Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition

Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice...

Configuring Sonicwall Firewalls
Configuring Sonicwall Firewalls
Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s security.
The risks today have greatly increased, so the call for a stronger breed of firewall
has been made. In the past, simple packet-filtering firewalls allowing
...
Survivability and Traffic Grooming in WDM Optical Networks
Survivability and Traffic Grooming in WDM Optical Networks
Technological advances in semiconductor products have essentially been the primary
driver for the growth of networking that led to improvements and simplification
in the long-distance communication infrastructure in the twentieth century.Two
major networks of networks, the public switched telephone network (PSTN) and the...
Desktop Encyclopedia of Voice and Data in Networking
Desktop Encyclopedia of Voice and Data in Networking

The telecommunications industry is changing rapidly in its quest to converge voice and data on high-performance multiservice networks that are designed to meet virtually any business and consumer need. These nextgeneration networks are being driven as much by the revenue-generating potential of new integrated applications as they are by the...

Mastering Wireshark
Mastering Wireshark

Key Features

  • Master Wireshark and train it as your network sniffer
  • Impress your peers and get yourself pronounced as a network doctor
  • Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network...
Wireless Networking Handbook
Wireless Networking Handbook
Many organizations utilize traditional wire-based networking technologies to establish connections among computers. These technologies fall into the following three categories:

• Local area networks (LANs)
• Metropolitan area networks (MANs)
• Wide area networks (WANs)

LANs support the sharing of
...
Enabling Optical Internet with Advanced Network Technologies (Computer Communications and Networks)
Enabling Optical Internet with Advanced Network Technologies (Computer Communications and Networks)
This reference provides an overview of the key concepts related to the major issues of optical Internet, and studies traditionally and recently proposed optical switching paradigms. The concise coverage presents a detailed comparison of optical switching technologies, and covers architectural issues together with topics such as signaling protocols...
Network Security Tools : Writing, Hacking, and Modifying Security Tools
Network Security Tools : Writing, Hacking, and Modifying Security Tools
This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your...
Internet Core Protocols: The Definitive Guide
Internet Core Protocols: The Definitive Guide
For network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.

This book assumes you have a working...

IS-IS Network Design Solutions
IS-IS Network Design Solutions

The definitive IS-IS reference and design guide.

  • Extensive coverage of both underlying concepts and practical applications of the IS-IS protocol

  • Detailed explanation of how the IS-IS database works and...

Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy