Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Next Generation Network Services: Technologies & Strategies
Next Generation Network Services: Technologies & Strategies
'Next Generation' refers to the new technologies and services that telecommunications operators will have at their disposal as they create new 3G networks where voice and data converge and which are based on packet switched rather than circuit switched telephony.

Providing a much needed overview of the latest communication technologies
...
Core Java(TM), Volume I--Fundamentals (8th Edition)
Core Java(TM), Volume I--Fundamentals (8th Edition)
In late 1995, the Java programming language buret onto the Internet scene and gained instant celebrity status. The promise of Java technology was that it would become the universal glue that connects users with information, whether that information comes from web servers, databases, information providers, or any other imaginable source. Indeed,...
Designing Cisco Networks
Designing Cisco Networks
Cisco authorized self-study book for CCDA foundation learning

* Prepare for CCDA certification while mastering the network design process
* Learn to characterize existing networks and determine new customer requirements
* Develop appropriate network topologies for various environments
* Design device naming schemes and IP
...

CNET Do-It-Yourself Home Networking Projects
CNET Do-It-Yourself Home Networking Projects
You may be thinking that home networking is so ubiquitous there could not possibly be anything new or different to do with this interconnected marvel of now everyday technology. You can surf the Web on any of two to three PCs, upload and download photos, fill an MP3 player to the brim, and chat with your friends and family via IM—what more...
Network+ Study Guide (2nd Edition)
Network+ Study Guide (2nd Edition)
Here's the book you need to prepare for CompTIA's updated Network+ exam, N10-003.

This revised edition of the best-selling Network+ Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the focused and accessible instructional approach that has...

Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -...
Windows Vista: The Definitive Guide
Windows Vista: The Definitive Guide
Whether you're a beginner, power user, or seasoned professional, Windows Vista: The Definitive Guide has everything you need to customize the operating system, master your digital media, manage your data, and maintain your computer -- regardless of which Windows Vista edition you're using.

Why this book and not some other resource?...

Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

unlimited object storage image
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy