Home | Amazing | Today | Tags | Publishers | Years | Search 
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Practice the IT Skills Essential for Your Success

  • 60+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results...
Next Generation IPTV Services and Technologies
Next Generation IPTV Services and Technologies
Detailed coverage of the underlying technologies required to build an end-to-end IPTV system

The television entertainment industry is currently experiencing a major transformation as broadband subscribers and improvements in compression techniques for digital video content continue to grow. This growth is fueling the demand for a new generation...

The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF....

Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical...

Advanced Software Engineering: Expanding the Frontiers of Software Technology
Advanced Software Engineering: Expanding the Frontiers of Software Technology
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
Todd Lammle's CCNA IOS Commands Survival Guide
Todd Lammle's CCNA IOS Commands Survival Guide
Let Todd Lammle help you master IOS commands for CCNA prep

To become a Cisco Certified Network Associate (CCNA), you must learn the hundreds of IOS commands used by Cisco routers and switches. This handy reference from Cisco networking authority Todd Lammle is just what you need to master those commands.

From a...

CCDA Official Exam Certification Guide (Exam 640-863) (3rd Edition)
CCDA Official Exam Certification Guide (Exam 640-863) (3rd Edition)
CCDA Official Exam Certification Guide, Third Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the topics for the DESGN exam. Senior networking consultants Anthony Bruno and Steve Jordan expertly cover the latest exam content, helping you identify areas of weakness and improve your knowledge of Cisco network...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Voice Over WLANS: The Complete Guide (Communications Engineering)
Voice Over WLANS: The Complete Guide (Communications Engineering)
Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN dont require changes to installed wiring) and greater capacity than...
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming

As an easy-to-use application that provides information at a glance, a gadget basically takes the concept of portal dashboards and moves them to the more accessible Windows desktop where users can quickly and easily obtain weather information, RSS news feeds, and much more. In...

Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy