Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mule 2: A Developer's Guide (Firstpress)
Mule 2: A Developer's Guide (Firstpress)
Published with the developer in mind, firstPress technical briefs explore emerging technologies that have the potential to be critical for tomorrow's industry. Apress keeps developers one step ahead by presenting key information as early as possible in a PDF of 150 pages or less. Explore the future through Apress...

Mule 2: A...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Twisted Network Programming Essentials
Twisted Network Programming Essentials

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using...

Queuing Theory and Telecommunications: Networks and Applications
Queuing Theory and Telecommunications: Networks and Applications

This book is aimed to provide a basic description of current networking technologies and protocols as well as to provide important tools for network performance analysis based on queuing theory. The second edition adds selected contents in the first part of the book for what concerns: (i) the token bucket regulator and traffic shaping issues;...

Health and Environmental Safety of Nanomaterials: Polymer Nancomposites and Other Materials Containing Nanoparticles (Woodhead Publishing Series in Composites Science and Engineering)
Health and Environmental Safety of Nanomaterials: Polymer Nancomposites and Other Materials Containing Nanoparticles (Woodhead Publishing Series in Composites Science and Engineering)

Health and Environmental Safety of Nanomaterials addresses concerns about the impact of nanomaterials on the environment and human health, and examines the safety of specific nanomaterials. Understanding the unique chemical and physical properties of nanostructures has led to many developments in the applications of nanocomposite...

Protocols for Multislice CT
Protocols for Multislice CT

This book provides structured up-to-date information on all routine protocols used for multislice (multidetector row) CT. The volume contains a detailed technical section and covers the prevailing investigations of the brain, neck, lungs and chest, abdomen with parenchymal organs and gastrointestinal tract, the musculoskeletal system and CTA...

Diagnostic Bacteriology Protocols (Methods in Molecular Biology)
Diagnostic Bacteriology Protocols (Methods in Molecular Biology)

The field of bacterial diagnostics has seen unprecedented advances in recent years. The increased need for accurate detection and identification of bacteria in human, animal, food, and environmental samples has fueled the development of new techniques. The field has seen extensive research aided by the information from bacterial genome...

Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)
Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)

Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols,...

CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
CCDA Exam Certification Guide ((CP) CERTIFICATION)
CCDA Exam Certification Guide ((CP) CERTIFICATION)
The official study guide for DCN exam #640-441Coverage of the CCDA exam design objectives enables you to discover your knowledge gaps before the exam date. You'll learn to:Characterize a customer's existing network and identify customer needsSimplify the complexities associated with analyzing customer network problems and creating Cisco scalable...
unlimited object storage image
Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy