Catalog - Resource Center for Learning and Research

Back to Site - CRAI Library
Normal view MARC view ISBD view

CCNA 200-301 portable command guide / Scott Empson

By: Empson, Scott [autor].
Contributor(s): Taub, Mark [editor en jefe] | Gol, Arezou [administrador de alianzas] | Bartow, Brett [director administrador de producto] | Manly, James [editor senior] | Schroeder, Sandra [gerente editorial] | Bru, Ellie [editor de desarrollo] | Simpson, Tonya [editor senior de proyecto] | McManus, Bill [editor de copias] | McDonald, Rick [editor técnico] | Teeters, Cindy [asistente editorial] | Prasertsith, Chuti [diseñador de cubierta] | Stumpf, Lisa [indexador] | Bass, Abigail [corrector de pruebas] | codeMantra [composición].
Material type: TextTextPublisher: Hoboken : Cisco Press, 2019Edition: Quinta edición.Description: xxiii, 296 páginas : fotos b/n, tablas ; 22 x 15 cm.ISBN: 9780135937822.Subject(s): Redes de computadores -- Protocolos | Sistemas de seguridad de computadores | InternetDDC classification: 004.6 E558c
Contents:
Introduction | Patrt I: Network Fundamentals. Chapter 1. IPv4 Adressing- How it Works | Chapter 2. How to Subnet IPv4 Addresses | Chapter 3. Variable Length Subnet Masking (VLSM) | Chapter 4. Route Summarization | Chapter 5. IPv6 Addressing - How it Works | Chapter 6. Cables and Connections | Chapter 7. The Command-Line Interface | Part II: LAN Switching Technologies. Chapter 8. Configurating a Switch | Chapter 9. VLANs | Chapter 10. VLAN Triking Protocol and Inter-VLAN Communication | Chapter 11. Spanning Tree Protocol | Chapter 12. EtherChannel | Chapter 13. Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP). Part III: Routing Technologies. Chapter 14. Configuring a Cisco Router | Chapter 15. Static Routing | Chapter 16. Open Shortest Path First (OSPF). Part IV: IP Services. Chapter 17. DHCP | Chapter 18. Network Address Translation (NAT) | Chapter 19. Configuration Network Tiem Protocol (NTP). Part V: Security Fundamentals. Chapter 20. Layer Two Security Features | Chapter 21. Managing Traffic Using Access Control List (ACLs) | Chapter 22. Device Monitoring and Hardening. Part VI: Wireless Technologies. Part VII: Appendices. Appendix A. How to Count in Decimal, Binary, and Hexadecimal | Appendix B. How to Convert Between Number Systems | Appendix C. Binary/Hex/Decimal Conversion Chart | Index
Item type Current location Collection Call number Copy number Status Date due Barcode
Libro (general) Biblioteca Central UNIBE
General 004.6 E558c (Browse shelf) Ej.1 Available 240413

Información del autor y comentario de la obra en la contraportada

Introduction |
Patrt I: Network Fundamentals.
Chapter 1. IPv4 Adressing- How it Works |
Chapter 2. How to Subnet IPv4 Addresses |
Chapter 3. Variable Length Subnet Masking (VLSM) |
Chapter 4. Route Summarization |
Chapter 5. IPv6 Addressing - How it Works |
Chapter 6. Cables and Connections |
Chapter 7. The Command-Line Interface |
Part II: LAN Switching Technologies.
Chapter 8. Configurating a Switch |
Chapter 9. VLANs |
Chapter 10. VLAN Triking Protocol and Inter-VLAN Communication |
Chapter 11. Spanning Tree Protocol |
Chapter 12. EtherChannel |
Chapter 13. Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP).
Part III: Routing Technologies.
Chapter 14. Configuring a Cisco Router |
Chapter 15. Static Routing |
Chapter 16. Open Shortest Path First (OSPF).
Part IV: IP Services.
Chapter 17. DHCP |
Chapter 18. Network Address Translation (NAT) |
Chapter 19. Configuration Network Tiem Protocol (NTP).
Part V: Security Fundamentals.
Chapter 20. Layer Two Security Features |
Chapter 21. Managing Traffic Using Access Control List (ACLs) |
Chapter 22. Device Monitoring and Hardening.
Part VI: Wireless Technologies.
Part VII: Appendices.
Appendix A. How to Count in Decimal, Binary, and Hexadecimal |
Appendix B. How to Convert Between Number Systems |
Appendix C. Binary/Hex/Decimal Conversion Chart |
Index