Verleger: 16
Edward L. Platt
NetworkX is a leading free and open source package used for network science with the Python programming language. NetworkX can track properties of individuals and relationships, find communities, analyze resilience, detect key network locations, and perform a wide range of important tasks. With the recent release of version 2, NetworkX has been updated to be more powerful and easy to use.If you’re a data scientist, engineer, or computational social scientist, this book will guide you in using the Python programming language to gain insights into real-world networks. Starting with the fundamentals, you’ll be introduced to the core concepts of network science, along with examples that use real-world data and Python code. This book will introduce you to theoretical concepts such as scale-free and small-world networks, centrality measures, and agent-based modeling. You’ll also be able to look for scale-free networks in real data and visualize a network using circular, directed, and shell layouts.By the end of this book, you’ll be able to choose appropriate network representations, use NetworkX to build and characterize networks, and uncover insights while working with real-world systems.
David Knickerbocker
Network analysis is often taught with tiny or toy data sets, leaving you with a limited scope of learning and practical usage. Network Science with Python helps you extract relevant data, draw conclusions and build networks using industry-standard – practical data sets. You’ll begin by learning the basics of natural language processing, network science, and social network analysis, then move on to programmatically building and analyzing networks. You’ll get a hands-on understanding of the data source, data extraction, interaction with it, and drawing insights from it. This is a hands-on book with theory grounding, specific technical, and mathematical details for future reference. As you progress, you’ll learn to construct and clean networks, conduct network analysis, egocentric network analysis, community detection, and use network data with machine learning. You’ll also explore network analysis concepts, from basics to an advanced level. By the end of the book, you’ll be able to identify network data and use it to extract unconventional insights to comprehend the complex world around you.
Mercury Learning and Information, Sarhan M. Musa
This new edition introduces fundamental concepts in computer networks, blockchain, cryptography, and network security. It covers classical cipher schemes, public key cryptography, authentication schemes, and Internet security, featuring new material on IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and AI security.Starting with computer network basics and mathematical foundations, it then explores classical and modern cipher schemes, public-key cryptography, and authentication methods. Later chapters address Internet and system security, and emerging technologies.Intended as a textbook for computer science and electronics courses, it also serves as a comprehensive reference for professionals. Its structured approach ensures a thorough understanding of both foundational and advanced topics, making it essential for mastering cryptography and network security.
Aditya Mukherjee
With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.You’ll understand how to identify security vulnerabilities across the network and how to effectively use a variety of network security techniques and platforms. Next, the book will show you how to design a robust network that provides top-notch security to protect against traditional and new evolving attacks. With the help of detailed solutions and explanations, you'll be able to monitor networks skillfully and identify potential risks. Finally, the book will cover topics relating to thought leadership and the management aspects of network security.By the end of this network security book, you'll be well-versed in defending your network from threats and be able to consistently maintain operational efficiency, security, and privacy in your environment.
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
Manuj Aggarwal
While connected to the internet, you’re a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or ‘shield’) between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the world's most trusted open source network security solution.Network Security with pfSense begins with an introduction to pfSense, where you will gain an understanding of what pfSense is, its key features, and advantages. Next, you will learn how to configure pfSense as a firewall and create and manage firewall rules. As you make your way through the chapters, you will test pfSense for failover and load balancing across multiple wide area network (WAN) connections. You will then configure pfSense with OpenVPN for secure remote connectivity and implement IPsec VPN tunnels with pfSense. In the concluding chapters, you’ll understand how to configure and integrate pfSense as a Squid proxy server.By the end of this book, you will be able to leverage the power of pfSense to build a secure network.
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
Sagar Rahalkar
The tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism.By the end of this book, you will be in a position to build a security framework fit for an organization.
Gordon Davies
A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366.Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests. By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.
Manpreet Singh Ghotra, Rajdeep Dua
If you're aware of the buzz surrounding the terms such as machine learning, artificial intelligence, or deep learning, you might know what neural networks are. Ever wondered how they help in solving complex computational problem efficiently, or how to train efficient neural networks? This book will teach you just that.You will start by getting a quick overview of the popular TensorFlow library and how it is used to train different neural networks. You will get a thorough understanding of the fundamentals and basic math for neural networks and why TensorFlow is a popular choice Then, you will proceed to implement a simple feed forward neural network. Next you will master optimization techniques and algorithms for neural networks using TensorFlow. Further, you will learn to implement some more complex types of neural networks such as convolutional neural networks, recurrent neural networks, and Deep Belief Networks. In the course of the book, you will be working on real-world datasets to get a hands-on understanding of neural network programming. You will also get to train generative models and will learn the applications of autoencoders.By the end of this book, you will have a fair understanding of how you can leverage the power of TensorFlow to train neural networks of varying complexities, without any hassle. While you are learning about various neural network implementations you will learn the underlying mathematics and linear algebra and how they map to the appropriate TensorFlow constructs.