Home | Amazing | Today | Tags | Publishers | Years | Search 
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Foundation Flash Applications for Mobile Devices
Foundation Flash Applications for Mobile Devices
In this book you'll learn:
  • The essentials of Flash Lite 1.1 and 2.X

  • How to create mobile applications and games

  • Best practices for structuring your mobile applications, from starting out to final deployment

  • How to integrate graphics, sound, and video...
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
The all-time best-selling TCP/IP book, this is still the reference for anyone who wants to learn about or work with the TCP/IP protocol suite. Justly renowned for its clarity and accessibility,this superb text covers wide area Internet backbones as well as local area network technologies like FDDI and Ethernet. This is volume 1 of a 3 part set...
System-on-a-Chip: Design and Test
System-on-a-Chip: Design and Test
This project started as an interim report. The purpose was to communicate
to various groups within Advantest about the main issues for system-on-achip
(SoC) design and testing and the common industrial practices. Over
one year’s time, a number of people contributed in various capacities to complete
this report.
...
Building the Perfect PC
Building the Perfect PC
This popular Build-It-Yourself (BIY) PC book covers everything you want to know about building your own system: Planning and picking out the right components, step-by-step instructions for assembling your perfect PC, and an insightful discussion of why you'd want to do it in the first place. Most big brand computers from HP, Dell and others use...
JSTL: JSP Standard Tag Library Kick Start
JSTL: JSP Standard Tag Library Kick Start

The JSP Standard Tag Library is a collection of commonly used functions and tools invaluable to JSP developers to avoid re-creating the same functions on site after site. Sun has indicated that JSP development should be based around using tag libraries going forward, and will relase JSP STL, as their official library. This book starts with an...

Web Client Programming with Perl
Web Client Programming with Perl

If you've ever wanted to learn more about Web protocols so you could build custom client-side tools to automate tasks--or just so you have a better understanding of what's happening behind the scenes--then Web Client Programming with Perl is the book for you. Wong explains HTTP (Hypertext Transfer Protocol) requests and...

Socket.IO Real-time Web Application Development
Socket.IO Real-time Web Application Development

Build modern real-time web applications powered by Socket.IO

Overview

  • Understand the usage of various socket.io features like rooms, namespaces, and sessions.
  • Secure the socket.io communication.
  • Deploy and scale your socket.io and Node.js applications in production.
  • ...
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
    The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security...
Patterns in Java, Volume 2
Patterns in Java, Volume 2
Mark Grand's Patterns in Java, Volume 2 offers a grab bag of 50 reusable patterns for Java developers. Together, these patterns can improve your graphical user interface (GUI) design, testing, and the overall robustness of your next Java project.

After a short introduction to patterns and UML (unified modeling language) basics, the...

Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy