Computer networking tips

Xem 1-20 trên 130 kết quả Computer networking tips
  • The Certified Wireless Network Professional Training & Certification Program is intended for individuals who administer, install, design, and support IEEE 802.11 compliant wireless networks. Because the CWNP program is vendor neutral, candidates who achieve the different levels of CWNP Certification will be trained and qualified to administer and support many different brands of wireless LAN hardware.

    pdf390p truongnghen 21-01-2013 33 10   Download

  • The Internet is now a household term in many countries. With otherwise serious people beginning to joyride along the Information Superhighway, computer networking seems to be moving toward the status of TV sets and microwave ovens. The Internet has unusually high media coverage, and social science majors are descending on Usenet newsgroups, online virtual reality environments, and the Web to conduct research on the new "Internet Culture."

    pdf330p nguyenthucanh 03-05-2010 110 41   Download

  • Welcome to the Sunbelt Personal Firewall User Guide. This guide provides in-depth information and procedures that will not only help you to understand Sunbelt Personal Firewall, but also walk you through the steps needed to protect your computer or computer network.

    pdf115p nhacdohatinh 29-06-2010 113 31   Download

  • Unix was developed by AT&T in the late 1960s and early 1970s, and was freely distributed among a number of major universities during this time. Concurrently, these universities were developing the network that evolved into the Internet.

    pdf96p mylinh 17-08-2009 142 17   Download

  • Managing Cisco Network Security, offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats.

    pdf50p ken333 28-06-2012 73 12   Download

  • Interconnecting Cisco Network Devices, Part 1 (ICND1), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCENT™ and CCNA® foundation learning. This book provides you with the knowledge needed to configure Cisco switches and routers to operate in corporate internetworks. By reading this book, you will gain a thorough understanding of concepts and configuration procedures required to build a multiswitch, multirouter, and multigroup internetwork that uses LAN and WAN interfaces for the most commonly used routing and routed protocols....

    pdf50p ken333 28-06-2012 42 11   Download

  • The use of neural networks is permeating every area of signal processing. They can provide powerful means for solving many problems, especially in nonlinear, real-time, adaptive, and blind signal processing. The Handbook of Neural Network Signal Processing brings together applications that were previously scattered among various publications to provide an up-to-date, detailed treatment of the subject from an engineering point of view.

    pdf50p ken333 28-06-2012 58 11   Download

  • Are you looking for a quick and simple reference guide to help you navigate Red Hat® Linux™ systems? Look no further! Global Knowledge and Red Hat have assembled these 10 Tips and Tricks from Red Hat Certified Engineers® (RHCEs) to give you an edge on managing these systems. Have you ever needed to completely wipe out critical data from a hard drive? As we all know, mkfs doesn’t erase a lot. (You already knew this, right?) mkfs and its variants (e.g., mkfs.ext3 and mke2fs) only get rid of a few important data structures on the filesystem, but the data is...

    pdf9p huyhoang 06-08-2009 115 8   Download

  • This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network.

    pdf819p caucaphung 04-02-2013 22 8   Download

  • Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. ...

    pdf50p ken333 28-06-2012 48 6   Download

  • Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can.

    pdf0p rose_12 07-12-2012 39 5   Download

  • This thorough update to Novell's Complete Encyclopedia of Networking expands upon the original and provides a more comprehensive collection of data for all levels of network users. This Encyclopedia offers in-depth analysis of hardware, software, networking topologies, and network operating systems. Details on cabling, interface cards, shells, applications, standards, and protocols are also included. The companion CD contains the complete text of the encyclopedia, with graphics and tables.

    pdf50p ken333 28-06-2012 36 4   Download

  • Are you looking for a quick and simple reference guide to help you navigate Red Hat® LinuxTM systems? Look no further. Global Knowledge and Red Hat have assembled a second set of Tips and Tricks written by Red Hat Certified Engineers® (RHCEs) to give you an edge on managing these systems: 1. If a file has a link count greater than 1, is there a simpler way to find out what other file names are hard-linked to it? 2. Which interface is eth0? 3. Quick-and-dirty automounts 4. How can I make dd give me a progress report? 5. Tar vs. Star—The battle of xattrs 6. New default...

    pdf6p huyhoang 06-08-2009 30 3   Download

  • Để bảo đảm có dữ liệu tốt và chụp với hiệu quả cao th? vi c đầu tiên là phải chọn những "setting" sau ệ đây chính xác: file format, color space, ISO setting, white balance, exposure, color temparature, auto focus point, metering mode, và lens. Tôi cho rằng các bạn xử dụng từ medium tới high-end camera, nghĩa là có những setting nêu trên. Tôi xin lần lượt thảo luận từng phần một. 1.

    pdf40p windload 02-03-2010 112 27   Download

  • In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an increased demand for real-time and multimedia applications that have high Quality-of-Service (QoS) demands. This evolution lead to di±cult challenges for the Internet Service Providers (ISPs) to provide good QoS for their clients as well as for the ability to provide di®erentiated service subscriptions for those clients who are willing to pay more for value added services.

    pdf78p monkey68 13-03-2009 97 19   Download

  • Face plays an important role in human communication. Facial expressions and gestures incorporate nonverbal information which contributes to human communication. By recognizing the facial expressions from facial images, a number of applications in the field of human computer interaction can be facilitated. Last two decades, the developments, as well as the prospects in the field of multimedia signal processing have attracted the attention of many computer vision researchers to concentrate in the problems of the facial expression recognition....

    pdf452p bi_bi1 11-07-2012 54 16   Download

  • This book presents several recent advances on Evolutionary Computation, specially evolution-based optimization methods and hybrid algorithms for several applications, from optimization and learning to pattern recognition and bioinformatics. Concerning evolutionbased optimization methods, this book presents diverse versions of genetic algorithms, genetic programming, and performance studies and analyses, as well as several particle swarm optimizers and hybrid approaches using neural networks and artificial immunological systems for multi-objective optimization....

    pdf0p bi_bi1 11-07-2012 56 16   Download

  • Study Tips This product will provide you questions and answers along with detailed explanations carefully compiled and written by our experts. Try to understand the concepts behind the questions instead of cramming the questions. Go through the entire document at least twice so that you make sure that you are not missing anything.

    pdf28p thuyvan 12-08-2009 107 14   Download

  • The research of neural networks has experienced several ups and downs in the 20th century. The last resurgence is believed to be initiated by several seminal works of Hopfield and Tank in the 1980s, and this upsurge has persisted for three decades. The Hopfield neural networks, either discrete type or continuous type, are actually recurrent neural networks (RNNs). The hallmark of an RNN, in contrast to feedforward neural networks, is the existence of connections from posterior layer(s) to anterior layer(s) or connections among neurons in the same layer....

    pdf410p bi_bi1 11-07-2012 65 14   Download

  • While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: ©2003-2007 Check Point Software Technologies Ltd....

    pdf420p hoangtumayman 08-04-2010 87 13   Download

Đồng bộ tài khoản