RAR-files |
p-9780134655529.rar |
200,000,000 |
517AD544 |
p-9780134655529.r00 |
200,000,000 |
19761FAA |
p-9780134655529.r01 |
200,000,000 |
3D30DD28 |
p-9780134655529.r02 |
200,000,000 |
1A3616BF |
p-9780134655529.r03 |
200,000,000 |
20BE7486 |
p-9780134655529.r04 |
200,000,000 |
0CE215BB |
p-9780134655529.r05 |
200,000,000 |
DFB8C4BF |
p-9780134655529.r06 |
200,000,000 |
FE74BE73 |
p-9780134655529.r07 |
200,000,000 |
F5DE0F52 |
p-9780134655529.r08 |
200,000,000 |
26ACBD5B |
p-9780134655529.r09 |
200,000,000 |
67FF2845 |
p-9780134655529.r10 |
200,000,000 |
F2D55C2D |
p-9780134655529.r11 |
200,000,000 |
D0C0BD28 |
p-9780134655529.r12 |
200,000,000 |
1631EDF5 |
p-9780134655529.r13 |
200,000,000 |
1F482716 |
p-9780134655529.r14 |
200,000,000 |
D7A01C6A |
p-9780134655529.r15 |
200,000,000 |
4BF1BFE7 |
p-9780134655529.r16 |
200,000,000 |
0CC3812A |
p-9780134655529.r17 |
200,000,000 |
677F4A00 |
p-9780134655529.r18 |
200,000,000 |
C976D204 |
p-9780134655529.r19 |
200,000,000 |
ABD0FC92 |
p-9780134655529.r20 |
200,000,000 |
35295B70 |
p-9780134655529.r21 |
200,000,000 |
BCDE2CA4 |
p-9780134655529.r22 |
200,000,000 |
4CB600DC |
p-9780134655529.r23 |
200,000,000 |
3E510AFF |
p-9780134655529.r24 |
200,000,000 |
E372D874 |
p-9780134655529.r25 |
200,000,000 |
24E923CE |
p-9780134655529.r26 |
200,000,000 |
76A2C88B |
p-9780134655529.r27 |
200,000,000 |
A958B3D8 |
p-9780134655529.r28 |
200,000,000 |
7470F538 |
p-9780134655529.r29 |
200,000,000 |
B2F12EDA |
p-9780134655529.r30 |
200,000,000 |
829F34D1 |
p-9780134655529.r31 |
200,000,000 |
9C3A788A |
p-9780134655529.r32 |
200,000,000 |
F3959362 |
p-9780134655529.r33 |
200,000,000 |
A6E6E0D1 |
p-9780134655529.r34 |
200,000,000 |
B422D723 |
p-9780134655529.r35 |
200,000,000 |
27F8E8A8 |
p-9780134655529.r36 |
200,000,000 |
660C6E34 |
p-9780134655529.r37 |
200,000,000 |
104170DE |
p-9780134655529.r38 |
200,000,000 |
502DD7EF |
p-9780134655529.r39 |
200,000,000 |
D023E2E0 |
p-9780134655529.r40 |
200,000,000 |
318A64E2 |
p-9780134655529.r41 |
200,000,000 |
3376A27F |
p-9780134655529.r42 |
200,000,000 |
CA9B82C4 |
p-9780134655529.r43 |
200,000,000 |
2BE45EBB |
p-9780134655529.r44 |
200,000,000 |
E0D0EF7A |
p-9780134655529.r45 |
200,000,000 |
3040FCDD |
p-9780134655529.r46 |
200,000,000 |
09D6F1EF |
p-9780134655529.r47 |
200,000,000 |
4A573287 |
p-9780134655529.r48 |
200,000,000 |
E8996FB9 |
p-9780134655529.r49 |
200,000,000 |
E23BF8F2 |
p-9780134655529.r50 |
53,739,680 |
D7FC4E9C |
|
Total size: |
10,253,739,680 |
|
|
Archived
files |
Introduction |
0 |
00000000 |
Introduction\00-ipv6.design.and.deployment.live.lessons.introduction.mp4
[8cd6ea631c852116]
|
211,392,630 |
B7F327A8 |
Module01 |
0 |
00000000 |
Module01\Module.Intro.mp4
[9db2aae247feb774]
|
50,528,945 |
CBD7A9CB |
Module01\L02-IPV6.Protocol |
0 |
00000000 |
Module01\L02-IPV6.Protocol\2.2 Introducing the IPv6 Address Family.mp4
[1379f8f2a2afcbda]
|
71,841,195 |
D6FAF2E2 |
Module01\L02-IPV6.Protocol\2.6 Visiting Headers and Friends.mp4
[a57f325d6841f867]
|
215,813,779 |
EF1AE759 |
Module01\L02-IPV6.Protocol\2.3 Making Hex Easy.mp4
[f43226eb3044e994]
|
72,046,121 |
10E8737C |
Module01\L02-IPV6.Protocol\2.1 IPv6 Is Big and Size Matters.mp4
[c490408f83a7fc88]
|
153,095,337 |
F355619A |
Module01\L02-IPV6.Protocol\2.0 Learning objectives.mp4
[98b4e5aed72e9438]
|
76,354,388 |
81A68614 |
Module01\L02-IPV6.Protocol\2.5 Understanding Why Link Local Is Required.mp4
[2b2aa3fcd7d9e092]
|
85,822,589 |
5FD14AC7 |
Module01\L02-IPV6.Protocol\2.4 Differentiating Prefix from Subnet.mp4
[7fffa31edd980135]
|
112,001,673 |
856D6D62 |
Module01\L04-Host.Role.in.IPV6 |
0 |
00000000 |
Module01\L04-Host.Role.in.IPV6\4.8 Examining Mobile OSs in an IPv6 Environment.mp4
[6c93e9e9060c32a9]
|
164,967,511 |
1020E7FB |
Module01\L04-Host.Role.in.IPV6\4.0 Learning objectives.mp4
[8d664b6fc67a7606]
|
87,318,800 |
A0A32C37 |
Module01\L04-Host.Role.in.IPV6\4.4 Examining Windows in an IPv6 Environment.mp4
[36c4f00b8c20de02]
|
277,117,111 |
3DBA11F6 |
Module01\L04-Host.Role.in.IPV6\4.1 Understanding Host Provisioning Mechanisms.mp4
[cc2b087f6513cf79]
|
294,638,703 |
A619919F |
Module01\L04-Host.Role.in.IPV6\4.9 Examining Consumer Devices in an IPv6 Environment.mp4
[5d3b0daafc320346]
|
72,512,606 |
CC176976 |
Module01\L04-Host.Role.in.IPV6\4.6 Examining Linux in an IPv6 Environment.mp4
[d7e5255bb8875941]
|
131,443,528 |
CB11841E |
Module01\L04-Host.Role.in.IPV6\4.3 Surveying Relevant RFCs.mp4
[eb45e6939ab36b38]
|
142,309,261 |
347595EC |
Module01\L04-Host.Role.in.IPV6\4.7 Examining Chromebook in an IPv6 Environment.mp4
[b5d85912277e47e9]
|
39,109,876 |
93D0827B |
Module01\L04-Host.Role.in.IPV6\4.2 Decrypting the Flags, Bits and Timers.mp4
[14c2af975756437d]
|
243,502,621 |
780B1737 |
Module01\L04-Host.Role.in.IPV6\4.5 Examining Mac OSX in an IPv6 Environment.mp4
[afcbbe53b06643f0]
|
160,381,425 |
3AFDEB40 |
Module01\L03-General.Design.Principles |
0 |
00000000 |
Module01\L03-General.Design.Principles\3.6 Examining Dual Stack.mp4
[447a06f425e15ee3]
|
30,139,621 |
6F7D1FD6 |
Module01\L03-General.Design.Principles\3.2 Obtaining IPv6 Addresses.mp4
[6d1bb46a364de8f4]
|
259,906,234 |
B5ABCD50 |
Module01\L03-General.Design.Principles\3.8 Examining Link Local Only Infrastructure.mp4
[184a5716350955bd]
|
89,586,414 |
0B4FAD1D |
Module01\L03-General.Design.Principles\3.3 Determining Where to Start.mp4
[1a6fb4f76ddae31d]
|
115,028,325 |
D54E7788 |
Module01\L03-General.Design.Principles\3.7 Dealing with Combined IPv4 and IPv6.mp4
[f6a7f89386fe2948]
|
87,505,117 |
877A2D61 |
Module01\L03-General.Design.Principles\3.1 Preparing the Project Plan.mp4
[1fe61d755d3b01e8]
|
104,915,980 |
87CADC53 |
Module01\L03-General.Design.Principles\3.9 Understanding Unique Local Addressing.mp4
[34cd36ba423dd4b1]
|
128,152,582 |
45DA5569 |
Module01\L03-General.Design.Principles\3.0 Learning objectives.mp4
[4caa47011f4680]
|
69,696,583 |
B01C0815 |
Module01\L03-General.Design.Principles\3.4 Building the Address Plan.mp4
[7c804a20ff9c19c]
|
300,649,792 |
81B9446F |
Module01\L03-General.Design.Principles\3.5 When to Use Tunneling.mp4
[8eefc8ef9199f04e]
|
132,391,035 |
FDAC3274 |
Module01\L05-IPV6.Network.Services |
0 |
00000000 |
Module01\L05-IPV6.Network.Services\5.2 Deploying IPv6 DNS.mp4
[27b298f4f97827b8]
|
83,850,104 |
D51ACD22 |
Module01\L05-IPV6.Network.Services\5.3 Managing IPv6 Addresses.mp4
[e05bf46e27a61283]
|
72,486,408 |
90C945F9 |
Module01\L05-IPV6.Network.Services\5.0 Learning objectives.mp4
[eda461e5887e9695]
|
39,448,710 |
7AFDEEF4 |
Module01\L05-IPV6.Network.Services\5.4 Implementing IPv6 Multicast.mp4
[b2d1a9adf4e4e2b7]
|
238,796,233 |
06C638D6 |
Module01\L05-IPV6.Network.Services\5.7 Surveying IPv6 Management Tools.mp4
[5f1c9228bdcd1d1]
|
165,835,405 |
C4602965 |
Module01\L05-IPV6.Network.Services\5.5 Multicast Listener Discovery.mp4
[95869b38a1838e05]
|
186,127,489 |
B823D6A9 |
Module01\L05-IPV6.Network.Services\5.1 Deploying DHCPv6.mp4
[99754543fedddec7]
|
245,933,802 |
EE30C513 |
Module01\L05-IPV6.Network.Services\5.6 Understanding IPv6 Zero Configuration.mp4
[fbf3496e76425cf8]
|
100,903,849 |
5F55467D |
Module01\L01-Why.IPV6.Why.Now |
0 |
00000000 |
Module01\L01-Why.IPV6.Why.Now\1.5 Understanding the Impact of the Bring Your Own Device era.mp4
[5bb490f136e8bade]
|
52,999,459 |
A4968212 |
Module01\L01-Why.IPV6.Why.Now\1.6 Understanding the Impact of The Internet of Things.mp4
[cfc34a18923a924e]
|
118,317,789 |
BD56AE72 |
Module01\L01-Why.IPV6.Why.Now\1.4 Your Operating Systems Are Already IPv6 Enabled.mp4
[e4a0a7668fc642ea]
|
83,129,307 |
FA43220C |
Module01\L01-Why.IPV6.Why.Now\1.0-Learning.Objectives.mp4
[ecaddc7b468c1a1b]
|
103,421,602 |
1ED04DB1 |
Module01\L01-Why.IPV6.Why.Now\1.3 National Strategies for IPv6 Deployment.mp4
[6e82591c838debcd]
|
103,478,211 |
75E6EDFC |
Module01\L01-Why.IPV6.Why.Now\1.1-Examining.Address.Depletion.mp4
[c91a06cce2c27d1d]
|
75,087,001 |
3F2D623A |
Module02 |
0 |
00000000 |
Module02\Module.Intro.mp4
[8ca9f723662431ae]
|
40,198,562 |
7EFE0EDC |
Module02\L09-Translation.Techniques |
0 |
00000000 |
Module02\L09-Translation.Techniques\9.6 Understanding Network Prefix Translation.mp4
[40131f2af1bbc1c4]
|
144,989,799 |
20335E00 |
Module02\L09-Translation.Techniques\9.2 Considering NAT64.mp4
[b83a8d96e1900947]
|
135,870,106 |
1880CAC6 |
Module02\L09-Translation.Techniques\9.1 Understanding Network Address Translation.mp4
[80d53c45bc9685b9]
|
67,340,670 |
EB02023C |
Module02\L09-Translation.Techniques\9.4 Understanding Proxy Services.mp4
[75a323240484a660]
|
81,024,362 |
C247C6A2 |
Module02\L09-Translation.Techniques\9.5 Examining Web Cache Control Protocol.mp4
[b9421c09370afbd4]
|
58,542,475 |
633FFDFE |
Module02\L09-Translation.Techniques\9.0 Learning objectives.mp4
[618d3dd417a21383]
|
72,487,525 |
302D9B48 |
Module02\L09-Translation.Techniques\9.3 Implementing Server Load Balancing.mp4
[c6adffeeb5d5c18e]
|
93,245,074 |
727F840B |
Module02\L08-Wide.Area.Networking |
0 |
00000000 |
Module02\L08-Wide.Area.Networking\8.3 Exploring MACsec.mp4
[e73e5eae26be52d]
|
59,785,509 |
145D6734 |
Module02\L08-Wide.Area.Networking\8.1 Understanding Remote Branch Design.mp4
[37bc08cabb14cd5b]
|
117,525,912 |
ABCFBEF7 |
Module02\L08-Wide.Area.Networking\8.2 Considering Dynamic Multipoint VPN.mp4
[6499e3fe952366c7]
|
83,718,812 |
18446A19 |
Module02\L08-Wide.Area.Networking\8.5 Exploring Segment Routing.mp4
[232512610670d224]
|
161,320,922 |
71380574 |
Module02\L08-Wide.Area.Networking\8.6 Deploying Remote Access VPN.mp4
[76ddd1f6583d860e]
|
31,436,861 |
5C5B0838 |
Module02\L08-Wide.Area.Networking\8.4 Examining Multiprotocol Label Switching.mp4
[b612e88c5fc1dae6]
|
84,767,587 |
32DDBDF2 |
Module02\L08-Wide.Area.Networking\8.0 Learning objectives.mp4
[d84a9e8cbf490739]
|
55,020,584 |
B4E3C3FA |
Module02\L07-Data.Center |
0 |
00000000 |
Module02\L07-Data.Center\7.1 Grasping Transition Stages.mp4
[d50b83b55fb48f65]
|
115,511,159 |
21EE9EBD |
Module02\L07-Data.Center\7.0 Learning objectives.mp4
[58cf31e6c954d6c0]
|
66,567,995 |
B32B8C6F |
Module02\L07-Data.Center\7.2 Considerations for Storage Area Networks.mp4
[ec1796a8a9c680c4]
|
81,531,562 |
00B0F9F8 |
Module02\L07-Data.Center\7.4 Scaling the Neighbor Cache.mp4
[f407e76e524edc92]
|
143,967,529 |
526A0D5D |
Module02\L07-Data.Center\7.6 Planning for Application Migration.mp4
[7462341ea6811c18]
|
166,568,572 |
3D4DC1CB |
Module02\L07-Data.Center\7.5 Verifying Server Readiness.mp4
[2b2fad9584e98e96]
|
72,770,319 |
AE71F524 |
Module02\L07-Data.Center\7.7 Considering Cloud Services.mp4
[e3c3a5c7a66f33c4]
|
91,286,312 |
192C8357 |
Module02\L07-Data.Center\7.3 Examining Data Center Interconnect.mp4
[8e6608e89c126893]
|
140,059,165 |
181149C0 |
Module02\L06-Campus.Design.Considerations |
0 |
00000000 |
Module02\L06-Campus.Design.Considerations\6.2 Comparing Layer 2 and Layer 3 Access.mp4
[1c8acdec5d5d3989]
|
103,293,237 |
60997A24 |
Module02\L06-Campus.Design.Considerations\6.7 Scaling the Distribution Layer.mp4
[eb3545e73d27df1]
|
148,804,292 |
0D08C014 |
Module02\L06-Campus.Design.Considerations\6.0 Learning objectives.mp4
[d0e0b497f320b701]
|
58,082,875 |
299DECF2 |
Module02\L06-Campus.Design.Considerations\6.1 Applied Concepts for Campus and Core.mp4
[be2b9cdbdef03900]
|
131,796,151 |
5BAF05C8 |
Module02\L06-Campus.Design.Considerations\6.6 Implementing Wireless Access Layer.mp4
[8bb3d09d03a59b87]
|
195,593,020 |
AA7539BC |
Module02\L06-Campus.Design.Considerations\6.4 Examining First Hop Security-Thread Identification.mp4
[35dacb67ac7985ce]
|
260,494,255 |
6E3A995E |
Module02\L06-Campus.Design.Considerations\6.5 Examining First Hop Security-Attacks and Mitigation Techniques.mp4
[8517444162540dd0]
|
232,825,988 |
4F16D7EA |
Module02\L06-Campus.Design.Considerations\6.9 Implementing Unified Communications.mp4
[196097a10416ff25]
|
204,215,407 |
8F9DFA50 |
Module02\L06-Campus.Design.Considerations\6.3 Examining First Hop Redundancy.mp4
[38eab56877ca99a1]
|
134,474,975 |
46547A43 |
Module02\L06-Campus.Design.Considerations\6.8 Securing the RP-OSPFv3 and EIGRP.mp4
[cb274c0c0cc132f5]
|
166,137,016 |
ECDC212A |
Module02\L10-The.Internet.Edge |
0 |
00000000 |
Module02\L10-The.Internet.Edge\10.0 Learning objectives.mp4
[49ed340b282396c5]
|
58,604,911 |
ECEAE18B |
Module02\L10-The.Internet.Edge\10.2 Implementing BGP Multihoming.mp4
[68331d241e3a49b3]
|
154,628,020 |
34365A28 |
Module02\L10-The.Internet.Edge\10.3 Examining Multihome, Multisite.mp4
[374188390bec1a42]
|
78,046,356 |
ECB39915 |
Module02\L10-The.Internet.Edge\10.1 Surveying Design Scenarios.mp4
[5f2d83fab34a97dc]
|
70,098,603 |
4B772A63 |
Module02\L10-The.Internet.Edge\10.4 Considering Location Identification Separation Protocol.mp4
[5cdabc12805eb3de]
|
71,204,534 |
B3587B62 |
Module02\L10-The.Internet.Edge\10.5 Mitigating Risk with Security.mp4
[15bb24fe8f6381a5]
|
239,291,290 |
499D9045 |
Summary |
0 |
00000000 |
Summary\IPv6 Design and Deployment LiveLessons-Summary.mp4
[d64a96ec897d0bd8]
|
130,610,058 |
BF29A19E |
|
Total size: |
10,253,723,512 |
|
|