" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 214

: Network Geeks: How They Built the Internet
: Brian E Carpenter
: Springer
: 2013
: PDF, EPUB
: 10
: / English

The impact on modern society made by the Internet is immeasurable. Yet some questioned why anyone would want such a thing when the idea was first introduced. Part history, part memoir and part cultural study, Network Geeks charts the creation of the Internet and the establishment of the Internet Engineering Task Force, from the viewpoint of a self-proclaimed geek who witnessed these developments first-hand.
: black 11-02-2019, 21:53 | : 0 |
: Counterterrorism and Cybersecurity
: Newton Lee
: Springer
: 2013
: PDF, EPUB
: 10
: / English

Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace.
: black 11-02-2019, 21:48 | : 0 |

: Security+ Guide to Network Security Fundamentals, Third Edition
: Mark Ciampa
: Course Technology, Cengage Learning
: 2009
: PDF
: Mirknig.su
: 590
: 11,58
: English

Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam.
: ak5812 11-02-2019, 20:58 | : 0 |
:
: .., ..
: .: -
: 2005
C: 230
: pdf
: 15
:

, , . , , , , -, .
: rivasss 11-02-2019, 19:37 | : 0 |
: Malware Diffusion Models for Modern Complex Networks
: Vasileios Karyotis and M.H.R. Khouzani
: Morgan Kaufmann
: 2016
: PDF
: 10
: / English

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks.
: black 11-02-2019, 17:10 | : 0 |
: Wireless Personal Communications: Simulation and Complexity
: Mohsen A. M. El-Bendary
: Springer
: 2018
: EPUB, PDF
: 16
: / English

This book introduces wireless personal communications from the point of view of wireless communication system researchers. Existing sources on wireless communications put more emphasis on simulation and fundamental principles of how to build a study model. In this volume, the aim is to pass on to readers as much knowledge as is essential for completing model building of wireless communications, focusing on wireless personal area networks (WPANs).
: black 11-02-2019, 16:32 | : 0 |
: SDH
: .
: -
: 1997
C: 150
: pdf
: 12
:

SDH. , . : PDH . SDH. SONET. SONET/SDH. . : , . SDH.
: rivasss 11-02-2019, 12:33 | : 0 |
: IPv6 Address Planning
: Tom Coffeen
: O'Reilly Media
: 2014
: PDF, EPUB
: 30
: / English

If youre ready to join the move to IPv6, this comprehensive guide gets you started by showing you how to create an effective IPv6 address plan. In three example-driven sectionspreparation, design, and maintenanceyoull learn principles and best practices for designing, deploying, and maintaining an address plan far beyond whats possible with IPv4 networks.
: black 10-02-2019, 22:03 | : 0 |
: Mobile Marketing: How Mobile Technology is Revolutionizing Marketing, Communications and Advertising
: Daniel Rowles
: Kogan Page
: 2017
: PDF, EPUB
: 16
: / English

Mobile Marketing is a clear, practical guide to harnessing the mobile consumer and tackling the rising challenges of divided user attention across multiple screens at the same time. It demystifies the vast spectrum of tools and techniques now available and explains how to optimize these dynamics into an innovative and effective mobile marketing strategy. Now that website search rankings take into account mobile optimization, no serious marketer can do without a thorough understanding of mobile.
: black 10-02-2019, 21:44 | : 0 |
: Cisco VPN Configuration Guide
: Harris Andrea
: CreateSpace Independent Publishing Platform
: 2014
: PDF, EPUB
: 22
: / English

Become an expert in Cisco VPN technologies with this practical and comprehensive configuration guide. Learn how to configure IPSEC VPNs (site-to-site, hub-and-spoke, remote access), SSL VPN, DMVPN, GRE, VTI etc. This book is packed with step-by-step configuration tutorials and real world scenarios to implement VPNs on Cisco ASA Firewalls (v8.4 and above and v9.x) and on Cisco Routers. It is filled with raw practical concepts, around 40 network diagrams to explain the scenarios, troubleshooting instructions, 20 complete configurations on actual devices and much more. Both beginners and experts will find some golden nuggets inside this practical guide.
: black 9-02-2019, 16:40 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 214




 MirKnig.Su  2018