𝔖 Scriptorium

✦ 131,085 VOLUMES FOUND FOR "Intelligent Non-hierarchical Manufacturing Networks" (283 ms)

Upgrading and Repairing Networks
✍ Scott Mueller, Terry W. Ogletree πŸ“‚ Library πŸ“… 2003 πŸ› Que 🌐 English

Though he didn't do the writing himself, Scott Mueller's involvement in Upgrading and Repairing Networks is evident in the thoroughness of the book's coverage and the quality with which documentation has been written and compiled. Like Mueller's highly respected books on personal computer hardware,

Top-down network design
✍ Priscilla Oppenheimer πŸ“‚ Library πŸ“… 2004 πŸ› Cisco Press 🌐 English

Top-Down Network Design, Second Edition, is a practical and comprehensive guide to designing enterprise networks that are reliable, secure, and manageable. Using illustrations and real-world examples, it teaches a systematic method for network design that can be applied to campus LANs, remote-access

Managing Cisco Network Security
✍ Florent Parent, Oliver Steudler πŸ“‚ Library πŸ“… 2000 πŸ› Syngress 🌐 English

Don't wait until it's too late to find out you have security holes in your Cisco network. As security threats to enterprise networks continue to mount, it is critical that network managers know how to properly deploy and configure the Cisco Secure family of products. This book describes in detail ho

IP in Wireless Networks
✍ Basavaraj Patil, Yousuf Saifullah, Stefano Faccin, Srinivas Sreemanthula, Lachu πŸ“‚ Library πŸ“… 2003 πŸ› Prentice Hall 🌐 English

IP in Wireless Networks is the first comprehensive guide that shows how IP is enabled in 2G, 2.5G and 3G wireless networks. A world-class team of wireless engineers presents a systematic, expert guidance for every leading wireless technology, including 802.11, Bluetooth(tm), GSM/GPRS, CDMA and i-mod

Java 2 Network Security
✍ Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok Ramani πŸ“‚ Library πŸ“… 1999 πŸ› Charles River Media 🌐 English

Java is fashionable, but is it reliable? Java is entertaining, but is it secure? Java is useful, but is it safe?The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book differen

Biometrics for Network Security
✍ Paul Reid πŸ“‚ Library πŸ“… 2003 πŸ› Prentice Hall PTR 🌐 English

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate. Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evol

Hack Proofing Your Network
✍ Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress πŸ“‚ Library πŸ“… 2001 πŸ› Syngress 🌐 English

The book explains important terms like "smashing the stack, " "blind spoofing, " "building a backward bridge, " "steganography, " and "buffer overflow, " and why you need to worry about them. It also shows how to protect servers from attacks by using a five-step approach: Planning, Network/Machine R

Mobile Satellite Communication Networks
✍ Ray E. Sheriff, Y. Fun Hu πŸ“‚ Library πŸ“… 2001 πŸ› Wiley 🌐 English

Mobile satellite services are set to change with the imminent launch of satellite personal communication services (S-PCS), through the use of non-geostationary satellites. This new generation of satellites will be placed in low earth orbit or medium earth orbit, hence, introducing new satellite desi

Network Programming with Perl
✍ Lincoln D. Stein πŸ“‚ Library πŸ“… 2001 πŸ› Addison-Wesley Professional 🌐 English

"Network programming" - the term had a distinct meaning once, but now it begs the question, "Is there another kind?" That's why Lincoln Stein's Network Programming with Perl is valuable. It shows how one of the world's top Perl authorities brings the language to bear on problems that require communi

OSPF Network Design Solutions
✍ Thomas M.Thomas πŸ“‚ Library πŸ“… 1998 πŸ› Cisco Systrms,1998 🌐 English

The comprehensive reference for OSPF network design and deployment * Understand the full dynamics of OSPF network components, how they interact with one another, and how to configure them * Increase the efficiency of your OSPF network through a variety of performance tuning techniques * App

Wireless Broadband Networks Handbook
✍ John R. Vacca πŸ“‚ Library πŸ“… 2001 πŸ› McGraw-Hill Companies 🌐 English

Take advantage of the speed and efficiency of wireless broadband networks using this hands-on guide. Covering all of the latest protocols in wireless communication - including LMDS, MMDS and Wireless Local Loop (WLL) technologies - this book offers complete instructions for installing, configuring,

Packet Broadband Network Handbook
✍ Haojin Wang πŸ“‚ Library πŸ“… 2002 πŸ› McGraw-Hill Professional 🌐 English

The most comprehensive book on the shelf about a family of technologies that are cornering the market in enhanced telecommunications services.

Designing a Wireless Network
✍ Wheat J., Hiser R., Tucker J. πŸ“‚ Library πŸ“… 2001 🌐 English

Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing eff

Developing IP multicast networks
✍ Beau Williamson πŸ“‚ Library πŸ“… 1999 πŸ› Cisco Press 🌐 English

Includes an in-depth discussion of the PIM protocol used in CISCO routers and detailed coverage of the rules that control the creation and maintenance of CISCO route state entries. Provides a solid foundation of basic IP multicast concepts, as well as the information needed to acutally design and de

Next-Generation Network Services
✍ Robert Wood πŸ“‚ Library πŸ“… 2005 πŸ› Cisco Press 🌐 English

A guide to building service-oriented networks to differentiate and grow your businessβ€’ Understand the changing landscape of the telecommunications industry and what technologies can lead to business and revenue growthβ€’ Examine the rise of IP in LAN, WAN, wireless, and global networking applicati

Aggressive Network Self-Defense
✍ Chris Hurley πŸ“‚ Library πŸ“… 2004 πŸ› Syngress 🌐 English

I'm Mad As Hell, and I'm Not Gonna Take it Anymore! * Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques. * Follow the travails of eight system administrators who take cyber law into their own hands.

Securing Cisco IOS Networks
πŸ“‚ Library πŸ“… 2004 🌐 English

Cisco is moving aggressively into the network security arena by unveiling a line-up of a dozen new security products and services, integrating security software features such as firewalls, intrusion detection systems, and VPNs into their industry leading networking hardware offerings. To ensure adeq

Understanding Linux Network Internals
✍ Christian Benvenuti πŸ“‚ Library πŸ“… 2005 πŸ› O'Reilly Media 🌐 English

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols - or if you just want to learn about modern networking through real-life examples - Understanding Linux Network Internals is for you. Like the popular O'Reilly book, Understanding the Linux Kernel,

Building service provider networks
✍ Howard C. Berkowitz πŸ“‚ Library πŸ“… 2002 πŸ› Wiley 🌐 English

To be competitive, service providers cannot customize every installation but must simultaneously offer services that meet a wide range of perceived customer needs. This guide shows commercial service providers and equipment vendors how to build competitive service offerings for enterprise-specific n

Network+ Exam Prep 2
✍ Mike Harwood πŸ“‚ Library πŸ“… 2005 πŸ› Que 🌐 English

Attention Network+ Candidates: Stop spending valuable study time sorting through confusing study aids. Network + Exam Prep 2 is the ultimate self-study guide for the Network + exam. Featuring exercises, self-assessments, study strategies, exam tips and notes, this comprehensive guide will help you u


πŸ”₯ TRENDING TOMES


Spirit boards for beginners: the history
✍ Chauran, Alexandra πŸ“‚ Library πŸ“… 2014 πŸ› Llewellyn Worldwide, LTD.;Llewellyn Publications 🌐 English πŸ‘ 20 views

While spirit boards have sometimes received a negative reputation, they are a perfectly safe way to communicate when used properly. Sharing dozens of heartwarming tales and creepy encounters, silly games and life-changing occurrences, author Alexandra Chauran provides everything you need to know to

Mathematical Inequalities: A Perspective
✍ Pietro Cerone, Silvestru Sever Dragomir πŸ“‚ Library πŸ“… 2010 πŸ› CRC 🌐 English πŸ‘ 19 views

Drawing on the authors’ research work from the last ten years, Mathematical Inequalities: A Perspective gives readers a different viewpoint of the field. It discusses the importance of various mathematical inequalities in contemporary mathematics and how these inequalities are used in different appl

Security and Politics in South Africa: T
✍ Peter Vale πŸ“‚ Library πŸ“… 2002 πŸ› Lynne Rienner Publishers 🌐 English πŸ‘ 17 views

<p>In this analysis of South Africa's postapartheid security system, Peter Vale moves beyond a realist discussion of interacting states to examine southern Africa as an integrated whole. Vale argues that, despite South Africa's manipulation of state structures and elites in the region for its own en

Diagnostic Surgical Pathology of the Hea
✍ Douglas R. Gnepp MD πŸ“‚ Library πŸ“… 2009 πŸ› Saunders 🌐 English πŸ‘ 13 views

This resource is the authoritative guide to problematic areas of the head and neck for the surgical pathologist. With particular emphasis placed on diagnostic problems and differential diagnosis in addition to coverage of more common diagnostically straightforward lesions, you’ll get the most comple