Home | Amazing | Today | Tags | Publishers | Years | Search 
Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

The Tomes of Delphi : Basic 32-Bit
The Tomes of Delphi : Basic 32-Bit
Developer's Guide to Delphi Communications is another addition to the highly successful Delphi series from Wordware. This is the only title on the market that provides a comprehensive overview to the communications capability of Delphi relative to the major communications protocols, such as TCP/IP, MAPI, SMTP, and HTTP.

Reliable
...
Sams Teach Yourself Visual C++ 6 in 21 Days, Professional Reference Edition
Sams Teach Yourself Visual C++ 6 in 21 Days, Professional Reference Edition
For the majority of C++ programmers, the pace and style of David Chapman's Teach Yourself Visual C++ 6 in 21 Days will make a good deal of sense. The author covers all the essentials of basic Windows and Microsoft Foundation Classes (MFC) development, and then addresses several new features in Visual C++ 6, all while moving quickly enough...
IBM i5/iSeries Primer: Concepts and Techniques for Programmers, Administrators, and System Operators
IBM i5/iSeries Primer: Concepts and Techniques for Programmers, Administrators, and System Operators
This comprehensive, 35-chapter book is the ultimate resource and a "must-have" for every professional working with the i5/iSeries. It is perfect for novice and intermediate programmers as well as for system administrators and operators. In simple, straightforward style, the authors explain core i5/iSeries concepts and show you step...
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Local Area High Speed Networks (MTP)
Local Area High Speed Networks (MTP)
There is a great deal of change happening in the technology being used for local networks. As Web intranets have driven bandwidth needs through the ceiling, inexpensive Ethernet NICs and switches have come into the market. As a result, many network professionals are interested in evaluating these new technologies for implementation consideration....
Computer and Communication Networks
Computer and Communication Networks

As the number and variety of communication services grow, so do the challenges of designing cost-effective networks that meet the requirements of emerging technologies in wireless, sensor, and mesh networks. Computer and Communication Networks is the first book to offer balanced coverage of all these topics using...

Solaris(TM) Internals: Solaris 10 and OpenSolaris Kernel Architecture (2nd Edition)
Solaris(TM) Internals: Solaris 10 and OpenSolaris Kernel Architecture (2nd Edition)

"The Solaris™Internals volumes are simply the best and most comprehensive treatment of the Solaris (and OpenSolaris) Operating Environment. Any person using Solaris--in any capacity--would be remiss not to include these two new volumes in their personal library. With advanced...

JMX in Action
JMX in Action
Covering the Java Management Extensions specification, this guide teaches programmers how JMX can provide robust management and monitoring capabilities for Java and non-Java resources including hardware. Going beyond covering the API, real-life examples and useful code are demonstrated in detail. In addition to describing the JMX...
IP Over WDM
IP Over WDM

IP over WDM explores the coming together of communication and computer networking technologies: optical fiber using WDM (Wavelength Division Multiplexing) and IP - the Internet Protocol.

Fiber optics technology is revolutionizing the telecommunications and networking industries by offering the enormous capacity required to...

Cisco: The Complete Reference
Cisco: The Complete Reference
The Definitive Reference for Mastering Cisco Technology

Get up to speed on Cisco-related hardware and technology with this dual-purpose resource. Providing you with both technical background as well as on-the-job information--including configuration notes and hands-on commands--this useful reference is truly comprehensive in coverage. From the...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy