Leanpub Header

Skip to main content

Filters

Category: "Networking"

Books

  1. C++ Networking 101
    Unlocking Sockets, Protocols, VPNs, and Asynchronous I/O with 75+ sample programs
    GitforGits | Asian Publishing House

    The book then guides readers through Virtual Private Networks (VPNs), detailing their importance, functioning, and distinct types of VPNs. It explores wireless networking and asynchronous programming, providing clear illustrations of WiFi, Bluetooth, and Zigbee setup using C++. It covers critical wireless standards and security protocols.

  2. Python Networking 101
    Navigating essentials of networking, socket programming, AsyncIO, network testing, simulations and Ansible
    GitforGits | Asian Publishing House

    "Python Networking 101" is designed to provide readers with the skills required to excel as a network administrators. The practical approach and real-world examples ensure readers can implement the techniques learned in their professional careers.

  3. Mastering Python Network Automation
    Automating Container Orchestration, Configuration, and Networking with Terraform, Calico, HAProxy, and Istio
    GitforGits | Asian Publishing House

    With "Mastering Python Network Automation," you can streamline container orchestration, configuration management, and resilient networking with Python and its libraries, allowing you to emerge as a skilled network engineer or a strong DevOps professional

  4. Mastering C++ Network Automation
    Run Automation across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking
    GitforGits | Asian Publishing House

    From setting up a network automation environment to automating configuration management and working with containers and container orchestration tools such as Kubernetes, the book covers a wide range of topics.

  5. Mastering Go Network Automation
    Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter
    GitforGits | Asian Publishing House

    This book provides a one-stop solution for all of your network administration needs, with comprehensive coverage of automation, security, containerization, monitoring, and performance testing.

  6. Service Provider Networks
    Design and Architecture Perspective
    Orhan Ergun

    Service Provider Networks in many ways are unique networks. Many services might be serving millions of customers, so there might be many paths between different parts of the network as you will see in the book. There are many different types of Service Providers but there is very little information about some of them.

  7. Linux Essentials for Hackers & Pentesters
    Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands
    GitforGits | Asian Publishing House

    Manipulating text, managing networks, understanding ownership and permissions, writing programs in BASH shell, and using proxies, VPNs, and wireless networks are all covered. This book will teach you the fundamentals of hacking, including Linux commands and techniques to break into web applications and create your own hacking Linux toolkit.

  8. Rust for Network Programming and Automation
    Learn to Design and Automate Networks, Performance Optimization, and Packet Analysis with low-level Rust
    GitforGits | Asian Publishing House

    You'll learn to set up and configure various network protocols, including TCP/IP, as well as conduct packet and network analysis, quantify key performance indicators, and automate monitoring alerts and notifications. To learn more about Rust programming for networking, this book is a great resource for network engineers and administrators.

  9. The Hybrid Cloud Handbook for AWS
    AWS Cloud Networking for Traditional Network Engineers
    Tim McConnaughy

    Hybrid networking is the future of network engineering. Those who can blend traditional and cloud networking will have the keys to succeed as the technology continues to shift. Are you ready?

  10. Spanning roughly 250 pages with step-by-step screenshots-based instructions, this book will guide you on managing a daloRADIUS deployed server to run FreeRADIUS AAA system. with daloRADIUS you can easily and quickly manage your FreeRADIUS deployment, thanks to flexible user interface and navigation flow.

  11. Build Your Own Redis with C/C++
    Network programming, data structures, and low-level C.
    build-your-own.org

    Build real-world software by coding a Redis server from scratch.Network programming. The next level of programming is programming for multiple machines. Think HTTP servers, RPCs, databases, distributed systems.Data structures. Redis is the best example of applying data structures to real-world problems. Why stop at theoretical, textbook-level knowledge when you can learn from production software?Low-level C. C was, is, and will be widely used for systems programming and infrastructure software. It’s a gateway to many low-level projects.From scratch. A quote from Richard Feynman: “What I cannot create, I do not understand”. You should test your learning with real-world projects!

  12. Dieses Buch hilft ihnen, mit NetFlow und IPFIX den Datenverkehr in ihrem Netzwerk zu erfassen und auszuwerten. Alles was Sie benötigen ist ein Server oder eine VM mit genügend Plattenplatz und den Willen selbst Hand anzulegen.

  13. Programming of distributed and Web crowdsourcing applications using mobile agents and the JavaScript Agent Machine can be so easy! Less than 100 lines code are required to create a multi-agent system. Only basic JavaScript knowledge is required.

  14. Hacking Master Plan
    Learn hacking tips and tricks
    Crt Mori

    Joncy Ber has these low-cost Raspberry Pi computers: can he hack a bank to get more money? He uses social engineering to exploit everyday people's online behavior and other hacking tips and tricks to break into secure systems. Can the authorities, or someone worse, catch up with him?

  15. CyberDefensewithMicrosoftDefender
    Lab Guide
    Dave Kawula, Cary Sun, Cristal Kawula, John O'Neill Sr., and Emile Cabot

    In today’s world defending against attacks that originate from both inside and outside your organization is critical. Unfortunately, threat actors are preying on organizations lagging with their Cyber Security defenses and becoming easy targets.