Faster previews. Personalized experience. Get started with a FREE account.
Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks

Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks

by Rongrong Zhang, Jihong Yu
134 Pages · 2019 · 5 MB · 0 Downloads · New!
" Happiness doesn't result from what we get, but from what we give. ” ― Ben Carson
Twisted Network Programming Essentials
by Jessica McKellar
194 Pages · 2015 · 10 MB · 4,698 Downloads · New!
The “Twisted Network Programming Essentials: Event-driven Network Programming with Python, 2nd Edition” is extremely useful for getting a hands-on introduction to the framework. Jessica McKellar is the author of this programming book. Jessica is a software engineer from Cambridge, MA. She enjoys the Internet, networking, low-level systems engineering, and contributing to and helping other people contribute to open-source software. In this book, Jessica McKellar shares a guided tour of building fairly standard twisted applications.
Learn Wireshark
by Lisa Bock
432 Pages · 2019 · 9 MB · 6 Downloads · New!
Learn Wireshark is the cyber security, computer security, computer networks and network security book which teaches about packet analysis using Wireshark. Lisa Bock is the author of this superb book. This guide is for teachers, students, network administrators, and security analysts to check the security of their systems through Wireshark. It offers all the basic knowledge of devices, protocols, network fundamentals with the understanding of multiple topologies. First of all, learn the diverse uses of Wireshark for analysis purposes. It briefly explains about the working of Wireshark and especially its interface. Learn, how to navigate through different menu options such as view, file, and edit. Students can capture and display filters to observe traffic. It contains a complete chapter on the Open Systems Interconnection model. Discover the different protocols of the internet for deep packet analysis such as ICMP, ARP, IP, TCP, and UDP. Find out the different issues that you face while troubleshooting and networking. Learn the different among insert comments, share packet capture, subset traffic, save and export. This book offers a solid overview of the protocol analysis and helps the students to understand everything. In short, this guide provides all the content that you need to become an expert in network security.
Core PHP Programming
by Leon Atkinson
1104 Pages · 2015 · 8 MB · 1 Downloads · New!
The “Core PHP Programming (3rd Edition)” is a great book on PHP. Leon Atkinson and Zeev Suraski are the authors of this book. Leon Atkinson is a freelance Web developer and architect who has been working with PHP since 1997. He formerly served as chief technologist for Clear Ink in Walnut Creek, where he specialized in designing and implementing complex, PHP-based Web applications. In this book, the authors guide the reader about PHP in-depth. PHP is a server-side scripting language and it is used to develop dynamic and static websites and Web applications. PHP is an easy programming language to master for people just starting to learn to program. At the beginning of the book the authors cover the basics of PHP. As they move towards more advanced topics there is less explanation and a tighter packing of information. At the same time, the book has a large number of small code examples throughout, making sure that you know how to use the functions under discussion. I recommend this book to everyone, who wants to be an expert in PHP programming. To sum it up, Core PHP Programming is a necessary book for the newbies of PHP students.
Developing IP multicast networks
by Beau Williamson
594 Pages · 2015 · 7 MB · 1 Downloads · New!
The “Developing IP multicast networks, Volume I” is a good book to explain what is multicast in intuitive words. Beau Williamson is the author of this networking book. He is a consulting engineer in the Office of the CTO at Cisco Systems. His area of expertise is general IP networking, with a special focus on IP multicast. Williamson also the author and developer of Cisco’s internal IP multicast training class, and a frequent presenter of IP-related topics at Cisco Networkers. In this book, Beau Williamson provides a solid foundation of basic IP multicast concepts. Each chapter of this book explains in-depth with good focus and examples of programming needs and scenarios that back up the reading material. Furthermore, Developing IP multicast networks will help the reader to clear explanations of the concepts and underlying mechanism of IP multicasting, from the fundamentals of advanced design techniques. I recommend this book for networking students as it explains everything in depth. The good thing about this Developing IP multicast networks is that in just a very short time you will really know so much about programming. To sum it up, Developing IP multicast networks is an informative book for networking students.
Network Security, Firewalls and VPNs
by Stewart
490 Pages · 2013 · 9 MB · 3 Downloads · New!
Network Security, Firewalls and VPNs is the computer networking, APIs, protocols, network security and firewalls book that share the latest trends on security systems. Stewart is the author of this tremendous book. This is the updated and revised edition of the book that covers the latest trends of the field like network security, VPNs and Firewalls. It offers the unique look to the new challenges that organizations are facing in regard to their security on public internet. The author shared a brief note on the basics of network security and things related to it. Find out the techniques that are used by hackers to steal the information from the PC. Explore how to protect the system from hackers and how VPNs operate. What is the role of Firewalls in the security of windows and how lethal is firewall when it comes to data protection? This book offers hands on activities that help the user to handle the unique problems. Learn, how to handle hackers and your system that is already hacked. What is the best way to configure your firewall protection when things are going out of control? All this and much more you will find out in this exciting new book.
Zero Trust Networks
by Evan Gilman, Doug Barth
240 Pages · 2015 · 7 MB · 1 Downloads · New!
The “Zero Trust Networks: Building Secure Systems in Unsaturated Networks, 1st Edition” is a must-read book for anyone interested in Zero Trust Networks. The authors of this computer networking book are Evan Gilman and Doug Barth. Evan Gilman is an Operations Engineer with a background in computer networks. He has been building and operating systems in hostile environments in his entire professional career. In this book, Evan and Doug show you how zero trust lets you focus on building strong authentication and authorization. They guide you about the architecture of a zero-trust network. This book rebukes that and gives practical, common sense examples of how to create it. Zero Trust Networks does not talk about one specific product but rather describes all the integrations and risk. So, it’s a must-read book for networking students. Furthermore, the reader will learn how to migrate from a perimeter-based network to a zero-trust network in production. They also examine the fundamental concepts at play in a zero-trust network, including network agents and trust engines. Zero Trust is emerging at the next model to adapt and secure the models of today’s operating environment, for example cloud and internal. Zero Trust Networks engages all the networking students from start to end of the page and worth reading. All in all, Zero Trust Networks is an essential book for all computer networking students.