Budowa sieci
Jerzy Kluczewski
Książka Packet Tracer 6 dla kursów CISCO Tom 5 – ACL, routing statyczny oraz zaawansowane technologie sieciowe jest kontynuacją poprzednich tomów. Tom 5 zawiera przykłady, ćwiczenia, zadania problemowe obejmujące zagadnienia takie jak: routing statyczny, listy kontroli dostępu (ACL), praca z urządzeniami typu Chmura, technologia VoIP, protokoły STP, RSTP, VTP, Frame Relay, HDLC, PPP, technologie RADIUS i NETFLOW.
Managing Mission - Critical Domains and DNS. Demystifying nameservers, DNS, and domain names
Mark E.Jeftovic
Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers.
Mark Peters, Gautham Pallapa, James Watters
Modern organizations must deliver software faster, ensure platform stability, and adopt AI, all while reducing operational complexity and cost. But fragmented tooling, scaling challenges, and limited developer enablement hinder progress – driving engineering leaders to seek a cohesive strategy for efficiency, resilience, and innovation.In this book, Dr. Mark Peters and Dr. Gautham Pallapa join forces to resolve these complexities by showing you how to build scalable platforms, operate them efficiently through automation and AI, and optimize software delivery pipelines for continuous value. The chapters cover core principles, including platform architecture, self-service enablement, and developer experience. You’ll explore proven frameworks for cultural transformation, strategic alignment, and continuous improvement, along with 10 bold predictions about the future of platform engineering to help you anticipate trends and lead through change with confidence.By the end of this book, you’ll be able to design and implement resilient, intelligent platforms, accelerate innovation, and drive measurable business impact, positioning you and your organization as leaders in the next era of platform engineering.
Jordan Krause
Written by a 10-time Microsoft MVP award winner with over 20 years of IT experience, Mastering Windows Server 2022 is a practical guide to deploying, securing, and optimizing your server infrastructure. Whether you’re new to server administration or an experienced professional sharpening your skills, this book is designed to be referenced on a regular basis instead of gathering dust on your shelf.Updated for Windows Server 2022, this book covers versions, licensing models, and the latest features while guiding you through single-pane-of-glass administration with tools like Server Manager, PowerShell, and Windows Admin Center. While the primary focus is on Windows Server 2022 LTSC, we also explore SAC server releases, Containers, Nano Server, and OS release cadences.You’ll gain hands-on expertise in remote access technologies, PKI and certificate management, virtualization with Hyper-V, and deploying a Remote Desktop Services farm. Plus, you’ll master Server Core, built-in redundancy, and troubleshooting techniques – all while reinforcing core infrastructure skills like Active Directory, DNS, DHCP, and Group Policy.
Microsoft System Center Virtual Machine Manager 2012. Poradnik praktyczny
Edvaldo Alessandro Cardoso
Microsoft System Center 2012 jest wszechstronną platformą wirtualizacji, chmury i zarządzania infrastrukturą IT. Poprzez System Center 2012 możesz dużo łatwiej i wydajniej zarządzać swoimi aplikacjami i usługami w obrębie kilku różnych hiperwizorów oraz infrastruktur chmur publicznych i prywatnych w celu dostarczenia elastycznych i oszczędnych usług IT dla Twojego biznesu. Treść niniejszej książki obejmuje projekt architektury i planowanie, a przy tym zawiera wiele różnych porad, technik i rozwiązań wdrożeniowych, które pokażą Ci, w jaki sposób możesz usprawnić VMM 2012 w praktycznych scenariuszach. Poprowadzi Cię ona przez etapy tworzenia, wdrażania i zarządzania Twoją chmurą prywatną, zbudowaną w oparciu o różne hiperwizory: Hyper-V, VMware ESXi oraz Citrix XenServer. Uwzględnia ona także funkcje zawarte w VMM 2012 SP1. Dla kogo jest ta książka? Książka ta przeznaczona jest dla projektantów rozwiązań, konsultantów technicznych, administratorów, a także dla każdego innego miłośnika wirtualizacji, który musi korzystać na co dzień z Microsoft System Center Virtual Machine Manager 2012. Dzięki tej książce nauczysz się - Korzystać z architektury VMM oraz planować praktyczne wdrożenia - Wykorzystywać wirtualizację sieci, bramy czy magazynu, dławienie zasobów oraz opcje dostępności - Wdrażać system Operations Manager i integrować z VMM - Integrować z VMM kontroler SC App Controller w celu zarządzania chmurami prywatnymi i publicznymi (Azure) - Wdrażać klastry poprzez VMM Bare Metal - Tworzyć i wdrażać z szablonów maszyny wirtualne - Wdrażać wysoko dostępny serwer zarządzania VMM - Zarządzać Hyper-V, VMware oraz Citrix z poziomu VMM - Aktualizować SCVMM 2008 R2 do SCVMM 2012 SP1
Alim H. Ali, Steven Parker, Russell Ware
Becoming a network architect is challenging—it demands hands-on engineering skills, collaboration with internal teams and C-Suite stakeholders, as well as adeptly managing external entities like vendors and service providers. The author taps into his extensive background in IT and security to help you gain a detailed understanding of the network architect's role and guide you in evolving into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders.Starting with a clear definition of the network architect’s role, this book lays out a roadmap and discusses the attributes and mindset for success. You’ll explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. You’ll also gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position.By the end of this book, you’ll be armed with essential concepts, techniques, and newfound skills to pursue a career as a network architect.
Jason Edelman, Glenn Matthews, Josh VanDeraa, Ken...
Nautobot enables network teams to build a scalable and extensible network source of truth that provides a foundation to power any network automation stack.With the help of this guide, you’ll learn how to deploy, manage, and integrate Nautobot as a source of truth and network automation platform. As you progress, you’ll learn what a network source of truth is, the relationship between data and network automation, and network data models. You’ll also gain a broad understanding of Nautobot and its robust features that allow maximum flexibility. A dedicated section will show you how to construct a single source of truth with Nautobot and help you explore its programmatic APIs, including REST APIs, GraphQL, webhooks, and Nautobot Job Hooks. Later, you’ll develop custom data models and custom apps for Nautobot and experience its extensibility and powerful developer API. In the last part of this book, you'll discover how to deploy configuration compliance and automated remediation once Nautobot is deployed as a network source of truth.By the end of this book, you’ll be able to design and manage Nautobot as a network source of truth, understand its key features, and extend Nautobot by creating custom data models and apps that suit your network and your team.
Yoram Orzach, Deepanshu Khanna
With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the knowledge of how to find vulnerabilities and infiltrate organizations through their networks, you’ll be able to think like a hacker and safeguard your organization’s network and networking devices. Network Protocols for Security Professionals will show you how.This comprehensive guide gradually increases in complexity, taking you from the basics to advanced concepts. Starting with the structure of data network protocols, devices, and breaches, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Once you’ve covered the basics, you’ll learn about attacks that target networks and network devices. Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. As you progress, you’ll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.By the end of this network security book, you’ll be well versed in network protocol security and security countermeasures to protect network protocols.