eBooks-it.org Logo
eBooks-IT.org Inner Image

Prentice Hall eBooks Page 45

Download free Prentice Hall eBooks Page 45

Introduction to Graph Theory

Introduction to Graph Theory Image
2nd Edition
This book fills a need for a thorough introduction to graph theory that features both the understanding and writing of proofs about graphs. Verification that algorithms work is emphasized more than their complexity. An effective use of examples, and huge number of interesting exercises, demonstrate the topics of trees and distance, matchings and factors, connectivity and paths, graph coloring, edges and cycles, and planar graphs. For those who need to learn to make coherent arguments in the fields of mathematics and computer science....

Introduction to Computing and Programming with Java

A Multimedia Approach
Introduction to Computing and Programming with Java Image
Mark Guzdial and Barb Ericson havea most effective method forteaching computing and Java programming in a context that readers find interesting: manipulating digital media. Readers get started right away by learning how to write programs that create interesting effects with sounds, pictures, web pages, and video. The authors use these multimedia applications to teach critical programming skills and principles like how to design and use algorithms, and practical software engineering methodsall in the context of learning how to program in Java. Mark and Barb also demonstrate how to communicate compatibly through networks and do concurrent programming. The book also includes optional coverage of rudimentary data structures and databases using Java and c...

Internetworking with TCP/IP Volume 1

Principles, Protocols and Architecture
Internetworking with TCP/IP Volume 1 Image
4th Edition
Explains how voice and video are sent over IP internets and how IP Telephony operates, describes IP security and the security standard, IPsec, reviews the discussion of IPv6 to incorporate the latest changes, and explains Random Early Discard (RED), recommended for routers. DLC: Principles, protocols, and architectures....

Internet Denial of Service

Attack and Defense Mechanisms
Internet Denial of Service Image
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, a...

Inside Java 2 Platform Security

Architecture, API Design, and Implementation
Inside Java 2 Platform Security Image
2nd Edition
Series: The Java Series Security is an integral part of the Java platform; all Java APIs are built on a solid security model. That model has always been stronger than the security of other platforms, never allowing for the proliferation of a large virus such as "Melissa" or "I Love You." Now improved security and robust performance peacefully coexist. This book provides a detailed look into the central workings of the Java security architecture, including coverage of the many v1.4 enhancements. This book reviews multiple security threats, such as Trojan horses and denial of service attacks, and the strategies used to combat them. St...



2007 - 2017 © eBooks-IT.org