Networking tips

Xem 1-20 trên 162 kết quả Networking tips
  • Unix was developed by AT&T in the late 1960s and early 1970s, and was freely distributed among a number of major universities during this time. Concurrently, these universities were developing the network that evolved into the Internet.

    pdf96p mylinh 17-08-2009 142 17   Download

  • The Certified Wireless Network Professional Training & Certification Program is intended for individuals who administer, install, design, and support IEEE 802.11 compliant wireless networks. Because the CWNP program is vendor neutral, candidates who achieve the different levels of CWNP Certification will be trained and qualified to administer and support many different brands of wireless LAN hardware.

    pdf390p truongnghen 21-01-2013 33 10   Download

  • First introduced in 2005, TOEFL iBT is being gradually introduced throughout the world. The paper-based test continues to be offered to supplement the TOEFL iBT test center network and in countries where the TOEFL iBT is not yet available. To view a list of TOEFL test center locations, visit the TOEFL website

    pdf15p kathy203 13-07-2010 157 90   Download

  • The Internet is now a household term in many countries. With otherwise serious people beginning to joyride along the Information Superhighway, computer networking seems to be moving toward the status of TV sets and microwave ovens. The Internet has unusually high media coverage, and social science majors are descending on Usenet newsgroups, online virtual reality environments, and the Web to conduct research on the new "Internet Culture."

    pdf330p nguyenthucanh 03-05-2010 111 41   Download

  • Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files....

    pdf240p ken333 14-06-2012 94 41   Download

  • Welcome to the Sunbelt Personal Firewall User Guide. This guide provides in-depth information and procedures that will not only help you to understand Sunbelt Personal Firewall, but also walk you through the steps needed to protect your computer or computer network.

    pdf115p nhacdohatinh 29-06-2010 113 31   Download

  • In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an increased demand for real-time and multimedia applications that have high Quality-of-Service (QoS) demands. This evolution lead to di±cult challenges for the Internet Service Providers (ISPs) to provide good QoS for their clients as well as for the ability to provide di®erentiated service subscriptions for those clients who are willing to pay more for value added services.

    pdf78p monkey68 13-03-2009 97 19   Download

  • One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms. In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.

    pdf353p ken333 06-07-2012 44 15   Download

  • The research of neural networks has experienced several ups and downs in the 20th century. The last resurgence is believed to be initiated by several seminal works of Hopfield and Tank in the 1980s, and this upsurge has persisted for three decades. The Hopfield neural networks, either discrete type or continuous type, are actually recurrent neural networks (RNNs). The hallmark of an RNN, in contrast to feedforward neural networks, is the existence of connections from posterior layer(s) to anterior layer(s) or connections among neurons in the same layer....

    pdf410p bi_bi1 11-07-2012 65 14   Download

  • Managing Cisco Network Security, offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats.

    pdf50p ken333 28-06-2012 73 12   Download

  • Interconnecting Cisco Network Devices, Part 1 (ICND1), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCENT™ and CCNA® foundation learning. This book provides you with the knowledge needed to configure Cisco switches and routers to operate in corporate internetworks. By reading this book, you will gain a thorough understanding of concepts and configuration procedures required to build a multiswitch, multirouter, and multigroup internetwork that uses LAN and WAN interfaces for the most commonly used routing and routed protocols....

    pdf50p ken333 28-06-2012 42 11   Download

  • The use of neural networks is permeating every area of signal processing. They can provide powerful means for solving many problems, especially in nonlinear, real-time, adaptive, and blind signal processing. The Handbook of Neural Network Signal Processing brings together applications that were previously scattered among various publications to provide an up-to-date, detailed treatment of the subject from an engineering point of view.

    pdf50p ken333 28-06-2012 58 11   Download

  • What makes this real? • BeGer understanding of: – algorithmic tradeoffs – applica%on behavior – protocol interac%ons • Switches with sleep mode

    pdf66p son2483 06-11-2010 55 9   Download

  • Are you looking for a quick and simple reference guide to help you navigate Red Hat® Linux™ systems? Look no further! Global Knowledge and Red Hat have assembled these 10 Tips and Tricks from Red Hat Certified Engineers® (RHCEs) to give you an edge on managing these systems. Have you ever needed to completely wipe out critical data from a hard drive? As we all know, mkfs doesn’t erase a lot. (You already knew this, right?) mkfs and its variants (e.g., mkfs.ext3 and mke2fs) only get rid of a few important data structures on the filesystem, but the data is...

    pdf9p huyhoang 06-08-2009 115 8   Download

  • This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network.

    pdf819p caucaphung 04-02-2013 22 8   Download

  • Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. ...

    pdf50p ken333 28-06-2012 48 6   Download

  • Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can.

    pdf0p rose_12 07-12-2012 40 6   Download

  • Building Scablable Cisco Internetworks is recommended training for individuals seeking Cisco CCNP certification. The course instruets network administrators ò medium to large network sites on the use of advanced IP addressing and routing in implementing scalabbility for Cisco routers connected to LANs and WANs

    pdf1155p vinhnghi 18-08-2009 38 5   Download

  • Use the commands in this chapter to configure and monitor Enhanced Interior Gateway Routing Protocol (EIGRP). For configuration information and examples, refer to the “Configuring EIGRP” chapter of the Network Protocols Configuration Guide, Part 1.

    pdf36p phuc123456789 24-12-2012 36 5   Download

  • The new overwatch security pillar acts as an infection detection, containment, and remediation engine that is automatically triggered when a threat has bypassed detection by the existing "in-line" infrastructure and has infiltrated the enterprise network. The overwatch security layer uses data from a real-time reputation and behavioral correlation database to detect active data-stealing malware and other potential threats.

    pdf14p khongmuonnghe 04-01-2013 32 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản