Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Server 2012 Pocket Consultant
Windows Server 2012 Pocket Consultant
Welcome to Windows Server 2012 Pocket Consultant. Over the years, I’ve written about many different server technologies and products, but the one product I like writing about the most is Microsoft Windows Server. For anyone transitioning to Windows Server 2012 from an earlier release of Windows Server,...
Windows 8 Administration Pocket Consultant
Windows 8 Administration Pocket Consultant
Writing Windows 8 Administration Pocket Consultant was a lot of fun—and a lot of work. As I set out to write this book, my initial goals were to determine how Windows 8 was different from its predecessors and what new features and options were available. As with any new operating system, I had to do a...
OPC Unified Architecture
OPC Unified Architecture
The OPC Foundation provides specifications for data exchange in industrial automation. There is a long history of COM/DCOM-based specifications, most prominent OPC Data Access (DA), OPC Alarms and Events (A&E), and OPC Historical Data Access (HDA), which are widely accepted in the industry and implemented by almost every...
Cloud Standards: Agreements That Hold Together Clouds
Cloud Standards: Agreements That Hold Together Clouds

Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...

Jump Start Node.js
Jump Start Node.js
One of the difficulties I had when trying to learn Node.js was how to get started. The references that I found either dealed with quasi-academic topics such as datagrams and event emitters, or else myopically focused on a topic without regard for the big picture. This book takes you through the complete process of...
IP Routing
IP Routing

This concise guide offers the basic concepts of IP routing, free of hype and jargon. It begins with the simplest routing protocol, RIP, and then proceeds, in order of complexity, to IGRP, EIGRP, RIP2, OSPF, and finally to BGP. New concepts are presented one at a time in successive chapters. By the end, you will have mastered not only...

Windows Server 2012 Inside Out
Windows Server 2012 Inside Out
Welcome to Windows Server 2012 Inside Out. As the author of many popular technology books, I’ve been writing professionally about Windows and Windows Server since 1994. Over the years, I’ve gained a unique perspective—the kind of perspective you can gain only after working with technologies for many years. The...
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams.

This two-in-one Study Guide provides:

  • In-depth coverage of all exam topics
  • Practical information on implementing Cisco's Secure PIX and Secure VPN technologies
  • ...
Wireshark® 101: Essential Skills for Network Analysis
Wireshark® 101: Essential Skills for Network Analysis

This book is written for beginner analysts and includes 46 step-by-step labs to walk you through many of the essential skills contained herein. This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a...

Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Instant Netcat Starter
Instant Netcat Starter

As a featured networking utility, Netcat uses TCP/IP protocols to read and write data across network connections. Netcat is a feature rich backend network debugging and exploration tool with the ability to create almost any type of connection you would need.

"Instant Netcat Starter Guide" is a practical, hands-on guide...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy