by Sharam Hekmat
Publisher: PragSoft Corporation 2005
Number of pages: 198
This book is concerned with post-computer communication networks and two of its important streams: data communication and telecommunication. This book is aimed at newcomers to this field who are often bewildered by the substantial wealth of information already published on the subject.
Home page url
Download or read it online for free here:
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
by Donna L. Harrington - Cisco Press
Hands-on practice for the CCNP Troubleshooting exam with TCP/IP, LAN, and WAN trouble tickets based on CIT (Cisco Internetwork Troubleshooting) topics. Each chapter contains an overview of protocols, troubleshooting tools, and basic methods.
by Zeeshan-Ul-Hassan Usmani - InTech
This book presents research work ranging from controlling the activities in virtual world to optimization of productivity in games, from collaborative recommendations to populate a computational environment with autonomous hypothetical reasoning.
This book intends to explain to you the overall utilization that P2P (Peer-to-Peer) technologies have in today's world, it goes deeper into as many implementations as it can and compares the benefits, problems even legal implications.