Flylib.com
Network Sales and Services Handbook (Cisco Press Networking Technology)
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
SCR (sustainable cell rate)
SDH (Synchronous Digital Hierarchy)
SDSL (Symmetric Digital Subscriber Line)
secure
security
attack methods 2nd
security threats:unauthorized access
unauthorized access
attacks:unauthorized access
security:DoS attacks
attacks:DoS
DoS attacks 2nd
security:network architectures:backbone
IDSs:placement:in backbone
placement:of IDSs:in backbone
security:network architectures:network perimeter
IDSs:placement:in network perimeter
placement:of IDSs:in network perimeter 2nd
security:network architectures:server farm
IDSs:placement:in server farm
placement:of IDSs:in server farm
self-healing network technologies
SONET
ser
show ip eigrp topology all command
commands:show ip eigrp topology all
signature
simple password authentication
simplex mode
simplicity
single-path algorithms
SMF
fiber optics:SMF
sockets
soft loop testing
software tokens
SONET:operation
fiber optics:SONET
SONET:optical interface layers
fiber optics:SONET:optical interface layers 2nd
SONET:path elements
fiber optics:SONET:path elements
SONET:STS
fiber optics:STS
STS (SONET Transport Signal)
source routing
routing:source routing
host-intelligent routing algorithms;router-intelligent routing algorithms
source-route translational bridging
source-route transparent bridging
spam
email:spam
spamming
SPF (shortest path first) algorithms
SPF algorithm
split horizon
IGRP
sta
stability
as routing algorithm design goal
standards bodies 2nd
star topology [See hub-and-spoke topology ]
static routing algorithms
STDM (Statistical Time Division Multiplexing)
STE (Section Terminating Equipment)
store and forward switching
strategic network management
tactical network management
stub areas
subnet masks
IP addressing:subnet masks
subnetting
SVCs (Switched Virtual Circuits)
PVCs (permanent virtual circuits)
switched access
WANs:switched access
switched local access
network local access:switched
switches
switching:VLANs
VLANs 2nd
switching:VLANs:membership
VLANs:membership
membership:VLANs
switching:VLANs:types of
VLANs:types of
symmetric key systems
DES
Previous page
Table of content
Next page
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269
Authors:
Matthew J Castelli
BUY ON AMAZON
Project Management JumpStart
Developing Project Management Skills
Initiating the Project
Breaking Down the Project Activities
Executing the Project
Appendix A Answers to Review Questions
Adobe After Effects 7.0 Studio Techniques
The Timeline
Organization
Extending a Track with Expressions
Conclusion
Offsetting Layers and Time
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
Point-to-Point Protocol (PPP)
Internet Protocol (IP) Routing
Transmission Control Protocol (TCP) Basics
Virtual Private Networks (VPNs)
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Tcpdump
IDS and IPS Internals
NFR Security
Data Correlation
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
Relationships in the Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
The Development of E-tail Logistics
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Expense Accounting and Earned Value
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies