Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Content Computing: Advanced Workshop on Content Computing, AWCC 2004
Content Computing: Advanced Workshop on Content Computing, AWCC 2004

This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.

The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile...

Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
CCNA for Dummies
CCNA for Dummies
What was that whizzing sound? It was you, passing the CCNA certification exam. After you've covered all of Cisco Systems' exam objectives in CCNA For Dummies, such tasks as following network protocols, routing, and maintaining network security will be new tools to add to your skill set.

First, expect to become familiar with the language of...

Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Exclusively dedicated to Mobile TV, this book provides a detailed insight to mobile multimedia characterized efficient compression techniques, protocols formalized by 3GPP or 3GPP2, capabilities of broadcast, and mobile networks for delivering multimedia content. Network requirements such as spectrum; chipsets, software and handsets which enable...
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
Delphi for .NET Developer's Guide
Delphi for .NET Developer's Guide
Master Microsoft's .NET Framework using Delphi.

This book provides expert knowledge of both Delphi and. NET with the same, practicable and real-world solutions approach used in previous Delphi Developer's Guides. Delphi for .NET Developer's Guide is a new edition of the #1 Delphi book by authors Xavier Pacheco and Steve Teixeira. This newest...

Red Hat Fedora Linux 3 For Dummies
Red Hat Fedora Linux 3 For Dummies
Get online with broadband DSL and build Web pages

Install Fedora Core 3, use OpenOffice.org, play CDs, and set up a firewall

The penguin is back, and better than ever! And this friendly guide will help you install and configure the new edition of Fedora Core so you can use exciting features like the SELinux infrastructure, which...

unlimited object storage image
Result Page: 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy