Discover network vulnerabilities and threats to design effective network security strategiesKey FeaturesPlunge into scanning techniques using the most popular toolsEffective vulnerability assessment techniques to safeguard network infrastructureExplore the Nmap Scripting Engine (NSE) and the features used for port and vulnerability scanningBook DescriptionNetwork scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited.
Transform the way your network teams think about and deploy enterprise network automation through the power of Nautobot's open-source platform Key FeaturesLearn how documenting your network in Nautobot can accelerate your network automation journeyApply NetDevOps to your network by leveraging Nautobot as a network source of truthMinimize tool sprawl by extending, using, or building Nautobot AppsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionNautobot enables network teams to build a scalable and extensible network source of truth that provides a foundation to power any network automation stack.
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry.
Deploy your own private mobile network with OpenBTS, the open source software project that converts between the GSM and UMTS wireless radio interface and open IP protocols.
Key FeaturesExplore the power of Python libraries to tackle difficult network problems efficiently and effectivelyUse Python for network device automation, DevOps, and software-defined networkingBecome an expert in implementing advanced network-related tasks with PythonBook DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced.
Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues.
Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization.
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments.
Learn how to hack systems like black hat hackers and secure them like security expertsKey FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure systems from hackersBook DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal.
The official study guide for the Certified Wireless Analysis Professional certification from CWNP Four leading wireless experts thoroughly prepare you for the vendor-neutral CWAP exam administered by CWNP, the industry leader for enterprise Wi-Fi training and certification.
The definitive resource for the NRS II exams three complete courses in a book Alcatel-Lucent is a world leader in designing and developing scalable systems for service providers.
This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet.
Get to grips with the latest container examples, Python 3 features, GitLab DevOps, network data analysis, and cloud networking to get the most out of Python for network engineering with the latest edition of this bestselling guidePurchase of the print or Kindle book includes a free eBook in PDF format.
We are living in the era of "e;Big Data"e; and the computing power required to deal with "e;Big Data"e; both in terms of its energy consumption and technical complexity is one of the key areas of research and development.
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies.
Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology.
7 simple steps to help you get what you want from networkingNetworking: get it right, and it provides an opportunity for learning and expanding your business contacts.