" "



:





...

.. 1 2 3 4 5 6 7 8 9 10 ... 181


: Arash Shaban-Nejad, John S. Brownstein, David L. Buckeridge
: Public Health Intelligence and the Internet
: Springer
: 2017
: Lecture Notes in Social Networks
ISBN: 331968602X
: English
: pdf
: 11,1 mb
: 148

This book aims to highlight the latest achievements in epidemiological surveillance and internet interventions based on monitoring online communications and interactions on the web.
: daromir 12-07-2018, 14:18 | : 0 |
: Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations
: Peter Southwick
: O'Reilly Media
: 2012
: PDF
: 11
: / English

In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long "travelogue" follows a team of Juniper Networks warriors as they solve specific needs with emerging network platform architectures. In these case studies, Southwick and his fellow warriors analyze a clients particular situation, arrive at an architectural solution, and work through the deployment details. For anyone who operates, installs, designs, or works in IT, this book provides an intimate and entertaining look at whats changing and why.
: black 12-07-2018, 12:57 | : 0 |
: CCNP ISCW Official Exam Certification Guide
: Brian Morgan, Neil Lovering
: Cisco Press
: 2007
ISBN: 9781587201509
: pdf
: 696
: 18,5 mb
: English

CCNP ISCW Official Exam Certification Guideis a best of breed Cisco exam study guide that focuses specifically on the objectives for the Implementing Secure Converged Wide Area Networks exam (642-825 ISCW). Successfully passing the ISCW 642-825 exam certifies that you have the knowledge and skills necessary to secure and expand the reach of an enterprise network to teleworkers and remote sites with focus on securing remote access and VPN client configuration.
: daromir 12-07-2018, 10:34 | : 0 |

: CompTIA Security+ Review Guide, 4th Edition
: James M. Stewart
: Wiley
: 2018
: 670
: PDF
: 27,4 M
: English

CompTIA Security+ Review Guide, Fourth Edition, is the smart candidates secret weapon for passing Exam SY0-501 with flying colors. Youve worked through your study guide, but are you sure youre prepared? This book provides tight, concise reviews of all essential topics throughout each of the exams six domains to help you reinforce what you know. Take the pre-assessment test to identify your weak areas while there is still time to review, and use your remaining prep time to turn weaknesses into strengths. The Sybex online learning environment gives you access to portable study aids, including electronic flashcards and a glossary of key terms, so you can review on the go. Hundreds of practice questions allow you to gauge your readiness, and give you a preview of the big day.
: vitvikvas 12-07-2018, 09:01 | : 0 |
: Containers in OpenStack: Leverage OpenStack services to make the most of Docker, Kubernetes and Mesos
: Pradeep Kumar Singh, Madhuri Kumari
: Packt Publishing
ISBN: 1788394380
: 2017
: 176
:
: epub, mobi, azw3, pdf (conv)
: 10.1 MB

A practical book which will help the readers understand how the container ecosystem and OpenStack work together. Containers are one of the most talked about technologies of recent times. They have become increasingly popular as they are changing the way we develop, deploy, and run software applications. OpenStack gets tremendous traction as it is used by many organizations across the globe and as containers gain in popularity and become complex, it's necessary for OpenStack to provide various infrastructure resources for containers, such as compute, network, and storage.
: Ingvar16 12-07-2018, 05:12 | : 0 |
: Kali Linux Wireless Penetration Testing Cookbook
: Sean-Philip Oriyano
: Packt Publishing
ISBN: 1783554088
: 2017
: 216
:
: epub, pdf (conv)
: 10.17 MB

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes. More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results.
: Ingvar16 12-07-2018, 04:23 | : 0 |
: Mastering Proxmox: Build virtualized environments using the Proxmox VE hypervisor, Third Edition
: Wasim Ahmed
: Packt Publishing
ISBN: 1788397606
: 2017
: 494
:
: epub
: 11.9 MB

Discover real world scenarios for Proxmox troubleshooting and become an expert cloud builder. Proxmox is an open source server virtualization solution that has enterprise-class features for managing virtual machines, for storage, and to virtualize both Linux and Windows application workloads.
You'll begin with a refresher on the advanced installation features and the Proxmox GUI to familiarize yourself with the Proxmox VE hypervisor. Then, you'll move on to explore Proxmox under the hood, focusing on storage systems, such as Ceph, used with Proxmox. Moving on, you'll learn to manage KVM virtual machines, deploy Linux containers fast, and see how networking is handled in Proxmox.
: Ingvar16 12-07-2018, 02:53 | : 0 |
: Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition
: Cameron Buchanan, Vivek Ramachandran
: Packt Publishing
ISBN: 1788831926
: 2017
: 210
:
: epub
: 11.8 MB

Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.
: Ingvar16 12-07-2018, 01:24 | : 0 |
: Wireshark Revealed: Essential Skills for IT Professionals
: James H Baxter, Yoram Orzach
: Packt Publishing
ISBN: 1788833228
: 2017
: 912
:
: epub
: 47.8 MB

Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to troubleshoot network problems. This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. You will then discover different ways to create and use capture and display filters. By halfway through the book, you'll be mastering Wireshark features, analyzing different layers of the network protocol, and looking for any anomalies.We then start Ethernet and LAN switching, through IP, and then move on to TCP/UDP with a focus on TCP performance problems.
: Ingvar16 12-07-2018, 01:08 | : 0 |
: Cisco
:
: .: ""
: 2003
ISBN: 5845904439
: djvu
: 672 .: .
: 17,2 mb
:

.
: daromir 12-07-2018, 00:23 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 181

 MirKnig.Su  2018