Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Broadband Networks
Building Broadband Networks

Optical networks, undersea networks, GSM, UMTS…The recent explosion in broadband communications technologies has opened a new world of fast, flexible services and applications. To successfully implement these services, however, requires a solid understanding of the concepts and capabilities of broadband technologies and networks.
...

Designing Storage Area Networks: A Practical Reference for Implementing Fibre Channel and IP SANs, Second Edition
Designing Storage Area Networks: A Practical Reference for Implementing Fibre Channel and IP SANs, Second Edition
Storage Area Networks (SANs) are now recognized as the preferred solution for fulfilling institutions' and enterprises' critical data-storage needs. Whether powered by Fibre Channel or TCP/IP and Gigabit Ethernet technology, SANs far exceed the capabilities of traditional storage access methods. SANs are quickly becoming the solution of choice...
IP Storage Networking: Straight to the Core
IP Storage Networking: Straight to the Core

"For those considering network storage consolidation, Straight to the Core walks the reader through both the how and why of IP and Ethernet's flexibility." Larry Boucher, CEO Alacritech

"A forward-looking work with excellent technical content. Orenstein knows his stuff. ...enough technical meat to satisfy the engineers and...

Switching to the Mac: The Missing Manual, Lion Edition
Switching to the Mac: The Missing Manual, Lion Edition
What’s going on with the Mac these days?

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has quadrupled since 2005—it’s now around 20 percent of computer sales in the U.S. And then there’s the most
...
Computer Networks: A Systems Approach, Fourth Edition (The Morgan Kaufmann Series in Networking)
Computer Networks: A Systems Approach, Fourth Edition (The Morgan Kaufmann Series in Networking)

Iwhat has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergence of voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Getting Started with the Internet of Things: Connecting Sensors and Microcontrollers to the Cloud
Getting Started with the Internet of Things: Connecting Sensors and Microcontrollers to the Cloud

What is the Internet of Things? It's billions of embedded computers, sensors, and actuators all connected online. If you have basic programming skills, you can use these powerful little devices to create a variety of useful systems—such as a device that waters plants when the soil becomes dry. This hands-on guide...

Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
MPLS and VPN Architectures, Vol. 2
MPLS and VPN Architectures, Vol. 2
MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.

MPLS and VPN...

Embedded Systems Firmware Demystified (With CD-ROM)
Embedded Systems Firmware Demystified (With CD-ROM)

Build embedded microprocessor-based systems from the ground up. Develop an integrated understanding of hardware and software issues by exploring the interaction of the firmware and hardware during the first critical few seconds after the microprocessor is powered up. By focusing on these crucial junctures, where software meets hardware, you...

Computer Networks ISE: A Systems Approach
Computer Networks ISE: A Systems Approach

I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...

Ethernet: The Definitive Guide
Ethernet: The Definitive Guide
The "Ethernet"--as distinct from the Internet, intranet, sneakernet, and others in the net family--is both a familiar face and a familiar name. However, it evokes the mental experience of the school crossing guard whose ownership of a corner of your mindscape is so context-sensitive that a change in venue renders the name or face...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy