Open Networks
by Diarmuid O'Briain
Publisher: Free Technology Academy 2015
Number of pages: 276
Description:
This coursebook explores the different aspects of open technologies that are at the foundations of modern computer networks. The Internet is built on top of open protocols and open standards. Open networks do not belong to anybody because the devices they use are made available by the members of the community.
Download or read it online for free here:
Download link
(4.1MB, PDF)
Similar books
The Structure and Function of Complex Networks
by M. E. J. Newman - arXiv
Inspired by empirical studies of networked systems such as the Internet, social and biological networks, researchers have in recent years developed a variety of techniques and models to help us understand or predict the behavior of these systems.
(11406 views)
by M. E. J. Newman - arXiv
Inspired by empirical studies of networked systems such as the Internet, social and biological networks, researchers have in recent years developed a variety of techniques and models to help us understand or predict the behavior of these systems.
(11406 views)
Communication Networks
by Sharam Hekmat - PragSoft Corporation
This book is concerned with post-computer communication networks and two of its streams: data communication and telecommunication. It provides a coverage of the key concepts and techniques, so as to prepare readers for more advanced discussions.
(14424 views)
by Sharam Hekmat - PragSoft Corporation
This book is concerned with post-computer communication networks and two of its streams: data communication and telecommunication. It provides a coverage of the key concepts and techniques, so as to prepare readers for more advanced discussions.
(14424 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13066 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13066 views)
U.S. Robotics Home Networking for Dummies
by Kathy Ivens, Clark Scheffy - USRobotics
We think that if you have more than one computer in your home, you should have a network. That belief has its roots in the fact that we're generally lazy, and we believe everyone should do everything in the easiest possible manner.
(14480 views)
by Kathy Ivens, Clark Scheffy - USRobotics
We think that if you have more than one computer in your home, you should have a network. That belief has its roots in the fact that we're generally lazy, and we believe everyone should do everything in the easiest possible manner.
(14480 views)