Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Global Specification and Validation of Embedded Systems: Integrating Heterogeneous Components
Global Specification and Validation of Embedded Systems: Integrating Heterogeneous Components
Global modelling and validation is required to master the design of systems made of heterogeneous components. These systems are now omnipresent in our life, and they may be found in several domains such as communications (ex. mobile terminals, optical switches), health (e.g. cardiac stimulators, cochlear implants), transportation (ex. automotive...
Cisco Networking Essentials
Cisco Networking Essentials

An engaging approach for anyone beginning a career in networking

As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco...

High-Speed Cisco Networks: Planning, Design, and Implementation
High-Speed Cisco Networks: Planning, Design, and Implementation
Cisco's routers, hubs, and switches are the core of both the Internet and today's high-speed networks. To make sure you design the right high-speed network for your needs, you need High-Speed Cisco Networks. This book shows you how to: o Sell advanced LAN/WAN technology and its benefits to upper management o Make your department more productive...
Softswitch : Architecture for VoIP (Professional Telecom)
Softswitch : Architecture for VoIP (Professional Telecom)
SOFTSWITCH DISSECTED

SOFT OR HARD? Hardware switches can cost tens of millions and occupy a city block in real estate. Softswitches are a fraction of the cost and the size of a refrigerator. Bypassing big iron can also make for a more efficient development environment, potentially offering more...

iPhone and iPad Apps for Absolute Beginners
iPhone and iPad Apps for Absolute Beginners

So how do you build an application for the iPhone and iPad? Don’t you need to spend years learning complicated programming languages? What about Objective-C and Cocoa touch? The answer is that you don’t need to know any of those things! Anybody can start building simple apps for the iPhone and iPad, and this book will show you...

Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way

Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the "in case of emergency" basics will take you far.

Just like the original, this second edition of the highly acclaimed Cisco Routers for the...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Network Know-How: An Essential Guide for the Accidental Admin
Network Know-How: An Essential Guide for the Accidental Admin

Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers is to create a network. But how do you do that?

Network Know-How is your guide to connecting your machines, filled with...

IBM System Storage Solutions Handbook
IBM System Storage Solutions Handbook

This IBM® Redbooks® publication provides overviews and pointers for information about the most current IBM System StorageTM products, showing how IBM delivers the right mix of products for nearly every aspect of business continuance and business efficiency. IBM System Storage products can help you store, safeguard, retrieve, and share...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy