Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

A Practical Guide to Content Delivery Networks
A Practical Guide to Content Delivery Networks
A Practical Guide to Content Delivery Networks offers an organized approach to implementing the networks responsible for the distribution of various types of Web traffic, including standard Web pages and streaming audio and video. Because CDN operations are normally performed by independent organizations, the successful use of vendor facilities...
Web Programming Unleashed
Web Programming Unleashed
This comprehensive tome explores all aspects of the latest technology craze-Internet programming. Programmers will turn to the proven expertise of the Unleashed series for accurate, day-and-date information on this hot new programming subject.

Today, the Internet and intranets are exploding like wildfire. The article, "VISA Moves to
...
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing...
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

TCP/IP First-Step
TCP/IP First-Step

Your first step into the world of TCP/IP

  • No TCP/IP experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

Your...

Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Java Network Programming, Third Edition
Java Network Programming, Third Edition

Java's growth over the last 10 years has been nothing short of phenomenal. Given Java's rapid rise to prominence and the even more spectacular growth of the Internet, it's a little surprising that network programming in Java is still so mysterious to so many. It doesn't have to be. In fact, writing network programs in Java...

Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy