UNIX Network Programming

Titre : UNIX Network Programming
Auteur : W. Richard Stevens
Éditeur : Addison-Wesley Professional
ISBN-13 : 0131411551
Libération : 2004

Télécharger Lire en ligne



* *Previous editions sold over 160,000 units! Second Edition (1998) sold over 53,000 in retail alone! *Updates coverage of programming standards, debugging techniques, and covers Operating Systems including Red Hat 9, Solaris 9, HP-UX, Free BSD 4.8/5.0, AIX 5.x, and Mac OS X. *Bill Fenner (AT/T Labs) and Andrew Rudoff (SUN) carry on the tradition of this great work.

TCP IP Illustrated

Titre : TCP IP Illustrated
Auteur : Kevin R. Fall
Éditeur : Addison-Wesley Professional
ISBN-13 : 9780321336316
Libération : 2011-11-01

Télécharger Lire en ligne



A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat

Android Security Internals

Titre : Android Security Internals
Auteur : Nikolay Elenkov
Éditeur : No Starch Press
ISBN-13 : 9781593275815
Libération : 2014-10-14

Télécharger Lire en ligne



"I honestly didn’t believe I’d learn much from the book because I’ve been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf." —Jon “jcase” Sawyer, from the Foreword There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys­tem. Elenkov describes Android security archi­tecture from the bottom up, delving into the imple­mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You’ll learn: * How Android permissions are declared, used, and enforced * How Android manages application packages and employs code signing to verify their authenticity * How Android implements the Java Cryp­­­tog­raphy Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks * About Android’s credential storage system and APIs, which let applications store cryptographic keys securely * About the online account management framework and how Google accounts integrate with Android * About the implementation of verified boot, disk encryption, lockscreen, and other device security features * How Android’s bootloader and recovery OS are used to perform full system updates, and how to obtain root access With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.

Networked Graphics

Titre : Networked Graphics
Auteur : Anthony Steed
Éditeur : Elsevier
ISBN-13 : 0080922236
Libération : 2009-10-30

Télécharger Lire en ligne



Networked Graphics equips programmers and designers with a thorough grounding in the techniques used to create truly network-enabled computer graphics and games. Written for graphics/game/VE developers and students, it assumes no prior knowledge of networking. The text offers a broad view of what types of different architectural patterns can be found in current systems, and readers will learn the tradeoffs in achieving system requirements on the Internet. It explains the foundations of networked graphics, then explores real systems in depth, and finally considers standards and extensions. Numerous case studies and examples with working code are featured throughout the text, covering groundbreaking academic research and military simulation systems, as well as industry-leading game designs. Everything designers need to know when developing networked graphics and games is covered in one volume - no need to consult multiple sources. The many examples throughout the text feature real simulation code in C++ and Java that developers can use in their own design experiments. Case studies describing real-world systems show how requirements and constraints can be managed.

Bulletproof SSL and TLS

Titre : Bulletproof SSL and TLS
Auteur : Ivan Ristic
Éditeur : Feisty Duck
ISBN-13 : 9781907117046
Libération : 2014

Télécharger Lire en ligne



Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you’ll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: - Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version - For IT security professionals, help to understand the risks - For system administrators, help to deploy systems securely - For developers, help to design and implement secure web applications - Practical and concise, with added depth when details are relevant - Introduction to cryptography and the latest TLS protocol version - Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities - Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed - Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning - Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority - Guide to using OpenSSL to test servers for vulnerabilities - Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat This book is available in paperback and a variety of digital formats without DRM.

TCP IP Essentials

Titre : TCP IP Essentials
Auteur : Shivendra S. Panwar
Éditeur : Cambridge University Press
ISBN-13 : 052160124X
Libération : 2004-11-18

Télécharger Lire en ligne



A hands-on textbook on TCP/IP technologies, showing how the protocols are implemented in practice.

How Linux Works

Titre : How Linux Works
Auteur : Brian Ward
Éditeur : No Starch Press
ISBN-13 : 9781593270353
Libération : 2004

Télécharger Lire en ligne



How Linux Works describes the inside of the Linux system for systems administrators, whether they maintain an extensive network in the office or one Linux box at home. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into topics such as development tools, custom kernels, and buying hardware. With a mixture of background theory and real-world examples, this book shows both how to administer Linux, and why each particular technique works, so that you will know how to make Linux work for you.

The TCP IP Guide

Titre : The TCP IP Guide
Auteur : Charles M. Kozierok
Éditeur : No Starch Press
ISBN-13 : 9781593270476
Libération : 2005

Télécharger Lire en ligne



Up to date and accessible, this comprehensive reference to the TCP/IP networking protocols will become a valuable resource for any IT professional and an excellent text for students.

Computer Networking Principles Protocols and Practice

Titre : Computer Networking Principles Protocols and Practice
Auteur : Olivier Bonaventure
Éditeur : The Saylor Foundation
ISBN-13 :
Libération : 2011-10-30

Télécharger Lire en ligne



This textbook came from a frustration of its main author. Many authors chose to write a textbook because there are no textbooks in their field or because they are not satisfied with the existing textbooks. This frustration has produced several excellent textbooks in the networking community. At a time when networking textbooks were mainly theoretical, Douglas Comer chose to write a textbook entirely focused on the TCP/IP protocol suite, a difficult choice at that time. He later extended his textbook by describing a complete TCP/IP implementation, adding practical considerations to the theoretical descriptions in. Richard Stevens approached the Internet like an explorer and explained the operation of protocols by looking at all the packets that were exchanged on the wire. Jim Kurose and Keith Ross reinvented the networking textbooks by starting from the applications that the students use and later explained the Internet protocols by removing one layer after the other.

BeagleBone Essentials

Titre : BeagleBone Essentials
Auteur : Rodolfo Giometti
Éditeur : Packt Publishing Ltd
ISBN-13 : 9781784397388
Libération : 2015-05-28

Télécharger Lire en ligne



If you are a developer with some hardware or electrical engineering experience who wants to learn how to use embedded machine-learning capabilities and get access to a GNU/Linux device driver to collect data from a peripheral or to control a device, this is the book for you.