Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Required
GALE
Chic
Solids
Concertante
SDKFZ
Sweeping
Divertimento
Table
Targeted
Calcul
Vampire
Tarot
Uzuri
Ecuador
Proposition
Page
Thee
Tips
ENTITY
vida
Visual
Vray
accessories
Forecast
Destroyers
Grundlegung
SOPEMI
Piazzolla
Poincare
buildings
Fascist
Organisation
Connexions
Commercial
Evaluating
defend
Blonker
Enemy
Barbarian
Verleumdung
Buckeridge
Celebrity
Cathy
Schuur
薪酬
half
Journals
环境
Dentistry
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking 高速网络与互联网—性能与服务质量
Posted on 2010-04-27
|
高速网络现在不仅是局域网而且也是广域网市场的主角。本书对高速网络和TCP/IP互联网的设计技术进行了全面、系统和最新的综述。本书的特点是对高速网络与互联网的讨论围绕性能和服务质量这两个关键设计问题。全书共分七个部分,包括协议与网络基础、各种高速网络、性能建模和估计、拥塞控制与通信量管理、因特网的路由选择、IP网络的服务质量以及压缩。
本书适合计算机科学与工程专业或通信工程专业高年级本科生和研究生使用,亦可供网络研究或工程设计人员作为基础参考书。 作者简介 William Stallings,对于揭示计算机网络和计算机体系结构方面的众多技术发慌做出了独特的贡献。他已经在这些领域的各个方面撰写了15本书籍(如果算上不同的版本则共有34本)。目前,他担任独立顾问,其客户包括计算机和网络用户、制造商、软件开发公司以及处于前沿领域的政府研究机构。Sstallings在Notre Dame大学获得电气工程学士学位,在麻省理工学院获得计算机科学博士学位。 目录 第一部分 协议与网络基础知识 第1章 引论 第2章 协议与TCP/IP协议族 第3章 TCP和IP 第二部分 高速网络 第4章 帧中继 第5章 异步传递方式 第6章 高速局域网 第三部分 性能建模和估计 第7章 概率论和随机过程概述 第8章 排队分析 第9章 自相似通信量 第四部分 拥塞控制和通信量管理 第10章 数据网络和互联网中的拥塞控制 第11章 链路级流量及差错控制 第12章 TCP通信量控制 第13章 ATM网络中的通信量和拥塞控制 第五部分 因特网的路由选择 第14章 图论概述和最短路径 第15章 内部路由选择协议 第16章 外部路由选择协议和多播 第六部分 IP网络的服务质量 第17章 综合服务和区分服务 第18章 支持QoS的协议 第七部分 压缩 第19章 信息论概述 第20章 无损压缩 第21章 有损压缩 附录A 标准与制定标准的组织 附录B 套接字 词汇表 参考文献
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link 1 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: