by Sharam Hekmat
Publisher: PragSoft Corporation 2005
Number of pages: 198
This book is concerned with post-computer communication networks and two of its important streams: data communication and telecommunication. This book is aimed at newcomers to this field who are often bewildered by the substantial wealth of information already published on the subject.
Home page url
Download or read it online for free here:
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
by Martin Dodge, Rob Kitchin - Pearson Education
The authors show off a wide range of possibilities in representing the data existing on the Internet. Since so many of these models were created to display never-before-charted territories, the book is largely devoted to analyzing their accuracy.
by Charles Severance - net-intro.com
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. The Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone ...
by Francis daCosta - Springer
'Rethinking the Internet of Things' describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail ...