222 rezultatov
-
Data Communications and Networking with TCP/IP Protocol Suite ISE(2021) FOROUZAN, BEHROUZ A.Vezava: Mehka104,99 € -
Designing the Internet of Things(2013) MCEWEN, ADRIAN,CASSIMALLY, HAKIMExplores the platforms that you can use to develop hardware or software, discusses design concepts that can make your products eye-catching and appealing. This book explains how to combine sensors, servos, robotics, Arduino chips, and more with various neVezava: Mehka28,03 € -
Hacking Exposed 7(2012) MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGEThis fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approachVezava: Mehka70,97 € -
Time Management for System Administrators(2005) LIMONCELLI, THOMAS A.Presents a collection of time management tools, which addresses the very specific needs of embattled system administrators everywhere. This book shows you how to manage interruptions, eliminate timewasters, prioritize based on customer expectations, automVezava: Mehka39,24 € -
BGP(2002) IIJITSCH VAN BEIJNUMThis title focuses on the use of BGP (Border Gateway Protocol) to create reliable Internet connections. BGP makes it possible for ISPs to connect to each other and for customers to connect to more than one ISP.Vezava: Mehka44,85 € -
Enterprise Security Architecture(2005) SHERWOOD, NICHOLASSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterpriseVezava: Trda170,24 € -
Understanding Linux Network Internals(2006) BENVENUTI, CHRISTIANA no-nonsense guide to Linux networking, which offers a clear view of the underlying concepts and teaches you to follow the C code that implements it. The topics include: system initialization, network interface card (NIC) device drivers, bridging, routinVezava: Mehka61,94 € -
Cisco IOS Cookbook(2007) DOOLEY, KEVINFeaturing sections on MPLS, Security, IPv6, and IP Mobility, this book presents solutions to common configuration problems, including: configuring interfaces of many types, from serial to ATM and Frame Relay; configuring all of the common IP routing protoVezava: Mehka61,94 € -
Architecting the Cloud(2014) KAVIS, MICHAEL J.An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloudVezava: Trda61,31 € -
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 € -
IT Disaster Recovery Planning For Dummies(2008) GREGORY, PETER H. (AT&T WIRELESS SERVICES, WOODINVILLE, WASHINGTON)If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off.Vezava: Mehka29,43 € -
-
Applied Network Security Monitoring(2014) SANDERS, CHRIS (SENIOR INFORMATION SECURITY ANALYST AT THE DOD, TRAINER, AND AUTHOR),SMITH, JASONA guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how toVezava: Mehka71,27 €










