Node-to-Node Approaching in Wireless Mesh Connectivity

Автор: literator от 15-05-2018, 17:03, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Node-to-Node Approaching in Wireless Mesh Connectivity
Автор: Madhusudan Singh
Издательство:
ISBN: 9811306737
Год: 2018
Страниц: 75
Язык: английский
Формат: pdf (true), azw3, mobi, epub
Размер: 10.0 MB

This book highlights routing protocols for wireless mesh networks (WMNs; IEEE 802.11s). It provides an overview of the wireless networks (history, MANET, family of IEEE 802.11, WMNS, etc.) and routing protocols, such as AODV, DSR, OLSR, etc, and also highlights two resolutions of routing protocols with respect to end-to-end delay, packet delivery ratio and routing overhead in WMNs. Wireless mesh networks have become a hot topic for researcher into the deployment of wireless networks, and they represents the connectivity of mesh networking in IEEE 802.11 amendment in static and ad-hoc networks. Moreover, WMNs have numerous attractive features, such as highly reliable connectivity, easy deployment, self-healing, self-configuring, and flexible network expansion. The book describes two routing mechanisms: novel cluster-based routing protocols (NCBRP), and decentralized hybrid wireless mesh protocol (DHWMP).
 

SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization

Автор: literator от 15-05-2018, 16:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization
Автор: Rahamatullah Khondoker
Издательство: Springer
ISBN: 331971760X
Год: 2018
Страниц: 134
Язык: английский
Формат: pdf (true), djvu
Размер: 10.1 MB

This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoft's threat modeling framework STRIDE. Before deploying new technologies in the production environment, their security aspects must be considered. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two new technologies used to increase e.g. the manageability, security and flexibility of enterprise/production/cloud IT environments. Also featuring a wealth of diagrams to help illustrate the concepts discussed, the book is ideally suited as a guide for all IT security professionals, engineers, and researchers who need IT security recommendations on deploying SDN and NFV technologies.
 

The Kubernetes Book

Автор: literator от 14-05-2018, 02:15, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Kubernetes Book
Автор: Nigel Poulton
Издательство: Leanpub
ISBN: 1521823634
Год: 2017
Страниц: 133
Язык: английский
Формат: True PDF
Размер: 10.08 MB

Containers are here and resistance is futile. Now that people are getting their heads around Docker, they need an orchestration platform to help them manage their containerized apps. Kubernetes has emerged as one of the hottest and most important container orchestration platforms in the world. This book gets you up to speed fast, and it's constantly kept up-to-date!
 

CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition

Автор: bhaer от 13-05-2018, 19:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition
Автор: Wendell Odom
Издательство: Cisco Press
Год: 2016
Страниц: 1000
Формат: True PDF, EPUB
Размер: 94 Mb
Язык: English

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
 

Windows 7 в домашней сети

Автор: SCART56 от 12-05-2018, 20:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Windows 7 в домашней сети
Автор: Чекмарев А.Н.
Издательство: БХВ-Петербург
Год: 2011
Страниц: 240
ISBN: 978-5-9775-0633-5
Формат: PDF
Размер: 15 Мб
Язык: русский
Серия: Самое необходимое

Рассматриваются способы организации домашней сети на базе операционной системы Windows 7 и других версий Windows, варианты подключения одного или нескольких компьютеров к Интернету и используемое при этом оборудование (ADSL-модемы, кабельные подключения, телефонные 3G-модемы).
 

Основные протоколы Интернет (2-е изд.)

Автор: SCART56 от 12-05-2018, 06:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Основные протоколы Интернет (2-е изд.)
Автор: Берлин А.Н.
Издательство: М.: НОУ "Интуит"
Год: 2016
Страниц: 602
ISBN: 978-5-94774-884-0
Формат: PDF
Размер: 52.5 Мб
Язык: русский

Курс посвящен основным протоколам сети Интернет. Целью его написания является ознакомление читателей с принципами функционирования базовых технологий интернет, методами передачи, коммутации и обработки мультимедийной информации.
 

Darknet: Geopolitics and Uses

Автор: harun54 от 11-05-2018, 21:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Darknet: Geopolitics and Uses
Автор: Laurent Gayard
Издательство: Wiley-ISTE
Год: 2018
Формат: PDF
Размер: 9 Мб
Язык: английский / English

This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers.
 

Informational Tracking

Автор: harun54 от 11-05-2018, 21:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Informational Tracking
Автор: Sylvie Leleu-Merviel
Издательство: Wiley-ISTE
Год: 2018
Формат: PDF
Размер: 8 Мб
Язык: английский / English

“What is colour?”, “What is the precise meaning of the statement ‘the stock exchange closes at a 5% drop this evening’?”, “How are TV viewers defined?”, or “How can images produce meaning?” Such everyday questions are examined in this book. To make our analysis intuitive and understandable, numerous concrete examples illustrate our theoretical framework and concepts. The examples include gaming, fictional skits in leisure entertainment, and enigmas. The golden thread running through the text revisits the informational process and places the datum as its pivot.
 

Mastering pfSense, Second Edition

Автор: literator от 11-05-2018, 14:38, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Mastering pfSense, Second Edition
Автор: David Zientara
Издательство: Packt Publishing
Год: 2018
Страниц: 450
Язык: английский
Формат: epub
Размер: 10.06 MB

Install and configure a pfSense router/firewall, and become a pfSense expert in the process. pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn't limit you. You're in control – you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4.
 

Wireless Physical Layer Network Coding

Автор: bhaer от 11-05-2018, 12:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Wireless Physical Layer Network Coding
Автор: Jan Sykora, Alister Burr
Издательство: Cambridge University Press
Год: 2018
Страниц: 334
Формат: EPUB, MOBI, AZW3
Размер: 36 Mb
Язык: English

Discover a fresh approach for designing more efficient and cooperative wireless communications networks with this systematic guide. Covering everything from fundamental theory to current research topics, leading researchers describe a new, network-aware coding strategy that exploits the signal interactions that occur in dense wireless networks directly at the waveform level. Using an easy-to-follow, layered structure, this unique text begins with a gentle introduction for those new to the subject, before moving on to explain key information-theoretic principles and establish a consistent framework for wireless physical layer network coding (WPNC) strategies.