Arista WarriorThough Arista Networks is a relative newcomer in the data center and cloud networking markets, the company has already had considerable success. In this book, renowned consultant and technical author Gary Donahue (Network Warrior) provides an in-depth, objective guide to Arista's lineup of hardware, and explains why its network switches and Extensible Operating System (EOS) are so effective.
Anyone with a CCNA or equivalent knowledge will benefit from this book, especially entrenched administrators, engineers, or architects tasked with building an Arista network. ...
TCP/IP Architecture, Design and Implementation in LinuxThis book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design and implementation of TCP/IP protocol in linux, this book provides different aspects of socket programming and major TCP/IP related algorithms. In addition, the text features netfilter hook framework, a complete explanation of routing sub-system, IP QOS implementation, and Network Soft IRQ. This book further contains elements on TCP state machine implementation,TCP timer implementation on Linux, TCP memory management on Linux, and debugging TCP/IP stack using lcrash. ...
Hacking Exposed, 6th EditionMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.
New and updated material! ...
Windows Server 2012: Up and RunningIf your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows administrators will learn how to deploy, configure, and manage the server's expanded capabilities and features step-by-step, using clear examples and numerous screen shots. You'll also discover how to integrate employees' private mobile devices into your corporate network. ...
Building Node Applications with MongoDB and BackboneBuild an application from backend to browser with Node.js, and kick open the doors to real-time event programming. With this hands-on book, you'll learn how to create a social network application similar to LinkedIn and Facebook, but with a real-time twist. And you'll build it with just one programming language: JavaScript.
If you're an experienced web developer unfamiliar with JavaScript, the book's first section introduces you to the project's core technologies: Node.js, Backbone.js, and the MongoDB data store. You'll then launch into the project - a highly responsive, highly scalable application - guided by clear explanations and lots of code examples. ...
Wireless and Mobile Networks SecurityThis book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. ...
CCNP SWITCH Portable Command GuidePreparing for the CCNP exam? Working as a network professional? Here are all the CCNP-level commands for the Implementing Cisco Switched Networks (SWITCH) exam you need in one handy resource. The CCNP SWITCH Portable Command Guide is filled with valuable, easy-to-access information and is portable enough for use whether you're in the server room or the equipment closet. ...
Professional Microsoft Windows Embedded CE 6.0With its support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices, including Smartphones, PocketPCs, digital cameras, DVRs, VoIP, network routers, wireless projectors, robotics, data acquisition, human-machine interfaces, and more. Packed with straightforward exercises and helpful examples, this book is aimed at demonstrating how to perform various development tasks in the Windows Embedded CE 6.0 environment. You'll quickly come to view Windows Embedded CE 6.0 as an ideal operating system for developing a new generation of intelligent, multimedia, connected, and service-oriented embedded devices. ...
SSH, The Secure ShellSecure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well. ...
Networking All-in-One For Dummies, 4th EditionSo you're in charge of a network? That's great - and a great big job! Let this book be your one-stop guide. You'll find out about network standards, popular network operating systems, servers, how to plan and set up a network, security secrets, troubleshooting recommendations, what to do with wireless and mobile networking variations, and much more! ...