Networking category: 4555 books

Cover of Software Engineering for Resilient Systems

Software Engineering for Resilient Systems

7th International Workshop, SERENE 2015, Paris, France, September 7-8, 2015. Proceedings

by
Language: English
Release Date: August 27, 2015

This book constitutes the refereed proceedings of the 7th International Workshop on Software Engineering for Resilient Systems, SERENE 2015, held in Paris, France, in September 2015. The 10 revised technical papers presented were carefully reviewed and selected from 18 submissions. The papers are...
Cover of Principles of Security and Trust

Principles of Security and Trust

5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings

by
Language: English
Release Date: March 25, 2016

This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016. The 12 full...
Cover of Trust and Trustworthy Computing

Trust and Trustworthy Computing

9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings

by
Language: English
Release Date: August 29, 2016

This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in...
Cover of Principles of Security and Trust

Principles of Security and Trust

6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings

by
Language: English
Release Date: March 27, 2017

This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The 14 papers presented in this...
Cover of Security Standardisation Research

Security Standardisation Research

Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedings

by
Language: English
Release Date: November 25, 2016

This book constitutes the refereed proceedings of the Third International Conference on Security Standardisation Research, SSR 2016, held in Gaithersburg, MD, USA, in December 2016. The accepted papers cover a range of topics in the field of security standardisation research, including hash-based...
Cover of Network Security with OpenSSL

Network Security with OpenSSL

Cryptography for Secure Communications

by John Viega, Matt Messier, Pravir Chandra
Language: English
Release Date: February 9, 2009

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications....
Cover of SSH, The Secure Shell: The Definitive Guide
by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Language: English
Release Date: November 30, 2011

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most...
Cover of The Shellcoder's Handbook

The Shellcoder's Handbook

Discovering and Exploiting Security Holes

by Chris Anley, John Heasman, Felix Lindner
Language: English
Release Date: February 16, 2011

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first...
Cover of TCP/IP Sockets in C#

TCP/IP Sockets in C#

Practical Guide for Programmers

by David Makofske, Michael J. Donahoo, Kenneth L. Calvert
Language: English
Release Date: May 25, 2004

"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it's a good starting...
Cover of Mastering CentOS 7 Linux Server
by Mohamed Alibi, Bhaskarjyoti Roy
Language: English
Release Date: January 29, 2016

Configure, manage, and secure a CentOS 7 Linux server to serve a variety of services provided in a sustainable computer's infrastructure. About This Book Learn how to efficiently set up and manage a Linux server using one of the best suited technologies for this purpose, CentOS 7 Personalize...
Cover of Next Generation Red Teaming
by Henry Dalziel
Language: English
Release Date: August 10, 2015

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly...
Cover of Nagios, 2nd Edition

Nagios, 2nd Edition

System and Network Monitoring

by Wolfgang Barth
Language: English
Release Date: October 15, 2008

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios:...
Cover of Frontiers in Internet Technologies

Frontiers in Internet Technologies

Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers

by
Language: English
Release Date: April 17, 2015

This book constitutes the refereed proceedings of the Third CCF Internet Conference of China, ICoC 2014, held in Shanghai, China, in July 2014. The 10 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers address issues such as software defined network,...
Cover of Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

by
Language: English
Release Date: July 13, 2017

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and...
First 87 88 89 90 91 92 9394 95 96 97 98 99 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy