Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Virtualization Solutions: Virtualization from the Trenches
Practical Virtualization Solutions: Virtualization from the Trenches
A few years ago, the idea of running multiple operating systems concurrently on the same computer captured the imagination of the computing industry. Virtualization became the hot buzzword and projects were launched to fulfill the dream.

With virtualization, you don’t need an extra computer every time you want to bring up a new
...
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Essential Windows(r) CE Application Programming
Essential Windows(r) CE Application Programming

The indispensable guide to writing clean CE applications, including real-world tips, techniques, and workarounds.

Microsoft's Windows CE operating system is quickly finding its way into a wide variety of information appliances like Handheld and Palm-size PCs, television set top boxes, smart telephones, and electronic...

When Pancakes Go Bad: Optical Delusions with Adobe Photoshop
When Pancakes Go Bad: Optical Delusions with Adobe Photoshop
If you've ever found yourself looking at funny images and thinking "Hey, how?d they do that?", this is the book that will give you the answer! Learn how to have fun with photos?swapping pictures of historical inventions with modern-day appliances or combining images of animals to produce unrealistic characters. "When Pancakes Go...
Technology Trends in Wireless Communications
Technology Trends in Wireless Communications
The impressive evolution of mobile networks and the potential of wireless multimedia
communications pose many questions to operators, manufacturers, and
scientists working in the field. The future scenario is open to several alternatives:
thoughts, proposals, and activities of the near future could provide the answer to
the open
...
Arduino Applied: Comprehensive Projects for Everyday Electronics
Arduino Applied: Comprehensive Projects for Everyday Electronics
Extend the range of your Arduino skills, incorporate the new developments in both hardware and software, and understand how the electronic applications function in everyday life. This project-based book extends the Arduino Uno starter kits and increases knowledge of microcontrollers in...
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
"I would purchase the books... since I am Ipv6 connected it would be a nice reference."..."I do think that if you buy one you will buy the other, assuming that the chapters are setup correctly." -Randall Stewart, Cisco Systems

"My immediate reaction was that I thought it would be better in one volume, BUT then I
...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the
...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Mastering Autodesk Inventor 2009 and Autodesk Inventor LT 2009
Mastering Autodesk Inventor 2009 and Autodesk Inventor LT 2009
Create Full-Featured Digital Prototypes—the Inventor Way

Whether you're designing airplanes, appliances, or industrial machinery, this complete guide to Autodesk Inventor 2009 shows you how to produce and manage build-worthy 3D virtual prototypes. A team of industry professionals and Autodesk developers combines years...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy