Logo

Network Programming by Katta G. Murty

Small book cover: Network Programming

Network Programming
by

Publisher: Prentice Hall
ISBN/ASIN: 013615493X
Number of pages: 824

Description:
This book covers the significant advances in network flow methods ranging across modeling, applications, algorithms, their implementations, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques or their adaptations. It is particularly useful for professionals involved in mathematical programming and linear programming in the areas of operations research, industrial engineering, other branches of engineering and business applications.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: An Introduction to ATM NetworksAn Introduction to ATM Networks
by - Wiley
Asynchronous Transfer Mode (ATM) has become an integral part of the networking infrastructure. This introductory text on ATM networks describes their development, architecture, congestion control, deployment, and signaling in an accessible way.
(5460 views)
Book cover: The Future InternetThe Future Internet
by - Springer
The Internet is the most vital scientific, technical, economic and societal set of infrastructures. Continuing its developments would secure the upcoming innovation and prosperity and it would underpin the sustainable growth in economic values.
(2711 views)
Book cover: Communication NetworksCommunication Networks
by - PragSoft Corporation
This book is concerned with post-computer communication networks and two of its streams: data communication and telecommunication. It provides a coverage of the key concepts and techniques, so as to prepare readers for more advanced discussions.
(8451 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(6639 views)