Home | Amazing | Today | Tags | Publishers | Years | Search 
CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Introduction to Network Analysis, 2nd Edition
Introduction to Network Analysis, 2nd Edition
The ultimate introductory guide to analyzing network communications at the packet level. This book defines basic analyzer elements (such as capture filters, display filters, expert alarms, trend screens, and decode windows) and provides real-world examples of how an analyzer can be used to troubleshoot networks. Includes chapter tests and several...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)
Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)

Radia Perlman's Interconnections is recognized as a leading text on networking theory and practice. It provides authoritative and comprehensive information on general networking concepts, routing algorithms and protocols, addressing, and the mechanics of bridges, routers, switches, and hubs. This Second...

Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

Juniper Networks  Reference Guide: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture

Juniper Networks(R) Reference Guide is the ideal implementation guide to the Juniper Networks(R) family of Internet routers and the network operating system JUNOS(TM). With concise explanations of internetworking theory and detailed examples, this book teaches readers how to configure,...

Cisco Security Architectures
Cisco Security Architectures

Cisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.

In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes...

Broadband Telecommunications Handbook
Broadband Telecommunications Handbook
THE BLOCKBUSTER OVERVIEW OF BROADBAND
Updated and Expanded to Reflect the Latest Technologies!

Whether you’re a “techie” or a business executive, getting a top-to-bottom understanding of broadband – the kind that will pay “real world” dividends at work -- has never been easier! In this...

Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Broadband Crash Course
Broadband Crash Course
THE DECISION-MAKER'S SURVIVAL GUIDE TO UNDERSTANDING--AND PROFITTING FROM--BROADBAND!

GET THE ANSWERS TO HELP YOU MAKE ALL NEEDED DECISIONS: FINANCIAL, MANAGEMENT, MARKETING, EQUIPMENT, APPLICATIONS, PROTOCOLS

With savvy from both the technical and business sides of telecom, and a knack for writing in "plainspeak", expert...

Networking with Microsoft TCP/IP Certified Administrator's Resource Edition
Networking with Microsoft TCP/IP Certified Administrator's Resource Edition
Finally, an all-inclusive resource for implementing TCP/IP and it's certified by Microsoft. No other book on the market combines thorough coverage, expert advice, and Microsoft-certified training material in one great book. You'll find in-depth, up-to-date coverage of the latest TCP/IP technologies, including managing DHCP, leveraging WINS,...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy