Search
free ebooks website


Posts Present in Network Category
OSPF: Anatomy of an Internet Routing Protocol

OSPF gives an introduction to the Internet and its routing protocols covering unicast and multicast routing protocols and techniques for monitoring and debugging routing in a TCP/IP network. This book provides a detailed description of OSPF (Open Shortest Path First), which was developed by the author, and explains why OSPF was developed and how it greatly improves network efficiency. Each chapter contains exercises to help you get a better understanding of how to efficiently implement algorithms used in OSPF.

 

Author Name: John T. Moy

Publisher: Addison-Wesley Professional

Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)

Radia Perlman’s Interconnections is recognized as a leading text on networking theory and practice. It provides authoritative and comprehensive information on general networking concepts, routing algorithms and protocols, addressing, and the mechanics of bridges, routers, switches, and hubs. This Second Edition is expanded and updated to cover the newest developments in the field, including advances in switching and bridge technology, VLANs, Fast Ethernet, DHCP, ATM, and IPv6. Additional new topics include IPX, AppleTalk, and DECnet. You will gain a deeper understanding of the range of solutions possible and find valuable information on protocols for which documentation is not readily available elsewhere. Written by the inventor of many of the algorithms that make switching and routing robust and efficient, Interconnections, Second Edition offers an expert’s insight into how and why networks operate as they do. Perlman describes all of the major networking algorithms and protocols in use today in clear and concise terms, while exploring the engineering trade-offs that the different approaches represent. The book contains extensive coverage of such topics as:

  • The spanning tree algorithm
  • The differences between bridges, routers, and switches
  • Virtual LANs (VLANs) and Fast Ethernet
  • Addressing and packet formats for IP, IPv6, IPX, CLNP, AppleTalk, and DECnet
  • Autoconfiguration of addresses; strategies in various protocol suites
  • Routing protocols, including RIP, IS-IS, OSPF, PNNI, NLSP, and BGP
  • Layer 3 multicast protocols, including IGMP, DVMRP, MOSPF, CBT, PIM, BGMP, Simple Multicast, and Express
  • Sabotage-proof routing

 Author Name: Radia Perlman

Publisher: Addison-Wesley Professional

Computer Networks (4th Edition)

Computer Networks, Fourth Edition is the ideal introduction to computer networks. Renowned author, educator, and researcher Andrew S. Tanenbaum has updated his classic best seller to reflect the newest technologies, including 802.11, broadband wireless, ADSL, Bluetooth, gigabit Ethernet, the Web, the wireless Web, streaming audio, IPsec, AES, quantum cryptography, and more. Using real-world examples, Tanenbaum explains how networks work on the inside, from underlying physical layer hardware up through today’s most popular network applications.

 

Author Name: Andrew S. Tanenbaum

Publisher: Prentice Hall

Understanding SNMP MIBs

Shows network professionals how to design, define, write and update useful SNMP Management Information Bases (MIBs) that support standards-based network management. Introduces SNMP MIBs, documents that contain definitions of management information which allow systems to be remotely monitored, configured and controlled. Presents a model of an SNMP-based management network and defines the SNMP management framework. Walks through the construction of MIBs, including name space organization, MIB naming, maintenance, object semantics and object style, and othe topics. Presents advanced techniques, including tables within tables, multi-table relationships and linked lists. Shows how to analyze standard MIBs. Discusses front-end and back-end MIB compilers, including SMIC, NetView/6000 SunNet Manager and HP OpenView. Includes a guide to MIB developer’s resources. Anyone involved in building systems that must be compliant with the Simple Network Management Protocol (SNMP), the leading international standard for network management.

 

Author Name: David T. Perkins (Author), Evan McGinnis (Author)

Publisher: Prentice Hall

Unix Network Programming, Volume 1: The Sockets Networking API

This is THE guide to UNIX network programming APIs. Whether you write Web servers, client/server applications, or any other network software, you need to understand networking APIS-especially sockets in greater detail than ever before. You need UNIX Network Programming, Volume 1, Third Edition. In this book, the Authors offer unprecedented, start-to-finish guidance on making the most of sockets, the de facto standard for UNIX network programming with APIs – as well as extensive coverage of the X/Open Transport Interface (XTI).

 

Author Name: W. Richard Stevens (Author), Bill Fenner (Author), Andrew M. Rudoff (Author)

Publisher: Addison-Wesley Professional

Network Algorithmics,: An Interdisciplinary Approach to Designing Fast Networked Devices

In designing a network device, you make dozens of decisions that affect the speed with which it will perform-sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.

Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles-ranging from the commonly recognized to the groundbreaking-that are key to breaking these bottlenecks.

The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.

 

Author Name: George Varghese

Publisher: Morgan Kaufmann

IPv6 Essentials (2nd Edition)

IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure.

Beginning with a short history of IPv6, author Silvia Hagen provides an overview of new functionality and discusses why we need IPv6. Hagen also shares exhaustive discussions of the new IPv6 header format and Extension Headers, IPv6 address and ICMPv6 message format, Security, QoS, Mobility and, last but not least, offers a Quick Start Guide for different operating systems. IPv6 Essentials, Second Edition also covers:

In-depth technical guide to IPv6
Mechanisms and Case Studies that show how to integrate IPv6 into your network without interruption of IPv4 services
Routing protocols and upper layer protocols
Security in IPv6: concepts and requirements. Includes the IPSEC framework and security elements available for authentication and encryption
Quality of Service: covers the elements available for QoS in IPv6 and how they can be implemented
Detailed discussion of DHCPv6 and Mobile IPv6
Discussion of migration cost and business case
Getting started on different operating systems: Sun Solaris, Linux, BSD, Windows XP, and Cisco routers

 Author Name: Silvia Hagen

Publisher: O’Reilly Media

Cryptography and Network Security (4th Edition)

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.

 

Author Name: William Stallings

Publisher: Prentice Hall

Security Engineering: A Guide to Building Dependable Distributed Systems

The first quick reference guide to the do’s and don’ts of creating high quality security systems.
Ross Anderson, widely recognized as one of the world’s foremost authorities on security engineering, presents a comprehensive design tutorial that covers a wide range of applications. Designed for today’s programmers who need to build systems that withstand malice as well as error (but have no time to go do a PhD in security), this book illustrates basic concepts through many real-world system design successes and failures. Topics range from firewalls, through phone phreaking and copyright protection, to frauds against e-businesses. Anderson’s book shows how to use a wide range of tools, from cryptology through smartcards to applied psychology. As everything from burglar alarms through heart monitors to bus ticket dispensers starts talking IP, the techniques taught in this book will become vital to everyone who wants to build systems that are secure, dependable and manageable.

 Author Name: Ross J. Anderson (Author), Ross Anderson (Author)

Publisher: Wiley Publishing, Inc

Inside Network Perimeter Security (2nd Edition)

Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.

 Author Name: Stephen Northcutt (Author), Lenny Zeltser (Author), Scott Winters (Author), Karen Kent (Author), Ronald W. Ritchey (Author)

Publisher: Sams Publishing

free ebooks website
Subscribe

Subscribe via RSS Feed stay updated with Latest Ebooks

Subscribe via email address:

Enter your email address:


 
Members Login
Username:
Password:
Forgot password? Register

 
Live Help