Product List
GET /services/catalog/products?format=api&page=74130
{ "links": { "first": "https://redshelf.com/services/catalog/products?format=api&page=1", "last": "https://redshelf.com/services/catalog/products?format=api&page=78533", "next": "https://redshelf.com/services/catalog/products?format=api&page=74131", "prev": "https://redshelf.com/services/catalog/products?format=api&page=74129" }, "data": [ { "type": "Product", "id": "00010000312858", "attributes": { "name": "The Technical and Social History of Software Engineering", "subtitle": "", "description": "<br> Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, its long and fascinating history. Capers new book is a must-read for every software engineering student and information technology professional.</p> From the Foreword by Tony Salvaggio, CEO and president, Computer Aid, Inc.</p> </p> </p> Software engineering is one of the worlds most exciting and important fields. Now, pioneering practitioner Capers Jones has written the definitive history of this world-changing industry. Drawing on several decades as a leading researcher and innovator, he illuminates the fields broad sweep of progress and its many eras of invention. He assesses the immense impact of software engineering on society, and previews its even more remarkable future. Decade by decade, Jones examines trends, companies, winners, losers, new technologies, productivity/quality issues, methods, tools, languages, risks, and more. He reviews key inventions, estimates industry growth, and addresses mysteries such as why programming languages gain and lose popularity. Inspired by Paul Starrs Pulitzer Prizewinning The Social Transformation of American Medicine, Jones new book is a tour de forceand compelling reading for everyone who wants to understand how software became what it is today. </p> </p> COVERAGE INCLUDES</p> The human need to compute: from ancient times to the modern era</p> Foundations of computing: Alan Turing, Konrad Zuse, and World War II</p> Big business, big defense, big systems: IBM, mainframes, and COBOL</p> A concise history of minicomputers and microcomputers: the birth of Apple and Microsoft</p> The PC era: DOS, Windows, and the rise of commercial software</p> Innovations in writing and managing code: structured development, objects, agile, and more</p> The birth and explosion of the Internet and the World Wide Web</p> The growing challenges of legacy system maintenance and support</p> Emerging innovations, from wearables to intelligent agents to quantum computing</p> Cybercrime, cyberwarfare, and large-scale software failure</p> </p>", "author": "Capers Jones", "slug": "the-technical-and-social-history-of-software-engineering-312858-9780133365948-capers-jones", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780133365948.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312858", "product_url": "/app/ecom/book/312858/the-technical-and-social-history-of-software-engineering-312858-9780133365948-capers-jones", "bisac_codes": [ "COM079000", "COM051230" ], "items_count": null, "identifiers": { "ISBN13": "9780321903426", "ISBN10": "0321903420", "EISBN13": "9780133365948", "EISBN10": "0133365948" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023976866" } } } }, { "type": "Product", "id": "00010000312844", "attributes": { "name": "Cisco Networking Simplified", "subtitle": "", "description": "Cisco Networking Simplified <br>Second Edition</p> </p> Master todays world of Cisco networking with this books completely updated, fully illustrated visual approach Easy enough for novices, substantive enough for networking professionals Covers the latest networking topicsfrom network architecture to secure wireless, unified communications to telepresence </p> In Full Color</p> </p> Jim Doherty Neil Anderson Paul Della Maggiora</p> </p> Now 100 percent updated for the latest technologies, this is todays easiest, most visual guide to Cisco networking. Even if youve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization. </p> </p> What you always wanted to know about networking but were afraid to ask!</p> How networks and the Internet work How to build coherent, cost-effective network infrastructures How to design networks for maximum reliability and availability What you need to know about data center and application networking How to secure networks against todays threats and attacks How to take advantage of the latest mobility technologies How virtualizing networks can help businesses leverage their network investments even further How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture </p> </p> This book is part of the Networking Technology Series from Cisco Press, the only authorized publisher for Cisco.</p> </p> Category: Cisco</p> Covers: General Networking</p> </p>", "author": "Neil Anderson, Jim Doherty, Paul Della Maggiora", "slug": "cisco-networking-simplified-312844-9781587055973-neil-anderson-jim-doherty-paul-della-maggiora", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587055973.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312844", "product_url": "/app/ecom/book/312844/cisco-networking-simplified-312844-9781587055973-neil-anderson-jim-doherty-paul-della-maggiora", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587055973", "EISBN10": "158705597X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023978501" } } } }, { "type": "Product", "id": "00010000312840", "attributes": { "name": "LAN Switch Security", "subtitle": "What Hackers Know About Your Switches", "description": "Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks.</p> </p> Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches.</p> </p> After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks.</p> Use port security to protect against CAM attacks Prevent spanning-tree attacks Isolate VLANs with proper configuration techniques Protect against rogue DHCP servers Block ARP snooping Prevent IPv6 neighbor discovery and router solicitation exploitation Identify Power over Ethernet vulnerabilities Mitigate risks from HSRP and VRPP Stop information leaks with CDP, PaGP, VTP, CGMP and other Cisco ancillary protocols Understand and prevent DoS attacks against switches Enforce simple wirespeed security policies with ACLs Implement user authentication on a port base with IEEE 802.1x Use new IEEE protocols to encrypt all Ethernet frames at wirespeed. This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.</p>", "author": "Eric Vyncke, Christopher Paggen", "slug": "lan-switch-security-312840-9781587054679-eric-vyncke-christopher-paggen", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054679.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312840", "product_url": "/app/ecom/book/312840/lan-switch-security-312840-9781587054679-eric-vyncke-christopher-paggen", "bisac_codes": [ "COM043060" ], "items_count": null, "identifiers": { "ISBN13": "9781587052569", "ISBN10": "1587052563", "EISBN13": "9781587054679", "EISBN10": "1587054671" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023972531" } } } }, { "type": "Product", "id": "00010000312839", "attributes": { "name": "Routing First-Step", "subtitle": "", "description": "Your first step into the world of routing</p> No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here!</p> Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing!</p> </p> Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar.</p> </p> No routing experience needed!</p> </p> Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology, this book is for you!</p> </p>", "author": "William R. Parkhurst", "slug": "routing-first-step-312839-9781587054242-william-r-parkhurst", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054242.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312839", "product_url": "/app/ecom/book/312839/routing-first-step-312839-9781587054242-william-r-parkhurst", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587054242", "EISBN10": "1587054248" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023977207" } } } }, { "type": "Product", "id": "00010000312838", "attributes": { "name": "BGP Design and Implementation", "subtitle": "", "description": "<p>Learn practical guidelines for designing and deploying a scalable BGP routing architecture</p> <p></p> Up-to-date coverage of BGP features like performance tuning, multiprotocol BGP, MPLS VPN, and multicast BGP In-depth coverage of advanced BGP topics to help design a complex BGP routing architecture Practical design tips that have been proven in the field Extensive configuration examples and case studies <p></p> <p>BGP Design and Implementation focuses on real-world problems and provides not only design solutions, but also the background on why they are appropriate and a practical overview of how they apply into a top-down design. The BGP protocol is being used in both service provider and enterprise networks. The design goals of these two groups are different, leading to different architectures being used in each environment. The title breaks out the separate goals, and resulting solutions for each group to assist the reader in further understanding different solution strategies.</p> <p>This book starts by identifying key features and functionality in BGP. It then delves into the topics of performance tuning, routing policy development, and architectural scalability. It progresses by examining the challenges for both the service provider and enterprise customers, and provides practical guidelines and a design framework for each. BGP Design and Implementation finishes up by closely looking at the more recent extensions to BGP through Multi-Protocol BGP for MPLS-VPN, IP Multicast, IPv6, and CLNS. </p> <p>Each chapter is generally organized into the following sections: Introduction, Design and Implementation Guidelines, Case Studies, and Summary.</p> <p>1587051095101412003</p>", "author": "Randy Zhang, Micah Bartell", "slug": "bgp-design-and-implementation-312838-9781587058622-randy-zhang-micah-bartell", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587058622.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312838", "product_url": "/app/ecom/book/312838/bgp-design-and-implementation-312838-9781587058622-randy-zhang-micah-bartell", "bisac_codes": [ "COM043040" ], "items_count": null, "identifiers": { "ISBN13": "9781587144707", "ISBN10": "1587144700", "EISBN13": "9781587058622", "EISBN10": "1587058626" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023970688" } } } }, { "type": "Product", "id": "00010000312828", "attributes": { "name": "Voice over IP Fundamentals", "subtitle": "", "description": "", "author": "Jonathan Davidson, James F. Peters, Brian Gracely", "slug": "voice-over-ip-fundamentals-312828-9781587054259-jonathan-davidson-james-f-peters-brian-gracely", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054259.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312828", "product_url": "/app/ecom/book/312828/voice-over-ip-fundamentals-312828-9781587054259-jonathan-davidson-james-f-peters-brian-gracely", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587054259", "EISBN10": "1587054256" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023979150" } } } }, { "type": "Product", "id": "00010000312824", "attributes": { "name": "MPLS and Next-Generation Networks", "subtitle": "Foundations for NGN and Enterprise Virtualization", "description": "Understand the business case for deploying MPLS-based services and solutions </p> Provides network managers and architects a precise MPLS primer Defines MPLS service problems and their associated solutions Includes ROI models for MPLS-based solutions Discusses pros and cons of various options for each MPLS service Network managers often question the value that MPLS brings to their business environment. This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company's bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, you can use this comprehensive guide to understand and build a business case for the inclusion of MPLS in your network. </p>", "author": "Azhar Sayeed, Monique Morrow", "slug": "mpls-and-next-generation-networks-312824-9781587054228-azhar-sayeed-monique-morrow", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054228.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312824", "product_url": "/app/ecom/book/312824/mpls-and-next-generation-networks-312824-9781587054228-azhar-sayeed-monique-morrow", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "ISBN13": "9781587201202", "ISBN10": "1587201208", "EISBN13": "9781587054228", "EISBN10": "1587054221" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023974038" } } } }, { "type": "Product", "id": "00010000312823", "attributes": { "name": "Internet Routing Architectures", "subtitle": "", "description": "The industry's leading resource for Internet routing solutions and scenarios</p> </p> Explore the functions, attributes, and applications of BGP-4, the de facto interdomain routing protocol, through practical scenarios and configuration examples Learn the contemporary Internet structure and understand how to evaluate a service provider in dealing with routing and connectivity issues Master the addressing techniques--including Classless Interdomain Routing (CIDR)--that are demanded today to facilitate the Internet's rapid and continuing growth Develop optimal routing policies--redundancy, traffic balancing, symmetry, and stability--for your network Learn how to seamlessly integrate your intradomain and interdomain routing and manage large and growing autonomous systems </p> Internet Routing Architectures, Second Edition, explores the ins and outs of interdomain routing network designs with emphasis on BGP-4 (Border Gateway Protocol Version 4)--the de facto interdomain routing protocol. </p> Using a practical, example-oriented approach, this comprehensive resource provides you with real solutions for ISP connectivity issues. You will learn how to integrate your network on the global Internet and discover how to build large-scale autonomous systems. You will also learn to control expansion of interior routing protocols using BGP-4, design sound and stable networks, configure the required policies using Cisco IOS Software, and explore routing practices and rules on the Internet. </p> </p> 157870233X020206</p>", "author": "Sam Halabi", "slug": "internet-routing-architectures-312823-9781587054358-sam-halabi", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054358.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312823", "product_url": "/app/ecom/book/312823/internet-routing-architectures-312823-9781587054358-sam-halabi", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587054358", "EISBN10": "1587054353" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023978384" } } } }, { "type": "Product", "id": "00010000312820", "attributes": { "name": "Deploying Cisco Voice over IP Solutions", "subtitle": "", "description": "<p>This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.</p> <p>Learn real-world voice-over-IP deployment solutions and strategies from the Cisco experts</p> <p>Deploying Cisco Voice over IP Solutions covers:<br> </p> Definitive guidelines on real-world VoIP deployments, the fundamentals of the latest VoIP solutions, and a look into the future of VoIP services Different techniques for engineering and properly sizing traffic-sensitive voice networks Basic concepts applicable to echo analysis, echo cancellation, and locating and eliminating echoes Various QoS features applicable to voice Detailed information on call admission control (CAC) Dial plan configuration recommendations on Cisco H.323 gateways and gatekeepers used to support large dial plans Basic tasks of designing a long-distance VoIP network The two classes of hosted voice networks: Managed Multiservice (MMS) networks and packet voice VPNs Fax services store and forward as well as real-time relay fax services Sample configurations and step-by-step examples to help you learn how to build a VoIP network <p>Deploying Cisco Voice over IP Solutions provides networking professionals the knowledge, advice, and insight necessary to design and deploy voice over IP (VoIP) networks that meet customers' needs for scalability, services, and security. Beginning with an introduction to the important preliminary design elements that need to be considered before implementing VoIP, Deploying Cisco Voice over IP Solutions also demonstrates the basic tasks involved in designing an effective service provider-based VoIP network. You'll conclude with design and implementation guidelines for some of the more popular and widely requested VoIP services, such as prepaid services, fax services, and virtual private networks (VPNs).</p> <p>This book is a collaboration of Cisco Systems CCIE(r) engineers, technical marketing engineers, and systems engineers. You'll find design experience from people who have designed some of the world's largest VoIP networks.</p>", "author": "Jonathan Davidson", "slug": "deploying-cisco-voice-over-ip-solutions-312820-9781587054266-jonathan-davidson", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054266.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312820", "product_url": "/app/ecom/book/312820/deploying-cisco-voice-over-ip-solutions-312820-9781587054266-jonathan-davidson", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587054266", "EISBN10": "1587054264" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023976430" } } } }, { "type": "Product", "id": "00010000312814", "attributes": { "name": "MPLS and VPN Architectures", "subtitle": "", "description": "<p>A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs</p> In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousands of VPNs Extensive case studies guide you through the design and deployment of real-world MPLS/VPN networks Configuration examples and guidelines assist in configuring MPLS on Cisco devices Design and implementation options help you build various VPN topologies <p>Multiprotocol Label Switching (MPLS) is an innovative technique for high-performance packet forwarding. There are many uses for this new technology, both within a service-provider environment and within the enterprise network, and the most widely deployed usage today is the enabling of Virtual Private Networks (VPNs). With the introduction of MPLS-enabled VPNs, network designers are able to better scale their networks than with the methods available in the past.</p> <p>Network engineers and administrators need quick, effective education on this technology to efficiently deploy MPLS-enabled VPNs within their networks. With that goal in mind, MPLS and VPN Architectures provides an in-depth discussion particular to Cisco's MPLS architecture. This book covers MPLS theory and configuration, network design issues, and case studies as well as one major MPLS application: MPLS-based VPNs. The MPLS/VPN architecture and all its mechanisms are explained with configuration examples, suggested design and deployment guidelines, and extensive case studies.</p> <p>MPLS and VPN Architectures is your practical guide to understanding, designing, and deploying MPLS and MPLS-based VPNs.</p>", "author": "Ivan Pepelnjak, Jim Guichard", "slug": "mpls-and-vpn-architectures-312814-9781587054365-ivan-pepelnjak-jim-guichard", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054365.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312814", "product_url": "/app/ecom/book/312814/mpls-and-vpn-architectures-312814-9781587054365-ivan-pepelnjak-jim-guichard", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587054365", "EISBN10": "1587054361" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023978444" } } } }, { "type": "Product", "id": "00010000312805", "attributes": { "name": "Cisco OSPF Command and Configuration Handbook", "subtitle": "", "description": "", "author": "William R. Parkhurst", "slug": "cisco-ospf-command-and-configuration-handbook-312805-9781587052965-william-r-parkhurst", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587052965.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312805", "product_url": "/app/ecom/book/312805/cisco-ospf-command-and-configuration-handbook-312805-9781587052965-william-r-parkhurst", "bisac_codes": [ "COM055000" ], "items_count": null, "identifiers": { "ISBN13": "9781587055409", "ISBN10": "1587055406", "EISBN13": "9781587052965", "EISBN10": "1587052962" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010012270072" } } } }, { "type": "Product", "id": "00010000312804", "attributes": { "name": "MPLS and VPN Architectures, Volume II", "subtitle": "", "description": "", "author": "Ivan Pepelnjak, Jim Guichard, Jeff Apcar", "slug": "mpls-and-vpn-architectures-volume-ii-312804-9781587054372-ivan-pepelnjak-jim-guichard-jeff-apcar", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587054372.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312804", "product_url": "/app/ecom/book/312804/mpls-and-vpn-architectures-volume-ii-312804-9781587054372-ivan-pepelnjak-jim-guichard-jeff-apcar", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "ISBN13": "9781587144325", "ISBN10": "1587144328", "EISBN13": "9781587054372", "EISBN10": "158705437X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023978563" } } } }, { "type": "Product", "id": "00010000312803", "attributes": { "name": "Cisco IP Telephony", "subtitle": "Planning, Design, Implementation, Operation, and Optimization", "description": "", "author": "Salman Asadullah, Ramesh Kaza", "slug": "cisco-ip-telephony-312803-9781587053849-ramesh-kaza-salman-asadullah", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587053849.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312803", "product_url": "/app/ecom/book/312803/cisco-ip-telephony-312803-9781587053849-ramesh-kaza-salman-asadullah", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "ISBN13": "9781587051579", "ISBN10": "1587051575", "EISBN13": "9781587053849", "EISBN10": "1587053845" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010000555125" } } } }, { "type": "Product", "id": "00010000312801", "attributes": { "name": "MPLS VPN Security", "subtitle": "", "description": "A practical guide to hardening MPLS networks </p> Define \"zones of trust\" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the networks backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. Security is a major concern for companies migrating to MPLS VPNs from existing VPN technologies such as ATM. Organizations deploying MPLS VPNs need security best practices for protecting their networks, specifically for the more complex deployment models such as inter-provider networks and Internet provisioning on the network. </p> </p> MPLS VPN Security is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Divided into four parts, the book begins with an overview of security and VPN technology. A chapter on threats and attack points provides a foundation for the discussion in later chapters. Part II addresses overall security from various perspectives, including architectural, design, and operation components. Part III provides practical guidelines for implementing MPLS VPN security. Part IV presents real-world case studies that encompass details from all the previous chapters to provide examples of overall secure solutions. </p> </p> Drawing upon the authors considerable experience in attack mitigation and infrastructure security, MPLS VPN Security is your practical guide to understanding how to effectively secure communications in an MPLS environment.</p> </p> \"The authors of this book, Michael Behringer and Monique Morrow, have a deep and rich understanding of security issues, such as denial-of-service attack prevention and infrastructure protection from network vulnerabilities. They offer a very practical perspective on the deployment scenarios, thereby demystifying a complex topic. I hope you enjoy their insights into the design of self-defending networks.\"</p> Jayshree V. Ullal, Senior VP/GM Security Technology Group, Cisco Systems </p> </p>", "author": "Michael H. Behringer, Monique Morrow", "slug": "mpls-vpn-security-312801-9781587053924-michael-h-behringer-monique-morrow", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587053924.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312801", "product_url": "/app/ecom/book/312801/mpls-vpn-security-312801-9781587053924-michael-h-behringer-monique-morrow", "bisac_codes": [ "COM043060" ], "items_count": null, "identifiers": { "ISBN13": "9781587051838", "ISBN10": "1587051834", "EISBN13": "9781587053924", "EISBN10": "1587053926" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023973978" } } } }, { "type": "Product", "id": "00010000312799", "attributes": { "name": "Optimal Routing Design", "subtitle": "", "description": "Techniques for optimizing large-scale IP routing operation and managing network growth </p> Understand the goals of scalable network design, including tradeoffs between network scaling, convergence speed, and resiliency Learn basic techniques applicable to any network design, including hierarchy, addressing, summarization, and information hiding Examine the deployment and operation of EIGRP, OSPF, and IS-IS protocols on large-scale networks Understand when and how to use a BGP core in a large-scale network and how to use BGP to connect to external networks Apply high availability and fast convergence to achieve 99.999 percent, or five 9s network uptime Secure routing systems with the latest routing protocol security best practices Understand the various techniques used for carrying routing information through a VPN Optimal Routing Design provides the tools and techniques, learned through years of experience with network design and deployment, to build a large-scale or scalable IP-routed network. The book takes an easy-to-read approach that is accessible to novice network designers while presenting invaluable, hard-to-find insight that appeals to more advanced-level professionals as well.</p> </p> Written by experts in the design and deployment of routing protocols, Optimal Routing Design leverages the authors extensive experience with thousands of customer cases and network designs. Boiling down years of experience into best practices for building scalable networks, this book presents valuable information on the most common problems network operators face when seeking to turn best effort IP networks into networks that can support Public Switched Telephone Network (PSTN)-type availability and reliability. </p> </p> Beginning with an overview of design fundamentals, the authors discuss the tradeoffs between various competing points of network design, the concepts of hierarchical network design, redistribution, and addressing and summarization. This first part provides specific techniques, usable in all routing protocols, to work around real-world problems. The next part of the book details specific information on deploying each interior gateway protocol (IGP)including EIGRP, OSPF, and IS-ISin real-world network environments. Part III covers advanced topics in network design, including border gateway protocol (BGP), high-availability, routing protocol security, and virtual private networks (VPN). Appendixes cover the fundamentals of each routing protocol discussed in the book; include a checklist of questions and design goals that provides network engineers with a useful tool when evaluating a network design; and compare routing protocols strengths and weaknesses to help you decide when to choose one protocol over another or when to switch between protocols. </p> </p> The complexity associated with overlaying voice and video onto an IP network involves thinking through latency, jitter, availability, and recovery issues. This text offers keen insights into the fundamentals of network architecture for these converged environments.</p> John Cavanaugh, Distinguished Services Engineer, Cisco Systems</p> </p> This book is part of the Networking Technology Series from Cisco Press which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.</p>", "author": "Russ White, Alvaro Retana, Don Slice", "slug": "optimal-routing-design-312799-9781587053955-russ-white-alvaro-retana-don-slice", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587053955.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312799", "product_url": "/app/ecom/book/312799/optimal-routing-design-312799-9781587053955-russ-white-alvaro-retana-don-slice", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "ISBN13": "9781587142444", "ISBN10": "1587142449", "EISBN13": "9781587053955", "EISBN10": "1587053950" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023969705" } } } }, { "type": "Product", "id": "00010000312797", "attributes": { "name": "Definitive MPLS Network Designs", "subtitle": "", "description": "Field-proven MPLS designs covering MPLS VPNs, pseudowire, QoS, traffic engineering, IPv6, network recovery, and multicast</p> Understand technology applications in various service provider and enterprise topologies via detailed design studies Benefit from the authors vast experience in MPLS network deployment and protocol design Visualize real-world solutions through clear, detailed illustrations Design studies cover various operator profiles including an interexchange carrier (IXC), a national telco deploying a multiservice backbone carrying Internet and IP VPN services as well as national telephony traffic, an international service provider with many POPs all around the globe, and a large enterprise relying on Layer-3 VPN services to control communications within and across subsidiaries Design studies are thoroughly explained through detailed text, sample configurations, and network diagrams Definitive MPLS Network Designs provides examples of how to combine key technologies at the heart of IP/MPLS networks. Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects.</p> </p> The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, andwhere applicablemulticast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives.</p> </p> Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrates how to design a network that optimizes their benefits for a specific operating environment. The variety of network environments and requirements makes it difficult to provide a one-size-fits-all design recommendation. Definitive MPLS Network Designs fills this void.</p> </p> This book comes as a boon to professionals who want to understand the power of MPLS and make full use of it.</p> -Parantap Lahiri, Manager, IP Network Infrastructure Engineering, MCI</p> </p> Includes a FREE 45-Day Online Edition</p> </p> This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.</p> <p> </p>", "author": "Jim Guichard, François Le Faucheur, Jean-Philippe Vasseur", "slug": "definitive-mpls-network-designs-312797-9781587053948-jim-guichard-francois-le-faucheur-jean-philippe-vasseur", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587053948.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312797", "product_url": "/app/ecom/book/312797/definitive-mpls-network-designs-312797-9781587053948-jim-guichard-francois-le-faucheur-jean-philippe-vasseur", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "ISBN13": "9781587142413", "ISBN10": "1587142414", "EISBN13": "9781587053948", "EISBN10": "1587053942" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023976078" } } } }, { "type": "Product", "id": "00010000312791", "attributes": { "name": "Voice over IP Fundamentals", "subtitle": "", "description": "A systematic approach to understanding the basics of voice over IP</p> </p> Understand the basics of enterprise and public telephony networking, IP networking, and how voice is transported over IP networks Learn the various caveats of converging voice and data networks Examine the basic VoIP signaling protocols (H.323, MGCP/H.248, SIP) and primary legacy voice signaling protocols (ISDN, C7/SS7) Explore how VoIP can run the same applications as the existing telephony system but in a more cost-efficient and scalable manner Delve into such VoIP topics as jitter, latency, packet loss, codecs, QoS tools, and security </p> Voice over IP (VoIP) has become an important factor in network communications, promising lower operational costs, greater flexibility, and a variety of enhanced applications. To help you understand VoIP networks, Voice over IP Fundamentals provides a thorough introduction to the basics of VoIP.</p> </p> Voice over IP Fundamentals explains how a basic IP telephony infrastructure is built and works today, major concepts concerning voice and data networking, and transmission of voice over data networks. Youll learn how voice is signaled through legacy telephone networks, how IP signaling protocols are used to interoperate with current telephony systems, and how to ensure good voice quality using quality of service (QoS).</p> </p> Even though Voice over IP Fundamentals is written for anyone seeking to understand how to use IP to transport voice, its target audience comprises both voice and data networking professionals. In the past, professionals working in voice and data networking did not have to understand each others roles. However, in this world of time-division multiplexing (TDM) and IP convergence, it is important to understand how these technologies work together. Voice over IP Fundamentals explains all the details so that voice experts can understand data networking and data experts can understand voice networking.</p> </p> The second edition of this best-selling book includes new chapters on the importance of billing and mediation in a VoIP network, security, and the common types of threats inherent when packet voice environments, public switched telephone networks (PSTN), and VoIP interoperate. It also explains enterprise and service-provider applications and services. </p>", "author": "Jonathan Davidson, James F. Peters, Manoj Bhatia, Satish Kalidindi, Sudipto Mukherjee", "slug": "voice-over-ip-fundamentals-312791-9781587052798-jonathan-davidson-james-f-peters-manoj-bhatia-satish-kalidindi-sudipto-mukherjee", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587052798.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312791", "product_url": "/app/ecom/book/312791/voice-over-ip-fundamentals-312791-9781587052798-jonathan-davidson-james-f-peters-manoj-bhatia-satish-kalidindi-sudipto-mukherjee", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587052798", "EISBN10": "1587052792" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023970965" } } } }, { "type": "Product", "id": "00010000312783", "attributes": { "name": "Designing Network Security", "subtitle": "", "description": "<p>A practical guide to creating a secure network infrastructure</p> Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies <p>Designing Network Security, Second Edition, is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.</p> <p>You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment.</p> <p>This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples.</p> <p>This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.</p>", "author": "Merike Kaeo", "slug": "designing-network-security-312783-9781587053702-merike-kaeo", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587053702.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312783", "product_url": "/app/ecom/book/312783/designing-network-security-312783-9781587053702-merike-kaeo", "bisac_codes": [ "COM043060" ], "items_count": null, "identifiers": { "EISBN13": "9781587053702", "EISBN10": "1587053705" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023973159" } } } }, { "type": "Product", "id": "00010000312776", "attributes": { "name": "Storage Networking Protocol Fundamentals", "subtitle": "", "description": "A comparative analysis of Ethernet, TCP/IP, and Fibre Channel in the context of SCSI</p> Introduces network administrators to the requirements of storage protocols Explains the operation of network protocols to storage administrators Compares and contrasts the functionality of Ethernet, TCP/IP, and Fibre Channel Documents the details of the major protocol suites, explains how they operate, and identifies common misunderstandings References the original standards and specifications so you can get a complete understanding of each protocol Helps you understand the implications of network design choices Discusses advanced network functionality such as QoS, security, management, and protocol analysis Corporations increasingly depend on computer and communication technologies to remain competitive in the global economy. Customer relationship management, enterprise resource planning, and e-mail are a few of the many applications that generate new data every day. Effectively storing, managing, and accessing that data is a primary business challenge in the information age. Storage networking is a crucial component of the solution to meet that challenge.</p> </p> Written for both storage administrators who need to learn more about networking and network administrators who need to learn more about storage, Storage Networking Protocol Fundamentals is a concise introduction to storage networking protocols. The book picks up where Storage Networking Fundamentals left off by focusing on the networking protocols that underlie modern open systems: block-oriented storage networks.</p> </p> The first part of the book introduces you to the field of storage networking and the Open Systems Interconnection (OSI) reference model. The second part compares networked storage technologies, including iSCSI (Small Computer Systems Interface over IP) and Fibre Channel. It also examines in detail each of the major protocol suites layer-by-layer within the OSI reference model. The third part discusses advanced functionalities of these technologies, such as quality of service (QoS), load-balancing functions, security, management, and protocol analysis. You can read this book cover to cover or use it as a reference, directly accessing the particular topics of interest to you.</p> </p> Storage networking is a critical concept for todays businesses, and this book provides a unique and helpful way to better understand it. Storage networking is also continuously evolving, and as such this book may be seen as an introduction to the information technology infrastructures of the future.</p> from the foreword by Claudio DeSanti, vice-chairman of the ANSI INCITS T11 Technical Committee</p>", "author": "James Long", "slug": "storage-networking-protocol-fundamentals-312776-9781587052781-james-long", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587052781.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312776", "product_url": "/app/ecom/book/312776/storage-networking-protocol-fundamentals-312776-9781587052781-james-long", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587052781", "EISBN10": "1587052784" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023969666" } } } }, { "type": "Product", "id": "00010000312772", "attributes": { "name": "Troubleshooting Cisco IP Telephony", "subtitle": "", "description": "<p>Reveals the methodology you need to resolve complex problems in an IP telephony network</p> Master troubleshooting techniques and methodologies for all parts of a Cisco IP Telephony solution-Cisco CallManager, IP phones, gateways, applications, and more Learn how to investigate and resolve voice quality problems, including delayed audio, choppy or garbled audio, static and noise, one-way or no-way audio, and echo Read about the variety of trouble-shooting tools at your disposal and how and when to use them based on the problem type Discover the potential causes of common problems and how to efficiently troubleshoot them to resolution Learn how to identify and resolve gateway problems by breaking the components into logical groups and following a methodical troubleshooting approach Use best practices recommendations to build a stronger IP telephony deployment and avoid common mistakes <p>IP telephony represents the future of telecommunications: a converged data and voice infrastructure boasting greater flexibility and more cost-effective scalability than traditional telephony. The ability to troubleshoot an IP telephony environment and the underlying network infrastructure is vitally important, just as it is in any complex system.</p> <p>Troubleshooting Cisco IP Telephony teaches the troubleshooting skills necessary to identify and resolve problems in an IP telephony solution. This book provides comprehensive coverage of all parts of a Cisco IP Telephony (CIPT) solution, including CallManager, IP phones, gateways, analog devices, database and directory replication, call routing, voice mail, applications, network infrastructure, and more. You'll learn how to read trace files, determine when to turn on tracing and Cisco IOS(r) Software voice debugging, and how to troubleshoot voice quality issues.</p> <p>Troubleshooting Cisco IP Telephony shows you how to break down problems to find the root cause. Descriptions of each part of the CIPT solution help you understand the functionality of each part of the solution and how each part interacts with other parts of the solution. You'll then learn what steps to take and tools to use to identify and resolve the cause of the problem.</p>", "author": "Paul Giralt, Addis Hallmark, Anne Smith", "slug": "troubleshooting-cisco-ip-telephony-312772-9781587053603-paul-giralt-addis-hallmark-anne-smith", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9781587053603.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "312772", "product_url": "/app/ecom/book/312772/troubleshooting-cisco-ip-telephony-312772-9781587053603-paul-giralt-addis-hallmark-anne-smith", "bisac_codes": [ "COM043000" ], "items_count": null, "identifiers": { "EISBN13": "9781587053603", "EISBN10": "1587053608" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010023974483" } } } } ], "meta": { "pagination": { "page": 74130, "pages": 78533, "count": 1570656 } } }
Response Info
Default: None