Narrow your search
Listing 1 - 9 of 9
Sort by
IPv6
Authors: ---
ISBN: 1558608109 9786611015022 1281015024 0080495877 9781429484237 1429484233 9781558608108 9781281015020 6611015027 9780080495873 Year: 2004 Publisher: Amsterdam Boston Morgan Kaufmann

Loading...
Export citation

Choose an application

Bookmark

Abstract

The second edition of IPv6: Theory, Protocol, and Practice guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so much time and effort has been expended on revising IPv4. In the Protocol section is a comprehensive review of the specifics of IPv6 and related protocols. Finally, the Practice section provides hands-on explanations of how to roll out IPv6 support and services.This completely rewritten edition offers updated and comprehensive coverage of important topics including router and server configuration, securit

TCP/IP clearly explained
Author:
ISBN: 155860782X 9786611754976 1281754978 0080518451 9780080518459 9781558607828 Year: 2003 Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS). The improvements go far beyond the updated material: they also incl

Extranet design and implementation
Author:
ISBN: 0782120911 Year: 1997 Publisher: San Francisco (Calif.) : Sybex,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Simple steps to data encryption : a practical guide to secure computing
Author:
ISBN: 9780124078826 0124078826 Year: 2013 Publisher: Burlington Elsevier Science

Loading...
Export citation

Choose an application

Bookmark

Abstract

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what.


Digital
Practical anonymity : hiding in plain sight online
Author:
ISBN: 9780124104426 0124104428 Year: 2013 Publisher: Waltham, MA Elsevier Science

Loading...
Export citation

Choose an application

Bookmark

Abstract

Shows you how to use the most effective and widely-used anonymity tools---the ones that protect activists, diplomats, military and other government agencies---to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

TCP/IP clearly explained
Author:
ISBN: 9780080518459 0080518451 9781558607828 155860782X Year: 2003 Publisher: Boston Morgan Kaufmann Publishers

Loading...
Export citation

Choose an application

Bookmark

Abstract

With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS). The improvements go far beyond the updated material: they also include an all-new approach that examines the TCP/IP protocol stack from the top down, beginning with the applications you may already understand and only then moving deeper to the protocols that make these applications possible. You also get a helpful overview of the "life" of an Internet packet, covering all its movements from inception to final disposition. If you're looking for nothing more than information on the protocols comprising TCP/IP networking, there are plenty of books to choose from. If you want to understand TCP/IP networkingwhy the protocols do what they do, how they allow applications to be extended, and how changes in the environment necessitate changes to the protocolsthere's only the one you hold in your hands. * Explainsclearly and holistically, but without oversimplificationthe core protocols that make the global Internet possible. * Fully updated to cover emerging technologies that are critical to the present and future of the Internet. * Takes a top-down approach that begins with the familiar application layer, then proceeds to the protocols underlying it, devoting attention to each layer's specifics. * Divided into organized, easy-to-follow sections on the concepts and fundamentals of networking, Internet applications, transport protocols, the Internet layer and infrastructure, and practical internetworking.

Keywords

IPv6 : theory, protocol, and practice
Author:
ISBN: 9781429484237 1429484233 1558608109 9781558608108 1281015024 9781281015020 9786611015022 6611015027 0080495877 9780080495873 Year: 2004 Publisher: Amsterdam ; Boston : Morgan Kaufmann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The second edition of IPv6: Theory, Protocol, and Practice guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so much time and effort has been expended on revising IPv4. In the Protocol section is a comprehensive review of the specifics of IPv6 and related protocols. Finally, the Practice section provides hands-on explanations of how to roll out IPv6 support and services.This completely rewritten edition offers updated and comprehensive coverage of important topics including router and server configuration, securit


Book
Practical anonymity : hiding in plain sight online
Authors: ---
ISBN: 0124104428 0124104045 1299752888 9780124104426 9780124104044 Year: 2013 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l


Book
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
Authors: --- ---
ISBN: 0128006196 0128006048 1306583535 9780128006191 9780128006047 9781306583534 Year: 2014 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of dir

Listing 1 - 9 of 9
Sort by