• Welcome!
Total books

Communicaion and Telecommunication

Sort by
Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach

Troubleshooting-and-Maintaining-Your-PC-All-in-One-For-Dummies-3rd-Edition

Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you.

Practical Windows Forensics
Practical Windows Forensics Sented by Sarah Gerdes

Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade your existing knowledge.

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

Mastering Mobile Forensics
Mastering Mobile Forensics Sented by Rebecca

A mastering guide to help you overcome the roadblocks you face when dealing with mobile forensics Excel at the art of extracting data, recovering deleted data, bypassing screen locks, and much more Get best practices to how to collect and analyze mobile device data and accurately document your investigations

Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks

Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers with CUDA-capable video display cards.

Cyber Security for You
Cyber Security for You Sented by Steve Bark

At our company, we research cyber hacking attacks all over the world to see if our server protection product will protect against the techniques used in the attack. In the course of this research, one important conclusion kept leaping out: MOST HACKING ATTEMPTS ARE PREVENTABLE FOR LITTLE COST AND SOME KNOWLEDGE.

Cisco Secure Internet Security Solutions (Cisco Press Core Series)

At present, no available publication deals with Internet security from a Cisco perspective utilizing the Cisco Secure product family. Cisco Secure Internet Security Solutions covers the basics of Internet security and then concentrates on each member of the Cisco Secure product family, providing a rich explanation with examples of the preferred configurations required for securing Internet connections

Cisco LAN Switching Configuration Handbook

Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE® No. 6108 David Jansen, CCIE No. 5952 David Hucaby, CCIE No. 4594 Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series of chapters that provide design and configuration guidelines. Each chapter starts with common design overviews and then describes the configuration of management features. Coverage includes Layer 2, Layer 3, multicast, high availability, and traffic management configurations.

Cisco ISP Essentials (Cisco Press Networking Technology Series)

A comprehensive guide to the best common practices for Internet service providers Learn the best common practices for configuring routers on the Internet from experts who helped build the Internet Gain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS Software Understand the Cisco IOS tools essential to building and maintaining reliable networks Increase your knowledge of network security Learn how to prevent problems and improve performance through detailed configuration examples and diagrams

Cisco Intelligent WAN (IWAN) (Networking Technology)

The complete guide to Cisco® IWAN: features, benefits, planning, and deployment Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection. Cisco IWAN simplifies WAN design, improves network responsiveness, and accelerates deployment of new services. Now, there’s an authoritative single-source guide to Cisco IWAN: all you need to understand it, design it, and deploy it for maximum value.

CCNA Cloud CLDFND 210-451 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

Troubleshooting Docker
Troubleshooting Docker Sented by Luis

Strategically design, troubleshoot, and automate Docker containers from development to deployment About This Book * Utilize current and emergent technologies for effective Docker orchestration and management * A step-by-step guide to diagnosing and fixing problems with Docker containers. Who This Book Is For This book is intended for seasoned solutions architects, developers, and programmers, system engineers, and administrators to help you troubleshoot common areas of Docker containerization.

Surface For Dummies
Surface For Dummies Sented by Steve Bark

Clear the surface and make way for the new tablet from Microsoft! As Microsoft's first foray into the tablet market, the Surface is packed with all the features you're looking for to stay entertained and get things done wherever you go. Written by bestselling veteran author Andy Rathbone, this full-color, easy-to-understand book is packed with information on how to use the new interface, figure out the operating system, navigate the new app environment, and take full advantage of this exciting new tablet device.

Sort by