Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nokia Network Security Solutions Handbook
Nokia Network Security Solutions Handbook
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are discussed in detail, as well as...
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Configuring Citrix Metaframe for Windows 2000 Terminal Services
Configuring Citrix Metaframe for Windows 2000 Terminal Services
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
Troubleshooting Windows 2000 TCP/IP
Troubleshooting Windows 2000 TCP/IP
W2Knews Electronic Newsletter, March 13, 2000
...guides for planning, testing and deploying a W2K TCP/IP network. A great troubleshooting help when you have connectivity problems.

TCP/IP is a set of protocols developed to allow computers to share resources across a network.
...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Winternals: Defragmentation, Recovery, and Administration Field Guide
Winternals: Defragmentation, Recovery, and Administration Field Guide

Winternals first came to my rescue in November of 1999. It was then that I purchased my Winternals Administrator's Pak. It contained BlueSave Version 1.01, ERD Commander Professional Version 1.06, Monitoring Tools (Filemon and Regmon) Enterprise Editions Version 1.0, NTFSDOS Professional Version 3.03, NTRecover Version 1.0, and Remote Recover...

Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
AVVID (Architecture for Voice, Video, and Integrated Data) is a network architecture made up of hardware and software that transmits a company’s data such as e-mail, web traffic, file transfers, voice traffic, and video traffic over the same physical computer network. Imagine taking the three networks your...
How to Cheat at Configuring ISA Server 2004
How to Cheat at Configuring ISA Server 2004
If deploying and managing ISA Server 2004 is just one of a hundred responsibilities you have as a System Administrator, How to Cheat at Configuring ISA Server 2004 is the perfect book for you. This is a concise, accurate, enterprise tested method for the successful deployment of ISA Server. Written by ISA Server guru and Microsoft Most...
Building a Cisco Wireless LAN
Building a Cisco Wireless LAN
Wireless LAN (Wi-Fi) technology is significantly more complex than cordless telephony; loss, coverage, and bandwidth requirements are much more stringent and the proliferation of wireless LANs in corporate environments has resulted in interesting security challenges. IEEE 802.11-based products offered by Cisco Systems have quickly become one of the...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy