Home | Amazing | Today | Tags | Publishers | Years | Search 
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Real-Time Systems Development
Real-Time Systems Development
Real-time Systems Development is a text for computing students who want to understand more about the development of software for real-time applications, involving concurrent programming, multi-tasking, data i/o and embedded processors.

The book has been written to cover single semester final year undergraduate options or
...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
USB Design by Example: A Practical Guide to Building I/O Devices
USB Design by Example: A Practical Guide to Building I/O Devices
The Universal Serial Bus (USB) specification is a boon for users in that it makes the process of connecting peripherals to computers effortless, in most cases. As is often the case with user-friendliness, though, the cosmetic ease comes about as a result of behind-the-scenes complexity. USB Design by Example explains what USB means to...
Computer and Communication Networks
Computer and Communication Networks

As the number and variety of communication services grow, so do the challenges of designing cost-effective networks that meet the requirements of emerging technologies in wireless, sensor, and mesh networks. Computer and Communication Networks is the first book to offer balanced coverage of all these topics using...

Cisco CCIE Fundamentals: Network Design & Case Studies
Cisco CCIE Fundamentals: Network Design & Case Studies
For a sophisticated view of networking design concepts that goes from lofty to granular in the blink of an eye, Network Design and Case Studies is a sure winner. This mammoth entry in Cisco's growing collection of reference books provides equal parts academic theory and practical application.

The first half of the book deals...

Network Simulation (Synthesis Lectures on Communication Networks)
Network Simulation (Synthesis Lectures on Communication Networks)
A detailed introduction to the design, implementation, and use of network simulation tools is presented. The requirements and issues faced in the design of simulators for wired and wireless networks are discussed. Abstractions such as packet- and fluid-level network models are covered. Several existing simulations are given as examples, with...
Network Convergence: Services, Applications, Transport, and Operations Support
Network Convergence: Services, Applications, Transport, and Operations Support
The present information age is enabled by telecommunications and information technology and the continued convergence of their services, technologies and business models. Within telecommunications, the historic separations between fixed networks, mobile telephone networks and data communications are diminishing. Similarly, information technology...
Network Management Fundamentals
Network Management Fundamentals
Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy