Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem

Learn the key standards―iBeacon, Eddystone, Bluetooth 4.0, and AltBeacon―and how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.

Proximity technology―in...

No Logo : Taking Aim at the Brand Bullies
No Logo : Taking Aim at the Brand Bullies
If I squint, tilt my head, and shut my left eye, all I can see out the window is 1932, straight down to the lake. Brown warehouses, oatmeal-colored smokestacks, faded signs painted on brick walls advertising long-discontinued brands: "Lovely," "Gaywear." This is the old industrial Toronto of garment factories, furriers and...
FreeRADIUS Beginner's Guide
FreeRADIUS Beginner's Guide

This is a fast-paced Beginner's Guide that will take you step by step through the fundamentals of FreeRADIUS and using it in your live projects. It has been structured in a way that will let you get maximum practical information out of it in setting up your own FreeRADIUS server. It will guide you on all the aspects of FreeRADIUS and do...

Deploying Secure 802.11 Wireless Networks with Microsoft Windows
Deploying Secure 802.11 Wireless Networks with Microsoft Windows

Get in-depth technical guidance for deploying a security-enhanced wireless network for your corporate, public, or small business network—direct form the Microsoft Windows Networking and Communications team. This essential reference details the latest IEEE 802.11 and related technologies for public and private wireless LANs, including the...

Cisco Access Control Security : AAA Administration Services
Cisco Access Control Security : AAA Administration Services

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Hands-on techniques for enabling authentication, authorization, and
...

802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)

This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every...

RADIUS
RADIUS
RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS...
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Rotors: Stress Analysis and Design (Mechanical Engineering Series)
Rotors: Stress Analysis and Design (Mechanical Engineering Series)

Stress and strain analysis of rotors subjected to surface and body loads, as well as to thermal loads deriving from temperature variation along the radius, constitutes a classic subject of machine design. Nevertheless attention is limited to rotor profiles for which governing equations are solvable in closed form. Furthermore very few actual...

PPP Design, Implementation, and Debugging (2nd Edition)
PPP Design, Implementation, and Debugging (2nd Edition)
Extensively revised and expanded to cover the latest developments in PPP and network technology, this second edition addresses such current topics as:
  • PPP in today's telecommunications infrastructure
  • PPP and telephony
  • Optical (SONET/SDH) PPP links
  • The relationship between PPP and...
Google Maps Hacks
Google Maps Hacks

Want to find every pizza place within a 15-mile radius? Where the dog parks are in a new town? The most central meeting place for your class, club or group of friends? The cheapest gas stations on a day-to-day basis? The location of convicted sex offenders in an area to which you may be considering moving? The applications,...

Windows Server 2008: The Definitive Guide
Windows Server 2008: The Definitive Guide
This practical guide has exactly what you need to work with Windows Server 2008. Inside, you'll find step-by-step procedures for using all of the major components, along with discussions on complex concepts such as Active Directory replication, DFS namespaces and replication, network access protection, the Server Core edition, Windows PowerShell,...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy