KODAK New Pocket Guide to Digital Photography
Author: Eastman Kodak Company
Wonderfully easy-to-use, concise, portable enough to stash in a camera bag, and packed with all the basics on taking digital photos: this invaluable pocket guide is everything you’d expect from a digital imaging leader such as Kodak. Filled with first-rate information, it covers everything from choosing the right digital camera to selecting accessories, from saving digital images to sharing photos with friends and family over e-mail. Find out all the basics on file formats, downloading pictures, taking better portraits, and improving image composition. This guide will help photographers get superior results from their digital camera, and even those new to digital—and intimidated by technology—will find themselves shooting with confidence.
Read also Caring for Economics or International Advertising
Cisco Networking Simplified, Second Edition
Author: Neil Anderson
Now 100 percent updated for the latest technologies, this is today's easiest, most visual guide to Cisco® networking. Even if you've never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.
What you always wanted to know about networking but were afraid to ask!
- How networks and the Internet work
- How to build coherent, cost-effective network infrastructures
- How to design networks for maximum reliability and availability
- What you need to know about data center and application networking
- How to secure networks against today's threats and attacks
- How to take advantage of the latest mobility technologies
- How virtualizing networks can help businesses leverage their network investments even further
- How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture
Table of Contents:
IntroductionPart I: Networking Fundamentals
How Computers Communicate
The OSI Model
Open Versus Proprietary Systems
Seven Layers
At-a-Glance: OSI Model
Internet Infrastructure: How It All Connects
TCP/IP and IP Addressing
Computers Speaking the Same Language
What Is an Address?
Dynamically Allocated IP Addresses
Domain Names and Relationship to IP Addresses
Matching Domain Names to IP Addresses
At-a-Glance: TCP/IP
At-a-Glance: IP Addressing
At-a-Glance: IPv6
NAT and PAT
Internet Applications
The Internet and Its Applications
E-Mail
Web Browsing
E-Mail
Peer-to-Peer Sharing
Part II: Networking Infrastructure
Ethernet
History of Ethernet
What Is Ethernet?
Evolution of Ethernet
At-a-Glance: Ethernet
Reducing Collisions on Ethernet
LAN Switching
Fast Computers Need Faster Networks
Switching Basics: It’s a Bridge
Switching Ethernets
Switches Take Over the World
At-a-Glance: Switching
Spanning Tree
Network Loops
Sometimes, the Earth Is Flat
Preventing Network Loops
Spanning-Tree Fundamentals
At-a-Glance: Spanning Tree
Routing
Routers
Routers Talk Among Themselves to Find Routes
Routers Route Packets
Routers Bridge andSwitches Route
At-a-Glance: Routing
Routing and Switching
Part III: Network Design
Campus Networks and Hierarchical Design
Building Networks for Ease of Use
At-a-Glance: Hierarchical Campus Design
WAN Network Design
Moving Traffic Across the Street and the World
WAN Services
Integrated Services Digital Network
Frame Relay
ATM
MPLS
Broadband
Virtual Private Networks (VPN)
WAN Devices
At-a-Glance: Frame Relay
At-a-Glance: Asynchronous Transfer Mode (ATM)
Multiprotocol Label Switching (MPLS) Services
At-a-Glance: MPLS
MPLS Traffic Separation
Broadband Technologies
Always-on Access
Broadband Technology Evolution
At-a-Glance: ISDN
At-a-Glance: Broadband
Virtual Private Networks
Secure Networking Over the Internet
At-a-Glance: VPNs
Establishing a VPN Connection
At-a-Glance: Encryption
Client Authentication
Optical Technologies
LANs, WANs—and Now MANs
SONET, DWDM, and DPT
At-a-Glance: Metro Optical
Branch Office Network Designs
Distributed Workforce
Distributed Office Challenges
At-a-Glance: Branch Office Design
Part IV: Network Availability
High Availability
At-a-Glance: High Availability
Control Plane
When Good Networks Go Bad
Control Plane Protection
At-a-Glance: Control Plane Protection
Quality of Service and Network Availability
Quality of Service as Network Protection?
Scavenger QoS
At-a-Glance: QoS for Network Resiliency
Disaster Recovery
What Happens When the Network Stops Working
DR Planning
Resiliency and Backup Services
Preparedness Testing
At-a-Glance: Disaster Recovery: Business Continuance
Disaster Recovery
Network Management
Keeping the Network Alive from Afar
Network Documentation: A Must-Have
Network-Management Protocols
Troubleshooting Tools
At-a-Glance: Network Management
Network Management
Part V: Securing the Network
Network Security
Identity
Perimeter Security
Data Privacy
Security Monitoring
Policy Enforcement
At-a-Glance: Network Security
At-a-Glance: Hacking
DoS Attacks
Snooping and Spoofing
Firewalls
Protecting the Perimeter
Get Off the Net!
Firewall for Your Protection
Personal Firewalls
At-a-Glance: Firewalls and IDS
Firewalls and IDS
Access and Content Security
Intrusion Prevention Systems
Intrusion Detection Systems
Intrusion Prevention Systems
The Problem with False Positives
At-a-Glance: Intrusion Detection
Port-Based Security
Combating Access-Based Attacks
At-a-Glance: Port-Based Security
Identity-Based Networking
Network Access Conundrum
Identity-Based Networking
802.1x
At-a-Glance: Identity
Authentication
Network Admission Control
Combating Virus Outbreaks
Assessing Device “Health”
Network Admission Control
At-a-Glance: NAC
URL Filtering: Eliminating Unwanted Web Page Access
Internet Access and Liability Issues
Enforcing Corporate Internet Usage Policies
At-a-Glance: URL Filtering
URL Filtering and Firewalls
Deep Packet Inspection: Controlling Unwanted Applications
How Do You Catch a Criminal When Everyone Wears a Mask?
Deep Packet Inspection
At-a-Glance: Deep Packet Inspection
Packet Inspection
Telemetry: Identifying and Isolating Attack Sources
Normal or Abnormal
Using Telemetry to Combat Attacks
At-a-Glance: Telemetry
Physical Security: IP Video Surveillance
Locks on the Doors
Video Surveillance
At-a-Glance: Physical Security
Physical and Logical Security
Part VI: Data Centers and Application Networking
Moving Data Efficiently
Data Centers
Store Once, Use Often
n-Tier Model
Functions and Requirements
At-a-Glance: Data Centers
Data Center Application: Corporate Expense System
Storage Area Networks
Efficient Deployment of Critical Data
Fiber Channel and IP
Infiniband
At-a-Glance: Storage Networking
Server-Centric Storage
Caching
Moving Content Close to the User
How Caching Works
Caching More Than Web Pages
Storage Caching: From Disk to Memory
Issues Affecting Caching
Caching
Wide Area File Services
Branch Offices Rule
Centralizing Storage
Enter Wide Area File Services (WAFS)
At-a-Glance: Wide Area File Services
Wide Area Application Services
Centralizing Applications
Enter Wide Area Application Services (WAAS)
At-a-Glance: Wide Area Application Services
Part VII: Unified Communications
Voice over IP
Making Calls over the Web
Unifying Communications
Client Layer
Infrastructure Layer
Call-Processing Layer
Application Layer
Deployment Models
At-a-Glance: Voice over IP
Voice over IP
At-a-Glance: Unified Communications
Voice over IP: Toll Bypass
Quality of Service
Converged Networks and QoS
What Is QoS?
QoS and Unified Communications
At-a-Glance: QoS
How Packets Are Prioritized
Unified Personal Communications
Too Many Communications, Too Little Time
Unify Me
Cisco Unified Personal Communicator (CUPC)
At-a-Glance: Unified Communications
Meeting Collaboration Spaces
Meetings, Meetings, Meetings
Meetings Are an Activity, Not a Place
At-a-Glance: Meeting Collaboration
Traditional Videoconferencing
I See You
Video over IP Networks
At-a-Glance: IP Videoconferencing
Videoconferencing
Videoconferencing Application E-Learning
Telepresence
Conferencing Gets Simple
Video Killed the Radio Star
The Next-Best Thing to Being There
At-a-Glance: Telepresence
Presence and Location-Aware Services
I Sense a Presence
The Importance of Location
At-a-Glance: Presence and Location-Aware Services
IP Call Center
Why Can’t I Talk to a Real Person?
Anatomy of a Contact Center
From the Caller to the Agent, and Back Again
Managing Caller and Contact Agent Efficiency
New Methods for Customer Interaction
At-a-Glance: IP Contact Center
Call-Center Tech Support
Call-Center Telemarketing
Multicast and IPTV Broadcasts
Watching Movies Without Flooding the World
At-a-Glance: IP Multicast
Multicast
Part VIII: Mobility
Wireless World
Mobility and Wireless Networks
Throwing Away the Ties That Bind
At-a-Glance: Wireless LANs
Wired LANs
Wireless LANs
Selecting and Building Wireless Networks
Designing a Wireless Network
At-a-Glance: Designing Wi-Fi Networks
Securing Wireless Networks
Locking Down Wireless
Balancing Security and Access
At-a-Glance: Securing Wi-Fi
Outdoor and Municipal Wireless Networks
It’s Just Like a Building, Only Way Bigger
At-a-Glance: Municipal Wi-Fi
VoIP over Wireless Networks
Wireless VoIP
At-a-Glance: Wireless VoIP
Wireless VoIP
Wireless Guest Access
Mi Casa Es Su Casa
At-a-Glance: Wireless Guest Access
RFID and Location-Based Services
Finding Your Stuff
Wireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!
At-a-Glance: Location-Based Services
Wireless Location Services
Part IX: Virtualized Networks
Virtualizing Data Centers
Growth of the Data Center
Data Center Virtualization
At-a-Glance: Virtual Data Centers
Virtualizing Network Infrastructure
Leveraging Network Investment
A Network Is a Network
Virtualizing Network Infrastructure
At-a-Glance: Virtual Network Infrastructure
Applications of Virtualized Networks
What Can You Do with Virtualized Networks?
Corporate Employee “Clean” and “Dirty” Networks
Guest and Partner Networks
Isolating Specialized Devices and Applications
Load Balancing
Providing Hosted Networks to Entities Within Entities
Departmental Virtual Networks
Challenges with Virtual Networks
At-a-Glance: Virtualized Network Applications
Evolution of Virtual Networks
1587201992 TOC 11/19/2007
No comments:
Post a Comment