Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
CCNA Exam Cram (Exam 640-802) (3rd Edition)
CCNA Exam Cram (Exam 640-802) (3rd Edition)
“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an...
CNET Do-It-Yourself PC Upgrade Projects
CNET Do-It-Yourself PC Upgrade Projects

Supercharge and customize your PC

Now you can get the most out of your PC with the fun and practical projects packed inside this easy-to-follow guide. Produced in conjunction with CNET.com, the place you go for the latest in tech and consumer electronics, this book shows you how to exploit the media, communications,...

Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Expert .NET Micro Framework
Expert .NET Micro Framework
The Microsoft .NET Micro Framework is a small and efficient .NET runtime environment used to run managed code on devices that are too small and resource constrained for Windows CE and the Compact Framework.

Expert .NET Micro Framework will teach you everything you need to know in order to use the .NET Micro Framework to create effective...

Introduction to Microdisplays (Wiley Series in Display Technology)
Introduction to Microdisplays (Wiley Series in Display Technology)

Microdisplays are tiny, high-resolution electronic displays, designed for use in magnifying optical systems such as HDTV projectors and near-eye personal viewers. As a result of research and development into this field, Microdisplays are   incorporated in a variety of visual electronics, notably new 3G portable communications devices,...

Adaptive Filters
Adaptive Filters
Adaptive filtering is a topic of immense practical and theoretical value, having applications in areas ranging from digital and wireless communications to biomedical systems. Now, preserving the style and main features of the earlier award-winning publication, Fundamentals of Adaptive Filtering (2005 Terman Award), the author offers readers and...
Sams Teach Yourself Windows Server 2008 in 24 Hours
Sams Teach Yourself Windows Server 2008 in 24 Hours
In just 24 lessons of one hour or less, you will be able to install and configure Microsoft Windows Server 2008 and its various services for any size network. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Windows Server® 2008 from the ground up.
...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
ESD : RF Technology and Circuits
ESD : RF Technology and Circuits
The phenomenon of electrostatic discharge (ESD) has been known for a long time, but recently a growing interest has been observed in ESD in radio frequency (RF) technology and ESD issues in RF applications.

Why now?

Early telecommunications started with William Cooke and Charles Wheatstone in the development of the electric
...
Result Page: 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy