 |
|
 End-to-End Quality of Service Over Heterogeneous NetworksThe book presents mechanisms, protocols, and system architectures to achieve end-to-end Quality-of-Service (QoS) over heterogeneous wired/wireless networks in the Internet. Particular focus is on measurement techniques, traffic engineering mechanisms and protocols, signalling protocols as well as transport protocol extensions to support fairness... |  |  iPhone: The Missing Manual: Covers the iPhone 3G
In the first year of the iPhone’s existence, Apple sold 6 million of them; brought the thing to 70 countries; and inspired an industry of misbegotten iPhone lookalikes from other companies. By the end of Year One, you could type iPhone into Google and get 229 million hits.
Now there’s a new iPhone, the iPhone 3G.... |  |  High Performance MySQL: Optimization, Backups, Replication, and MoreHigh Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. High Performance MySQL teaches you advanced... |
|
 Wikipedia: The Missing ManualWhat made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the... |  |  |  |  Search Engine Optimization: An Hour a DayInfluence search engine results and bring targeted traffic to your website in just an hour day with the second edition of this bestselling SEO guide, Search Engine Optimization: An Hour a Day. Drawing on years of experience as successful SEO consultants, Jennifer Grappone and Gradiva Couzin provide detailed, practical, and often... |
|
|
 Dungeons & Dragons DummiesCaught in traffic. Trapped in a cubicle. Stuck in a rut. Tangled up in red tape.
In the real world, sometimes you feel powerless—but not in Dungeons & Dragons (D & D). In this fantasy-adventure, you have all kinds of special powers. You can slay the evil dragon, overcome the orc or the ogre, haunt the... |  |  Cyber Crime Investigator's Field Guide, Second EditionIn the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we... |  |  Cisco Secure Firewall Services Module (FWSM)
By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either... |
|
| Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |