Buy orbitlab.eu ?

Products related to Network:


  • Social Network Analysis : Research Methods
    Social Network Analysis : Research Methods

    This book introduces the non-specialist reader to the principal ideas, nature and purpose of social network analysis.Social networks operate on many levels, from families up to the level of nations, and play a critical role in determining the way problems are solved, organizations are run, and the degree to which individuals achieve their goals.Social network theory maps these relationships between individual actors and has become hugely influential across the social sciences.Assuming no prior knowledge of quantitative sociology, and avoiding technicalities, this book presents the key ideas in context through examples and illustrations.Using a structured approach to understanding work in this area, John Scott signposts further reading and online sources so that readers can develop their knowledge and skills to become practitioners of this research method.A series of Frequently Asked Questions takes the reader through the main objections raised against social network analysis.The new edition updates the overview of the discipline with more recent work and current research in sociology.

    Price: 17.99 £ | Shipping*: 3.99 £
  • Nmap Network Exploration and Security Auditing Cookbook : Network discovery and security scanning at your fingertips
    Nmap Network Exploration and Security Auditing Cookbook : Network discovery and security scanning at your fingertips

    A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiastsKey FeaturesLearn how to use Nmap and other tools from the Nmap family with the help of practical recipesDiscover the latest and most powerful features of Nmap and the Nmap Scripting EngineExplore common security checks for applications, Microsoft Windows environments, SCADA, and mainframesBook DescriptionNmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists.This third edition of the Nmap: Network Exploration and Security Auditing Cookbook introduces Nmap and its family - Ncat, Ncrack, Ndiff, Zenmap, and the Nmap Scripting Engine (NSE) - and guides you through numerous tasks that are relevant to security engineers in today's technology ecosystems. The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems.Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans.Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts.Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more. By the end of this Nmap book, you will be able to successfully scan numerous hosts, exploit vulnerable areas, and gather valuable information. What you will learnScan systems and check for the most common vulnerabilitiesExplore the most popular network protocolsExtend existing scripts and write your own scripts and librariesIdentify and scan critical ICS/SCADA systemsDetect misconfigurations in web servers, databases, and mail serversUnderstand how to identify common weaknesses in Windows environmentsOptimize the performance and improve results of scansWho this book is forThis Nmap cookbook is for IT personnel, security engineers, system administrators, application security enthusiasts, or anyone who wants to master Nmap and its scripting engine.This book is also recommended for anyone looking to learn about network security auditing, especially if they're interested in understanding common protocols and applications in modern systems.Advanced and seasoned Nmap users will also benefit by learning about new features, workflows, and tools.Basic knowledge of networking, Linux, and security concepts is required before taking up this book.

    Price: 37.99 £ | Shipping*: 0.00 £
  • Ethical Hacking and Network Analysis with Wireshark : Exploration of network packets for detecting exploits and malware
    Ethical Hacking and Network Analysis with Wireshark : Exploration of network packets for detecting exploits and malware


    Price: 31.50 £ | Shipping*: 0.00 £
  • Network Science
    Network Science

    Networks are everywhere, from the internet, to social networks, and the genetic networks that determine our biological existence.Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience.From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do.Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material.The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels.Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network science.

    Price: 46.99 £ | Shipping*: 0.00 £
  • What is network technology 3?

    Network technology 3 refers to the third generation of networking technologies, which includes advancements such as faster data transfer speeds, improved security features, and more efficient use of network resources. This generation of technology also includes the development of new protocols and standards to support the increasing demands of modern networks, such as the transition to IPv6 and the implementation of Quality of Service (QoS) capabilities. Overall, network technology 3 represents a significant step forward in the evolution of networking infrastructure, enabling more reliable and high-performance communication across various devices and systems.

  • What is the difference between electrical engineering, computer science, and network technology?

    Electrical engineering focuses on the study and application of electricity, electromagnetism, and electronics to design and develop electrical systems and devices. Computer science, on the other hand, deals with the theory, design, development, and application of computer systems and software. Network technology involves the design, implementation, and management of computer networks to facilitate communication and data exchange between devices. While electrical engineering and computer science have some overlap in areas like digital systems and hardware design, network technology specifically focuses on the networking aspects of computer systems.

  • How can one understand network technology?

    One can understand network technology by learning about the different types of networks, such as local area networks (LANs) and wide area networks (WANs), and how they operate. It is important to understand the basics of networking protocols, such as TCP/IP, and how data is transmitted across networks. Additionally, learning about network hardware, such as routers, switches, and firewalls, can provide insight into how networks are built and managed. Finally, staying updated on the latest trends and advancements in network technology can help in understanding the ever-evolving field of networking.

  • Can you disable network discovery in Linux Mint Cinnamon?

    Yes, you can disable network discovery in Linux Mint Cinnamon by going to the Network settings and turning off the option for network discovery. This can help improve security by preventing your computer from being visible to other devices on the network. Additionally, you can also configure firewall settings to further restrict network access and visibility.

Similar search terms for Network:


  • Social Network Analysis
    Social Network Analysis

    Incorporating the most important and cutting-edge developments in the field, this bestselling text introduces newcomers to the key theories and techniques of social network analysis and guides more experienced analysts in their own research. New to This Edition:A chapter on data collection, covering a crucial phase of the research processFully updated examples reiterate the continued importance of social network analysis in an increasingly interconnected worldDetailed ‘Further Reading’ sections help you explore the wider literaturePractical exercises including real-world examples of social networks enable you to apply your learningExpanded and brought right up-to-date, this classic text remains the indispensable guide to social network analysis for students, lecturers and researchers throughout the social sciences.

    Price: 43.99 £ | Shipping*: 0.00 £
  • Social Network Analysis
    Social Network Analysis

    David Knoke and Song Yang's Social Network Analysis, Third Edition provides a concise introduction to the concepts and tools of social network analysis.The authors convey key material while at the same time minimizing technical complexities.The examples are simple: sets of 5 or 6 entities such as individuals, positions in a hierarchy, political offices, and nation-states, and the relations between them include friendship, communication, supervision, donations, and trade.The new edition reflects developments and changes in practice over the past decade.The authors also describe important recent developments in network analysis, especially in the fifth chapter.Exponential random graph models (ERGMs) are a prime example: when the second edition was published, P* models were the recommended approach for this, but they have been replaced by ERGMs. Finally, throughout the volume, the authors comment on the challenges and opportunities offered by internet and social media data.

    Price: 34.99 £ | Shipping*: 0.00 £
  • Inferential Network Analysis
    Inferential Network Analysis

    This unique textbook provides an introduction to statistical inference with network data.The authors present a self-contained derivation and mathematical formulation of methods, review examples, and real-world applications, as well as provide data and code in the R environment that can be customised.Inferential network analysis transcends fields, and examples from across the social sciences are discussed (from management to electoral politics), which can be adapted and applied to a panorama of research.From scholars to undergraduates, spanning the social, mathematical, computational and physical sciences, readers will be introduced to inferential network models and their extensions.The exponential random graph model and latent space network model are paid particular attention and, fundamentally, the reader is given the tools to independently conduct their own analyses.

    Price: 45.99 £ | Shipping*: 0.00 £
  • Science, Technology And Innovation Indicators : Lessons from the Development Experience in Africa
    Science, Technology And Innovation Indicators : Lessons from the Development Experience in Africa


    Price: 39.95 £ | Shipping*: 0.00 £
  • How does notification work in network technology?

    Notification in network technology works by sending a message or signal from one device to another to inform the receiving device about a specific event or update. This can be done through various communication protocols such as TCP/IP, HTTP, or MQTT. When a device needs to notify another device, it sends a notification message containing the relevant information, and the receiving device processes the message and takes appropriate action based on the notification. This process allows for real-time communication and updates between devices in a network.

  • What is the network technology for the network ID and the host ID?

    The network technology for the network ID and the host ID is based on the Internet Protocol (IP) addressing system. In this system, the network ID is used to identify the specific network that a device is connected to, while the host ID is used to identify the specific device within that network. This addressing system allows for the routing of data packets to the correct destination on the network. The network ID and host ID are used in conjunction with subnet masks to determine the boundaries of the network and the individual devices within it.

  • How is the development of the switching network done with an output switching network?

    The development of the switching network with an output switching network involves designing a system that can efficiently route data packets from input ports to output ports. This is typically achieved by using algorithms to determine the best path for each packet based on factors like network congestion and available bandwidth. The output switching network then directs the packets to their respective output ports, ensuring that data is transmitted accurately and efficiently. By carefully managing the flow of data through the network, the output switching network helps optimize performance and minimize delays.

  • Can you turn off network discovery in Linux Mint Cinnamon?

    Yes, you can turn off network discovery in Linux Mint Cinnamon. You can do this by going to the Network settings and disabling the option for network discovery. This will prevent your computer from automatically detecting and connecting to other devices on the network. Keep in mind that turning off network discovery may limit your ability to access shared files and devices on the network.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.