Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Amazon Web Services with Node.js
Beginning Amazon Web Services with Node.js

Beginning Amazon Web Services with Node.js teaches any novice Node.js developer to configure, deploy, and maintain scalable small to large scale Node.js applications in Amazon Web Services. Hosting a Node.js application in a production environment usually means turning to PaaS hosting, but this approach brings problems. Deploying...

Snort Cookbook
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
QoS for IP/MPLS Networks
QoS for IP/MPLS Networks

The comprehensive guide to implementing QoS in multiservice networks using IP/MPLS

  • Understand the technology components of implementing QoS in a multiservice network

  • Learn how to configure the MPLS QoS functionality in Cisco...

Juniper SRX Series
Juniper SRX Series
Security is one of the fastest moving segments within the realm of technology. Whereas most technology is created to offer new services or products, security is created to prevent the abuse of these new products and or services. In today’s world, where we are always connected in ways that have never been...
Traffic and Granular Flow  '11
Traffic and Granular Flow '11

This book continues the biannual series of conference proceedings, which has become a classical reference resource in traffic and granular research alike. It addresses new developments at the interface between physics, engineering and computational science. Complex systems, where many simple agents, be they vehicles or particles, give rise to...

IP Over WDM
IP Over WDM

IP over WDM explores the coming together of communication and computer networking technologies: optical fiber using WDM (Wavelength Division Multiplexing) and IP - the Internet Protocol.

Fiber optics technology is revolutionizing the telecommunications and networking industries by offering the enormous capacity required to...

Aeronautical Radio Com Systems and Networks
Aeronautical Radio Com Systems and Networks
Typically, there are over twenty radio systems on board the average commercial jet aircraft dealing with communication, navigation and surveillance functions. Very high frequency (VHF) air-to-ground communication is usually the main method of  information and control exchange between pilot and air traffic control. Satellite and high frequency...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
A new procedure for combined validation of learning models – built for specifically uncertain data – is briefly described. The procedure, called the queue validation, relies on a combination of resubstitution with the modified learn-andtest paradigm. In the initial experiment [Burda and Hippe 2010] the developed...
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Web Caching and Its Applications (The Springer International Series in Engineering and Computer Science)
Web Caching and Its Applications (The Springer International Series in Engineering and Computer Science)
The last decade has seen tremendous growth in usage of the World Wide Web. Web caching is a technology aimed at reducing the transmission of redundant network traffic and improving access to the Web. The key idea in Web caching is to cache frequently- accessed content so that it may be used profitably later. This leads to cost savings, reduction in...
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy