Honeypots and Routers: Collecting Internet Attacks
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...
Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...
Angular: Up and Running: Learning Angular, Step by Step
Building Modern Web Applications Using Angular
Learn about the core building blocks of Angular
Build and architect high performance web applications
Leverage the latest Angular features to get the most out of your web
Intrusion Detection in Wireless Ad-Hoc Networks
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...
The All-New Switch Book: The Complete Guide to LAN Switching Technology The much-anticipated update to the bestselling book on LAN switching
Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...
|Result Page: 43 42 41 40 39 38 37 36 35 34 |