Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Honduras
Mihoto
Stepped
Euthyphro
nucleotide
Stupor
Sexgesetze
Icosahedral
Workhorse
spirituelle
Indywidualna
Zigangirov
Awful
Karstens
Professionelle
Filipe
Meli
douceur
Jake
Arrasando
Manumanua
Twoj
czasie
Biomechanik
Gokyo
Ammara
RockStar
Captor
brunettes
Kochrezepte
Derleme
Diplomat
Fumio
Bavarian
Broadways
作品选
阿弗罗
Tanto
Hobbs
MOROZO
SNRS
prediction
Voxen
怀俄明
Bestandteil
FreeMoney
Yorktown
古龙
Iced
Troisieme
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking Ethernet: The Definitive Guide (Repost)
Posted on 2010-03-16
|
More Ethernet: The Definitive Guide The "Ethernet"--as distinct from the Internet, intranet, sneakernet, and others in the net family--is both a familiar face and a familiar name. However, it evokes the mental experience of the school crossing guard whose ownership of a corner of your mindscape is so context-sensitive that a change in venue renders the name or face placeless. Crossing guard or letter carrier? Just what is the Ethernet, again? True to his subject's infrastructural centrality and steadfast obscurity, Charles E. Spurgeon delivers a solid, basic treatise, Ethernet: The Definitive Guide, which describes its subject matter in all of its mundane glory. Appropriately, this is the octopus book from O'Reilly. Spurgeon's examination of Ethernet spans four sections with 20 chapters, three appendices, an 18-page glossary of acronyms and jargon, and a generous index. The Ethernet is the hardware of the Inter/intranet and the underlying packet-formatting software protocols that control the hardware interfaces. But it is mostly just hardware: cables (thin-coaxial, thick, twisted pair, fiber optical), connectors (BNC, RJ-45), hubs (switching, routing), and system catch-all naming conventions (10BASE-2, 10BASE-T.) Sensibly, the discussion excludes Ethernet cards and network communications protocols that are more detailed than frame or packet definition, viz., there is essentially no information on packet-level security. But if you need a plan for designing a telephone closet, Spurgeon waxes eloquent on both network topologies and impedance matching. Not all books ... appear on the homepage. In order not to miss many of them follow Download Link (Ebooks section) (see top of each page on AH) http://rapidshare.com/files/281797549/398.rar
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link (Depositfiles) | Alive |
Download Link (XlGet) | Alive |
Download Link (Uploading) | Alive |
Download Link (Qube) | Alive |
Download Link (Megaupload) | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: