|حجم فایل||21.3 MB|
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, ...
Network Graph Analysis and Visualization with Gephi
|حجم فایل||3.1 MB|
Gephi is an interactive visualization and exploration platform for all kinds of networks and complex systems. Social media data has helped to drive network visualization to new levels of relevance and importance. However, there is far more to network visualization than just social media data. For analyzing and visualizing network graphs, you need to have an excellent platform, and you need to know...
|حجم فایل||5.8 MB|
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant d...
Handbook on Data Centers
|حجم فایل||43.6 MB|
This handbook offers a comprehensive review of the state-of-the-art research achievements in the field of data centers. Contributions from international, leading researchers and scholars offer topics in cloud computing, virtualization in data centers, energy efficient data centers, and next generation data center architecture. It also comprises current research trends in emerging areas, such as d...
Learn Active Directory Management in a Month of Lunches
|حجم فایل||18.7 MB|
At the heart of your Windows network is Active Directory, the control center for administration, security, and other core management functions. If you're new to Active Directory administration—or if you find yourself unexpectedly thrust into that role - you'll need to get up to speed fast. Learn Active Directory Management in a Month of Lunches is a hands-on tutorial designed for IT pros ne...
Develop on Yammer
|حجم فایل||13.1 MB|
Develop on Yammer is your guide to integrating the Yammer social network with your company's application ecosystem. By developing custom apps and features on the Yammer platform, you can make your workplace more productive, encourage communication and feedback, and get your colleagues collaborating across a range of platforms, including SharePoint, ASP.NET, and Windows Phone. The book begin...
|نویسنده||James H. Baxter|
|حجم فایل||3.6 MB|
This book introduces the Wireshark network analyzer to IT professionals across multiple disciplines. It starts off with the installation of Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. The subsequent chapters will build on this foundation by covering ess...
802.11ac: A Survival Guide
|حجم فایل||11.1 MB|
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast-an industry expert who led the development of 802.11-2012 and security task groups at the Wi-F...
Proportionate-type Normalized Least Mean Square Algorithms
|حجم فایل||16.4 MB|
The topic of this book is proportionate-type normalized least mean squares (PtNLMS) adaptive filtering algorithms, which attempt to estimate an unknown impulse response by adaptively giving gains proportionate to an estimate of the impulse response and the current measured error. These algorithms offer low computational complexity and fast convergence times for sparse impulse responses in network ...
Juniper SRX Series
|حجم فایل||40.6 MB|
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper's SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience. While their earlier book, Junos Security, covered the SR...