Nejnižší cena za posledních 45 dní: 689 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this updated edition, you'll dive into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. New chapters examine the transmission control protocol (TCP) and user datagram protocol in detail.
Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.
You'll explore topics including:
Produkt Packet Guide to Core Network Protocols (Hartpence Bruce)(Paperback) označuje EAN kód 9781449306533.
Kategorie | Knihy |
EAN | 9781449306533 |
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this updated edition, you'll dive into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start
Preface.- Basic Concepts, Protocols and Terminology.- Starting Network Programming in Java.- Multithreading and Multiplexing.- File Handling.- Remote Method Invocation (RMI).- CORBA.- Java Database Connectivity.- Servlets.- JavaServer Pages (JSPs).- JavaBeans.- Multimedia.- Applets.- Appendix A -
Summary HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis,
Selected as a Doody's Core Title for 2022! Packing essential abdominal imaging protocols in a compact format, this handy reference makes it easy to access the most up-to-date protocols, organ-specific measurements, and echogenicities for abdominal sonography. Organized logically by the organs of
A Comprehensible Guide to Controller Area Network by Wilfried Voss represents the most thoroughly researched and most complete work on CAN available in the marketplace. Controller Area Network (CAN) is a serial network technology that was originally designed for the automotive industry, especially
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and
5G Core Networks: Powering Digitalization provides an overview of the 5G Core network architecture, as well as giving descriptions of cloud technologies and the key concepts in the 3GPP rel-15/16 specifications. Written by the authors who are heavily involved in development of the 5G standards and
The Art of Network Architecture Business-Driven Design The business-centered, business-driven guide to architecting and evolving networks The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks
In this Readers' Guide, Susan Bruce provides the readers with a pathway through the major writings on King Lear, tracing the development of the numerous critical debates and shifts in perspective that have led to the successive revaluations of this central work. The Guide provides extracts and
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that
Adroid Application Testing Guide is a highly detailed book which gives step-by-step examples for a great variety of real-world cases, providing professional guidelines and recommendations that will be extremely valuable for optimizing your development time and resources. In the chapters you will
A teacher is never a giver of truth--he is a guide, a pointer to the truth that each student must find for himself. A good teacher is merely a catalyst.--Bruce Lee Within the pages of Striking Thoughts, you will find the secrets of Bruce Lee's incredible success-- as an actor, martial artist, and
Finally, France has a Stormrider Surf Guide that covers all the incredible waves along this vast coastline. From the chilly Channel to the mild Mediterranean, there's something for everyone, helpfully written in both French and English. Beautifully illustrated by the best photographs available and
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented
How would it feel to build a massively successful network marketing business from a place where you feel supported, energized, and connected to your feminine pleasure and power? If the business you've built has you feeling burned out, alone, and exhausted instead of successful and free, it can seem
Introduction You have chosen an exciting moment in computing history to embark on a study of network programming. Machine room networks can carry data at speeds comparable to those at which machines access their own memory, and broadband now reaches hundreds of millions of homes worldwide. Many
A comprehensive introduction to Old English, combining simple, clear philology with the best literary works to provide acompelling and accessible beginners' guide. Provides a comprehensive introduction to Old EnglishUses a practical approach suited to the needs of the beginningstudentFeatures