 |
|
|
 |  |  How the Internet Works (8th Edition)Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the... |  |  802.1X Port-Based AuthenticationWritten to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of... |
|
 Hacking Exposed 5th Edition“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine
"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine
"For almost any computer book, you can find a... |  |  Nortel Guide to VPN Routing for Security and VoIPHere's your handbook to Nortel VPN Router
If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN Router. Everything is here—hardware, software, laboratory set-ups, real-world examples, and, most importantly, advice gleaned from the... |  |  Upgrading & Fixing PCs For DummiesCovers upgrades for gaming, digital video, and entertainment!
Transform your PC into a glitch-free, turbocharged, multimedia machine
Want to add punch to your PC? This handy reference helps add power to your old computer. Easy steps show you how to add memory, update your virus... |
|
 Distributed Systems Architecture: A Middleware ApproachMiddleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the... |  |  |  |  How to Cheat at Configuring Open Source Security ToolsThe Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and... |
|
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 |