|
Similar eBooks: eBooks related to Packet Guide to Core Network Protocols |
Building Wireless Sensor Networks
Get ready to create distributed sensor systems and intelligent interactive devices using the ZigBee wireless networking protocol and Series 2 XBee radios. By the time you're halfway through this fast-paced, hands-on guide, you'll have built a series of useful projects, including a complete ZigBee wireless network that delivers remotely sensed data.
Radio networking is creating revolutions in volcano monitoring, performance art, clean energy, and consumer electronics. As you follow the examples in each chapter, you'll learn how to tackle inspiring projects of your own. This practical guide is ideal for inventors, hackers, crafters, students, hobbyists, and scientists.
OpenSocial Network Programming
OpenSocial is a set of common application programming interfaces for Web-based social network applications. As the first book on OpenSocial, this valuable resource discusses the unique area of social networking and the needs and different attributes of social network applications. You ll get step-by-step instructions for creating OpenSocial applications for multiple platforms and explore application development and deployment using integration technologies like the new Sun Zembly Platform. Plus, you ll examine newer technologies like the Sun Platform that allows even non-programmers the ability to mash up applications.
The Sustainable Network
The Sustainable Network demonstrates how we can tackle challenges, ranging from energy conservation to economic and social innovation, using the global network -- of which the public Internet is just one piece. To help solve a myriad of problems today, author Sarah Sorensen points out that the best tool for enacting change already exists, lying literally at our fingertips. This book demystifies the power of the network, and issues a strong call to action.
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. These recommendations will help you select and deploy the very best tools to monitor your own enterprise network.
Head First Networking
Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can.
With this book, you'll learn skills through a variety of genuine scenarios, from fixing a malfunctioning office network to planning a network for a high-technology haunted house. You'll learn exactly what you need to know, rather than a laundry list of acronyms and diagrams
Fragile networks
A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions
Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain World presents a comprehensive study of network systems and the roles these systems play in our everyday lives. This book successfully conceptualizes, defines, and constructs mathematically rigorous, computer-based tools for the assessment of network performance and efficiency, along with robustness and vulnerability analysis. The result is a thorough exploration that promotes an understanding of the critical infrastructure of today's network systems, from congested urban transportation networks and supply chain networks under disruption to financial networks and the Internet.
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.
Home Networking All-in-One Desk Reference For Dummies
If your household harbors more than one computer, you've probably wondered about home networking. Maybe you've gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue!
A network will make your life easier, and Home Networking All-In-One Desk Reference For Dummies makes it easier to create one. It shows you how to choose the right hardware, add user accounts, get different operating systems to work together, secure your network, exchange files, add wireless devices, and even use Wi-Fi out in public
Linux Networking Cookbook
If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network.
Network Security Assessment, Second Edition
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.
Packet Guide to Core Network Protocols - Free eBook Packet Guide to Core Network Protocols - Download ebook Packet Guide to Core Network Protocols free
|
|
|