๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

MPLS VPN Security

โœ Scribed by Michael H. Behringer, Monique J. Morrow


Publisher
Cisco Press
Year
2005
Tongue
English
Leaves
286
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Programmers are craftspeople trained to use a certain set of tools (editors, object managers, version trackers) to generate a certain kind of product (programs) that will operate in some environment (operating systems on hardware assemblies). Like any other craft, computer programming has spawned a body of wisdom, most of which isn't taught at universities or in certification classes. Most programmers arrive at the so-called tricks of the trade over time, through independent experimentation. In The Pragmatic Programmer, Andrew Hunt and David Thomas codify many of the truths they've discovered during their respective careers as designers of software and writers of code.Some of the authors' nuggets of pragmatism are concrete, and the path to their implementation is clear. They advise readers to learn one text editor, for example, and use it for everything. They also recommend the use of version-tracking software for even the smallest projects, and promote the merits of learning regular expression syntax and a text-manipulation language. Other (perhaps more valuable) advice is more light-hearted. In the debugging section, it is noted that, "if you see hoof prints think horses, not zebras. That is, suspect everything, but start looking for problems in the most obvious places. There are recommendations for making estimates of time and expense, and for integrating testing into the development process. You'll want a copy of The Pragmatic Programmer for two reasons: it displays your own accumulated wisdom more cleanly than you ever bothered to state it, and it introduces you to methods of work that you may not yet have considered. Working programmers will enjoy this book.


๐Ÿ“œ SIMILAR VOLUMES


MPLS VPN security: [a practical guide to
โœ Behringer, Michael H;Morrow, Monique ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Cisco Press ๐ŸŒ English

This book tackles the subject of MPLS VPN security for network managers, CTOs, enterprise IT managers, and network service architects.<i>MPLS VPN Security</i>provides a thorough overview of MPLS security, with practical recommendations on how to securely implement and operate MPLS networks. It begin

MPLS and VPN Architectures
โœ Ivan Pepelnjak, Jim Guichard ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Cisco Press ๐ŸŒ English

A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousan

MPLS and VPN Architectures
โœ Ivan Pepelnjak, Jim Guichard ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Cisco Press ๐ŸŒ English

<p>Prepare for CCIP certification as you learn to design and deploy MPLS-based VPNs</p><ul><li>Assists in preparation for the CCIP MPLS elective exam with detailed technology coverage and review questions</li><li>Offers in-depth analysis of MPLS architecture</li><li>Helps you learn how MPLS scales t

Selecting MPLS VPN Services
โœ Lewis, Chris ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Cisco Press ๐ŸŒ English

This is a guide for those using and defining MPLS VPN services.

MPLS and VPN architectures
โœ Ivan Pepelnjak, Jim Guichard ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Cisco Press ๐ŸŒ English

Multiprotocol Label Switching (MPLS) provides the mechanisms to perform label switching, which is an innovative technique for high-performance packet forwarding. This book provides an in-depth study of MPLS technology, including MPLS theory and configuration, network design issues, and case studies.

MPLS and VPN architectures
โœ Ivan Pepelnjak ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Cisco Press ๐ŸŒ English

MPLS and VPN Architectures, Volume II , begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration ofservice provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSP