This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed ‘how-to’ instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs.
Chủ Nhật, 15 tháng 3, 2015
Guide to Cisco Routers Configuration
Thứ Năm, 29 tháng 1, 2015
Criminalistics Laboratory Manual
Criminalistics Laboratory Manual provides students who have little to no prior knowledge of forensic science with a practical crime scene processing experience. The manual starts with an original crime scene narrative, setting up the crime students are to solve. This narrative is picked up in each of the 17 forensic science lab activities, tying all forensic disciplines together to show the integrated workings of a real crime lab. The lab activities cover fingerprints, blood typing and spatter analysis, hair and fiber, digital forensics and more.
Thứ Năm, 18 tháng 12, 2014
Beginning Apache Struts
Beginning Apache Struts will provide you a working knowledge of , Struts. This book is ideal for you , programmers who have some JSP familiarity, but little or no prior experience with Servlet technology.,
Organized in a condensed tutorial and lab format, the material in this book has been tested in real classroom environments. It takes a step-by-step, hands-on approach to teaching you Struts. The book even previews the next generation of Struts, the Apache Shale. The overall result is that you can quickly apply Struts to your work settings with confidence.
Thứ Hai, 15 tháng 12, 2014
BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration , is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your , perspective in today’s digital age.