Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress best-selling book Ethereal Packet Sniffing.

This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows,
...
High-performance Packet Switching Architectures
High-performance Packet Switching Architectures
Over the years, different architectures have been investigated for the design and implementation of high-performance switches. Particular architectures were determined by a number of factors based on performance, flexibility and available technology. Design differences were mainly a variation in the queuing functions and the switch core. The...
Optimal Traffic Control: Urban Intersections
Optimal Traffic Control: Urban Intersections
Despite traffic circles, four-way stop signs, lights regulated by timers or sensors, and other methods, the management of urban intersections remains problematic. Consider that transportation systems have all the features of so-called complex systems: the great number of state and control variables, the presence of uncertainty and indeterminism,...
Adopting Elixir: From Concept to Production
Adopting Elixir: From Concept to Production

Adoption is more than programming. Elixir is an exciting new language, but to successfully get your application from start to finish, you're going to need to know more than just the language. The case studies and strategies in this book will get you there. Learn the best practices for the whole life of your application, from...

LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

PHP 5 Social Networking
PHP 5 Social Networking

Social Networking has quickly become a very popular activity on the Internet, particularly with the emergence of sites like Facebook and MySpace. PHP is a flexible web development language used on a wide variety of sites, including Facebook and Yahoo! But building a social networking site from scratch using PHP involves some complex logic,...

Self-Defending Networks: The Next Generation of Network Security
Self-Defending Networks: The Next Generation of Network Security

Protect your network with self-regulating network security solutions that combat both internal and external threats.

  • Provides an overview of the security components used to design proactive network security

  • Helps network security...

End-to-End Quality of Service Over Heterogeneous Networks
End-to-End Quality of Service Over Heterogeneous Networks
The book presents mechanisms, protocols, and system architectures to achieve end-to-end Quality-of-Service (QoS) over heterogeneous wired/wireless networks in the Internet. Particular focus is on measurement techniques, traffic engineering mechanisms and protocols, signalling protocols as well as transport protocol extensions to support fairness...
Bandit Algorithms for Website Optimization
Bandit Algorithms for Website Optimization

When looking for ways to improve your website, how do you decide which changes to make? And which changes to keep? This concise book shows you how to use Multiarmed Bandit algorithms to measure the real-world value of any modifications you make to your site. Author John Myles White shows you how this powerful class of algorithms can...

Object Solutions: Managing the Object-Oriented Project (OBT)
Object Solutions: Managing the Object-Oriented Project (OBT)
Early adopters of object-oriented technology took it on faith that object orientation
was A Good Thing, offering hope for improving some ugly aspect of software
development. Some of these primordial efforts truly flourished, some
failed, but overall, a number of such projects quietly began to experience the
anticipated benefits
...
Twitter Marketing For Dummies
Twitter Marketing For Dummies

An introductory guide to effectively using Twitter to grow your business!

The field of social media marketing is exciting, cutting-edge, and...open to almost anything! Twitter's style of quick remarks lends itself to a carefree, conversational tone, ripe for passing along a plug, sharing a suggestion, or referencing a...

Essential SNMP, Second Edition
Essential SNMP, Second Edition

Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy