000 04159nam a2201081 i 4500
001 5769543
003 IEEE
005 20200421114120.0
006 m o d
007 cr |n|||||||||
008 151221s2011 njua ob 001 eng d
020 _a9781118073810
_qebook
020 _z9780470585887
_qprint
020 _z1118073819
_qelectronic
024 7 _a10.1002/9781118073810
_2doi
035 _a(CaBNVSL)mat05769543
035 _a(IDAMS)0b00006481540112
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK5105.8835
_b.R659 2010eb
100 1 _aRooney, Tim,
_eauthor.
245 1 0 _aIntroduction to IP address management /
_cTimothy Rooney.
264 1 _a[Piscataway, New Jersey] :
_bIEEE,
_cc2010.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2011]
300 _a1 PDF (xiii, 263 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aIEEE Press series on network management ;
_v19
504 _aIncludes bibliographical references (p. 255-260) and index.
505 0 _aFrontmatter -- IP Networking Overview -- Internet Protocol Addressing -- Dynamic Host Configuration Protocol (DHCP) -- The Domain Name System (DNS) -- IP Address Management Overview -- IP Address Management Practices -- IP Address Management Workflow -- IPv6 Deployment and IPv4 Co-Existence -- Security Considerations -- IP Address Management Business Case -- Appendix A: IPV4 DHCP Options -- Appendix B: DHCPV6 Options -- Appendix C: DNS Resource Record Summary -- Glossary -- Bibliography -- Index.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _a"The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--
_cProvided by publisher.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/21/2015.
650 0 _aInternet domain names.
650 0 _aInternet addresses.
650 0 _aTCP/IP (Computer network protocol)
655 0 _aElectronic books.
695 _aAccess control
695 _aApplication programming interfaces
695 _aAsynchronous transfer mode
695 _aAuthentication
695 _aAutomation
695 _aBibliographies
695 _aBroadband communication
695 _aCommunication cables
695 _aComputer aided software engineering
695 _aComputers
695 _aDH-HEMTs
695 _aData structures
695 _aDelay
695 _aDomain Name System
695 _aElectronic mail
695 _aEncapsulation
695 _aEquations
695 _aHardware
695 _aIP networks
695 _aISDN
695 _aIndexes
695 _aInformation services
695 _aInternet
695 _aInvestments
695 _aManuals
695 _aMobile computing
695 _aMonitoring
695 _aNetwork topology
695 _aOrganizations
695 _aPerformance evaluation
695 _aPortals
695 _aPostal services
695 _aPrinters
695 _aProduction
695 _aProtocols
695 _aPublic key
695 _aRelays
695 _aResource management
695 _aRouting
695 _aRouting protocols
695 _aSecurity
695 _aServers
695 _aSockets
695 _aStandards
695 _aTerminology
695 _aUnicast
695 _aWireless networks
710 2 _aIEEE Xplore (Online Service),
_edistributor.
710 2 _aWiley Interscience (online service),
_epublisher.
776 0 8 _iPrint version:
_z9780470585887
830 0 _aIEEE Press series on network management ;
_v19
856 4 2 _3Abstract with links to resource
_uhttp://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5769543
942 _cEBK
999 _c59701
_d59701