Home | Amazing | Today | Tags | Publishers | Years | Search 
SIP: Understanding the Session Initiation Protocol, Second Edition
SIP: Understanding the Session Initiation Protocol, Second Edition
The Session Initiation Protocol (SIP) is a new signaling, presence and instant
messaging protocol developed to set up, modify, and tear down multimedia sessions,
request and deliver presence and instant messages over the Internet [1].
This chapter covers some background for the understanding of the protocol. SIP
was developed by
...
Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
How to Cheat at Windows System Administration Using Command Line Scripts
How to Cheat at Windows System Administration Using Command Line Scripts
If you want to streamline the administration of your Windows servers and workstations by using command line scripts, this is the book for you! With every new version of Windows, Microsoft attempts to ease administrative tasks by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Essential System Administration Pocket Reference
Essential System Administration Pocket Reference
This pocket reference brings together all the important Unix and Linux system administration information in a single compact volume. Not only are all of the important administrative commands covered, but this reference also includes the locations and formats of important configuration files (including both general system databases like the password...
Troubleshooting Windows 2000 TCP/IP
Troubleshooting Windows 2000 TCP/IP
W2Knews Electronic Newsletter, March 13, 2000
...guides for planning, testing and deploying a W2K TCP/IP network. A great troubleshooting help when you have connectivity problems.

TCP/IP is a set of protocols developed to allow computers to share resources across a network.
...
Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and...
Active Directory Bible
Active Directory Bible
Master the power of Active Directory Whether you're a networking newcomer or a veteran administrator, working with Windows® 2000 Server requires a thorough knowledge of Active Directory. This complete guide delivers all the information you need. Logically organized and packed with real-world examples, it shows you...
Fedora Linux
Fedora Linux

"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer

This book will get you up to speed quickly on Fedora...

DHCP for Windows 2000
DHCP for Windows 2000
Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. Before the advent of DHCP, administrators configured each host on a network with an IP address, subnet mask, and default gateway. Maintaining the changes and the logs of the changes took a tremendous amount of time and was...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy