تبلیغات
Computer Book - مطالب ابر networking

Penetration Testing and Network Defense

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   05:23 ب.ظ

نوع مطلب :امنیت ،شبکه ،

26511389672 Penetration Testing and Network Defense

Book Description

The practical guide to simulating, detecting, and responding to attacks

  • Create step-by-step testing plans
  • Learn to perform social engineering and host reconnaissance
  • Evaluate session hijacking methods
  • Exploit web  vulnerabilities
  • Detect attempts to breach database 
  • Use password crackers to obtain access information
  • Circumvent Intrusion Prevention Systems () and firewall protections and disrupt the service of routers and switches
  • Scan and penetrate wireless networks
  • Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
  • Test UNIX, Microsoft, and Novell servers for vulnerabilities
  • Learn the root cause of buffer overflows and how to prevent them
  • Perform and prevent Denial of Service attacks

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: cisco، IPS، Networking، Security،

Top-Down Network Design, 3rd Edition

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   05:22 ب.ظ

نوع مطلب :توسعه نرم افزار ،شبکه ،

26511389673 Top Down Network Design, 3rd Edition

Book Description

Objectives
The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, , and manageability.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: IPv6، Networking،

Digital Forensics for Network, Internet, and Cloud Computing

نوشته شده در تاریخ : یکشنبه 9 مرداد 1390   05:47 ق.ظ

نوع مطلب :Cloud ،شبکه ،

1579002072 Digital Forensics for Network, Internet, and Cloud Computing

Book Description
 forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from  traffic. This book will help  and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in -based technology (e.g.,  networks,  , telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists.

  • Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering.
  • The current and future states of network forensics analysis tools are addressed.
  • The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Cloud، Computing، internet، Networking، TCP/IP،

Digital Forensics for Network, Internet, and Cloud Computing

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   11:02 ب.ظ

نوع مطلب :شبکه ،

1579002072 Digital Forensics for Network, Internet, and Cloud Computing

Book Description
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in -based technology (e.g., social networks,  , telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists.

  • Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic , and deciphering.
  • The current and future states of network forensics analysis tools are addressed.
  • The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Cloud، Computing، internet، Networking، TCP/IP،

Computer Vision: Algorithms and Applications

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   07:02 ب.ظ

نوع مطلب :الگریتم | محاسبات  ،

1691850850 Computer Vision: Algorithms and Applications

Book Description
Humans perceive the three-dimensional structure of the world with apparent ease. However, despite all of the recent advances incomputer vision research, the dream of having a computerinterpret an image at the same level as a two-year old remains elusive. Why is computer vision such a challenging problem and what is the current state of the art?

Computer VisionAlgorithms and Applications explores the variety of techniques commonly used to analyze and interpret images. It also describes challenging real-world applications where vision is being successfully used, both for specialized applications such as medical imaging, and for fun, consumer-level tasks such as image editing and stitching, which students can apply to their own personal photos and videos.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Algorithm، apps، Computer، Computer Vision، Networking،

Configuring IPCop Firewalls: Closing Borders with Open Source

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   01:51 ب.ظ

نوع مطلب :سیستم عامل ،شبکه ،

64568216741 Configuring IPCop Firewalls: Closing Borders with Open Source

Book Description

 is a powerful,  based  distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern  to have, and what is most important is that it sets this all up for you in a highly automated and simplified way.

This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and and why they’re important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, and using it for bandwidth . While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: dhcp، dns، firewall، IPCop، Networking، ·Open Source، VPN،

Microsoft Windows Networking Essentials

نوشته شده در تاریخ : چهارشنبه 5 مرداد 1390   11:26 ب.ظ

نوع مطلب :سیستم عامل ،شبکه ،

478516370 Microsoft Windows Networking Essentials

Book Description

The  concepts and technologies of Windows networkingNetworking can be a complex topic, especially for those to the field of IT. This focused, full-color book takes a unique approach to teaching Windows  to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the  Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners  gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: WAN، TCP/IP، Networking، Microsoft Windows، LAN، IPv6، IPv4، dns،

Configuring IPCop Firewalls: Closing Borders with Open Source

نوشته شده در تاریخ : دوشنبه 27 تیر 1390   12:21 ب.ظ

نوع مطلب :سیستم عامل ،شبکه ،

64568216741 Configuring IPCop Firewalls: Closing Borders with Open Source

Book Description

 is a powerful,  based  distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern  to have, and what is most important is that it sets this all up for you in a highly automated and simplified way.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: VPN، Open Source، Networking، IPCop، firewall، dns، dhcp،

Take Control of iPad 2 Networking & Security

نوشته شده در تاریخ : جمعه 17 تیر 1390   03:06 ب.ظ

6456821675 Take Control of iPad 2 Networking & Security

Book Description

Once you move beyond connecting to a simple home Wi-Fi network or using  data, you’ll want to read  expert Glenn Fleishman’s discussion of how to integrate your  into more-complex networks and keep its data safe from prying eyes. Along with offering advice about Wi-Fi and 3G connections, Glenn explains how to protect your data in transit, and how to set up Bluetooth for various types of connections, including an personal hotspot, a wireless keyboard, and peer-to-peer pairing.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security، Take Contro، Networking، Ipad،

Junos Enterprise Routing, 2nd Edition

نوشته شده در تاریخ : پنجشنبه 16 تیر 1390   12:54 ب.ظ

نوع مطلب :شبکه ،

64568216710 Junos Enterprise Routing, 2nd Edition

Book Description

Considered the go-to study  for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the services available to  administrators—including the most recent set of flow-based  services and design guidelines that incorporate services and features of the MX, SRX, and EX  devices.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Router، Networking، Junos،

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition

نوشته شده در تاریخ : پنجشنبه 16 تیر 1390   12:35 ق.ظ

نوع مطلب :شبکه ،

6456821673 Practical Packet Analysis: Using Wireshark to Solve Real World Network Problems, 2nd Edition

Book Description

It’s easy to capture packets with , the world’s most popular  sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your ?


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Real World، Wireshark، Networking،

Working with Preferences: Less Is More

نوشته شده در تاریخ : پنجشنبه 9 تیر 1390   04:34 ب.ظ

نوع مطلب :شبکه ،

001c357e medium Working with Preferences: Less Is More
S in ger | 2011 | ISBN: 3642172792 | 218 pages | PDF | 1,9 MB

Preferences are useful in many real-life problems, guiding human decision making from early childhood up to complex professional and organizational decisions. In artificial intelligence specifically, preferences is a relatively new topic of relevance to nonmonotonic reasoning, multiagent systems, constraint satisfaction, decision making, social choice theory and decision-theoretic planning...


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: networking،