Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

NTP Security: A Quick-Start Guide
NTP Security: A Quick-Start Guide

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.

NTP Security: A Quick-Start...

Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Automating Microsoft Azure with Powershell
Automating Microsoft Azure with Powershell

Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments

About This Book

  • Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
  • ...
Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance (Wiley Self Teaching Guides)
Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance (Wiley Self Teaching Guides)
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find this a valuable and up-to-date resource. This hands-on guide is designed so that you can select,...
Nginx: From Beginner to Pro
Nginx: From Beginner to Pro

Teaches you to start up Nginx and quickly take your expertise to a level where you can comfortably work with various aspects of the web server and make informed design decisions for your web farm. Nginx powers more than 40% of the top 1000 websites and is among the handful of web servers that can handle more than 10K simultaneous connections....

Understanding IPv6, Second Edition
Understanding IPv6, Second Edition
Now updated for Windows Server 2008 and Windows Vista, this guide delivers in-depth technical information on Internet Protocol version 6 (IPv6). IPv6 greatly improves on IPv4, the current protocol, by vastly increasing the number of available addresses and by adding enhancements for security, multimedia traffic management, routing, and network...
Algorithms Unplugged
Algorithms Unplugged

Algorithms specify the way computers process information and how they execute tasks. Many recent technological innovations and achievements rely on algorithmic ideas – they facilitate new applications in science, medicine, production, logistics, traffic, communi¬cation and entertainment. Efficient algorithms not only enable your...

Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO (From Technologies to Solutions)
Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO (From Technologies to Solutions)
In Detail

Blogger is a blog publishing system from Google with a friendly interface specifically designed for creating and maintaining weblogs.

It allows users to easily create dynamic blogs with great content and many outstanding features including RSS feeds, link-backs, photo slideshows, and integration with...

Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP

Search engine optimization (SEO) is not only the job of the marketing department. It must be considered from a web site's inception and throughout its lifetime by you, the web site developer. Making changes to the architecture of a web site and modifying presentation techniques...

Result Page: 49 48 47 46 45 44 43 42 41 40 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy