Computer Networks 4th Ed - Andrew S. Tanenbaum.chm

Links :
or
========
TCP/IP Network Administration.
By Craig Hunt; ISBN 1-56592-322-7, 630 pages.
Second Edition, December 1997.
Table of Contents
Preface
Chapter 1: Overview of TCP/IP
Chapter 2: Delivering the Data
Chapter 3: Network Services
Chapter 4: Getting Started
Chapter 5: Basic Configuration
Chapter 6: Configuring the Interface
Chapter 7: Configuring Routing
Chapter 8: Configuring DNS Name Service
Chapter 9: Configuring Network Servers
Chapter 10: sendmail
Chapter 11: Troubleshooting TCP/IP
Chapter 12: Network Security
Chapter 13: Internet Information Resources
http://www.ye14.org/up14//view.php?file=c2bb5d1099
http://www.ye14.org/up14//uploads/files/ye-c2bb5d1099.zip
===========
http://i212.photobucket.com/albums/cc94/Dl4All/album3/TCP-IP-
Tutorial-Technical-Overview.jpg
TCP/IP Tutorial and Technical Overview
================================
Part 1. Core TCP/IP protocols
==================================
Chapter 1. Architecture, history, standards, and trends
Chapter 2. Network interfaces
Chapter 3. Internetworking protocols
Chapter 4. Transport layer protocols
Chapter 5. Routing protocols
Chapter 6. IP multicast
Chapter 7. Mobile IP
Chapter 8. Quality of service
Chapter 9. IP version 6
Chapter 10. Wireless IP.
==================================
Part 2. TCP/IP application protocols
====================================
Chapter 11. Application structure and programming interfaces
Chapter 12. Directory and naming protocols
Chapter 13. Remote execution and distributed computing
Chapter 14. File-related protocols
Chapter 15. Mail applications
Chapter 16. The Web.
Chapter 17. Network management
Chapter 18. Wireless Application Protocol
Chapter 19. Presence over IP
==================================
Part 3. Advanced concepts and new technologies
=====================================
Chapter 20. Voice over Internet Protocol
Chapter 21. Internet Protocol Television
Chapter 22. TCP/IP security
Chapter 23. Port based network access control
Chapter 24. Availability, scalability, and load balancing
================================
Appendix A. Multiprotocol Label Switching
Abbreviations and acronyms
the derict link of book is
=============

Publisher: O'Reilly
Number Of Pages: 442
Publication Date: 1997-02
ISBN-10 / ASIN: 1565922271
ISBN-13 / EAN: 9781565922273
Binding: Paperback
=============
Table of Contents
Preface 1. Why Networked Java?
* What Can a Network Program Do?
* But Wait!-There's More!
2. Basic Network Concepts
* Networks
* The Layers of a Network
* IP, TCP, and UDP
* The Internet
* The Client/Server Model
* Internet Standards
3. Basic Web Concepts
* URIs
* HTML, SGML, and XML
* HTTP
* MIME
* CGI
* Applets and Security
4. Java I/O
* Output Streams
* Input Streams
* Filter Streams
* Readers and Writers
5. Threads
* Running Threads
* Returning Information from a Thread
* Synchronization
* Deadlock
* Thread Scheduling
* Thread Pools
6. Looking Up Internet Addresses
* DNS, IP Addresses, and All That
* The InetAddress Class
* Some Useful Programs
7. Retrieving Data with URLs
* The URL Class
* The URLEncoder and URLDecoder Classes
* Communicating with CGIs and Servlets Through GET
* Accessing Password-Protected Sites
8. HTML in Swing
* HTML on Components
* JEditorPane
* Parsing HTML
9. The Network Methods of java.applet.Applet
* Using java.applet.Applet to Download Data
* The ImageObserver Interface
* The MediaTracker Class
* Network Methods of java.applet.AppletContext
10. Sockets for Clients
* Socket Basics
* Investigating Protocols with Telnet
* The Socket Class
* Socket Exceptions
* Examples
11. Sockets for Servers
* The ServerSocket Class
* Some Useful Servers
12. Secure Sockets
* Secure Communications
* Creating Secure Client Sockets
* Methods of the SSLSocket Class
* Creating Secure Server Sockets
* Methods of the SSLServerSocket Class
13. UDP Datagrams and Sockets
* The UDP Protocol
* The DatagramPacket Class
* The DatagramSocket Class
* Some Useful Applications
14. Multicast Sockets
* What Is a Multicast Socket?
* Working with Multicast Sockets
* Two Simple Examples
15. The URLConnection Class
* Opening URLConnections
* Reading Data from a Server
* Reading the Header
* Configuring the Connection
* Configuring the Client Request MIME Header
* Writing Data to a Server
* Content Handlers
* The Object Methods
* Security Considerations for URLConnections
* Guessing MIME Types
* HttpURLConnection
* JarURLConnection
16. Protocol Handlers
* What Is a Protocol Handler?
* The URLStreamHandler Class
* Writing a Protocol Handler
* More Protocol Handler Examples and Techniques
* The URLStreamHandlerFactory Interface
17. Content Handlers
* What Is a Content Handler?
* The ContentHandler Class
* The ContentHandlerFactory Interface
* A Content Handler for an Image Format: image/x-fits
18. Remote Method Invocation
* What Is Remote Method Invocation?
* Implementation
* Loading Classes at Runtime
* The java.rmi Package
* The java.rmi.registry Package
* The java.rmi.server Package
19. The JavaMail API
Java Network Programming
By Elliotte Rusty Harold
* What Is the JavaMail API?
* Sending Email
* Receiving Mail
* Password Authentication
* Addresses
* The URLName Class
* The Message Class
* The Part Interface
* Multipart Messages and File Attachments
* MIME Messages
* Folders
Index
size =1.23 MB
==============

Topics covered include:
* The origins of TCP/IP and the Internet
* The layers comprising the OSI and DoD models
* TCP/IP addressing
* Subnet masks
* Creating custom subnet masks
* Supernetting and Classless Inter-Domain Routing (CIDR)
* Name resolution
* The Domain Name System (DNS) and Dynamic DNS
* Windows Internet Naming Services (WINS)
* The Dynamic Host Configuration Protocol (DHCP)
* What to expect with IPv6
Download
==================
Wireless Sensor Networks: 4th

# Publisher: Springer
# Number Of Pages: 358
# Publication Date: 2007-03-05
# ISBN-10 / ASIN: 3540698299
# ISBN-13 / EAN: 9783540698296
links
=============
Bluetooth Essentials for Programmers

Bluetooth Essentials for Programmers
By Albert S. Huang, Larry Rudolph
* Publisher: Cambridge University Press
* Number Of Pages: 208
* Publication Date: 2007-09-03
* ISBN-10 / ASIN: 0521703751
* ISBN-13 / EAN: 9780521703758
Size: 853 kb
الروابط
===================
Wireless Networking - Newnes Know It All

FORMAT : PDF
SIZE : 4 x 2.88 MB
==================
Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications

Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications
By Subir Kumar Sarkar, T.G. Basavaraju, C. Puttamadappa,
* Publisher: AUERBACH
* Number Of Pages: 336
* Publication Date: 2007-10-26
* ISBN / ASIN: 1420062212
* EAN: 9781420062212
RAR'd PDF, 5115 KB
================
WiMAX: A Wireless Technology Revolution

WiMAX: A Wireless Technology Revolution
By G.S.V. Radha Krishna Rao, G. Radhamani,
* Publisher: AUERBACH
* Number Of Pages: 400
* Publication Date: 2007-10-19
* ISBN / ASIN: 0849370590
RAR'd PDF, 5760 KB
=====================
Wireless Sensor Networks: An Information Processing Approach

Wireless Sensor Networks: An Information Processing Approach
(The Morgan Kaufmann Series in Networking)
By Feng Zhao, Leonidas Guibas,
* Publisher: Morgan Kaufmann
* Number Of Pages: 376
* Publication Date: 2004-07-06
* ISBN / ASIN: 1558609148
RAR'd PDF, 5718 KB
===========
Network Security Foundations

Network Security Foundations: Technology Fundamentals for IT Success
By Matthew Strebe
* Publisher: Sybex
* Number Of Pages: 315
* Publication Date: 2004-10-01
* ISBN / ASIN: 0782143741
Links
================
Firewalls for Dummies

Firewalls for Dummies
ISBN: 0764540483
Author: Brian Komar / Ronald Beekelaar / Joern Wettern
Publisher: For Dummies
Links
or
password : ebooksclub.org
=========================
Firewalls 24seven

Firewalls 24seven
ISBN: 0782140548
Author: Matthew Strebe / Charles Perkins
Publisher: Sybex Inc
Edition: 2nd edition (March, 2002)
Paperback: 544 pages
Firewalls is a guide to protecting an Internet-connected network from external threats--a complex task. You not only need to be aware of the known vulnerabilities of your system, you also need to remain alert to potential attacks. Firewalls are tools that help you do this by controlling access to and from your network.
This book teaches the basics of network operation and how a firewall is put together. It's important to understand risk, and the book helps explain risk management and how it impacts a security policy. You'll also see how hackers target and penetrate systems. There's a guide to TCP/IP and common Internet services. From this base camp, Firewalls begins to climb the mountain of Internet security. The basic technologies and security requirements that fit together to form a firewall are introduced, along with the security policies of the authors' "perfect firewall."
Links
=================
Hotspot Networks: WiFi for Public Access Locations

=======================
Wi-Fi Handbook : Building 802.11b Wireless Networks 2003-04

==================================
موقع كتب عن الشبكات اللاسلكية
==================================
موقع كتب منوعة
===============================