Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (54)Тематичний інтернет-навігатор (4)Автореферати дисертацій (5909)Реферативна база даних (21790)Книжкові видання та компакт-диски (4474)Журнали та продовжувані видання (148)
Пошуковий запит: (<.>K=МЕРЕЖ$<.>+<.>K=ЯЗКУ$<.>)
Загальна кількість знайдених документів : 431
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.

Alwayn, V.
Optical Network Design and Implementation [Electronic resource] / V. Alwayn. - Indianapolis : Cisco Press, 2004. - 840 p.
Переклад назви: Проектування та реалізація оптичної мережі

Рубрики:

  Повний текст доступний у читальних залах НБУВ


A comprehensive guide to understanding and configuring multiservice DWDM, SONET, and SDH architectures



Кл.слова:
мережа -- комп'ютер

   Тип видання:   наукове видання   
2.

Barken, L.
How secure is your wireless network? Safeguarding your wi-fi LAN [Electronic resource] / L. Barken. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator,security specialist, manager, or home user.



Кл.слова:
бездротові локальні мережі -- захист інформації

   Тип видання:   наукове видання   
3.

Barnes, D.
Cisco LAN switching [Electronic resource] / D. Barnes, B. Sakandar. - Indianapolis : Cisco Press, 2004. - 408 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment.



Кл.слова:
мережі -- інтернет

   Тип видання:   наукове видання   
4.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   методичний посібник   
5.

Bejtlich, R.
The Tao of network security monitoring. Beyond intrusion detection [Electronic resource] / R. Bejtlich. - Boston : Addison Wesley, 2004. - 832 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious....If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking "What's next?" If so, this book is for you.



Кл.слова:
мережа -- захист

   Тип видання:   словник   
6.

Belinsky, N.
Краткий англо-русский компьютерный словарь [Електронний ресурс] / N. Belinsky. - [Б. м. : б. в.], 2001. - 64 с.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Этот словарь предназначен для тех, кто в силу своих интересов или жизненной необходимости общается с компьютером, забредает в паутину Интернета, осваивает основы программирования, но незнаком с английским языком. В данный словарь вошло около 3000 слов и выражений. Это термины, позволяющие работать в "Виндоус" и некоторых не относящихся к этому пакету программах, а также необходимые для работы с факсом и в Сети. Есть здесь и некоторые расширения имен файлов, и сокращения, а также очень часто встречающиеся выражения. Конечно, искать нужное слово удобнее, ориентируясь в алфавите, который, на всякий случай, помещен после данного предисловия. Что касается грамматических форм, то наиболее распространенные глаголы приводятся не только в настоящем, но и в прошедшем времени, а в случае крайней необходимости даются и личные формы настоящего времени.



Кл.слова:
мережа -- інтернет -- програмування

   Тип видання:   наукове видання   
7.

Bigus, J. P.
Data Mining with Neural Networks [Electronic resource] / J. P. Bigus. - New York : McGRAW-HILL, 1996. - 220 p.
Переклад назви: Видобуток даних за допомогою нейронних мереж

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book contains simple examples to provide illustration. The data used in the examples contains information that is not based on any real companies or people. The author and publisher of this book have used their best efforts in preparing this book. The author and publisher make no warranty of any kind, expressed or implied, with regard to the documentation and examples contained in this book. The author and publisher shall not be liable in any event for incidental or consequential damages in connection with, or arising out of the use of, information in this book. The views expressed in this book are the views of the author and do not necessarily reflect the views of the IBM Corporation. This book is not sponsored in any part, or in any manner, by IBM.



Кл.слова:
дані -- мережа

   Тип видання:   методичний посібник   
8.

Bollapragada, V.
IPSec VPN design [Electronic resource] / V. Bollapragada, M. Khalid, S. Wainner. - Indіanapolіs : Cisco Press, 2005. - 384 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


IPSec VPN Design consists of three main sections. The first section provides a comprehensive introduction to the IPSec protocol, including IPSec Peer Models. This section also includes an introduction to site-to-site, network-based, and remote access VPNs. The second section is dedicated to an analysis of IPSec VPN architecture and proper design methodologies. Peer relationships and fault tolerance models and architectures are examined in detail. Part three addresses enabling VPN services, such as performance, scalability, packet processing, QoS, multicast, and security. This book also covers the integration of IPSec VPNs with other Layer 3 (MPLS VPN) and Layer 2 (Frame Relay, ATM) technologies; and discusses management, provisioning, and troubleshooting techniques. Case studies highlight design, implementation, and management advice to be applied in both service provider and enterprise environments.



Кл.слова:
віртуальна мережа

   Тип видання:   методичний посібник   
9.

Boney, J.
Cisco IOS in a Nutshell [Electronic resource] / J. Boney. - 2nd. ed.. - Sebastopol : O'Reilly, 2005. - 796 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS.



Кл.слова:
мережа

   Тип видання:   наукове видання   
10.

Borge, S.
Managing enterprise systems with the Windows Script Host [Electronic resource] / S. Borge. - New York : Apress, 2002. - 92 p.
Переклад назви: Управління корпоративних систем з Windows Script Host

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Targeted towards administrative and support staff in Microsoft networked environments with the aim of automating common administrative tasks, this resource provides practical solutions to common problems through detailed discussions.



Кл.слова:
комп'ютер -- корпоративна мережа

   Тип видання:   методичний посібник   
11.

Brendan, P. K.
Zen and the Art of the Internet [Electronic resource] / P. K. Brendan. - [S. l. : s. n.]
Переклад назви: Дзен і мистецтво в Інтернеті

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The composition of this booklet was originally started because the Computer Science department at Widener University was in desperate need of documentation describing the capabilities of this ``great new Internet link'' we obtained. It's since grown into an effort to acquaint the reader with much of what's currently available over the Internet. Aimed at the novice user, it attempts to remain operating system ``neutral''---little information herein is specific to Unix, VMS, or any other environment. This booklet will, hopefully, be usable by nearly anyone. The purpose of this booklet is two-fold: first, it's intended to serve as a reference piece, which someone can easily grab on the fly and look something up. Also, it forms a foundation from which people can explore the vast expanse of the Internet. Zen and the Art of the Internet doesn't spend a significant amount of time on any one point; rather, it provides enough for people to learn the specifics of what his or her local system offers. One warning is perhaps in order---this territory we are entering can become a fantastic time-sink. Hours can slip by, people can come and go, and you'll be locked into Cyberspace. Remember to do your work!



Кл.слова:
глобальна мережа

   Тип видання:   підручник   
12.

Brown, I. J.
Cisco cookbook [Electronic resource] / I. J. Brown, K. Dooley. - Sebastopol : O'Reilly, 2003. - 885 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
мережеве обладнання -- мережева технологія

   Тип видання:   наукове видання   
13.

Callaway, Е. H.
Wireless sensor networks [Electronic resource] : architectures and protocols / Е. H. Callaway. - Boca Raton : CRC Press, 2004. - 350 p.
Переклад назви: Бездротові сенсорні мережі: архітектура і протоколи

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This informative text describes how to build wireless sensor networks from the layers of the communication protocol through the design of network nodes. It also describes the design features of the wireless devices themselves.



Кл.слова:
телекомунікаційна система -- мережі

   Тип видання:   підручник   
14.

Casad, J.
Sams teach yourself TCP/IP in 24 hours [Electronic resource] / J. Casad. - 3rd. ed.. - Indianapolis : Sams Publishing, 2003. - 450 p.
Переклад назви: Самовчитель TCP/IP за 24 години

Рубрики:

  Повний текст доступний у читальних залах НБУВ


As the Internet continues to expand its reach, more and more users, administrators, and programmers need to learn about TCP/IP--the core standard behind the Internet, and the dominant protocol for networks throughout the world. Sams Teach Yourself TCP/IP in 24 Hours provides a clear and concise introduction to TCP/IP. It is accessible enough for non-technical readers, yet specific enough for technical readers who are looking for a solid foundation in TCP/IP. This edition adds coverage of recent developments that affect TCP/IP. New topics added include: wireless networking, spam control, broadband, and peer-to-peer networking technologies.



Кл.слова:
мережевий протокол -- інтернет-протокол

   Тип видання:   підручник   
15.

Castelli, M. J.
LAN switching first-step [Electronic resource] / M. J. Castelli. - Indianapolis : Cisco Press, 2004. - 408 p.
Переклад назви: Перший крок комутації ЛКМ

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed.



Кл.слова:
комп'ютерна мережа -- лкм

   Тип видання:   наукове видання   
16.

Cavanaugh, M. J.
IP Telephony Self-Study: Cisco QOS Exam Certification Guide [Electronic resource] / M. J. Cavanaugh. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 768 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The Cisco IP Telephony focused certification tracks validate proficiency in designing, installing, and supporting a multiservice network solution. A solid understanding of quality-of-service (QoS) features and implementation is essential for all of the Cisco IP Telephony focused certifications and is also a core component of the CCIP certification.



Кл.слова:
мережі -- безпека

   Тип видання:   наукове видання   
17.


CCNP practical studies: remote access [Electronic resource] / W. Shuo [et al.]. - Indianapolis : Cisco Press, 2003. - 528 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


CCNP Practical Studies: Remote Access (CCNP Self-Study) prepares readers for the CCNP 642-821 BCRAN exam and for workplace challenges in implementing remote access network applications. Designed as a topic-by-topic guide of how to apply remote access concepts in a real network setting, this book is useful in preparing a CCNP candidate for the general exam questions by providing a better understanding of how remote access really works. It is also essential in preparing candidates for the new simulation-based questions that are on the Cisco certification exams. Finally, it serves anyone wanting a guide to real-world application of these concepts, regardless of certification interest.



Кл.слова:
мережі -- комп'ютер

   Тип видання:   методичний посібник   
18.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
19.


CISCO nets [Electronic resource]. - [S. l. : s. n.]
Переклад назви: Мережі CISCO

Рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
мережа

   Тип видання:   науково-популярне видання   
20.
 


Clark, Paul.
Youth Culture in China [Electronic resource] : from Red Guards to netizens / Paul Clark. - Cambridge : Cambridge university press, 2012. - 306 p
Переклад назви: Молодіжна культура в Китаї: від хунвейбінів до мешканців мережі

Рубрики:

Географічні рубрики:
  

  Повний текст доступний у читальних залах НБУВ


A fascination with 1988, the most liberal moment in China since 1949, inspired this study, as did a frustration with breathless accounts of present day social change in China. As an historian, I wanted to trace the roots of contemporary developments, building on an almost fortyyear acquaintance with life in China. Many people and institutions have kindly enabled me to do this. A major grant from the Marsden Fund of the Royal Society of New Zealand provided much appreciated support for several visits to China. The Lee Hysan Foundation generously supported a two-month period working in the Universities Service Centre for China Studies at the Chinese University of Hong Kong. The PekingUniversity Library was a productive home base for much of this research. Other institutions that helped include the Shanghai Library, the Library of the China Youth University for Political Sciences in Beijing, the National Library in Beijing, and the Shanghai Academy of Social Sciences. Research support also came from the University of Auckland, including its Faculty of Arts. Many colleagues and friends have helped along the way, including Philip Abela, Chris Berry, Tony and Susan Browne, Chen Xin, BrianDonovan, Hong-yu Gong,AndersHansson, Wayne Lawrence, HaiqingLin, Bonnie McDougall, Rumi Sakamoto, RobertSanders, Rebecca Wu Xiaojing, and Zhou Xuelin. Bonnie McDougall and Stanley Rosen offered valuable advice at crucial points in the project. Linda Lew made good use of a University of Auckland Summer Scholarship to trawl the Internet on my behalf. Jeff Lau has helped keep me grounded. At Cambridge in New York, Eric Crahan and Abigail Zorbaugh provided vital encouragement and support. These people and institutions, along with numerous friends and colleagues in China whom I have not named, have made the research a pleasure and this book possible. I warmly thank them all, including those whom I have not identified. The book’s shortcomings are mine alone.



Кл.слова:
зміна культурної парадигми -- трансформація суспільства -- синологія
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського