eBooks-it.org Logo
eBooks-IT.org Inner Image

MIX eBooks Page 76

Download free MIX eBooks Page 76

Modern Perl

Modern Perl Image
Perl 5 is a popular, powerful, and robust programming language. With countless satisfied developers, tens of thousands of freely available libraries, and continual improvements to the language and its ecosystem, modern Perl development can be easy, reliable, and fun. To take advantage of the full power of Perl 5--to become a true expert, capable of solving any problem put before you--you must understand the language. Modern Perl explains Perl 5 from theory to implementation, including Perl 5.12....

Network Coding Theory

Network Coding Theory Image
Network Coding Theory provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality. Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network coding theory. Network coding offers a new paradigm for network communications and has generated abundant research interest in information and coding theory, networking, switching, wireless communications, cryptography, computer science, operations research, and matrix theory. The tutorial is divided into two parts. Part I is devoted to network coding for the transmission from a single source node to other n...

Foundations of Cryptography

A Primer
Foundations of Cryptography Image
Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. The author starts by presenting some of the central tools; that is, computational difficulty (in the form of one-way functions), pseudorandomness, and zero-knowledge proofs. Based on these tools, the emphasis is shifted to the treatment of basic applications such as encryption and signature schemes as well as the design of general secure cryptographic protocols. The author has created a unique overview that includes well over 100 references. The accent is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems...

Novell Cluster Services for Linux and NetWare

Novell Cluster Services for Linux and NetWare Image
Need to configure or manage Novell Cluster Services on NetWare, Linux or a mixed environment? Pick up a copy of the official reference guide, Novell Cluster Services for Linux and NetWare. This book blends in-depth information with practical, real world examples to cover cluster services configuration strategies, backup requirements, cluster services management, and upgrading tactics. You'll gain invaluable insight from authors Rob Bastiaansenand Sander van Vugt, two NovellCertified Instructors with day-to-day experience consulting on the topicscovered in this book. Masterintalling and managing Novell Cluster Serviceswith the tutorial not available from anyone else, Novell Cluster Services for Linux and NetWare....

Nmap Network Scanning

The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning Image
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with th...



2007 - 2017 © eBooks-IT.org