Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Self-Similar Network Traffic and Performance Evaluation
Self-Similar Network Traffic and Performance Evaluation
"The primary objective of the book is to present a comprehensive yet cohesive account of some of the principal developments..." (IEE Signal Processing, Vol. 18, No. 1, January 2001)

A collection of work from top researchers in the field, this book covers all aspects of self-similar network traffic. Readers will gain
...
Nginx: From Beginner to Pro
Nginx: From Beginner to Pro

Teaches you to start up Nginx and quickly take your expertise to a level where you can comfortably work with various aspects of the web server and make informed design decisions for your web farm. Nginx powers more than 40% of the top 1000 websites and is among the handful of web servers that can handle more than 10K simultaneous connections....

Passionate & Profitable: Why Customer Strategies Fail and 10 Steps to Do Them Right!
Passionate & Profitable: Why Customer Strategies Fail and 10 Steps to Do Them Right!
This book is about making the choice for the customer, making a choice
beyond the superficial slogans and choosing an operational, actionable strategy.
Our experience has shown that although companies focus their customer
programs on cross-selling and loyalty initiatives, the issue is much
more fundamental. They fail in their
...
Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
Cognitive Radio Networking and Security: A Game-Theoretic View
Cognitive Radio Networking and Security: A Game-Theoretic View

Recent increases in demand for cognitive radio technology have driven researchers and technologists to rethink the implications of the traditional engineering designs and approaches to communications and networking. One issue is that the traditional thinking is that one should try to have more bandwidth, more resources, and more of...

Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
Practical AWS Networking: Build and manage complex networks using services such as Amazon VPC, Elastic Load Balancing, Direct Connect, and Amazon Route 53
Practical AWS Networking: Build and manage complex networks using services such as Amazon VPC, Elastic Load Balancing, Direct Connect, and Amazon Route 53

Your one step guide to learn all about AWS networking.

Key Features

  • Master your networking skills on Public Cloud.
  • Gain hands-on experience of using Amazon VPC, Elastic Load Balancing, Direct Connect and other AWS products.
  • Implement troubleshooting skills...
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
The all-time best-selling TCP/IP book, this is still the reference for anyone who wants to learn about or work with the TCP/IP protocol suite. Justly renowned for its clarity and accessibility,this superb text covers wide area Internet backbones as well as local area network technologies like FDDI and Ethernet. This is volume 1 of a 3 part set...
VoIP Handbook: Applications, Technologies, Reliability, and Security
VoIP Handbook: Applications, Technologies, Reliability, and Security
The number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is projected to increase to nearly 250 million within the next three years. The future of voice transport has officially arrived.

The VoIP Handbook: Applications, Technologies, Reliability, and...

Cellular Automata: 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006,   Proceedings
Cellular Automata: 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, held in Perpignan, France in September 2006.

The 53 revised full papers and 19 revised poster papers presented together with 6 invited lectures were carefully reviewed and selected from around 100...

Mobile Radio Networks: Networking and Protocols
Mobile Radio Networks: Networking and Protocols
The continuing growth of the Global System for Mobile Communications (GSM) based mobile telephones has brought with it increasingly rapid growth in interest in mobile communications interconnect problems and standards. For the rapid proliferation of mobile communications to be sustained without overloading the system, harmonization of the networks...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy