Flylib.com
Network Sales and Services Handbook (Cisco Press Networking Technology)
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
SCR (sustainable cell rate)
SDH (Synchronous Digital Hierarchy)
SDSL (Symmetric Digital Subscriber Line)
secure
security
attack methods 2nd
security threats:unauthorized access
unauthorized access
attacks:unauthorized access
security:DoS attacks
attacks:DoS
DoS attacks 2nd
security:network architectures:backbone
IDSs:placement:in backbone
placement:of IDSs:in backbone
security:network architectures:network perimeter
IDSs:placement:in network perimeter
placement:of IDSs:in network perimeter 2nd
security:network architectures:server farm
IDSs:placement:in server farm
placement:of IDSs:in server farm
self-healing network technologies
SONET
ser
show ip eigrp topology all command
commands:show ip eigrp topology all
signature
simple password authentication
simplex mode
simplicity
single-path algorithms
SMF
fiber optics:SMF
sockets
soft loop testing
software tokens
SONET:operation
fiber optics:SONET
SONET:optical interface layers
fiber optics:SONET:optical interface layers 2nd
SONET:path elements
fiber optics:SONET:path elements
SONET:STS
fiber optics:STS
STS (SONET Transport Signal)
source routing
routing:source routing
host-intelligent routing algorithms;router-intelligent routing algorithms
source-route translational bridging
source-route transparent bridging
spam
email:spam
spamming
SPF (shortest path first) algorithms
SPF algorithm
split horizon
IGRP
sta
stability
as routing algorithm design goal
standards bodies 2nd
star topology [See hub-and-spoke topology ]
static routing algorithms
STDM (Statistical Time Division Multiplexing)
STE (Section Terminating Equipment)
store and forward switching
strategic network management
tactical network management
stub areas
subnet masks
IP addressing:subnet masks
subnetting
SVCs (Switched Virtual Circuits)
PVCs (permanent virtual circuits)
switched access
WANs:switched access
switched local access
network local access:switched
switches
switching:VLANs
VLANs 2nd
switching:VLANs:membership
VLANs:membership
membership:VLANs
switching:VLANs:types of
VLANs:types of
symmetric key systems
DES
Previous page
Table of content
Next page
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269
Authors:
Matthew J Castelli
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
PL/SQL
Optimizing: The Crystal Reports Side
Optimizing: Reducing Parses
Data Dictionary Report
Appendix B Functions
VBScript Programmers Reference
What VBScript Is and Isn™t!
Data Types
The Scripting Runtime Objects
Appendix A VBScript Functions and Keywords
Appendix K The Variant Subtypes
C++ GUI Programming with Qt 3
Getting Started
Creating Dialogs
Signals and Slots in Depth
Lists
Connecting and Querying
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Expense Accounting and Earned Value
Quantitative Time Management
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
DNS & BIND Cookbook
Introduction
Creating a named.conf File
Stopping a Name Server
Configuring DNS for Virtual Email Addresses
Configuring a Name Server to Accommodate a Slave Running BIND 4
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies