MPLS.and.Next.Generation.Networks

Posted in Ebook, Telecommunication with tags , on January 9, 2009 by fl3xu5

Understand the business case for deploying MPLS-based services and solutions

Provides network managers and architects a precise MPLS primer
Defines MPLS service problems and their associated solutions
Includes ROI models for MPLS-based solutions
Discusses pros and cons of various options for each MPLS service
Network managers often question the value that MPLS brings to their business environment. This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company’s bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, you can use this comprehensive guide to understand and build a business case for the inclusion of MPLS in your network.

Click here

Google.Hacks.3rd.Edition

Posted in Ebook, Hacking, Security with tags , , on December 13, 2008 by fl3xu5

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We’ve found ways to get these new services to do even more.

The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You’ll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google’s reach. And have a lot of fun while doing it:

Search Google over IM with a Google Talk bot
Build a customized Google Map and add it to your own web site
Cover your searching tracks and take back your browsing privacy
Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice
Keep tabs on blogs in new, useful ways
Turn Gmail into an external hard drive for Windows, Mac, or Linux
Beef up your web pages with search, ads, news feeds, and more
Program Google with the Google API and language of your choice
For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!

Want to download the books ???
Click here

Top 15 Security/Hacking Tools & Utilities

Posted in Hacking, Security with tags , on June 14, 2008 by fl3xu5

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results. Continue reading