{"id":420,"date":"2012-03-15T12:44:30","date_gmt":"2012-03-15T09:14:30","guid":{"rendered":"http:\/\/fxplans.com\/web\/?page_id=420"},"modified":"2012-09-30T01:48:30","modified_gmt":"2012-09-29T22:18:30","slug":"network-and-security-ebooks","status":"publish","type":"page","link":"http:\/\/fxplans.com\/web\/network-and-security-ebooks\/","title":{"rendered":"Network and Security Ebooks"},"content":{"rendered":"<h5 style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter  wp-image-889\" title=\"Maximum security\" src=\"http:\/\/fxplans.com\/web\/wp-content\/uploads\/2012\/03\/Maximum-security-300x271.jpg\" alt=\"\" width=\"216\" height=\"195\" srcset=\"http:\/\/www.fxplans.com\/web\/wp-content\/uploads\/2012\/03\/Maximum-security-300x271.jpg 300w, http:\/\/www.fxplans.com\/web\/wp-content\/uploads\/2012\/03\/Maximum-security.jpg 462w\" sizes=\"(max-width: 216px) 100vw, 216px\" \/><\/h5>\n<h5 style=\"text-align: center;\"><\/h5>\n<h5 style=\"text-align: left;\"><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>ISA.Server.2006.Unleashed \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"http:\/\/fxplans.com\/Ebooks\/ISA.Server.2006.Unleashed.pdf\">Download<\/a><\/div><\/span><\/h5>\n<h5 style=\"text-align: left;\"><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Palet-IPv6_Tutorial_basics \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<a href=\"http:\/\/fxplans.com\/Ebooks\/Palet-IPv6_Tutorial_basics.pdf\">Download<\/a><\/div><\/span><\/h5>\n<h5 style=\"text-align: left;\"><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>TCPip Tutorial(IBM redbook) \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"http:\/\/fxplans.com\/Ebooks\/TCPip-Tutorial-and-Technical-overview.pdf\">Download<\/a><\/div><\/span><\/h5>\n<h5 style=\"text-align: left;\"><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Security(windows server 2008) \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<a href=\"http:\/\/fxplans.com\/Ebooks\/Windows Server 2008 Security Guide.pdf\">\u00a0Download<\/a><\/div><\/span><\/h5>\n<h5 style=\"text-align: left;\"><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Security(windows server 2003) \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"http:\/\/fxplans.com\/Ebooks\/Windows Server 2003 Security Guide.pdf\">Download<\/a><\/div><\/span><\/h5>\n<h5 style=\"text-align: left;\"><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Security for Small buisinesses \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"http:\/\/fxplans.com\/Ebooks\/Security_Guide_for_Small_Business.pdf\"> Download<\/a><\/div><\/span><\/h5>\n<h5 style=\"text-align: left;\"><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Security+ \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"http:\/\/www.fxplans.com\/Ebooks\/Security+.pdf\">Download<\/a><\/div><\/span><\/h5>\n<h5><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Traffic and Monitoring \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"http:\/\/www.fxplans.com\/Ebooks\/Traffic and monitoring.pdf\">Download<\/a><\/div><\/span><\/h5>\n<h5><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Familiar with IBM X force \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"http:\/\/www.fxplans.com\/Ebooks\/IBM-x-force.PDF\">Download<\/a><\/div><\/span><\/h5>\n<h5><span style=\"color: #888888;\"><div class=\"important_block message-block\"><p class=\"printonly\"><strong>Important!<\/strong><\/p>Fiber Optic network design \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<a href=\"http:\/\/www.fxplans.com\/Ebooks\/Fiber Optic network design.pdf\"> Download<\/a><\/div><\/span><\/h5>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":530,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-twocolumnsleft.php","meta":[],"_links":{"self":[{"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/pages\/420"}],"collection":[{"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/comments?post=420"}],"version-history":[{"count":47,"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/pages\/420\/revisions"}],"predecessor-version":[{"id":433,"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/pages\/420\/revisions\/433"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/media\/530"}],"wp:attachment":[{"href":"http:\/\/fxplans.com\/web\/wp-json\/wp\/v2\/media?parent=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}