Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

Next Generation Transport Networks: Data, Management, and Control Planes
Next Generation Transport Networks: Data, Management, and Control Planes

Covering past, present and future transport networks using three layered planes written by experts in the field.

Targeted at both practitioners and academics as a single source to get an understanding of how transport networks are built and operated

Explains technologies enabling the next generation transport...

Cloud Computing Bible
Cloud Computing Bible

In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...

Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
The International Workshop on Complex Networks—CompleNet (www.complenet.org)—was initially proposed in 2008 with the first workshop taking place in 2009. The initiative was the result of efforts from researchers from the Bio-Complex Laboratory in the Department of Computer Sciences at Florida Institute of...
How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure

Master all the important and tough decision-making aspects involved in architecting an Azure public cloud for your organization.

Key Features

  • Deploy Azure Active Directory and implement synchronization
  • Manage storage solutions with Azure network services
  • ...
Advances in Intelligent Networking and Collaborative Systems: The 11th International Conference on Intelligent Networking and Collaborative Systems ... in Intelligent Systems and Computing)
Advances in Intelligent Networking and Collaborative Systems: The 11th International Conference on Intelligent Networking and Collaborative Systems ... in Intelligent Systems and Computing)

This book presents the latest innovative research findings, methods, and development techniques related to intelligent social networks and collaborative systems, intelligent networking systems, mobile collaborative systems, and secure intelligent cloud systems. Offering both theoretical and practical perspectives, it also reveals...

Performance and Fault Management (Cisco Press Core Series)
Performance and Fault Management (Cisco Press Core Series)

The key to efficiently running networks is proper management. Performance management measures a network's level of operation, ensures that it maintains an acceptable level, and provides information for expanding the network. Fault management detects, logs, and notifies users of network problems and automatically fixes many...

Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network...
Modern Operating Systems
Modern Operating Systems
For software development professionals and computer science students, Modern Operating Systems gives a solid conceptual overview of operating system design, including detailed case studies of Unix/Linux and Windows 2000.

What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand...

Telecommunications and Networks (Computer Weekly)
Telecommunications and Networks (Computer Weekly)
Telecommunications is an old and stable technology if you think only of telephones and telegraph. But in the 1960s came computers and the processing of data. Soon, we needed data communications to transmit data to remote PCs connected by networks. Later, these points of communications increased in number, with the transmission being no longer...
unlimited object storage image
Result Page: 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy