Listing 1 - 9 of 9 |
Sort by
|
Choose an application
The second edition of IPv6: Theory, Protocol, and Practice guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so much time and effort has been expended on revising IPv4. In the Protocol section is a comprehensive review of the specifics of IPv6 and related protocols. Finally, the Practice section provides hands-on explanations of how to roll out IPv6 support and services.This completely rewritten edition offers updated and comprehensive coverage of important topics including router and server configuration, securit
TCP/IP (Computer network protocol). --- Information Technology --- General and Others --- TCP/IP (Computer network protocol) --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Computer network protocols
Choose an application
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS). The improvements go far beyond the updated material: they also incl
TCP/IP (Computer network protocol) --- Information Technology --- General and Others --- Computer network protocols. --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Computer network protocols --- Protocols, Computer network --- Computer networks
Choose an application
Choose an application
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what.
Choose an application
Shows you how to use the most effective and widely-used anonymity tools---the ones that protect activists, diplomats, military and other government agencies---to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.
Choose an application
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS). The improvements go far beyond the updated material: they also include an all-new approach that examines the TCP/IP protocol stack from the top down, beginning with the applications you may already understand and only then moving deeper to the protocols that make these applications possible. You also get a helpful overview of the "life" of an Internet packet, covering all its movements from inception to final disposition. If you're looking for nothing more than information on the protocols comprising TCP/IP networking, there are plenty of books to choose from. If you want to understand TCP/IP networkingwhy the protocols do what they do, how they allow applications to be extended, and how changes in the environment necessitate changes to the protocolsthere's only the one you hold in your hands. * Explainsclearly and holistically, but without oversimplificationthe core protocols that make the global Internet possible. * Fully updated to cover emerging technologies that are critical to the present and future of the Internet. * Takes a top-down approach that begins with the familiar application layer, then proceeds to the protocols underlying it, devoting attention to each layer's specifics. * Divided into organized, easy-to-follow sections on the concepts and fundamentals of networking, Internet applications, transport protocols, the Internet layer and infrastructure, and practical internetworking.
Choose an application
The second edition of IPv6: Theory, Protocol, and Practice guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so much time and effort has been expended on revising IPv4. In the Protocol section is a comprehensive review of the specifics of IPv6 and related protocols. Finally, the Practice section provides hands-on explanations of how to roll out IPv6 support and services.This completely rewritten edition offers updated and comprehensive coverage of important topics including router and server configuration, securit
Choose an application
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l
Computer science. --- Computer security. --- Network security. --- Computer science --- Computer security --- Computer networks --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Security measures. --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- 654 --- AA / International- internationaal --- Informatieverwerking. Bureautica
Choose an application
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of dir
Computer networks --- Cyberspace --- Computer crimes --- Information Science --- Computer Security --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Prevention --- Security measures. --- Prevention. --- Space and time --- Computers --- Telematics --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security systems
Listing 1 - 9 of 9 |
Sort by
|