Table of contents: 1.Introduction 2.Basic TCP Sockets 3.Of Names and Address Families 4.Using UDP Sockets 5.Sending and Receiving Data 6.Beyond Basic Socket Programming 7.Under the Hood 8.Socket Programming in C++
Contents Preface Chapter 1. Introduction Chapter 2. Link Layer Chapter 3. IP: Internet Protocol Chapter 4. ARP: Address Resolution Protocol Chapter 5. RARP: Reverse Address Resolution Protocol Chapter 6. ICMP: Internet Control Message Protocol Chapter 7. Ping Program Chapter 8. Traceroute Program Chapter 9. IP Routing Chapter 10. Dynamic Routing Protocols Chapter 11. UDP: User Datag…
Table of Contents: Chapter 1. The Practice of Applied Network Security Monitoring Chapter 2. Planning Data Collection Chapter 3. The Sensor Platform Chapter 4. Session Data Chapter 5. Full Packet Capture Data Chapter 6. Packet String Data Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures Chapter 8. Reputation-Based Detection Chapter 9. Signature-Based Detection …
Table of contents: Preface Part I. Getting Started The Rationale Collecting Traffic Part II. Security Onion Deployment Standalone Deployment Distributed Deployment Housekeeping Part III. Tools Command Line Packet Analysis Tools Graphical Packet Analysis Tools Consoles Part III. NSM in Action Collection, Analysis, Escalation, and Resolution Server-Side Compromise Client-Side Comp…
Table of contents: Part I : Data Center Networking Chapter 1 : Data Center Network Architecture Chapter 2 : Cisco Nexus Product Family Chapter 3 : Virtualizing Cisco Network Devices Chapter 4 : Data Center Interconnect Chapter 5 : Management and Monitoring of Cisco Nexus Devices Part II : Data Center Storage-Area Networking Chapter 6 : Data Center Storage Architecture Chapter 7…
Table of contents: 1. A Tutorial Introduction to Authentication and Key Establishment 2. Goals for Authentication and Key Establishment 3. Protocols Using Shared Key Cryptography 4. Authentication and Key Transport Using Public Key Cryptography 5. Key Agreement Protocols 6. Conference Key Protocols 7. Password-Based Protocols A. Standards for Authentication and Key Establishment B. Sum…
Table of contents: 1. Introduction to Networking. 2. How Computers Find Each Other on Networks. 3. How Data Gets Transported Over Networks. 4. Structured Cabling and Network Elements. 5. Network Cabling. 6. Wireless Networking. 7. Remote Access and Cloud Computing. 8. Network Risk Management. 9. Unified Communications and Network Performance Management. 10. Network Segmentation and Vi…
Contents: 1. Computer Networks and the Internet 2. Application Layer 3. Transport Layer 4. The Network Layer: Data Plane 5. The Network Layer: Control Plane 6. The Link Layer: Links, Access Networks, and LANs 7. Wireless and Mobile Networks 8. Security in Computer Networks 9. Multimedia Networking
Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …
Table of contents: Pt. I. WPANS and 802.15.4 1. Prologue: Wireless Personal Area Networks 2. Operation of the IEEE 802.15.4 Network Pt. II. Single-Cluster Networks 3. Cluster with Uplink Traffic 4. Cluster with Uplink and Downlink Traffic 5. MAC Layer Performance Limitations 6. Activity Management through Bernoulli Scheduling 7. Admission Control Issues Pt. III. Multi-cluster Netw…