Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)
CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)
This book is intended to provide an introduction to the exciting and emerging world of wireless LAN technology. This technology continues to expand at a phenomenal pace with constant improvements in speed, reliability, and security. Reading this book will teach you the fundamentals of standards-based technology, giving you an overview of the...
The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
QoS and QoE Management in UMTS Cellular Systems
QoS and QoE Management in UMTS Cellular Systems
This comprehensive volume provides state-of-the art guidance on Quality of Service (QoS) and Quality of end-user Experience (QoE) management in UMTS cellular systems, tackling planning, provisioning, monitoring and optimisation issues in a single accessible resource. In addition, a detailed discussion is provided on service applications, QoS...
Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
High Performance Switches and Routers
High Performance Switches and Routers

Learn to Design High Performance Switches and Routers for Today's Ever Growing Internet Traffic

As Internet traffic continues to grow, and demands for quality of service become more stringent, researchers and engineers can turn to High Performance Switches and Routers for tested and proven solutions. This...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy