Flylib.com
Network Sales and Services Handbook (Cisco Press Networking Technology)
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
SCR (sustainable cell rate)
SDH (Synchronous Digital Hierarchy)
SDSL (Symmetric Digital Subscriber Line)
secure
security
attack methods 2nd
security threats:unauthorized access
unauthorized access
attacks:unauthorized access
security:DoS attacks
attacks:DoS
DoS attacks 2nd
security:network architectures:backbone
IDSs:placement:in backbone
placement:of IDSs:in backbone
security:network architectures:network perimeter
IDSs:placement:in network perimeter
placement:of IDSs:in network perimeter 2nd
security:network architectures:server farm
IDSs:placement:in server farm
placement:of IDSs:in server farm
self-healing network technologies
SONET
ser
show ip eigrp topology all command
commands:show ip eigrp topology all
signature
simple password authentication
simplex mode
simplicity
single-path algorithms
SMF
fiber optics:SMF
sockets
soft loop testing
software tokens
SONET:operation
fiber optics:SONET
SONET:optical interface layers
fiber optics:SONET:optical interface layers 2nd
SONET:path elements
fiber optics:SONET:path elements
SONET:STS
fiber optics:STS
STS (SONET Transport Signal)
source routing
routing:source routing
host-intelligent routing algorithms;router-intelligent routing algorithms
source-route translational bridging
source-route transparent bridging
spam
email:spam
spamming
SPF (shortest path first) algorithms
SPF algorithm
split horizon
IGRP
sta
stability
as routing algorithm design goal
standards bodies 2nd
star topology [See hub-and-spoke topology ]
static routing algorithms
STDM (Statistical Time Division Multiplexing)
STE (Section Terminating Equipment)
store and forward switching
strategic network management
tactical network management
stub areas
subnet masks
IP addressing:subnet masks
subnetting
SVCs (Switched Virtual Circuits)
PVCs (permanent virtual circuits)
switched access
WANs:switched access
switched local access
network local access:switched
switches
switching:VLANs
VLANs 2nd
switching:VLANs:membership
VLANs:membership
membership:VLANs
switching:VLANs:types of
VLANs:types of
symmetric key systems
DES
Previous page
Table of content
Next page
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269
Authors:
Matthew J Castelli
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Identifying Project Resource Risk
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Appendix A Selected Detail From the PERIL Database
Java for RPG Programmers, 2nd Edition
The Java Onion
Javas Language And Syntax
Structured Operations And Statements
An Object Orientation
Exceptions
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Cisco Discovery Protocol
System Banners
How Packets Match a List Entry
Static Routes
Dialer Interfaces (Dialer Profiles)
The Complete Cisco VPN Configuration Guide
VPNs: Choosing a Solution
L2TP
Routing on the Concentrator
VPN Client GUI Options
Summary
C & Data Structures (Charles River Media Computer Engineering)
Union
Arrays, Searching, and Sorting
Linked Lists
Problems in Arrays, Searching, Sorting, Hashing
Problems in Linked Lists
Cisco Voice Gateways and Gatekeepers
Case Study: Configuring SIP Between a Gateway and CallManager 5.x
Digital Trunks
Digit Manipulation
Review Questions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies