Pages : | 512 |
Size : | |
File type : | HTML |
Downloads: | 214 |
Created: | 2021-05-15 |
License: | Free |
Author(s): | Charu C. Aggarwal |
Artificial Neural Networks - Architectures and Applications
Advanced Applications for Artificial Neural Networks
Artificial Neural Networks - Models and Applications
Artificial Neural Networks - Methodological Advances and Biomedical Applications
Download tutorial about configuring VoIP call and setup monitoring, it's a free training document material in 14 pages by Scisco designated to intermediate level users....
VoIP Tutorial in PDFThis pdf tutorial discusses the advantages and disadvantages of using VoIP services, focusing primarily on security issues that may affect those who are new to VoIP....
The Security Development LifecycleDownload free course The Security Development Lifecycle, pdf file on 348 pages by Michael Howard, Steve Lipner....
Introduction to Ethical HackingDownload Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....
Computer Networking : Principles, Protocols and PracticeThis is an ongoing effort to develop an open-source networking textbook that could be used for an in-depth undergraduate or graduate networking courses. ...
Network Security TutorialDownload free Network Security Tutorial in PDF for beginners (Network Security Fundamentals, Why We Need Security, Definitions and Concepts)....
Zabbix 1.8 Network MonitoringImagine you're celebrating the start of the weekend with Friday-night drinks with a few fr..., download free Network Monitoring tutorial in PDF (428 pages) created by Rihards Olups ....
Autonomous Control for a Reliable Internet of ServicesDownload free course Autonomous Control for a Reliable Internet of Services, pdf file on 416 pages by by Ivan Ganchev, R. van der Mei, Hans van den Berg....
Network TopologiesDownload free network topologies tutorial course material and training in PDF file under 4 pages by Maninder Kaur....
Network Protocols and VulnerabilitiesThis tutorial is about the network security and how they are not perfect ,it decribe some of attacks and how to protect against them....