Books
Buy Computers eBooks - BookRix eBook Shop
Find great, yet low-priced, eBooks in the category: Computers. Discover new authors and their eBooks. You can buy all eBooks published on BookRix in all the major eBook stores.
Popular categories:
Networking
- English
- 22717 Words
- Ages 16 and up
- 123
The text book is written in simple and easily understandable language.This book can be used as a self-study guide for compter science students.I made (Dr.Prakash Kumar)sincere attempts to analyse every important topic completely and put before the reader of this book in the... Read more...
Keywords: Network, Communication, Data, Security, LAN, Models, TCP/IP, OSI, Ethernet, CSMA, Error, Digital, Analog, Packet, Frame, Address, Flow, Access, Data Communication, Fast Ethernet, Token Ring, Point to point, Star, Ring, Bus, Multipoint, Physical, Layers, Topology, Network Criteria, Text, Timeliness, Jitter, Simplex, Half-duplex, Full-Duplex, Data Flow, Error Control, Access Control, Routing, Communication System, Transmitter, Transmission, Channels, Noise, Electronic data interchange, Reliability, Recovery, MAN, WAN, Internetwork, Type of Connection, Transport Layer, Logical addressing, Service Point Addressing, Segmentation, Reassembling, Session, dialog controller, Synchronization, Cryptography, Plaintext, Cipher text, Encipher, Decipher, Key, Cipher, decode, encode, Cryptology, Cryptanalysis, SECURITY SERVICES, Confidentiality, Authentication, Integrity, Non repudiation, Availability, Access control, Symmetric key, Public key, Images, Numbers, Receiver, Sender, Device, . Message, Protocol, Communication medium, Destination, RESOURCE SHARING, Security through redundancy, Dedicated Servers, Non-dedicated Servers, Electronic data interchange (EDI), Cable television, Teleconferencing, NODE, IPv6, FTP, email services, • Web sites, Tree, Reference Model [more]
$1.99
- English
- 3669 Words
- Ages 0 and up
- 117
A crypto faucet is a website that will give you satoshis in exchange for viewing ads or completing simple tasks. Crypto currency mining is the process in which transactions between users are verified and added into the block chain. The process of mining is also responsible... Read more...
Keywords: Crypto Currency, Airdrop, Faucet, Cloud Mining, Exchanges, Paypal, Exchanger, Bounty, Ethereum, Bitcoin, Blockchain, Crypto Currency, Airdrop, Faucet, Cloud Mining, Exchanger, Exchanges, Paypal, Bounty, Ethereum, Bitcoin, Blockchain [more]
$4.99
- English
- 5071 Words
- Ages 0 and up
- 113
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run... Read more...
Keywords: RDP, VPS, Remote Desktop Protocol, Google Cloud, Amazon AWS, Microsoft Azure
$7.99
- English
- 5157 Words
- Ages 0 and up
- 110
The objective of this work is to provide some quick tutorials in computer networking hacking. The work includes the following tutorials:
- Tutorial 1: Setting Up Penetrating Tutorial in Linux.
- Tutorial 2: Setting Up Penetrating Tutorial in Windows.
- Tutorial 3: OS Comm... Read more...
Keywords: Linux Hacking, Windows Hacking, System Hacking, Trojans, Backdoors, Viruses, Sniffer, Phishing, Hacking, Hacking Web Servers, Wireless Hacking, Mobile Applications, Computer Networking, Computer Security, Hacker, Web Server Hacking, Linux Hacking, Windows Hacking, System Hacking, Trojans, Backdoors, Viruses, Sniffer, Phishing, Hacking, Hacking Web Servers, Wireless Hacking, Mobile Applications, Computer Networking, Computer Security, Hacker, Web Server Hacking [more]
$12.99
- English
- 10517 Words
- Ages 0 and up
- 110
The aim from this book to provide a quick guide for creating wordpress online store and online magazine, creating epub e-books using epub editors and converters, and an overview of some internet fax, voice over ip calls and sms verifications services providers. The book ... Read more...
Keywords: Wordpress , Online, Online Store, e Magazine, Ecommerce, Wordpress Plugin, MH-Magazine Theme, efax, internet fax, sms verification, EPUB, EPUB Editor, EPUB Convertor, EPUB Validator, Sigil, Calibre, EPUB Reader, Virtual Phone Number, Voice Over IP Calls, Wordpress, Online, Online Store, e Magazine, e Magazine, Ecommerce, Wordpress Plugin, MH-Magazine Theme, efax, internet fax, sms, sms verification, EPUB, EPUB Editor, EPUB Convertor [more]
$14.99
- English
- 4948 Words
- Ages 0 and up
- 106
This book provides brief survey of the some Voice Over IP (VOIP) providers, including the providers that offers free calls to some countries. Then, I will mention some websites that offer virtual phone numbers from around the world to receive activation codes and SMS confir... Read more...
Keywords: efax, internet fax, sms verification, Virtual Phone Number, Voice Over IP Calls, VOIP phone, VOIP Service Provider, Inphonex, SIP, efax, internet fax, sms verification, Virtual Phone Number, Virtual Phone Number, Voice Over IP Calls, VOIP phone, VOIP Service Provider, Inphonex, SIP [more]
$5.99
- English
- 9212 Words
- Ages 0 and up
- 105
As we all know, there are many Android phones are facing low internal memory issue when installing games and apps. This problem is especially serious in budget phones because most of these phones have little memory; for example, some Android phones only have 4G memory. If ... Read more...
Keywords: Android, Galaxy, Internal Memory, External Memory, Custom Rom, Recovery, Terminal Emulator, Disk Partition, Mounts2SD, Link2SD, Apps2SD, Whatsapp, SDCard
$7.99
- English
- 4039 Words
- Ages 0 and up
- 102
Today a lot of sites require SMS verification code for registration account. If you do not want to use your personal phone number to verify or activate account, use virtual phone number. Thus, there is no need for a SIM card in your mobile phone, only need access to the ... Read more...
Keywords: SMS, SMS Verification, Virtual Phone Number, Virtual Visa Cards, Credit Card Generator, VPN, Viabox
$7.99
- English
- 4096 Words
- Ages 0 and up
- 96
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools... Read more...
Keywords: Vulnerability Assessment Tools, Intrusion Detection Tools, Intrusion Detection Tools, LANguard, Snort, Nessus, BASE, OSSEC, Sguil
$4.99
Networks
- English
- 6429 Words
- Ages 16 and up
- 94
The text book is written in simple and easily understandable language.This book can be used as a self-study guide for compter science students.I made (Dr.Prakash Kumar)sincere attempts to analyse every important topic completely and put before the reader of this book in the... Read more...
Keywords: CELLULAR, NETWORK, Channel, subscriber, User equipment, cells, capacity, transmission, geographical, MSC, BTS, PSTN, BSC, VLR, GSM, Mobile Communication, Global System, National Carrier Exchange, Mobile Station, Base Station (BS), CELLULAR PHONE, frequency, handover, SPECTRUM, Microcellular Systems, bandwidth, Base Station Signals, Multiple Access, FDMA, TDMA, DATA TRANSMISSION, • Buffering, Performance, • Buffer Administration Techniques, CMPS, packet switched technology, MCN, BS [more]
$1.99