrażać system Operations Manager i integrować z VMM - Integrować z VMM kontroler SC App Controller w celu zarządzania chmurami prywatnymi i publicznymi (Azure) - Wdrażać klastry poprzez VMM Bare Metal - Tworzyć i wdrażać z szablonów maszyny wirtualne - Wdrażać wysoko dostępny serwer zarządzania VMM - Zarządzać Hyper-V, VMware oraz Citrix z poziomu VMM - Aktualizować SCVMM 2008 R2 do SCVMM 2012 SP1

46
Wird geladen...
E-BOOK

Network Architect's Handbook. An expert-led journey to building a successful career as a network architect

Alim H. Ali, Steven Parker, Russell Ware

Becoming a network architect is challenging—it demands hands-on engineering skills, collaboration with internal teams and C-Suite stakeholders, as well as adeptly managing external entities like vendors and service providers. The author taps into his extensive background in IT and security to help you gain a detailed understanding of the network architect's role and guide you in evolving into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders.Starting with a clear definition of the network architect’s role, this book lays out a roadmap and discusses the attributes and mindset for success. You’ll explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. You’ll also gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position.By the end of this book, you’ll be armed with essential concepts, techniques, and newfound skills to pursue a career as a network architect.

47
Wird geladen...
E-BOOK

Network Automation with Nautobot. Adopt a network source of truth and a data-driven approach to networking

Jason Edelman, Glenn Matthews, Josh VanDeraa, Ken...

Nautobot enables network teams to build a scalable and extensible network source of truth that provides a foundation to power any network automation stack.With the help of this guide, you’ll learn how to deploy, manage, and integrate Nautobot as a source of truth and network automation platform. As you progress, you’ll learn what a network source of truth is, the relationship between data and network automation, and network data models. You’ll also gain a broad understanding of Nautobot and its robust features that allow maximum flexibility. A dedicated section will show you how to construct a single source of truth with Nautobot and help you explore its programmatic APIs, including REST APIs, GraphQL, webhooks, and Nautobot Job Hooks. Later, you’ll develop custom data models and custom apps for Nautobot and experience its extensibility and powerful developer API. In the last part of this book, you'll discover how to deploy configuration compliance and automated remediation once Nautobot is deployed as a network source of truth.By the end of this book, you’ll be able to design and manage Nautobot as a network source of truth, understand its key features, and extend Nautobot by creating custom data models and apps that suit your network and your team.

48
Wird geladen...
E-BOOK

Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

Yoram Orzach, Deepanshu Khanna

With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the knowledge of how to find vulnerabilities and infiltrate organizations through their networks, you’ll be able to think like a hacker and safeguard your organization’s network and networking devices. Network Protocols for Security Professionals will show you how.This comprehensive guide gradually increases in complexity, taking you from the basics to advanced concepts. Starting with the structure of data network protocols, devices, and breaches, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Once you’ve covered the basics, you’ll learn about attacks that target networks and network devices. Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. As you progress, you’ll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.By the end of this network security book, you’ll be well versed in network protocol security and security countermeasures to protect network protocols.