|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn123904745 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070501s2006 inua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCG
|d TXJ
|d MKN
|d CEF
|d OCLCQ
|d MBB
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d AU@
|d OCLCQ
|d WYU
|d VT2
|d RDF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 71388386
|a 85872636
|a 827898881
|a 1062923848
|a 1103256554
|a 1129338158
|a 1202538705
|a 1240525935
|
020 |
|
|
|a 1587051796
|
020 |
|
|
|a 9781587051791
|
020 |
|
|
|a 0132385996
|
020 |
|
|
|a 9780132385992
|
029 |
1 |
|
|a AU@
|b 000050260533
|
029 |
1 |
|
|a CHBIS
|b 006148236
|
029 |
1 |
|
|a CHVBK
|b 171261445
|
029 |
1 |
|
|a DEBSZ
|b 355389592
|
029 |
1 |
|
|a HEBIS
|b 29146274X
|
035 |
|
|
|a (OCoLC)123904745
|z (OCoLC)71388386
|z (OCoLC)85872636
|z (OCoLC)827898881
|z (OCoLC)1062923848
|z (OCoLC)1103256554
|z (OCoLC)1129338158
|z (OCoLC)1202538705
|z (OCoLC)1240525935
|
037 |
|
|
|a CL0500000009
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.E87
|b .L488 2006
|
082 |
0 |
4 |
|a 004.678
|q OCoLC
|2 22/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lewis, Mark,
|c CCIE.
|
245 |
1 |
0 |
|a Comparing, designing, and deploying VPNs /
|c by Mark Lewis.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco Press,
|c 2006.
|
300 |
|
|
|a 1 online resource (1080 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cisco Press networking technology series
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Ch. 1.
|t What is design for Six Sigma? --
|g Ch. 2.
|t business case for DFSS --
|g Ch. 3.
|t Six Sigma financial metrics --
|g Ch. 4.
|t Project identification and portfolio management --
|g Ch. 5.
|t Stage-gate processes --
|g Ch. 6.
|t Project management --
|g Ch. 7.
|t Business plan overview --
|g Ch. 8.
|t Market segmentation --
|g Ch. 9.
|t Identifying market opportunities --
|g Ch. 10.
|t Defining product value --
|g Ch. 11.
|t Estimating financial value --
|g Ch. 12.
|t Product positioning --
|g Ch. 13.
|t Concept development --
|g Ch. 14.
|t Developing the interview guide --
|g Ch. 15.
|t Conducting customer interviews --
|g Ch. 16.
|t KJ analysis --
|g Ch. 17.
|t Relative importance survey --
|g Ch. 18.
|t Ideation --
|g Ch. 19.
|t Pugh concept selection --
|g Ch. 20.
|t QFD --
|g Ch. 21.
|t TRIZ --
|g Ch. 22.
|t Critical parameter management --
|g Ch. 23.
|t Process mapping --
|g Ch. 24.
|t Cause and effects matrix --
|g Ch. 25.
|t Failure modes and effects analysis --
|g Ch. 26.
|t Statistical analysis tools overview --
|g Ch. 27.
|t Measurement systems analysis --
|g Ch. 28.
|t Process capability --
|g Ch. 29.
|t Tools for data analysis --
|g Ch. 30.
|t Design of experiments --
|g Ch. 31.
|t Robust design --
|g Ch. 32.
|t Mixture experiments --
|g Ch. 33.
|t Seeking an optimal solution --
|g Ch. 34.
|t Design for reliability --
|g Ch. 35.
|t Statistical tolerancing --
|g Ch. 36.
|t Production scale-up --
|g Ch. 37.
|t Control plans --
|g Ch. 38.
|t Product launch and project post-mortem analysis.
|
520 |
|
|
|a A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secure IPsec and L2TP remote access VPN designs, including consideration of authentication, encryption, split-tunneling, high availability, load-balancing, and NAT transparency Master scalable IPsec site-to-site VPN design and implementation including configuration of security protocols and policies, multiprotocol/ multicast traffic transport, NAT/PAT traversal, quality of service (QoS), Dynamic Multipoint VPNs (DMVPNs), and public key infrastructure (PKI) Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available, companies and providers are often hard pressed to identify, design, and deploy the VPN solutions that are most appropriate for their particular network architecture and service needs. Comparing, Designing, and Deploying VPNs brings together the most popular VPN technologies for convenient reference. The book examines the real-world operation, application, design, and configuration of the following site-to-site VPNs: Layer 2 Tunneling Protocol version 3 (L2TPv3)-based Layer 2 VPNs (L2VPN); Any Transport over MPLS (AToM)-based L2VPN; MPLS Layer 3-based VPNs; and IP Security (IPsec)-based VPNs. The book covers the same details for the following remote access VPNs: Layer 2 Tunneling Protocol version 2 (L2TPv2) VPNs; L2TPv3 VPNs; IPsec-based VPNs; and Secure Socket Layer (SSL) VPNs. Through the operation, application, and configuration details offered in each chapter, you'll learn how to compare and contrast the numerous types of ...
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Extranets (Computer networks)
|
650 |
|
6 |
|a Extranets.
|
650 |
|
7 |
|a Extranets (Computer networks)
|2 blmlsh
|
650 |
|
7 |
|a Extranets (Computer networks)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Lewis, Mark, CCIE.
|t Comparing, designing, and deploying VPNs.
|d Indianapolis, Ind. : Cisco Press, 2006
|w (DLC) 2003114910
|
830 |
|
0 |
|a Cisco Press networking technology series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587051796/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|