Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

The Mobile Revolution: The Making of Worldwide Mobile Markets
The Mobile Revolution: The Making of Worldwide Mobile Markets
‘We’re moving away from the business of ears to the business of eyes.’

Move over Bill Gates, stand aside Steve Jobs, said the industry pundits after
CeBIT 1998, the famous trade conference. They’d just seen Nokia’s
Communicator 9110, a mobile phone with dazzling capabilities, but what
really
...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Content Computing: Advanced Workshop on Content Computing, AWCC 2004
Content Computing: Advanced Workshop on Content Computing, AWCC 2004

This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.

The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile...

Inside Delphi 2006 (Wordware Delphi Developer's Library)
Inside Delphi 2006 (Wordware Delphi Developer's Library)

Now in its 10th version, Delphi provides users with four programming languages: C++ and Delphi for Win32 for building Windows applications, and C# and Delphi for .NET for building applications that target the .NET platform. Inside Delphi 2006 demonstrates how to use all of these languages. Topics include the foundations of Delphi, VCL...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
System-on-a-Chip: Design and Test
System-on-a-Chip: Design and Test
This project started as an interim report. The purpose was to communicate
to various groups within Advantest about the main issues for system-on-achip
(SoC) design and testing and the common industrial practices. Over
one year’s time, a number of people contributed in various capacities to complete
this report.
...
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling are two distinct domains of research, with few interactions up to now, though closely linked. On the one hand, Algebraic Geometry has developed an impressive theory targeting the understanding of geometric objects defined algebraically. On the other hand, Geometric Modeling is using every day, in practical...
Rule-Based Evolutionary Online Learning Systems: A Principled Approach to LCS Analysis and Design
Rule-Based Evolutionary Online Learning Systems: A Principled Approach to LCS Analysis and Design
This book offers a comprehensive introduction to learning classifier systems (LCS) – or more generally, rule-based evolutionary online learning systems. LCSs learn interactively – much like a neural network – but with an increased adaptivity and flexibility. This book provides the necessary background knowledge on problem types,...
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
unlimited object storage image
Result Page: 758 757 756 755 754 753 752 751 750 749 748 747 746 745 744 743 742 741 740 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy