Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Practical Rails Projects (Expert's Voice)
Practical Rails Projects (Expert's Voice)
If you are a web developer who has already realized the power of Ruby on Rails but wants to take your Rails knowledge further, this book will be invaluable to you. Practical Rails Projects assumes you know the basics of using the framework, concentrating instead on taking you through the creation of a multitude of practical real-world...
Domain-Specific Modeling: Enabling Full Code Generation
Domain-Specific Modeling: Enabling Full Code Generation
Domain-Specific Modeling (DSM) is the latest approach to software development, promising to greatly increase the speed and ease of software creation. Early adopters of DSM have been enjoying productivity increases of 500–1000% in production for over a decade. This book introduces DSM and offers examples from various fields to illustrate to...
Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...
Advanced C and C++ Compiling
Advanced C and C++ Compiling

Learning how to write C/C++ code is only the first step. To be a serious programmer, you need to understand the structure and purpose of the binary files produced by the compiler: object files, static libraries, shared libraries, and, of course, executables.

Advanced C and C++ Compiling explains the build process in
...

Zend Framework 2 Cookbook
Zend Framework 2 Cookbook

If you are pretty handy with PHP, this book is the perfect way to access and understand the features of Zend Framework 2. You can dip into the recipes as you wish and learn at your own pace.

Overview

  • Recipes to help you create, test, and optimize your applications
  • A useful guide for PHP...
MySQL and PHP From Scratch
MySQL and PHP From Scratch
Apache, MySQL, PHP3, and IMP the pieces exist. Each piece has been described ad nauseam. What does not exist is a guide to the marriage of these software technologies into a useful book, until now. This book puts together information on installing, setting up, and troubleshooting each of these technologies into one complete...
Open Source Messaging Application Development: Building and Extending Gaim (Expert's Voice in Open Source)
Open Source Messaging Application Development: Building and Extending Gaim (Expert's Voice in Open Source)
I discovered Gaim in the AOL Instant Messenger (AIM) user profile of a friend about five years
ago. I didn’t know a lot about Linux then. I knew that it was a free implementation of UNIX with
publicly available source code, but my previous experiences with UNIX comprised staring at a
shell prompt, trying to type cryptic
...
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
The Definitive Guide to SUSE Linux Enterprise Server 12
The Definitive Guide to SUSE Linux Enterprise Server 12

The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments....

unlimited object storage image
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy