Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Broadband Bible, Desktop Edition
Broadband Bible, Desktop Edition

It’s better with broadband, and you can do it...

Whether you need Internet access to work from home, operate a home-based business, run a small business, or simply enjoy all the wonders of the Web, broadband is better. This guide makes it easy to choose among the many broadband options, get connected, set up...

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Network Warrior
Network Warrior

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very...

Practical TCP/IP: Designing, Using, and Troubleshooting TCP/IP Networks on Linux(R) and Windows(R)
Practical TCP/IP: Designing, Using, and Troubleshooting TCP/IP Networks on Linux(R) and Windows(R)
Practical TCP/IP is the only book you need to ensure that your networks work. With this book you learn by doing as well as reading. Split into 4 Parts, this book has a unique modular approach that facilitates in-depth and easy learning. The detailed appendices make this a desktop book you cannot be without.

Based on years of...

Internet Firewalls and Network Security
Internet Firewalls and Network Security
INTERNET FIREWALLS AND NETWORK SECURITY, SECOND EDITION is designed for system
administrators and interested users who realize the risks involved in connecting a computer
system to the Internet.

In days of old, brick walls were built between buildings in apartment complexes so that
if a fire broke out, it would not spread
...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy