Logo

Internetworking Technologies

Small book cover: Internetworking Technologies

Internetworking Technologies
by

Publisher: Prentice-Hall of India
ISBN/ASIN: 8120321855
ISBN-13: 9788120321854
Number of pages: 219

Description:
Designed as an advanced text on internetworking technologies for senior undergraduate/graduate students of computer science, this unique book provides an introduction to the key concepts related to front line areas of interwork specific research and development. The book focuses on IPv6 and design and implementations issues specific to the next generation internetworking using it.

Download or read it online for free here:
Download link
(730KB, PDF)

Similar books

Book cover: Rethinking the Internet of ThingsRethinking the Internet of Things
by - Springer
'Rethinking the Internet of Things' describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail ...
(6806 views)
Book cover: Web Intelligence and Intelligent AgentsWeb Intelligence and Intelligent Agents
by - InTech
This book presents research work ranging from controlling the activities in virtual world to optimization of productivity in games, from collaborative recommendations to populate a computational environment with autonomous hypothetical reasoning.
(13387 views)
Book cover: Network ProgrammingNetwork Programming
by - Prentice Hall
This book covers the advances in network flow methods ranging across modeling, applications, algorithms, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques.
(15206 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(14091 views)