Deschideți meniul de navigareScribd Logo
roChange LanguageSchimbați Limba

Limbă

  • English
  • español
  • português
  • Deutsch
  • français
  • Русский
  • italiano
  • român(selectat)
  • Bahasa Indonesia
Aflați mai multe
ÎncărcațiCitiți gratuit pentru 30 zile
Setări Utilizator

Bine ați venit la Scribd!

  • Încărcați
  • Limbă (RO)
  • Beneficiile Scribd
  • Invită prieteni
  • Întrebări frecvente și asistență
  • Autentificare
  • Ce este Scribd?
  • Cărți
  • Cărți audio
  • Reviste
  • Podcast-uri
  • Partitură
  • Documente
  • Instantanee
  1. Răsfoiți

Rețele de calculatoare

Bestselleruri în Rețele de calculatoare

Vizualizați mai multe
Skip carousel
carousel previouscarousel next
  • Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

    Autor Lee Barken
  • Snort Intrusion Detection 2.0

    Autor Syngress
  • The Internet of Things: The MIT Press Essential Knowledge Series

    Autor Samuel Greengard
  • TCP/IP Sockets in C: Practical Guide for Programmers

    Autor Michael J. Donahoo
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    Autor TJ O'Connor
  • USB Complete: The Developer's Guide

    Autor Jan Axelson
  • TCP/IP Sockets in Java: Practical Guide for Programmers

    Autor Kenneth L. Calvert
  • The Internet For Dummies

    Autor John R. Levine
  • Buffer Overflow Attacks: Detect, Exploit, Prevent

    Autor Jason Deckard
  • Linksys WRT54G Ultimate Hacking

    Autor Paul Asadoorian
  • Optical Networks: A Practical Perspective

    Autor Rajiv Ramaswami
  • Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands

    Autor Triumph Books
  • Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool

    Autor Gabriele Giuseppini
  • Embedded Ethernet and Internet Complete

    Autor Jan Axelson
  • Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems

    Autor Jan Axelson
  • Kermit: A File Transfer Protocol

    Autor Bozzano G Luisa
  • Configuring Cisco Voice Over IP 2E

    Autor Syngress
  • Network+ Study Guide & Practice Exams

    Autor Robert Shimonski
  • WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

    Autor Chris Hurley
  • Administering Informix Dynamic Server: Building the Foundation

    Autor Carlton Doe
  • Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide

    Autor Lee Allen
  • Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network

    Autor Michael Gregg
  • Designing A Wireless Network

    Autor Syngress
  • Wireshark & Ethereal Network Protocol Analyzer Toolkit

    Autor Angela Orebaugh
  • XSS Attacks: Cross Site Scripting Exploits and Defense

    Autor Seth Fogie
  • Node Web Development

    Autor David Herron
  • WebSphere Application Server: Step by Step

    Autor Owen Cline
  • Tor and the Dark Art of Anonymity

    Autor Lance Henderson
  • WarDriving and Wireless Penetration Testing

    Autor Chris Hurley
  • The Epic Struggle of the Internet of Things

    Autor Bruce Sterling

Toate despre Rețele de calculatoare

Vizualizați mai multe
Skip carousel
carousel previouscarousel next
  • Cloud Networking: Understanding Cloud-based Data Center Networks

    Autor Gary Lee
  • Internet of Things: Principles and Paradigms

    Autor Elsevier Books Reference
  • 5G NR: Architecture, Technology, Implementation, and Operation of 3GPP New Radio Standards

    Autor Sassan Ahmadi
  • Networking For Dummies: 11th Edition

    Autor Doug Lowe
  • Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)

    Autor Peter Bradley
  • The Internet For Dummies

    Autor John R. Levine
  • CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE

    Autor ATTILA KOVACS
  • CCNA 200 301

    Autor Samuel Foster
  • Explain the Cloud Like I’m 10

    Autor Todd Hoff
  • Darknet: Into the Deepest Mysteries of the Internet

    Autor Abhineet Sagar
  • Networking For Dummies

    Autor Doug Lowe
  • The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime

    Autor Scott Augenbaum
  • Networking All-in-One For Dummies

    Autor Doug Lowe
  • A Beginner's Guide to Ham Radio

    Autor George Freeman
  • Learning Microsoft Azure

    Autor Geoff Webber-Cross
  • CompTIA Security+

    Autor Samuel Foster
  • Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks

    Autor Syngress
  • HACKING WITH KALI LINUX: Penetration Testing Hacking Bible

    Autor Alex Wagner
  • Learning Python Network Programming

    Autor Dr. M. O. Faruque Sarker
  • Building Telephony Systems with OpenSIPS - Second Edition

    Autor Goncalves Flavio E.
  • TCP/IP Embedded Internet Applications

    Autor Edward Insam
  • Amazon Web Services (AWS) Interview Questions and Answers

    Autor Tech Interviews
  • Data Protection and the Cloud: Are the risks too great?

    Autor Paul Ticher
  • Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands

    Autor Triumph Books
  • Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security

    Autor Hans Weber
  • Microservices with Azure

    Autor Rahul Rai
  • Tor and the Dark Art of Anonymity

    Autor Lance Henderson
  • Cisco ACI Cookbook

    Autor Stuart Fordham
  • Network+ Study Guide & Practice Exams

    Autor Robert Shimonski
  • Small Cell and CRAN Deployment Report

    Autor Wade Sarver

Recent adăugate

Vizualizați mai multe
Skip carousel
carousel previouscarousel next
  • Top Secret Methods for Getting Internet Security and Privacy

    Autor Mark Millery
  • Docker Demystified: Learn How to Develop and Deploy Applications Using Docker

    Autor Saibal Ghosh
  • Latest Technologies for IT Industry 2021 – A Research Paper

    Autor prosenjit sengupta
  • 5G NR: The Next Generation Wireless Access Technology

    Autor Erik Dahlman
  • RIP full version: Routing Information Protocol

    Autor Mulayam Singh
  • A Cable Here A Cabel There A Cable Everywhere

    Autor Randall M. Rueff
  • Evaluation of Some Intrusion Detection and Vulnerability Assessment Tools

    Autor Dr. Hedaya Mahmood Alasooly
  • What is Blockchain?

    Autor John Hargrave
  • Tor and the Dark Art of Anonymity

    Autor Lance Henderson
  • Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux and Penetration Testing

    Autor Abraham K White
  • Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

    Autor Hans Weber
  • Swarm Intelligence for Resource Management in Internet of Things

    Autor Elsevier Books Reference
  • Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

    Autor Hans Weber
  • Bitcoin Blockchain: Protocol for Micropayments

    Autor Kapil Jain
  • How Does Wi-Fi Work?

    Autor Mark Weakland
  • Building Full Linux Mail Server Solution with Virtual Domains and Users

    Autor Dr. Hedaya Mahmood Alasooly
  • 5 G Technologies

    Autor Ajit Singh
  • Penetration Testing

    Autor Robert Karamagi
  • CCNA 200 301

    Autor Samuel Foster
  • CCNA study guide

    Autor Samuel Foster
  • CompTIA Security+

    Autor Samuel Foster
  • Safer @ Home with pfSense®

    Autor Michael Lines
  • Securing Wireless Network

    Autor P.S Tecwriden
  • Bitcoin Basics

    Autor P.S Tecwriden
  • Microsoft Exchange Server 2016 Administration Guide: Deploy, Manage and Administer Microsoft Exchange Server 2016

    Autor Edward Van Biljon
  • Hacking With Linux 2020:A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux

    Autor Joseph Kenna
  • Advanced Antenna Systems for 5G Network Deployments: Bridging the Gap Between Theory and Practice

    Autor Henrik Asplund
  • Darknet: Into the Deepest Mysteries of the Internet

    Autor Abhineet Sagar
  • Randomly Deployed Wireless Sensor Networks

    Autor Xi Chen
  • Overview of Some Windows and Linux Intrusion Detection Tools

    Autor Dr. Hidaia Mahmood Alassouli
Vizualizare toate din Rețele de calculatoare
Încărcare

Navigare rapidă

  • Pagina principală
  • Cărți
  • Cărți audio
  • Documente

Meniu subsol

Înapoi la început

Despre

  • Despre Scribd
  • Presă
  • Blogul nostru
  • Alăturați-vă echipei noastre!
  • Contactați-ne
  • Alăturați-vă azi
  • Invitați prieteni
  • Cadouri
  • Scribd pentru Companii

Asistență

  • Ajutor / Întrebări frecvente
  • Accesibilitate
  • Ajutor achiziționare
  • AdChoices
  • Editori

Juridic

  • Termeni
  • Confidențialitate
  • Drepturi de autor

Rețele sociale

    • Scribd - Descărcați din App Store
    • Scribd - Descărcați de pe Google Play
  • Drepturi de autor © 2021 Scribd Inc.
  • .
  • Răsfoiți cărți
  • .
  • Director site
  • .
  • Limba site-ului: