Amazon Price: $79.95 $75.19 You save: $4.76 (6%). (as of March 28, 2017 07:10 –
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms.
The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing.
Amazon Price: N/A (as of March 28, 2017 18:32 –
The Alfa AWUS036H is the latest version of the most powerful card available. This has a stunning 1000mW output power. So if you are looking for a device to connect to an outdoor 2.4 GHz antenna, such as on a boat or an RV, this is a perfect solution. It outperforms wireless cards that are built in to newer laptops. Adding this to your laptop or desktop computer will enhance range and signal quality at longer distances. And works with Win98SE/200/ME/XP, Windows Vista, Windows 7, Linux (kernel 2.6.6 and later) and Macintosh (OS version 10.4). And the necessary drivers for ALL of these operating systems are included on CD-ROM
* Connects at a full 54Mbps via USB 2.0, up to 8 times faster than a USB 1.1 adapter
* High gain upgradeable
* Compact size for greater flexibility
* Also compatible with USB 1.1 desktop and notebook computers
* Plug-and-Play Compatible with windows 98SE, 2000, Millennium, XP and Linux
* High security 64/128/256bit WEP Encryption, TKIP, WPA, 802.11
Amazon Price: N/A (as of March 28, 2017 05:28 –
A Guide to the Hacking Underworld You’ve Never Seen Before!
Hackers have always been a closed, secretive circle, wary of infiltrators and keeping their secrets completely hidden from the public eye….until now!
This book blows the lid open on the dark side of the hacking world, bringing all of the shadowy secrets, tools of the trade, malicious methods, and high-stakes multi-millionaire lifestyles of hackers out into the open!
Each chapter gives you unprecedented access to the cunning tricks, psychological manipulation, and malware that hackers could be using against you RIGHT NOW!
In this eye-opening guide, I bring you:
• An introduction to the secretive world of hacking.
• The types of hackers that pose a threat to you, and their various motivations.
• The different tools, methods, and tricks these hackers could use against you.
• How a hacker could be literally watching your every move and listening to your every breath through your computer!
• How anyone could be the hacker next door!
• The cunning techniques dangerous hackers use to access your private information and step-by-step explanations of their hacks.
• Hacker tips and tutorials that take YOU inside the hack and put the power in your hands!
• How to avoid, prevent, and fight back against potential hacking campaigns.
• And much more!
Don’t stay in the dark about the menacing methods of malicious black hat hackers.
Act NOW to learn inside knowledge about their hacks AND how to use their own tricks against them to protect your precious assets and stay safe!
Amazon Price: $16.05 (as of March 28, 2017 23:51 –
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the past 10 years than in any 10 year period in human history. . . Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before.' Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
Amazon Price: N/A (as of March 28, 2017 19:26 –
While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.