Season 7 Episode 21 The Anything Can Happen Recurrence | More Details | Ricardo Chavira
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCNA Routing and Switching Complete Review Guide: Exam 100-105, Exam 200-105, Exam 200-125
CCNA Routing and Switching Complete Review Guide: Exam 100-105, Exam 200-105, Exam 200-125

Tight, focused CCNA review covering all three exams

The CCNA Routing and Switching Complete Review Guide offers clear, concise review for Exams 100-105, 200-105, and 200-125. Written by best-selling certification author and Cisco guru Todd Lammle, this guide is your ideal resource for quick review and reinforcement of...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Wireless communications is one of the most active areas of research over the
past and the current decades. In fact, the demand for wireless services has been
changing from the regular voice telephony services to mixed voice, data, and
multimedia services over the wireless media. Since the mid-1990s, the wireless
industry has
...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Fiber Optic Cabling, Second Edition
Fiber Optic Cabling, Second Edition
Essential reading for anyone involved in fiber optic cable applications, from installation engineers to IT professionals.

Fiber Optic Cabling is a practical guide to all aspects of designing, specifying and installing systems for LANs and other data communications applications. The second edition has been completely revised and updated
...
802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
Cabling Handbook, The (2nd Edition)
Cabling Handbook, The (2nd Edition)

The Cabling Handbook, Second Edition is a thorough, up-to-the-minute professional's guide to every aspect of LAN and telecommunications cabling, from planning through installation and management. From Category 5 twisted pair and fiber to the latest wireless LAN solutions, it's all here:...

Design and Performance of 3G Wireless Networks and Wireless LANs
Design and Performance of 3G Wireless Networks and Wireless LANs
Cellular phones, especially those enabled by second-generation
telecommunication systems, have had tremendous impacts on our daily lives.
In some countries such as India, the number of cellular phone subscribers
has far exceeded the number of wired phone subscribers. Meanwhile, the
Internet has also significantly changed our
...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Mobile IPv6: Protocols and Implementation
Mobile IPv6: Protocols and Implementation

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.). 

This book covers the IPv6 host mobility protocol known as "mobile IPv6"...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy