Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

Nonparametric System Identification
Nonparametric System Identification
Presenting a thorough overview of the theoretical foundations of non-parametric system identification for nonlinear block-oriented systems, this books shows that non-parametric regression can be successfully applied to system identification, and it highlights the achievements in doing so. With emphasis on Hammerstein, Wiener systems, and their...
Geometric Methods for Quantum Field Theory
Geometric Methods for Quantum Field Theory
Both mathematics and mathematical physics have many active areas of research where the interplay between geometry and quantum field theory has proved extremely fruitful. Duality, gauge field theory, geometric quantization, Seiberg-Witten theory, spectral properties and families of Dirac operators, and the geometry of loop groups offer some striking...
Fashion Marketing
Fashion Marketing
‘Clothing that is not purchased or worn is not fashion’ (to paraphrase Armani)

Knowledge of marketing is essential to help ensure success and reduce the risk of failure in fashion. For the designer starting up in business, this book offers a guide to the major decisions that will enable you to fulfil...

Design Essentials for the Motion Media Artist: A Practical Guide to Principles & Techniques
Design Essentials for the Motion Media Artist: A Practical Guide to Principles & Techniques

Master the fundamental concepts and techniques of motion media design so you can apply--and occasionally break--the rules to achieve your communication goals. This authoritative guide presents all of the design essentials in an engaging and inspiring way. Each principle is explained with text, illustration and photography where necessary. An...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Network-aware Source Coding and Communication
Network-aware Source Coding and Communication

An introduction to the theory and techniques for achieving high quality network communication with the best possible bandwidth economy, this book focuses on network information flow with fidelity. Covering both lossless and lossy source reconstruction, it is illustrated throughout with real-world applications, including sensor networks and...

Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
In this practical reference, popular author Lewin Edwards shows how to develop robust, dependable real-time systems for robotics and other control applications, using open-source tools. It demonstrates efficient and low-cost embedded hardware and software design techniques, based on Linux as the development platform and operating system and the...
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
THE DEFINITIVE GUIDE TO EPON
Written by one of the authors of the IEEE802.3ah standard, this is the first book to fully explain the EPON architecture, analyze its performance, and annotate the standard.

Clearly addressing efficiency, performance, and implementation issues, Ethernet Passive Optical Networks...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

unlimited object storage image
Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy