Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Data Engineering: Fuzzy Mathematics in Systems Theory and Data Analysis
Data Engineering: Fuzzy Mathematics in Systems Theory and Data Analysis

Although data engineering is a multi-disciplinary field with applications in control, decision theory, and the emerging hot area of bioinformatics, there are no books on the market that make the subject accessible to non-experts. This book fills the gap in the field, offering a clear, user-friendly introduction to the main theoretical and...

Internet Core Protocols: The Definitive Guide
Internet Core Protocols: The Definitive Guide
For network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.

This book assumes you have a working...

Alfresco 3 Enterprise Content Management Implementation
Alfresco 3 Enterprise Content Management Implementation

How to customize, use, and administer this powerful, Open Source Java-based Enterprise CMS

  • Manage your business documents with version control, library services, content organization, and advanced search.
  • Create collaborative web sites using document libraries, wikis, blogs, forums, calendars, discussions,...
sed & awk (2nd Edition)
sed & awk (2nd Edition)
The book begins with an overview and a tutorial that demonstrate a progression in functionality from grep to sed to awk. sed and awk share a similar command-line syntax, accepting user instructions in the form of a script. Because all three programs use UNIX regular expressions, an entire chapter is devoted to understanding UNIX regular expression...
Fuzzy Expert Systems and Fuzzy Reasoning
Fuzzy Expert Systems and Fuzzy Reasoning
The most advanced systems that can emulate human thought

Fuzzy Expert Systems and Fuzzy Reasoning presents new, cutting-edge theories that enable programmers to emulate human thought processes to solve real-life problems. This text begins with an overview and comparison of current approaches, including rule-based and neural net systems that...

Analysis of Biological Networks (Wiley Series in Bioinformatics)
Analysis of Biological Networks (Wiley Series in Bioinformatics)
An introduction to biological networks and methods for their analysis

Analysis of Biological Networks is the first book of its kind to provide readers with a comprehensive introduction to the structural analysis of biological networks at the interface of biology and computer science. The book begins with a brief overview of biological networks...

DNS and BIND
DNS and BIND
You may not know much about the Domain Name System − yet − but whenever you use the Internet, you
use DNS. Every time you send electronic mail or surf the World Wide Web, you rely on the Domain Name
System.

You see, while you, as a human being, prefer to remember the names of computers, computers like to address...
Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)

The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers...

Linux Socket Programming by Example
Linux Socket Programming by Example
Linux Socket Programming by Example begins with a very basic introduction to the fundamentals of socket level programming. As the chapters progress, you are introduced to related concepts, such as forming network addresses, Ipv6, the TCP/IP protocol suite and options, writing servers, and creating secure applications. You will also learn about...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy