eBooks-it.org Logo
eBooks-IT.org Inner Image

Network Administration eBooks

Download free Network Administration eBooks

USB Mass Storage

Designing and Programming Devices and Embedded Hosts
USB Mass Storage Image
This developer's guide for designers and programmers of mass-storage devices that use the Universal Serial Bus (USB) interface provides developers with information on how to choose storage media, interface the media to a microcontroller or other CPU, and write device firmware to access the media and perform USB communications. Comparisons of popular storage-media options to help users choose a media type for a project are included, and the types described cover hard drives and flash-memory cards such as the MultiMediaCard (MMC), Secure Digital (SD) card, and CompactFlash card. Helpful tips on developing an embedded host that can access USB mass-storage devices are also covered....

Seven Deadliest USB Attacks

Seven Deadliest USB Attacks Image
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB HacksawUSB SwitchbladeUSB Based Virus/Malicous Code LaunchUSB Device OverflowRAMdumpPod SlurpingSocial Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globall...

Configuring Juniper Networks NetScreen & SSG Firewalls

Configuring Juniper Networks NetScreen & SSG Firewalls Image
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.Configure Juniper's Instant Virtual Extranet (IVE). Install and set up IVE through either the command line interface (CLI) or Web-based console. Master the "3 Rs": Realms, Roles, and Resources.Realize the potential of the 3Rs for en...

Data Compression

The Complete Reference
Data Compression Image
4th Edition
"A wonderful treasure chest of information; spanning a wide range of data compression methods, from simple test compression methods to the use of wavelets in image compression. It is unusual for a text on compression to cover the field so completely." ACM Computing Reviews "Salomons book is the most complete and up-to-date reference on the subject. The style, rigorous yet easy to read, makes this book the preferred choice [and] the encyclopedic nature of the text makes it an obligatory acquisition by our library." Dr Martin Cohn, Brandeis University Data compression is one of the most importanttools in modern computing, and there...

Data Compression

The Complete Reference
Data Compression Image
3rd Edition
Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression. Data Compression provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of "how to" use them. The presentation is organized into the main branches of the field of data compression: run length encoding, statistical methods, dictionary-ba...

2007 - 2017 © eBooks-IT.org