Home | Amazing | Today | Tags | Publishers | Years | Search 
Critical Testing Processes: Plan, Prepare, Perform, Perfect
Critical Testing Processes: Plan, Prepare, Perform, Perfect

"Rex Black has done it again!...Critical Testing Processes is a book that all software testers will want to read from cover to cover and then retain for frequent reference."

—From the Foreword by Rick Craig, software test manager, author, lecturer, and consultant

In today's...

Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

CCNA for Dummies
CCNA for Dummies
What was that whizzing sound? It was you, passing the CCNA certification exam. After you've covered all of Cisco Systems' exam objectives in CCNA For Dummies, such tasks as following network protocols, routing, and maintaining network security will be new tools to add to your skill set.

First, expect to become familiar with the language of...

Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Advanced IP Network Design (CCIE Professional Development)
Advanced IP Network Design (CCIE Professional Development)
CCIE Professional Development: Advanced IP Network Design provides the solutions network engineers and managers need to grow and stabilize large IP networks. Technology advancements and corporate growth inevitably lead to the necessity for network expansion. This book presents design concepts and techniques that enable networks to evolve into...
IP Routing Fundamentals
IP Routing Fundamentals

A comprehensive ntroduction to routing concepts and protocols in IP networks.

  • Comprehensive review of the operational mechanics of today's leading routing protocols, including IGRP, EIGRP, OSPF, RIP, and RIP-2
  • Detailed explanation of IP addressing, including classful and classless addresses, subnetting,...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Solaris 9 Security (Networking)
Solaris 9 Security (Networking)
Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol...
Tricks of the Microsoft(R) Windows Vista(TM) Masters
Tricks of the Microsoft(R) Windows Vista(TM) Masters
All over the world, Windows gurus have been working overtime to uncover the hottest new Windows Vista tips, tricks, and tweaks. Now, J. Peter Bruzzese has collected all their best discoveries in one place: Tricks of the Microsoft® Windows VistaTM Masters!  Bruzzese has interviewed top Windows professionals,...
E-learning Strategies: How to Get Implementation and Delivery Right First Time
E-learning Strategies: How to Get Implementation and Delivery Right First Time

As more than 900f spending on the Internet comes from brick and mortar companies it is these operations that will form the client base for e-learning. This book shows those companies how to get e-learning implementation right first time. Don Morisson explores and explains the whole implementation continuum - strategy, vendor selection,...

Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine

"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine

"For almost any computer book, you can find a...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy