Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
1,276
result(s) for
"COMPUTERS / Networking / Network Protocols"
Sort by:
Building the Internet of Things with IPv6 and MIPv6
by
Minoli, Daniel
in
Communication, Networking and Broadcast Technologies
,
Computers
,
COMPUTERS / Internet / General. bisacsh
2013
\"If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.\"
—Kevin Ashton, originator of the term, Internet of Things
An examination of the concept and unimagined potential unleashed by the Internet of Things (IoT) with IPv6 and MIPv6
What is the Internet of Things? How can it help my organization? What is the cost of deploying such a system? What are the security implications? Building the Internet of Things with IPv6 and MIPv6: The Evolving World of M2M Communications answers these questions and many more.
This essential book explains the concept and potential that the IoT presents, from mobile applications that allow home appliances to be programmed remotely, to solutions in manufacturing and energy conservation. It features a tutorial for implementing the IoT using IPv6 and Mobile IPv6 and offers complete chapter coverage that explains:
* What is the Internet of Things?
* Internet of Things definitions and frameworks
* Internet of Things application examples
* Fundamental IoT mechanisms and key technologies
* Evolving IoT standards
* Layer 1/2 connectivity: wireless technologies for the IoT
* Layer 3 connectivity: IPv6 technologies for the IoT
* IPv6 over low power WPAN (6lowpan)
Easily accessible, applicable, and not overly technical, Building the Internet of Things with IPv6 and MIPv6 is an important resource for Internet and ISP providers, telecommunications companies, wireless providers, logistics professionals, and engineers in equipment development, as well as graduate students in computer science and computer engineering courses.
Biomolecular networks
by
Zhang, Xiang-Sun
,
Wang, Rui-Sheng
,
Chen, Luonan
in
Bioinformatics
,
Biological systems
,
Biomolecules
2009
Alternative techniques and tools for analyzing biomolecular networks. With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular networks in living organisms. With this development has come recognition of the fact that a complicated living organism cannot be fully understood by merely analyzing individual components. Rather, it is the interactions of components or biomolecular networks that are ultimately responsible for an organism's form and function. This book addresses the import
Mastering Wireshark 2
by
Crouthamel, Andrew
in
Computer network protocols
,
Computer networks-Monitoring
,
COMPUTERS / Networking / General
2018
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you.
CCENT/CCNA: ICND1 100-105 Certification Guide
by
Dauti, Bekim
in
COM055000 COMPUTERS / Certification Guides / General
,
COMPUTERS / Networking / General
,
COMPUTERS / Networking / Network Protocols
2018
Become familiar with ICND1 (100-105) exam objectives, and learn how to get ready for the examKey FeaturesA step by step guide that will build you skills from basic concepts to completely understanding network communicationComprehensive coverage to help you implement the knowledge you've gained in real-world scenariosTake practice questions and mock tests to check how prepared you are for the CCENT examBook DescriptionCCENT is the entry-level certification for those looking to venture into the networking world. This guide will help you stay up-to date with your networking skills. This book starts with the basics and will take you through everything essential to pass the certification exam. It extensively covers IPv4 and IPv6 addressing, IP data networks, switching and routing, network security, and much more-all in some detail. This guide will provide real-world examples with a bunch of hands-on labs to give you immense expertise in important networking tasks, with a practical approach. Each chapter consists of practice questions to help you take up a challenge from what you have procured. This book ends with mock tests with several examples to help you confidently pass the certification. This Certification Guide consists of everything you need to know in order to pass the ICND 1 100-105 Exam, thus obtaining a CCENT certification. However, practicing with real switches and routers or a switch or router simulator will help you succeed.What you will learnGet to grips with the computer network conceptsUnderstand computer network components and learn to create a computer networkUnderstand switching and learn how to configure a switchUnderstand routing and learn how to configure a routerUnderstand network services and the maintenance processLearn how to troubleshoot networking issuesBecome familiar with, and learn how to prepare for, the ICND1 100-105 examWho this book is forIf you are a Network Administrator, Network Technician, Networking professional, or would simply like to prepare for your CCENT certification, then this book is for you. Some basic understanding of networks and how they work would be helpful. Sufficient information will be provided to those new to this field.
Cloud Computing
by
Chopra, Rajiv
in
Cloud computing
,
COMPUTERS / Networking / General
,
COMPUTERS / Networking / Network Protocols
2017
This overview of cloud computing in a self-teaching format, contains state-of-the art chapters with tips and insights about cloud computing, its architecture, applications, information on security and privacy, and numerous case studies. It includes questions for discussion and Cloud Computing Lab Experiments to help in mastering its complex services and technologies. Recent research shows that cloud computing will be worth billions of dollars in new investments. Organizations are flocking to the cloud services to benefit from the elasticity, self-services, resource abundance, ubiquity, responsiveness, and cost efficiencies that it offers. Many government and private universities have already migrated to the cloud. The next wave in computing technology- expected to usher in a new era- will be based on cloud computing.Features:* Explores the basic advancements in the field of cloud computing * Offers a practical, self-teaching approach with numerous case studies and lab experiments on installation, evaluation, security, and more* Includes material on ESXi, MS AZURE, Eucalyptus, and more.
AWS Certified Advanced Networking - Specialty Exam Guide
by
Sluga, Marko
in
Cloud computing
,
COM048000 COMPUTERS / Systems Architecture / Distributed Systems & Computing
,
COMPUTERS / Networking / Network Protocols
2019
Develop technical skills and expertise to automate AWS networking tasks
Key Features
* A fast paced guide that will help you pass the exam with confidence
* Learn advanced skill sets to build effective AWS networking solutions
* Enhance your AWS skills with practice exercises and mock tests
Book Description
Amazon has recently come up a with specialty certifications which validates a particular user's expertise that he/she would want to build a career in. Since the Cloud market now demands of AWS networking skills this becomes the most wanted certification to upheld ones industry portfolio. This book would be your ideal companion to getting skilled with complex and creative networking solutions. Cloud practitioners or associate-level certified individuals interested in validating advanced skills in networking can opt for this practical guide.
This book will include topics that will help you design and implement AWS and hybrid IT network architectures along with some network automation tasks. You will also delve deep into topics that will help you design and maintain network architecture for all AWS services. Like most of our certification guides this book will also follow a unique approach of testing your learning with chapter-level practice exercises and certification-based mock tests. The exam mock tests will help you gauge whether you are ready to take the certification exam or not. This book will also be an advanced guide for networking professionals to enhance their networking skills and get certified.
By the end of this book, you will be all equipped with AWS networking concepts and techniques and will have mastered core architectural best practices.
What you will learn
* Formulate solution plans and provide guidance on AWS architecture best practices
* Design and deploy scalable, highly available, and fault-tolerant systems on AWS
* Identify the tools required to replicate an on-premises network in AWS
* Analyze the access and egress of data to and from AWS
* Select the appropriate AWS service based on data, compute, database, or security requirements
* Estimate AWS costs and identify cost control mechanisms
Who this book is for
If you are a system administrator, or a network engineer interested in getting certified with an advanced Cloud networking certification then this book is for you. Prior experience in Cloud administration and networking would be necessary.
Learn Ethical Hacking from Scratch
2018
This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
Cybersecurity - attack and defense strategies
by
Ozkaya, Erdal
,
Diogenes, Yuri
in
COM015000 COMPUTERS / Security / Viruses & Malware
,
COM060040 COMPUTERS / Security / Online Safety & Privacy
,
Computer networks
2018
The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.