Pages : | 512 |
Size : | 7.3 MB |
File type : | |
Downloads: | 122 |
Created: | 2022-02-03 |
License: | CC BY |
Author(s): | Charu C. Aggarwal |
Artificial Neural Networks - Methodological Advances and Biomedical Applications
Computer Networks: A Systems Approach
Secrets of Network Cartography: A Comprehensive Guide to Nmap
Download free course Managing Risk and Information Security, pdf file on 152 pages by Malcolm Harkins....
PC Assembly LanguageDownload free course PC Assembly Language, pdf file on 190 pages by Paul A. Carter....
Secrets of Network Cartography: A Comprehensive Guide to NmapEver wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...
IP Tunneling and VPNs TutorialThe objective of this course is to learn Virtual Private Network (VPN) fundamental and to overview tunneling techniques used for implementation of VPNs. Free pdf tutorial in PDF in 78 pages designed to beginners students....
Introduction to Computer NetworkThis tutorial is aimed to learn the fundamental of computer network, many questions and answers about the popular technology used for networking systems (wireless network, cellular communication, wap, bluetooth, wimax,..). Free pdf tutorial designed to beginners....
Virtual Private Networks free tutorialDownload free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet....
Network TopologiesDownload free network topologies tutorial course material and training in PDF file under 4 pages by Maninder Kaur....
Guide to Computer Network SecurityDownload free course Guide to Computer Network Security, pdf file on 572 pages by Joseph Migga Kizza....
Tutorial in PDF, being a HackerThis course is designed to beginners to better undesrtand the network security and system vulnerability and how to protect your system against hack...
Configuring VoIP Call Setup MonitoringDownload tutorial about configuring VoIP call and setup monitoring, it's a free training document material in 14 pages by Scisco designated to intermediate level users....