Libros UCLV { BETA }

Gran cantidad de libros a nuestro alcance

Tenemos :
1413 libros,
263062 descargas y
1106 contribuyentes !

Se han encontrado 23 Coincidencias

Linux Networking Cookbook

Linux Networking Cookbook


116 Visitas | 237 Descargas | 2013-09-16 19:37:05 | cbustillo

This book covers both old standbys and newfangled technologies. The old-time stuff includes system administration via serial console, dial-up networking, building an Internet gateway, VLANs, various methods of secure remote access, routing, and traffic control. Newfangled technologies include building your own iPBX with Aster-isk, wireless connectivity, cross-platform remote graphical desktops, hands-free network installation of new systems, single sign-on for mixed Linux and Windows LANs, and IPv6 basics. And, there are chapters on monitoring, alerting, and troubleshooting.

Redes de Computadoras


188 Visitas | 302 Descargas | 2013-09-23 14:58:49 | jgramos

La presente es la cuarta edición de este libro. Cada edición ha correspondido a una fase diferente de la manera en que se usaron las redes de computadoras. Cuando apareció la primera edición, en 1980, las redes eran una curiosidad académica. Para la segunda edición, en 1988, las redes ya se usaban en universidades y en grandes empresas. Y en 1996, cuando se editó por tercera vez este libro, las redes de computadoras, en particular Internet, se habían convertido en una realidad cotidiana para millones de personas. El elemento nuevo de la cuarta edición es el rápido crecimiento de las redes inalámbricas en muchas formas. El panorama de las redes ha cambiado radicalmente desde la tercera edición. A mediados de la década de 1990 existían varios tipos de LANs y WANs, junto con pilas de múltiples protocolos. Para el 2003, la única LAN alámbrica de amplio uso tal vez sea Ethernet y prácticamente todas las WANs estarían en Internet. En consecuencia, se habrá eliminado una gran cantidad de material referente a estas antiguas redes. Sin embargo, también abundan los nuevos desarrollos. Lo más importante es el gran aumento de redes inalámbricas, como la 802.11, los ciclos locales inalámbricos, las redes celulares 2G y 3G, Bluetooth, WAP (protocolo de aplicaciones inalámbricas), el i-mode y otros. De acuerdo con esto, se ha agregado una gran cantidad de material a las redes inalámbricas. Otro tema importante y novedoso es la seguridad, por lo que se ha agregado todo un capítulo al respecto

Co-design Approaches to Dependable Networked Control Systems

Networking


44 Visitas | 101 Descargas | 2013-09-24 00:49:40 | cbustillo

This book describes co-design approaches, and establishes the links between the QoC (Quality of Control) and QoS (Quality of Service) of the network and computing resources. The methods and tools described in this book take into account, at design level, various parameters and properties that must be satisfied by systems controlled through a network. Among the important network properties examined are the QoC, the dependability of the system, and the feasibility of the real-time scheduling of tasks and messages. Correct exploitation of these approaches allows for efficient design, diagnosis, and implementation of the NCS. This book will be of great interest to researchers and advanced students in automatic control, real-time computing, and networking domains, and to engineers tasked with development of NCS, as well as those working in related network design and engineering fields.

Computer Networks


52 Visitas | 71 Descargas | 2013-09-26 19:39:53 | cgalgora

'Computer Networks', Fourth Edition is the ideal introduction to today's networks - and tomorrow's. This classic best seller has been thoroughly updated to reflect the newest and most important networking technologies with a special emphasis on wireless networking, including 802.11, Bluetooth, broadband wireless, ad hoc networks, i-mode, and WAP. But fixed networks have not been ignored either with coverage of ADSL, gigabit Ethernet, peer-to-peer networks, NAT, and MPLS. And there is lots of new material on applications, including over 60 pages on the Web, plus Internet radio, voice over IP, and video on demand.Finally, the coverage of network security has been revised and expanded to fill an entire chapter. The book gives detailed descriptions of the principles associated with each layer and presents many examples drawn from the Internet and wireless networks.

Networking


145 Visitas | 244 Descargas | 2013-09-26 19:30:52 | cgalgora

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical networks; voice over IP; and industrial networks. Extensive examples on the Windows Server 2003/2008 configuration and system configuration for the Linux operating system are also included. A complete chapter is devoted to protecting and securing a network from potential network attacks. Topics include denial of service attacks, firewalls, intrusion detection, password cracking, packet sniffing, and analyzing unsecured data packets. Other key network security issues, such as configuring router access lists, configuring a virtual private network (VPN) connection, and securing wireless networks, are also covered. Router configuration is examined, ranging from an introduction to router configuration to configuring multiple routing protocols for intranet and Internet data traffic. Routing protocols key to basic network operations are examined, including static, RIP, IGRP, OSPF, EIGRP, and BGP. The discussions on routing protocols are accompanied with in-depth steps for configuring the router to run the protocol, verify operation, and troubleshoot the router. Key Pedagogical Features NET-CHALLENGE SOFTWARE provides a simulated, hands-on experience in configuring routers and switches. Exercises provided in the text and on the CD challenge readers to undertake certain router/switch network configuration tasks. The software has the look and feel of actually being connected to the router or switch console port. PROTOCOL ANALYZER SOFTWARE included with the text uses the Finisar Surveyor Demo. Examples of using the software to analyze data traffic are included throughout the text. ACCOMPANYING CD-ROM includes the Finisar Surveyor Demo software and captured data traffic used in the text, which enables readers to capture data traffic on their own networks. CONFIGURING, ANALYZING, or TROUBLESHOOTING sections are included with each chapter to guide the reader through advanced techniques in networking. OBJECTIVES and INTRODUCTION at the beginning of each chapter clearly outline specific goals for the reader. EXTENSIVE PROBLEM SETS, SUMMARIES, and QUESTIONS AND PROBLEMS (including Critical Thinking questions) are found at the end of each chapter. KEY TERMS and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.

Understanding IPv6, Third Edition

Networking


95 Visitas | 210 Descargas | 2013-09-26 20:19:23 | cbustillo

The first edition of this book began in the spring of 1999. At that time, I developed a set of slides and presented an “Introduction to IPv6” course at Bellevue Community College in Bellevue, Washington, to four students. Although the turnout was not what I expected, the time spent learning IPv6, creating the slide presentation, and presenting IPv6 technology to these curious students proved to be an invaluable experience and prepared a firm foundation for future endeavors.

CiscoPress - CCNA ICND2 640-816 Official Cert Guide, Third Edition

Networking


87 Visitas | 194 Descargas | 2013-09-26 20:46:50 | cbustillo

Historically speaking, the first entry-level Cisco certification has been the Cisco Certified Network Associate (CCNA) certification, first offered in 1998. The first three versions of the CCNA certification required that you pass a single exam to become certified. However, over time, the exam kept growing, both in the amount of material covered, and the difficulty level of the questions. So, for the fourth major revision of the exams, announced in 2003, Cisco continued with a single certification (CCNA), but offered two options for the exams to get certified: a single exam option and a two-exam option. The two-exam option allowed people to study

Home Networking Do-It-Yourself For Dummies

Networking


118 Visitas | 283 Descargas | 2013-09-26 21:06:41 | cbustillo

his book is designed to be a hands-on, practical guide to home networking. It’s chock-ful of helpful screenshots and step-by-step instructions to guide you through basic and advanced home networking configuration tasks, and it provides just enough background information to help you understand what you’re doing and why. Each chapter is written as a stand-alone chapter, so feel free to skip over some chapters and go directly to the topics that most interest you. Don’t worry; you won’t get lost in some complex storyline, and you won’t discover “whodunit” if you start at the end of the book and work your way back!

OpenLDAP Software 2.4 Administrator's Guide


58 Visitas | 132 Descargas | 2013-09-27 15:31:42 | jgramos

Directories tend to contain descriptive, attribute-based information and support sophisticated filtering capabilities. Directories generally do not support complicated transaction or roll-back schemes found in database management systems designed for handling high-volume complex updates. Directory updates are typically simple all-or-nothing changes, if they are allowed at all. Directories are generally tuned to give quick response to high-volume lookup or search operations. They may have the ability to replicate information widely in order to increase availability and reliability, while reducing response time. When directory information is replicated, temporary inconsistencies between the replicas may be okay, as long as inconsistencies are resolved in a timely manner.

LDAP Programming, Management and Integration


68 Visitas | 181 Descargas | 2013-09-27 15:33:45 | jgramos

A directory server supporting LDAPis required to run these examples. The examples should work with almost any LDAP-enabled directory server, except where noted prior to the example. This book is about getting the most from directory services, not installing and configuring all the directories on the market. Following are pointers to some of the more common directory servers available at the time of publication. Additionally, we include basic instructions for obtaining a special LDAPserver that has been preconfigured to work with the examples in this book.

Foundations of Python Network Programming, 2nd Edition

Programing


134 Visitas | 264 Descargas | 2013-10-01 01:18:35 | cbustillo

You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself with infrastructure components like memcached and message queues. You can also delve into network server designs, and compare threaded approaches with asynchronous event-based solutions. But the biggest change is this edition's expanded treatment of the web. The HTTP protocol is covered in extensive detail, with each feature accompanied by sample Python code. You can use your HTTP protocol expertise by studying an entire chapter on screen scraping and you can then test lxml and BeautifulSoup against a real-world web site.

Nginx HTTP Server, 2nd Edition

Networking


53 Visitas | 121 Descargas | 2013-12-10 01:22:18 | cbustillo

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache, or stand in front of your existing infrastructure to improve its overall speed. Nginx HTTP Server, 2nd Edition provides a detailed guide to setting up Nginx in different ways that correspond to actual production situations: as a standalone server, as a reverse proxy, interacting with applications via FastCGI and more. In addition, the complete directive reference will be your best friend at all stages of the configuration and maintenance processes.

Kali Linux Social Engineering

Seguridad de redes


118 Visitas | 225 Descargas | 2014-02-27 22:07:54 | mmartin

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks and tips and tricks to avoid them Get a grip on efficient ways to perform penetration testing. Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing In Detail Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there. This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on social engineering attacks. Starting with ways of performing the social engineering attacks using Kali, this book covers a detailed description on various website attack vectors and client side attacks that can be performed through SET. This book contains some of the most advanced techniques that are currently being utilized by hackers to get inside secured networks. This book covers phishing (credential harvester attack), web jacking attack method, spear phishing attack vector, Metasploit browser exploit method, Mass mailer attack and more. By the end of this book you will be able to test the security of any organization based on social engineering attacks. What you will learn from this book Clone websites to gain a victim's passwords and security information Undertake credential harvester attacks through spear-phishing and web jacking Perform client-side attacks through SET Get hands on with practical advice on eliciting identity details Counteract these techniques if they are being used against you Approach This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples. Who this book is written for Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

Netwokwork Analysis Using Wireshark Cookbook

Seguridad de redes


150 Visitas | 257 Descargas | 2014-02-27 22:14:37 | mmartin

Over 80 recipes to analyze and troubleshoot network problems using Wireshark Overview Place Wireshark in the network and configure it for effective network analysis Use Wireshark's powerful statistical tools and expert system for pinpointing network problems Use Wireshark for troubleshooting network performance, applications, and security problems in the network In Detail Is your network slow Are your users complaining Disconnections IP Telephony problems Video freezes Network analysis is the process of isolating these problems and fixing them, and Wireshark has long been the most popular network analyzer for achieving this goal. Based on hundreds of solved cases, Network Analysis using Wireshark Cookbook provides you with practical recipes for effective Wireshark network analysis to analyze and troubleshoot your network. "Network analysis using Wireshark Cookbook" highlights the operations of Wireshark as a network analyzer tool. This book provides you with a set of practical recipes to help you solve any problems in your network using a step-by-step approach. "Network analysis using Wireshark Cookbook" starts by discussing the capabilities of Wireshark, such as the statistical tools and the expert system, capture and display filters, and how to use them. The book then guides you through the details of the main networking protocols, that is, Ethernet, LAN switching, and TCP/IP, and then discusses the details of application protocols and their behavior over the network. Among the application protocols that are discussed in the book are standard Internet protocols like HTTP, mail protocols, FTP, and DNS, along with the behavior of databases, terminal server clients, Citrix, and other applications that are common in the IT environment. In a bottom-up troubleshooting approach, the book goes up through the layers of the OSI reference model explaining how to resolve networking problems. The book starts from Ethernet and LAN switching, through IP, and then on to TCP/UDP with a focus on TCP performance problems. It also focuses on WLAN security. Then, we go through application behavior issues including HTTP, mail, DNS, and other common protocols. The book finishes with a look at network forensics and how to search and find security problems that might harm the network. What you will learn from this book Configure Wireshark for effective network troubleshooting Set up various display and capture filters Use basic statistical tools that provide you with "who is talking" tables, conversations, and HTTP statistics Master both the standard and advanced features of IO graphs Use the expert system to pinpoint various types of events that might influence the behavior of your network Learn about Wi-Fi testing and how to resolve problems related to wireless LANs Explore performance issues in TCP/IP Explore failures due to delays and jitters in the network Find and resolve problems due to bandwidth, throughput, and packet loss Identify and locate faults in communication applications including HTTP, FTP, mail, and various other applications Microsoft OS problems, databases, voice, and video over IP Identify and locate faults in detecting security failures and security breaches in the network

Learning OMNeT++

Network Simulations in OMNET++


34 Visitas | 74 Descargas | 2014-07-17 19:37:06 | cgalgora

Este libro introduce la simulación de redes usando OMNET++. Los autores son voces reconocidas sobre el tema y este material constituye uno de los más referenciados para el aprendizaje de OMNET++.

Fundamentals of Wireless Sensor Networks : Theory and Practice

WSN


59 Visitas | 85 Descargas | 2014-07-17 19:54:40 | cgalgora

This book is primarily written as a textbook aimed at students of engineering and computer science. It provides an introduction into the fundamental concepts and building blocks of wireless sensor network design. An attempt has been made to maintain a balance between theory and practice, as well as established practices and the latest developments. At the end of each chapter, a number of practical questions and exercises are given to help the students to assess their understanding of the main concepts and arguments presented in the chapter. Furthermore, the chapters and parts of the book are suf?ciently modular to provide ?exibility in course design. The book will also be useful to the professional interested in this ?eld. It is suitable for self-study and can serve as an essential reference. For such a reader, the material can be viewed as a tutorial in the basic concepts and surveys of recent research results and technological developments.

GUÍA AVANZADA DE NMAP

GUÍA AVANZADA DE NMAP


95 Visitas | 181 Descargas | 2014-12-05 02:16:14 | msuarez

Nmap (Network Mapper, mapeador de redes) es una sofisticada utilidad para la exploración y auditoría de seguridad de redes TCP/IP. Ha sido diseñado para escanear1 de forma rápida, sigilosa y eficaz tanto equipos individuales como redes de gran tamaño. Es una herramienta gratuita, de código abierto bajo licencia GPL, bien documentada, multiplataforma, disponible para consola, y que ofrece también una interfaz gráfica para facilitar su uso. Está escrita por un hacker conocido como Fyodor2, y se beneficia de las aportaciones de una nutrida comunidad de colaboradores.HAPPY HACKING :)

Ethernet: The Definitive Guide

Ethernet: The Definitive Guide


59 Visitas | 107 Descargas | 2014-12-10 22:18:20 | piturria

This is a book about Ethernet, the world’s most popular network technology, which allows you to connect a variety of computers together with a low-cost and extremely flexible network system. Ethernet is found on a wide variety of devices, and this wide?spread support, coupled with its low cost and high flexibility, are major reasons for its popularity.

GNS3 Network Simulation Guide

Simulación de Redes


71 Visitas | 123 Descargas | 2014-12-22 18:35:43 | cbustillo

NS3 is an open-source Graphical Network Simulator used extensively by networking professionals to simulate networking devices such as Cisco, Juniper and Vyatta routers, along with Virtual PCs. GNS3 Network Simulation Guide gives you all the information you need to run a successful GNS3 simulation. You will be guided through the tricky installation pre-requisites and procedures involved in developing a simulated topology suitable for studying for Cisco CCIE Certification. We will also cover many useful tips and tricks which will help you make the most of your GNS3 simulator application.

Raspberry Pi Networking Cookbook

Rasberry Pi


60 Visitas | 126 Descargas | 2015-04-17 12:03:50 | cbustillo

The Raspberry Pi is more than just a platform for teaching students how to program computers! The recipes in this book show you how this inexpensive computer can be used out of the box for a number of practical solutions that utilize existing networks and connectivity. The Raspberry Pi Networking Cookbook is an essential reference full of practical solutions for use both at home and in the office. Beginning with step-by-step instructions for installation and configuration, this book can either be read from cover to cover or treated as an essential reference companion to your Raspberry Pi. Full of practical and engaging content designed to expand and build upon your existing skills as you work through individual recipes, any computer novice can quickly learn how to become a Raspberry Pi expert without any programming knowledge required. The Raspberry Pi Networking Cookbook will allow you to revolutionize how you use technology on a daily basis, ranging from sharing your media across multiple devices to deploying your very own web portal, or even accessing your desktop remotely.