A Practical Guide to Testing Object-Oriented Software Addison-Wesley Professional free download

Books, Download, Uncategorized
In this book, two leading O-O test researchers and consultants outline a start-to-finish methodology for testing: what to test, why to test it, how to test it, who should do the testing, and when. The book is organized around a task orientation, encompassing testing models; testing components, systems and subsystems; and planning for testing. The authors review the unique challenges associated with object-oriented software testing, offer practical insights into testing priorities, introduce each leading testing technique, and walk step-by-step through applying them. They review the development of custom test software, and demonstrate how to strengthen the ties between testing and the rest of the development process. Download Download Features include a detailed object-oriented testing FAQ, and a running case study that ties together all stages and elements of O-O testing.…
Read More

A Developer's Guide to Data Modeling for SQL Server Addison-Wesley Professional free download

Books, Download, Uncategorized
A Developer's Guide to Data Modeling for SQL Server explains the concepts and practice of data modeling with a clarity that makes the technology accessible to anyone building databases and data-driven applications. 'Eric Johnson and Joshua Jones combine a deep understanding of the science of data modeling with the art that comes with years of experience. If you're new to data modeling, or find the need to brush up on its concepts, this book is for you.'-Peter Varhol, Executive Editor, Redmond Magazine Model SQL Server Databases That Work Better, Do More, and Evolve More Smoothly Effective data modeling is essential to ensuring that your databases will perform well, scale well, and evolve to meet changing requirements. Download Download This book enables you to Understand your data model's physical elements, from…
Read More

JUNOS Enterprise Routing O'Reilly Media free download

Books, Download, Uncategorized
JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing environments. It offers complete coverage of all the services available to the JUNOS administrator, including JUNOS Enhanced Services (ES). This book is the official study guide for all three Juniper Enterprise Routing certification exams, and is highly recommended reading to pass the exams. With its field-guide emphasis on practical solutions, you can easily take the book beyond the classroom and into working networks as a design, maintenance, and troubleshooting reference par excellence. Download Download JUNOS Enterprise Routing covers all three certification exams in this track:Juniper Networks Certified Internet Associate (JNCIA-ER) Juniper Networks Certified Internet Specialist (JNCIS-ER) Juniper Networks Certified Internet Expert (JNCIE-ER) With more services such as voice, conference, and multicast on the IP router platform,…
Read More

Junos Security O'Reilly Media PDF FREE Download

Books, Download, Uncategorized
Junos Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Junos Security is a clear and detailed roadmap to the SRX platform. Download Download The author's newer book, Juniper SRX Series, covers the SRX devices themselves.Get up to speed on Juniper's multi-function SRX platforms and SRX Junos softwareExplore case studies…
Read More

How to configure shopos antivirus in juniper srx series

Education, Juniper, Networking, Telecom, Tutorial, Uncategorized
Step 1: Verify the License Srx> show system license Step 2: Configure the type of antivirus engine in UTM                 SRX# set security utm feature-profile anti-virus type sophos-engine Step 3:- Configure utm policy for desired protocol : Supported protocol :HTTP,FTP, SMTP ,IMAP AND POP3   Srx# set security utm utm-policy shopos-utm-policy anti-virus http-profile junos-sophos-av-defaults Srx# set security utm utm-policy shopos-utm-policy anti-virus ftp upload-profile junos-sophos-av-defaults SRX# set security utm utm-policy shopos-utm-policy anti-virus ftp download-profile junos-sophos-av-defaults SRX#set security utm utm-policy shopos-utm-policy anti-virus smtp-profile junos-sophos-av-defaults Step 4: Apply the UTM Policy in security Policy  SRX# set security policies from-zone trust to-zone untrust policy utm-policy-sophos match source-address any SRX# set security policies from-zone trust to-zone untrust policy utm-policy-sophos match destination-address any SRX#set security policies from-zone trust to-zone untrust policy utm-policy-sophos match application any SRX#set…
Read More

16 फरवरी से 20 मार्च तक चलेंगी 10वीं और 12वीं का उत्तर प्रदेश माध्यमिक शिक्षा बोर्ड परीक्षा 2017

Education, Examinations, Uncategorized
उत्तर प्रदेश माध्यमिक शिक्षा परिषद ने 10वीं और 12वीं के लिए होने वाली 2017 की बोर्ड परीक्षा के कार्यक्रम तैयार कर लिया है। कार्यक्रम के अनुसार परीक्षाएं 16 फरवरी 2017 से शुरू होंगी और 20 मार्च 2017 तक चलेंगी। हाईस्कूल की परीक्षा 16 फरवरी से शुरू होकर 6 मार्च तक चलेंगी जबकि इंटरमीडिएट की परीक्षा 16 फरवरी से 20 मार्च तक संपन्न कराई जाएंगी। इंटरमीडिएट की लिखित परीक्षा से पहले प्रैक्टिकल परीक्षाये संपन्न करायी जाएंगी जो 2 चरणों में होगी जिसका पहला चरण 22 दिसंबर से आरम्भ होंगा।
Read More

How does G.709 OTN work?

Education, Networking, Telecom, Tutorial, Uncategorized
At a basic level, G.709 OTN defines a frame format that "wraps" data packets, in a format quite similar to that of a SONET frame. There are six distinct layers to this format. OPU: Optical Channel Payload Unit. This contains the encapsulated client data, and a header describing the type of that data. It is analogous to the ‘Path’ layer in SONET/SDH. ODU: Optical Data Unit. This level adds optical path-level monitoring, alarm indication signals and automatic protection switching. It performs similar functions to the ‘Line Overhead’ in SONET/SDH. OTU: Optical Transport Unit. This represents a physical optical port (such as OTU2, 10Gbps), and adds performance monitoring (for the optical layer) and the FEC (Forward Error Correction). It is similar to the ‘Section Overhead’ in SONET/SDH. OCh: Optical Channel. This…
Read More

Optical Transport Network (OTN)

Education, Networking, Telecom, Tutorial, Uncategorized
ITU-T defines an Optical Transport Network (OTN) as a set of Optical Network Elements (ONE) connected by optical fiber links, able to provide functionality of transport, multiplexing, switching, management, supervision and survivability of optical channels carrying client signals. An ONE may Re-time, Re-Amplify, Re-shape (3R) but it does not have to be 3R – it can be purely photonic. The ITU's Optical Transport Network (OTN), as defined by recommendation G.709, provides a network-wide framework that adds SONET/SDH-like features to WDM equipment (also known as Wavelength Switched Optical Network equipment, or WSON equipment). It creates a transparent, hierarchical network designed for use on both WDM/WSON devices and TDM devices. Two switching layers are formed (TDM and WSON) and functions of transport, multiplexing, routing, management, supervision, and survivability are defined. The promise of the…
Read More

What is Port Scan Attack?

Education, Networking, Telecom, Tutorial, Uncategorized
A port scan attack, therefore, occurs when an attacker sends packets to your machine, varying the destination port. The attacker can use this to find out what services you are running and to get a pretty good idea of the operating system you have. Ports are like little doors on your system. Most packets leaving your machine come out of a certain door. They are destined for another door on another system. There are two different protocols that use ports: TCP and UDP. Each of these two protocols has 65,536 different ports. Various Internet services listen on certain well-known doors. For example, Web servers usually listen on TCP port 80. Mail servers usually listen on TCP door port 25. An attacker launches a port scan to see what ports are…
Read More