This is a general-purpose textbook about computer networking, complete with diagrams and exercises. It is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, or as a supplemental text for a wide variety of network-related courses.
The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems.
Pages : | /Paperback N/A |
Size : | HTML, PDF (726 pages, 5.73 MB), ePub |
File type : | |
Downloads: | 134 |
Created: | 2020-08-27 |
License: | CC BY-NC-ND 3.0 |
Author(s): | Peter Lars Dordal |
Computer Networking : Principles, Protocols and Practice
This tutorial provides a best reference for network administration in a Linux environment ,a complet training document under 505 pages for free download....
Virtual Private Networks free tutorialDownload free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet....
An Introduction to Computer NetworksDownload free course An Introduction to Computer Networks, pdf file on 896 pages by by Peter L Dordal....
Zabbix 1.8 Network MonitoringImagine you're celebrating the start of the weekend with Friday-night drinks with a few fr..., download free Network Monitoring tutorial in PDF (428 pages) created by Rihards Olups ....
Network TopologiesDownload free network topologies tutorial course material and training in PDF file under 4 pages by Maninder Kaur....
IP Tunneling and VPNs TutorialThe objective of this course is to learn Virtual Private Network (VPN) fundamental and to overview tunneling techniques used for implementation of VPNs. Free pdf tutorial in PDF in 78 pages designed to beginners students....
Managing Risk and Information SecurityDownload free course Managing Risk and Information Security, pdf file on 152 pages by Malcolm Harkins....
Planning and Preparing for Microsoft SharePoint HybridDownload free course Planning and Preparing for Microsoft SharePoint Hybrid, pdf file on 113 pages by Jeremy Taylor....
How to configure Voice over IPThis pdf tutorial you will learn how to install, configure, and administer Voice over IP.free training document designated to beginners....
Secrets of Network Cartography: A Comprehensive Guide to NmapEver wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...