|
|
|
|
|
Cisco LAN Switching FundamentalsThe essential guide for understanding Ethernet switched networks
-
Understand various Ethernet technologies from 10BASE-T to Gigabit Ethernet
-
Learn about common switching modes, paths, and architectures
-
... | | CCNP Switching Study Guide (2nd Edition; Exam 640-604 with CD-ROM)Here's the book you need to prepare for Cisco's new Switching exam, 640-604. Written by Cisco internetworking experts who can help you master the skills and acquire the knowledge needed to approach the test with confidence, this Study Guide provides:
Assessment testing to focus and direct your studies In-depth coverage of official exam... | | Reconstructing Evolution: New Mathematical and Computational AdvancesEvolution is a complex process, acting at multiple scales, from DNA sequences and proteins to populations of species. Understanding and reconstructing evolution is of major importance in numerous subfields of biology. For example, phylogenetics and sequence evolution is central to comparative genomics, attempts to decipher genomes, and molecular... |
|
Data Structures: Abstraction and Design Using Java, 3rd edition
Our goal in writing this book was to combine a strong emphasis on problem solving and software design with the study of data structures. To this end, we discuss applications of each data structure to motivate its study. After providing the specification (interface) and the implementation (a Java class), we then cover case studies that use the... | | Core Swing: Advanced Programming The experienced developer's guide to the Swing classes!
Core Swing helps you deliver the sophisticated Java GUI applications your users demand—with Java Swing techniques that start where other books leave off! Building on his bestseller Core Java Foundation Classes, Kim Topley takes on the toughest Swing... | | Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend... |
|
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |