Tài liệu Thư viện số
Danh mục TaiLieu.VN
Kết quả 13-24 trong khoảng 256
Ebook Modern database management (Twelfth edition): Part 2
Ebook Modern database management (Twelfth edition): Part 2 presents the following content: Physical Database Design and Performance; Database Application Development; Data Warehousing; Data Quality and Integration; Big Data and Analytics;...
502 p apd 25/11/2023 29 0
Ebook UML @ Classroom An Introduction to Object-Oriented Modeling: Part 1
Ebook UML @ Classroom An Introduction to Object-Oriented Modeling: Part 1 presents the following content: A Short Tour of UML; The Use Case Diagram; The Class Diagram; The State Machine Diagram. Please refer to the documentation for more details.
94 p apd 25/11/2023 33 0
Ebook UML @ Classroom An Introduction to Object-Oriented Modeling: Part 2
Ebook UML @ Classroom An Introduction to Object-Oriented Modeling: Part 2 presents the following content: The Sequence Diagram; The Activity Diagram; All Together Now; Further Topics. Please refer to the documentation for more details.
121 p apd 25/11/2023 26 0
Ebook Network warrior (Second edition): Part 1
Ebook Network warrior (Second edition): Part 1 include of the following contents: Chapter 1: What Is a Network? Chapter 2: Hubs and Switches, Chapter 3: Autonegotiation, Chapter 4: VLANs, Chapter 5: Trunking, Chapter 6: VLAN Trunking Protocol, Chapter 7: Link Aggregation, Chapter 8: Spanning Tree, Chapter 9: Routing and Routers, Chapter 10: Routing Protocols, Chapter 11: Redistribution, Chapter 12: Tunnels, Chapter 13: First Hop Redundancy,...
366 p apd 25/11/2023 29 0
Ebook Network warrior (Second edition): Part 2
Ebook Network warrior (Second edition): Part 2 include of the following contents: Chapter 20: Telecom Nomenclature, Chapter 21: T1, Chapter 22: DS3, Chapter 23: Frame Relay, Chapter 24: MPLS, Chapter 25: Access Lists, Chapter 26: Authentication in Cisco Devices, Chapter 27: Basic Firewall Theory, Chapter 28: ASA Firewall Configuration, Chapter 29: Wireless, Chapter 30: VoIP, Chapter 31: Introduction to QoS, Chapter 32: Designing QoS, Chapter...
419 p apd 25/11/2023 27 0
Ebook Foundations of python network programing (3rd edition): Part 2
Part 1 book "Foundations of python network programming" includes content: Introduction to client-server networking; UDP; TCP; socket names and DNS; network data and network; TLS/SSL; Server Architecture; caches and Message; HTTP clients.
169 p apd 25/11/2023 34 0
Ebook Foundations of python network programing (3rd edition): Part 1
Part 2 book "Foundations of python network programming" includes content: HTTP servers, the world wide web, building and parsing E-Mail, SMTP, POP, IMAP, telnet and SSH, FTP, RPC.
200 p apd 25/11/2023 42 0
Ebook Privacy protection and computer forensics (Second edition): Part 1
Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 1 computer forensics, chapter 2 locating your sensitive data in your computer, chapter 3 specialized forensics applications, chapter 4 how can sensitive data be stolen from one's computer? chapter 5 why computer privacy and anonymity? chapter 6 practical measures for protecting sensitive information, chapter 7 basic protection from computer data...
147 p apd 25/11/2023 33 0
Ebook Modern operating systems (Fourth edition): Part 1
Ebook Modern operating systems (Fourth edition): Part 1 include of the following contents: Chapter 1 introduction, chapter 2 processes and threads, chapter 3 memory management, chapter 4 file systems, chapter 5 input/output, chapter 6 deadlocks, chapter 7 virtualization and the cloud.
547 p apd 25/11/2023 11 0
Ebook Modern operating systems (Fourth edition): Part 2
Ebook Modern operating systems (Fourth edition): Part 2 include of the following contents: Chapter 8 multiple processor systems; chapter 9 security; chapter 10 case study 1: Unix, Linux, and Android; chapter 11 case study 2: Windows 8; chapter 12 operating system design; chapter 13 reading list and bibliography.
590 p apd 25/11/2023 12 0
Ebook Privacy protection and computer forensics (Second edition): Part 2
Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 8 practical measures for online computer activities, chapter 9 advanced protection from computer data theft online, chapter 10 encryption, chapter 11 practical encryption, chapter 12 link encryption: VPNs, chapter 13 security of wireless connectivity: wifi and bluetooth, chapter 14 other computer-related threats to privacy, chapter 15...
219 p apd 25/11/2023 11 0
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 1: Introduction; Chapter 2: VoIP Architectures and Protocols; Chapter 3: Threats and Attacks; Chapter 4: VoIP Vulnerabilities; Chapter 5: Signaling protection mechanisms.
241 p apd 25/11/2023 18 0
Đăng nhập
Bộ sưu tập nổi bật
25 2613
Bộ sưu tập về Tài chính - Tiền tệ
11 17843
15 1201
779 516466
4 1518
Bộ sưu tập về Kế hoạch phát triển
16 23464
232 71989