Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Frontiers of High Performance Computing and Networking  ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
Frontiers of High Performance Computing and Networking ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
This book constitutes the refereed joint proceedings of ten international workshops held in conjunction with the 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, held in Sorrento, Italy in December 2006 (see LNCS 4330).

The 116 revised full papers presented were carefully reviewed and selected from...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)
Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)

Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Over-the-Road Wireless For Dummies
Over-the-Road Wireless For Dummies
Keep in touch with the office or the grandkids

Set up your laptop or PDA, find hot spots, and keep your stuff safe

Whether you're on the road earning a living or satisfying your urge to roam, this book will help you stay connected to the rest of the world. Here's how to choose...

Next Generation Intelligent Optical Networks: From Access to Backbone
Next Generation Intelligent Optical Networks: From Access to Backbone
Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica fiber with a single wavelength modulated at low data rates, it was quickly demonstrated that fiber can deliver much more bandwidth than any other...
Mobile Web Development
Mobile Web Development
This complete, practical guide to writing mobile websites and applications shows developers how to build a powerful mobile web presence. Readers need knowledge of HTML, CSS, JavaScript, and a server-side language; the examples use PHP, but are easily adapted to other languages. The book does not use J2ME, but uses mobiles' web browsers and other...
GSM - Architecture, Protocols and Services
GSM - Architecture, Protocols and Services
With around 3 billion subscribers, GSM is the world's most commonly used technology for wireless communication. Providing an overview of the innovations that have fuelled this phenomena, GSM: Architecture, Protocols and Services, Third Edition offers a clear introduction to the field of cellular systems. Special emphasis is placed on...
unlimited object storage image
Result Page: 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy