Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Telephony Systems with OpenSIPS 1.6
Building Telephony Systems with OpenSIPS 1.6

SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...

Network Know-How: An Essential Guide for the Accidental Admin
Network Know-How: An Essential Guide for the Accidental Admin

Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers is to create a network. But how do you do that?

Network Know-How is your guide to connecting your machines, filled with...

CCNP SWITCH 642-813 Official Certification Guide (Exam Certification Guide)
CCNP SWITCH 642-813 Official Certification Guide (Exam Certification Guide)
CCNP SWITCH 642-813 Official Certification Guide

is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® SWITCH exam. Network architect and best-selling author Dave Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your...

Deploying Cisco Wide Area Application Services (2nd Edition)
Deploying Cisco Wide Area Application Services (2nd Edition)

Implement advanced WAN optimization, application acceleration, and branch virtualization with Cisco WAAS 4.1

 

This book brings together all the information you need to design and deploy scalable, transparent application acceleration, WAN optimization, and branch...

Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

Authorized Self-Study Guide

Implementing Cisco IOS Network Security (IINS)

 

Foundation learning for CCNA Security IINS 640-553 exam

 

...

Network Your Computers & Devices Step by Step
Network Your Computers & Devices Step by Step

In a modern home, it is no longer unusual for family members to own multiple computers and network devices. In most houses, you can find at least a desktop computer, which is generally used for more performance-intensive tasks such as gaming or professional work of any kind. Parents bring home their work laptops or notebooks, which they...

Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification

The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical...

Packet Guide to Routing and Switching
Packet Guide to Routing and Switching

For a long time, I was very happy building Ethernet networks, working with switches and then moving to 802.11. It took awhile, but eventually I realized that the world of interconnected networks cannot be reached with Layer 2 alone. In addition, as you spread your wings from the Layer 2 broadcast domains, you encounter the wonders of...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Computer Networks ISE: A Systems Approach
Computer Networks ISE: A Systems Approach

I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...

Full-Chip Nanometer Routing Techniques (Analog Circuits and Signal Processing)
Full-Chip Nanometer Routing Techniques (Analog Circuits and Signal Processing)

At 90 nm, wires account for nearly 75% of the total delay in a circuit. Even more insidious, however, is that among nearly 40% of these nets, more than 50% of their total net capacitance are attributed to the cross-coupling capacitance between neighboring signals. At this point a new design and optimization paradigm based on real wires is...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy