Implementing etiketine sahip kayıtlar gösteriliyor. Tüm kayıtları göster
Implementing etiketine sahip kayıtlar gösteriliyor. Tüm kayıtları göster

30 Ekim 2008 Perşembe

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1) (Authorized Self-Study Guide)

Product Description
Foundation learning for CIPT1 exam 642-446

Dennis Hartmann, CCIE® No. 15651

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1), is a Cisco®-authorized, self-paced learning tool for CCVP® foundation learning. This book provides the knowledge necessary to install, configure, and deploy a Cisco Unified Communications solution based on Cisco Unified Communications Manager, the call routing and signaling component of the Cisco Unified Communications solution. By reading this book, you will gain an understanding of deploying a Cisco Unified Communications Manager to support single site, centralized, distributed, and hybrid call processing models.

This book focuses on Cisco Unified Communications Manager Release 6.x. You will learn how to install and configure Cisco Unified Communications Manager, power over Ethernet switches, and gateways using MGCP. You will also learn how to build a scalable dial plan for on-net and off-net calls. The dial plan chapters of the book cover call routing, call coverage, digit manipulation, class of service, and call coverage components. This book will teach you how to implement media resources, LDAP directory integration, and various endpoints including Skinny Client Control Protocol (SCCP) and Session Initiation Protocol (SIP). Cisco Unified Video Advantag endpoint configuration is covered, in addition to, Cisco Unity® voice mail integration and basic voice mail box creation. Various user features are discussed including Presence.

Whether you are preparing for CCVP certification or simply want to gain a better understanding of Cisco Unified Communications Manager fundamentals, you will benefit from the foundation information presented in this book.

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1), is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

Dennis J. Hartmann, CCIE® No. 15651 is a lead Unified Communications instructor at Global Knowledge. Dennis has been working with CallManager since CallManager 2.0. Dennis has various technical certifications: CCIE No. 15651, CCVP, CCSI, CCNP®, CCIP®, and MCSE. Dennis has worked with various Fortune 500 companies including AT&T, Sprint, Merrill Lynch, KPMG, and Cabletron Systems.

Understand Cisco Unified Communications Manager architecture and components
Evaluate Cisco Unified Communications Manager deployment models
Install, upgrade, and administer Cisco Unified Communications Manager
Apply network configuration, NTP, and DHCP configuration options
Configure and manage user accounts
Deploy various Cisco Unified IP Phones
Configure Catalyst® switches for power over Ethernet and voice VLAN requirements
Harden IP Phones to mitigate security risks
Configure Media Gateway Control Protocol (MGCP) gateways
Configure dial plans, call routing, and digit manipulation
Deploy various media resources and user features
Integrate Cisco Unity Voicemail with Cisco Unified Communications Manager
Configure video-enabled IP Phones


Product Details
Hardcover: 552 pages
Publisher: Cisco Press; 1 Stg edition (June 13, 2008)
Language: English
ISBN-10: 1587054833
ISBN-13: 978-1587054839
Product Dimensions: 9.2 x 7.6 x 1.3 inches http://rapidshare.com/files/142344556/Implementing.Cisco.Unified.Communications.Manager.Part.1.pdf

19 Ekim 2008 Pazar

Implementing SOA : Total Architecture in Practice

In his first book, Succeeding with SOA, Paul Brown explained that if enterprise goals are to be met, business processes and information systems must be designed together as parts of a total architecture. In this second book, Implementing SOA, he guides you through the entire process of designing and developing a successful total architecture at both project and enterprise levels. Drawing on his own extensive experience, he provides best practices for creating services and leveraging them to create robust and flexible SOA solutions. Coverage includes
Evolving the enterprise architecture towards an SOA while continuing to deliver business value on a project-by-project basis
Understanding the fundamentals of SOA and distributed systems, the dominant architectural issues, and the design patterns for addressing them
Understanding the distinct roles of project and enterprise architects and how they must collaborate to create an SOA
Understanding the need for a comprehensive total architecture approach that encompasses business processes, people, systems, data, and infrastructure
Understanding the strategies and tradeoffs for implementing robust, secure, high-performance, and high-availability solutions
Understanding how to incorporate business process management (BPM) and business process monitoring into the enterprise architectureWhether you’re defining an enterprise architecture or delivering individual SOA projects, this book will give you the practical advice you need to get the job done.

Product Details
Paperback: 736 pages
Publisher: Addison-Wesley Professional; 1 edition (April 4, 2008)
Language: English
ISBN-10: 0321504720
ISBN-13: 978-0321504722
Product Dimensions: 9.1 x 6.9 x 1.4 inches

12 Ekim 2008 Pazar

Implementing Email and Security Tokens: Current Standards, Tools, and Practices

Editorial Reviews

Product Description
It's your job to make email safe.

Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.

Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices (or "tokens") that can be used to store and protect private keys From the Back CoverIt's your job to make email safe.

Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices (or "tokens") that can be used to store and protect private keys


Product Details
Hardcover: 296 pages
Publisher: Wiley (May 12, 2008)
Language: English
ISBN-10: 0470254637
ISBN-13: 978-0470254639
Product Dimensions: 9.2 x 7.4 x 0.9 inches




http://rapidshare.com/files/140598370/Wiley.Implementing.Email.and.Security.Tokens.May.2008.eBook-BBL.rar