 |
|
 Network Protocol Handbook (4th Edition)All active network protocols, including the most popular TCP/IP, WAN, LAN technologies are fully explained and well illustrated; Covers the latest and emerging technologies such as VOIP, SAN, MAN, VPN/Security, WLAN, VLAN and more.
About the Author
Javvin Technologies Inc., based at the Silicon... |  |  A Social History of ByzantiumWestern civilization owes an incalculable cultural and historical debt to the Byzantine Empire. Before falling to the Ottoman Turks in the mid-fifteenth century, the empire flourished for more than a thousand years, bridging the ancient and modern worlds. Byzantium profoundly influenced the pattern of cultural and political development in the lands... |  |  Joomla! Web SecurityIn Detail
Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,... |
|
 |  |  |  |  iPhone Hacks: Pushing the iPhone and iPod touch Beyond Their LimitsWith iPhone Hacks, you can make your iPhone do all you'd expect of a mobile smartphone -- and more. Learn tips and techniques to unleash little-known features, find and create innovative applications for both the iPhone and iPod touch, and unshackle these devices to run everything from network utilities to video game emulators. ... |
|
|
 CRC Standard Curves and SurfacesCRC Standard Curves and Surfaces is a comprehensive illustrated catalog of curves and surfaces of geometric figures and algebraic, transcendental, and integral equations used in elementary and advanced mathematics. More than 800 graphics images are featured. Based on the successful CRC Handbook of Mathematical Curves and Surfaces, this new... |  |  Asterisk 1.4 the Professionals GuideAsterisk is the leading Open Source Telephony application and PBX software solution. It represents an effective, easy-to-administer, and accessible platform for running enterprise telephony requirements. The real world, however, offers numerous hurdles when running Asterisk in the commercial environment including call routing, resilience, or... |  |  Field Confirmation Testing for Suspicious SubstancesFrequently a substance found at a port of entry, waste site, laboratory triage facility, or even in a hazardous materials emergency will be labeled and purportedly identified. But law enforcement and other first responders cannot take this claim at face value, as the accuracy is not confirmed and must be verified. A comprehensive handbook for... |
|
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 |