Home | Amazing | Today | Tags | Publishers | Years | Search 
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
"I would purchase the books... since I am Ipv6 connected it would be a nice reference."..."I do think that if you buy one you will buy the other, assuming that the chapters are setup correctly." -Randall Stewart, Cisco Systems

"My immediate reaction was that I thought it would be better in one volume, BUT then I
...
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Linux For Dummies 8th Edition
Linux For Dummies 8th Edition

Everything you need to install, run, and optimize Linux on your desktop

Here's how to start using Linux, the popular and free operating system

Want to do the same tasks you can with Windows, except for free? Linux is the alternative open source operating system that's beloved by users...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
End-to-End Network Security: Defense-in-Depth
End-to-End Network Security: Defense-in-Depth
The network security lifecycle requires specialized support and a commitment to best practice standards. In this book, you will learn best practices that draw upon disciplined processes, frameworks, expert advice, and proven technologies that will help you protect your infrastructure and organization. You will learn end-to-end security best...
Secure Roaming in 802.11 Networks (Communications Engineering)
Secure Roaming in 802.11 Networks (Communications Engineering)
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide...
Computer Networks: A Systems Approach, 3rd Edition (The Morgan Kaufmann Series in Networking)
Computer Networks: A Systems Approach, 3rd Edition (The Morgan Kaufmann Series in Networking)
In this new edition of their classic and bestselling textbook, authors Larry Peterson and Bruce Davie continue to emphasize why networks work the way they do. Their "system approach" treats the network as a system composed of interrelated building blocks (as opposed to strict layers), giving students and professionals the best possible...
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
FreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.

Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas...

Computing for Numerical Methods Using Visual C++
Computing for Numerical Methods Using Visual C++
A visual, interdisciplinary approach to solving problems in numerical methods

Computing for Numerical Methods Using Visual C++ fills the need for a complete, authoritative book on the visual solutions to problems in numerical methods using C++. In an age of boundless research, there is a need for a programming language that can successfully...

Windows Home Server: Protect and Simplify your Digital Life
Windows Home Server: Protect and Simplify your Digital Life
Secure and share your digital f iles at home.

Access them from virtually anywhere.

Photos. Tax records. Personal correspondence. Music and movies. Your home network contains much of what's vital to your life in today's digital world. You need to secure and back up those files. You need to be...

Application Acceleration and WAN Optimization Fundamentals
Application Acceleration and WAN Optimization Fundamentals
IT organizations face a number of increasing pressures to increase productivity, improve application performance, provide infrastructure conducive to global collaboration, improve posture toward data protection and compliance, and minimize costs across the board. These pressures come largely as a result of initiatives to increase availability and...
Six Sigma for Everyone
Six Sigma for Everyone

A user-friendly guide to the basics of Six Sigma

From noted Six Sigma consultant and author George Eckes comes Six Sigma for Everyone, a practical guide that explains the underpinnings of the revolutionary quality assurance methodology. Appropriate for employees and top management alike, this book is the only one you need if
...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy