Buy Cisco Networking Simplified Book by Neil Anderson
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Cisco Networking Simplified: (Networking Technology)
Cisco Networking Simplified: (Networking Technology)

Cisco Networking Simplified: (Networking Technology)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Cisco Networking Simplified Second Edition   Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach Easy enough for novices, substantive enough for networking professionals Covers the latest networking topics—from network architecture to secure wireless, unified communications to telepresence   In Full Color   Jim Doherty • Neil Anderson • Paul Della Maggiora   Now 100 percent updated for the latest technologies, this is today’s easiest, most visual guide to Cisco® networking. Even if you’ve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.   What you always wanted to know about networking but were afraid to ask! How networks and the Internet work How to build coherent, cost-effective network infrastructures How to design networks for maximum reliability and availability What you need to know about data center and application networking How to secure networks against today’s threats and attacks How to take advantage of the latest mobility technologies How virtualizing networks can help businesses leverage their network investments even further How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture     This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.   Category: Cisco Covers: General Networking  

Table of Contents:
Introduction Part I: Networking Fundamentals How Computers Communicate     The OSI Model     Open Versus Proprietary Systems     Seven Layers     At-a-Glance: OSI Model     Internet Infrastructure: How It All Connects TCP/IP and IP Addressing     Computers Speaking the Same Language     What Is an Address?     Dynamically Allocated IP Addresses     Domain Names and Relationship to IP Addresses     Matching Domain Names to IP Addresses     At-a-Glance: TCP/IP     At-a-Glance: IP Addressing     At-a-Glance: IPv6     NAT and PAT Internet Applications     The Internet and Its Applications     E-Mail     Web Browsing     E-Mail     Peer-to-Peer Sharing   Part II: Networking Infrastructure Ethernet     History of Ethernet     What Is Ethernet?     Evolution of Ethernet     At-a-Glance: Ethernet     Reducing Collisions on Ethernet LAN Switching     Fast Computers Need Faster Networks     Switching Basics: It’s a Bridge     Switching Ethernets     Switches Take Over the World     At-a-Glance: Switching Spanning Tree     Network Loops     Sometimes, the Earth Is Flat     Preventing Network Loops     Spanning-Tree Fundamentals     At-a-Glance: Spanning Tree Routing     Routers     Routers Talk Among Themselves to Find Routes     Routers Route Packets     Routers Bridge and Switches Route     At-a-Glance: Routing     Routing and Switching   Part III: Network Design Campus Networks and Hierarchical Design     Building Networks for Ease of Use     At-a-Glance: Hierarchical Campus Design WAN Network Design     Moving Traffic Across the Street and the World     WAN Services     Integrated Services Digital Network     Frame Relay     ATM     MPLS     Broadband     Virtual Private Networks (VPN)     WAN Devices     At-a-Glance: Frame Relay     At-a-Glance: Asynchronous Transfer Mode (ATM)     Multiprotocol Label Switching (MPLS) Services     At-a-Glance: MPLS     MPLS Traffic Separation Broadband Technologies     Always-on Access     Broadband Technology Evolution     At-a-Glance: ISDN     At-a-Glance: Broadband Virtual Private Networks     Secure Networking Over the Internet     At-a-Glance: VPNs     Establishing a VPN Connection     At-a-Glance: Encryption     Client Authentication Optical Technologies     LANs, WANs—and Now MANs     SONET, DWDM, and DPT     At-a-Glance: Metro Optical Branch Office Network Designs     Distributed Workforce     Distributed Office Challenges     At-a-Glance: Branch Office Design   Part IV: Network Availability High Availability     At-a-Glance: High Availability Control Plane     When Good Networks Go Bad     Control Plane Protection     At-a-Glance: Control Plane Protection Quality of Service and Network Availability     Quality of Service as Network Protection?     Scavenger QoS     At-a-Glance: QoS for Network Resiliency Disaster Recovery     What Happens When the Network Stops Working     DR Planning     Resiliency and Backup Services     Preparedness Testing     At-a-Glance: Disaster Recovery: Business Continuance     Disaster Recovery Network Management     Keeping the Network Alive from Afar     Network Documentation: A Must-Have     Network-Management Protocols     Troubleshooting Tools     At-a-Glance: Network Management     Network Management   Part V: Securing the Network Network Security     Identity     Perimeter Security     Data Privacy     Security Monitoring     Policy Enforcement     At-a-Glance: Network Security     At-a-Glance: Hacking     DoS Attacks     Snooping and Spoofing Firewalls     Protecting the Perimeter     Get Off the Net!     Firewall for Your Protection     Personal Firewalls     At-a-Glance: Firewalls and IDS     Firewalls and IDS     Access and Content Security Intrusion Prevention Systems     Intrusion Detection Systems     Intrusion Prevention Systems     The Problem with False Positives     At-a-Glance: Intrusion Detection Port-Based Security     Combating Access-Based Attacks     At-a-Glance: Port-Based Security Identity-Based Networking     Network Access Conundrum     Identity-Based Networking     802.1x     At-a-Glance: Identity     Authentication Network Admission Control     Combating Virus Outbreaks     Assessing Device “Health”     Network Admission Control     At-a-Glance: NAC URL Filtering: Eliminating Unwanted Web Page Access     Internet Access and Liability Issues     Enforcing Corporate Internet Usage Policies     At-a-Glance: URL Filtering     URL Filtering and Firewalls Deep Packet Inspection: Controlling Unwanted Applications     How Do You Catch a Criminal When Everyone Wears a Mask?     Deep Packet Inspection     At-a-Glance: Deep Packet Inspection     Packet Inspection Telemetry: Identifying and Isolating Attack Sources     Normal or Abnormal     Using Telemetry to Combat Attacks     At-a-Glance: Telemetry Physical Security: IP Video Surveillance     Locks on the Doors     Video Surveillance     At-a-Glance: Physical Security     Physical and Logical Security   Part VI: Data Centers and Application Networking     Moving Data Efficiently Data Centers     Store Once, Use Often     n-Tier Model     Functions and Requirements     At-a-Glance: Data Centers     Data Center Application: Corporate Expense System Storage Area Networks     Efficient Deployment of Critical Data     Fiber Channel and IP     Infiniband     At-a-Glance: Storage Networking     Server-Centric Storage Caching     Moving Content Close to the User     How Caching Works     Caching More Than Web Pages     Storage Caching: From Disk to Memory     Issues Affecting Caching     Caching Wide Area File Services     Branch Offices Rule     Centralizing Storage     Enter Wide Area File Services (WAFS)     At-a-Glance: Wide Area File Services Wide Area Application Services     Centralizing Applications     Enter Wide Area Application Services (WAAS)     At-a-Glance: Wide Area Application Services   Part VII: Unified Communications Voice over IP     Making Calls over the Web     Unifying Communications     Client Layer     Infrastructure Layer     Call-Processing Layer     Application Layer     Deployment Models     At-a-Glance: Voice over IP     Voice over IP     At-a-Glance: Unified Communications     Voice over IP: Toll Bypass Quality of Service     Converged Networks and QoS     What Is QoS?     QoS and Unified Communications     At-a-Glance: QoS     How Packets Are Prioritized Unified Personal Communications     Too Many Communications, Too Little Time     Unify Me     Cisco Unified Personal Communicator (CUPC)     At-a-Glance: Unified Communications Meeting Collaboration Spaces     Meetings, Meetings, Meetings     Meetings Are an Activity, Not a Place     At-a-Glance: Meeting Collaboration Traditional Videoconferencing     I See You     Video over IP Networks     At-a-Glance: IP Videoconferencing     Videoconferencing     Videoconferencing Application E-Learning Telepresence     Conferencing Gets Simple     Video Killed the Radio Star        The Next-Best Thing to Being There     At-a-Glance: Telepresence Presence and Location-Aware Services     I Sense a Presence     The Importance of Location     At-a-Glance: Presence and Location-Aware Services IP Call Center     Why Can’t I Talk to a Real Person?     Anatomy of a Contact Center     From the Caller to the Agent, and Back Again     Managing Caller and Contact Agent Efficiency     New Methods for Customer Interaction     At-a-Glance: IP Contact Center     Call-Center Tech Support     Call-Center Telemarketing Multicast and IPTV Broadcasts     Watching Movies Without Flooding the World     At-a-Glance: IP Multicast     Multicast   Part VIII: Mobility     Wireless World Mobility and Wireless Networks     Throwing Away the Ties That Bind     At-a-Glance: Wireless LANs     Wired LANs     Wireless LANs Selecting and Building Wireless Networks     Designing a Wireless Network     At-a-Glance: Designing Wi-Fi Networks Securing Wireless Networks     Locking Down Wireless     Balancing Security and Access     At-a-Glance: Securing Wi-Fi Outdoor and Municipal Wireless Networks     It’s Just Like a Building, Only Way Bigger     At-a-Glance: Municipal Wi-Fi VoIP over Wireless Networks     Wireless VoIP     At-a-Glance: Wireless VoIP     Wireless VoIP Wireless Guest Access     Mi Casa Es Su Casa     At-a-Glance: Wireless Guest Access RFID and Location-Based Services     Finding Your Stuff     Wireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!     At-a-Glance: Location-Based Services     Wireless Location Services   Part IX: Virtualized Networks Virtualizing Data Centers     Growth of the Data Center     Data Center Virtualization     At-a-Glance: Virtual Data Centers Virtualizing Network Infrastructure     Leveraging Network Investment     A Network Is a Network     Virtualizing Network Infrastructure     At-a-Glance: Virtual Network Infrastructure Applications of Virtualized Networks     What Can You Do with Virtualized Networks?     Corporate Employee “Clean” and “Dirty” Networks     Guest and Partner Networks     Isolating Specialized Devices and Applications          Load Balancing     Providing Hosted Networks to Entities Within Entities     Departmental Virtual Networks     Challenges with Virtual Networks     At-a-Glance: Virtualized Network Applications     Evolution of Virtual Networks     1587201992    TOC    11/19/2007

About the Author :
Jim Doherty is the Chief Marketing Officer at CipherOptics. Before joining the CipherOptics team, he held leadership positions with Symbol Technologies and Cisco Systems. He has more than 16 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching solutions, and network security solutions. He is the coauthor of the Networking Simplifiedseries, published by Cisco Press. He is a former Marine Corps sergeant. He holds a B.S. in electrical engineering from North Carolina State University and an MBA from Duke University.   Neil Anderson is the Senior Manager of Technology Systems Engineering with Cisco Systems. He has more than 20 years of broad engineering experience, including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, his focus is on business networks in the areas of network architecture, wireless, security, unified communications, and emerging technologies. He is the coauthor of the Networking Simplified series, published by Cisco Press. He holds a B.S. in computer science.  


Best Sellers


Product Details
  • ISBN-13: 9781587055973
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Weight: 1 gr
  • ISBN-10: 158705597X
  • Publisher Date: 18 Dec 2007
  • Binding: Digital download
  • Series Title: Networking Technology


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cisco Networking Simplified: (Networking Technology)
Pearson Education (US) -
Cisco Networking Simplified: (Networking Technology)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cisco Networking Simplified: (Networking Technology)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!