راهنمای تصویری تجهیزات شبکه
Advanced Persistent Training
AngularJS Directives
Using Scribe Insight
Server Load Balancing
Running IPv6
Architecting the Cloud
Icinga Network Monitoring
CompTIA Cloud+ Study Guide Exam ...
Get ready for the CompTIA Cloud+ Exam CV0-002 with this comprehensive resource If you’re looking to earn the challenging, but rewarding CompTIA Cloud+ ...
Enterprise Cybersecurity Study ...
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in ...
راهنمای تصویری تجهیزات شبکه
rj11, rj45, rj58, آموزش نصب شبکه, راهنمای تصویری تجهیزات شبکه, سویج, شبکه, شبکه محلی, کابل شبکه, لن, هاب
Advanced Persistent Training
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have in ...
Cloud Networking for Big Data
This book introduces two basic big data processing paradigms for batch data and streaming data. Representative programming frameworks are also present ...
AngularJS Directives
AngularJS, propelled by Google, is quickly becoming one of the most popular JavaScript MVC frameworks available, working to invert the development par ...
VMware Horizon Mirage Essential ...
Managing desktop software builds has always been a time consuming task. Having to build and maintain multiple different images for the various use cas ...
Using Scribe Insight
The Scribe platform is an essential toolkit for anyone developing a migration or integration with CRM platforms. Understanding how to utilize the work ...
Network Attacks and Exploitatio ...
Incorporate offense and defense for a more effective network security strategyNetwork Attacks and Exploitation provides a clear, comprehensive roadmap ...
IPv6 Deployment and Management
A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than a ...
Introduction to Computer Networ ...
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cyb ...
Emerging Wireless Multimedia: S ...
The provision of IP-based multimedia services is one of the most exiting and challenging aspects of next generation wireless networks. A significant e ...
End-to-End Quality of Service o ...
This comprehensive resource contains a detailed methodology for assessing, analyzing and optimizing End-to-End Service Performance under different cel ...
Server Load Balancing
Load balancing improves network performance by distributing traffic efficiently so that individual servers are not overwhelmed by sudden fluctuations ...
Zend Framework 2 Application De ...
Zend Framework 2 has a flexible architecture that lets us build modern web applications and web services easily. It also provides an easy-to-use, high ...
Running IPv6
Running IPv6 explains how to install and operate the IPv6 protocol for Windows XP, Mac OS X, FreeBSD, Red Hat Linux, and Cisco routers. The book also ...
Building and Maintaining a Data ...
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed prod ...
Learning System Center App Cont ...
System Center App Controller provides an integrated console that helps you manage public and private clouds, as well as cloud-based virtual machines a ...
Mastering Wireless Penetration ...
Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By p ...
Architecting the Cloud
An expert guide to selecting the right cloud service model for your businessCloud computing is all the rage, allowing for the delivery of computing an ...
4G: Deployment Strategies and O ...
As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decis ...
Home Networking All-in-One Desk ...
If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as to start setting up a ne ...
Icinga Network Monitoring
Icinga has a very flexible configuration that lets you describe your network and server’s infrastructure, and tell Icinga what services you want to mo ...
BackTrack 5 Wireless Penetratio ...
Written in Packt’s Beginner’s Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. E ...