الأحد، 21 يونيو 2009

مكتبة الشبكات..

Computer Networks 4th Ed - Andrew S. Tanenbaum.chm

TCP/IP Network Administration.
By Craig Hunt; ISBN 1-56592-322-7, 630 pages.
Second Edition, December 1997.


Table of Contents
Preface
Chapter 1: Overview of TCP/IP
Chapter 2: Delivering the Data
Chapter 3: Network Services
Chapter 4: Getting Started
Chapter 5: Basic Configuration
Chapter 6: Configuring the Interface
Chapter 7: Configuring Routing
Chapter 8: Configuring DNS Name Service
Chapter 9: Configuring Network Servers
Chapter 10: sendmail
Chapter 11: Troubleshooting TCP/IP
Chapter 12: Network Security
Chapter 13: Internet Information Resources


http://www.ye14.org/up14//view.php?file=c2bb5d1099
http://www.ye14.org/up14//uploads/files/ye-c2bb5d1099.zip
===========
http://i212.photobucket.com/albums/cc94/Dl4All/album3/TCP-IP-

Tutorial-Technical-Overview.jpg
TCP/IP Tutorial and Technical Overview
================================
Part 1. Core TCP/IP protocols
==================================
Chapter 1. Architecture, history, standards, and trends
Chapter 2. Network interfaces
Chapter 3. Internetworking protocols
Chapter 4. Transport layer protocols
Chapter 5. Routing protocols
Chapter 6. IP multicast
Chapter 7. Mobile IP
Chapter 8. Quality of service
Chapter 9. IP version 6
Chapter 10. Wireless IP.
==================================
Part 2. TCP/IP application protocols
====================================
Chapter 11. Application structure and programming interfaces
Chapter 12. Directory and naming protocols
Chapter 13. Remote execution and distributed computing
Chapter 14. File-related protocols
Chapter 15. Mail applications
Chapter 16. The Web.
Chapter 17. Network management
Chapter 18. Wireless Application Protocol
Chapter 19. Presence over IP
==================================
Part 3. Advanced concepts and new technologies
=====================================
Chapter 20. Voice over Internet Protocol
Chapter 21. Internet Protocol Television
Chapter 22. TCP/IP security
Chapter 23. Port based network access control
Chapter 24. Availability, scalability, and load balancing
================================
Appendix A. Multiprotocol Label Switching
Abbreviations and acronyms



the derict link of book is

=============




Publisher: O'Reilly
Number Of Pages: 442
Publication Date: 1997-02
ISBN-10 / ASIN: 1565922271
ISBN-13 / EAN: 9781565922273
Binding: Paperback
=============
Table of Contents
Preface 1. Why Networked Java?


* What Can a Network Program Do?
* But Wait!-There's More!

2. Basic Network Concepts


* Networks
* The Layers of a Network
* IP, TCP, and UDP
* The Internet
* The Client/Server Model
* Internet Standards

3. Basic Web Concepts


* URIs
* HTML, SGML, and XML
* HTTP
* MIME
* CGI
* Applets and Security

4. Java I/O


* Output Streams
* Input Streams
* Filter Streams
* Readers and Writers

5. Threads


* Running Threads
* Returning Information from a Thread
* Synchronization
* Deadlock
* Thread Scheduling
* Thread Pools

6. Looking Up Internet Addresses


* DNS, IP Addresses, and All That
* The InetAddress Class
* Some Useful Programs

7. Retrieving Data with URLs


* The URL Class
* The URLEncoder and URLDecoder Classes
* Communicating with CGIs and Servlets Through GET
* Accessing Password-Protected Sites

8. HTML in Swing


* HTML on Components
* JEditorPane
* Parsing HTML

9. The Network Methods of java.applet.Applet


* Using java.applet.Applet to Download Data
* The ImageObserver Interface
* The MediaTracker Class
* Network Methods of java.applet.AppletContext

10. Sockets for Clients


* Socket Basics
* Investigating Protocols with Telnet
* The Socket Class
* Socket Exceptions
* Examples

11. Sockets for Servers


* The ServerSocket Class
* Some Useful Servers

12. Secure Sockets


* Secure Communications
* Creating Secure Client Sockets
* Methods of the SSLSocket Class
* Creating Secure Server Sockets
* Methods of the SSLServerSocket Class

13. UDP Datagrams and Sockets


* The UDP Protocol
* The DatagramPacket Class
* The DatagramSocket Class
* Some Useful Applications

14. Multicast Sockets


* What Is a Multicast Socket?
* Working with Multicast Sockets
* Two Simple Examples

15. The URLConnection Class


* Opening URLConnections
* Reading Data from a Server
* Reading the Header
* Configuring the Connection
* Configuring the Client Request MIME Header
* Writing Data to a Server
* Content Handlers
* The Object Methods
* Security Considerations for URLConnections
* Guessing MIME Types
* HttpURLConnection
* JarURLConnection

16. Protocol Handlers


* What Is a Protocol Handler?
* The URLStreamHandler Class
* Writing a Protocol Handler
* More Protocol Handler Examples and Techniques
* The URLStreamHandlerFactory Interface

17. Content Handlers


* What Is a Content Handler?
* The ContentHandler Class
* The ContentHandlerFactory Interface
* A Content Handler for an Image Format: image/x-fits

18. Remote Method Invocation


* What Is Remote Method Invocation?
* Implementation
* Loading Classes at Runtime
* The java.rmi Package
* The java.rmi.registry Package
* The java.rmi.server Package

19. The JavaMail API


Java Network Programming
By Elliotte Rusty Harold

* What Is the JavaMail API?
* Sending Email
* Receiving Mail
* Password Authentication
* Addresses
* The URLName Class
* The Message Class
* The Part Interface
* Multipart Messages and File Attachments
* MIME Messages
* Folders

Index
size =1.23 MB
==============


Topics covered include:
* The origins of TCP/IP and the Internet
* The layers comprising the OSI and DoD models
* TCP/IP addressing
* Subnet masks
* Creating custom subnet masks
* Supernetting and Classless Inter-Domain Routing (CIDR)
* Name resolution
* The Domain Name System (DNS) and Dynamic DNS
* Windows Internet Naming Services (WINS)
* The Dynamic Host Configuration Protocol (DHCP)
* What to expect with IPv6
Download
==================
Wireless Sensor Networks: 4th



# Publisher: Springer
# Number Of Pages: 358
# Publication Date: 2007-03-05
# ISBN-10 / ASIN: 3540698299
# ISBN-13 / EAN: 9783540698296
links
=============
Bluetooth Essentials for Programmers


Bluetooth Essentials for Programmers
By Albert S. Huang, Larry Rudolph
* Publisher: Cambridge University Press
* Number Of Pages: 208
* Publication Date: 2007-09-03
* ISBN-10 / ASIN: 0521703751
* ISBN-13 / EAN: 9780521703758
Size: 853 kb
الروابط
===================
Wireless Networking - Newnes Know It All


FORMAT : PDF
SIZE : 4 x 2.88 MB

==================
Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications



Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications
By Subir Kumar Sarkar,&nbspT.G. Basavaraju,&nbspC. Puttamadappa,
* Publisher: AUERBACH
* Number Of Pages: 336
* Publication Date: 2007-10-26
* ISBN / ASIN: 1420062212
* EAN: 9781420062212
RAR'd PDF, 5115 KB
================
WiMAX: A Wireless Technology Revolution



WiMAX: A Wireless Technology Revolution
By G.S.V. Radha Krishna Rao,&nbspG. Radhamani,
* Publisher: AUERBACH
* Number Of Pages: 400
* Publication Date: 2007-10-19
* ISBN / ASIN: 0849370590
RAR'd PDF, 5760 KB
=====================
Wireless Sensor Networks: An Information Processing Approach


Wireless Sensor Networks: An Information Processing Approach
(The Morgan Kaufmann Series in Networking)
By Feng Zhao,&nbspLeonidas Guibas,
* Publisher: Morgan Kaufmann
* Number Of Pages: 376
* Publication Date: 2004-07-06
* ISBN / ASIN: 1558609148
RAR'd PDF, 5718 KB

===========
Network Security Foundations



Network Security Foundations: Technology Fundamentals for IT Success
By Matthew Strebe
* Publisher: Sybex
* Number Of Pages: 315
* Publication Date: 2004-10-01
* ISBN / ASIN: 0782143741
Links

================
Firewalls for Dummies


Firewalls for Dummies
ISBN: 0764540483
Author: Brian Komar / Ronald Beekelaar / Joern Wettern
Publisher: For Dummies

Links

or

password : ebooksclub.org
=========================
Firewalls 24seven




Firewalls 24seven
ISBN: 0782140548
Author: Matthew Strebe / Charles Perkins
Publisher: Sybex Inc
Edition: 2nd edition (March, 2002)
Paperback: 544 pages
Firewalls is a guide to protecting an Internet-connected network from external threats--a complex task. You not only need to be aware of the known vulnerabilities of your system, you also need to remain alert to potential attacks. Firewalls are tools that help you do this by controlling access to and from your network.
This book teaches the basics of network operation and how a firewall is put together. It's important to understand risk, and the book helps explain risk management and how it impacts a security policy. You'll also see how hackers target and penetrate systems. There's a guide to TCP/IP and common Internet services. From this base camp, Firewalls begins to climb the mountain of Internet security. The basic technologies and security requirements that fit together to form a firewall are introduced, along with the security policies of the authors' "perfect firewall."


Links

=================
Hotspot Networks: WiFi for Public Access Locations


Link
Click Here
===================
Wi-Fi Security


Link

Click Here
=======================
Wi-Fi Handbook : Building 802.11b Wireless Networks 2003-04




Link

Click Here
==================================
موقع كتب عن الشبكات اللاسلكية
==================================

موقع كتب منوعة
===============================