Narrow your search
Listing 1 - 9 of 9
Sort by
Designing and implementing Ethernet networks
Author:
ISBN: 0894353667 0894352520 Year: 1988 Publisher: Wellesley QED Information Sciences


Book
Network concepts and architectures
Author:
ISBN: 0894352709 Year: 1989 Publisher: Wellesley, Mass. QED Information Sciences

Advanced Ethernet/802.3 network management and performance
Author:
ISBN: 1555581447 Year: 1996 Publisher: Bedford (Mass.) : Digital press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Abbe och Bonniers : ett porträtt av Bonnierföretagen
Author:
ISBN: 9100420166 Year: 1977 Publisher: Stockholm : Bonnier,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Auto MATH Handbook : Easy Calculations for Engine Builders, Auto Engineers, Racers, Students and Performance Enthusiasts
Authors: ---
ISBN: 9781557885548 Year: 2011 Publisher: New York HPBooks

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Cybersecurity operations handbook
Authors: ---
ISBN: 1281035270 9786611035273 0080530184 1555583067 9781555583064 9780080530185 9781281035271 6611035273 Year: 2003 Publisher: Amsterdam ; Boston : Elsevier Digital Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and compl

Networking explained
Authors: ---
ISBN: 1281019828 9786611019822 0080512593 1435601068 1555582524 9781555582524 9781435601062 9781281019820 6611019820 9780080512594 Year: 2002 Publisher: Boston : Digital Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.Wireless networksConvergence of voice and dataMultimedia networking

Networking explained
Authors: ---
ISBN: 9781555582524 1555582524 9781435601062 1435601068 Year: 2002 Publisher: Boston Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence. Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology. Wireless networks Convergence of voice and data Multimedia networking.

Keywords

Cybersecurity operations handbook
Authors: ---
ISBN: 9781555583064 1555583067 9780080530185 0080530184 1281035270 9781281035271 9786611035273 6611035273 Year: 2003 Publisher: Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security.

Listing 1 - 9 of 9
Sort by