Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams.

This two-in-one Study Guide provides:

  • In-depth coverage of all exam topics
  • Practical information on implementing Cisco's Secure PIX and Secure VPN technologies
  • ...
Traffic Analysis and Design of Wireless IP Networks
Traffic Analysis and Design of Wireless IP Networks
Wireless networks have penetrated almost a billion subscribers worldwide with
first and second generation mobile networks. The main service was voice, and
more recently modem-based low-rate data services. Because of the voiceoriented
traffic and circuit-switching technology, these networks are dimensioned
and designed using the
...
Wireless Networking Technology: From Principles to Successful Implementation
Wireless Networking Technology: From Principles to Successful Implementation
As the demand for higher bandwidth has lead to the development of increasingly complex wireless technologies, an understanding of both wireless networking technologies and radio frequency (RF) principles is essential for implementing high performance and cost effective wireless networks.

Wireless Networking Technology
...
Distributed Network Systems : From Concepts to Implementations (Network Theory and Applications)
Distributed Network Systems : From Concepts to Implementations (Network Theory and Applications)
Both authors have taught the course of “Distributed Systems” for many years in the
respective schools. During the teaching, we feel strongly that “Distributed systems”
have evolved from traditional “LAN” based distributed systems towards “Internet
based” systems. Although there exist
...
Network and System Security, Second Edition
Network and System Security, Second Edition

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of...

Compiere 3
Compiere 3

Compiere is a world leading open source commercially supported ERP system. Very large companies have already chosen Compiere over traditional systems. By its nature ERP is a complex subject and while you may be familiar with ERP this book will introduce you to the concepts of Compiere. Here you will learn the Compiere essentials quickly and...

Cognitive Radio Architecture: The Engineering Foundations of Radio XML
Cognitive Radio Architecture: The Engineering Foundations of Radio XML
An exciting new technology, described by the one who invented it 

This is the first book dedicated to cognitive radio, a promising new technology that is poised to revolutionize the telecommunications industry with increased wireless flexibility. Cognitive radio technology integrates computational intelligence into software-defined radio...

Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies
Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies
9 books in 1– one great price for nine handy, quick reference guides!

Your one-stop guide to the latest release of this popular Linux distribution

Get ready to tip your hat to the latest version of Fedora! From installing Fedora on your PC and using OpenOffice.org to securing your system and setting up servers, the nine...

Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks
Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

As wired networks are increasingly replaced with 802.11n wireless connections, enterprise users are shifting to centralized, next-generation architectures built around Wireless LAN Controllers (WLC). These networks will increasingly run business-critical voice, data, and video applications that once required wired...

Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet has been deployed in the metro space, providing low cost, easily managed bandwidth for intensive applications like video, storage, and ASPs. 10 Gigabit Ethernet (IEEE 802.3a) will make the use of Ethernet in the Metro area even more attractive. IDC projects that GigE revenues in the U.S., marked at $155 million in 2001, will grow...
Security In Wireless LANS And MANS (Artech House Computer Security)
Security In Wireless LANS And MANS (Artech House Computer Security)
Wireless communications are becoming ubiquitous in homes, offices, and enterprises
with the popular IEEE 802.11 wireless LAN technology and the up-andcoming
IEEE 802.16 wireless MAN technology. The wireless nature of communications
defined in these standards makes it possible for an attacker to snoop on
confidential
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy