Home | Amazing | Today | Tags | Publishers | Years | Search 
IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Data Center Fundamentals
Data Center Fundamentals

Master the basics of data centers to build server farms that enhance your Web site performance

  • Learn design guidelines that show how to deploy server farms in highly available and scalable environments
  • Plan site performance capacity with discussions of server farm architectures and their real-life...
Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera networks is a highly interdisciplinary area of research that has been very active over the last few years. In this book, we focus specifically on the topic of video understanding in camera networks and touch upon the other related areas (e.g., communication resources, machine learning, cooperative control of multi-agent...
CompTIA Network+ N10-005 Authorized Cert Guide
CompTIA Network+ N10-005 Authorized Cert Guide

Learn, prepare, and practice for exam success

  • Master Network+ exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions on the DVD

...

The Economics of Cloud Computing: An Overview For Decision Makers (Network Business)
The Economics of Cloud Computing: An Overview For Decision Makers (Network Business)

In my conversations with customers, partners, and peers, one topic seems to bubble to the surface more than any other: How do I financially justify the move to the cloud?

Initially, the notion of a business case for cloud computing seemed almost redundant. It seemed to me that the cost savings associated with...

CCNP Wireless (642-747 IUWMS) Quick Reference (2nd Edition)
CCNP Wireless (642-747 IUWMS) Quick Reference (2nd Edition)
Context-aware services provision refers to the ability to locate an 802.11 device and provide services based on this location information. Services can be offered to the located device itself or to another application based on the device location. Typical examples of services offered to the located devices include a map of a shopping...
CCNP Security FIREWALL 642-618 Quick Reference
CCNP Security FIREWALL 642-618 Quick Reference

As a final exam preparation tool, CCNP Security Firewall 642-618 Quick Reference...

CCIE Wireless Exam (350-050) Quick Reference
CCIE Wireless Exam (350-050) Quick Reference

With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:

  • Home ISP connectivity: Consumer products
  • Building-to-building...
Managing and Optimizing VMware vSphere Deployments
Managing and Optimizing VMware vSphere Deployments

In our experience as consultants, VMware vSphere is the most robust virtualization

solution on the market. The technology is proven and the user base is large.

Although the benefits of virtualization using vSphere are many, proper planning is required to gain these benefits from a vSphere
...
Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy