Networking Communications category: 4555 books

Cover of Twisted Network Programming Essentials

Twisted Network Programming Essentials

Event-driven Network Programming with Python

by Jessica McKellar, Abe Fettig
Language: English
Release Date: March 12, 2013

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new...
Cover of GNS3 Network Simulation Guide
by "RedNectar" Chris Welsh
Language: English
Release Date: October 25, 2013

GNS3 Network Simulation Guide is an easy-to-follow yet comprehensive guide which is written in a tutorial format helping you grasp all the things you need for accomplishing your certification or simulation goal. If you are a networking professional who wants to learn how to simulate networks using GNS3,...
Cover of Controller-Based Wireless LAN Fundamentals

Controller-Based Wireless LAN Fundamentals

An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

by Jeff Smith, Jake Woodhams, Robert Marg
Language: English
Release Date: October 29, 2010

Controller-Based Wireless LAN Fundamentals An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks   As wired networks are increasingly replaced with 802.11n wireless connections, enterprise users are shifting to centralized, next-generation architectures built around...
Cover of Interconnecting Data Centers Using VPLS (Ensure Business Continuance on Virtualized Networks by Implementing Layer 2 Connectivity Across Layer 3)
by Nash Darukhanawalla, Patrice Bellagamba
Language: English
Release Date: June 16, 2009

  As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience. However, these technologies often involve significant...
Cover of Network Processors

Network Processors

Architecture, Programming, and Implementation

by Ran Giladi
Language: English
Release Date: August 29, 2008

Network processors are the basic building blocks of today's high-speed, high-demand, quality-oriented communication networks. Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader...
Cover of How to Use Web 2.0 and Social Networking Sites Securely
by Alan Calder
Language: English
Release Date: January 15, 2009

This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Cover of Mastering OpenVPN
by Eric F Crist, Jan Just Keijser
Language: English
Release Date: August 28, 2015

Master building and integrating secure private networks using OpenVPNAbout This BookDiscover how to configure and set up a secure OpenVPNEnhance user experience by using multiple authentication methodsDelve into better reporting, monitoring, logging, and control with OpenVPNWho This Book Is ForIf...
Cover of Data Communication and Networking
by George Hill
Language: English
Release Date: March 12, 2017

Students of Computer Science & Engineering and Information Technology in general and  Computer Networks in particular. It will help them to understand the concept of data communication and modulation techniques, to comprehend the use of different types of transmission media and network devices,...
Cover of E-Business and Telecommunications

E-Business and Telecommunications

12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers

by
Language: English
Release Date: March 1, 2016

This book constitutes the refereed proceedings of the 12th International Joint Conference on E-Business and Telecommunications, ICETE 2015, held in Colmar, France, in July 2015. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding...
Cover of Juniper SRX Series

Juniper SRX Series

A Comprehensive Guide to Security Services on the SRX Series

by Brad Woodberg, Rob Cameron
Language: English
Release Date: June 7, 2013

This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based...
Cover of Implementing NetScaler VPX™ - Second Edition
by Marius Sandbu
Language: English
Release Date: October 23, 2015

Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms About This Book Learn how to design, set up, and deploy NetScaler VPX along with the new Jumbo frames in a virtual environment using your GUI as well as your CLI for...
Cover of Learning Python Network Programming
by Dr. M. O. Faruque Sarker, Sam Washington
Language: English
Release Date: June 17, 2015

Network programming has always been a demanding task. With full-featured and well documented libraries all the way up the stack, Python makes network programming the enjoyable experience it should be.Starting with a walkthrough of today's major networking protocols, with this book you'll learn...
Cover of Packet Analysis with Wireshark
by Anish Nath
Language: English
Release Date: July 25, 2016

Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis About This Book Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases Identify and...
Cover of Hacking and Penetration Testing with Low Power Devices
by Philip Polstra
Language: English
Release Date: September 2, 2014

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking...
First 25 26 27 28 29 30 3132 33 34 35 36 37 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy