<p><P>βNetworkβ is a heavily overloaded term, so that βnetwork analysisβ means different things to different people. Specific forms of network analysis are used in the study of diverse structures such as the Internet, interlocking directorates, transportation systems, epidemic spreading, metabolic p
β¦ 131,085 VOLUMES FOUND FOR "Intelligent Non-hierarchical Manufacturing Networks" (274 ms)
OpenSSL is a free implementation of the SSL/TLS protocol, which is the most widely used protocol for secure network communications. This library can be used programmatically, and can be used from the command line to secure most TCP-based network protocols.OpenSSL is also a general-purpose cryptograp
The ultimate introductory guide to analyzing network communications at the packet level. This book defines basic analyzer elements (such as capture filters, display filters, expert alarms, trend screens, and decode windows) and provides real-world examples of how an analyzer can be used to troublesh
"Network+ 2005 In Depth" gives you all the skills that you need to pass the CompTIA 2005 Network+ exam. Begin with an introduction to the fundamental building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. Then, dive into the most important
"CORBA Networking with Java" is a practical, hands-on approach for network administrators who want to know the day-to-day pitfalls and problems of integrating a CORBA network with Java. The CD-ROM contains an Intranet fundamentals course.
comprehensive handbook for understanding, designing, and deploying multiservice network architecture and applicationsDesign, deploy, operate, and troubleshoot ONS 15454 applications and servicesLearn SONET/SDH and DWDM fundamentalsUnderstand Multiservice Provisioning Platform (MSPP) network architec
Twisted Network Programming Essentials from O'Reilly is a task-oriented look at Twisted, a Python-based network application framework. Twisted is fast becoming indispensable to Python network programmers. It supports common networking protocols such as TCP/IP, SSH, and SMTP. Using Python and Twisted
Tremendous technological advances have been made in the development of low-cost sensor devices equipped with wireless network interfaces.The area of wireless sensor networks is rapidly growing as new technologies emerge and new applications are developed.This book introduces networked embedded syste
Attention Network + Candidates: Stop spending valuable study time sorting through confusing study aids. Network + Exam Cram 2 is the second edition of a best-selling Network + study guide that gives you unique insight into exam concepts. Packed with test-taking strategies, time-saving tips and Exam
Keep your network safe from security disasters with a dependable recovery strategyCompanies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.In the information-packed pages of this book,
Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to b
Linux, a UNIX-compatible operating system that runs on personal computers, is a pinnacle within the free software movement. It is based on a kernel developed by Finnish student Linus Torvalds and is distributed on the Net or on low-cost disks, along with a complete set of UNIX libraries, popular fre
Ethernet Passive Optical Networks is the IEEE's (Institute of Electrical and Electronics Engineers) approved architecture of choice for the next generation of broadband access. Written by an author of the IEEE 802.3ah standard, this is the first book to explain the EPON architecture, analyze its per
* Save time and improve network performance-without spending a dime! * Outstanding open source tools for management, monitoring, optimization, and troubleshooting * In-depth coverage: retrieval, compilation, installation, configuration, and usage-with extensive examples * An indispensable r
Taking a proactive approach to disaster recovery, this book reveals techniques for keeping enterprise data and voice networks in service under critical circumstances, showing how to minimize single points of failure through redundancy and backups, select the right networking technologies to improve
The Network+ certification offered through CompTIA, the Computing Technology Industry Association, measures industry-standard knowledge of networking technology and practices for computer service technicians. And with the help of this competency-based, self-paced training kit, professionals can adva
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do ma
Computer Networking First Step explains basic network concepts about as easily and gently as any book we've seen. Read it, and you'll look like you know what you're talking about - because you actually will.Wendell Odom introduces LANs, WANs, the Internet, routers, switches, network addressing, remo
π₯ TRENDING TOMES
While spirit boards have sometimes received a negative reputation, they are a perfectly safe way to communicate when used properly. Sharing dozens of heartwarming tales and creepy encounters, silly games and life-changing occurrences, author Alexandra Chauran provides everything you need to know to
Drawing on the authorsβ research work from the last ten years, Mathematical Inequalities: A Perspective gives readers a different viewpoint of the field. It discusses the importance of various mathematical inequalities in contemporary mathematics and how these inequalities are used in different appl
<p>In this analysis of South Africa's postapartheid security system, Peter Vale moves beyond a realist discussion of interacting states to examine southern Africa as an integrated whole. Vale argues that, despite South Africa's manipulation of state structures and elites in the region for its own en
This resource is the authoritative guide to problematic areas of the head and neck for the surgical pathologist. With particular emphasis placed on diagnostic problems and differential diagnosis in addition to coverage of more common diagnostically straightforward lesions, youβll get the most comple