Libros UCLV { BETA }

Gran cantidad de libros a nuestro alcance

Tenemos :
1413 libros,
262657 descargas y
1106 contribuyentes !

Se han encontrado 32 Coincidencias

Linux Networking Cookbook

Linux Networking Cookbook


115 Visitas | 237 Descargas | 2013-09-16 19:37:05 | cbustillo

This book covers both old standbys and newfangled technologies. The old-time stuff includes system administration via serial console, dial-up networking, building an Internet gateway, VLANs, various methods of secure remote access, routing, and traffic control. Newfangled technologies include building your own iPBX with Aster-isk, wireless connectivity, cross-platform remote graphical desktops, hands-free network installation of new systems, single sign-on for mixed Linux and Windows LANs, and IPv6 basics. And, there are chapters on monitoring, alerting, and troubleshooting.

Practical Load Balancing


45 Visitas | 116 Descargas | 2013-09-23 14:55:25 | jgramos

The Internet, and in particular the World Wide Web, have effectively leveled the playing field for businesses and individuals around the world. Do you have a great idea for a web site or a service? Even the more advanced ideas can be relatively easily and cheaply realized without much in the way of initial outlay. You can get shared hosting for a few pennieseach month, and dedicated servers (virtual or otherwise) are getting to the point where they are cheaper now than managed web hosting was just a few years ago. This is all well and good, and being able to start out despite having just a few coins to rub together is certainly a great achievement. But what do you do when you want to take your application to the next step? What if it really starts to take off and you find you have the new Facebook or Amazon on your hands. What do you do then?

Redes de Computadoras


187 Visitas | 302 Descargas | 2013-09-23 14:58:49 | jgramos

La presente es la cuarta edición de este libro. Cada edición ha correspondido a una fase diferente de la manera en que se usaron las redes de computadoras. Cuando apareció la primera edición, en 1980, las redes eran una curiosidad académica. Para la segunda edición, en 1988, las redes ya se usaban en universidades y en grandes empresas. Y en 1996, cuando se editó por tercera vez este libro, las redes de computadoras, en particular Internet, se habían convertido en una realidad cotidiana para millones de personas. El elemento nuevo de la cuarta edición es el rápido crecimiento de las redes inalámbricas en muchas formas. El panorama de las redes ha cambiado radicalmente desde la tercera edición. A mediados de la década de 1990 existían varios tipos de LANs y WANs, junto con pilas de múltiples protocolos. Para el 2003, la única LAN alámbrica de amplio uso tal vez sea Ethernet y prácticamente todas las WANs estarían en Internet. En consecuencia, se habrá eliminado una gran cantidad de material referente a estas antiguas redes. Sin embargo, también abundan los nuevos desarrollos. Lo más importante es el gran aumento de redes inalámbricas, como la 802.11, los ciclos locales inalámbricos, las redes celulares 2G y 3G, Bluetooth, WAP (protocolo de aplicaciones inalámbricas), el i-mode y otros. De acuerdo con esto, se ha agregado una gran cantidad de material a las redes inalámbricas. Otro tema importante y novedoso es la seguridad, por lo que se ha agregado todo un capítulo al respecto

Co-design Approaches to Dependable Networked Control Systems

Networking


43 Visitas | 101 Descargas | 2013-09-24 00:49:40 | cbustillo

This book describes co-design approaches, and establishes the links between the QoC (Quality of Control) and QoS (Quality of Service) of the network and computing resources. The methods and tools described in this book take into account, at design level, various parameters and properties that must be satisfied by systems controlled through a network. Among the important network properties examined are the QoC, the dependability of the system, and the feasibility of the real-time scheduling of tasks and messages. Correct exploitation of these approaches allows for efficient design, diagnosis, and implementation of the NCS. This book will be of great interest to researchers and advanced students in automatic control, real-time computing, and networking domains, and to engineers tasked with development of NCS, as well as those working in related network design and engineering fields.

Networking


144 Visitas | 244 Descargas | 2013-09-26 19:30:52 | cgalgora

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical networks; voice over IP; and industrial networks. Extensive examples on the Windows Server 2003/2008 configuration and system configuration for the Linux operating system are also included. A complete chapter is devoted to protecting and securing a network from potential network attacks. Topics include denial of service attacks, firewalls, intrusion detection, password cracking, packet sniffing, and analyzing unsecured data packets. Other key network security issues, such as configuring router access lists, configuring a virtual private network (VPN) connection, and securing wireless networks, are also covered. Router configuration is examined, ranging from an introduction to router configuration to configuring multiple routing protocols for intranet and Internet data traffic. Routing protocols key to basic network operations are examined, including static, RIP, IGRP, OSPF, EIGRP, and BGP. The discussions on routing protocols are accompanied with in-depth steps for configuring the router to run the protocol, verify operation, and troubleshoot the router. Key Pedagogical Features NET-CHALLENGE SOFTWARE provides a simulated, hands-on experience in configuring routers and switches. Exercises provided in the text and on the CD challenge readers to undertake certain router/switch network configuration tasks. The software has the look and feel of actually being connected to the router or switch console port. PROTOCOL ANALYZER SOFTWARE included with the text uses the Finisar Surveyor Demo. Examples of using the software to analyze data traffic are included throughout the text. ACCOMPANYING CD-ROM includes the Finisar Surveyor Demo software and captured data traffic used in the text, which enables readers to capture data traffic on their own networks. CONFIGURING, ANALYZING, or TROUBLESHOOTING sections are included with each chapter to guide the reader through advanced techniques in networking. OBJECTIVES and INTRODUCTION at the beginning of each chapter clearly outline specific goals for the reader. EXTENSIVE PROBLEM SETS, SUMMARIES, and QUESTIONS AND PROBLEMS (including Critical Thinking questions) are found at the end of each chapter. KEY TERMS and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.

Computer Networks


51 Visitas | 70 Descargas | 2013-09-26 19:39:53 | cgalgora

'Computer Networks', Fourth Edition is the ideal introduction to today's networks - and tomorrow's. This classic best seller has been thoroughly updated to reflect the newest and most important networking technologies with a special emphasis on wireless networking, including 802.11, Bluetooth, broadband wireless, ad hoc networks, i-mode, and WAP. But fixed networks have not been ignored either with coverage of ADSL, gigabit Ethernet, peer-to-peer networks, NAT, and MPLS. And there is lots of new material on applications, including over 60 pages on the Web, plus Internet radio, voice over IP, and video on demand.Finally, the coverage of network security has been revised and expanded to fill an entire chapter. The book gives detailed descriptions of the principles associated with each layer and presents many examples drawn from the Internet and wireless networks.

Understanding IPv6, Third Edition

Networking


94 Visitas | 210 Descargas | 2013-09-26 20:19:23 | cbustillo

The first edition of this book began in the spring of 1999. At that time, I developed a set of slides and presented an “Introduction to IPv6” course at Bellevue Community College in Bellevue, Washington, to four students. Although the turnout was not what I expected, the time spent learning IPv6, creating the slide presentation, and presenting IPv6 technology to these curious students proved to be an invaluable experience and prepared a firm foundation for future endeavors.

CiscoPress - CCNA ICND2 640-816 Official Cert Guide, Third Edition

Networking


86 Visitas | 193 Descargas | 2013-09-26 20:46:50 | cbustillo

Historically speaking, the first entry-level Cisco certification has been the Cisco Certified Network Associate (CCNA) certification, first offered in 1998. The first three versions of the CCNA certification required that you pass a single exam to become certified. However, over time, the exam kept growing, both in the amount of material covered, and the difficulty level of the questions. So, for the fourth major revision of the exams, announced in 2003, Cisco continued with a single certification (CCNA), but offered two options for the exams to get certified: a single exam option and a two-exam option. The two-exam option allowed people to study

Home Networking Do-It-Yourself For Dummies

Networking


117 Visitas | 283 Descargas | 2013-09-26 21:06:41 | cbustillo

his book is designed to be a hands-on, practical guide to home networking. It’s chock-ful of helpful screenshots and step-by-step instructions to guide you through basic and advanced home networking configuration tasks, and it provides just enough background information to help you understand what you’re doing and why. Each chapter is written as a stand-alone chapter, so feel free to skip over some chapters and go directly to the topics that most interest you. Don’t worry; you won’t get lost in some complex storyline, and you won’t discover “whodunit” if you start at the end of the book and work your way back!

Comunicaciones y redes de computadores (7ma edición)

Comunicaciones y redes de computadores


200 Visitas | 386 Descargas | 2013-10-03 20:00:44 | ybpadron

Este libro intenta proporcionar una visión unificada del amplio campo que comprenden las comunicaciones y redes de computadores. La organización del libro refleja un intento de estructurar este vasto campo en partes comprensibles y de construir, poco a poco, una visión panorámica de su estado actual. El libro destaca principios básicos y temas de importancia fundamental que conciernen a la tecnología y arquitectura de esta área, proporcionando, además, una discusión detallada de temas de vanguardia.

Kali Linux Social Engineering

Seguridad de redes


117 Visitas | 224 Descargas | 2014-02-27 22:07:54 | mmartin

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks and tips and tricks to avoid them Get a grip on efficient ways to perform penetration testing. Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing In Detail Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there. This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks. Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more. By the end of this book you will be able to test the security of any organization based on social engineering attacks. What you will learn from this book Clone websites to gain a victim's passwords and security information Undertake credential harvester attacks through spear-phishing and web jacking Perform client-side attacks through SET Get hands on with practical advice on eliciting identity details Counteract these techniques if they are being used against you Approach This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples. Who this book is written for Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

Netwokwork Analysis Using Wireshark Cookbook

Seguridad de redes


149 Visitas | 257 Descargas | 2014-02-27 22:14:37 | mmartin

Over 80 recipes to analyze and troubleshoot network problems using Wireshark Overview Place Wireshark in the network and configure it for effective network analysis Use Wireshark's powerful statistical tools and expert system for pinpointing network problems Use Wireshark for troubleshooting network performance, applications, and security problems in the network In Detail Is your network slow Are your users complaining Disconnections IP Telephony problems Video freezes Network analysis is the process of isolating these problems and fixing them, and Wireshark has long been the most popular network analyzer for achieving this goal. Based on hundreds of solved cases, Network Analysis using Wireshark Cookbook provides you with practical recipes for effective Wireshark network analysis to analyze and troubleshoot your network. "Network analysis using Wireshark Cookbook" highlights the operations of Wireshark as a network analyzer tool. This book provides you with a set of practical recipes to help you solve any problems in your network using a step-by-step approach. "Network analysis using Wireshark Cookbook" starts by discussing the capabilities of Wireshark, such as the statistical tools and the expert system, capture and display filters, and how to use them. The book then guides you through the details of the main networking protocols, that is, Ethernet, LAN switching, and TCP/IP, and then discusses the details of application protocols and their behavior over the network. Among the application protocols that are discussed in the book are standard Internet protocols like HTTP, mail protocols, FTP, and DNS, along with the behavior of databases, terminal server clients, Citrix, and other applications that are common in the IT environment. In a bottom-up troubleshooting approach, the book goes up through the layers of the OSI reference model explaining how to resolve networking problems. The book starts from Ethernet and LAN switching, through IP, and then on to TCP/UDP with a focus on TCP performance problems. It also focuses on WLAN security. Then, we go through application behavior issues including HTTP, mail, DNS, and other common protocols. The book finishes with a look at network forensics and how to search and find security problems that might harm the network. What you will learn from this book Configure Wireshark for effective network troubleshooting Set up various display and capture filters Use basic statistical tools that provide you with "who is talking" tables, conversations, and HTTP statistics Master both the standard and advanced features of IO graphs Use the expert system to pinpoint various types of events that might influence the behavior of your network Learn about Wi-Fi testing and how to resolve problems related to wireless LANs Explore performance issues in TCP/IP Explore failures due to delays and jitters in the network Find and resolve problems due to bandwidth, throughput, and packet loss Identify and locate faults in communication applications including HTTP, FTP, mail, and various other applications Microsoft OS problems, databases, voice, and video over IP Identify and locate faults in detecting security failures and security breaches in the network

IPv6 para todos


96 Visitas | 185 Descargas | 2014-04-09 03:17:39 | mmartin

Guía de uso y aplicaciones para diversos entornos del protocolo IP en su versión 6 El nuevo protocolo IPv6, dispone de 340 billones de billones de billones (sextillones) de direcciones, lo que hace que la cantidad de direcciones IPv4 parezca insignificante. Con este mayor espacio de direcciones, IPv6 ofrece una variedad de ventajas en términos de estabilidad, flexibilidad y simplicidad en la administración de las redes. También es probable que la “Era IPv6” genere una nueva ola de innovación en las aplicaciones y las ofertas de servicios ya que, termina con la necesidad de direcciones compartidas.

Nginx Module Extension

Nginx


24 Visitas | 41 Descargas | 2014-06-16 18:56:48 | cbustillo

Companies can solve significant scaling issues thanks to switching their web platforms to Nginx. A popular web server for building web infrastructure, Nginx transparently and effectively enables the growth of the largest sites on the Internet today, on top of being free and open source. This book is a practical reference providing you with everything you need to know about Nginx module extensions. You will learn how to write powerful and flexible configuration files and your own modules, as well as gaining knowledge about Nginx's modular architecture, available modules, and their intricate details.

Learning OMNeT++

Network Simulations in OMNET++


33 Visitas | 74 Descargas | 2014-07-17 19:37:06 | cgalgora

Este libro introduce la simulación de redes usando OMNET++. Los autores son voces reconocidas sobre el tema y este material constituye uno de los más referenciados para el aprendizaje de OMNET++.

Fundamentals of Wireless Sensor Networks : Theory and Practice

WSN


58 Visitas | 85 Descargas | 2014-07-17 19:54:40 | cgalgora

This book is primarily written as a textbook aimed at students of engineering and computer science. It provides an introduction into the fundamental concepts and building blocks of wireless sensor network design. An attempt has been made to maintain a balance between theory and practice, as well as established practices and the latest developments. At the end of each chapter, a number of practical questions and exercises are given to help the students to assess their understanding of the main concepts and arguments presented in the chapter. Furthermore, the chapters and parts of the book are suf?ciently modular to provide ?exibility in course design. The book will also be useful to the professional interested in this ?eld. It is suitable for self-study and can serve as an essential reference. For such a reader, the material can be viewed as a tutorial in the basic concepts and surveys of recent research results and technological developments.

Packet Tracer Network Simulator


66 Visitas | 167 Descargas | 2014-09-22 17:52:02 | jgramos

Cisco Packet Tracer is a network simulator that can be used not just by students but also by instructors and network administrators. This software provides a wide range of Cisco switches and routers running on IOS 12 and IOS 15, wireless devices from Linksys, and several end devices such as PCs and servers with a command line. It is more than just a simulator and provides physical simulation as well as an assessment tool. The assessment tool can be used to create practical networking questions with a complex scoring model. The physical workspace provided can be used to determine the range of wireless devices. This book serves as a guide to those using Packet Tracer, be it students, instructors, or administrators. This book differs from others by providing more information on the how-tos of Packet Tracer rather than computer networking. You'll learn how to efficiently use Packet Tracer to learn and understand packet flows in a topology.

Creating Development Environments with Vagrant

www.it-ebooks.info


30 Visitas | 79 Descargas | 2014-09-25 20:12:21 | jgramos

Web-based software projects are increasingly complicated, with a range of different dependencies, requirements, and interlinking components. Swapping between projects, which require different versions of the same software, becomes troublesome. Getting team members up and running on new projects also becomes time-consuming. Vagrant is a powerful tool for creating, managing, and working with virtualized development environments for your projects. By creating a virtual environment for each project, their dependencies and requirements are isolated, and don't interfere; they also don't interfere with software installed on your own machine such as WAMP or MAMP. Colleagues can be up and running on a new project in minutes with a single command. With Vagrant, we can wipe the slate clean if we break our environment, and be back up and running in no time.

GUÍA AVANZADA DE NMAP

GUÍA AVANZADA DE NMAP


94 Visitas | 181 Descargas | 2014-12-05 02:16:14 | msuarez

Nmap (Network Mapper, mapeador de redes) es una sofisticada utilidad para la exploración y auditoría de seguridad de redes TCP/IP. Ha sido diseñado para escanear1 de forma rápida, sigilosa y eficaz tanto equipos individuales como redes de gran tamaño. Es una herramienta gratuita, de código abierto bajo licencia GPL, bien documentada, multiplataforma, disponible para consola, y que ofrece también una interfaz gráfica para facilitar su uso. Está escrita por un hacker conocido como Fyodor2, y se beneficia de las aportaciones de una nutrida comunidad de colaboradores.HAPPY HACKING :)

Computer Networks


149 Visitas | 157 Descargas | 2014-12-10 22:13:18 | piturria

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks werean academic curiosity. When the second edition appeared in 1988, networks were usedby universities andlarge businesses. When the third edition appeared in 1996, computer networks, especially the Internet, had become a dailyreality for millions of people. By the fourth edition, in 2003, wireless networks and mobile computers had become commonplacefor accessing the Web and the Internet. Now, in thefifth edition, networks are about content distribution (especially videos using CDNs and peer-to-peer networks) and mobile phones are small computers on the Internet.