Logo

Internetworking Technologies

Small book cover: Internetworking Technologies

Internetworking Technologies
by

Publisher: Prentice-Hall of India
ISBN/ASIN: 8120321855
ISBN-13: 9788120321854
Number of pages: 219

Description:
Designed as an advanced text on internetworking technologies for senior undergraduate/graduate students of computer science, this unique book provides an introduction to the key concepts related to front line areas of interwork specific research and development. The book focuses on IPv6 and design and implementations issues specific to the next generation internetworking using it.

Download or read it online for free here:
Download link
(730KB, PDF)

Similar books

Book cover: Web Intelligence and Intelligent AgentsWeb Intelligence and Intelligent Agents
by - InTech
This book presents research work ranging from controlling the activities in virtual world to optimization of productivity in games, from collaborative recommendations to populate a computational environment with autonomous hypothetical reasoning.
(15326 views)
Book cover: Open NetworksOpen Networks
by - Free Technology Academy
This book explores the open technologies that are at the foundations of modern computer networks. The Internet is built on top of open protocols and open standards. Open networks use the devices made available by the members of the community.
(14731 views)
Book cover: CCNP Practical Studies: TroubleshootingCCNP Practical Studies: Troubleshooting
by - Cisco Press
Hands-on practice for the CCNP Troubleshooting exam with TCP/IP, LAN, and WAN trouble tickets based on CIT (Cisco Internetwork Troubleshooting) topics. Each chapter contains an overview of protocols, troubleshooting tools, and basic methods.
(20866 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(16138 views)