Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The...

Cisco TCP/IP Routing Professional Reference
Cisco TCP/IP Routing Professional Reference

Updated and expanded to include the latest information on implementing TCP/IP over Cisco routers, this sought-after reference gives you just what Cisco documentation doesn't: crystal-clear, step-by-step instructions for every aspect of running TCP/IP on...

Signaling in Telecommunication Networks
Signaling in Telecommunication Networks
Guidance to help you grasp even the most complex network structures and signaling protocols

The Second Edition of Signaling in Telecommunication Networks has been thoroughly updated, offering new chapters and sections that cover the most recent developments in signaling systems and procedures. This acclaimed book...

Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Cisco IOS in a Nutshell
Cisco IOS in a Nutshell
This two-part reference covers IOS configuration for the TCP/IP protocol family. The first part includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. The second part is a classic O'Reilly-style quick reference to all the commands you need to work with...
Internet Technologies Handbook: Optimizing the IP Network
Internet Technologies Handbook: Optimizing the IP Network
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -...
CompTIA Network+ (N10-004) Cert Guide
CompTIA Network+ (N10-004) Cert Guide

Learn, prepare, and practice for exam success

  • Master every topic on the newest 2010 Network+ exam.
  • Assess your knowledge and focus your learning.
  • Get the practical workplace knowledge you need!

Start-to-finish Network+ preparation from...

Windows Networking Troubleshooting (Windows Troubleshooting)
Windows Networking Troubleshooting (Windows Troubleshooting)

Learn how to set up and configure networks to create robust connections, and how to quickly diagnose and repair problems should something go wrong. Whatever version of Windows you are using, you will need a stable Internet connection and access to your company network and its shared files and resources. When a network connection fails, it can...

Sams Teach Yourself Samba in 24 Hours
Sams Teach Yourself Samba in 24 Hours
Sams Teach Yourself Samba in 24 Hours is a tutorial designed to help you integrate Linux/UNIX-based systems with Windows-based systems. It has all the information and tools necessary for you to be up and running with Samba in 24 short lessons. Learn how to use Samba to its fullest potential. Topics range from introducing Samba and Samba...
Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)
UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)
This book describes four different forms of IPC in detail:
  1. message passing (pipes, FIFOs, and message queues),
  2. synchronization (mutexes, condition variables, read-write locks, file and record locks, and semaphores),
  3. shared memory (anonymous and named), and
  4. remote...
Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor

Get the inside scoop on Hyper-V for Windows Server 2008 R2

Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy