Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
LTE for 4G Mobile Broadband: Air Interface Technologies and Performance
LTE for 4G Mobile Broadband: Air Interface Technologies and Performance
"This text is an especially helpful as an accompaniment to the 3GPP specifications themselves, which offer no explanations as to why one thing or another is included, no hint as to why one protocol technique was chosen over another, or why certain contributions appear only to disappear in later releases. Khan's text offers a welcome set of...
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then...
Ethereal Packet Sniffing
Ethereal Packet Sniffing

Ethereal offers more protocol decoding and reassembly than any free sniffer out there and ranks well among the commercial tools. You’ve all used tools like tcpdump or windump to examine individual packets, but Ethereal makes it easier to make sense of a stream of ongoing network communications. Ethereal not only makes network...

Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games concisely draws together and illustrates the overlapping and interacting technical concerns of these sectors. The text explains the principles behind modern multiplayer communication systems and the techniques underlying contemporary networked games. The traffic patterns that modern games impose on networks, and...
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet has been deployed in the metro space, providing low cost, easily managed bandwidth for intensive applications like video, storage, and ASPs. 10 Gigabit Ethernet (IEEE 802.3a) will make the use of Ethernet in the Metro area even more attractive. IDC projects that GigE revenues in the U.S., marked at $155 million in 2001, will grow...
Network Technology for Digital Audio (Music Technology)
Network Technology for Digital Audio (Music Technology)
Looking at new developments and trends, it explains the shortcomings and strong points and looks at the work being done to deliver the requirements of the digital audio environment. Proprietary and open systems developed within the audio industry are examined, with each case being supported with appropriate history and clear technical explanation....
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup...
Voice over IP Fundamentals
Voice over IP Fundamentals

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter, latency,
...

Cisco Express Forwarding (Networking Technology)
Cisco Express Forwarding (Networking Technology)
How does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and...
Fixed Broadband Wireless System Design
Fixed Broadband Wireless System Design
Fixed broadband wireless systems provide an alternative solution for the "last mile" delivery of high-speed Internet and other data services to businesses and homes.

Two-way wireless connections can be deployed more rapidly and less expensively than traditional optical fiber, coaxial cable, or wired telephone connections. Fixed...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy