Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
Content Networking Fundamentals
Content Networking Fundamentals

A comprehensive introduction to the theory and practical applications of content networking 

  • Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and...

Getting to Know Vue.js: Learn to Build Single Page Applications in Vue from Scratch
Getting to Know Vue.js: Learn to Build Single Page Applications in Vue from Scratch

Learn how to render lists of items without repeating your code structure and how to work with conditional rendering items and event handling. Containing all you need to know to get started with Vue.js, this book will take you through using build tools (transpile to ES5), creating custom components, state management, and...

Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Critically acclaimed text for computer performance analysis—now in its second edition

The Second Edition of this now-classic text provides a current and thorough treatment of queueing systems, queueing networks, continuous and discrete-time Markov chains, and simulation. Thoroughly updated with...

Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Essential SNMP
Essential SNMP
The Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing hosts on an IP network. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, UPSs, and more.

Essential SNMP is a practical introduction to SNMP for network and system
...
Juniper MX Series
Juniper MX Series

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection,...

Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition
Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition

Harness the power of Linux to create versatile and robust embedded solutions

Key Features

  • Learn how to develop and configure robust embedded Linux devices
  • Explore the new features of Linux 5.4 and the Yocto Project 3.1 (Dunfell)
  • Discover different ways to...
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
TCP/IP Professional Reference Guide
TCP/IP Professional Reference Guide
The TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy