Home | Amazing | Today | Tags | Publishers | Years | Search 
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control
Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control
This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and...
Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
FreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.

Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Deploying Voice over Wireless LANs (Networking Technology)
Deploying Voice over Wireless LANs (Networking Technology)

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

 

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly...

Designing Network Security (2nd Edition) (Networking Technology)
Designing Network Security (2nd Edition) (Networking Technology)
Master the design of secure networks with the updated edition of this best-selling security guide

* Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
* Learn how to use new and legacy Cisco Systems equipment to secure your networks
* Understand how
...

Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy