Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sniffer Pro Network Optimization and Troubleshooting Handbook
Sniffer Pro Network Optimization and Troubleshooting Handbook
Imagine it is 4:00 P.M. and you are sitting at your desk with three books spread
across your lap.You are hard at work trying to figure out why performance on
your company’s file server has dropped sharply over the past eight hours. Of the
200 users in your company, nearly 100 of them have called to complain about
slow
...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
The Linux Process Manager
The Linux Process Manager
The book assumes that the reader has some previous knowledge of operating system
structure and terminology. For anyone needing such a background I can recommend my
book Operating Systems (O’Gorman, 2000), which is a short readable introduction to the
topic. Operating Systems with Linux (O’Gorman, 2001) is much more
...
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)

Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material...

Programming the Raspberry Pi, Second Edition: Getting Started with Python
Programming the Raspberry Pi, Second Edition: Getting Started with Python

An updated guide to programming your own Raspberry Pi projects

Learn to create inventive programs and fun games on your powerful Raspberry Pi―with no programming experience required. This practical book has been revised to fully cover the new Raspberry Pi 2, including upgrades to the Raspbian operating system. Discover...
Asymmetric Passive Components in Microwave Integrated Circuits (Wiley Series in Microwave and Optical Engineering)
Asymmetric Passive Components in Microwave Integrated Circuits (Wiley Series in Microwave and Optical Engineering)

This book examines the new and important technology of asymmetric passive components for miniaturized microwave passive circuits. The asymmetric design methods and ideas set forth by the author are groundbreaking and have not been treated in previous works. Readers discover how these design methods reduce the circuit size of microwave...

Nmap 6: Network exploration and security auditing Cookbook
Nmap 6: Network exploration and security auditing Cookbook

Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.

Overview

  • Master the power of Nmap 6
  • Learn how the...
Learn WebAssembly: Build web applications with native performance using Wasm and C/C++
Learn WebAssembly: Build web applications with native performance using Wasm and C/C++

The first definitive guide on WebAssembly to help you break through the barriers of web development and build an entirely new class of performant applications

Key Features

  • Generate WebAssembly modules from C and C++ using Emscripten and interact with these modules in the browser
  • ...
Network Security Tools : Writing, Hacking, and Modifying Security Tools
Network Security Tools : Writing, Hacking, and Modifying Security Tools
This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your...
Beginning Java  ME Platform (Expert's Voice in Open Source)
Beginning Java ME Platform (Expert's Voice in Open Source)

Have you thought about building games for your cell phone or other wireless devices? Whether you are a first–time wireless Java developer or an experienced professional, Beginning Java™ ME Platform brings exciting wireless and mobile Java application development right to your door and device!

Beginning...

XNA 3.1 Game Development for Teens
XNA 3.1 Game Development for Teens

XNA 3.0 GAME DEVELOPMENT FOR TEENS is a complete guide to entry level programming and computer game development using XNA 3.0 and the Visual C# 2008 Express programming language for beginners. This book shows readers how to create and execute computer games on their PC, and then how to port their PC games over to their Xbox 360 or Zune...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy