paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Condizione: good. A copy that has been read, remains in good condition. All pages are intact, and the cover is intact. The spine and cover show signs of wear. Pages can include notes and highlighting and show signs of wear, and the copy can include "From the library of" labels or previous owner inscriptions. 100% GUARANTEE! Shipped with delivery confirmation, if you're not satisfied with purchase please return item for full refund. Ships via media mail.
Condizione: As New. Unread book in perfect condition.
Condizione: New.
Condizione: New.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 46,52
Quantità: 2 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
Da: California Books, Miami, FL, U.S.A.
EUR 57,95
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 52,40
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 46,52
Quantità: 1 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days.
Condizione: New. Brand new! Please provide a physical shipping address.
Lingua: Inglese
Editore: Packt Publishing Limited, GB, 2023
ISBN 10: 1786461676 ISBN 13: 9781786461674
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 73,84
Quantità: Più di 20 disponibili
Aggiungi al carrelloDigital. Condizione: New. Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2About This Book. Place Wireshark 2 in your network and configure it for effective network analysis. Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease. A practical guide with exciting recipes on a widely used network protocol analyzerWho This Book Is ForThis book is for security professionals, network administrators, RandD, engineering and technical support, and communications managers who are using Wireshark for network analysis and troubleshooting. It requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations. What You Will Learn. Configure Wireshark 2 for effective network analysis and troubleshooting. Set up various display and capture filters. Understand networking layers, including IPv4 and IPv6 analysis. Explore performance issues in TCP/IP. Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs. Get information about network phenomena, events, and errors. Locate faults in detecting security failures and breaches in networksIn DetailThis book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you've learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you'll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them.Style and approachThis book consists of practical recipes on Wireshark 2 that target novices as well as intermediate Wireshark users. It goes deep into the technical issues, covers additional protocols, and many more real-live examples so that you are able to implement it in your daily life scenarios.
Paperback or Softback. Condizione: New. Containers in Cisco Ios-Xe, Ios-Xr, and Nx-OS: Orchestration and Operation. Book.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 68,44
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 69,54
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Revaluation Books, Exeter, Regno Unito
EUR 80,22
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 462 pages. 9.00x7.50x1.00 inches. In Stock.
Da: moluna, Greven, Germania
EUR 50,72
Quantità: 2 disponibili
Aggiungi al carrelloKartoniert / Broschiert. Condizione: New. Direct from Cisco, Containers in Cisco IOS-XE, IOS-XR, and NX-OS: Orchestration and Operation is the complete guide to deploying and operating containerized application and network services in Cisco platforms.The authors begin by reviewi.
EUR 60,80
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. By the end of thi.
Lingua: Inglese
Editore: Pearson Education Aug 2020, 2020
ISBN 10: 0135895758 ISBN 13: 9780135895757
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 62,88
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware - A comprehensive guide to learning container and application hosting capabilities in Cisco platforms, and implementing them to achieve higher efficiency in network deployments and operationsCisco architectures offer comprehensive compute virtualization capabilities to accommodate both native and third-party container hosting, so you can containerize and instantiate any application or network service and gain unprecedented value from your networks.Direct from Cisco, this is the complete guide to deploying and operating containerized application and network services on Cisco platforms. First, the authors review essential virtualization and containerization concepts for all network professionals and introduce leading orchestration tools. Next, they take a deep dive into container networking, introducing Cisco architectural support for container infrastructures. You ll find modular coverage of configuration, activation,orchestration, operations, and application hosting for each key Cisco software platform: IOS-XE, IOS-XR, and NX-OS.The authors explore diverse orchestration tools, including LXC,Docker, and Kubernetes, and cover both Cisco and open-source tools for building and testing applications. They conclude with multiple use cases that show how containerization can improve agility and efficiency in a wide range of network environments. Review the motivation, drivers, and concepts of computing virtualizationLearn how Cisco platforms are achieving infrastructure virtualizationExplore the Cisco reference model for developing cloud-native services and moving to cloud-native network functionsMaster Cisco container networking fundamentals, supported modes, and configurationEnable,install, activate, and orchestrate containerized applications in Cisco IOS-XE,IOS-XR, and NX-OSCompare tools and methods for developing, testing, hosting, and orchestrating containerized applicationsDiscover real-world use cases for Day-0, Day-1, and Day-2 operations, with practical deployment examplesPreview merging trends in network containerization.
Lingua: Inglese
Editore: Packt Publishing Limited, GB, 2023
ISBN 10: 1786461676 ISBN 13: 9781786461674
Da: Rarewaves.com UK, London, Regno Unito
EUR 69,26
Quantità: Più di 20 disponibili
Aggiungi al carrelloDigital. Condizione: New. Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2About This Book. Place Wireshark 2 in your network and configure it for effective network analysis. Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease. A practical guide with exciting recipes on a widely used network protocol analyzerWho This Book Is ForThis book is for security professionals, network administrators, RandD, engineering and technical support, and communications managers who are using Wireshark for network analysis and troubleshooting. It requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations. What You Will Learn. Configure Wireshark 2 for effective network analysis and troubleshooting. Set up various display and capture filters. Understand networking layers, including IPv4 and IPv6 analysis. Explore performance issues in TCP/IP. Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs. Get information about network phenomena, events, and errors. Locate faults in detecting security failures and breaches in networksIn DetailThis book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you've learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you'll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them.Style and approachThis book consists of practical recipes on Wireshark 2 that target novices as well as intermediate Wireshark users. It goes deep into the technical issues, covers additional protocols, and many more real-live examples so that you are able to implement it in your daily life scenarios.
Da: Majestic Books, Hounslow, Regno Unito
EUR 63,14
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. 626.