Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Routing First-Step (First-Step)
Routing First-Step (First-Step)

Your first step into the world of routing

  • No routing experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

Your...

Agile Model-Based Development Using UML-RSDS
Agile Model-Based Development Using UML-RSDS

This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...

Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking
Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking

Next-generation architectures for survivable networks.

"Always on" information networks must automatically reroute around virtually any problem-but conventional, redundant ring architectures are too inefficient and inflexible. The solution: mesh-based networks that will be just as survivable-and far more...

A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)

MASTER CORE EXCEL 2016 TOOLS FOR BUILDING POWERFUL, RELIABLE SPREADSHEETS!

 

Use this guide to automate virtually any routine task: save yourself hours, days, maybe even weeks! Make Excel do things you thought were impossible, discover macro...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

Ham Radio For Dummies (Computer/Tech)
Ham Radio For Dummies (Computer/Tech)

An ideal first step for learning about ham radio

Beyond operating wirelessly, today's ham radio operators can transmit data and pictures; use the Internet, laser, and microwave transmitters; and travel to places high and low to make contact. This hands-on beginner guide reflects the operational and technical changes to...

Mastering Nmap Scripting Engine
Mastering Nmap Scripting Engine

Master the Nmap Scripting Engine and the art of developing NSE scripts

About This Book

  • Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
  • Learn the fundamentals of Lua programming
  • Develop powerful scripts for the Nmap Scripting...
Networks of Innovation : Change and Meaning in the Age of the Internet
Networks of Innovation : Change and Meaning in the Age of the Internet
Integrating concepts from multiple theoretical disciplines and detailed analyses of the evolution of Internet-related innovations (including computer networking, the World Wide Web and the Linux open source operating system), this book develops foundations for a new theoretical and practical
understanding of innovation. It covers topics
...
Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Result Page: 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy