|
|
|
|
Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... | | IS-IS: Deployment in IP NetworksIS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol... | | A Practical Guide for SystemVerilog Assertions
When Gateway Design Automation, Inc. created Verilog in the mid-
1980's, the process of integrated circuit design was very different than it is
today. The role of Verilog, as well as its capability, has evolved since its
inception into today's SystemVerilog.
SystemVerilog language consists of three categories of... |
|
Cisco IP Routing Protocols: Troubleshooting TechniquesCisco IP Routing Protocols: Troubleshooting Techniques is a comprehensive reference guide for network professionals facing problems with implementing and configuring IP routing protocols. It begins with an explanation of troubleshooting methodologies and tools, including Cisco and TCP/IP diagnostic commands and basic protocol... | | Network Mergers and Migrations: Junos Design and Implementation
This book provides a complete reference to network mergers and migrations using the Junos operating system
Network Mergers and Migrations provides readers with a comprehensive guide for network migration activities by detailing a variety of internetworking case studies. Both enterprise and service provider scenarios... | | Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series... |
|
Hack Proofing XMLXML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document... | | | | Classic Home Video Games, 1985-1988: A Complete Reference Guide
More than any other companies in the history of electronic gaming, Nintendo, Sega, and later Sony established video games as a lifestyle, a hobby that would endure beyond the “video game craze” of the ’70s. Following the Great Implosion of ’83, as the Age of Atari crumbled, game console and software sales tanked and... |
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |