Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scheduling in Real-Time Systems
Scheduling in Real-Time Systems
Real-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today....
Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Juniper MX Series
Juniper MX Series

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection,...

Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Instant Node.js Starter
Instant Node.js Starter

Program your scalable network applications and web services with Node.js with this book and ebook

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Learn how to use module patterns and Node Packet Manager (NPM) in your applications
  • ...
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

HSPA Performance and Evolution: A practical perspective
HSPA Performance and Evolution: A practical perspective

Written from an operator’s viewpoint,  HSPA Performance and Evolution  explores the lessons learned and techniques developed for optimally deploying HSPA (High Speed Packet Access). The essential distinctions between rolling out HSPA compared to earlier UMTS and GSM technologies are explained covering the many issues...

CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)
CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)
This book is intended to provide an introduction to the exciting and emerging world of wireless LAN technology. This technology continues to expand at a phenomenal pace with constant improvements in speed, reliability, and security. Reading this book will teach you the fundamentals of standards-based technology, giving you an overview of the...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
CCNA Fast Pass
CCNA Fast Pass
The Perfect CCNA Preparation and Review Tool

From the author of Sybex’s best-selling CCNA: Cisco Certified Network Associate Study Guide comes the streamlined tool you need to hone in on critical CCNA information: CCNA Fast Pass. The enclosed CD lets you practice, practice, practice so you can...

Internet Protocols Handbook: The Most Complete Reference for Developing Internet Applications
Internet Protocols Handbook: The Most Complete Reference for Developing Internet Applications
Covers over 30 protocols, including new and forthcoming ones. Describes packet and message formats for the most popular protocols. Is easily accessed and cross-referenced; you'll quickly find exactly what you're looking for. Contains a guide for those confusing error messages that stump you. Reveals the Internet standard process from initial...
MPLS and VPN Architectures
MPLS and VPN Architectures

Multiprotocol Label Switching (MPLS) provides the mechanisms to perform label switching, which is an innovative technique for high-performance packet forwarding. This book provides an in-depth study of MPLS technology, including MPLS theory and configuration, network design issues, and case studies. The MPLS/VPN architecture...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy