nav atļauts
nav atļauts
Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).
Nepieciešamā programmatūra
Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)
Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)
Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.
Interconnectivity Basics: Putting the Pieces Together | |
Building Highly Reliable Computer Networks, Richard Rauscher | |
Gigabit Ethernet, Colin Mick | |
Processor Types, A. Padgett Peterson | |
Server Data Bus Structures, A. Padgett Peterson | |
Dynamic IP Addressing with DHCP, Tom Hanley and Laura Knapp | |
LAN Connectivity Options for the Small Business, Nathan Muller | |
LAN Printing Techniques, Gilbert Held | |
An Overview of Cryptographic Methods, Gary C. Kessler | |
Assessing and Combating The Sniffer Threat, E. Eugene Schultz | |
TCP/IP Essentials, Smoot Carl-Mitchell | |
Configuring TCP/IP on a Windows NT Computer, Gilbert Held | |
Routing and Routing Protocols, Michael Gilbert | |
Evolution to Layer 2 and 3 Switching, Michael Gilbert | |
Implementing Routing, Switching, and VLAN in Modern Corporate Networks, Thomas Atkins | |
Remote Access Concepts and Techniques, Peter Southwick | |
Remote Access Authentication, Ellen Bonsall | |
Working With Cisco Access Lists, Gilbert Held | |
Securing Your Router, Gilbert Held | |
Advanced LAN and Interconnectivity: Building Enterprise Networks for the New Millennium | |
Advances in NIC Technology, Gilbert Held | |
Emerging High-Bandwidth Networks, Kevin M. Groom and Frank M. Groom | |
ATM Access: The Genesis of a New Network, William R. Koss | |
Voice and Data Network Integration , Larry Schessel | |
RSVP: Building Blocks of the Next Generation Internet, William Stallings | |
IPv6: The Next Generation Internet Protocol, Gary Kessler | |
Internet-based VPNs, Nathan Muller | |
Implementing and Supporting Extranets, Phillip Q. Maier | |
Virtual Corporations: A Need for Integrated Control and Perpetural, Steven Powell and Fredrick Gallegos | |
Building Enterprise Infrastructures with LAN-Based Technology | |
Windows NT Architecture, Gilbert Held | |
A Quick Overview of Linux, Raj Rajagopal | |
The Emergence of the Directory-Enabled Operating System, John P. Slone | |
Enterprise Directory Services, Martin Schleiff | |
Storage Area Networks, Jim Morin | |
Push Technology: Impact and Issues, Frederick Gallegos | |
Enterprise Deployment: Building an IP PBX Telephony Network, John Fiske | |
Internet Security: Securing the Perimeter, Douglas G. Conorich | |
Private Keys, Trusted Third Parties, and Kerberos, Alex Bidwell | |
Building Enterprise Solutions with LAN-Based Technology | |
Web-to-Information-Base Access Solutions, Marion Ceruti | |
Local Area Network Messaging, Russell Chung | |
Choosing and Equipping an Internet Server, Nathan Muller | |
Networking Features of the Java Language, John P. Slone | |
Java's Role in Distributed Computing, J.P. Morgenthal | |
The Pitfalls of Client/Server Development Projects, Paul Cullen | |
Creating a Paperless Workflow: A Case Study, Karen C. Fox and Mark N. Folick | |
Security and Control of Electronic Mail, Craig R. McGuffin | |
Applets and Network Security: A Management Overview, Al Berg | |
Management of LAN-Based Enterprise Networks | |
Managing Enterprise Systems Without a Strategy: A Case Study, Michael J. Masterson | |
Proactive Performance Management, Tim Clark | |
Issues in Managing Multimedia Networks, Luc. T. Nfuyen | |
Network Data and Storage Management Techniques, Lawrence D. Rogers | |
License Tracking and Metering Software, Nathan Muller | |
Working with NT's Performance Monitor, Gilbert Held | |
Evaluating the Performance of NT-Based Systems, Gilbert Held | |
Developing a Network Security Plan, Frederick Gallegos and Stephen Tanner | |
Firewall Management and Internet Attacks, Jeffrey J. Lowder |