Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Encyclopedia of Networking, Second Edition
Microsoft Encyclopedia of Networking, Second Edition
Whether you're a system administrator, MCSA/MCSE certification candidate, or a CIO-here's definitive reference on the latest networking technologies and terminology. The superbly illustrated MICROSOFT ENCYCLOPEDIA OF NETWORKING, Second Edition, features thousands of entries-including many new entries and critical updates and revisions to the...
Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
Ipv6 Essentials
Ipv6 Essentials

IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6...

MySQL/PHP Database Applications, 2nd Edition
MySQL/PHP Database Applications, 2nd Edition
Learn what it takes to get data-driven Web sites up and running using PHP 5 and MySQL

The popularity of using MySQL and PHP to create organized and efficient Web sites is growing at a steady pace. MySQL has proven itself to be fast, robust, and easy to use. It works well with PHP, and it’s perfect for Web applications for simple to robust...

Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks
Today's aggressively competitive networking market requires offering the maximum range of services using prevailing assets, not building bigger, more complicated networks, but smarter, more scalable infrastructures. It isn't an easy thing to do.

The challenge is to develop an existing network so as to maximise its...

Special Edition Using Linux
Special Edition Using Linux
Linux is a significant force in the server room and the desktop, delivering reliability, ease of installation and administration, high performance, security, and robust applications. Special Edition Using Linux 6E is written to the just-released 2.4.x kernel and includes the following topics: installation and configuration of Red Hat Linux, Caldera...
The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
"Not only is this book thorough in covering the networking technologies and the applications of todays communications networks, it also guides you to comprehensive understanding of problems and solutions. This should be mandatory reading for every professional in our business."
--Loa Andersson, TLA-group, IETF MPLS working group
...
Active Directory Cookbook
Active Directory Cookbook

If you're among those looking for practical hands-on support, help is here with Active Directory Cookbook, Second Edition, a unique problem-solving guide that offers quick answers for Active Directory and updated for Window Server 2003 SP1 and R2 versions.

The book...

Running IPv6
Running IPv6
This is a book about running the IPv6 protocol in heterogeneous environments. It will tell
you how to enable the protocol on Windows, MacOS, FreeBSD, Linux, and Cisco routers, and,
up to a point, on Juniper routers. The intent behind the book is to present a clear view of the
aspects to IPv6 that are of interest to those who’ll
...
The Incredible Payback: Innovative Sourcing Solutions That Deliver Extraordinary Results
The Incredible Payback: Innovative Sourcing Solutions That Deliver Extraordinary Results
The thrill is gone.

You are in the first seat of the intergalactic thrill ride of your
life—you got on expecting a few twists and turns; the attendant
locked you in the seat; and now your neck hurts, your hands grip
the rail, pieces of clothing and popcorn boxes are flying by, and
you’ve had enough, you
...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy