Network Books



Bookstore > Books > Network

Network Programmability and Automation

Network Programmability and Automation

Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical guide shows network engineers how to use a ra...
Learning OpenStack Networking, 3rd Edition

Learning OpenStack Networking, 3rd Edition

OpenStack Networking is a pluggable, scalable, and API-driven system to manage physical and virtual networking resources in an OpenStack-based cloud. Like other core OpenStack components, OpenStack Networking can be used by administrators and users to increase the value and maximize the use of existing datacenter resources. This third edi...
Practical Network Scanning

Practical Network Scanning

Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization.Practical Network Scanning starts with t...
Mastering Python for Networking and Security

Mastering Python for Networking and Security

It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident, usually carried out by just hacking a simple network line. Increasing your network's security helps step up your defenses against cyber attacks. Meanwhile, Python is being used for increasingly advanced...
Network Scanning Cookbook

Network Scanning Cookbook

Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network.Network...
Hands-On Neural Network Programming with C#

Hands-On Neural Network Programming with C#

Neural networks have made a surprise comeback in the last few years and have brought tremendous innovation in the world of artificial intelligence.The goal of this book is to provide C# programmers with practical guidance in solving complex computational challenges using neural networks and C# libraries such as CNTK, and TensorFlowSharp. ...
Networking All-in-One For Dummies, 7th Edition

Networking All-in-One For Dummies, 7th Edition

Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you'll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network.In...
Practical Contiki-NG

Practical Contiki-NG

Explore how to develop and implement wireless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG's advantages in sensing, communication, and energy optimization and enables you to begin solving problems in automation with WSN.Practical Contiki-NG is a guide to getting started ...
Raspberry Pi for Arduino Users

Raspberry Pi for Arduino Users

Leverage your Arduino skills in the Raspberry Pi world and see how to cross the two platforms into sophisticated programs.The Arduino and Raspberry Pi communities overlap more than you might think. Arduinos can be expanded to have network capabilities with a variety of "shields", all of which increase the cost and complexity of ...
Neural Networks for Electronics Hobbyists

Neural Networks for Electronics Hobbyists

Learn how to implement and build a neural network with this non-technical, project-based book as your guide. As you work through the chapters, you'll build an electronics project, providing a hands-on experience in training a network.There are no prerequisites here and you won't see a single line of computer code in this book. Instead, it...
Java APIs, Extensions and Libraries, 2nd Edition

Java APIs, Extensions and Libraries, 2nd Edition

This book completes the Apress Java learning journey and is a comprehensive approach to learning Java APIs, extensions, and modules such as Java EE integration, mobile Java modules, JavaFX, and JDBC. In this book, you'll learn how to build user interfaces with Swing and JavaFX as well as how to write network programs with the new Java 9 a...
Deep Belief Nets in C++ and CUDA C: Volume 1

Deep Belief Nets in C++ and CUDA C: Volume 1

Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers...
Deep Learning for Natural Language Processing

Deep Learning for Natural Language Processing

Discover the concepts of deep learning used for natural language processing (NLP), with full-fledged examples of neural network models such as recurrent neural networks, long short-term memory networks, and sequence-2-sequence models.You'll start by covering the mathematical prerequisites and the fundamentals of deep learning and NLP with...
Applied Deep Learning

Applied Deep Learning

Work with advanced topics in deep learning, such as optimization algorithms, hyper-parameter tuning, dropout, and error analysis as well as strategies to address typical problems encountered when training deep neural networks. You'll begin by studying the activation functions mostly with a single neuron (ReLu, sigmoid, and Swish), seeing ...
Investigating the Cyber Breach

Investigating the Cyber Breach

Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.Writing...
Complex Network Analysis in Python

Complex Network Analysis in Python

Complex network analysis used to be done by hand or with non-programmable network analysis tools, but not anymore! You can now automate and program these tasks in Python. Complex networks are collections of connected items, words, concepts, or people. By exploring their structure and individual elements, we can learn about their meaning, ...
Deep Learning By Example

Deep Learning By Example

Deep learning is a popular subset of machine learning, and it allows you to build complex models that are faster and give more accurate predictions. This book is your companion to take your first steps into the world of deep learning, with hands-on examples to boost your understanding of the topic.This book starts with a quick overview of...
Mastering Go

Mastering Go

The Go programming language, often referred to as Golang, is really making strides, with some masterclass developments, architected by the greatest programming minds. Tobias Lutke, CEO of Shopify, recently quoted as saying "Go will be the server language of the future", powerful words, with much ambition. Go programmers are in h...
Deep Learning with TensorFlow, 2nd Edition

Deep Learning with TensorFlow, 2nd Edition

Deep learning is a branch of machine learning algorithms based on learning multiple levels of abstraction. Neural networks, which are at the core of deep learning, are being used in predictive analytics, computer vision, natural language processing, time series forecasting, and to perform a myriad of other complex tasks.This book is conce...
Hands-On Transfer Learning with Python

Hands-On Transfer Learning with Python

Transfer learning is a machine learning (ML) technique where knowledge gained during training a set of problems can be used to solve other similar problems.The purpose of this book is two-fold; firstly, we focus on detailed coverage of deep learning (DL) and transfer learning, comparing and contrasting the two with easy-to-follow concepts...

Pages: 1, 2, 3 ... 32 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.