How we did it:
For any feedback, any questions, any notes or just for chat - feel free to follow us on social networks
W. Richard Stevens, Gary R. Wright
This book's innovative approach helps readers at all levels to truly understand how TCP/IP really works. Rather than just describing what the RFCs say the protocol suite should do, TCP/IP Illustrated uses a popular diagnostic tool so you can actually watch the protocols in action. By forcing certain conditions to occur (connection establishment, timeout and retransmission, fragmentation, etc.) and watching the results, Rich Stevens provides insight into how the protocols work, and why certain design decisions were made. Written in his well-known style with lots of examples, Stevens shows how current, popular TCP/IP implementations operate (SunOS 4.1.3, Solaris 2.2, System V Release 4, BSD/386, AIX 3.2.2, and 4.4 BSD), and relates these real-world implementations to the RFC standards.
W. Richard Stevens, Gary R. Wright
An indispensable resource for anyone working with TCP/IP, Volume 2 is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release. Combining more than 500 illustrations with 15,000 lines of working code, the book uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers.
Unlike most other references on the market, this next-generation resource goes well beyond Bluetooth specifications and thoroughly examines different implementation approaches--as taught by a "master instructor." * Discusses Bluetooth in detail, covering both operational characteristics as well as its use as a wireless communications system * Addresses the coexistence of Bluetooth with other wireless networks * Provides information on the significant security problems that exist when communicating without wires * Based on 2 very popular and highly effective courses the author has been teaching for more than a year
Justin Ferguson, Dan Kaminsky
Teaches security professionals to identify, reverse engineer, and prevent malicious internet attacks. In 2006, the number of computer attacks also increased as traditional hacking for fun has been replaced by criminal attacks to steal confidential data and money.
This is the definitive compendium of design patterns in communication software, gathered together by Linda Rising, Ph.D., a recognized leader in the field. Contributors include James O. Coplien, Douglas C. Schmidt, Robert Hanmer, Greg Utas, Just van den Broecke, Don Olson, Carlos O'Ryan, Christopher D. Gill, and other experts from the patterns community. This is the ideal reference for engineers and other professionals working in the field of communications software development.
Drawing on his twenty years as a researcher and teacher, Fred Halsall presents the complex world of data communications and networks with clarity and thoroughness. An invaluable resource to both the student and the practicing computer professional, this fourth edition of the very successful Data Communications, Computer Networks and Open Systems has been extensively updated to reflect the rapid developments in this field.
Sameer Seth, M. Ajaykumar Venkatesulu
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design and implementation of TCP/IP protocol in linux, this book provides different aspects of socket programming and major TCP/IP related algorithms. In addition, the text features netfilter hook framework, a complete explanation of routing sub-system, IP QOS implementation, and Network Soft IRQ. This book further contains elements on TCP state machine implementation,TCP timer implementation on Linux, TCP memory management on Linux, and debugging TCP/IP stack using lcrash