The Star Protocol


Book Description

The Star Protocol is science-fiction on steroids. The story races along following the adventures of its Delta Force protagonists, Will and Dash; their MI6 buddy, John; archaeologists, Alex and Cassandra and others with whom they are thrown together as they try to outrun events that are out-pacing them. Secrets of the universe have lain hidden in ancient writings and artefacts for centuries. The news from the stars is not great for mankind. The mismatched group, thrown together by violent circumstance have little choice but to take their quest to alien worlds. Will and Dash have the courage and training, Alex and Cassandra have the in-depth knowledge ... and John has a secret. They meet new challenges and forge new alliances, stumbling from one dire situation to another as they struggle to learn what they need to know in order to head off catastrophe. The denouement when it comes is dramatic and satisfying, and with a sting in its tail.




The Sigma Protocol


Book Description

From a #1 New York Times–bestselling author, an agent escapes a hospital where the government held him hostage and finds he’s not the man he thinks he is. On Parrish Island, a restricted island off the coast of Virginia, is a little-known and never-visited psychiatric facility. There, far from prying eyes, the government stores former intelligence employees whose psychiatric states make them a danger to their own government, people whose ramblings might endanger ongoing operations or prove dangerously inconvenient. One of these employees, former Consular Operations agent Hal Ambler, is kept heavily medicated and closely watched. But there's one difference between Hal and the other patients—Hal isn't crazy. With the help of a sympathetic nurse, Hal manages to clear his mind of the drug-induced haze and then pulls off a daring escape. Now he's out to discover who stashed him here and why—but the world he returns to isn't the one he remembers. Friends and longtime associates don't remember him, there are no official records of Hal Ambler, and, when he first sees himself in the mirror, the face that looks back at him is not the one he knows as his own. Praise for Robert Ludlum: “Reading a Ludlum novel is like watching a James Bond film . . . slickly paced . . . all consuming.” ―Entertainment Weekly “Ludlum stuffs more surprises into his novels than any other six-pack of thriller writers combined.” ―The New York Times “Ludlum still dominates the field in adventure-drenched thrillers.”—Chicago Tribune




Protocol


Book Description




Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks


Book Description

Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc networks, particularly algorithmic methods and distributed computing with mobility and computation capabilities. It covers everything readers need to build a foundation for the design of future mobile ad hoc networks: Establishing an efficient communication infrastructure Robustness control for network-wide broadcast The taxonomy of routing algorithms Adaptive backbone multicast routing The effect of inference on routing Routing protocols in intermittently connected mobile ad hoc networks and delay tolerant networks Transport layer protocols ACK-thinning techniques for TCP in MANETs Power control protocols Power saving in solar powered WLAN mesh networks Reputation and trust-based systems Vehicular ad hoc networks Cluster interconnection in 802.15.4 beacon enabled networks The book is complemented with a set of exercises that challenge readers to test their understanding of the material. Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks is appropriate as a self-study guide for electrical engineers, computer engineers, network engineers, and computer science specialists. It also serves as a valuable supplemental textbook in computer science, electrical engineering, and network engineering courses at the advanced undergraduate and graduate levels.




The Athena Protocol


Book Description

Bourne Identity meets Karen McManus in this action-packed series opener about a spy gone rogue, perfect for fans of Ally Carter and Killing Eve. Jessie Archer is a member of the Athena Protocol, an elite organization of female spies who enact vigilante justice around the world. Athena operatives are never supposed to shoot to kill—so when Jessie can’t stop herself from pulling the trigger, she gets kicked out of the organization, right before a huge mission to take down a human trafficker in Belgrade. Jessie needs to right her wrong and prove herself, so she starts her own investigation into the trafficking. But going rogue means she has no one to watch her back as she delves into the horrors she uncovers. Meanwhile, her former teammates have been ordered to bring her down. Jessie must face danger from all sides if she’s to complete her mission—and survive. Don’t miss this gripping page-turner that New York Times bestselling author Patrick Ness called “a ferocious, take-no-prisoners thriller that actually thrills!”




Protocols for Authentication and Key Establishment


Book Description

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.




The Alpha Protocol


Book Description

Naval Officer Jack Samson thought a posting to the frontier of human inhabited space was the death blow to his career. He couldn't have been more wrong.A routine inspection of a small merchant vessel leads to devastating loss and the discovery of strange, fascinating objects.As astonishing discoveries unfold, a mysterious and hostile ship proves that Samson has a competitor in unlocking the secrets of an ancient alien civilisation, and that humanity might not be alone in the galaxy after all.The Alpha Protocol is a fast-paced science fiction novel in the classic space opera and military sci-fi traditions, by Amazon Best Selling Author Duncan M. Hamilton.




Protocol: Orphans


Book Description

Grabbed up by the United States government and thrown into training camps, orphans around the country have been raised to become America's next generation of super-spies. Now, as adults, they live among us, ready for "the family" to call them back into action. Collects the complete four-issue limited series




Protocols, Strands, and Logic


Book Description

This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua’s most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several “symbolic approaches” to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.




Stream Control Transmission Protocol (SCTP)


Book Description

CD-ROM contains: Open source code needed for user space implementation of SCTP presented in text