Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Symbian OS C++ for Mobile Phones
Symbian OS C++ for Mobile Phones
Programming Symbian OS is a key skill for mass market phone application development. Whether you are developing a
services for shipping mobile phones, or involved in pre-market mobile phone development, this book will help you unde
fundamental theory behind developing Symbian OS C++ code for constrained devices.

• A
...
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
MCTS: Windows Server Virtualization Configuration Study Guide: (Exam 70-652)
MCTS: Windows Server Virtualization Configuration Study Guide: (Exam 70-652)

The MCTS is Windows Server Virtualization Configuring exam, and is Microsoft?s newest addition to their exam repertoire and tests candidates? ability to use Hyper-V and server virtualization as part of their network infrastructure solution. The exam targets IT professionals who are looking to enhance their skills and distinguish themselves...

Wireless Broadband Handbook
Wireless Broadband Handbook
Translate broadband wireless mumbo-jumbo into clear business terms

No guide tackles and clarifies the chaotic acronym-ridden world of broadband wireless better than Wireless Broadband Handbook. Best-selling telecom author Regis "Bud" Bates has the formula to give you the "instant expertise" you need to compete and...

Building iPhone Apps with HTML, CSS, and JavaScript: Making App Store Apps Without Objective-C or Cocoa
Building iPhone Apps with HTML, CSS, and JavaScript: Making App Store Apps Without Objective-C or Cocoa

What people are saying about Building iPhone Apps w/ HTML, CSS, and JavaScript

"The future of mobile development is clearly web technologies like CSS, HTML and JavaScript. Jonathan Stark shows you how to leverage your existing web development skills to build native iPhone applications using these...

SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Quantitative Marketing and Marketing Management: Marketing Models and Methods in Theory and Practice
Quantitative Marketing and Marketing Management: Marketing Models and Methods in Theory and Practice

Quantitative marketing has been gaining importance during the last decade. This is indicated by the growing number of model- and method-oriented studies published in leading journals as well as by the many successful applications of quantitative approaches in pricing, advertising, new product planning, and market segmentation decisions. In...

Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)

Tensor Product Model Transformation in Polytopic Model-Based Control offers a new perspective of control system design. Instead of relying solely on the formulation of more effective LMIs, which is the widely adopted approach in existing LMI-related studies, this cutting-edge book calls for a systematic modification and...

unlimited object storage image
Result Page: 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy