Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux iptables Pocket Reference
Linux iptables Pocket Reference
Firewalls, Network Address Translation (NAT), and network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering...
Hardening Apache
Hardening Apache

A must-read for any system administrator installing or currently using Apache, Hardening Apache shows you exactly what to do to make Apache more secure. Throughout this book, renowned author Tony Mobily introduces you to many of the security problems you’ll inevitably stumble across when using Apache---and most important,...

Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web. First Edition
Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web. First Edition
Ontologies provide a common vocabulary of an area and define - with different levels of formality - the meaning of the terms and the relationships between them. Ontologies may be reused and shared across applications and groups Concepts in the ontology are usually organized in taxonomies and relations between concepts, properties of concepts, and...
An Introduction to Microelectromechanical Systems Engineering, Second Edition
An Introduction to Microelectromechanical Systems Engineering, Second Edition

The past few years have witnessed an increasing maturity of the MEMS industry and a rapid introduction of new products addressing applications ranging from biochemical analysis to fiber-optic telecommunications. The market size for MEMS products has doubled in the past 5 years and is projected to grow at this fast rate for the foreseeable...

Wireless Operational Security
Wireless Operational Security

Wireless Operational Security addresses the operational and day-to-day security management requirements of 21st Century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes...

Knoppix Hacks : 100 Industrial-Strength Tips and Tools
Knoppix Hacks : 100 Industrial-Strength Tips and Tools
Knoppix Hacks is an invaluable collection of one hundred industrial-strength hacks for new Linux users, power users, and system administrators using--or considering using--the Knoppix Live CD. These tips and tools show how to use the enormous amount of software on this live CD to troubleshoot, repair, upgrade,...
The Circuit Designer's Companion, Second Edition
The Circuit Designer's Companion, Second Edition
A unique masterclass in the design of optimized, reliable electronic circuits
Beyond the lab a guide to electronic design for production, where cost-effective design is imperative
Tips and know-how provide a whole education for the novice, with something to offer the most seasoned professional

Tim Williams' Circuit
...
Smart Client Architecture and Design Guide (Patterns & Practices)
Smart Client Architecture and Design Guide (Patterns & Practices)
Get expert, pragmatic guidance on how to design and build smart client solutions that combine the benefits of traditional, rich-client applications with the manageability of thin clients. Software architects and developers will learn how to evaluate whether a smart client solution is appropriate for their client architecture, and get practical...
An Introduction to Numerical Analysis for Electrical and Computer Engineers
An Introduction to Numerical Analysis for Electrical and Computer Engineers
An engineer’s guide to numerical analysis

To properly function in today’s work environment, engineers require a working familiarity with numerical analysis. This book provides that necessary background, striking a balance between analytical rigor and an applied approach focusing on methods particular to the solving of engineering...

Practical BGP
Practical BGP

Hands-on guidance for deploying and optimizing BGP networks--enterprise and ISP

Now there's a practical guide to deploying and managing BGPv4 in any environment--from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's...

Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy