Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
CCDA Exam Certification Guide ((CP) CERTIFICATION)
CCDA Exam Certification Guide ((CP) CERTIFICATION)
The official study guide for DCN exam #640-441Coverage of the CCDA exam design objectives enables you to discover your knowledge gaps before the exam date. You'll learn to:Characterize a customer's existing network and identify customer needsSimplify the complexities associated with analyzing customer network problems and creating Cisco scalable...
CCNA Cisco Certified Network Associate Study Guide (Exam 640-802) (Certification Press)
CCNA Cisco Certified Network Associate Study Guide (Exam 640-802) (Certification Press)
The Best Fully Integrated Study System Available

With hundreds of practice questions and hands-on exercises, CCNA Cisco Certified Network Associate Study Guide covers what you need to know-and shows you how to prepare-for this challenging exam.

  • 100% complete coverage of all official...
Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
David Busch's Sony Alpha DSLR-A850 Guide to Digital Photography
David Busch's Sony Alpha DSLR-A850 Guide to Digital Photography

With the Alpha DSLR-A850, Sony has combined 24 megapixels of full-frame resolution with the compact body and ease of use that the Alpha models are known for. David Busch's Sony Alpha DSLR-A850 Guide to Digital Photography shows discerning photographers like you how to take outstanding pictures with this sophisticated and cutting-edge...

Digital Signal Processing and Applications with the TMS320C6713 and TMS320C6416 DSK (Topics in Digital Signal Processing)
Digital Signal Processing and Applications with the TMS320C6713 and TMS320C6416 DSK (Topics in Digital Signal Processing)
With the first edition widely accepted as the most extensive teaching text available, this valuable Second Edition has been fully updated to be compatible with the latest version (3.1) of Texas Instruments Code Composer Studio (CCS) development environment. Maintaining the original's comprehensive, hands-on approach that has made it an instructor's...
SPSS for Starters
SPSS for Starters

This small book addresses different kinds of datafiles, as commonly encountered in clinical research, and their data-analysis on SPSS Software. Some 15 years ago serious statistical analyses were conducted by specialist statisticians using ma- frame computers. Nowadays, there is ready access to statistical computing using personal computers...

Clinical Epidemiology: Practice and Methods (Methods in Molecular Biology)
Clinical Epidemiology: Practice and Methods (Methods in Molecular Biology)

Focusing on improving the diagnosis, prognosis, and management of human disease, this book takes on the issues of research design, measurement, and evaluation which are critical to clinical epidemiology. This second edition of Clinical Epidemiology: Practice and Methods opens with how best to frame a clinical research question, the...

Solving the PowerPoint Predicament: Using Digital Media for Effective Communication
Solving the PowerPoint Predicament: Using Digital Media for Effective Communication

Everyone uses PowerPoint, but how effective is your presentation at meeting the goals you've outlined? A great presentation is more than just a slideshowit's about using PowerPoint to its maximum potential to get your message across to your audience. That's the PowerPoint Predicament. Tom Bunzel reveals how to conceive, plan,...

Marine Biofouling: Colonization Processes and Defenses
Marine Biofouling: Colonization Processes and Defenses

Recent instances of bioinvasion, such as the emergence of the zebra mussel in the American Great Lakes, generated a demand among marine biologists and ecologists for groundbreaking new references that detail how organisms colonize hard substrates, and how to prevent damaging biomass concentrations.

Marine Biofouling:
...

Choosing a Wheelchair: A Guide for Optimal Independence (Patient Centered Guides)
Choosing a Wheelchair: A Guide for Optimal Independence (Patient Centered Guides)

The wheelchair is a liberator, not a prison. With the right wheelchair, quality of life increases dramatically. Even people with severe disabilities can have a considerable degree of independence and activity. However, choosing the wrong chair can indeed be tantamount to "confinement."People selecting a chair for the first...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy