The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

The Virtual Bookcase : Shelf Computer networks

Local area networks, wide area networks, Internet, wireless networks, technologies, theory, management and planning of networks.

Shelf parts : First Previous Next Last


Shop for this book
Amazon.com
Amazon.co.uk
Book description
"A fascinating walk through a pivotal period in human history."--USA TodayFor many people, the Internet is the epitome of cutting-edge technology. But in the nineteenth century, the first online communications network was already in place--the telegraph. And at the time, it was just as perplexing, controversial, and revolutionary as the Internet is today. The Victorian Internet tells the story of the telegraph's creation and remarkable impact, and of the visionaries, oddballs, and eccentrics who pioneered it. With the invention of the telegraph, the world of communications was forever changed. The telegraph gave rise to creative business practices and new forms of crime. Romances blossomed over its wires. And attitudes toward everything fro... Rest of this review on the detail page
I want to add the first review for this book!
Reviews (1) and details of The Victorian Internet

Shop for this book
Amazon.com
Amazon.co.uk
Book description
(Syngress Publishing) Combines fictional stories with real technology. Provides a glimpse into the creative minds of some of today's best hackers. Softcover. Book Info (Syngress Publishing) Combines fictional stories with real technology. Provides a glimpse into the creative minds of some of today's best hackers. Softcover. From the Publisher In the real world, hackers go after the "low-hanging fruit." They take the least risk and go for the greatest reward. They often act alone or in small groups. They don’t have government funding or belong to world criminal organizations. What they do have is spare time and a lot of curiosity, and believe me, hacking takes a lot of time. Some of the best hackers spend months working on one exploit. ... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Stealing the Network: How to Own the Box

Shop for this book
Amazon.com
Amazon.co.uk
Book description
An introduction to the key tools and technologies used to secure network access * Examine common security vulnerabilities and the defenses used to protect network resources * Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates * Learn how to design, adopt, and enforce security policies * Evaluate the nuances of secure network design * Secure HTTP traffic by hardening operating systems, servers, and browsers * Protect routers through administrative access policies and services * Understand what firewalls do and how to implement them to maximum effect * Inspect and monitor network activity with IDS * Utilize VPNs for secure remote access * Learn about PKI technologies * Examine secure... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Network Security Fundamentals (Cisco Press Fundamentals Series)

Shop for this book
Amazon.com
Amazon.co.uk
Book description
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source ... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Network Security Tools : Writing, Hacking, and Modifying Security Tools

Shop for this book
Amazon.com
Amazon.co.uk
Book description
Computer Network Time Synchronization explores the technological infrastructure of time dissemination, distribution, and synchronization. The author addresses the architecture, protocols, and algorithms of the Network Time Protocol (NTP) and discusses how to identify and resolve problems encountered in practice. He also demonstrates how to design and configure time synchronization networks and includes coverage of the theory and practice of security and reliability. Presented in engaging, accessible prose, this book offers information valuable to professionals developing time-sensitive computer and network applications, electrical and computer engineers, and computer scientists.
I want to add the first review for this book!
Reviews (1) and details of Computer Network Time Synchronization
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2017 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement