Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
This redbook will help you install, tailor and configure the SuSE Linux 7.0 distribution on different servers of the xSeries and Netfinity class. You will be instructed on how to do the basic installation, and installing and configuring different services such as Apache (http-Server), Samba (Fileserver for Windows-based networks), and Postfix (an...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Mike Meyers' A+ Guide: PC Technician Lab Manual (Exams 220-602, 220-603, & 220-604)
Mike Meyers' A+ Guide: PC Technician Lab Manual (Exams 220-602, 220-603, & 220-604)
Essential skills for IT professionals

Mike Meyers A+ Guide to Operating Systems Lab Manual, Second Edition features 40-plus lab exercises that challenge you to solve problems based on realistic case studies and step-by-step scenarios that require critical thinking. You'll also get post-lab observation...

Rare Event Simulation using Monte Carlo Methods
Rare Event Simulation using Monte Carlo Methods
In a probabilistic model, a rare event is an event with a very small probability of occurrence. The forecasting of rare events is a formidable task but is important in many areas. For instance a catastrophic failure in a transport system or in a nuclear power plant, the failure of an information processing system in a bank, or in the communication...
Frommer's Alaska 2010 (Frommer's Color Complete Guides)
Frommer's Alaska 2010 (Frommer's Color Complete Guides)

As a child, when my family traveled outside Alaska for vacations, I often met other children who asked, “Wow, you live in Alaska? What’s it like?” I never did well with that question. To me, the place I was visiting was far simpler and easier to describe than the one I was from. The Lower 48 seemed a fairly homogeneous land...

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites
Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

Facebook, Twitter, and LinkedIn generate a tremendous amount of valuable social data, but how can you find out who's making connections with social media, what they’re talking about, or where they’re located? This concise and practical book shows you how to answer these questions and more. You'll learn how to...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Learning OMNeT++
Learning OMNeT++

Make realistic and insightful network simulations with OMNeT++

Overview

  • Create a virtual Network Simulation Environment rapidly
  • Focus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the way
  • Learn how to...
Cisco® OSPF Command and Configuration Handbook (CCIE Professional Development)
Cisco® OSPF Command and Configuration Handbook (CCIE Professional Development)

As one of the most predominantly deployed Interior Gateway Protocols, Open Shortest Path First (OSPF) demands a wealth of knowledge on the part of internetworking professionals working with it on a daily basis. Unfortunately, publicly available documentation on the OSPF command set varies from being too thin on coverage to...

unlimited object storage image
Result Page: 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy