WiFi Professionnel 3e dition

Titre : WiFi Professionnel 3e dition
Auteur : Aurélien Géron
Éditeur : Dunod
ISBN-13 : 9782100541836
Libération : 2009-09-23

Télécharger Lire en ligne



Le WiFi (Wireless Fidelity)permet de raccorder ordinateurs et périphériques à un réseau par l'intermédiaire d'une simple liaison radio. Cette technologie est maintenant très répandue, tant chez les particuliers qu'en entreprises. Ce livre est conçu pour une utilisation professionnelle du WiFi. Il commence par un état de l'art des technologies en présence (802.11, Bluetooth,...), décrit ensuite les diverses solutions d'architectures de ces réseaux et détaille les différentes étapes du déploiement (bilan de liaisons, évitement des obstacles, optimisation de la couverture radio...), Une partie importante de l'ouvrage est consacrée aux aspects confidentialité qui constituent sans conteste un point sensible. L'administration, la supervision du réseau et la qualité de service sont enfin expliquées en détail. Cette 3ème édition rend compte des évolutions technologiques récentes ("craquage" de la clé WPA qui garantit le cryptage des émissions en WiFi), de l'évolution de la qualité de service, et un nouveau chapitre est ajouté sur la question sensible des éventuels risques que le WiFi aurait sur la santé.

WiFi professionnel

Titre : WiFi professionnel
Auteur : Aurélien Géron
Éditeur :
ISBN-13 : 2100529633
Libération : 2009

Télécharger Lire en ligne



L'objectif de ce livre est de vous aider à bâtir un réseau sans fil professionnel et sécurisé : La première partie vous permettra de comprendre le WiFi et les rouages de la norme 802.11 : des modulations radio (DSSS, OFDM, MIMO...) à la gestion de la QoS (802.11e, WMM). Elle dresse un panorama des technologies alternatives, du futur du WiFi et des perspectives ouvertes par la voix sur IP sans fil. La deuxième partie vous permettra de concevoir et déployer un réseau WiFi de qualité professionnelle. Vous saurez choisir le matériel adéquat, réaliser une cartographie radio, gérer les obstacles et les interférences, et superviser votre réseau. La troisième partie vous donnera toutes les armes pour sécuriser au mieux votre réseau sans fil. Vous connaîtrez les attaques possibles, les bonnes pratiques et les technologies pour vous protéger : WEP, VPN, 802.1x, WPA et WPA2. Vous découvrirez également les serveurs d'authentification RADIUS qui sont au coeur des réseaux WiFi d'entreprise. Cette troisième édition comporte un grand nombre de mises à jour notamment sur la réglementation et la santé, les évolutions des normes (802.11e, 802.11n, 802.11s...), les commutateurs intelligents qui gagnent du terrain, et les technologies connexes qui ont évolué.

Wi Fi

Titre : Wi Fi
Auteur : Philippe Atelin
Éditeur : Editions ENI
ISBN-13 : 2746031264
Libération : 2006

Télécharger Lire en ligne



Cet ouvrage est destiné à aider les professionnels du réseau dans l'appréhension et le déploiement d'un réseau local sans fil. Le Wi-Fi est replacé dans le contexte des autres technologies réseaux (Ethernet, Bluetooth, WiMax, CPL, UMTS...). Les caractéristiques des ondes, modulations et autres phénomènes ondulatoires sont décrites afin d'optimiser au mieux le signal radio. Les aspects réglementaires ne sont pas oubliés, tout comme les critères de choix d'une antenne, qu'elle soit de type fouet, patch ou yagi. Toutes les caractéristiques qui font la qualité et la performance d'un réseau Wi-Fi sont présentées. L'accent est mis dans les derniers chapitres de ce livre sur les différents aspects de la sécurisation d'un tel outil de communication : WEP, WPA, WPA2 (802.11i) et autres solutions sont étudiées en détail.

Hands On Machine Learning with Scikit Learn and TensorFlow

Titre : Hands On Machine Learning with Scikit Learn and TensorFlow
Auteur : Aurélien Géron
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781491962268
Libération : 2017-03-13

Télécharger Lire en ligne



Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. This practical book shows you how.

Windows Malware Analysis Essentials

Titre : Windows Malware Analysis Essentials
Auteur : Victor Marak
Éditeur : Packt Publishing Ltd
ISBN-13 : 9781785287633
Libération : 2015-09-01

Télécharger Lire en ligne



Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Building Wireless Community Networks

Titre : Building Wireless Community Networks
Auteur : Rob Flickenger
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 0596005024
Libération : 2003

Télécharger Lire en ligne



Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b standard (also known as WiFi) makes it possible to network towns, schools, neighborhoods, small business, and almost any kind of organization. All that's required is a willingness to cooperate and share resources. The first edition of this book helped thousands of people engage in community networking activities. At the time, it was impossible to predict how quickly and thoroughly WiFi would penetrate the marketplace. Today, with WiFi-enabled computers almost as common as Ethernet, it makes even more sense to take the next step and network your community using nothing but freely available radio spectrum. This book has showed many people how to make their network available, even from the park bench, how to extend high-speed Internet access into the many areas not served by DSL and cable providers, and how to build working communities and a shared though intangible network. All that's required to create an access point for high-speed Internet connection is a gateway or base station. Once that is set up, any computer with a wireless card can log onto the network and share its resources. Rob Flickenger built such a network in northern California, and continues to participate in network-building efforts. His nuts-and-bolts guide covers: Selecting the appropriate equipment Finding antenna sites, and building and installing antennas Protecting your network from inappropriate access New network monitoring tools and techniques (new) Regulations affecting wireless deployment (new) IP network administration, including DNS and IP Tunneling (new) His expertise, as well as his sense of humor and enthusiasm for the topic, makes Building Wireless Community Networks a very useful and readable book for anyone interested in wireless connectivity.

Megacity Slums

Titre : Megacity Slums
Auteur : Marie-Caroline Saglio-Yatzimirsky
Éditeur : World Scientific
ISBN-13 : 9781908979612
Libération : 2013-10-18

Télécharger Lire en ligne



This book looks at slums and social exclusion in the four major megacities of India and Brazil, and analyzes the interrelationships between urban policies and housing and environmental issues. In Delhi, Mumbai, Rio de Janeiro and São Paulo, the challenges they pose have spurred public actors into action through housing, rehabilitation and conservation programs, not to mention civil society and the inhabitants themselves. On the other hand, one must wonder whether these challenges were partly created by the deficiencies of these very public actors and civil society, be it their lack of intervention (as advocates of government intervention would argue), or the flaws and inadequacies of their actions (as supporters of the free market would suggest). Are policies alleviating or aggravating social exclusion? This book explores these questions and more. Contents:Introduction: Social Exclusion, Space and Urban Policies in Brazil and India (Frédéric Landy and Marie-Caroline Saglio-Yatzimirsky)National and Urban Contexts of the Four Metropolises (Hervé Théry, Louise Bruno, Véronique Dupont, Frédéric Landy, Ailton Luchiari, Marie-Caroline Saglio-Yatzimirsky and Marie-Hélène Zérah)The Right of the City or the Right to the City? (Rafael Soares Gonçalves)Public Policies and the “Treatment” of Slums (Véronique Dupont and Marie-Caroline Saglio-Yatzimirsky)Public Policies, Environment and Social Exclusion (Neli de Mello-Théry, Louise Bruno, Véronique Dupont, Marie-Hélène Zérah, Benedito Oscar Correia, Marie-Caroline Saglio-Yatzimirsky and Wagner Ribeiro)Local and Translocal Systems of Actors (Frédéric Landy and Nicolas Bautès)Slum Demolition: Impact on the Affected Families, and Coping Strategies (Véronique Dupont and Damien Vaquier)Acting from the Slums: Questioning Social Movement and Resistance (Nicolas Bautès, Véronique Dupont and Frédéric Landy)Conclusion: Spatial Justice, Exclusion and Urban Policies in Brazil and India (Frédéric Landy and Marie-Caroline Saglio-Yatzimirsky) Readership: Readers with an interest in slums (particularly in Brazil and India) and the political, environmental and sociological effects they have in their respective countries. Keywords:Slums;Housing;Favelas;Megacities;Urban Policies;Urban Governance;Exclusion;Space;India;Brazil;Mumbai;Delhi;Sao Paulo;Rio de JaneiroKey Features:The comparison between Brazil and India has never been developed in such a way. First book of its kind to encompass such a wide topic, articulating urban studies with geographical, demographical, sociological, juridical, economic and political perspectivesMost comparative country or city studies develop monographs without further analysis. The authors have maintained comparative treatment of Indian and Brazilian case studies throughout the book. The volume consists of chapters co-written by several authors and none of them deal with only one city or country, to the benefit of the comparative and synthetic perspectives

Livres hebdo

Titre : Livres hebdo
Auteur :
Éditeur :
ISBN-13 : STANFORD:36105133503339
Libération : 2008

Télécharger Lire en ligne



A été écrit sous une forme ou une autre pendant la plus grande partie de sa vie. Vous pouvez trouver autant d'inspiration de Livres hebdo Aussi informatif et amusant. Cliquez sur le bouton TÉLÉCHARGER ou Lire en ligne pour obtenir gratuitement le livre de titre $ gratuitement.

TCP IP Illustrated

Titre : TCP IP Illustrated
Auteur : Kevin R. Fall
Éditeur : Addison-Wesley Professional
ISBN-13 : 9780321336316
Libération : 2011-11-01

Télécharger Lire en ligne



A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat

The Internet of Things

Titre : The Internet of Things
Auteur : Olivier Hersent
Éditeur : John Wiley & Sons
ISBN-13 : 9781119966708
Libération : 2011-12-19

Télécharger Lire en ligne



An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protocols and solve the challenge of massive scalability of machine-to-machine communication for mission-critical applications, based on the next generation machine-to-machine ETSI M2M architecture. The authors demonstrate, using the example of the smartgrid use case, how the next generation utilities, by interconnecting and activating our physical environment, will be able to deliver more energy (notably for electric vehicles) with less impact on our natural resources. Key Features: Offers a comprehensive overview of major existing M2M and AMI protocols Covers the system aspects of large scale M2M and smart grid applications Focuses on system level architecture, interworking, and nationwide use cases Explores recent emerging technologies: 6LowPAN, ZigBee SE 2.0 and ETSI M2M, and for existing technologies covers recent developments related to interworking Relates ZigBee to the issue of smartgrid, in the more general context of carrier grade M2M applications Illustrates the benefits of the smartgrid concept based on real examples, including business cases This book will be a valuable guide for project managers working on smartgrid, M2M, telecommunications and utility projects, system engineers and developers, networking companies, and home automation companies. It will also be of use to senior academic researchers, students, and policy makers and regulators.