Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Analysis Using Wireshark Cookbook
Network Analysis Using Wireshark Cookbook

This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues.

Overview

  • Place Wireshark in your network and configure it for...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

A Practical Approach to WBEM/CIM Management
A Practical Approach to WBEM/CIM Management

System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management WBEM and its Component Information Model (CIM) provide the architecture, language,...

Multidimensional Signal, Image, and Video Processing and Coding, Second Edition
Multidimensional Signal, Image, and Video Processing and Coding, Second Edition

This is a textbook for a first- or second-year graduate course for electrical and computer engineering (ECE) students in the area of digital image and video processing and coding. The course might be called Digital Image and Video Processing (DIVP) or some such, and has its heritage in the signal processing and communications areas of...

Cisco IOS Cookbook
Cisco IOS Cookbook

Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup...
Absolute OpenBSD: UNIX for the Practical Paranoid
Absolute OpenBSD: UNIX for the Practical Paranoid

The definitive guide to OpenBSD

Foreword by Henning Brauer, OpenBSD PF Developer

OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD...

Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
QoS and QoE Management in UMTS Cellular Systems
QoS and QoE Management in UMTS Cellular Systems
This comprehensive volume provides state-of-the art guidance on Quality of Service (QoS) and Quality of end-user Experience (QoE) management in UMTS cellular systems, tackling planning, provisioning, monitoring and optimisation issues in a single accessible resource. In addition, a detailed discussion is provided on service applications, QoS...
Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy