Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pedestrian Dynamics: Feedback Control of Crowd Evacuation (Understanding Complex Systems)
Pedestrian Dynamics: Feedback Control of Crowd Evacuation (Understanding Complex Systems)
The importance of controlling pedestrian flow especially during emergencies is being understood by researchers to be a very important research area. Currently, the use of static emergency routes is not efficient, since during emergencies, the preferred routes might be congested, or worse yet might not even exist. Hence, it is...
ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

Increase Your Web Traffic in a Weekend
Increase Your Web Traffic in a Weekend
These days, everyone seems to have a home page or a Web site. However, just because you create and publish a Web site doesn’t mean anyone will visit it. Competition to attract visitors is extreme. The reality is that of the millions of Web pages out there, only a handful actually attract a steady readership; and these...
GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Wireless Communications Systems and Networks
Wireless Communications Systems and Networks
Wireless Communications Systems and Networks covers the breadth of research in wireless communications. It begins by detailing the essential background, such as wireless standards, spread spectrum and CDMA systems, and goes on to discuss advanced topics in next generation wireless systems. Discussions of advanced-level materials progress in a...
Developing IP Multicast Networks: The Definitive Guide to Designing and Deploying CISCO IP Multi- cast Networks
Developing IP Multicast Networks: The Definitive Guide to Designing and Deploying CISCO IP Multi- cast Networks

The definitive guide to designing and deploying Cisco IP multicast networks

  • Clear explanations of the concepts and underlying mechanisms of IP multicasting, from the fundamentals to advanced design techniques
  • Concepts and techniques are reinforced through real-world network examples, each clearly illustrated in a...
Google Hacks: Tips & Tools for Finding and Using the World's Information
Google Hacks: Tips & Tools for Finding and Using the World's Information

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding...

Queuing Theory and Telecommunications: Networks and Applications
Queuing Theory and Telecommunications: Networks and Applications

This book is aimed to provide a basic description of current networking technologies and protocols as well as to provide important tools for network performance analysis based on queuing theory. The second edition adds selected contents in the first part of the book for what concerns: (i) the token bucket regulator and traffic shaping issues;...

Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy