Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Computer Networking First-Step
Computer Networking First-Step

Your first step into the world of computer networking

  • No experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

...
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks

The practical guide to large-scale networking with OSPF and IS-IS

This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting...

Network Performance Toolkit: Using Open Source Testing Tools
Network Performance Toolkit: Using Open Source Testing Tools
All of the tools you’ll need to ensure that your network and its applications are performing properly for your environment

As a network administrator, you are the first person customers come to whenever there are performance issues with the network. You have to keep the customers satisfied, but the complaints don’t make your job...

Business Data Communications and Networking: A Research Perspective
Business Data Communications and Networking: A Research Perspective
Research in the area of data communications and networking is well and alive as this collection of contributions show. The book has received enhanced contributions from the authors that published in the inaugural volume of the International Journal of Business Data Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are...
Mule in Action
Mule in Action
Mule is the most widely used open source ESB-with millions of downloads- providing an alternative to expensive commercial options. Mule in Action is a comprehensive tutorial designed for working Java developers. This authoritative book explores the architecture and the main features of version Mule 2 through numerous running examples. It starts...
The Isaac Newton School of Driving: Physics and Your Car
The Isaac Newton School of Driving: Physics and Your Car

For some people, driving is an art; for others, it's a science. At the Isaac Newton School of Driving, though, every car is a laboratory on wheels and every drive an exciting journey into the world of physics. As explained by renowned science writer and physics professor Barry Parker—whose father was a car mechanic and garage...

Overlay Networks: Toward Information Networking.
Overlay Networks: Toward Information Networking.

A recent Cisco traffic forecast indicates that annual global IP traffic will reach two-thirds of a zettabyte by 2013. With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the...

802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

The Definitive Guide to HTML5 WebSocket
The Definitive Guide to HTML5 WebSocket

The Definitive Guide to HTML5 WebSocket is the ultimate insider’s WebSocket resource. This revolutionary new web technology enables you to harness the power of true real-time connectivity and build responsive, modern web applications.  

This book contains everything web developers and architects need
...

Solr 1.4 Enterprise Search Server
Solr 1.4 Enterprise Search Server
If you are a developer building a high-traffic web site, you need to have a terrific search engine. Sites like Netflix.com and Zappos.com employ Solr, an open source enterprise search server, which uses and extends the Lucene search library. This is the first book in the market on Solr and it will show you how to optimize your web site for high...
unlimited object storage image
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy