Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco BSCI Exam Cram 2 (Exam Cram 642-801)
Cisco BSCI Exam Cram 2 (Exam Cram 642-801)

The Exam Cram Method of study focuses on exactly what you need to getcertified now. In this book you'll learn how to:

  • Distinguish the differences between link-state and distance vector protocols, and classfull and classless routing

  • ...
Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are...

The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination

This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to...

Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)
Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)
The 3rd edition of the well-known reference, Java in a Nutshell, covers the essential APIs of Java 1.2, including networking, security, input and output, and basic language and utility classes. Due to the size of the Java 1.2 API, graphics and graphical user interface classes are now examined in a volume called Java Foundation Classes...
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Management, Control, and Evolution of IP Networks
Management, Control, and Evolution of IP Networks
Starting with various aspects of quality of service and the evolution of IP networks, this book covers the improvement of addressing in IP version 6, enhanced security, and the adaptation of video for the Internet and voice over IP. New generations of IP networks are discussed including the future of pervasive networks, wi-fi, the control of...
Operating Systems: Internals and Design Principles (5th Edition) (GOAL Series)
Operating Systems: Internals and Design Principles (5th Edition) (GOAL Series)
This book covers concepts, structure, and mechanisms of operating systems. Stallings presents the nature and characteristics of modern-day operating systems clearly and completely. Includes major programming projects. Offers step-by-step web support with CD/Rom Resources. A basic reference for those interested in learning...
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
This succinct new edition of our best-selling title presents everything you need know to get up and running with C sockets programming in one affordable volume!

The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to
...
JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

TSP: Leading a Development Team (The SEI Series in Software Engineering)
TSP: Leading a Development Team (The SEI Series in Software Engineering)

Leaders of software-development projects face many challenges. First, you must produce a quality product on schedule and on budget. Second, you must foster and encourage a cohesive, motivated, and smoothly operating team. And third, you must maintain a clear and consistent focus on short- and long-term goals, while exemplifying quality...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

unlimited object storage image
Result Page: 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy