|
|
|
|
|
| | Cisco IOS in a NutshellThis two-part reference covers IOS configuration for the TCP/IP protocol family. The first part includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. The second part is a classic O'Reilly-style quick reference to all the commands you need to work with... | | Internet Technologies Handbook: Optimizing the IP NetworkThe Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -... |
|
|
Instant Citrix Security How-to
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.
"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing... | | UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)This book describes four different forms of IPC in detail:
- message passing (pipes, FIFOs, and message queues),
- synchronization (mutexes, condition variables, read-write locks, file and record locks, and semaphores),
- shared memory (anonymous and named), and
- remote
... | | Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Get the inside scoop on Hyper-V for Windows Server 2008 R2
Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to... |
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |