Search Results: 'TCP'

Search

×
×
×
×
53 results for "TCP"
RedBearLab CC3200 Development Workshop By Agus Kurniawan
eBook (ePub): $2.99
RedBearLab CC3200 is a development kit to build programs with WiFi module TI CC3200. This book helps you to get started with RedBearLab CC3200 using Energia. The following is highlight topics: *... More > Preparing Development Environment * Hello World - RedBearLab CC3200 * Sketch Programming * Updating RedBearLab CC3200 Firmware * Network Programming (TCP/IP and UDP/IP) * Building Wireless Access Point (AP) Network * Building Wireless Sensor Network< Less
Linux Networking: Hands-On By Tom Sinclair
eBook (PDF): $14.36
This is a guide to building a TCP/IP network using Linux. It includes step-by-step instructions for setting up a DNS, e-mail server, directory service, network printing and file sharing and... More > networking authentication using Kerberos. Each chapter includes a guide to terminology, review exercises and critical thinking questions, in addition to screen shots and diagrams. The content is suitable for someone who is comfortable with Linux but wishes to extend their knowledge with practical experience.< Less
Linux implementation for the ISP & data center By Wilhelm Lehmann
Paperback: $26.90
Prints in 3-5 business days
(1 Ratings)
This Book covers from the basic principles of TCP/IP to the more advanced sections like RADIUS High Availability Cluster installation, Web servers, Database Servers, and much more. While the Author... More > does not go into the fine details, enought is provided that you can start then carry on on your own with external resources provided. Some Linux Knowledge, and a basic understanding of computing will help, but is not needed to understand the contents of this book. The Second edition is updated with the latest information, and now includes a bonus section on fighting SPAM.< Less
Rebol - A programmer's guide By Olivier Auverlot & Peter William Alfred Wood
eBook (PDF): $0.00
(4 Ratings)
Discover the power of the REBOL language with this very practical book. After a short introduction to programming REBOL, it shows you how to start developing graphical user interfaces and network... More > programming (both TCP/IP programming and web development). The book introduces some of the most advanced technologies of this language, such as project management, the use of databases and XML, encryption techniques, and development under the REBOL/IOS collaboration system. More information available on www.auverlot.fr< Less
Linux Essentials, Services & Security - Learn By Example By Vipin Gupta
eBook (PDF): $12.00
This book starts from basics & takes you to advance levels of linux. Everything has been explained by giving examples. Proper lab setup along with diagrams has been given so that you can... More > constructs the labs yourself & do the practice. This book covers the course contents of RHCE. It is based on RHEL 6. It covers permissions, raid, lvm, quota, sudo, remote installation, kickstart, apache web server, ftp server, nfs, nis, squid proxy server, dns, postfix mail server, dhcp, rsyslog, cups, xinetd, tcp-wrappers, selinux, firewall, ipv6, pam, ssh, security tools, automounter etc in detail.< Less
FortiOS Handbook V2, Chapter 19: Load Balancing By Fortinet Technologies Inc
Paperback: $8.38
Prints in 3-5 business days
FortiOS firewall server load balancing includes the features you would expect of a server load balancing solution. Traffic can be balanced across multiple backend servers based on multiple methods... More > including static (failover), round robin, weighted to account for different sized servers, or based on the health and performance of the server including round trip time, number of connections. The load balancer supports HTTP, HTTPS, SSL or generic TCP/UDP or IP protocols. Session persistence is supported based on the SSL session ID or based on an injected HTTP cookie.< Less
FortiOS Handbook V2, Chapter 19: Load Balancing By Fortinet Technologies Inc
eBook (PDF): $0.00
FortiOS firewall server load balancing includes the features you would expect of a server load balancing solution. Traffic can be balanced across multiple backend servers based on multiple methods... More > including static (failover), round robin, weighted to account for different sized servers, or based on the health and performance of the server including round trip time, number of connections. The load balancer supports HTTP, HTTPS, SSL or generic TCP/UDP or IP protocols. Session persistence is supported based on the SSL session ID or based on an injected HTTP cookie.< Less
NETW 203 Week 2 Assignment DeVry By james joe
Paperback: List Price: $8.06 $7.25 | You Save: 10%
Prints in 3-5 business days
NETW 203 Week 2 PACKET TRACER LABS • PTLab 3.2.4.6—Investigating the TCP-IP and OSI Models in Action • PTLab 3.3.3.3—Explore a Network • PTLab 4.2.4.5—Connecting a... More > Wired and Wireless LAN Log in to your Cisco Academy Account at http://www.netacad.com (Links to an external site.)Links to an external site. to retrieve and complete the above packet tracer labs. Your instructor will tell you which of your completed assignments to submit for this week. Post any questions as well as the results of each lab in the open discussion.< Less
Hacking: Learn fast Hack to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks 4) Hacking: Learn fast Hack to hack, strategies and hacking methods, Penetration testing Hacking Boo By Jell alex
eBook (PDF): $1.99
Do you want to learn about today's most sophisticated Hacking attacks? Do you want to know more about Cyber criminals and their operations? Do you want to learn about Robot Networks, Trojans &... More > Ransomware? In this book you will learn about: ADWARE SPYWARE MALWARE MAN IN THE MIDDLE LOCKY TRAFFIC REDIRECTION PAYLOAD INJECTION ARP POISONING WORMS ROGUE WIRELESS ACCESS POINTS MISS-ASSOCIATION ATTACKS DE-AUTHENTICATION ATTACKS COLLISION ATTACKS REPLAY ATTACKS PHISHING VISHING WHALING SMISHING SPEAR PHISHING DUMPSTER DIVING SHOULDER SURFING BRUTE FORCE ATTACK DICTIONARY ATTACKS RAINBOW TABLES KEYSTROKE LOGGINGS SPOOFING SOCIAL ENGINEERING SPAMMING SQL INJECTIONS DDOS ATTACKS TCP SYN FLOOD ATTACK PING OF DEATH VIRUSES ROOTKITS LOGIC BOMBS TROJAN HORSES WANNA-CRY RANSOMWARE BOTNETS< Less
Windows Networking By Kashif Nazir
eBook (PDF): $8.75
(1 Ratings)
I try to cover of basic techniques in simple and help full format with examples and Photos which will be Easy to understand for every Student who is New in computer Networking like Domain Base or... More > workgroup Base Networking ,Active directory, DHCP, DNS, local users and groups ,User Accounts ,Local User Accounts,Domain User Accounts,Built-In User Accounts,Administrator,Guest,Planning New User Accounts,Naming Conventions, Password Requirements, Setting Properties for User Accounts,User Profile,Logan Script, Home Folder,Implementing,Groups,Understanding Groups,Understanding local Groups, Preparing to Use Local Groups,Creating Local Groups,Adding Members to a Group, Understanding Built-In Local Groups, Understanding Built-In System Groups, Inheritance,Network Protocol, TCP/IP,Assigning Shared Folder PERMISSIONS,UNDERSTANDING Disk Quota Management, And Many More Knowledge about Computer Hardware and Networking< Less

Top 10

see more >
 
1
The CashPT® Blueprint: How I Built and Scaled a Successful Cash-Based Physical Therapy Practice Even When I Was Told It Was Unethical, a Bad Idea and That No One Would Pay More Than Their Copay for Physical Therapy! The CashPT®... By Aaron LeBauer
Paperback: $19.97