Categories : Networking |
STORAGE NETWORKS EXPLAINED BASICS AND APPLICATIONS SAN,NAS,ISCSI AND INFINIBAND |
Published by wiley.
Publication : Wiley
NRS 480.00
|
|
|
|
NETWORKING THE COMPLETE REFERENCE |
Published by mcgrawhill.
Publication : Tata
NRS 1650.00
|
|
|
|
NETWORKING FOR DUMMIES |
Published by wiley.
Publication : Wiley
NRS 430.00
|
|
|
|
PRACTICAL VOIP USING VOCAL |
While many books describe the theory behind voice over ip, only practical voip using vocal describes how such a phone system was actually built, and how you too can acquire the source code, install it onto a system, connect phones, and make calls.
v...
Publication : Oreilly
NRS 720.00
|
|
|
|
NOKIA SMARTPHONE HACKS |
It wasn't long ago that owning a cell phone put you on the cusp of modern technology. now, just a few short years later, "smartphones" have taken over, profoundly changing the way we socially interact. not surprisingly, they have become the most s...
Publication : Oreilly
NRS 640.00
|
|
|
|
NETWORK WARRIOR |
This book begins where certification exams leave off, and equips you to work in the real world. a thorough and practical guide to network infrastructure, network warrior helps you deal with real cisco networks, rather than the hypothetical situations...
Publication : Oreilly
NRS 720.00
|
|
|
|
NETWORK TROUBLESHOOTING TOOLS |
Over the years, thousands of tools have been developed for debugging tcp/ip networks. they range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad ethernet cables. even bet...
Publication : Oreilly
NRS 400.00
|
|
|
|
NETWORK SECURITY TOOLS WRITING, HACKING, AND MODIFYING SECURITY TOOLS |
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that ar...
Publication : Oreilly
NRS 560.00
|
|
|
|
NETWORK SECURITY HACKS, 2ND EDITION |
The techniques intruders use for network attacks are always evolving, so the tools and methods you use to defend yourself and your network must change to keep pace. network security hacks, second edition, updates all of your system-critical tools and...
Publication : Oreilly
NRS 680.00
|
|
|
|
NETWORK SECURITY ASSESSMENT, 2ND EDITION |
How secure is your network? the best way to find out is to attack it. network security assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in internet-based networks-the same penetratio...
Publication : Oreilly
NRS 720.00
|
|
|
|
|