Pages : | 416 |
Size : | 24.2 MB |
File type : | |
Downloads: | 63 |
Created: | 2022-02-01 |
License: | CC BY |
Author(s): | by Ivan Ganchev, R. van der Mei, Hans van den Berg |
Social Theory after the Internet
Demystifying Internet of Things Security
Internet of Things (IoT) in 5 Days: an easy guide to Wireless Sensor Networks (WSN), IPv6, and IoT
Download free course Representation Learning for Natural Language Processing, pdf file on 349 pages by Zhiyuan Liu, Yankai Lin, Maosong Sun....
IP Network ArchitectureDownload free pdf course training material about IP Network Architecture and IP addresses ,document by Kurtis and woody on 74 pages for intermediate level students....
How to configure Voice over IPThis pdf tutorial you will learn how to install, configure, and administer Voice over IP.free training document designated to beginners....
Introduction to Network securityDownload a free Network security training course material ,a PDF file unde 16 pages by Matt Curtin....
Virtual Private Networks free tutorialDownload free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet....
Introduction to Ethical HackingDownload Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....
Computer Networks: A Systems ApproachThis book explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best selling and classic textbook explains various protocols and networking technologies. The systems oriented appro...
VoIP Tutorial in PDFThis pdf tutorial discusses the advantages and disadvantages of using VoIP services, focusing primarily on security issues that may affect those who are new to VoIP....
Network Protocols and VulnerabilitiesThis tutorial is about the network security and how they are not perfect ,it decribe some of attacks and how to protect against them....
Configuring VoIP Call Setup MonitoringDownload tutorial about configuring VoIP call and setup monitoring, it's a free training document material in 14 pages by Scisco designated to intermediate level users....