Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Secure Intrusion Detection System
Cisco Secure Intrusion Detection System

Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...

Extending and Embedding PHP
Extending and Embedding PHP
In just a few years PHP has rapidly evolved from a small niche language to a powerful web development tool. Now in use on over 14 million Web sites, PHP is more stable and extensible than ever. However, there is no documentation on how to extend PHP; developers seeking to build PHP extensions and increase the performance and functionality of their...
Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
CCNP Security IPS 642-627 Official Cert Guide
CCNP Security IPS 642-627 Official Cert Guide

Learn, prepare, and practice for exam success

 

CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,...

Aquatic Invasions in the Black, Caspian, and Mediterranean Seas
Aquatic Invasions in the Black, Caspian, and Mediterranean Seas
The present volume contains the presentations of a NATO advanced Research Workshop
(ARW) entitled “The invasion of the Black, Mediterranean and Caspian Seas by the
American Ctenophore, Mnemiopsis leidyi Agassiz: a multidisciplinary perspective
and a comparison with other aquatic invasions”, held on 24 - 26 June 2002 in
...
Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Obtain a clear understanding of how routing information and traffic flows on a multivendor network

Routing policies for networks are often complex and not well understood. Many books detail the operation of routing protocols such as OSPF or BGP, but none place the protocols in the context of routing policies and the real world of ISP peering...

Satellite Networking : Principles and Protocols
Satellite Networking : Principles and Protocols
Satellite networking is an exciting and expanding field that has evolved significantly since the launch of the first telecommunications satellite, from telephone and broadcast to broadband ATM and Internet. With increasing bandwidth and mobility demands on the horizon, satellites have become an integral part of the Global Network Infrastructure...
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF....

Getting Started with GEO, CouchDB, and Node.js
Getting Started with GEO, CouchDB, and Node.js

Where. Whether it refers to where you have been, where you are, or where you are going, the concept of where is important. Where links data to the physical world. A shopping list can be a very useful collection of data on its own, but that data can be even more useful with more context. If you map the location of the stores needed for...

Cisco Field Manual: Catalyst Switch Configuration
Cisco Field Manual: Catalyst Switch Configuration

A complete, concise reference for implementing the most important features of the Cisco Catalyst family of switches

* Review detailed and comparative configuration steps for features of the COS and Cisco IOS Software operating systems
* Understand basic system and operating system management
* Configure Ethernet, EtherChannel,
...

J2ME: The Complete Reference
J2ME: The Complete Reference

The Most Comprehensive J2ME Resource Available!

Java developers, here's your chance to survey the scope of J2ME (Java 2 Micro Edition) knowledge in one solidly written reference. Discover the basic architecture and functionality of J2ME and how it differs from J2SE and J2EE. Build a J2ME database with coverage of essentials such as...

Your Google Game Plan for Success: Increasing Your Web Presence with Google AdWords, Analytics and Website Optimizer
Your Google Game Plan for Success: Increasing Your Web Presence with Google AdWords, Analytics and Website Optimizer

Get the most out of Google's trifecta of tools and optimize your Web presence!

Savvy marketers are always searching for new ways to attract and keep online customers. Google’s array of online tools plus the techniques and tips in this expert guide help you unlock the mystery of doing business in the digital...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy