Ặc ặc ,nhiều ebooks quá ,mi'nh sap ngộp thở roi ne' :D Ca'm on bạn rat nhieu nhe.Toa'n la' ha'ng xịn,phai load nhanh kẻo die :D
Announcement
Collapse
No announcement yet.
Các Ebook hay ...!
Collapse
X
-
Installing, Troubleshooting, and Repairing Wireless Networks
Installing, Troubleshooting, and Repairing Wireless Networks
Book Description
CD-ROM packed with diagnostic and troubleshooting software! PRACTICAL, AUTHORITATIVE GUIDANCE ON KEEPING A WIRELESS NETWORK WORKING HARD FOR YOUR BUSINESS! With annual equipment sales projected to grow to more than $5 billion by mid-decade, wireless networking is clearly a technology whose time has come. But with many wireless networks expected to be created at both small offices and home offices, where can people charged with maintaining them get comprehensive information to help them do just that? The answer is McGraw-Hill’s Installing, Troubleshooting, and Repairing Wireless Networks. Written with insight by a noted IT expert and commentator, this book provides comprehensive coverage of this rapidly emerging technology, and in the process: * Introduces all wireless components, both off-the-shelf and subscriber products * Covers WiFi technologies as 802.11a and b * Includes all scales of wireless networks, from home to office, cafes and campuses, airports and hotels, to MANs, and describes what’s best for different needs * Shows how to integrate wired and wireless LANs * Discusses the benefits and pitfalls of wireless technologies * Advises how to set up and maintain security features * And much, much more! Basic enough for the hobbyist -; and yet still detailed enough for the IT professional -; Installing, Troubleshooting, and Repairing Wireless Networks is the essential survival guide for keeping a wireless network up and running.
From the Back Cover
CD-ROM packed with diagnostic and troubleshooting software!
PRACTICAL, AUTHORITATIVE GUIDANCE ON KEEPING A WIRELESS NETWORK WORKING HARD FOR YOUR BUSINESS!
With annual equipment sales projected to grow to more than $5 billion by mid-decade, wireless networking is clearly a technology whose time has come. But with many wireless networks expected to be created at both small offices and home offices, where can people charged with maintaining them get comprehensive information to help them do just that? The answer is McGraw-Hill’s Installing, Troubleshooting, and Repairing Wireless Networks.
Written with insight by a noted IT expert and commentator, this book provides comprehensive coverage of this rapidly emerging technology, and in the process:
* Introduces all wireless components, both “off-the-shelf” and subscriber products
* Covers WiFi technologies as 802.11a and b
* Includes all scales of wireless networks, from home to office, cafes and campuses, airports and hotels, to MANs, and describes what’s best for different needs
* Shows how to integrate wired and wireless LANs
* Discusses the benefits and pitfalls of wireless technologies
* Advises how to set up and maintain security features
* And much, much more!
Basic enough for the hobbyist — and yet still detailed enough for the IT professional — Installing, Troubleshooting, and Repairing Wireless Networks is the essential survival guide for keeping a wireless network up and running.
About the Author
Jim Aspinwall has been the Windows Helpdesk columnist and feature editor for CNET.COM and author of three books on PC maintenance. He has worked for a variety of computer software and support companies and is currently providing PC support and web consulting services. A resident of Campbell, California, Jim is also an amateur radio operator and an OSHA certified tower climber, maintaining radio transmission sites in Northern California. You may send him e-mail via wireless@raisen.com
Code:http://rapidshare.de/files/24522545/Installing__Troubleshooting__and_Repairing_Wireless_Networks.rar
Comment
-
The Ultimate Windows Server 2003 System Administrator’s Guide
The Ultimate Windows Server 2003 System Administrator’s Guide
“This book will be a supportive resource to help you know how to use the tools and features Microsoft shipped, but even better, Williams and Walla guide you through enough of the product internals to approach administration more strategically.”
From the Foreword by Brian Valentine, Senior Vice President, Windows Division, Microsoft Corporation
Windows Server 2003, the successor to Windows 2000 and Windows NT, is designed to accommodate the seamless exchange of information through Web services. It delivers the increased flexibility and power needed to administer networks as global entities, but its enhanced management tools and security features present as many challenges as opportunities. The Ultimate Windows Server 2003 System Administrator’s Guide will help readers negotiate these challenges and exploit the opportunities.
Robert Williams and Mark Walla take readers from an understanding of basic concepts to the application of advanced functions. This comprehensive book begins with the fundamentals of Windows 2000 system administration and applies them to Windows Server 2003. The book then details the planning, deployment, administration, and management of a Windows Server system, and follows up with complete coverage of advanced tools and theory. This book concludes with a quick reference to the most important Windows .NET commands and utilities.
Key topics include:
Windows Server 2003 features, structure, planning, and installation
Migration from Windows NT and Windows 2000
Microsoft Management Console
Active Directory management and use
User management
Group Policy
Security, including IP security
Printer and file services and networking basics
Virtual private networks
Disk and backup management and disaster recovery
Terminal and Internet Information Services
Cluster and indexing services, and message queuing
System Management Server
Windows 2000 administration support
In this book, system administrators and other IT professionals will find the essential information needed to succeed in the administration of the Windows .NET and Windows 2000 Server families.
Code:http://rapidshare.de/files/24522983/Addison.Wesley.The.Ultimate_Windows_Server_2003_System_Administrator_s_Guide.part1.rar http://rapidshare.de/files/24523229/Addison.Wesley.The.Ultimate_Windows_Server_2003_System_Administrator_s_Guide.part2.rar
Comment
-
Security Analysis
Security Analysis
Book Description
The timeless edition of Security Analysis that most closely reflects today’s financial environment Graham and Dodd’s Security Analysis is hands-down the most influential investment book in history. The classic 1951 edition is the first edition of the bestselling investment bible that was written during a time of economic stability and prosperity. It provides investors with techniques and strategies for profitable investing in an economic environment that most resembles today. Security Analysis: The Classic 1951 Edition features a far more contemporary focus on the wisdom and legitimacy of common stocks for individual investors. This essential addition to any investment library features: Graham and Dodd’s original words and insights, unvarnished and still compelling Timeless methods for measuring asset values and cash flows, still a centerpiece of value investing worldwide Income statements and balance sheets moved to the front of the book for ease of use
About the Author
Benjamin Graham was a professor of finance at Columbia University and has long been recognized as the intellectual father of modern security analysis and value investing.
David Dodd taught at Columbia with Benjamin Graham and played a major role in helping Dr. Graham formulate his value investing theories.
Code:http://rapidshare.de/files/24524230/Security_Analysis.rar
Comment
-
Web Site Measurement Hacks
Web Site Measurement Hacks
In order to establish and then maintain a successful presence on the Web, designing a creative site is only half the battle. What good is an intricate Web infrastructure if you're unable to measure its effectiveness? That's why every business is desperate for feedback on their site's visitors: Who are they? Why do they visit? What information or service is most valuable to them?
Unfortunately, most common Web analytics software applications are long on functionality and short on documentation. Without clear guidance on how these applications should be integrated into the greater Web strategy, these often expensive investments go underused and underappreciated.
Enter Web Site Measurement Hacks, a guidebook that helps you understand your Web site visitors and how they contribute to your business's success. It helps organizations and individual operators alike make the most of their Web investment by providing tools, techniques, and strategies for measuring--and then improving--their site's usability, performance, and design. Among the many topics covered, you'll learn:
* definitions of commonly used terms, such as "key performance indicators" (KPIs)
* how to drive potential customers to action
* how to gather crucial marketing and customer data
* which features are useful and which are superfluous
* advanced techniques that senior Web site analysts use on a daily basis
By examining how real-world companies use analytics to their success, Web Site Measurement Hacks demonstrates how you, too, can accurately measure your Web site's overall effectiveness. Just as importantly, it bridges the gulf between the technical teams charged with maintaining your Web's infrastructure and the business teams charged with making management decisions.
It's the technology companion that every site administrator needs.
Code:http://rapidshare.de/files/24524534/Web_Site_Measurement_Hacks.rar
Comment
-
Ebook hay !
Modern Cryptography: Theory and Practice
Book Description
Preface Our society has entered an era where commerce activities, business transactionsand government services have been, and more and more of them will be, conductedand offered over open computer and communications networks such as the Internet,in particular, via WorldWideWeb-based tools. Doing things online has a greatadvantage of an always-on availability to people in any corner of the world. Hereare a few examples of things that have been, can or will be done online: Banking, bill payment, home shopping, stock trading, auctions, taxation,gambling, micro-payment (e.g., pay-per-downloading), electronicidentity, online access to medical records, virtual private networking, securedata archival and retrieval, certified delivery of documents, fair exchangeof sensitive documents, fair signing of contracts, time-stamping,notarization, voting, advertising, licensing, ticket booking, interactivegames, digital libraries, digital rights management, pirate tracing, . . . And more can be imagined. Fascinating commerce activities, transactions and services like these are onlypossible if communications over open networks can be conducted in a secure manner.An effective solution to securing communications over open networks is to applycryptography. Encryption, digital signatures, password-based user authentication,are some of the most basic cryptographic techniques for securing communications.However, as we shall witness many times in this book, there are surprising subtletiesand serious security consequences in the applications of even the most basiccryptographic techniques. Moreover, for many “fancier” applications, such as manylisted in the preceding paragraph, the basic cryptographic techniques are no longeradequate. With an increasingly large demand for safeguarding communications over opennetworks for more and more sophisticated forms of electronic commerce, businessand servicesa, an increasingly large number of information security professionalsaGartner Group forecasts that total electronic business revenues for business to business (B2B)and business to consumer (B2C) in the European Union will reach a projected US $2.6trillion inwill be needed for designing, developing, analyzing and maintaining informationsecurity systems and cryptographic protocols. These professionals may range fromIT systems administrators, information security engineers and software/hardwaresystems developers whose products have security requirements, to cryptographers. In the past few years, the author, a technical consultant on information securityand cryptographic systems at Hewlett-Packard Laboratories in Bristol, haswitnessed the phenomenon of a progressively increased demand for information securityprofessionals unmatched by an evident shortage of them. As a result, manyengineers, who are oriented to application problems and may have little propertraining in cryptography and information security have become “roll-up-sleeves”designers and developers for information security systems or cryptographic protocols.This is in spite of the fact that designing cryptographic systems and protocolsis a diffcult job even for an expert cryptographer. The author’s job has granted him privileged opportunities to review many informationsecurity systems and cryptographic protocols, some of them proposedand designed by “roll-up-sleeves” engineers and are for uses in serious applications.In several occasions, the author observed so-called “textbook crypto” features insuch systems, which are the result of applications of cryptographic algorithms andschemes in ways they are usually introduced in many cryptographic textbooks. Directencryption of a password (a secret number of a small magnitude) under abasic public-key encryption algorithm (e.g., “RSA”) is a typical example of textbookcrypto. The appearances of textbook crypto in serious applications with a”non-negligible probability” have caused a concern for the author to realize thatthe general danger of textbook crypto is not widely known to many people whodesign and develop information security systems for serious real-world applications. Motivated by an increasing demand for information security professionals anda belief that their knowledge in cryptography should not be limited to textbookcrypto, the author has written this book as a textbook on non-textbook cryptography.This book endeavors to: Introduce a wide range of cryptographic algorithms, schemes and protocols with a particular emphasis on their non-textbook versions. Reveal general insecurity of textbook crypto by demonstrating a large number of attacks on and summarizing typical attacking techniques for such systems. Provide principles and guidelines for the design, analysis and implementation of cryptographic systems and protocols with a focus on standards. Study formalism techniques and methodologies for a rigorous establishment of strong and fit-for-application security notions for cryptographic systems and protocols. Include self-contained and elaborated material as theoretical foundations of modern cryptography for readers who desire a systematic understanding of the subject. Scope Modern cryptography is a vast area of study as a result of fast advances made in thepast thirty years. This book focuses on one aspect:in troducing fit-for-applicationcryptographic schemes and protocols with their strong security properties evidentlyestablished. The book is organized into the following six parts: Part I This part contains two chapters (1–2) and serves an elementary-level introductionfor the book and the areas of cryptography and information security.Chapter 1 begins with a demonstration on the effectiveness of cryptographyin solving a subtle communication problem. A simple cryptographic protocol(first protocol of the book) for achieving “fair coin tossing over telephone”will be presented and discussed. This chapter then carries on to conduct acultural and “trade” introduction to the areas of study. Chapter 2 uses aseries of simple authentication protocols to manifest an unfortunate fact inthe areas:pitfalls are everywhere.As an elementary-level introduction, this part is intended for newcomers tothe areas. Part II This part contains four chapters (3–6) as a set of mathematical backgroundknowledge, facts and basis to serve as a self-contained mathematicalreference guide for the book. Readers who only intend to “knowhow,” i.e.,know how to use the fit-for-application crypto schemes and protocols, mayskip this part yet still be able to follow most contents of the rest of the book.Readers who also want to “know-why,” i.e., know why these schemes andprotocols have strong security properties, may find that this self-containedmathematical part is a suffcient reference material. When we present workingprinciples of cryptographic schemes and protocols, reveal insecurity forsome of them and reason about security for the rest, it will always be possiblefor us to refer to a precise point in this part of the book for supportingmathematical foundations.This part can also be used to conduct a systematic background study of thetheoretical foundations for modern cryptography. Part III This part contains four chapters (7–10) introducing the most basic cryptographicalgorithms and techniques for providing privacy and data integrity protections. Chapter 7 is for symmetric encryption schemes, Chapter 8, asymmetrictechniques. Chapter 9 considers an important security quality possessedby the basic and popular asymmetric cryptographic functions whenthey are used in an ideal world in which data are random. Finally, Chapter10 covers data integrity techniques.Since the schemes and techniques introduced here are the most basic ones,many of them are in fact in the textbook crypto category and are consequentlyinsecure. While the schemes are introduced, abundant attacks onmany schemes will be demonstrated with warning remarks explicitly stated.For practitioners who do not plan to proceed with an in-depth study of fitfor-application crypto and their strong security notions, this textbook cryptopart will still provide these readers with explicit early warning signals on thegeneral insecurity of textbook crypto. Part IV This part contains three chapters (11–13) introducing an important notionin applied cryptography and information security:authen tication. Thesechapters provide a wide coverage of the topic. Chapter 11 includes technicalbackground, principles, a series of basic protocols and standards, common attackingtricks and prevention measures. Chapter 12 is a case study for fourwell-known authentication protocol systems for real world applications. Chapter13 introduces techniques which are particularly suitable for open systemswhich cover up-to-date and novel techniques.Practitioners, such as information security systems administration staff in anenterprise and software/hardware developers whose products have securityconsequences may find this part helpful. Part V This part contains four chapters (14–17) which provide formalism andrigorous treatments for strong (i.e., fit-for-application) security notions forpublic-key cryptographic techniques (encryption, signature and signcryption)and formal methodologies for the analysis of authentication protocols. Chapter14 introduces formal definitions of strong security notions. The next twochapters are fit-for-application counterparts to textbook crypto schemes introducedin Part III, with strong security properties formally established (i.e.,evidently reasoned). Finally, Chapter 17 introduces formal analysis methodologiesand techniques for the analysis of authentication protocols, which wehave not been able to deal with in Part IV. Part VI This is the final part of the book. It contains two technical chapters (18–19) and a short final remark (Chapter 20). The main technical content of thispart, Chapter 18, introduces a class of cryptographic protocols called zeroknowledgeprotocols. These protocols provide an important security service claimant. Zero-knowledge protocols to be introduced in this part exemplifythe diversity of special security …
Code:http://rapidshare.de/files/24525010/Prentice.Hall.PTR.Modern.Cryptography.Theory.and.Practice.rar
Comment
-
WIRELESS SECURITY : GSM, UMTS, 802.11, and Ad Hoc Security
BULLETPROOF WIRELESS SECURITY : GSM, UMTS, 802.11, and Ad Hoc Security
Finally–a single volume guide to really effective security for both voice and data wireless networks!
More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly “bulletproof” wireless security is now more than a desirable feature–instead, it’s a necessity to protect essential personal and business data from hackers and eavesdroppers.
In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications.
Book Review From EDN Magazine:
Inside this book youll find coverage of these essential topics:
+ Cryptographic protocols used in wireless networks.
+ Key-based protocols, including key exchange and authentication techniques
+ Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks.
+ Encryption/decryption standards and methods.
+ Multi-layered security architectures.
+ Secure sockets layer (SSL) and transport layer security (TLS) protocols.
+ Cellular telephone network architectures and their vulnerabilities.
+ Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM).
And youll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If youre serious about wireless security, then this title belongs on your reference bookshelf!
Code:http://rapidshare.de/files/24525347/BULLETPROOF.WIRELESS.SECURITY.GSM.UMTS.802.dot.11.and.Ad.Hoc.Security.rar
Comment
-
CCIE Professional Development: Cisco LAN Switching
CCIE Professional Development: Cisco LAN Switching
Book Description
The most complete guide to Cisco Catalyst(r) switch network design, operation, and configuration
Master key foundation topics such as high-speed LAN technologies, LAN segmentation, bridging, the Catalyst command-line environment, and VLANs
Improve the performance of your campus network by utilizing effective Cisco Catalyst design, configuration, and troubleshooting techniques
Benefit from the most comprehensive coverage of Spanning-Tree Protocol, including invaluable information on troubleshooting common Spanning Tree problems
Master trunking concepts and applications, including ISL, 802.1Q, LANE, and MPOA
Understand when and how to utilize Layer 3 switching techniques for maximum effect
Understand Layer 2 and Layer 3 switching configuration with the Catalyst 6000 family, including coverage of the powerful MSFC Native IOS Mode
Cisco LAN Switchingprovides the most comprehensive coverage of the best methods for designing, utilizing, and deploying LAN switching devices and technologies in a modern campus network. Divided into six parts, this book takes you beyond basic switching concepts by providing an array of proven design models, practical implementation solutions, and troubleshooting strategies. Part I discusses important foundation issues that provide a context for the rest of the book, including Fast and Gigabit Ethernet, routing versus switching, the types of Layer 2 switching, the Catalyst command-line environment, and VLANs. Part II presents the most detailed discussion of Spanning-Tree Protocol in print, including common problems, troubleshooting, and enhancements, such as PortFast, UplinkFast, BackboneFast, and PVST+. Part III examines the critical issue of trunk connections, the links used to carry multiple VLANs through campus networks. Entire chapters are dedicated to LANE and MPOA. Part IV addresses advanced features, such as Layer 3 switching, VTP, and CGMP and IGMP. Part V covers real-world campus design and implementation issues, allowing you to benefit from the collective advice of many LAN switching experts. Part VI discusses issues specific to the Catalyst 6000/6500 family of switches, including the powerful Native IOS Mode of Layer 3 switching.
Several features in Cisco LAN Switchingare designed to reinforce concepts covered in the book and to help you prepare for the CCIE exam. In addition to the practical discussion of advanced switching issues, this book also contains case studies that highlight real-world design, implementation, and management issues, as well as chapter-ending review questions and exercises.
This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams.
Book Info
Provides the most comprehensive coverage of the best methods for designing, utilizing, and deploying LAN switching devices and technologies in a modern campus network.
Code:http://rapidshare.de/files/24541152/Cisco.Press.CCIE.Professional.Development.Cisco.LAN.Switching.rar
Comment
-
IPSec VPN Design
IPSec VPN Design
Master IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group
Understand how IPSec VPNs are designed, built, and administered
Improve VPN performance through enabling of modern VPN services such as performance, scalability, QoS, packet processing, multicast, and security
Integrate IPSec VPNs with MPLS, Frame Relay, and ATM technologies
As the number of remote branches and work-from-home employees grows throughout corporate America, VPNs are becoming essential to both enterprise networks and service providers. IPSec is one of the more popular technologies for deploying IP-based VPNs. IPSec VPN Design provides a solid understanding of the design and architectural issues of IPSec VPNs. Some books cover IPSec protocols, but they do not address overall design issues. This book fills that void.
IPSec VPN Design consists of three main sections. The first section provides a comprehensive introduction to the IPSec protocol, including IPSec Peer Models. This section also includes an introduction to site-to-site, network-based, and remote access VPNs. The second section is dedicated to an analysis of IPSec VPN architecture and proper design methodologies. Peer relationships and fault tolerance models and architectures are examined in detail. Part three addresses enabling VPN services, such as performance, scalability, packet processing, QoS, multicast, and security. This book also covers the integration of IPSec VPNs with other Layer 3 (MPLS VPN) and Layer 2 (Frame Relay, ATM) technologies; and discusses management, provisioning, and troubleshooting techniques. Case studies highlight design, implementation, and management advice to be applied in both service provider and enterprise environments.
About the Authors
Vijay Bollapragada, CCIE No. 1606, is a manager of the VPN Solutions group at Cisco Systems. Vijay also teaches Cisco engineers and customers several courses, including Cisco Router Architecture, IP Multicast, Internet Quality of Service, and Internet Routing Architectures. He is also an adjunct professor in Duke University’s electrical engineering department.
Mohamed Khalid, CCIE No. 2435, is a technical leader working with IP VPN solutions at Cisco’s RTP facilities. Mohamed has a Masters Degree in Electrical Engineering.
Scott Wainner is a distinguished systems engineer in the US Service Provider, InterExchange Carrier group at Cisco Systems. Scott received a BS in Electrical Engineering from the USAF Academy and subsequently received his Masters in Electronic and Computer Engineering from George Mason University, and he is currently a member of the IEEE.
Code:http://rapidshare.de/files/24543026/cisco.press.ipsec.vpn.design.rar
Comment
-
The Best Damn Cisco Internetworking Book Period
The Best Damn Cisco Internetworking Book Period
Everything You Need to Know About Cisco Internetworking Technologies
· Step-by-Step Instructions for Integrating Wired and Wireless LAN Technologies, Including Coverage of the Cisco Aironet Line
of Devices
Detailed Coverage of Cisco WAN Technologies, Including Configuration and Deployment
Build a Working PIX Firewall Design, from Initial Planning to Robust Configuration
Table of Contents
Chapter 1: Cisco Technologies, Routers, and Switches
Chapter 2: Wide Area Networking (WAN)
Chapter 3: Wireless Networking
Chapter 4: Addressing, Multicasting, and Version 6
Chapter 5: IP Routing
Chapter 6: Quality of Service (QoS)
Chapter 7: Cisco Network Security
Chapter 8: Cisco PIX Firewall
Chapter 9: Cisco Voice over IP
About the Author
Charles Riley (CCNP, CSS-1, CISSP, CCSA, MCSE, CNE-3) has co-authored several books including Routing and Configuring
Cisco Voice over IP, Second Edition. Exhausting the educational offerings of Remington, Charles matriculated at the Model
Secondary School for the Deaf in Washington, D.C. before attending Gallaudet University (www.gallaudet.edu). Quick to a decision
and even quicker to change his mind, he moved to Florida where he graduated from the University of Central Florida in 1989. Upon
graduation, Charles was contacted by and offered a position with the U.S. Army, a relationship that lasted over 10 years. As a
consultant for Sprint, he designed and implemented robust networking solutions for large Fortune 500 and privately held companies.
Code:http://rapidshare.de/files/24543887/The_Best_Damn_Cisco_Internetworking_Book_Period.rar
Comment
-
Bác Tâm có thể cho mình xin mấy cuốn sách mà bác post lên Rapid.... được không ? nếu được bác có thể up giúp mình lên FTP của mình nhé ? mình sẽ send ftp account cho bác . thanhk nhiều nhé.
Ừ anh em cho mình hỏi Rapid nếu có accounts có thể lấy được mấy cái đã die links trên đó không ?
Hướng dẫn cài đặt cấu hình Data Loss Prevention - MyQLP Appliance (Open Source)
Hướng dẫn cài đặt và cấu hình Mdeamon 12.x
Hướng dẫn cài đặt cấu hình ISA 2006 và Exchange 2003 - Mô hình Front-End Back-End
Cài đặt và cấu hình Cacti - Giám Sát và Quản Lý Hệ Thống Mạng
Hướng dẫn cài đặt cấu hình Retrospect Backup Server
Cài đặt và cấu hình phần mềm FSA Audit Files Server
CAMAPTRANG
http://www.asterisk.vn
Comment
Comment