You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Most vols. have appendices consisting of reports of various State offices.
Learn theory framework and configuration of multiservice switching and design guidelines in this workbook that includes a case study with MPLS and PNNI within or utilizing all the platforms.
None
None
The remarkable story of a "talking" chimp, a leading scientist, and the profound insights they have uncovered about our species He has been featured in cover stories in Time, Newsweek, and National Geographic, and has been the subject of a "NOVA" documentary. He is directly responsible for discoveries that have forced the scientific community to recast its thinking about the nature of the mind and the origins of language. He is Kanzi, an extraordinary bonobo chimpanzee who has overturned the idea that symbolic language is unique to our species. This is the moving story of how Kanzi learned to converse with humans and the profound lessons he has taught us about our animal cousins, and ourselves. " . . . The underlying thesis is informative and well argued . . . Savage-Rumbaugh's results are impressive." — The Washington Post "This popular, absorbing, and controversial account is recommended." — Library Journal
Most vols. have appendices consisting of reports of various State offices.
Based on the official instructor-led training course of the same name in a self-study product, Cisco® Secure Virtual Private Networks is a comprehensive, results-oriented book designed to give readers the knowledge to plan, administer, and maintain a Virtual Private Network (VPN). Readers are taught to accomplish several specific tasks, including identifying the features, functions, and benefits of Cisco® Secure VPN products; identifying the component technologies implemented in Cisco® Secure VPN products; utilizing commands required to configure and test IPSec in Cisco IOS® software and PIX Firewalls; installing and configuring the Cisco® VPN Client to create a secure tunnel to a Cisco® VPN Concentrator and PIX Firewall; configuring and verifying IPSec in the Cisco® VPN Concentrator, Cisco router, and PIX Firewall; and configuring the Cisco® VPN Concentrator, Cisco® router, and PIX Firewall for interoperability.