Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Monitoring and Managing Microsoft Exchange Server 2003, First Edition
Monitoring and Managing Microsoft Exchange Server 2003, First Edition

Monitoring and Managing Microsoft Exchange Server 2003 presents best practices and innovative everyday techniques for running Exchange Server 2003.

This authoritative book teaches IT professionals responsible for Exchange messaging systems how to efficiently manage the program’s many and complex system capabilities and...

Protocols for High-Efficiency Wireless Networks
Protocols for High-Efficiency Wireless Networks
The book, Protocols for High-Efficiency Wireless Networks, focuses on the air interface of mobile networks at different layers according to the OSI Reference Model. The authors provide an overview of several wireless communication systems including GPRS, 3G (in particular, W-CDMA and UTRA-TDD), HIPERLAN/2-type as well as mobile satellite systems....
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Google Power Tools Bible
Google Power Tools Bible

The most thorough and comprehensive guide to Google

Expand your world with the dozens of Google tools, applications, and services you'll find in this comprehensive book. Going well beyond the basics of search, this in-depth resource shows you how to access and apply every one of Google's features-things like Gmail, Google Maps, and...

Cyber Crime Investigator's Field Guide, Second Edition
Cyber Crime Investigator's Field Guide, Second Edition
In the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we...
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...

Voice Over WLANS: The Complete Guide (Communications Engineering)
Voice Over WLANS: The Complete Guide (Communications Engineering)
Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN dont require changes to installed wiring) and greater capacity than...
Introduction to Embedded Systems: A Cyber-Physical Systems Approach
Introduction to Embedded Systems: A Cyber-Physical Systems Approach

The most visible use of computers and software is processing information for human consumption. We use them to write books (like this one), search for information on the web, communicate via email, and keep track of financial data. The vast majority of computers in use, however, are much less visible. They run the engine, brakes,...

Advanced Analytics with Spark: Patterns for Learning from Data at Scale
Advanced Analytics with Spark: Patterns for Learning from Data at Scale

In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.

You’ll start with an...

Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk...

Optical Burst Switched Networks
Optical Burst Switched Networks

Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to be highly bursty in nature. For such traffic,...

MPLS Network Management: MIBs, Tools, and Techniques
MPLS Network Management: MIBs, Tools, and Techniques
S everal years ago, there were only a handful of deployments of Multi-Protocol Label Switching (MPLS) technology, and those were restricted to researchers or nonproduction networks. Even in practice, MPLS was largely still theory. Over the past several years, MPLS has matured as a technology, and its acceptance and popularity in the marketplace has...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy