Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

The Mobile Revolution: The Making of Worldwide Mobile Markets
The Mobile Revolution: The Making of Worldwide Mobile Markets
‘We’re moving away from the business of ears to the business of eyes.’

Move over Bill Gates, stand aside Steve Jobs, said the industry pundits after
CeBIT 1998, the famous trade conference. They’d just seen Nokia’s
Communicator 9110, a mobile phone with dazzling capabilities, but what
really
...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Content Computing: Advanced Workshop on Content Computing, AWCC 2004
Content Computing: Advanced Workshop on Content Computing, AWCC 2004

This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.

The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
System-on-a-Chip: Design and Test
System-on-a-Chip: Design and Test
This project started as an interim report. The purpose was to communicate
to various groups within Advantest about the main issues for system-on-achip
(SoC) design and testing and the common industrial practices. Over
one year’s time, a number of people contributed in various capacities to complete
this report.
...
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling are two distinct domains of research, with few interactions up to now, though closely linked. On the one hand, Algebraic Geometry has developed an impressive theory targeting the understanding of geometric objects defined algebraically. On the other hand, Geometric Modeling is using every day, in practical...
Rule-Based Evolutionary Online Learning Systems: A Principled Approach to LCS Analysis and Design
Rule-Based Evolutionary Online Learning Systems: A Principled Approach to LCS Analysis and Design
This book offers a comprehensive introduction to learning classifier systems (LCS) – or more generally, rule-based evolutionary online learning systems. LCSs learn interactively – much like a neural network – but with an increased adaptivity and flexibility. This book provides the necessary background knowledge on problem types,...
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control (Control Engineering)
Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control (Control Engineering)
The purpose of this book is to initiate the newcomer into the control of computer and wireless communication networks, one of the fastest growing fields in the engineering world. Technical concepts, which are at the core of the design, implementation, research and invention of computer network and wireless communication network control protocols,...
unlimited object storage image
Result Page: 731 730 729 728 727 726 725 724 723 722 721 720 719 718 717 716 715 714 713 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy