Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications, and Emerging Technologies

Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...

Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition)
Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition)

Thoroughly updated to reflect the CompTIA Network+ N10-006 exam, Networking Essentials, Fourth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or...

Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications

Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe. The book assumes no more than a...

iPhone Secrets
iPhone Secrets

A top tech blogger takes you behind the scenes for an in-depth look at the iPhone

The world’s love of the iPhone only continues to grow by leaps and bounds. Darren Murph, managing editor of Engadget and a Guinness World Record holder as the most prolific blogger, explores every amazing capability of the iPhone and...

Self-Paced Training Kit (Exam 70-642) Configuring Windows Server 2008 Network Infrastructure (MCTS) (2nd Edition) (Microsoft Press Training Kit)
Self-Paced Training Kit (Exam 70-642) Configuring Windows Server 2008 Network Infrastructure (MCTS) (2nd Edition) (Microsoft Press Training Kit)

EXAM PREP GUIDE

Fully updated for Windows Server 2008 R2! Ace your preparation for the skills measured by Exam 70-642 - and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply your knowledge to real-world case scenarios and practice
...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Arduino Robot Bonanza
Arduino Robot Bonanza

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Create high-tech walking, talking, and thinking robots

"McComb hasn’t missed a beat. It’s an absolute...

Programming PIC Microcontrollers with XC8
Programming PIC Microcontrollers with XC8
Learn how to use microcontrollers without all the frills and math. This book uses a practical approach to show you how to develop embedded systems with 8 bit PIC microcontrollers using the XC8 compiler. It's your complete guide to understanding modern PIC microcontrollers.

Are you tired of...
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy