Network warrior: [everything you need to know that wasn't on the CCNA exam]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2007
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index |
Beschreibung: | XX, 576 S. Ill., graph. Darst. |
ISBN: | 0596101511 9780596101510 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023029019 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 071130s2007 ad|| |||| 00||| eng d | ||
020 | |a 0596101511 |c : EUR 32.00 ; US $ 44.99 ; CAN $ 58.99 |9 0-596-10151-1 | ||
020 | |a 9780596101510 |c : EUR 32.00 |9 978-0-596-10151-0 | ||
024 | 3 | |a 9780596101510 | |
035 | |a (OCoLC)255582739 | ||
035 | |a (DE-599)BVBBV023029019 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-19 |a DE-11 |a DE-29T |a DE-2174 | ||
050 | 0 | |a TK5105.5 | |
082 | 0 | |a 004.6 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Donahue, Gary A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network warrior |b [everything you need to know that wasn't on the CCNA exam] |c Gary A. Donahue |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2007 | |
300 | |a XX, 576 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 4 | |a Computer networks | |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016232937&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016232937 |
Datensatz im Suchindex
_version_ | 1804137252559781888 |
---|---|
adam_text | NETWORK WARRIOR GARY A. DONAHUE O REILLY 8 BEIJING * CAMBRIDGE * FARNHAM
* KOLN * PARIS * SEBASTOPOL * TAIPEI * TOKYO TABLE OF CONTENTS PREFACE
XV PART I. HUBS, SWITCHES, AND SWITCHING 1. WHAT IS A NETWORK? 3 2. HUBS
AND SWITCHES 6 HUBS 6 SWITCHES 10 3. AUTO-NEGOTIATION 19 WHAT IS
AUTO-NEGOTIATION? 19 HOW AUTO-NEGOTIATION WORKS 20 WHEN
AUTO-NEGOTIATIORF FAILS :; 20 AUTO-NEGOTIATION BEST PRACTICES 22
CONFIGURING AUTO-NEGOTIATION 23 4. VLANS 24 CONNECTING VLANS 24
CONFIGURING VLANS 27 5. TRUNKING 33 HOW TRUNKS WORK 34 CONFIGURING
TRUNKS 38 6. VLAN TRUNKING PROTOCOL 43 VTP PRUNING 46 DANGERS OF VTP 47
CONFIGURING VTP 49 7. ETHERCHANNEL 55 LOAD BALANCING 56 CONFIGURING AND
MANAGING ETHERCHANNEL 60 8. SPANNING TREE 66 BROADCAST STORMS 67 MAC
ADDRESS TABLE INSTABILITY 72 PREVENTING LOOPS WITH SPANNING TREE 73
MANAGING SPANNING TREE 77 ADDITIONAL SPANNING TREE FEATURES 80 COMMON
SPANNING TREE PROBLEMS 84 DESIGNING TO PREVENT SPANNING TREE PROBLEMS 87
PART II. ROUTERS AND ROUTING 9. ROUTING AND ROUTERS 91 ROUTING TABLES ,
92 ROUTE TYPES 95 THE IP ROUTING TABLE 95 10. ROUTING PROTOCOLS 102
COMMUNICATION BETWEEN ROUTERS 103 METRICS AND PROTOCOL TYPES 106
ADMINISTRATIVE DISTANCE 108 SPECIFIC ROUTING PROTOCOLS 110 11.
REDISTRIBUTION 130 REDISTRIBUTING INTO RIP 132 REDISTRIBUTING INTO EIGRP
135 REDISTRIBUTING INTO OSPF 137 MUTUAL REDISTRIBUTION 139
REDISTRIBUTION LOOPS 140 LIMITING REDISTRIBUTION 142 VIII I TABLE OF
CONTENTS 12. TUNNELS 150 GRE TUNNELS 151 GRE TUNNELS AND ROUTING
PROTOCOLS 156 GRE AND ACCESS LISTS 161 13. RESILIENT ETHERNET 163 HSRP
163 HSRP INTERFACE TRACKING 166 WHEN HSRP ISN T ENOUGH 168 14. ROUTE
MAPS 172 BUILDING A ROUTE MAP 173 POLICY-ROUTING EXAMPLE 175 15.
SWITCHING ALGORITHMS IN CISCO ROUTERS 181 PROCESS SWITCHING 183
INTERRUPT CONTEXT SWITCHING 184 CONFIGURING AND MANAGING SWITCHING PATHS
190 PART III. MULTILAYER SWITCHES 16. MULTILAYER SWITCHES 197
CONFIGURING SVIS^ - 198 MULTILAYER SWITCH MODELS 203 17. CISCO 6500
MULTILAYER SWITCHES 7 204 ARCHITECTURE 206 CATOS VERSUS IOS 222 18.
CATALYST 3750 FEATURES 227 STACKING 227 INTERFACE RANGES 228 MACROS *
229 FLEX LINKS 233 STORM CONTROL 233 PORT SECURITY 238 SPAN 241 VOICE
VLAN 244 QOS 247 TABLE OF CONTENTS PART IV. TELECOM 19. TELECOM
NOMENCLATURE .... .... INTRODUCTION AND HISTORY TELECOM GLOSSARY 20. T1
UNDERSTANDING TL DUPLEX TYPES OF TL ENCODING FRAMING PERFORMANCE
MONITORING ALARMS TROUBLESHOOTING TLS CONFIGURING TLS 21. DS3 . ..
FRAMING LINE CODING CONFIGURING DS3S 22. FRAME RELAY ORDERING
FRAME-RELAY SERVICE FRAME-RELAY NETWORK DESIGN OVERSUBSCRIPTION LOCAL
MANAGEMENT INTERFACE (LMI) CONFIGURING FRAME RELAY TROUBLESHOOTING FRAME
RELAY PART V. SECURITY AND FIREWALLS 23. ACCESS LISTS F. DESIGNING
ACCESS LISTS ACLS IN MULTILAYER SWITCHES REFLEXIVE ACCESS LISTS 253 253
254 268 268 269 270 272 274 276 279 283 .288 288 292 292 299 302 303 306
307 309 316 323 323 334 338 TABLE OF CONTENTS 24. AUTHENTICATION IN
CISCO DEVICES 343 BASIC (NON-AAA) AUTHENTICATION 343 AAA AUTHENTICATION
353 25. FIREWALL THEORY 361 BEST PRACTICES 361 THE DMZ 363 ALTERNATE
DESIGNS 367 26. PIX FIREWALL CONFIGURATION 369 INTERFACES AND PRIORITIES
369 NAMES 371 OBJECT GROUPS 372 FIXUPS 375 FAILOVER 377 NAT 383
MISCELLANEOUS 388 TROUBLESHOOTING . 391 PART VI. SERVER LOAD BALANCING
27. SERVER LOAD-BALANCING TECHNOLOGY 395 TYPES OF LOAD BALANCING 396 HOW
SERVER LOAD BALANCING WORKS 398 CONFIGURING SERVER LOAD BALANCING 399
28. CONTENT SWITCH MODULES IN ACTION 405 COMMON TASKS 407 UPGRADING THE
CSM 411 PART VII. QUALITY OF SERVICE S? 29. INTRODUCTION TO QOS 417
TYPES OF QOS 421 QOS MECHANICS 422 COMMON QOS MISCONCEPTIONS 427 TABLE
OF CONTENTS 30. DESIGNING A QOS SCHEME 430 DETERMINING REQUIREMENTS 430
CONFIGURING THE ROUTERS 435 31. THE CONGESTED NETWORK 440 DETERMINING
WHETHER THE NETWORK IS CONGESTED 440 RESOLVING THE PROBLEM 445 32. THE
CONVERGED NETWORK 447 CONFIGURATION 447 MONITORING QOS 449
TROUBLESHOOTING A CONVERGED NETWORK 452 PART VIII. DESIGNING NETWORKS
33. DESIGNING NETWORKS 461 DOCUMENTATION 461 NAMING CONVENTIONS FOR
DEVICES 472 NETWORK DESIGNS 473 34. IP DESIGN 484 PUBLIC VERSUS PRIVATE
IP SPACE 484 VLSM I * 487 CIDR 490 ALLOCATING IP NETWORK SPACE 491
ALLOCATING IP SUBNETS :; 494 IP SUBNETTING MADE EASY 498 35. NETWORK
TIME PROTOCOL 506 WHAT IS ACCURATE TIME? 506 NTP DESIGN 508 CONFIGURING
NTP 510 36. FAILURES 513 HUMAN ERROR 513 MULTIPLE COMPONENT FAILURE 514
DISASTER CHAINS 515 NO FAILOVER TESTING 516 TROUBLESHOOTING 516 XII I
TABLE OF CONTENTS 37. GAD SMAXIMS 521 MAXIM #1 521 MAXIM #2 524 MAXIM #3
525 38. AVOIDING FRUSTRATION 529 WHY EVERYTHING IS MESSED UP 529 HOW TO
SELL YOUR IDEAS TO MANAGEMENT 532 WHEN TO UPGRADE AND WHY 536 WHY CHANGE
CONTROL IS YOUR FRIEND 539 HOW NOT TO BE A COMPUTER JERK 541 INDEX 545
TABLE OF CONTENTS | XIII
|
adam_txt |
NETWORK WARRIOR GARY A. DONAHUE O'REILLY 8 BEIJING * CAMBRIDGE * FARNHAM
* KOLN * PARIS * SEBASTOPOL * TAIPEI * TOKYO TABLE OF CONTENTS PREFACE
XV PART I. HUBS, SWITCHES, AND SWITCHING 1. WHAT IS A NETWORK? 3 2. HUBS
AND SWITCHES 6 HUBS 6 SWITCHES 10 3. AUTO-NEGOTIATION 19 WHAT IS
AUTO-NEGOTIATION? 19 HOW AUTO-NEGOTIATION WORKS 20 WHEN
AUTO-NEGOTIATIORF FAILS :; 20 AUTO-NEGOTIATION BEST PRACTICES 22
CONFIGURING AUTO-NEGOTIATION 23 4. VLANS 24 CONNECTING VLANS 24
CONFIGURING VLANS 27 5. TRUNKING 33 HOW TRUNKS WORK 34 CONFIGURING
TRUNKS 38 6. VLAN TRUNKING PROTOCOL 43 VTP PRUNING 46 DANGERS OF VTP 47
CONFIGURING VTP 49 7. ETHERCHANNEL 55 LOAD BALANCING 56 CONFIGURING AND
MANAGING ETHERCHANNEL 60 8. SPANNING TREE 66 BROADCAST STORMS 67 MAC
ADDRESS TABLE INSTABILITY 72 PREVENTING LOOPS WITH SPANNING TREE 73
MANAGING SPANNING TREE 77 ADDITIONAL SPANNING TREE FEATURES 80 COMMON
SPANNING TREE PROBLEMS 84 DESIGNING TO PREVENT SPANNING TREE PROBLEMS 87
PART II. ROUTERS AND ROUTING 9. ROUTING AND ROUTERS 91 ROUTING TABLES ,
92 ROUTE TYPES 95 THE IP ROUTING TABLE 95 10. ROUTING PROTOCOLS 102
COMMUNICATION BETWEEN ROUTERS 103 METRICS AND PROTOCOL TYPES 106
ADMINISTRATIVE DISTANCE 108 SPECIFIC ROUTING PROTOCOLS 110 11.
REDISTRIBUTION 130 REDISTRIBUTING INTO RIP 132 REDISTRIBUTING INTO EIGRP
135 REDISTRIBUTING INTO OSPF 137 MUTUAL REDISTRIBUTION 139
REDISTRIBUTION LOOPS 140 LIMITING REDISTRIBUTION 142 VIII I TABLE OF
CONTENTS 12. TUNNELS 150 GRE TUNNELS 151 GRE TUNNELS AND ROUTING
PROTOCOLS 156 GRE AND ACCESS LISTS 161 13. RESILIENT ETHERNET 163 HSRP
163 HSRP INTERFACE TRACKING 166 WHEN HSRP ISN'T ENOUGH 168 14. ROUTE
MAPS 172 BUILDING A ROUTE MAP 173 POLICY-ROUTING EXAMPLE 175 15.
SWITCHING ALGORITHMS IN CISCO ROUTERS 181 PROCESS SWITCHING 183
INTERRUPT CONTEXT SWITCHING 184 CONFIGURING AND MANAGING SWITCHING PATHS
190 PART III. MULTILAYER SWITCHES 16. MULTILAYER SWITCHES 197
CONFIGURING SVIS^ - 198 MULTILAYER SWITCH MODELS 203 17. CISCO 6500
MULTILAYER SWITCHES 7 204 ARCHITECTURE 206 CATOS VERSUS IOS 222 18.
CATALYST 3750 FEATURES 227 STACKING 227 INTERFACE RANGES 228 MACROS *
229 FLEX LINKS 233 STORM CONTROL 233 PORT SECURITY 238 SPAN 241 VOICE
VLAN 244 QOS ' 247 TABLE OF CONTENTS PART IV. TELECOM 19. TELECOM
NOMENCLATURE . . INTRODUCTION AND HISTORY TELECOM GLOSSARY 20. T1
UNDERSTANDING TL DUPLEX TYPES OF TL ENCODING FRAMING PERFORMANCE
MONITORING ALARMS TROUBLESHOOTING TLS CONFIGURING TLS 21. DS3 . .
FRAMING LINE CODING CONFIGURING DS3S 22. FRAME RELAY ORDERING
FRAME-RELAY'SERVICE FRAME-RELAY NETWORK DESIGN OVERSUBSCRIPTION LOCAL
MANAGEMENT INTERFACE (LMI) CONFIGURING FRAME RELAY TROUBLESHOOTING FRAME
RELAY PART V. SECURITY AND FIREWALLS 23. ACCESS LISTS F. DESIGNING
ACCESS LISTS ACLS IN MULTILAYER SWITCHES REFLEXIVE ACCESS LISTS 253 253
254 268 268 269 270 272 274 276 279 283 .288 288 292 292 299 302 303 306
307 309 316 323 323 334 338 TABLE OF CONTENTS 24. AUTHENTICATION IN
CISCO DEVICES 343 BASIC (NON-AAA) AUTHENTICATION 343 AAA AUTHENTICATION
353 25. FIREWALL THEORY 361 BEST PRACTICES 361 THE DMZ 363 ALTERNATE
DESIGNS 367 26. PIX FIREWALL CONFIGURATION 369 INTERFACES AND PRIORITIES
369 NAMES 371 OBJECT GROUPS 372 FIXUPS 375 FAILOVER 377 NAT 383
MISCELLANEOUS 388 TROUBLESHOOTING . 391 PART VI. SERVER LOAD BALANCING
27. SERVER LOAD-BALANCING TECHNOLOGY 395 TYPES OF LOAD BALANCING 396 HOW
SERVER LOAD BALANCING WORKS 398 CONFIGURING SERVER LOAD BALANCING 399
28. CONTENT SWITCH MODULES IN ACTION 405 COMMON TASKS 407 UPGRADING THE
CSM 411 PART VII. QUALITY OF SERVICE S? 29. INTRODUCTION TO QOS 417
TYPES OF QOS 421 QOS MECHANICS 422 COMMON QOS MISCONCEPTIONS 427 TABLE
OF CONTENTS 30. DESIGNING A QOS SCHEME 430 DETERMINING REQUIREMENTS 430
CONFIGURING THE ROUTERS 435 31. THE CONGESTED NETWORK 440 DETERMINING
WHETHER THE NETWORK IS CONGESTED 440 RESOLVING THE PROBLEM 445 32. THE
CONVERGED NETWORK 447 CONFIGURATION 447 MONITORING QOS 449
TROUBLESHOOTING A CONVERGED NETWORK 452 PART VIII. DESIGNING NETWORKS
33. DESIGNING NETWORKS 461 DOCUMENTATION 461 NAMING CONVENTIONS FOR
DEVICES 472 NETWORK DESIGNS 473 34. IP DESIGN 484 PUBLIC VERSUS PRIVATE
IP SPACE 484 VLSM I * 487 CIDR 490 ALLOCATING IP NETWORK SPACE 491
ALLOCATING IP SUBNETS ' :; 494 IP SUBNETTING MADE EASY 498 35. NETWORK
TIME PROTOCOL 506 WHAT IS ACCURATE TIME? 506 NTP DESIGN 508 CONFIGURING
NTP 510 36. FAILURES 513 HUMAN ERROR 513 MULTIPLE COMPONENT FAILURE 514
DISASTER CHAINS 515 NO FAILOVER TESTING 516 TROUBLESHOOTING 516 XII I
TABLE OF CONTENTS 37. GAD'SMAXIMS 521 MAXIM #1 521 MAXIM #2 524 MAXIM #3
525 38. AVOIDING FRUSTRATION 529 WHY EVERYTHING IS MESSED UP 529 HOW TO
SELL YOUR IDEAS TO MANAGEMENT 532 WHEN TO UPGRADE AND WHY 536 WHY CHANGE
CONTROL IS YOUR FRIEND 539 HOW NOT TO BE A COMPUTER JERK 541 INDEX 545
TABLE OF CONTENTS | XIII |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Donahue, Gary A. |
author_facet | Donahue, Gary A. |
author_role | aut |
author_sort | Donahue, Gary A. |
author_variant | g a d ga gad |
building | Verbundindex |
bvnumber | BV023029019 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5 |
callnumber-search | TK5105.5 |
callnumber-sort | TK 45105.5 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)255582739 (DE-599)BVBBV023029019 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01496nam a2200397 c 4500</leader><controlfield tag="001">BV023029019</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">071130s2007 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596101511</subfield><subfield code="c">: EUR 32.00 ; US $ 44.99 ; CAN $ 58.99</subfield><subfield code="9">0-596-10151-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596101510</subfield><subfield code="c">: EUR 32.00</subfield><subfield code="9">978-0-596-10151-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780596101510</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255582739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023029019</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-2174</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donahue, Gary A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network warrior</subfield><subfield code="b">[everything you need to know that wasn't on the CCNA exam]</subfield><subfield code="c">Gary A. Donahue</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 576 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016232937&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016232937</subfield></datafield></record></collection> |
id | DE-604.BV023029019 |
illustrated | Illustrated |
index_date | 2024-07-02T19:16:13Z |
indexdate | 2024-07-09T21:09:21Z |
institution | BVB |
isbn | 0596101511 9780596101510 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016232937 |
oclc_num | 255582739 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM DE-11 DE-29T DE-2174 |
owner_facet | DE-19 DE-BY-UBM DE-11 DE-29T DE-2174 |
physical | XX, 576 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | O'Reilly |
record_format | marc |
spelling | Donahue, Gary A. Verfasser aut Network warrior [everything you need to know that wasn't on the CCNA exam] Gary A. Donahue 1. ed. Beijing [u.a.] O'Reilly 2007 XX, 576 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes index Computer networks Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 s DE-604 HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016232937&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Donahue, Gary A. Network warrior [everything you need to know that wasn't on the CCNA exam] Computer networks Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4314339-8 |
title | Network warrior [everything you need to know that wasn't on the CCNA exam] |
title_auth | Network warrior [everything you need to know that wasn't on the CCNA exam] |
title_exact_search | Network warrior [everything you need to know that wasn't on the CCNA exam] |
title_exact_search_txtP | Network warrior [everything you need to know that wasn't on the CCNA exam] |
title_full | Network warrior [everything you need to know that wasn't on the CCNA exam] Gary A. Donahue |
title_fullStr | Network warrior [everything you need to know that wasn't on the CCNA exam] Gary A. Donahue |
title_full_unstemmed | Network warrior [everything you need to know that wasn't on the CCNA exam] Gary A. Donahue |
title_short | Network warrior |
title_sort | network warrior everything you need to know that wasn t on the ccna exam |
title_sub | [everything you need to know that wasn't on the CCNA exam] |
topic | Computer networks Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Computer networks Netzwerkverwaltung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016232937&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT donahuegarya networkwarrioreverythingyouneedtoknowthatwasntontheccnaexam |