Network Programming
by Katta G. Murty
Publisher: Prentice Hall 2006
ISBN/ASIN: 013615493X
Number of pages: 824
Description:
This book covers the significant advances in network flow methods ranging across modeling, applications, algorithms, their implementations, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques or their adaptations. It is particularly useful for professionals involved in mathematical programming and linear programming in the areas of operations research, industrial engineering, other branches of engineering and business applications.
Download or read it online for free here:
Download link
(multiple PDF files)
Similar books
Computer Networks: Performance and Quality of Service
by Ivan Marsic - Rutgers University
This book reviews modern computer networks with a focus on performance and quality of service. There is a need to look towards future, where wired and wireless/mobile networks will be mixed and where multimedia applications will play greater role.
(12398 views)
by Ivan Marsic - Rutgers University
This book reviews modern computer networks with a focus on performance and quality of service. There is a need to look towards future, where wired and wireless/mobile networks will be mixed and where multimedia applications will play greater role.
(12398 views)
Communication Network Analysis
by Bruce Hajek
This text describes the most popular analytical techniques for design and analysis of computer communication networks, with an emphasis on performance issues. Written for the graduate course Communication Network Analysis.
(18447 views)
by Bruce Hajek
This text describes the most popular analytical techniques for design and analysis of computer communication networks, with an emphasis on performance issues. Written for the graduate course Communication Network Analysis.
(18447 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13168 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13168 views)
Introduction to Networking: How the Internet Works
by Charles Severance - net-intro.com
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. The Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone ...
(11430 views)
by Charles Severance - net-intro.com
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. The Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone ...
(11430 views)