Home | Amazing | Today | Tags | Publishers | Years | Search 
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Windows to Linux Migration Toolkit
Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services...
How to Cheat at Microsoft Vista Administration
How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,
...
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches introduces engineers and researchers to the field of nonlinear adaptive system identification. The book includes recent research results in the area of adaptive nonlinear system identification and presents simple, concise, easy-to-understand methods for...
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid...
Multimedia Systems, Standards, and Networks
Multimedia Systems, Standards, and Networks
"Describes ITU H H.323 and H.324, H.263, ITU-T video, and MPEG-4 standards, systems, and coding; IP and ATM networks; multimedia search and retrieval; image retrieval in digital laboratories; and the status and direction of MPEG-7."

We humans, being social creatures, have historically felt the need for increasingly sophisticated means...

Windows Vista(TM) Resource Kit
Windows Vista(TM) Resource Kit
Get the definitive reference for deploying, configuring, and supporting Microsoft® Windows Vista(tm)--with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Vista Team. This official Microsoft RESOURCE KIT provides more than 1,500 pages of in-depth technical guidance on automating deployment; implementing...
Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

Learning from Data Streams: Processing Techniques in Sensor Networks
Learning from Data Streams: Processing Techniques in Sensor Networks
Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Sensors are equipped with capacities to store information in memory, process this information and communicate with their neighbors. Processing data streams generated from wireless sensor networks has raised new research challenges over the last few...
Practice of System and Network Administration, The (2nd Edition)
Practice of System and Network Administration, The (2nd Edition)
The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to...
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
The authoritative reference text on KAME and IPv6!

IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6
...
Linux System Administration
Linux System Administration
As Linux continues to grow in market share as an enterprise operating system, system administrators need to solve problems in a wide range of applications and work environments. To help you get to the bottom of real-life problems quickly, Linux System Administration is organized around three common administration scenarios: Linux as a hub...
Result Page: 723 722 721 720 719 718 717 716 715 714 713 712 711 710 709 708 707 706 705 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy