Categories : Networking |
NETWORK SECURITY THROUGH DATA ANALYSIS |
Traditional intrusion detection and logfileanalysis are no longer enough to protect today’s complex networks. in thispractical guide, security researcher michael collins shows you severaltechniques and tools for collecting and analyzing network tra...
Publication : Oreilly
NRS 1040.00
|
|
|
|
WIRELESS TECHNOLOGY: INCLUDES PRACTICALS |
The book introduces you to the basic concepts of modern wireless communication networks. it covers the evolution of cellular networks and the basic framework of various protocols and standards used to develop personal wireless and wide area networks....
Publication : Dreamtech press
NRS 670.00
|
|
|
|
COMPTIA NETWORK+ STUDY GUIDE, 4ED: EXAM N10 - 007 |
Todd lammle's bestselling comptia network+ study guide for the n10-007 exam! comptia's network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. ...
Publication : Sybex
NRS 1440.00
|
|
|
|
TCP/IP ILLUSTRATED, VOLUME 1: THE PROTOCOLS, 2/E |
More than 162,000 networking professionals have relied on w. richard stevens' classic tcp/ip illustrated, volume 1 to gain the detailed understanding of tcp/ip they need to be effective. now, the world's leading tcp/ip best-seller has been thorough...
Publication : Pearson
NRS 1240.00
|
|
|
|
HEAD FIRST NETWORKING |
Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? head first networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged....
Publication : Oreilly
NRS 1000.00
|
|
|
|
PENETRATION TESTING WITH THE BASH SHELL MAKE THE MOST OF THE BASH SHELL AND KALI LINUX'S COMMAND-LINE-BASED SECURITY ASSESSMENT TOOLS |
What you will learn from this book
perform network enumeration techniques with dig, whois, dnsenum, dnsmap, and others
learn how to fuzz and reverse engineer using the kali linux command line tools
exploit common web application vulnerabilities using...
Publication : Packt publication
NRS 480.00
|
|
|
|
COMPUTER NETWORKS FOR STUDENTS |
This book is mainly written for those readers who are new comers in the field of computer science. computer science has become a common subject in engineering and technological streams now a day. more and more people are taking computer science as th...
Publication : Spd
NRS 520.00
|
|
|
|
TCP/IP: ARCHITECTURE, PROTOCOLS, AND IMPLEMENTATION WITH IPV6 AND IP SECURITY |
This is a thorough revision of the author's successful tcp/ip book with significant additional coverage of ipng (the next generation internet protocol), important client/server applications such as the world wide web, critical security issues that r...
Publication : Tata
NRS 936.00
|
|
|
|
WIRELESS NETWORK ADMINISTRATION A BEGINNER'S GUIDE |
Step-by-step wireless networking essentials
covers the latest technologies?wifi,802.11, 802.11n, 802.15.4/zigbee, and bluetooth personal area networks
discusses network hardware, topologies, design, security, tuning, and troubleshooting
includes both...
Publication : Tata
NRS 792.00
|
|
|
|
UNDERSTANDING IPV6: COVERS WINDOWS 8 AND WINDOWS SERVER® 2012, THIRD EDITION |
Description:
your essential guide to ipv6-now updated for windows 8 and windows server 2012
tackle 10 common business problems with real-world sharepoint solutions
get in-depth technical information to put ipv6 technology to work-including networks...
Publication : Microsoft press
NRS 1200.00
|
|
|
|
|