Angebote zu "Under" (62 Treffer)

Kategorien

Shops

INTERNET DOMAIN NAMES AND TRADE MARKS UNDER EUR...
49,00 € *
ggf. zzgl. Versand

INTERNET DOMAIN NAMES AND TRADE MARKS UNDER EUROPEAN AND U.S. LAW ab 49 € als Taschenbuch: A comparative analysis. Aus dem Bereich: Bücher, Wissenschaft, Jura,

Anbieter: hugendubel
Stand: 03.08.2020
Zum Angebot
Wealth Management 2.0: Financial Education for ...
9,95 € *
ggf. zzgl. Versand

I've always found it ridiculous that millions upon millions of individuals earn a living online, yet nobody thought about writing a book which teaches those people how to manage their money properly. Therefore, I've decided to roll up my sleeves and write one myself. Why? Simply because I also earn a living on the Internet and have been doing it since, well, since pretty much forever. Aside from that, I'm an economist and this unique (or feel free to call it weird) combination of street smarts and book smarts puts me in a reasonably good position to help people enhance the wealth they've generated online. If you earn a living online in one way or another (as a freelancer, as an online entrepreneur, as an indie author, as a domain investor, as a bitcoin early adopter, as an online trader, as a website flipper, as an online marketer and so on) or at least generate a significant percentage of your revenue online and want to find out how to manage your money wisely, this book is just what the doctor ordered. Throughout my career, I've been involved in a lot of different dimensions of the online world. I've been a freelancer. I've run an outsourcing business. I've invested in domains, offered domain brokerage services and even started an auction platform for domain names. I've started an escrow business, which has been sold to Agreed.com, which was then sold to Escrow.com and which was ultimately sold to Freelancer.com. I even owned three Web hosting businesses. All in all, it's fairly safe to say I've seen the Internet under the hood, so to speak. Frankly, I'd say finding someone who understands those who make money on the Internet better than yours truly would be quite a challenge. No matter what it is you currently do online, chances are I've at least dabbled in it. Those who make money online are a special breed with highly specific wealth management needs and Wealth Management 2.0 finally fills this personal finance void, as I h 1. Language: English. Narrator: Matt Martillo. Audio sample: http://samples.audible.de/bk/acx0/065369/bk_acx0_065369_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.08.2020
Zum Angebot
Error Detection and Correction Using Reed Solom...
39,90 € *
ggf. zzgl. Versand

Reed Solomon is the emerging algorithm that is going to be widely used in the future for the detection and correction of multibit errors in various applications like semiconductor memory, high speed and high-density disk drives, mobile communication, digital communication, and reliable data transmission. This is the focus work for my dissertation to implement RS encoder and decoder that is a complex algorithm and it is used for reliable memory operation in a system. Literature surveys were carried out to understand this complex algorithm because we could not get all the materials in one place so it needs a compilation of work. More than 2000 lines of RTL codes were developed in Verilog HDL under this dissertation work to realize this hardware module, nowhere such codes are available in the public domain on open-source codes on the internet. SRAMs are the one application area for RS decoder for reliable data storage and retrieval. The RS Encoder and decoder are designed in structural modeling and develop the hardware.

Anbieter: buecher
Stand: 03.08.2020
Zum Angebot
Error Detection and Correction Using Reed Solom...
41,10 € *
ggf. zzgl. Versand

Reed Solomon is the emerging algorithm that is going to be widely used in the future for the detection and correction of multibit errors in various applications like semiconductor memory, high speed and high-density disk drives, mobile communication, digital communication, and reliable data transmission. This is the focus work for my dissertation to implement RS encoder and decoder that is a complex algorithm and it is used for reliable memory operation in a system. Literature surveys were carried out to understand this complex algorithm because we could not get all the materials in one place so it needs a compilation of work. More than 2000 lines of RTL codes were developed in Verilog HDL under this dissertation work to realize this hardware module, nowhere such codes are available in the public domain on open-source codes on the internet. SRAMs are the one application area for RS decoder for reliable data storage and retrieval. The RS Encoder and decoder are designed in structural modeling and develop the hardware.

Anbieter: buecher
Stand: 03.08.2020
Zum Angebot
Black Code: Surveillance, Privacy, and the Dark...
9,95 € *
ggf. zzgl. Versand

Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what's at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber-criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran's nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors. This is not the way it was supposed to be. The Internet's original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle - the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide - Black Code takes listeners on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp. 1. Language: English. Narrator: Ronald J. Deibert. Audio sample: http://samples.audible.de/bk/adbl/030771/bk_adbl_030771_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.08.2020
Zum Angebot
TCP/IP Illustrated, Volume 1
63,75 € *
ggf. zzgl. Versand

More than 162,000 networking Product Description "For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. Features + Benefits W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall Shows how each protocol actually operates, and explains why they work that way New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more Foreword xxv Preface to the Second Edition xxvii Adapted Preface to the First Edition xxxiii Chapter 1: Introduction 1 1.1 Architectural Principles 2 1.2 Design and Implementation 8 1.3 The Architecture and Protocols of the TCP/IP Suite 13 1.4 Internets, Intranets, and Extranets 19 1.5 Designing Applications 20 1.6 Standardization Process 22 1.7 Implementations and Software Distributions 24 1.8 Attacks Involving the Internet Architecture 25 1.9 Summary 26 1.10 References 28 Chapter 2: The Internet Address Architecture 31 2.1 Introduction 31 2.2 Expressing IP Addresses 32 2.3 Basic IP Address Structure 34 2.4 CIDR and Aggregation 46 2.5 Special-Use Addresses 50 2.6 Allocation 62 2.7 Unicast Address Assignment 65 2.8 Attacks Involving IP Addresses 70 2.9 Summary 71 2.10 References 72 Chapter 3: Link Layer 79 3.1 Introduction 79 3.2 Ethernet and the IEEE 802 LAN/MAN Standards 80 3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control 94 3.4 Bridges and Switches 98 3.5 Wireless LANs-IEEE 802.11(Wi-Fi) 111 3.6 Point-to-Point Protocol (PPP) 130 3.7 Loopback 145 3.8 MTU and Path MTU 148 3.9 Tunneling Basics 149 3.10 Attacks on the Link Layer 154 3.11 Summary 156 3.12 References 157 Chapter 4: ARP: Address Resolution Protocol 165 4.1 Introduction 165 4.2 An Example 166 4.3 ARP Cache 169 4.4 ARP Frame Format 170 4.5 ARP Examples 171 4.6 ARP Cache Timeout 174 4.7 Proxy ARP 174 4.8 Gratuitous ARP and Address Conflict Detection (ACD) 175 4.9 The arp Command 177 4.10 Using ARP to Set an Embedded Device's IPv4 Address 178 4.11 Attacks Involving ARP 178 4.12 Summary 179 4.13 References 179 Chapter 5: The Internet Protocol (IP) 181 5.1 Introduction 181 5.2 IPv4 and IPv6 Headers 183 5.3 IPv6 Extension Headers 194 5.4 IP Forwarding 208 5.5 Mobile IP 215 5.6 Host Processing of IP Datagrams 220 5.7 Attacks Involving IP 226 5.8 Summary 226 5.9 References 228 Chapter 6: System Configuration: DHCP and Autoconfiguration 233 6.1 Introduction 233 6.2 Dynamic Host Configuration Protocol (DHCP) 234 6.3 Stateless Address Autoconfiguration (SLAAC) 276 6.4 DHCP and DNS Interaction 285 6.5 PPP over Ethernet (PPPoE) 286 6.6 Attacks Involving System Configuration 292 6.7 Summary 292 6.8 References 293 Chapter 7: Firewalls and Network Address Translation (NAT) 299 7.1 Introduction 299 7.2 Firewalls 300 7.3 Network Address Translation (NAT) 303 7.4 NAT Traversal 316 7.5 Configuring Packet-Filtering Firewalls and NATs 334 7.6 NAT for IPv4/IPv6 Coexistence and Transition 339 7.7 Attacks Involving Firewalls and NATs 345 7.8 Summary 346 7.9 References 347 Chapter 8: ICMPv4 and ICMPv6: Internet Control Message Protocol 353 8.1 Introduction 353 8.2 ICMP Messages 355 8.3 ICMP Error Messages 361 8.4 ICMP Query/Informational Messages 380 8.5 Neighbor Discovery in IPv6 395 8.6 Translating ICMPv4 and ICMPv6 424 8.7 Attacks Involving ICMP 428 8.8 Summary 430 8.9 References 430 Chapter 9: Broadcasting and Local Multicasting (IGMP and MLD) 435 9.1 Introduction 435 9.2 Broadcasting 436 9.3 Multicasting 441 9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD) 451 9.5 Attacks Involving IGMP and MLD 469 9.6 Summary 470 9.7 References 471 Chapter 10: User Datagram Protocol (UDP) and IP Fragmentation 473 10.1 Introduction 473 10.2 UDP Header 474 10.3 UDP Checksum 475 10.4 Examples 478 10.5 UDP and IPv6 481 10.6 UDP-Lite 487 10.7 IP Fragmentation 488 10.8 Path MTU Discovery with UDP 493 10.9 Interaction between IP Fragmentation and ARP/ND 496 10.10 Maximum UDP Datagram Size 497 10.11 UDP Server Design 498 10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams 505 10.13 UDP in the Internet 506 10.14 Attacks Involving UDP and IP Fragmentation 507 10.15 Summary 508 10.16 References 508 Chapter 11: Name Resolution and the Domain Name System (DNS) 511 11.1 Introduction 511 11.2 The DNS Name Space 512 11.3 Name Servers and Zones 516 11.4 Caching 517 11.5 The DNS Protocol 518 11.6 Sort Lists, Round-Robin, and Split DNS 565 11.7 Open DNS Servers and DynDNS 567More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: Remote procedure call Identity management (access control / authentication) Network and transport layer security (authentication / privacy) File access protocols, including NFS and SMB/CIFS Host initialization and DHCP NAT and firewalls E-mail Web and web services Wireless and wireless security New tools, including Ethereal, nmap and netcat

Anbieter: buecher
Stand: 03.08.2020
Zum Angebot
TCP/IP Illustrated, Volume 1
63,75 € *
ggf. zzgl. Versand

More than 162,000 networking Product Description "For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. Features + Benefits W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall Shows how each protocol actually operates, and explains why they work that way New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more Foreword xxv Preface to the Second Edition xxvii Adapted Preface to the First Edition xxxiii Chapter 1: Introduction 1 1.1 Architectural Principles 2 1.2 Design and Implementation 8 1.3 The Architecture and Protocols of the TCP/IP Suite 13 1.4 Internets, Intranets, and Extranets 19 1.5 Designing Applications 20 1.6 Standardization Process 22 1.7 Implementations and Software Distributions 24 1.8 Attacks Involving the Internet Architecture 25 1.9 Summary 26 1.10 References 28 Chapter 2: The Internet Address Architecture 31 2.1 Introduction 31 2.2 Expressing IP Addresses 32 2.3 Basic IP Address Structure 34 2.4 CIDR and Aggregation 46 2.5 Special-Use Addresses 50 2.6 Allocation 62 2.7 Unicast Address Assignment 65 2.8 Attacks Involving IP Addresses 70 2.9 Summary 71 2.10 References 72 Chapter 3: Link Layer 79 3.1 Introduction 79 3.2 Ethernet and the IEEE 802 LAN/MAN Standards 80 3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control 94 3.4 Bridges and Switches 98 3.5 Wireless LANs-IEEE 802.11(Wi-Fi) 111 3.6 Point-to-Point Protocol (PPP) 130 3.7 Loopback 145 3.8 MTU and Path MTU 148 3.9 Tunneling Basics 149 3.10 Attacks on the Link Layer 154 3.11 Summary 156 3.12 References 157 Chapter 4: ARP: Address Resolution Protocol 165 4.1 Introduction 165 4.2 An Example 166 4.3 ARP Cache 169 4.4 ARP Frame Format 170 4.5 ARP Examples 171 4.6 ARP Cache Timeout 174 4.7 Proxy ARP 174 4.8 Gratuitous ARP and Address Conflict Detection (ACD) 175 4.9 The arp Command 177 4.10 Using ARP to Set an Embedded Device's IPv4 Address 178 4.11 Attacks Involving ARP 178 4.12 Summary 179 4.13 References 179 Chapter 5: The Internet Protocol (IP) 181 5.1 Introduction 181 5.2 IPv4 and IPv6 Headers 183 5.3 IPv6 Extension Headers 194 5.4 IP Forwarding 208 5.5 Mobile IP 215 5.6 Host Processing of IP Datagrams 220 5.7 Attacks Involving IP 226 5.8 Summary 226 5.9 References 228 Chapter 6: System Configuration: DHCP and Autoconfiguration 233 6.1 Introduction 233 6.2 Dynamic Host Configuration Protocol (DHCP) 234 6.3 Stateless Address Autoconfiguration (SLAAC) 276 6.4 DHCP and DNS Interaction 285 6.5 PPP over Ethernet (PPPoE) 286 6.6 Attacks Involving System Configuration 292 6.7 Summary 292 6.8 References 293 Chapter 7: Firewalls and Network Address Translation (NAT) 299 7.1 Introduction 299 7.2 Firewalls 300 7.3 Network Address Translation (NAT) 303 7.4 NAT Traversal 316 7.5 Configuring Packet-Filtering Firewalls and NATs 334 7.6 NAT for IPv4/IPv6 Coexistence and Transition 339 7.7 Attacks Involving Firewalls and NATs 345 7.8 Summary 346 7.9 References 347 Chapter 8: ICMPv4 and ICMPv6: Internet Control Message Protocol 353 8.1 Introduction 353 8.2 ICMP Messages 355 8.3 ICMP Error Messages 361 8.4 ICMP Query/Informational Messages 380 8.5 Neighbor Discovery in IPv6 395 8.6 Translating ICMPv4 and ICMPv6 424 8.7 Attacks Involving ICMP 428 8.8 Summary 430 8.9 References 430 Chapter 9: Broadcasting and Local Multicasting (IGMP and MLD) 435 9.1 Introduction 435 9.2 Broadcasting 436 9.3 Multicasting 441 9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD) 451 9.5 Attacks Involving IGMP and MLD 469 9.6 Summary 470 9.7 References 471 Chapter 10: User Datagram Protocol (UDP) and IP Fragmentation 473 10.1 Introduction 473 10.2 UDP Header 474 10.3 UDP Checksum 475 10.4 Examples 478 10.5 UDP and IPv6 481 10.6 UDP-Lite 487 10.7 IP Fragmentation 488 10.8 Path MTU Discovery with UDP 493 10.9 Interaction between IP Fragmentation and ARP/ND 496 10.10 Maximum UDP Datagram Size 497 10.11 UDP Server Design 498 10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams 505 10.13 UDP in the Internet 506 10.14 Attacks Involving UDP and IP Fragmentation 507 10.15 Summary 508 10.16 References 508 Chapter 11: Name Resolution and the Domain Name System (DNS) 511 11.1 Introduction 511 11.2 The DNS Name Space 512 11.3 Name Servers and Zones 516 11.4 Caching 517 11.5 The DNS Protocol 518 11.6 Sort Lists, Round-Robin, and Split DNS 565 11.7 Open DNS Servers and DynDNS 567More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: Remote procedure call Identity management (access control / authentication) Network and transport layer security (authentication / privacy) File access protocols, including NFS and SMB/CIFS Host initialization and DHCP NAT and firewalls E-mail Web and web services Wireless and wireless security New tools, including Ethereal, nmap and netcat

Anbieter: buecher
Stand: 03.08.2020
Zum Angebot
INTERNET DOMAIN NAMES AND TRADE MARKS UNDER EUR...
49,00 € *
ggf. zzgl. Versand

INTERNET DOMAIN NAMES AND TRADE MARKS UNDER EUROPEAN AND U.S. LAW ab 49 EURO A comparative analysis

Anbieter: ebook.de
Stand: 03.08.2020
Zum Angebot
Host (Unix)
34,00 € *
ggf. zzgl. Versand

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. host is a simple utility for performing Domain Name System lookups. It was developed by the Internet Systems Consortium (ISC), and is released under the ISC license, a permissive free software license. The similar dig utility interrogates DNS servers directly for troubleshooting and system administration purposes. The similar dig utility interrogates DNS servers directly for troubleshooting and system administration purposes.

Anbieter: Dodax
Stand: 03.08.2020
Zum Angebot