Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

Agent-oriented Methodologies
Agent-oriented Methodologies
Building software to solve contemporary business problems is no easy task.
Over the last decade there has been an increasing focus on object-oriented
notations and modelling languages, perhaps at the expense of a full methodological
approach to solving the problem and giving software developers the
tools they need to
...
Understanding Enterprise SOA
Understanding Enterprise SOA
This book is for anyone in the business world or in the public sector who needs to make sense of the new emerging standards for virtually all major information technology decisions. For business professionals, this book is meant to explain and clarify—in business terms—the way web services and SOA work in a business setting. For IT...
Expert Service-Oriented Architecture in C# 2005, Second Edition
Expert Service-Oriented Architecture in C# 2005, Second Edition

Expert Service-Oriented Architecture in C# 2005, Second Edition will immerse you in updated code and reference material specifically architected for Visual Studio 2005 and Web Services Enhancements (WSE) 3.0. With this book, you can get a head start on building SOA applications using the clear, conceptual discussions and practical...

Computer Network Security
Computer Network Security
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

SQL For Dummies
SQL For Dummies

Learn SQL the fun and easy way – no programming experience needed!

SQL For Dummies, 7th Edition, shows programmers and web developers how to use SQL to build relational databases and get valuable information from them. This book covers the core features of the SQL language. Topics covered include how to use SQL to...

Network Your Computers & Devices Step by Step
Network Your Computers & Devices Step by Step

In a modern home, it is no longer unusual for family members to own multiple computers and network devices. In most houses, you can find at least a desktop computer, which is generally used for more performance-intensive tasks such as gaming or professional work of any kind. Parents bring home their work laptops or notebooks, which they...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
The qmail Handbook
The qmail Handbook
  • Provides thorough instruction for installing, configuring, and optimizing qmail
  • Includes coverage of secure networking, troubleshooting issues, and mailing list administration
  • Covers what system administrators want to know by concentrating on qmail issues relevant to daily operation
  • ...
Adobe Acrobat 7 in the Office
Adobe Acrobat 7 in the Office
Offering a raft of Microsoft Office collaboration features (plus the ability to review and comment on Acrobat Procreated documents using just Reader), Acrobat is no longer just for pre-press and creative professionals. Acrobat can simplify workflows in all kinds of business settings. All you need is this handy guide to delineate those uses and show...
unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy