![](https://www.pdfchm.net/pic/empty.gif) |
|
![](https://pic.pdfchm.net/empty.gif) DHCP Handbook, The (2nd Edition)The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) 802.1X Port-Based AuthenticationWritten to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Network Management FundamentalsNetwork management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just... |
|
|
![](https://pic.pdfchm.net/empty.gif) The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) PBX Systems for IP TelephonyThe most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) The Best Damn Firewall Book Period, Second EditionThe Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this... |
|
![](https://pic.pdfchm.net/empty.gif) Deploying Voice over Wireless LANs (Networking Technology)
The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions
Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) IP Design for Mobile NetworksAs the cellular world and the Internet converge, mobile networks are transitioning from circuit to packet and the Internet Protocol (IP) is now recognized as the fundamental building block for all next-generation communication networks. The all-IP vision provides the flexibility to deliver cost-effective services and... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... |
|
Result Page: 49 48 47 46 45 44 43 42 41 40 |