|Categories||Free Downloadable Networks and Network Programming eBooks!|
|Mobile and Wireless Communications Network Layer and Circuit Level Design
Foundations of Jini 2 Programming
Foundations of Jini 2 Programming, based on Jini 2.0, is an expanded, updated version of the most popular online tutorial for Jini. This is the perfect book for any Java programmer interested in learning and applying Jini toward their respective network applications (any Java-enabled device interoperable with another Java-enabled device).
Network Programming with Go
This is a book on building network applications using the Google Go programming language.
Wireless Sensor Networks - Technology and Applications
The aim of this book is to present few important issues of WSNs, from the application, design and technology points of view. The book highlights power efficient design issues related to wireless sensor networks, the existing WSN applications, and discusses the research efforts being undertaken in this field which put the reader in good pace to be able to understand more advanced research and make a contribution in this field for themselves.
Using Samba: A File and Print Server for Linux, Unix, and Mac OS X
This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting!
Samba-3 by Example: Practical Exercises to Successful
Samba-3 by Example provides useful, thoroughly documented explanations for all aspects of a Samba deployment. They�re the same kind of patient answers I got when my dad taught me how to ride a bike without training wheels.
HTTP Succinctly: HTTP from a Developer�s Perspective
HTTP is the foundational protocol for exchanging information across the World Wide Web. With HTTP Succinctly, you�ll learn all about something you use on a daily basis, perhaps without realizing what goes on behind the scenes. You�ll quickly learn about resources, requests and responses, safe and unsafe methods, connections, cookies, security, and so much more. Equipped with the information in this book, you�ll be able to write better web apps and services, and debug them when something goes wrong.
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential - but often overwhelming--challenge.
Network Security Tools: Writing, Hacking, and Modifying Security Tools
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.
Understanding Ldap - Design And Implementation
This book will help you create a foundation of LDAP skills, as well as install and configure the IBM Directory Server. It is targeted at security architects and specialists who need to know the concepts and the detailed instructions for a successful LDAP implementation.