Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Protocol Handbook (4th Edition)
Network Protocol Handbook (4th Edition)
All active network protocols, including the most popular TCP/IP, WAN, LAN technologies are fully explained and well illustrated; Covers the latest and emerging technologies such as VOIP, SAN, MAN, VPN/Security, WLAN, VLAN and more.

About the Author

Javvin Technologies Inc., based at the Silicon
...
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

Authorized Self-Study Guide

Implementing Cisco IOS Network Security (IINS)

 

Foundation learning for CCNA Security IINS 640-553 exam

 

...

Mobile IPv6: Protocols and Implementation
Mobile IPv6: Protocols and Implementation

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.). 

This book covers the IPv6 host mobility protocol known as "mobile IPv6"...

Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet has been deployed in the metro space, providing low cost, easily managed bandwidth for intensive applications like video, storage, and ASPs. 10 Gigabit Ethernet (IEEE 802.3a) will make the use of Ethernet in the Metro area even more attractive. IDC projects that GigE revenues in the U.S., marked at $155 million in 2001, will grow...
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
Microsoft Content Management Server Field Guide
Microsoft Content Management Server Field Guide
Microsoft Content Management Server Field Guide  provides simple crisis-management instructions for intermediate- to advanced-level network administrators who work in the trenches. It offers practical procedural information, reference materials, and focused presentations. This book also features self-contained topics so you do not have to look...
FreeBSD Corporate Networker's Guide (With CD-ROM)
FreeBSD Corporate Networker's Guide (With CD-ROM)

"FreeBSD has been the secret weapon of serious network administrators for many years now and this book should provide a welcome introduction to those who have yet to discover it for themselves."
--Jordan Hubbard, Co-founder, The FreeBSD Project

FreeBSD is the engine that runs on some...

Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
*A practical engineer’s reference that puts the key information at your fingertips
*Covers essential data, techniques and working practice
*This update covers the latest international regulations

Newnes Data Communications Pocket Book is a remarkable toolkit for engineers, IT professionals, managers and students. The wide
...
The Black Art of Xbox Mods
The Black Art of Xbox Mods
The Xbox might be described as a powerful, proprietary PC that has been customized exclusively for running games. This book will help you to maximize the potential of your Xbox video game console by showing you how to modify your Xbox in various ways. You will learn how to disassemble your Xbox, right down to the motherboard, and you will...
Linux Administration: A Beginner's Guide, Fifth Edition
Linux Administration: A Beginner's Guide, Fifth Edition
Administering a Linux system isn't much like administering a Windows machine. Though the goals are similar and comparable problems arise under both environments, they each require administrators to adopt a certain way of thinking about processes and data. Linux Administration: A Beginner's Guide helps readers adapt their Windows experience...
Wireless Communications Design Handbook: Terres- Trial & Mobile Interference,
Wireless Communications Design Handbook: Terres- Trial & Mobile Interference,
The information age, which began its major drive at the beginning of the 1980s with the birth of desktop computing, continues to manifest itself in many ways and presently dominates all aspects of modem technological advances. Personal wireless communication services can be considered a "subset technology" of the information age, but they...
Networking All-in-One Desk Reference for Dummies
Networking All-in-One Desk Reference for Dummies
9 books in 1– your key to networking success!

Your one-stop guide to building, securing, and administering networks large and small

So you’re in charge of the network? No worries! This handy all-in-one guide provides a bird’s-eye view of all the important stuff, like installing and configuring various network...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy