Home | Amazing | Today | Tags | Publishers | Years | Search 
A+ Certification Exam Cram 2 (Exam Cram 220-301, Exam Cram 220-302), Second Edition
A+ Certification Exam Cram 2 (Exam Cram 220-301, Exam Cram 220-302), Second Edition

A+ Exam Cram 2 is a study skill enhancement and tutorial, designed to focus on exactly what students need to get A+ certified, with coverage of exams 220-221 and 220-222. It details all the new exam objectives and items in the following areas: Windows 98, Windows 2000, and Windows NT version 4.0. Because the A+ certification is a core competency...

Computer Networking First-Step
Computer Networking First-Step

Your first step into the world of computer networking

  • No experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

...
Snort for Dummies
Snort for Dummies
Find out how to foil an attack on your network

Choose the right way to deploy and configure Snort — no experience required!

Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you...

Build Your Own Smart Home
Build Your Own Smart Home

From piping audio and video through the home to automatically watering the lawn, if you've got the inclination, there isn't anything that cannot be automated in your home. This complete, one-stop resource shows you how to plan and install Smart Home systems using clear, step-by-step instructions and illustrations. Discover projects for...

Networking Foundations: Technology Fundamentals for IT Success
Networking Foundations: Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Building And Integrating Virtual Private Networks With Openswan
Building And Integrating Virtual Private Networks With Openswan
With the widespread use of wireless networking and the integration of VPN capabilities in most
modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more
and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless
network? Is your neighbor snooping on your WiFi
...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Webwork in Action
Webwork in Action
This book is very much what the title says: a book about working on web-based applications, using real-world examples along the way. That’s what WebWork emphasizes: working on your project, not wrestling with your framework. Although it isn’t the most-used web framework in the Java world, WebWork is widely known as the most refined, and...
Network Virtualization
Network Virtualization

Share network resources and reduce costs while providing secure network services to diverse user communities

  • Presents the business drivers for network virtualization and the major challenges facing network designers today

  • Shows how to use...

Asp Configuration Handbook
Asp Configuration Handbook
The Complete Guide to Migrating an ISP to an ASP ISPs are now faced with a narrowing margin brought on by fierce competition, with little available differentiation in their offerings. In order to reverse this decline in profitability, ISPs have begun to expand services beyond bandwidth and connectivity, by adding remote hosting services such as...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Managing and Securing a Cisco SWAN
Managing and Securing a Cisco SWAN
Wireless networking is all about freedom. Freedom is a worthy goal in its own right, and freedom in an organizational context pays dividends.

It’s tremendously cool to be able to sit down in an office or conference room, open your portable computer, and have instant connectivity to the resources you need to do your job.With
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy