Home | Amazing | Today | Tags | Publishers | Years | Search 
IP Routing Primer (Networking Technology)
IP Routing Primer (Networking Technology)
A thorough guide to understanding IP behavior in a router-based networkLearn IP behavior in a Cisco router-based network from an expertExamine proven, effective troubleshooting techniques to eliminate the need for additional technical supportMaster IP fundamentals that everyone supporting an IP network needs to knowStudy visual explanations of...
Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

Linux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible
Learn all the command lines for all Linux shells in this one-stop guide

There's a lot to be said for going back to basics. Not only does this Bible give you a quick refresher on the structure of open-source Linux software, it also shows you how to bypass the hefty graphical user interface on Linux systems and start...

Mastering Network Security
Mastering Network Security
Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

CCNA Wireless Official Exam Certification Guide  (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide
  • Master IUWNE 640-721 exam topics with the official study guide
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with Exam Preparation Tasks
  • Practice with realistic exam questions on the CD-ROM
...
Sams Teach Yourself Networking in 24 Hours (3rd Edition)
Sams Teach Yourself Networking in 24 Hours (3rd Edition)
You can't go too far in technology these days without at least a casual understanding of data communications over local and wide-area networks (LANs and WANs). Sams Teach Yourself Networking in 24 Hours will clue you in on the seven-layer Open Systems Interconnect (OSI) networking abstraction and other key facts and concepts having to do...
Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
FreeBSD Corporate Networker's Guide (With CD-ROM)
FreeBSD Corporate Networker's Guide (With CD-ROM)

"FreeBSD has been the secret weapon of serious network administrators for many years now and this book should provide a welcome introduction to those who have yet to discover it for themselves."
--Jordan Hubbard, Co-founder, The FreeBSD Project

FreeBSD is the engine that runs on some...

Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy