0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (9)
  • R250 - R500 (17)
  • R500+ (361)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Coloring Book Monster V.2 Kids Imagination - Kids Inspiration to Have Fun with Coloring Books Pages with Jumbo Giant Size... Coloring Book Monster V.2 Kids Imagination - Kids Inspiration to Have Fun with Coloring Books Pages with Jumbo Giant Size Images (Paperback)
Arika Williams
R199 Discovery Miles 1 990 Ships in 18 - 22 working days
Mastering Linux Security and Hardening - Protect your Linux systems from intruders, malware attacks, and other cyber threats,... Mastering Linux Security and Hardening - Protect your Linux systems from intruders, malware attacks, and other cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Donald A. Tevault
R1,510 Discovery Miles 15 100 Ships in 18 - 22 working days

A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades. However, security has always been a major concern. With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured. Complete with in-depth explanations of essential concepts, practical examples, and self-assessment questions, this book begins by helping you set up a practice lab environment and takes you through the core functionalities of securing Linux. You'll practice various Linux hardening techniques and advance to setting up a locked-down Linux server. As you progress, you will also learn how to create user accounts with appropriate privilege levels, protect sensitive data by setting permissions and encryption, and configure a firewall. The book will help you set up mandatory access control, system auditing, security profiles, and kernel hardening, and finally cover best practices and troubleshooting techniques to secure your Linux environment efficiently. By the end of this Linux security book, you will be able to confidently set up a Linux server that will be much harder for malicious actors to compromise. What you will learn Create locked-down user accounts with strong passwords Configure firewalls with iptables, UFW, nftables, and firewalld Protect your data with different encryption technologies Harden the secure shell service to prevent security break-ins Use mandatory access control to protect against system exploits Harden kernel parameters and set up a kernel-level auditing system Apply OpenSCAP security profiles and set up intrusion detection Configure securely the GRUB 2 bootloader and BIOS/UEFI Who this book is forThis book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.

Wireless Digital Communications: Architecture, Design and Applications (Hardcover): Rafael Barrett Wireless Digital Communications: Architecture, Design and Applications (Hardcover)
Rafael Barrett
R2,957 R2,685 Discovery Miles 26 850 Save R272 (9%) Ships in 18 - 22 working days
Computer Network Algorithms Implementation Using Scilab (Paperback): Subbulakshmi T Computer Network Algorithms Implementation Using Scilab (Paperback)
Subbulakshmi T
R377 Discovery Miles 3 770 Ships in 18 - 22 working days
Networking Fundamentals - Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366... Networking Fundamentals - Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366 (Paperback)
Gordon Davies
R1,132 Discovery Miles 11 320 Ships in 18 - 22 working days

Become well-versed with basic networking concepts such as routing, switching, and subnetting, and prepare for the Microsoft 98-366 exam Key Features Build a strong foundation in networking concepts Explore both the hardware and software aspects of networking Prepare by taking mock tests with up-to-date exam questions Book DescriptionA network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366. Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You'll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You'll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you'll be able to practice everything you've learned and take the exam confidently with the help of mock tests. By the end of this networking book, you'll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366. What you will learnThings you will learn: Become well versed in networking topologies and concepts Understand network infrastructures such as intranets, extranets, and more Explore network switches, routers, and other network hardware devices Get to grips with different network protocols and models such as OSI and TCP/IP Work with a variety of network services such as DHCP, NAT, firewalls, and remote access Apply networking concepts in different real-world scenarios Who this book is forIf you're new to the IT industry or simply want to gain a thorough understanding of networking, this book is for you. A basic understanding of the Windows operating system and your network environment will be helpful.

Computer Networking - This Book Includes: Computer Networking for Beginners and Beginners Guide (All in One) (Paperback):... Computer Networking - This Book Includes: Computer Networking for Beginners and Beginners Guide (All in One) (Paperback)
Russell Scott
R525 Discovery Miles 5 250 Ships in 18 - 22 working days
Computer Programming The Doctrine 2.0 - Full Breakdown of HTML, Python, C, C++, Coding Raspberry PI, Java, SQL, HTML and Black... Computer Programming The Doctrine 2.0 - Full Breakdown of HTML, Python, C, C++, Coding Raspberry PI, Java, SQL, HTML and Black Hat Hacking. (Paperback)
Adesh Silva
R634 Discovery Miles 6 340 Ships in 18 - 22 working days
How To Do Virtualization - Your Step-By-Step Guide To Virtualization (Paperback): Howexpert Press How To Do Virtualization - Your Step-By-Step Guide To Virtualization (Paperback)
Howexpert Press
R469 Discovery Miles 4 690 Ships in 18 - 22 working days
NETWORKING for Beginners - Easy Guide to Learn Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet... NETWORKING for Beginners - Easy Guide to Learn Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet and Cyber Security (Paperback)
Dylan Mach
R467 Discovery Miles 4 670 Ships in 18 - 22 working days
SNMP Mastery (Paperback): Michael W Lucas SNMP Mastery (Paperback)
Michael W Lucas
R547 Discovery Miles 5 470 Ships in 18 - 22 working days
Mastering Python Networking - Your one-stop solution to using Python for network automation, programmability, and DevOps, 3rd... Mastering Python Networking - Your one-stop solution to using Python for network automation, programmability, and DevOps, 3rd Edition (Paperback, 3rd Revised edition)
Eric Chou; Foreword by Michael Kennedy, Mandy Whaley
R2,164 Discovery Miles 21 640 Ships in 18 - 22 working days

New edition of the bestselling guide to mastering Python Networking, updated to Python 3 and including the latest on network data analysis, Cloud Networking, Ansible 2.8, and new libraries Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively, including pyATS, Nornir, and Ansible 2.8 Use Python and Ansible for DevOps, network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python 3 Book DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In Mastering Python Networking, Third edition, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This new edition is completely revised and updated to work with Python 3. In addition to new chapters on network data analysis with ELK stack (Elasticsearch, Logstash, Kibana, and Beats) and Azure Cloud Networking, it includes updates on using newer libraries such as pyATS and Nornir, as well as Ansible 2.8. Each chapter is updated with the latest libraries with working examples to ensure compatibility and understanding of the concepts. Starting with a basic overview of Python, the book teaches you how it can interact with both legacy and API-enabled network devices. You will learn to leverage high-level Python packages and frameworks to perform network automation tasks, monitoring, management, and enhanced network security followed by Azure and AWS Cloud networking. Finally, you will use Jenkins for continuous integration as well as testing tools to verify your network. What you will learn Use Python libraries to interact with your network Integrate Ansible 2.8 using Python to control Cisco, Juniper, and Arista network devices Leverage existing Flask web frameworks to construct high-level APIs Learn how to build virtual networks in the AWS & Azure Cloud Learn how to use Elastic Stack for network data analysis Understand how Jenkins can be used to automatically deploy changes in your network Use PyTest and Unittest for Test-Driven Network Development in networking engineering with Python Who this book is forMastering Python Networking, Third edition is for network engineers, developers, and SREs who want to use Python for network automation, programmability, and data analysis. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.

Learn Python by Building Data Science Applications - A fun, project-based guide to learning Python 3 while building real-world... Learn Python by Building Data Science Applications - A fun, project-based guide to learning Python 3 while building real-world apps (Paperback)
Philipp Kats, David Katz
R1,030 Discovery Miles 10 300 Ships in 18 - 22 working days

Understand the constructs of the Python programming language and use them to build data science projects Key Features Learn the basics of developing applications with Python and deploy your first data application Take your first steps in Python programming by understanding and using data structures, variables, and loops Delve into Jupyter, NumPy, Pandas, SciPy, and sklearn to explore the data science ecosystem in Python Book DescriptionPython is the most widely used programming language for building data science applications. Complete with step-by-step instructions, this book contains easy-to-follow tutorials to help you learn Python and develop real-world data science projects. The "secret sauce" of the book is its curated list of topics and solutions, put together using a range of real-world projects, covering initial data collection, data analysis, and production. This Python book starts by taking you through the basics of programming, right from variables and data types to classes and functions. You'll learn how to write idiomatic code and test and debug it, and discover how you can create packages or use the range of built-in ones. You'll also be introduced to the extensive ecosystem of Python data science packages, including NumPy, Pandas, scikit-learn, Altair, and Datashader. Furthermore, you'll be able to perform data analysis, train models, and interpret and communicate the results. Finally, you'll get to grips with structuring and scheduling scripts using Luigi and sharing your machine learning models with the world as a microservice. By the end of the book, you'll have learned not only how to implement Python in data science projects, but also how to maintain and design them to meet high programming standards. What you will learn Code in Python using Jupyter and VS Code Explore the basics of coding - loops, variables, functions, and classes Deploy continuous integration with Git, Bash, and DVC Get to grips with Pandas, NumPy, and scikit-learn Perform data visualization with Matplotlib, Altair, and Datashader Create a package out of your code using poetry and test it with PyTest Make your machine learning model accessible to anyone with the web API Who this book is forIf you want to learn Python or data science in a fun and engaging way, this book is for you. You'll also find this book useful if you're a high school student, researcher, analyst, or anyone with little or no coding experience with an interest in the subject and courage to learn, fail, and learn from failing. A basic understanding of how computers work will be useful.

Wireshark Workbook 1 - Practice, Challenges, and Solutions (Paperback): Laura Chappell Wireshark Workbook 1 - Practice, Challenges, and Solutions (Paperback)
Laura Chappell; Edited by James Aragon
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days
Network Analysis Using Wireshark 2 Cookbook - Practical recipes to analyze and secure your network using Wireshark 2, 2nd... Network Analysis Using Wireshark 2 Cookbook - Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition (Paperback, 2nd Revised edition)
Nagendra Kumar, Yogesh Ramdoss, Yoram Orzach
R1,394 Discovery Miles 13 940 Ships in 18 - 22 working days

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2 Key Features Place Wireshark 2 in your network and configure it for effective network analysis Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease A practical guide with exciting recipes on a widely used network protocol analyzer Book DescriptionThis book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you've learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you'll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them. What you will learn Configure Wireshark 2 for effective network analysis and troubleshooting Set up various display and capture filters Understand networking layers, including IPv4 and IPv6 analysis Explore performance issues in TCP/IP Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs Get information about network phenomena, events, and errors Locate faults in detecting security failures and breaches in networks Who this book is forThis book is for security professionals, network administrators, R&D, engineering and technical support, and communications managers who are using Wireshark for network analysis and troubleshooting. It requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.

Network Scanning Cookbook - Practical network security using Nmap and Nessus 7 (Paperback): Sairam Jetty Network Scanning Cookbook - Practical network security using Nmap and Nessus 7 (Paperback)
Sairam Jetty
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Discover network vulnerabilities and threats to design effective network security strategies Key Features Plunge into scanning techniques using the most popular tools Effective vulnerability assessment techniques to safeguard network infrastructure Explore the Nmap Scripting Engine (NSE) and the features used for port and vulnerability scanning Book DescriptionNetwork scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network. Network Scanning Cookbook contains recipes for configuring these tools in your infrastructure that get you started with scanning ports, services, and devices in your network. As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. The book also contains recipes for assessing remote services and the security risks that they bring to a network infrastructure. By the end of the book, you will be familiar with industry-grade tools for network scanning, and techniques for vulnerability scanning and network protection. What you will learn Install and configure Nmap and Nessus in your network infrastructure Perform host discovery to identify network devices Explore best practices for vulnerability scanning and risk assessment Understand network enumeration with Nessus and Nmap Carry out configuration audit using Nessus for various platforms Write custom Nessus and Nmap scripts on your own Who this book is forIf you're a network engineer or information security professional wanting to protect your networks and perform advanced scanning and remediation for your network infrastructure, this book is for you.

Cybersecurity: The Beginner's Guide - A comprehensive guide to getting started in cybersecurity (Paperback): Dr. Erdal... Cybersecurity: The Beginner's Guide - A comprehensive guide to getting started in cybersecurity (Paperback)
Dr. Erdal Ozkaya
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

Understand the nitty-gritty of Cybersecurity with ease Key Features Align your security knowledge with industry leading concepts and tools Acquire required skills and certifications to survive the ever changing market needs Learn from industry experts to analyse, implement, and maintain a robust environment Book DescriptionIt's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best Plan your transition into cybersecurity in an efficient and effective way Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is forThis book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.

Building Bluetooth Low Energy Systems (Paperback): Muhammad Usama Bin Aftab Building Bluetooth Low Energy Systems (Paperback)
Muhammad Usama Bin Aftab
R941 Discovery Miles 9 410 Ships in 18 - 22 working days

Discover and implement a system of your choice using Bluetooth Low Energy. About This Book * Learn the basics of Bluetooth Low Energy with its exciting new protocol stack and security. * Build customized Bluetooth Low Energy projects that make your web or mobile apps smarter in terms of networking and communications. * Using Android, iOS, and the Web, acquire key skills to harness the power of Bluetooth Low Energy in your IoT applications. Who This Book Is For The book is for developers and enthusiasts who are passionate about learning Bluetooth Low Energy technologies and want to add new features and services to their new or existing products. They should be familiar with programming languages such as Swift, Java, and JavaScript. Knowledge of debugging skills would be an advantage. What You Will Learn * Bluetooth Low Energy in theory. * Bluetooth Low Energy Hardware and Software Development Kits. * Implement Bluetooth low energy communication (central and peripheral) using Android. * Master BLE Beacons with examples implemented over Eddystone and iBeacons. * Implement indoor navigation using Estimote Beacons on iOS. * Implement Internet gateways to control BLE devices on a Wi-Fi network. * Understand BLE security mechanisms with a special focus on Bluetooth pairing, bonding, and key exchange to cover encryption, privacy, and user data integrity. * Implement Bluetooth Mesh using CSRMesh Technology. In Detail Bluetooth Low Energy (BLE) is a Wireless Personal Area network technology aimed at novel applications for smart devices. High-tech BLE profiles and services are being increasingly used by application developers and hardware enthusiasts to allow devices to interact with the surrounding world. This book will focus on a technical introduction to BLE and how it is reshaping small-distance communication. We will start with IoT, where many technologies such as BLE, Zigbee, and IEEE 802.15.4 Mesh will be introduced. The book will present BLE from an engineering perspective, from which the protocol stack, architecture, and layers are discussed. You will learn to implement customized projects for Peripheral/Central communication, BLE Beacons, indoor navigation using triangulation, and the Internet gateway for Bluetooth Low Energy Personal Network, all using various code samples and APIs on Android, iOS, and the Web. Finally, the book will conclude with a glimpse into future technologies destined to be prominent in years to come. Style and approach The book is a practical tutorial that will help you understand the background and technicalities of BLE and offers a friendly environment to build and create robust BLE projects. This hands-on approach will give you a clear vision of Bluetooth Low Energy and how it can be used in IoT.

Integrating and Streamlining Event-Driven IoT Services (Paperback): Yang Zhang, Yanmeng Guo Integrating and Streamlining Event-Driven IoT Services (Paperback)
Yang Zhang, Yanmeng Guo
R3,895 Discovery Miles 38 950 Ships in 18 - 22 working days

In IoT scenarios, ways in which large-scale and cross-domain service systems can be established are still unclear, and no systematic or in-depth theories and methods have yet been found. An effective, formal foundation to IoT application designs could serve as a knowledge base for a variety of virtual world applications. Integrating and Streamlining Event-Driven IoT Services discusses how to observe isolated services running by different observation sources, how to fuse different observations to deal with observation conflict and incompleteness, and how to deal with adversaries and physical system features for real-time property enforcement over the fused knowledge. Overall, presenting an exploration of systematic theories and methods for the design of IoT services based on the principles of streamlining and integration, this book features research on topics such as CEP service, virtual machine technologies, and hybrid EPC. It is ideally designed for engineers, researchers, and university students seeking coverage on applications for smart cities, smart grids, and Industry 4.0.

Learn Ethical Hacking from Scratch - Your stepping stone to penetration testing (Paperback): Zaid Sabih Learn Ethical Hacking from Scratch - Your stepping stone to penetration testing (Paperback)
Zaid Sabih
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is forLearning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.

Nng Reference Manual (Paperback): Garrett D'Amore Nng Reference Manual (Paperback)
Garrett D'Amore
R868 Discovery Miles 8 680 Ships in 18 - 22 working days
Learning Python Networking - A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible ,... Learning Python Networking - A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition (Paperback, 2nd Revised edition)
Jose Manuel Ortega, Dr M O Faruque Sarker, Sam Washington
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools Key Features Deal with remote network servers using SSH, FTP, SNMP and LDAP protocols. Design multi threaded and event-driven architectures for asynchronous servers programming. Leverage your Python programming skills to build powerful network applications Book DescriptionNetwork programming has always been a demanding task. With full-featured and well-documented libraries all the way up the stack, Python makes network programming the enjoyable experience it should be. Starting with a walk through of today's major networking protocols, through this book, you'll learn how to employ Python for network programming, how to request and retrieve web resources, and how to extract data in major formats over the web. You will utilize Python for emailing using different protocols, and you'll interact with remote systems and IP and DNS networking. You will cover the connection of networking devices and configuration using Python 3.7, along with cloud-based network management tasks using Python. As the book progresses, socket programming will be covered, followed by how to design servers, and the pros and cons of multithreaded and event-driven architectures. You'll develop practical clientside applications, including web API clients, email clients, SSH, and FTP. These applications will also be implemented through existing web application frameworks. What you will learn Execute Python modules on networking tools Automate tasks regarding the analysis and extraction of information from a network Get to grips with asynchronous programming modules available in Python Get to grips with IP address manipulation modules using Python programming Understand the main frameworks available in Python that are focused on web application Manipulate IP addresses and perform CIDR calculations Who this book is forIf you're a Python developer or a system administrator with Python experience and you're looking to take your first steps in network programming, then this book is for you. If you're a network engineer or a network professional aiming to be more productive and efficient in networking programmability and automation then this book would serve as a useful resource. Basic knowledge of Python is assumed.

Hands-On MQTT Programming with Python - Work with the lightweight IoT protocol in Python (Paperback): Gaston C Hillar Hands-On MQTT Programming with Python - Work with the lightweight IoT protocol in Python (Paperback)
Gaston C Hillar
R947 Discovery Miles 9 470 Ships in 18 - 22 working days

Explore the features included in the latest versions of MQTT for IoT and M2M communications and use them with modern Python 3. Key Features Make your connected devices less prone to attackers by understanding security mechanisms Take advantage of MQTT features for IoT and Machine-to-Machine communications The only book that covers MQTT with a single language, Python Book DescriptionMQTT is a lightweight messaging protocol for small sensors and mobile devices. This book explores the features of the latest versions of MQTT for IoT and M2M communications, how to use them with Python 3, and allow you to interact with sensors and actuators using Python. The book begins with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. You will use different utilities and diagrams to understand the most important concepts related to MQTT. You will learn to make all the necessary configuration to work with digital certificates for encrypting all data sent between the MQTT clients and the server. You will also work with the different Quality of Service levels and later analyze and compare their overheads. You will write Python 3.x code to control a vehicle with MQTT messages delivered through encrypted connections (TLS 1.2), and learn how leverage your knowledge of the MQTT protocol to build a solution based on requirements. Towards the end, you will write Python code to use the PubNub cloud-based real-time MQTT provider to monitor a surfing competition. In the end, you will have a solution that was built from scratch by analyzing the requirements and then write Python code that will run on water-proof IoT boards connected to multiple sensors in surfboards. What you will learn Learn how MQTT and its lightweight messaging system work Understand the MQTT puzzle: clients, servers (formerly known as brokers), and connections Explore the features included in the latest versions of MQTT for IoT and M2M communications Publish and receive MQTT messages with Python Learn the difference between blocking and threaded network loops Take advantage of the last will and testament feature Work with cloud-based MQTT interfaces in Python Who this book is forThis book is for developers who want to learn about the MQTT protocol for their IoT projects. Prior knowledge of working with IoT and Python will be helpful.

CCNA Routing and Switching (ICND1 100-105, ICND2 200-105, and CCNA 200-125) - Short guide and additional help to passing your... CCNA Routing and Switching (ICND1 100-105, ICND2 200-105, and CCNA 200-125) - Short guide and additional help to passing your exam (Paperback)
William Rowley
R239 Discovery Miles 2 390 Ships in 18 - 22 working days
Network Fighter (Paperback): Ervin Clane Network Fighter (Paperback)
Ervin Clane
R1,569 Discovery Miles 15 690 Ships in 18 - 22 working days
Cacti Beginner's Guide - (Paperback, 2nd Revised edition): Thomas Urban Cacti Beginner's Guide - (Paperback, 2nd Revised edition)
Thomas Urban
R1,205 Discovery Miles 12 050 Ships in 18 - 22 working days

A comprehensive guide to learning Cacti and using it to implement performance measurement and reporting within a Network Operations Center About This Book * A complete Cacti book that focuses on the basics as well as the advanced concepts you need to know for implementing a Network Operations Center * A step-by-step Beginner's Guide with detailed instructions on how to create and implement custom plugins * Written by Thomas Urban - creator of the "Cereus" and "NMID" plugins for Cacti known as Phalek in the Cacti forum Who This Book Is For If you are a network operator and want to use Cacti for implementing performance measurement for trending, troubleshooting, and reporting purposes, then this book is for you. You only need to know the basics of network management and SNMP. What You Will Learn * Setting up Cacti on Linux and Windows systems * Extending the core functionality by using the plugin architecture * Building your own custom plugins * Creating your own custom data input method to retrieve data from your systems * Using SNMP, SSH, and WMI to retrieve remote performance data * Designing and create enterprise-class reports with the reporting plugins * Implementing threshold-based alerting using the Thold plugin * Automating common administrative tasks utilizing the command-line interface and the automate functionality * Migrating Cacti to new servers * Building a multi remote-poller environment In Detail Cacti is a performance measurement tool that provides easy methods and functions for gathering and graphing system data. You can use Cacti to develop a robust event management system that can alert on just about anything you would like it to. But to do that, you need to gain a solid understanding of the basics of Cacti, its plugin architecture, and automation concepts. Cacti Beginner's Guide will introduce you to the wide variety of features of Cacti and will guide you on how to use them for maximum effectiveness. Advanced topics such as the plugin architecture and Cacti automation using the command-line interface will help you build a professional performance measurement system. Designed as a beginner's guide, the book starts off with the basics of installing and using Cacti, and also covers the advanced topics that will show you how to customize and extend the core Cacti functionalities. The book offers essential tutorials for creating advanced graphs and using plugins to create enterprise-class reports to show your customers and colleagues. From data templates to input methods and plugin installation to creating your own customized plugins, this book provides you with a rich selection of step-by-step instructions to reach your goals. It covers all you need to know to implement professional performance measurement techniques with Cacti and ways to fully customize Cacti to fit your needs. You will also learn how to migrate Cacti to new servers. Lastly you will also be introduced to the latest feature of building a scalable remote poller environment. By the end of the book, you will be able to implement and extend Cacti to monitor, display, and report the performance of your network exactly the way you want. Style and approach Written for beginners to Cacti, this book contains step-by-step instructions and hands-on tutorials for network operators to learn how to implement and use the core Cacti functions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ethical Hacking - The Ultimate Guide to…
Lester Evans Hardcover R664 R593 Discovery Miles 5 930
Broadband Wireless Access Networks for…
Raul Aquino Santos, Victor Rangel Licea, … Hardcover R5,954 Discovery Miles 59 540
RFID and Wireless Sensors Using…
Angel Ramos, Antonio Lazaro, … Hardcover R2,463 R2,324 Discovery Miles 23 240
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Handbook of Research on Advanced…
Niranjan K. Ray, Ashok Kumar Turuk Hardcover R7,161 Discovery Miles 71 610
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Multimedia Transcoding in Mobile and…
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim Hardcover R4,984 Discovery Miles 49 840
Computer Programming The Doctrine 2.0…
Adesh Silva Hardcover R698 R621 Discovery Miles 6 210
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R873 R792 Discovery Miles 7 920
Mobile IPv6 - Protocols and…
Qing Li, Tatuya Jinmei, … Paperback R1,418 Discovery Miles 14 180

 

Partners