Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)

Buy
This book explains how to build a Virtual Private Network (VPN), a collection of
technologies that creates secure collections or "tunnels" over regular Internet lines. It
discusses costs, configuration, and how to install and use technologies that are available for
Windows NT and UNIX, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the
secure shell (SSH). New features in the second edition include SSH and an expanded
description of the IPSec standard.
(HTML tags aren't allowed.)

Ruby Developer's Guide
Ruby Developer's Guide
"Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using...
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Immediately following the events of September 11, 2001, the National Academies (including the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council) offered its services to the nation to formulate a scientific and technological response to the challenges posed by emerging...
Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...


Unsolved Crimes (Criminal Investigations)
Unsolved Crimes (Criminal Investigations)
In "Unsolved Crimes", famous, unresolved cases from the past 120 years are examined to review what police and experts in forensic science did (or failed to do) while trying to resolve each crime. For each case covered, the key theories and suspects are described. Though technology is much improved since the time of Jack the Ripper in...
MDX with Microsoft SQL Server 2008 R2 Analysis Services Cookbook
MDX with Microsoft SQL Server 2008 R2 Analysis Services Cookbook

MDX-related books often dedicate a significant part of their content to explaining the concepts of multidimensional cubes, the MDX language and its functions, and other specifics related to working with Analysis Services. And that's perfectly fine, there should be books like that, the tutorials that teach the concepts. However, that also...

Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy