Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Once again, this now-classic textbook has been revised to keep it up-to-date with our evolving field. While the Internet and its protocols now dominate networking everywhere, we see continued evolution in the technology used to support the Internet, with switching at “layer 2” providing rich functionality and...
An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications

An Introduction to LTE explains the technology used by 3GPP Long Term Evolution. The book covers the whole of LTE, both the techniques used for radio communication between the base station and the mobile phone, and the techniques used for signalling communication and data transport in the evolved packet core. It avoids unnecessary...

Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide

[Note: This Second Edition is also available in Kindle format!]

Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie! From "Death by
...

Cisco Router Configuration Handbook (2nd Edition) (Networking Technology)
Cisco Router Configuration Handbook (2nd Edition) (Networking Technology)

There are many sources of information and documentation for configuring Cisco networking

devices, but few provide a quick and portable solution for networking professionals. This book is designed to provide a quick-and-easy reference guide for a wide range of commonly used features that can be configured on...

Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
The Linux TCP/IP Stack: Networking for Embedded Systems (Networking Series)
The Linux TCP/IP Stack: Networking for Embedded Systems (Networking Series)

The Linux TCP/IP Stack: Networking for Embedded Systems provides an in-depth guide to implementing and using the Linux TCP/IP stack in embedded systems projects. It begins with a general overview of TCP/IP networking, with background information on applicable networking standards. From there, it details the TCP/IP implementation in Linux 2.6...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Absolute OpenBSD: UNIX for the Practical Paranoid
Absolute OpenBSD: UNIX for the Practical Paranoid

The definitive guide to OpenBSD

Foreword by Henning Brauer, OpenBSD PF Developer

OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD...

Communications and Networking: An Introduction (Undergraduate Topics in Computer Science)
Communications and Networking: An Introduction (Undergraduate Topics in Computer Science)

This textbook presents a detailed introduction to the essentials of networking and communications technologies. Revised and updated, this new edition retains the step-by-step approach of the original, organised to help those without a strong knowledge of the subject matter. Features: provides chapter-ending summaries and review questions, an...

Instant Node.js Starter
Instant Node.js Starter

Program your scalable network applications and web services with Node.js with this book and ebook

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Learn how to use module patterns and Node Packet Manager (NPM) in your applications
  • ...
Security for Multihop Wireless Networks
Security for Multihop Wireless Networks

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area...

Learning Pentesting for Android Devices
Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy