ITIL Books, Networking Security and Hacking Books, Linux Books
[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- newsletter
- news
- read forum
- new topic
- search

- meetings list
- recent additions
- add your info
 top 100 sites
- visit top sites
- sign up now
- members

- add your url
- add domain
- search box
- link to us

- our projects
- free email
- secureroot
- ITIL Books

Home > Books > Networking / ITIL


Computer Networks : A System Approach (Networking Series)
Computer Networks: A Systems Approach, designed for an advanced college-level course in network design and operation, provides the network applications programmer with detailed information about how networks do their thing. While Computer Networks is neither a user manual nor a technical reference, it provides an in-depth background on how network architectures and protocols work. (54kb)

ITIL Service Management
Source of the ITIL books for IT support and delivery. (24kb)

A community/forum site dedicated to discussing exclusively the books and volumes comprising the IT infrastructure library (ITIL). (12kb)

Computer Networks and Internets by Douglas E. Comer, Ralph E. Droms
This textbook for a two-semester undergraduate course in networking is divided into four sections<-->low-level transmission, packet switching, internetworking, and network applications. The new edition adds three chapters on tools students can use to explore the Internet, long-distance digital connection technologies, and RPC and middleware. The CD-ROM includes photographs of network wiring. (52kb)

Computer Networks by Andrew S. Tanenbaum
A textbook providing a clear explanation of the way networks work, from hardware technology up through the most popular network applications. Topics covered include the physical layer (copper, fiber, radio, and satellite communication); the data link layer (protocol principles, HDLC, SLIP, and PPP); the MAC sublayer (IEEE 802 LANs, bridges, new high-speed LANs); the network layer (routing, congestion control, internetworking, IPv6); the transport layer (transport protocol principles, TCP, network performance); and the application layer (cryptography, email, news, the Web, Java, and multimedia). (49kb)

Maximum Linux Security : A Hacker's Guide to Protecting Your Linux Server and Workstation
Linux machines serve scores of purposes on networks, but their very integration with networked environments means they're constantly exposed to attack. Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Network provides a comprehensive picture of Linux's strengths and weaknesses when it comes to protecting your systems from bad guys. The author offers explicit advice (e.g., replace sendmail with Qmail) and general recommendations (e.g., be on the lookout for unused services and disable them). In case you're wondering which Anonymous this is, he's the same guy who wrote the very highly regarded Maximum Security. (51kb)

ITIL Books
Full descriptions of all the ITIL Books. (9kb)

ITIL World
Major source of ITIL information and materials, including descrions of each of the main ITIL 'disciplines'. (28kb)

8 resource(s) in this category...

(C) 1999-2000 All rights reserved.