Home | Amazing | Today | Tags | Publishers | Years | Search 
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition

Here's the book you need to prepare for Cisco's CCIE Qualification and Lab Exams. This Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of all exam objectives
  • Hundreds of challenging practice questions, in...
Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
The only Cisco-endorsed study guide for the new CCNA #640-507 examCoverage of all CCNA exam topics enables you to discover and fill your knowledge gaps before sitting the exam. You will learn about:Internetworking functions of each layer of the OSI reference model and how they are performed in network devicesDesign, implementation, configuration,...
Sensor Network Operations
Sensor Network Operations

Designing and operating sensor networks, featuring leading researchers and the latest, yet unpublished findings

Sensor Network Operations introduces mission-oriented sensor networks as distributed dynamic systems of interacting sensing devices, which function as a network to execute complex...

Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
Knowledge-Based Intelligent Techniques in Character Recognition
Knowledge-Based Intelligent Techniques in Character Recognition
Knowledge-Based Intelligent Techniques in Character Recognition presents research results on intelligent character recognition techniques, reflecting the tremendous worldwide interest in the applications of knowledge-based techniques in this challenging field. This resource will interest anyone involved in computer science, computer engineering,...
Patterns in Network Architecture: A Return to Fundamentals
Patterns in Network Architecture: A Return to Fundamentals
Groundbreaking Patterns for Building Simpler, More Powerful Networks

 

In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the...

Windows Home Server: Protect and Simplify your Digital Life
Windows Home Server: Protect and Simplify your Digital Life
Secure and share your digital f iles at home.

Access them from virtually anywhere.

Photos. Tax records. Personal correspondence. Music and movies. Your home network contains much of what's vital to your life in today's digital world. You need to secure and back up those files. You need to be...

CCDA Official Exam Certification Guide (Exam 640-863) (3rd Edition)
CCDA Official Exam Certification Guide (Exam 640-863) (3rd Edition)
CCDA Official Exam Certification Guide, Third Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the topics for the DESGN exam. Senior networking consultants Anthony Bruno and Steve Jordan expertly cover the latest exam content, helping you identify areas of weakness and improve your knowledge of Cisco network...
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
There are two camps of service providers who make money off of the residential Internet users today. Camp one is made up of the Googles, Yahoos, and AOLs who are often referred to as “over the top” or WEB 2.0 service providers. This camp doesn’t need IMS, or at least they haven’t shown much interest in IMS. On the other...
Troubleshooting Microsoft Technologies: The Ultimate Administrator's Repair Manual (The Addison-Wesley Microsoft Technology Series)
Troubleshooting Microsoft Technologies: The Ultimate Administrator's Repair Manual (The Addison-Wesley Microsoft Technology Series)
Many IT professionals have long considered the practice of troubleshooting to be more of an art than a science. However, with the right methodology, anyone can systematically analyze and repair problems affecting an individual computer or an entire network. All it requires is an understanding of the technologies involved, knowledge of the available...
Principles of Protocol Design
Principles of Protocol Design
This book introduces the reader to the principles used in a broad selection of modern data communication protocols and basic algorithms for use in distributed applications, including not only simple point-to-point data transfer protocols but also multi-party protocols and protocols for ensuring data security. The presentation uses CSP notation to...
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy