Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup...
PHP Programming with PEAR
PHP Programming with PEAR
PEAR is the PHP Extension and Application Repository, and is a framework and distribution system for reusable, high-quality PHP components, available in the form of "packages". The home of PEAR is pear.php.net, from where you can download and browse this extensive range of powerful packages. For most things that you would want to use in...
Essentials of Error-Control Coding
Essentials of Error-Control Coding
Rapid advances in electronic and optical technology have enabled the implementation of powerful error-control codes, which are now used in almost the entire range of information systems with close to optimal performance. These codes and decoding methods are required for the detection and correction of the errors and erasures which inevitably occur...
Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols

This book describes how to build wireless sensor networks, from the layers of communication protocols through the design of network nodes. It summarizes the multiple applications of wireless sensor networks, then discusses network device design and the requirements that foster the successful performance of these applications. The book discusses...

Business Rules and Information Systems: Aligning IT with Business Goals
Business Rules and Information Systems: Aligning IT with Business Goals

Information systems often fail because their requirements are poorly defined. This book shows IT professionals how to specify more precisely and more effectively what their systems need to do. The key lies in the discovery and application of what are called business rules. A business rule is a compact and simple statement that represents some...

Novell's ZENworks for Desktops 4 Administrator's Handbook
Novell's ZENworks for Desktops 4 Administrator's Handbook
To help customers reduce the growing cost of managing employee computers both in the office and on the road, Novell created Novell.

ZENworks. for Desktops 4. ZENworks stands for Zero Effort Networks. Built to operate over the Internet as well as internal networks, ZENworks for Desktops 4 automates key network management tasks so IT...

Planar Graph Drawing
Planar Graph Drawing
The book presents the important fundamental theorems and algorithms on planar graph drawing with easy-to-understand and constructive proofs. Extensively illustrated and with exercises included at the end of each chapter, it is suitable for use in advanced undergraduate and graduate level courses on algorithms, graph theory, graph drawing,...
LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell

Objective certification of professionals is a time-honored tradition in many fields, including medicine and law. As small computer systems and networks proliferated over the last decade, Novell and Microsoft produced extremely popular certification products for their respective operating system and network technologies. These...

AIX Reference for Sun Solaris Administrators (IBM Redbooks)
AIX Reference for Sun Solaris Administrators (IBM Redbooks)
In today’s heterogeneous computer environments, especially in UNIX servers
and workstations, it is essential that the system administrator have basic
knowledge of different operating systems. This redbook is written for Sun Solaris
administrators who wants to transfer their knowledge of Solaris UNIX skills to the
AIX 5L
...
Blog Design Solutions
Blog Design Solutions
Blogging has moved rapidly from being a craze to become a core feature of the Internet--from individuals sharing their thoughts with the world via online diaries, through fans talking about their favorite sports teams or music, right up to serious business minds discussing industry futures.

And that includes you, right? If you haven't
...
KDE Programming Bible
KDE Programming Bible
(IDG Books) A tutorial packed with examples, lucid explanations, and a complete widget reference, showing how to take full advantage of the K desktop and 2/Qt toolkit for Linux. The CD-ROM contains all of the examples from the text and KDE 2/Qt core files and libraries. System requirements: Intel 486+, 156 MB+ Hard drive space, 16MB+ RAM, CD-ROM...
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and...
Result Page: 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy