Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
In just 24 lessons of one hour or less, you will uncover the inner workings of TCP/IP. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of TCP/IP from the ground up.

 

Practical discussions provide...

TCP/IP Primer Plus
TCP/IP Primer Plus
There's no shortage of books about the protocols that enable the Internet to work, and TCP/IP Primer Plus faces a tall order as it attempts to distinguish itself from its competitors. It succeeds in doing so thanks to the degree of detail with which it treats the TCP/IP standards. Every last bit--that's bit as in binary...
Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Programming Internet Email
Programming Internet Email
The Internet's "killer app" is not the World Wide Web or Push technologies: it is humble electronic mail. More people use email than any other Internet application. As the number of email users swells, and as email takes on an ever greater role in personal and business communication, Internet mail protocols have become not just an...
Microsoft Exchange Server 2007: The Complete Reference (Complete Reference Series)
Microsoft Exchange Server 2007: The Complete Reference (Complete Reference Series)
Exchange Server 2007 is a large and complex piece of software—actually many pieces—with many features and capabilities. More than four years in the making, Exchange 2007 (and more recently Exchange 2007 Service Pack 1) represents an entirely new breed of Exchange Server. Exchange 2007 is not simply e-mail. It’s many forms of...
Professional .NET Network Programming
Professional .NET Network Programming

Network programming is one of the core tasks of enterprise-level development-the need for disparate computers to communicate efficiently and securely, whether within the same building, or across the world, remains fundamental to the success of many systems. With the .NET Framework comes a new set of classes for tackling...

Data and Computer Communications
Data and Computer Communications
Awarded the Texty Award by the Textbook and Academic Authors Association for the best computer science and engineering textbook of 1997. Key Benefit: This book provides a clear and comprehensive survey of the whole field of data and computer communications and provides an up-to-date tutorial on leading-edge networking technologies. Since its...
Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

**Covers Nagios 2.0**

"WOW! This books is incredibly detailed and Wolfgang has done an excellent job. I don't think I could have gone into that much detail if I wrote a book mysel. Kudos!" —Ethan Galstad, Nagios main developer

Good system administrators know about problems long before anyone asks,...

Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)
Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)

A practical guide to networking fundamentals

Fully up to date with the latest technologies, this introductory handbook covers wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, virtualization, and more. After laying the groundwork, Networking: A Beginner's Guide, Fifth...

Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy