Home | Amazing | Today | Tags | Publishers | Years | Search 
ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Networking Bible
Networking Bible
Whether you're setting up a global infrastructure or just networking two computers at home, understanding of every part of the process is crucial to the ultimate success of your system. This comprehensive book is your complete, step-by-step guide to networking—from different architectures and hardware to security, diagnostics, Web services,...
The Art of Computer Networking
The Art of Computer Networking
This book, like so many, has grown from an undergraduate Networking course. Its current content is rather more than a single course could comfortably cover, though it is all relevant for an adventurer into the jungle of networks.

It is somewhat biased towards the Internet and the protocols the Internet uses, namely TCP/IP. Other network
...
Linux® Programming Bible
Linux® Programming Bible

The Linux Programming Bible is the definitive reference for beginning and veteran Linux programmers. Written by John Goerzen, a developer for the Debian GNU/Linux Distribution, this comprehensive guide leads you step by step from simple shell programs to sophisticated CGI applications.

You'll find complete coverage of Linux...

Ad Hoc Mobile Wireless Networks: Protocols and Systems
Ad Hoc Mobile Wireless Networks: Protocols and Systems

The authoritative guide to the state of the art in ad hoc wireless networking.

  • Reflects the field's latest breakthroughs

  • Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much...

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The...

Wireless Network Administration A Beginner's Guide
Wireless Network Administration A Beginner's Guide

Learn the essentials of wireless networking

Configure, manage, and secure wireless networks using the step-by-step details in this practical resource. Wireless Network Administration: A Beginner's Guide shows you how to work with the latest wireless networking standards, including the 802.11x family, on Windows, Mac,...

Overlay Networks: Toward Information Networking.
Overlay Networks: Toward Information Networking.

A recent Cisco traffic forecast indicates that annual global IP traffic will reach two-thirds of a zettabyte by 2013. With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the...

A Practical Guide to Content Delivery Networks, Second Edition
A Practical Guide to Content Delivery Networks, Second Edition

Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today's always on mobile society. Describing how content delivery networks...

Nmap Cookbook: The Fat-free Guide to Network Scanning
Nmap Cookbook: The Fat-free Guide to Network Scanning

Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results. Topics covered include: * Installation on Windows, Mac...

Computer Networks ISE: A Systems Approach
Computer Networks ISE: A Systems Approach

I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...

Network+ Guide to Networks
Network+ Guide to Networks

Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill. This book first introduces the fundamental building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. It then provides in-depth coverage of the most important concepts in...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy