Tampilkan postingan dengan label CISCO. Tampilkan semua postingan
Tampilkan postingan dengan label CISCO. Tampilkan semua postingan

Senin, 15 September 2008

Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)


Build a next-generation telecommunications infrastructure

Consolidate divergent networks into one seamless, high-performance communications landscape using cutting-edge SIP technology, tools, and techniques. Session Initiation Protocol (SIP): Controlling Convergent Networks explains how to deliver Internet phone calls, IMs, video streams, and teleconferences across legacy, wireless, and wireline networks. Learn how to manage SIP sessions, build layers and proxies, interpret control codes, set up gateways, and comply with IETF and 3GPP standards. You'll also get details on using the latest methods, maximizing QoS, and implementing security measures.

* Initiate, modify, and terminate IETF-compliant SIP sessions
* Construct SIP messages, requests, proxies, functions, and layers
* Interconnect WiFi, WiMax, VoIP, and wireline networks
* Incorporate TDM and SS7 systems using media and signaling gateways
* Determine user locations with REGISTER and presence techniques
* Augment functionality using RFCs and packet cable extensions
* Prevent hijacking, tampering, DoS, DDoS, and BOTS attacks
* Implement reliable authentication, encryption, and intrusion detection policies

More Information

Senin, 23 Juni 2008

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1)


Implementing Cisco Unified Communications Manager, Part 1 (CIPT1), is a Cisco®-authorized, self-paced learning tool for CCVP® foundation learning. This book provides the knowledge necessary to install, configure, and deploy a Cisco Unified Communications solution based on Cisco Unified Communications Manager, the call routing and signaling component of the Cisco Unified Communications solution. By reading this book, you will gain an understanding of deploying a Cisco Unified Communications Manager to support single site, centralized, distributed, and hybrid call processing models.

This book focuses on Cisco Unified Communications Manager Release 6.x. You will learn how to install and configure Cisco Unified Communications Manager, power over Ethernet switches, and gateways using MGCP. You will also learn how to build a scalable dial plan for on-net and off-net calls. The dial plan chapters of the book cover call routing, call coverage, digit manipulation, class of service, and call coverage components. This book will teach you how to implement media resources, LDAP directory integration, and various endpoints including Skinny Client Control Protocol (SCCP) and Session Initiation Protocol (SIP). Cisco Unified Video Advantag endpoint configuration is covered, in addition to, Cisco Unity® voice mail integration and basic voice mail box creation. Various user features are discussed including Presence.

*Understand Cisco Unified Communications Manager architecture and components
*Evaluate Cisco Unified Communications Manager deployment models
*Install, upgrade, and administer Cisco Unified Communications Manager
*Apply network configuration, NTP, and DHCP configuration options
*Configure and manage user accounts
*Deploy various Cisco Unified IP Phones
*Configure Catalyst® switches for power over Ethernet and voice VLAN requirements
*Harden IP Phones to mitigate security risks
*Configure Media Gateway Control Protocol (MGCP) gateways
*Configure dial plans, call routing, and digit manipulation
*Deploy various media resources and user features
*Integrate Cisco Unity Voicemail with Cisco Unified Communications Manager
*Configure video-enabled IP Phones

More Information

Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It¡¯s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You¡¯ll prevent tomorrow¡¯s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals.
  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networksLocate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
More Information

iExec Enterprise Essentials Companion Guide

iExec Enterprise Essentials Companion Guide is the official print companion to the Cisco® Entrepreneur Institute¡¯s new iExec Enterprise Essentials curriculum¡ªinnovative IT-related business education designed to help you transform organizations through the strategic use of IT and Internet applications. Working through a realistic, start-to-finish case study, you¡¯ll learn exactly how to use technology to help businesses enhance their processes and drive sustainable competitive advantage.

Organized to fully align with the course¡¯s online curriculum, this is the only authorized iExec textbook. You¡¯ll begin by reviewing the global trends, opportunities, and strategic imperatives that now drive IT¡¯s usage. Next, you¡¯ll discover IT-enabled business strategies that increase productivity, efficiency, innovation, and profitability and learn how to trans-form any organization into an agile, high-performance Networked Virtual Organization (NVO). Through hands-on practice, you¡¯ll learn how to assess and improve organizational readiness, enhance governance, Internet-enable internal and external processes, use portfolio management to plan business-driven IT investments, manage change, and more.

*Master every topic and concept in the new Cisco Entrepreneur Institute¡¯s iExec Enterprise Essentials curriculum
*Understand the global trends and business drivers behind today¡¯s investments in IT and Internet technologies
*Build Networked Virtual Organizations that respond more quickly to customers, collaborate better with partners on value-added activities, and reduce cost by standardizing processes, data, and infrastructure
*Perform external and internal situation analysis, create an e-vision for success, and build an effective business case
*Implement strategic planning and portfolio management to create a successful Internet-enabled business roadmap
*Prioritize opportunities for process improvement using the Internet and IT
*Identify change management techniques that can reduce your risks

More Information

CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822)


Expert exam prep from leading Cisco authority Todd Lammle
Start your preparation here for Cisco's new CCENT entry-level networking certification, your entry point into Cisco's popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the Interconnecting Cisco Networking Devices, Part 1 exam (640-822) and the start of a career, with pages of exam essentials, real-world scenarios, and hands-on exercises. Topics include the operation of data networks, how to implement both switched and routed networks, and much more.

More Information
Info Mirror