" "



:





...

.. 1 ... 4 5 6 7 8 9 10 11 12 ... 132


: CompTIA Security+ Guide to Network Security Fundamentals, 5th Edition
: Mark Ciampa
: Course Technology
: 2014
: 720
: True PDF
: 15 Mb
: English

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional certification and career success.
: bhaer 19-10-2017, 09:22 | : 0 |

: Kali Linux - An Ethical Hacker's Cookbook (+code)
: Himanshu Sharma
: Packt Publishing
: 2017
: 376
: PDF, AZW3
: 55 Mb
: English

Over 120 recipes to perform advanced penetration testing with Kali Linux
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities.
: bhaer 18-10-2017, 21:19 | : 0 |
: Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives
: Beniamino Di Martino and Laurence T. Yang
: Springer
: 2017
: PDF, AZW3
: 10
: / English

This book focuses on the Internet of Everything and related fields. The Internet of Everything adds connectivity and intelligence to just about every device, giving it special functions. The book provides a common platform for integrating information from heterogeneous sources. However, this can be quite reductive, as the Internet of Everything provides links not only among things, but also data, people, and business processes. The evolution of current sensor and device networks, with strong interactions between people and social environments, will have a dramatic impact on everything from city planning, first responders, the military and health.
: black 18-10-2017, 19:10 | : 0 |

: Networks of the Future: Architectures, Technologies, and Implementations
: Mahmoud Elkhodr
: Chapman and Hall/CRC
: 2017
: 448
: PDF, AZW3
: 32 Mb
: English

This book provides a collection of contributions illustrating the latest research in the areas of future networks, applications, enabling technologies, and implementation issues and challenges. The book encompasses research on emerging areas such as the wireless technologies, software-defined networks, Cloud Computing, IoT, and Big Data. These emerging technologies bring promising opportunities and challenges which are also discussed in the book. It will also help researchers and graduate students to explore the latest research and trends in computer networking.
: bhaer 18-10-2017, 11:05 | : 0 |
: SCION: A Secure Internet Architecture
: Adrian Perrig and Pawel Szalachowski
: Springer
: 2017
: PDF, EPUB
: 10
: / English

This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype.
: black 17-10-2017, 22:16 | : 0 |
: Cloud Radio Access Networks: Principles, Technologies, and Applications
: Tony Q. S. Quek (Editor), Mugen Peng (Editor), Osvaldo Simeone (Editor), Wei Yu (Editor)
: Cambridge University Press
: 2017
: True PDF
: 494
: 20.5 Mb
: English

This unique text will enable readers to understand the fundamental theory, current techniques, and potential applications of Cloud Radio Access Networks (C-RANs). Leading experts from academia and industry provide a guide to all of the key elements of C-RANs, including system architecture, performance analysis, technologies in both physical and medium access control layers, self-organizing and green networking, standards development, and standardization perspectives. Recent developments in the field are covered, as well as open research challenges and possible future directions. The first book to focus exclusively on Cloud Radio Access Networks, this is essential reading for engineers in academia and industry working on future wireless networks.
: bomboane 17-10-2017, 20:45 | : 0 |
: Network Security Monitoring: Basics for Beginners
: Robert Collins
: Amazon Digital Services LLC
ASIN: B076H8NY2S
: 2017
: 47
:
: epub, pdf
: 14.2 MB

This book is a guide on network security monitoring. The author begins by explaining some of the basics of computer networking and the basic tools which can be used for monitoring a computer network. The process of capturing and analyzing the packets of a network is discussed in detail. This is a good technique which can help network security experts identify anomalies or malicious attacks on the packets transmitted over a network. You are also guided on how to monitor the network traffic for the Heartbleed bug, which is very vulnerable to network attackers. Session data is very essential for network security monitoring. The author guides you on how to use the session data so as to monitor the security of your network. The various techniques which can be used for network intrusion detection and prevention are explored. You are also guided on how to use the Security Onion to monitor the security of your network. The various tools which can help in network security monitoring are discussed.
: Ingvar16 17-10-2017, 17:05 | : 0 |
: From Internet of Things to Smart Cities: Enabling Technologies
: Hongjian Sun and Chao Wang
: CRC Press
: 2017
: PDF
: 16
: / English

From Internet of Things to Smart Cities: Enabling Technologies explores the information and communication technologies (ICT) needed to enable real-time responses to current environmental, technological, societal, and economic challenges. ICT technologies can be utilized to help with reducing carbon emissions, improving resource utilization efficiency, promoting active engagement of citizens, and more.
: black 16-10-2017, 16:24 | : 0 |

: Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi
: A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET
: Syngress
: 2015
ISBN: 0128053674
: English
: pdf
: 10,5 mb
: 122

The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
: daromir 15-10-2017, 23:41 | : 0 |

: ,
: Windows 2000
: .: "c"
: 2002
ISBN: 5-8459-0240-1
:
: pdf
: 11,8 mb
: 320 .: .

Windows 2000.
: daromir 14-10-2017, 14:05 | : 0 |

.. 1 ... 4 5 6 7 8 9 10 11 12 ... 132

 MirKnig.Su  2017