Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multidimensional Signal, Image, and Video Processing and Coding, Second Edition
Multidimensional Signal, Image, and Video Processing and Coding, Second Edition

This is a textbook for a first- or second-year graduate course for electrical and computer engineering (ECE) students in the area of digital image and video processing and coding. The course might be called Digital Image and Video Processing (DIVP) or some such, and has its heritage in the signal processing and communications areas of...

Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
Internetworking with TCP/IP Volume One (6th Edition)
Internetworking with TCP/IP Volume One (6th Edition)

An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the...

Packet Switching And X.25 Networks
Packet Switching And X.25 Networks
When computers started to become business tools and to assume an essential role in all companies, they were very large both physically and in terms of capital and revenue cost. Indeed, when erecting a new building the company would have to design features especially for the computer. A big room to house it, separate power supplies, large...
Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
FreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.

Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Traffic Engineering with MPLS
Traffic Engineering with MPLS

Design, configure, and manage MPLS TE to optimize network performance.

Almost every busy network backbone has some congested links while others remain underutilized. That's because shortest-path routing protocols send traffic down the path that is shortest without considering other network parameters,...

Mobile Internet: Enabling Technologies and Services
Mobile Internet: Enabling Technologies and Services
The migration of the most common Internet services to a mobile environment has long been an evolving
demand of both business and consumer markets. The ability to be connected to the Internet while on
the go and to benefit from using such applications as e-mail, instant messaging, audio and video
streaming, Web browsing, and
...
IP Addressing and Subnetting, Including IPv6
IP Addressing and Subnetting, Including IPv6
This book covers every aspect of the current version, as well as what will be a widespread migration starting in late 1999. These include: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy and an increased number of addressable nodes; supporting simpler auto-configuration of addresses;...
Cisco Field Manual: Router Configuration
Cisco Field Manual: Router Configuration

While there are numerous sources of information and documentation detailing every feature you can implement in a Cisco network and the commands needed to enable those features, the breadth and depth of this data makes it difficult to find the exact information you want, to call up the information quickly, or to carry it with...

Networks on Chip
Networks on Chip

Networks on Chip presents a variety of topics, problems and approaches with the common theme to systematically organize the on-chip communication in the form of a regular, shared communication network on chip, an NoC for short.

As the number of processor cores and IP blocks integrated on a single chip is steadily...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy