0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (9)
  • R250 - R500 (17)
  • R500+ (359)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Wireless Digital Communications: Architecture, Design and Applications (Hardcover): Rafael Barrett Wireless Digital Communications: Architecture, Design and Applications (Hardcover)
Rafael Barrett
R2,957 R2,685 Discovery Miles 26 850 Save R272 (9%) Ships in 18 - 22 working days
Industrial Communication Networks (Paperback): Hamed a Idowu Pmp Industrial Communication Networks (Paperback)
Hamed a Idowu Pmp
R855 Discovery Miles 8 550 Ships in 18 - 22 working days
Learning Node.js Development - Learn the fundamentals of Node.js, and deploy and test Node.js applications on the web... Learning Node.js Development - Learn the fundamentals of Node.js, and deploy and test Node.js applications on the web (Paperback)
Andrew Mead
R1,208 Discovery Miles 12 080 Ships in 18 - 22 working days

A comprehensive, easy-to-follow guide to creating complete Node apps and understanding how to build, deploy, and test your own apps. Key Features Entirely project-based and practical Explains the "Why" of Node.js features, not just the "how", providing you with a deep understanding and enabling you to easily apply concepts in your own applications Covers the full range of technologies around Node.js - NPM, version control with Git, and much more Book DescriptionLearning Node.js Development is a practical, project-based book that provides you with all you need to get started as a Node.js developer. Node is a ubiquitous technology on the modern web, and an essential part of any web developers' toolkit. If you are looking to create real-world Node applications, or you want to switch careers or launch a side project to generate some extra income, then you're in the right place. This book has been written around a single goal-turning you into a professional Node developer capable of developing, testing, and deploying real-world production applications. Learning Node.js Development is built from the ground up around the latest version of Node.js (version 9.x.x). You'll be learning all the cutting-edge features available only in the latest software versions. This book cuts through the mass of information available around Node and delivers the essential skills that you need to become a Node developer. It takes you through creating complete apps and understanding how to build, deploy, and test your own Node apps. It maps out everything in a comprehensive, easy-to-follow package designed to get you up and running quickly. What you will learn Learn the fundamentals of Node Build apps that respond to user input Master working with servers Learn how to test and debug applications Deploy and update your apps in the real world Create responsive asynchronous web applications Who this book is forThis book targets anyone looking to launch their own Node applications, switch careers, or freelance as a Node developer. You should have a basic understanding of JavaScript in order to follow this course.

Learn Ethical Hacking from Scratch - Your stepping stone to penetration testing (Paperback): Zaid Sabih Learn Ethical Hacking from Scratch - Your stepping stone to penetration testing (Paperback)
Zaid Sabih
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is forLearning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.

Wireshark 2 Quick Start Guide - Secure your network through protocol analysis (Paperback): Charit Mishra Wireshark 2 Quick Start Guide - Secure your network through protocol analysis (Paperback)
Charit Mishra
R803 Discovery Miles 8 030 Ships in 18 - 22 working days

Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Book DescriptionWireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. What you will learn Learn how TCP/IP works Install Wireshark and understand its GUI Creation and Usage of Filters to ease analysis process Understand the usual and unusual behaviour of Protocols Troubleshoot network anomalies quickly with help of Wireshark Use Wireshark as a diagnostic tool for network security analysis to identify source of malware Decrypting wireless traffic Resolve latencies and bottleneck issues in the network Who this book is forIf you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.

Hands-On MQTT Programming with Python - Work with the lightweight IoT protocol in Python (Paperback): Gaston C Hillar Hands-On MQTT Programming with Python - Work with the lightweight IoT protocol in Python (Paperback)
Gaston C Hillar
R947 Discovery Miles 9 470 Ships in 18 - 22 working days

Explore the features included in the latest versions of MQTT for IoT and M2M communications and use them with modern Python 3. Key Features Make your connected devices less prone to attackers by understanding security mechanisms Take advantage of MQTT features for IoT and Machine-to-Machine communications The only book that covers MQTT with a single language, Python Book DescriptionMQTT is a lightweight messaging protocol for small sensors and mobile devices. This book explores the features of the latest versions of MQTT for IoT and M2M communications, how to use them with Python 3, and allow you to interact with sensors and actuators using Python. The book begins with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. You will use different utilities and diagrams to understand the most important concepts related to MQTT. You will learn to make all the necessary configuration to work with digital certificates for encrypting all data sent between the MQTT clients and the server. You will also work with the different Quality of Service levels and later analyze and compare their overheads. You will write Python 3.x code to control a vehicle with MQTT messages delivered through encrypted connections (TLS 1.2), and learn how leverage your knowledge of the MQTT protocol to build a solution based on requirements. Towards the end, you will write Python code to use the PubNub cloud-based real-time MQTT provider to monitor a surfing competition. In the end, you will have a solution that was built from scratch by analyzing the requirements and then write Python code that will run on water-proof IoT boards connected to multiple sensors in surfboards. What you will learn Learn how MQTT and its lightweight messaging system work Understand the MQTT puzzle: clients, servers (formerly known as brokers), and connections Explore the features included in the latest versions of MQTT for IoT and M2M communications Publish and receive MQTT messages with Python Learn the difference between blocking and threaded network loops Take advantage of the last will and testament feature Work with cloud-based MQTT interfaces in Python Who this book is forThis book is for developers who want to learn about the MQTT protocol for their IoT projects. Prior knowledge of working with IoT and Python will be helpful.

Mastering Python Networking - Your one-stop solution to using Python for network automation, DevOps, and Test-Driven... Mastering Python Networking - Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition (Paperback, 2nd Revised edition)
Eric Chou
R1,342 Discovery Miles 13 420 Ships in 18 - 22 working days

Publisher's Note: This edition from 2018 is outdated. A new third edition, updated for 2020 featuring Python 3.8, with coverage extended to include Azure, AWS, and Ansible 2.8, and data analysis using Elastic Stack has just been published. Master the art of using Python for a diverse range of network engineering tasks Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively Use Python for network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python Book DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In this second edition of Mastering Python Networking, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This book begins by reviewing the basics of Python and teaches you how Python can interact with both legacy and API-enabled network devices. As you make your way through the chapters, you will then learn to leverage high-level Python packages and frameworks to perform network engineering tasks for automation, monitoring, management, and enhanced security. In the concluding chapters, you will use Jenkins for continuous network integration as well as testing tools to verify your network. By the end of this book, you will be able to perform all networking tasks with ease using Python. What you will learn Use Python libraries to interact with your network Integrate Ansible 2.5 using Python to control Cisco, Juniper, and Arista eAPI network devices Leverage existing frameworks to construct high-level APIs Learn how to build virtual networks in the AWS Cloud Understand how Jenkins can be used to automatically deploy changes in your network Use PyTest and Unittest for Test-Driven Network Development Who this book is forMastering Python Networking is for network engineers and programmers who want to use Python for networking. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.

Cacti Beginner's Guide - (Paperback, 2nd Revised edition): Thomas Urban Cacti Beginner's Guide - (Paperback, 2nd Revised edition)
Thomas Urban
R1,205 Discovery Miles 12 050 Ships in 18 - 22 working days

A comprehensive guide to learning Cacti and using it to implement performance measurement and reporting within a Network Operations Center About This Book * A complete Cacti book that focuses on the basics as well as the advanced concepts you need to know for implementing a Network Operations Center * A step-by-step Beginner's Guide with detailed instructions on how to create and implement custom plugins * Written by Thomas Urban - creator of the "Cereus" and "NMID" plugins for Cacti known as Phalek in the Cacti forum Who This Book Is For If you are a network operator and want to use Cacti for implementing performance measurement for trending, troubleshooting, and reporting purposes, then this book is for you. You only need to know the basics of network management and SNMP. What You Will Learn * Setting up Cacti on Linux and Windows systems * Extending the core functionality by using the plugin architecture * Building your own custom plugins * Creating your own custom data input method to retrieve data from your systems * Using SNMP, SSH, and WMI to retrieve remote performance data * Designing and create enterprise-class reports with the reporting plugins * Implementing threshold-based alerting using the Thold plugin * Automating common administrative tasks utilizing the command-line interface and the automate functionality * Migrating Cacti to new servers * Building a multi remote-poller environment In Detail Cacti is a performance measurement tool that provides easy methods and functions for gathering and graphing system data. You can use Cacti to develop a robust event management system that can alert on just about anything you would like it to. But to do that, you need to gain a solid understanding of the basics of Cacti, its plugin architecture, and automation concepts. Cacti Beginner's Guide will introduce you to the wide variety of features of Cacti and will guide you on how to use them for maximum effectiveness. Advanced topics such as the plugin architecture and Cacti automation using the command-line interface will help you build a professional performance measurement system. Designed as a beginner's guide, the book starts off with the basics of installing and using Cacti, and also covers the advanced topics that will show you how to customize and extend the core Cacti functionalities. The book offers essential tutorials for creating advanced graphs and using plugins to create enterprise-class reports to show your customers and colleagues. From data templates to input methods and plugin installation to creating your own customized plugins, this book provides you with a rich selection of step-by-step instructions to reach your goals. It covers all you need to know to implement professional performance measurement techniques with Cacti and ways to fully customize Cacti to fit your needs. You will also learn how to migrate Cacti to new servers. Lastly you will also be introduced to the latest feature of building a scalable remote poller environment. By the end of the book, you will be able to implement and extend Cacti to monitor, display, and report the performance of your network exactly the way you want. Style and approach Written for beginners to Cacti, this book contains step-by-step instructions and hands-on tutorials for network operators to learn how to implement and use the core Cacti functions.

Network Fighter (Paperback): Ervin Clane Network Fighter (Paperback)
Ervin Clane
R1,569 Discovery Miles 15 690 Ships in 18 - 22 working days
Adding more PHY to the MAC - Exploiting Physical Layer Effects in Wireless Networks (Paperback): Michael Konig Adding more PHY to the MAC - Exploiting Physical Layer Effects in Wireless Networks (Paperback)
Michael Konig
R795 Discovery Miles 7 950 Ships in 18 - 22 working days
MQTT Essentials - A Lightweight IoT Protocol (Paperback): Gaston C Hillar MQTT Essentials - A Lightweight IoT Protocol (Paperback)
Gaston C Hillar
R1,033 Discovery Miles 10 330 Ships in 18 - 22 working days

Send and receive messages with the MQTT protocol for your IoT solutions. About This Book * Make your connected devices less prone to attackers by understanding practical security mechanisms * Dive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examples * Learn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examples Who This Book Is For This book is a great resource for developers who want to learn more about the MQTT protocol to apply it to their individual IoT projects. Prior knowledge of working with IoT devices is essential. What You Will Learn * Understand how MQTTv3.1 and v3.1.1 works in detail * Install and secure a Mosquitto MQTT broker by following best practices * Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate * Explore the features included in MQTT for IoT and Machine-to-Machine communications * Publish and receive MQTT messages with Python, Java, Swift, JavaScript, and Node.js * Implement the security best practices while setting up the MQTT Mosquitto broker In Detail This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages Style and approach This step-by-step guide describes the MQTT protocol for your IoT projects

v6 - Everything You Need to Know about IPv6 to Save Your Job, Save Your Sanity, and Make More Money (Paperback): Richard K... v6 - Everything You Need to Know about IPv6 to Save Your Job, Save Your Sanity, and Make More Money (Paperback)
Richard K Ullmann
R681 Discovery Miles 6 810 Ships in 18 - 22 working days
Master Excel - All About Formulas and Functions (Paperback): Thomas Clayton Master Excel - All About Formulas and Functions (Paperback)
Thomas Clayton
R157 Discovery Miles 1 570 Ships in 18 - 22 working days
Journal of Ict Standardization (Paperback): Anand R Prasad Journal of Ict Standardization (Paperback)
Anand R Prasad
R897 Discovery Miles 8 970 Ships in 18 - 22 working days
Mastering Wireshark (Paperback): Charit Mishra Mastering Wireshark (Paperback)
Charit Mishra
R1,296 Discovery Miles 12 960 Ships in 18 - 22 working days

Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book * Master Wireshark and train it as your network sniffer * Impress your peers and get yourself pronounced as a network doctor * Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn * Install Wireshark and understand its GUI and all the functionalities of it * Create and use different filters * Analyze different layers of network protocols and know the amount of packets that flow through the network * Decrypt encrypted wireless traffic * Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware * Troubleshoot all the network anomalies with help of Wireshark * Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.

Mosh (Mobile Shell) - A New Era of Remote Access (Paperback): Aditya Raj Mosh (Mobile Shell) - A New Era of Remote Access (Paperback)
Aditya Raj
R165 Discovery Miles 1 650 Ships in 18 - 22 working days

Mosh- A new application which supports mobile shell technique, can eliminate the regular issues of SSH session, capable of providing the roaming facility, is the central element of this book. In addition, this book also covers DHCP and DNS configuration for networking and communication.

Bind DNS Administration Reference (Paperback, 2nd ed.): Jeremy C. Reed Bind DNS Administration Reference (Paperback, 2nd ed.)
Jeremy C. Reed
R705 Discovery Miles 7 050 Ships in 18 - 22 working days
Master Excel - Primary Interactions with the Excel (Paperback): Thomas Clayton Master Excel - Primary Interactions with the Excel (Paperback)
Thomas Clayton
R156 Discovery Miles 1 560 Ships in 18 - 22 working days
Enterprise IPv6 for Enterprise Networks (Paperback): Mohammed Fathe Mubin, Mike Westley Enterprise IPv6 for Enterprise Networks (Paperback)
Mohammed Fathe Mubin, Mike Westley; Introduction by Rayne Alfred Collins
R212 Discovery Miles 2 120 Ships in 18 - 22 working days
Hacking - Beginners Guide to How to Hack (Paperback): Jeff Addison Hacking - Beginners Guide to How to Hack (Paperback)
Jeff Addison
R303 Discovery Miles 3 030 Ships in 18 - 22 working days
CCNA Routing & Switching By Example (Paperback): M Irfan Basharat CCNA Routing & Switching By Example (Paperback)
M Irfan Basharat
R1,011 Discovery Miles 10 110 Ships in 18 - 22 working days
Gnu Anubis Reference Manual (Paperback): Wojciech Polak, Sergey Poznyakoff Gnu Anubis Reference Manual (Paperback)
Wojciech Polak, Sergey Poznyakoff
R502 Discovery Miles 5 020 Ships in 18 - 22 working days
Learning Python Network Programming (Paperback): Dr M O Faruque Sarker, Sam Washington Learning Python Network Programming (Paperback)
Dr M O Faruque Sarker, Sam Washington
R1,298 Discovery Miles 12 980 Ships in 18 - 22 working days

0

Networking Services - QoS, Signaling, Processes (Paperback): Harry Perros Networking Services - QoS, Signaling, Processes (Paperback)
Harry Perros
R789 Discovery Miles 7 890 Ships in 18 - 22 working days

Networking Services QoS, Signaling, Processes Harry Perros The book has been structured around the Next Generation Network (NGN) framework, which separates the transport network, services, and signaling protocols into the service stratum and the transport stratum. The service stratum is the control plane for the establishment of networking sessions, and the transport stratum is the data plane over which the data of a networking service is transported. Within this context, the author explains in detail the signaling protocols used in the service stratum for setting up networking services, and the Quality of Service (QoS) architectures used in the transport network to guarantee QoS. Networking Services: Provides a systematic coverage of the signaling and QoS architectures for networking services. Explains topics such as SIP, IMS, MPLS, DiffServ, LDP, RSVP-TE, congestion control, RACF, and VPNs. Describes IMS-based architectures for popular networking services such as VoIP, presence, instant messaging, video conferencing, multimedia telephony, IPTV, and service and device continuity. Describes queueing theory and simulation techniques used to dimension the capacity of a networking service. Illustrates the material with problems and projects Networking Service is a textbook for graduate and senior undergraduate students in computer science and computer engineering, and also a reference book for networking engineers.

VPNs and NAT for Cisco Networks - A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT (Paperback): Stuart D Fordham VPNs and NAT for Cisco Networks - A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT (Paperback)
Stuart D Fordham
R482 Discovery Miles 4 820 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Tour of Computer Science Concepts
Mark Gilder, Judith O'Rourke, … Paperback R2,110 R1,807 Discovery Miles 18 070
Expert .Net Delivery Using NAnt and…
Marc Holmes Hardcover R1,487 Discovery Miles 14 870
Novel Theories and Applications of…
Zuopeng (Justin) Zhang Hardcover R5,328 Discovery Miles 53 280
Digital Dharma - How AI Can Elevate…
Deepak Chopra Paperback R440 R393 Discovery Miles 3 930
Python Machine Learning - A Practical…
Brandon Railey Hardcover R685 R614 Discovery Miles 6 140
Introducing Delphi Programming - Theory…
John Barrow, Linda Miller, … Paperback  (1)
R751 Discovery Miles 7 510
Shaping the Future Through…
Kai Jakobs Hardcover R6,199 Discovery Miles 61 990
Misbelief - What Makes Rational People…
Dan Ariely Paperback R350 R317 Discovery Miles 3 170
Program Construction - Calculating…
Roland Backhouse Paperback R2,460 Discovery Miles 24 600
Python for Data Analysis - Learn the…
Robert Campbell Hardcover R758 R667 Discovery Miles 6 670

 

Partners