Home | Amazing | Today | Tags | Publishers | Years | Search 
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Mastering Network Security
Mastering Network Security
Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or...
Linux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible
Learn all the command lines for all Linux shells in this one-stop guide

There's a lot to be said for going back to basics. Not only does this Bible give you a quick refresher on the structure of open-source Linux software, it also shows you how to bypass the hefty graphical user interface on Linux systems and start...

Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

IP Routing Primer (Networking Technology)
IP Routing Primer (Networking Technology)
A thorough guide to understanding IP behavior in a router-based networkLearn IP behavior in a Cisco router-based network from an expertExamine proven, effective troubleshooting techniques to eliminate the need for additional technical supportMaster IP fundamentals that everyone supporting an IP network needs to knowStudy visual explanations of...
The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless
The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless
Broadband wireless networks bring us closer to the Internet's ultimate destiny of interconnecting everyone, everywhere. But wireless networking can be a bit geeky and nerve-wracking without a proper guide. Let's face it: Networking can be hard.

If you're one of the last holdouts still connected to the Internet by a wire, The Book of...

CCNA Exam Cram (Exam 640-802) (3rd Edition)
CCNA Exam Cram (Exam 640-802) (3rd Edition)
“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition
FreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.

Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Todd Lammle's CCNA IOS Commands Survival Guide
Todd Lammle's CCNA IOS Commands Survival Guide
Let Todd Lammle help you master IOS commands for CCNA prep

To become a Cisco Certified Network Associate (CCNA), you must learn the hundreds of IOS commands used by Cisco routers and switches. This handy reference from Cisco networking authority Todd Lammle is just what you need to master those commands.

From a...

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy