Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

A Practical Guide to Content Delivery Networks
A Practical Guide to Content Delivery Networks
A Practical Guide to Content Delivery Networks offers an organized approach to implementing the networks responsible for the distribution of various types of Web traffic, including standard Web pages and streaming audio and video. Because CDN operations are normally performed by independent organizations, the successful use of vendor facilities...
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)

CD Features More Than 200 Practice Questions

 

CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...

Web Caching (O'Reilly Internet Series)
Web Caching (O'Reilly Internet Series)
A properly designed cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy and operate an effective web caching service. It also covers the...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Building a TypePad Blog People Want to Read
Building a TypePad Blog People Want to Read

Today, it seems everyone—from multinational corporations to your kid’s second-grade teacher—has a blog. They all have one, in part, because they have information they want to share with others—from customers and clients to neighbors and parents. But to actually build a good blog—to create a blog people want to...

Hyper-V Replica Essentials
Hyper-V Replica Essentials

For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.

Overview

  • A practical step-by-step guide that goes beyond theory and...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

Pro CSS for High Traffic Websites
Pro CSS for High Traffic Websites

Although web standards-based websites can scale effectively—and basic CSS will give you basic results—there are considerations and obstacles that high traffic websites must face to keep your development and hosting costs to a minimum. There are many tips and tricks, as well as down-to-earth best practice information, to make sure...

unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy