The ebook edition of this title is Open Access and freely available to read online.
This book is a general introduction to the statistical analysis of networks, and can serve both as a research mono……続きを見る
The ebook edition of this title is Open Access and freely available to read online.
The Internet's exponential growth is driven by the development and emergence of advanced technologies, attended by……続きを見る
A collection of Satoshi Nakamoto’s writings on Bitcoin.
This collection contains Satoshi’s words, compiled and neatly formatted without commentary. Each chapter contains Satoshi’s writings from a sp……続きを見る
These courses envelop the foundational networking knowledge that you’ll need to get your career in networking jumpstarted. These courses envelop network fundamentals, network access, IP connectivity……続きを見る
Automating and Programming Cisco Collaboration Solutions (CLAUTO 300-835) is associated with the CCNP Collaboration Certification and DevNet Professional Certification. It is especially useful for t……続きを見る
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, this book examines the most pressing research issues in Mobile Ad hoc Network……続きを見る
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensi……続きを見る
Take your network automation skills to the next level with practical recipes on managing network devices from a variety of vendors like Cisco, Juniper, and AristaKey FeaturesUse Ansible to automate ……続きを見る
Discover how to write high-quality character driver code, interface with userspace, work with chip memory, and gain an in-depth understanding of working with hardware interrupts and kernel synchroni……続きを見る
著者:IP Specialist
出版社: IP Specialist
発売日: 2018年10月09日
Ec-Council Certified Ethical Hacker CEH v10 covers the latest exam blueprint, comprised of 20 Modules which includes the practice of information security and hacking tools which are popularly used b……続きを見る
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies.Key FeaturesLearn protocol analysis, optimization and troubleshooting using W……続きを見る
Publisher\\'s Note: This edition from 2018 is outdated. A new third edition, updated for 2020 featuring Python 3.8, with coverage extended to include Azure, AWS, and Ansible 2.8, and data analysis u……続きを見る
著者:Mike Meyers
出版社: McGraw Hill LLC
発売日: 2015年05月11日
From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guideーupdated to cover the 2015 release of the CompTIA Network+ exam.
Get complet……続きを見る
How can you make multivendor services work smoothly on today’s complex networks? This practical book shows you how to deploy a large portfolio of multivendor Multiprotocol Label Switching (MPLS) ser……続きを見る
Depending on the termination point, fibre access networks have different configurations, such as fibre-to-the-home, fibre-to-the-premise, fibre-to-the-building, fibre-to-the-curb, or fibre-to-the-no……続きを見る
Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and se……続きを見る
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg a……続きを見る
WebRTC, Web Real-Time Communications, is revolutionizing the way web users communicate, both in the consumer and enterprise worlds. WebRTC adds standard APIs (Application Programming Interfaces) and……続きを見る
Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to……続きを見る
What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Tr……続きを見る
著者:Seth Enoka
出版社: No Starch Press
発売日: 2022年12月06日
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.
This book is an easy-to-follow series of tutorials that will ……続きを見る
The #1 selling Wi-Fi networking reference guide in the world
The CWNA: Certified Wireless Network Administrator Study Guide is the ultimate preparation resource for the CWNA exam. Fully updated to a……続きを見る
Get to grips with the latest container examples, Python 3 features, GitLab DevOps, network data analysis, and cloud networking to get the most out of Python for network engineering with the latest e……続きを見る
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security t……続きを見る
Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more.……続きを見る
著者:Glen D. Singh
出版社: Packt Publishing
発売日: 2024年04月30日
Master the art of ethical hacking, from setting up labs and exploiting security vulnerabilities, to implementing Command and Control (C2) operations, this hands-on guide is your ultimate real-world ……続きを見る
著者:Rob Botwright
出版社: Rob Botwright
発売日: 2024年02月18日
〓 ACTIVE DIRECTORY NETWORK MANAGEMENT BUNDLE 〓
Are you ready to become a master of Active Directory? Look no further! Our comprehensive book bundle has everything you need to excel in managing, se……続きを見る
This book explores the dynamic interplay between fractals and graph theory, two powerful mathematical tools with vast applications. It presents a strategic combination and the synergistic use of the……続きを見る
Cisco Networks for New Engineers: Techniques, Strategies, and Tactics
By Victor P. Henderson | Certified Ethical Hacker | ISSO-TECH ENTERPRISES
Master the Art of Cisco NetworkingーFrom Basics to Adv……続きを見る
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end usersKey Fe……続きを見る