Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Network Administrator's Guide (2nd Edition)
Linux Network Administrator's Guide (2nd Edition)
This book was written to provide a single reference for network administration
in a Linux environment. Beginners and experienced users alike should find the
information they need to cover nearly all important administration activities
required to manage a Linux network configuration. The possible range of
topics to cover is
...
Windows XP for Dummies
Windows XP for Dummies
Windows XP for Dummies does a good job in its role as the flagship of the Dummies line, providing Windows novices with a guided introduction to Microsoft's latest and most feature-rich operating system for everyday computer users. Its treatment of computer, Windows, and Internet fundamentals is among the best on the market, and author Andy...
Building Service Provider Networks
Building Service Provider Networks
Learn how to gain the edge of providing the most reliable service-level guarantees to customers

Network and service provider engineers are often faced with the difficult challenge of meeting a less-than-logical service need of a customer–– and at the most reasonable price. In this book, Howard Berkowitz shows network and service...

Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
Dictionary of Computer and Internet Terms
Dictionary of Computer and Internet Terms
Computer terminology is constantly expanding, and the brand-new edition of this dictionary has been updated to keep pace with the latest important innovations in computer science and technology. Emphasis is on helpful information for non-technical home computer users. The book presents more than 3,200 computer-related terms with clear and succinct...
Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

Network Control and Engineering for QOS, Security and Mobility, III
Network Control and Engineering for QOS, Security and Mobility, III
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con’2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and...
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
New automated, application-independent methodology for designing and deploying sensor networks

Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based...

Mastering phpMyAdmin 3.1 for Effective MySQL Management
Mastering phpMyAdmin 3.1 for Effective MySQL Management

MySQL has gained wide popularity because of its open-source nature, performance, reliability, robustness, and support for various platforms.

phpMyAdmin is a web-based front-end to manage MySQL databases and has been adopted by a number of open-source distributors. It is one of the most widely used open-source applications written...

Mac OS X System Administration
Mac OS X System Administration

Build and manage a powerful network on Mac OS X Server

Boost productivity and foster collaboration using the powerful networking tools available in Mac OS X Snow Leopard Server. With clear, detailed explanations and step-by-step instructions, Mac OS X System Administration shows you how to plan, construct, and manage a...

unlimited object storage image
Result Page: 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy