|
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
A comprehensive, easy-to-follow guide to creating complete Node
apps and understanding how to build, deploy, and test your own
apps. Key Features Entirely project-based and practical Explains
the "Why" of Node.js features, not just the "how", providing you
with a deep understanding and enabling you to easily apply concepts
in your own applications Covers the full range of technologies
around Node.js - NPM, version control with Git, and much more Book
DescriptionLearning Node.js Development is a practical,
project-based book that provides you with all you need to get
started as a Node.js developer. Node is a ubiquitous technology on
the modern web, and an essential part of any web developers'
toolkit. If you are looking to create real-world Node applications,
or you want to switch careers or launch a side project to generate
some extra income, then you're in the right place. This book has
been written around a single goal-turning you into a professional
Node developer capable of developing, testing, and deploying
real-world production applications. Learning Node.js Development is
built from the ground up around the latest version of Node.js
(version 9.x.x). You'll be learning all the cutting-edge features
available only in the latest software versions. This book cuts
through the mass of information available around Node and delivers
the essential skills that you need to become a Node developer. It
takes you through creating complete apps and understanding how to
build, deploy, and test your own Node apps. It maps out everything
in a comprehensive, easy-to-follow package designed to get you up
and running quickly. What you will learn Learn the fundamentals of
Node Build apps that respond to user input Master working with
servers Learn how to test and debug applications Deploy and update
your apps in the real world Create responsive asynchronous web
applications Who this book is forThis book targets anyone looking
to launch their own Node applications, switch careers, or freelance
as a Node developer. You should have a basic understanding of
JavaScript in order to follow this course.
Learn how to hack systems like black hat hackers and secure them
like security experts Key Features Understand how computer systems
work and their vulnerabilities Exploit weaknesses and hack into
machines to test their security Learn how to secure systems from
hackers Book DescriptionThis book starts with the basics of ethical
hacking, how to practice hacking safely and legally, and how to
install and interact with Kali Linux and the Linux terminal. You
will explore network hacking, where you will see how to test the
security of wired and wireless networks. You'll also learn how to
crack the password for any Wi-Fi network (whether it uses WEP, WPA,
or WPA2) and spy on the connected devices. Moving on, you will
discover how to gain access to remote computer systems using
client-side and server-side attacks. You will also get the hang of
post-exploitation techniques, including remotely controlling and
interacting with the systems that you compromised. Towards the end
of the book, you will be able to pick up web application hacking
techniques. You'll see how to discover, exploit, and prevent a
number of website vulnerabilities, such as XSS and SQL injections.
The attacks covered are practical techniques that work against real
systems and are purely for educational purposes. At the end of each
section, you will learn how to detect, prevent, and secure systems
from these attacks. What you will learn Understand ethical hacking
and the different fields and types of hackers Set up a penetration
testing lab to practice safe and legal hacking Explore Linux
basics, commands, and how to interact with the terminal Access
password-protected networks and spy on connected clients Use server
and client-side attacks to hack and control remote computers
Control a hacked system remotely and use it to hack other systems
Discover, exploit, and prevent a number of web application
vulnerabilities such as XSS and SQL injections Who this book is
forLearning Ethical Hacking from Scratch is for anyone interested
in learning how to hack and test the security of systems like
professional hackers and security experts.
Protect your network as you move from the basics of the Wireshark
scenarios to detecting and resolving network anomalies. Key
Features Learn protocol analysis, optimization and troubleshooting
using Wireshark, an open source tool Learn the usage of filtering
and statistical tools to ease your troubleshooting job Quickly
perform root-cause analysis over your network in an event of
network failure or a security breach Book DescriptionWireshark is
an open source protocol analyser, commonly used among the network
and security professionals. Currently being developed and
maintained by volunteer contributions of networking experts from
all over the globe. Wireshark is mainly used to analyze network
traffic, analyse network issues, analyse protocol behaviour, etc. -
it lets you see what's going on in your network at a granular
level. This book takes you from the basics of the Wireshark
environment to detecting and resolving network anomalies. This book
will start from the basics of setting up your Wireshark environment
and will walk you through the fundamentals of networking and packet
analysis. As you make your way through the chapters, you will
discover different ways to analyse network traffic through creation
and usage of filters and statistical features. You will look at
network security packet analysis, command-line utilities, and other
advanced tools that will come in handy when working with day-to-day
network operations. By the end of this book, you have enough skill
with Wireshark 2 to overcome real-world network challenges. What
you will learn Learn how TCP/IP works Install Wireshark and
understand its GUI Creation and Usage of Filters to ease analysis
process Understand the usual and unusual behaviour of Protocols
Troubleshoot network anomalies quickly with help of Wireshark Use
Wireshark as a diagnostic tool for network security analysis to
identify source of malware Decrypting wireless traffic Resolve
latencies and bottleneck issues in the network Who this book is
forIf you are a security professional or a network enthusiast who
is interested in understanding the internal working of networks and
packets, then this book is for you. No prior knowledge of Wireshark
is needed.
Explore the features included in the latest versions of MQTT for
IoT and M2M communications and use them with modern Python 3. Key
Features Make your connected devices less prone to attackers by
understanding security mechanisms Take advantage of MQTT features
for IoT and Machine-to-Machine communications The only book that
covers MQTT with a single language, Python Book DescriptionMQTT is
a lightweight messaging protocol for small sensors and mobile
devices. This book explores the features of the latest versions of
MQTT for IoT and M2M communications, how to use them with Python 3,
and allow you to interact with sensors and actuators using Python.
The book begins with the specific vocabulary of MQTT and its
working modes, followed by installing a Mosquitto MQTT broker. You
will use different utilities and diagrams to understand the most
important concepts related to MQTT. You will learn to make all the
necessary configuration to work with digital certificates for
encrypting all data sent between the MQTT clients and the server.
You will also work with the different Quality of Service levels and
later analyze and compare their overheads. You will write Python
3.x code to control a vehicle with MQTT messages delivered through
encrypted connections (TLS 1.2), and learn how leverage your
knowledge of the MQTT protocol to build a solution based on
requirements. Towards the end, you will write Python code to use
the PubNub cloud-based real-time MQTT provider to monitor a surfing
competition. In the end, you will have a solution that was built
from scratch by analyzing the requirements and then write Python
code that will run on water-proof IoT boards connected to multiple
sensors in surfboards. What you will learn Learn how MQTT and its
lightweight messaging system work Understand the MQTT puzzle:
clients, servers (formerly known as brokers), and connections
Explore the features included in the latest versions of MQTT for
IoT and M2M communications Publish and receive MQTT messages with
Python Learn the difference between blocking and threaded network
loops Take advantage of the last will and testament feature Work
with cloud-based MQTT interfaces in Python Who this book is forThis
book is for developers who want to learn about the MQTT protocol
for their IoT projects. Prior knowledge of working with IoT and
Python will be helpful.
Publisher's Note: This edition from 2018 is outdated. A new third
edition, updated for 2020 featuring Python 3.8, with coverage
extended to include Azure, AWS, and Ansible 2.8, and data analysis
using Elastic Stack has just been published. Master the art of
using Python for a diverse range of network engineering tasks Key
Features Explore the power of Python libraries to tackle difficult
network problems efficiently and effectively Use Python for network
device automation, DevOps, and software-defined networking Become
an expert in implementing advanced network-related tasks with
Python Book DescriptionNetworks in your infrastructure set the
foundation for how your application can be deployed, maintained,
and serviced. Python is the ideal language for network engineers to
explore tools that were previously available to systems engineers
and application developers. In this second edition of Mastering
Python Networking, you'll embark on a Python-based journey to
transition from traditional network engineers to network developers
ready for the next-generation of networks. This book begins by
reviewing the basics of Python and teaches you how Python can
interact with both legacy and API-enabled network devices. As you
make your way through the chapters, you will then learn to leverage
high-level Python packages and frameworks to perform network
engineering tasks for automation, monitoring, management, and
enhanced security. In the concluding chapters, you will use Jenkins
for continuous network integration as well as testing tools to
verify your network. By the end of this book, you will be able to
perform all networking tasks with ease using Python. What you will
learn Use Python libraries to interact with your network Integrate
Ansible 2.5 using Python to control Cisco, Juniper, and Arista eAPI
network devices Leverage existing frameworks to construct
high-level APIs Learn how to build virtual networks in the AWS
Cloud Understand how Jenkins can be used to automatically deploy
changes in your network Use PyTest and Unittest for Test-Driven
Network Development Who this book is forMastering Python Networking
is for network engineers and programmers who want to use Python for
networking. Basic familiarity with Python programming and
networking-related concepts such as Transmission Control
Protocol/Internet Protocol (TCP/IP) will be useful.
A comprehensive guide to learning Cacti and using it to implement
performance measurement and reporting within a Network Operations
Center About This Book * A complete Cacti book that focuses on the
basics as well as the advanced concepts you need to know for
implementing a Network Operations Center * A step-by-step
Beginner's Guide with detailed instructions on how to create and
implement custom plugins * Written by Thomas Urban - creator of the
"Cereus" and "NMID" plugins for Cacti known as Phalek in the Cacti
forum Who This Book Is For If you are a network operator and want
to use Cacti for implementing performance measurement for trending,
troubleshooting, and reporting purposes, then this book is for you.
You only need to know the basics of network management and SNMP.
What You Will Learn * Setting up Cacti on Linux and Windows systems
* Extending the core functionality by using the plugin architecture
* Building your own custom plugins * Creating your own custom data
input method to retrieve data from your systems * Using SNMP, SSH,
and WMI to retrieve remote performance data * Designing and create
enterprise-class reports with the reporting plugins * Implementing
threshold-based alerting using the Thold plugin * Automating common
administrative tasks utilizing the command-line interface and the
automate functionality * Migrating Cacti to new servers * Building
a multi remote-poller environment In Detail Cacti is a performance
measurement tool that provides easy methods and functions for
gathering and graphing system data. You can use Cacti to develop a
robust event management system that can alert on just about
anything you would like it to. But to do that, you need to gain a
solid understanding of the basics of Cacti, its plugin
architecture, and automation concepts. Cacti Beginner's Guide will
introduce you to the wide variety of features of Cacti and will
guide you on how to use them for maximum effectiveness. Advanced
topics such as the plugin architecture and Cacti automation using
the command-line interface will help you build a professional
performance measurement system. Designed as a beginner's guide, the
book starts off with the basics of installing and using Cacti, and
also covers the advanced topics that will show you how to customize
and extend the core Cacti functionalities. The book offers
essential tutorials for creating advanced graphs and using plugins
to create enterprise-class reports to show your customers and
colleagues. From data templates to input methods and plugin
installation to creating your own customized plugins, this book
provides you with a rich selection of step-by-step instructions to
reach your goals. It covers all you need to know to implement
professional performance measurement techniques with Cacti and ways
to fully customize Cacti to fit your needs. You will also learn how
to migrate Cacti to new servers. Lastly you will also be introduced
to the latest feature of building a scalable remote poller
environment. By the end of the book, you will be able to implement
and extend Cacti to monitor, display, and report the performance of
your network exactly the way you want. Style and approach Written
for beginners to Cacti, this book contains step-by-step
instructions and hands-on tutorials for network operators to learn
how to implement and use the core Cacti functions.
Send and receive messages with the MQTT protocol for your IoT
solutions. About This Book * Make your connected devices less prone
to attackers by understanding practical security mechanisms * Dive
deep into one of IoT's extremely lightweight machines to enable
connectivity protocol with some real-world examples * Learn to take
advantage of the features included in MQTT for IoT and
Machine-to-Machine communications with complete real-life examples
Who This Book Is For This book is a great resource for developers
who want to learn more about the MQTT protocol to apply it to their
individual IoT projects. Prior knowledge of working with IoT
devices is essential. What You Will Learn * Understand how MQTTv3.1
and v3.1.1 works in detail * Install and secure a Mosquitto MQTT
broker by following best practices * Design and develop IoT
solutions combined with mobile and web apps that use MQTT messages
to communicate * Explore the features included in MQTT for IoT and
Machine-to-Machine communications * Publish and receive MQTT
messages with Python, Java, Swift, JavaScript, and Node.js *
Implement the security best practices while setting up the MQTT
Mosquitto broker In Detail This step-by-step guide will help you
gain a deep understanding of the lightweight MQTT protocol. We'll
begin with the specific vocabulary of MQTT and its working modes,
followed by installing a Mosquitto MQTT broker. Then, you will use
best practices to secure the MQTT Mosquitto broker to ensure that
only authorized clients are able to publish and receive messages.
Once you have secured the broker with the appropriate
configuration, you will develop a solution that controls a drone
with Python. Further on, you will use Python on a Raspberry Pi 3
board to process commands and Python on Intel Boards (Joule, Edison
and Galileo). You will then connect to the MQTT broker, subscribe
to topics, send messages, and receive messages in Python. You will
also develop a solution that interacts with sensors in Java by
working with MQTT messages. Moving forward, you will work with an
asynchronous API with callbacks to make the sensors interact with
MQTT messages. Following the same process, you will develop an iOS
app with Swift 3, build a website that uses WebSockets to connect
to the MQTT broker, and control home automation devices with HTML5,
JavaScript code, Node.js and MQTT messages Style and approach This
step-by-step guide describes the MQTT protocol for your IoT
projects
Analyze data network like a professional by mastering Wireshark -
From 0 to 1337 About This Book * Master Wireshark and train it as
your network sniffer * Impress your peers and get yourself
pronounced as a network doctor * Understand Wireshark and its
numerous features with the aid of this fast-paced book packed with
numerous screenshots, and become a pro at resolving network
anomalies Who This Book Is For Are you curious to know what's going
on in a network? Do you get frustrated when you are unable to
detect the cause of problems in your networks? This is where the
book comes into play. Mastering Wireshark is for developers or
network enthusiasts who are interested in understanding the
internal workings of networks and have prior knowledge of using
Wireshark, but are not aware about all of its functionalities. What
You Will Learn * Install Wireshark and understand its GUI and all
the functionalities of it * Create and use different filters *
Analyze different layers of network protocols and know the amount
of packets that flow through the network * Decrypt encrypted
wireless traffic * Use Wireshark as a diagnostic tool and also for
network security analysis to keep track of malware * Troubleshoot
all the network anomalies with help of Wireshark * Resolve
latencies and bottleneck issues in the network In Detail Wireshark
is a popular and powerful tool used to analyze the amount of bits
and bytes that are flowing through a network. Wireshark deals with
the second to seventh layer of network protocols, and the analysis
made is presented in a human readable form. Mastering Wireshark
will help you raise your knowledge to an expert level. At the start
of the book, you will be taught how to install Wireshark, and will
be introduced to its interface so you understand all its
functionalities. Moving forward, you will discover different ways
to create and use capture and display filters. Halfway through the
book, you'll be mastering the features of Wireshark, analyzing
different layers of the network protocol, looking for any
anomalies. As you reach to the end of the book, you will be taught
how to use Wireshark for network security analysis and configure it
for troubleshooting purposes. Style and approach Every chapter in
this book is explained to you in an easy way accompanied by
real-life examples and screenshots of the interface, making it easy
for you to become an expert at using Wireshark.
Mosh- A new application which supports mobile shell technique, can
eliminate the regular issues of SSH session, capable of providing
the roaming facility, is the central element of this book. In
addition, this book also covers DHCP and DNS configuration for
networking and communication.
Networking Services QoS, Signaling, Processes Harry Perros The book
has been structured around the Next Generation Network (NGN)
framework, which separates the transport network, services, and
signaling protocols into the service stratum and the transport
stratum. The service stratum is the control plane for the
establishment of networking sessions, and the transport stratum is
the data plane over which the data of a networking service is
transported. Within this context, the author explains in detail the
signaling protocols used in the service stratum for setting up
networking services, and the Quality of Service (QoS) architectures
used in the transport network to guarantee QoS. Networking
Services: Provides a systematic coverage of the signaling and QoS
architectures for networking services. Explains topics such as SIP,
IMS, MPLS, DiffServ, LDP, RSVP-TE, congestion control, RACF, and
VPNs. Describes IMS-based architectures for popular networking
services such as VoIP, presence, instant messaging, video
conferencing, multimedia telephony, IPTV, and service and device
continuity. Describes queueing theory and simulation techniques
used to dimension the capacity of a networking service. Illustrates
the material with problems and projects Networking Service is a
textbook for graduate and senior undergraduate students in computer
science and computer engineering, and also a reference book for
networking engineers.
|
|