Listing 1 - 10 of 52 | << page >> |
Sort by
|
Choose an application
This work opens with an accessible introduction to computer networks, providing general definitions of commonly used terms in networking. This is followed by a detailed description of the OSI model, including the concepts of connection-oriented and connectionless communications. The text carefully elaborates the specific functions of each layer, along with what is expected of protocols operating at each layer. Next, the journey of a single packet, from source to destination, is described in detail. The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP, and InARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer, and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3, and Telnet. Important facts and definitions are highlighted in gray boxes found throughout the text.
Computer network protocols --- TCP/IP (Computer network protocol) --- OSI (Computer network standard) --- Computer networks --- Open System Interconnect (Computer network standard) --- Open System Interconnection (Computer network standard) --- Open Systems Interconnect (Computer network standard) --- Open Systems Interconnection (Computer network standard) --- Open Systems Interconnections (Computer network standard) --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Protocols, Computer network --- Standards --- Computer Communication Networks. --- Data transmission systems. --- Telecommunication. --- Information Systems Applications (incl. Internet). --- Input/Output and Data Communications. --- Communications Engineering, Networks. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Telecommunication systems --- Computer communication systems. --- Application software. --- Input-output equipment (Computers). --- Electrical engineering. --- Electric engineering --- Engineering --- Computer hardware --- Computer I/O equipment --- Computers --- Electronic analog computers --- Electronic digital computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Computer systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Input-output equipment --- Distributed processing
Choose an application
"This book: draws extensively on open-source intelligence and papers of record, primary sources from insurgent groups, including online documents and videos, and interviews with U.S. service members who have served in Iraq; examines the history of suicide bombing in Iraq and many other countries, theoretical perspectives on suicide bombing, and the varies factions that compromise the insurgency; and explores the ideology and theology of martyrdom supporting suicide bombers, their national origins and characteristics, and the prospects for a "third generation" of transnational jihadists forged in the crucible of Iraq."--BOOK JACKET.
Islam --- terrorisme --- Polemology --- Iraq --- Suicide bombers --- Suicide bombings --- Terrorism --- Insurgency --- Martyrdom --- Kamikazes (Attentats-suicides) --- Attentats-suicides --- Terrorisme --- Révoltes --- Martyre --- Islam. --- 855.5 Gewapende groeperingen --- 854 Terrorisme --- 855.1 Strategie --- Révoltes --- Bombings --- Suicide --- Bombers (Terrorists) --- Martyrdom (Islam) --- Muslim martyrs
Choose an application
Alphabetical cataloguing --- Subject indexing --- Asia --- Africa
Choose an application
Treaties --- Traités --- Termination --- Extinction --- -Termination --- -#RBIB:gift.1996.4 --- Agreements, International --- Conventions (Treaties) --- International agreements --- International law --- International obligations --- Law and legislation --- Termination. --- Traités --- #RBIB:gift.1996.4 --- Termination of treaties --- Treaties - - Termination --- -Treaties
Choose an application
This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Data Encryption. --- Data Storage Representation. --- Cloud computing --- Security measures. --- Electronic data processing --- Web services --- Distributed processing --- Cryptology. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers
Choose an application
This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed "how-to" instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs.
Cisco IOS. --- Computer communication networks. --- Computer science. --- Routers (Computer networks). --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Routers (Computer networks) --- Network routers --- Cisco internetwork operating system --- Cisco internetworking operating system --- Computer communication systems. --- Computer Science. --- Computer Communication Networks. --- Routing (Computer network management) --- Equipment and supplies --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios to test the readers’ skills. Topics and features: Presents a uniquely accessible style, addressing router users’ everyday configuration needs without requiring a detailed knowledge of the underlying theory Discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips Explains in detail the steps required to configure different protocols on Cisco routers, outlining when it would be necessary to invoke each procedure Includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW) Provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW) This must-have collection of “how-to” instructions will prove to be an invaluable reference to anyone seeking to learn about Cisco routers configuration, whether they be field network engineers handling Cisco routers, or students working on Cisco routers in their labs. Dr. Mohammed M. Alani is Provost and Associate Professor of Computer Engineering at Al-Khawarizmi International College, Abu Dhabi, UAE. His other publications include the Springer titles Elements of Cloud Computing Security, and Guide to OSI and TCP/IP Models.
Computer science. --- Computer communication systems. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Routers (Computer networks) --- Cisco IOS. --- Network routers --- Cisco internetwork operating system --- Cisco internetworking operating system --- Routing (Computer network management) --- Equipment and supplies --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book explores the position of Islamic theology and jurisprudence towards people with disabilities. It investigates how early and modern Muslim scholars tried to reconcile their existence with the concept of a merciful God, and also looks at how people with disabilities might live a dignified and productive life within an Islamic context.In his analysis of Islamic Theology, Ghaly pays attention to how theologians, philosophers and Sufis reflected on the purposes behind the existence of this phenomenon, and how to reconcile the existence of disability with specific divine attributes and an All-Merciful God. Simultaneously exploring the perspective of Muslim jurists, the book focuses on how people with disabilities can lead a dignified life in the financial and non-financial sense, in an extensive analysis of topics such as the human dignity of people with disabilities and the role of Greek physiognomy, their employability, medical treatment, social life with main focus on marriage-related issues, financial life and means of living.Investigating the topic of disability from early and modern Islamic perspectives, the author provides an analysis of Muslim discussions on various bioethical questions. As such, this book will be of great relevance to current heated debates on human rights of people with disabilities, as well as providing a valuable resource for courses on Multicultural bioethics, Islamic theology, Islamic law and medical anthropology.
Disabilities --- Islam and justice --- People with disabilities --- Capacity and disability --- Islam --- Religious aspects --- Legal status, laws, etc --- Islamic countries --- #SBIB:316.331H360 --- #SBIB:316.331H421 --- #SBIB:39A10 --- #SBIB:39A9 --- Cripples --- Disabled --- Disabled people --- Disabled persons --- Handicapped --- Handicapped people --- Individuals with disabilities --- People with physical disabilities --- Persons with disabilities --- Physically challenged people --- Physically disabled people --- Physically handicapped --- Persons --- Sociology of disability --- Justice and Islam --- Justice --- Religious aspects&delete& --- Godsdienst en menselijk leven: algemeen --- Morfologie van de godsdiensten: Islam --- Antropologie: religie, riten, magie, hekserij --- Medische antropologie / gezondheid / handicaps --- Disabilities - Religious aspects --- People with disabilities - Legal status, laws, etc
Choose an application
851 Burgeroorlogen --- 855.4 Militaire interventies --- 845 Religie --- #A0511PSA
Choose an application
Listing 1 - 10 of 52 | << page >> |
Sort by
|