Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
One of the great protocols that has been inherited from the Internet is TCP/IP and this is being used as the open standard today for all network and communications systems. The reasons for this popularity are not hard to find. TCP/IP and Ethernet are truly open standards available to competing manufacturers and providing the user with a common...
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE), Third Edition, is a Cisco-authorized, self-paced learning tool for CCVP foundation learning. This book provides you with the knowledge and skills required to plan, design, and deploy a Cisco voice-over-IP (VoIP) network and to integrate gateways and gatekeepers into an enterprise VoIP network. By reading this...
The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Giving a sound technical introduction to 3GPP LTE and SAE, this book explains the decisions taken during standardization while also examining the likely competition for LTE such as HSPA+ and WiMAX. As well as looking at next generation network technologies, Beyond 3G - Bringing Networks, Terminals and the Web Together describes the latest...
Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)
Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)

This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks

This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The...

4G: Deployment Strategies and Operational Implications
4G: Deployment Strategies and Operational Implications

Specific operational requirements drive early network architectural and design decisions for 4G networks. 4G: Deployment Strategies and Operational Implications evaluates the specific design and deployment options and strategies for LTE network business development. LTE is a...

Machine Learning with R - Second Edition
Machine Learning with R - Second Edition

Key Features

  • Harness the power of R for statistical computing and data science
  • Explore, forecast, and classify data with R
  • Use R to apply common machine learning algorithms to real-world scenarios

Book Description

Machine learning, at its core, is concerned...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
unlimited object storage image
Result Page: 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 312 311 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy