0
Your cart

Your cart is empty

Browse All departments
Price
  • R250 - R500 (2)
  • R500+ (67)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Networking

Computer Networks ISE - A Systems Approach (Paperback, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks ISE - A Systems Approach (Paperback, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,089 Discovery Miles 10 890 In stock

Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. The newly revised edition continues to offer an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The focus is not just on the specifications comprising today's systems but how key technologies and protocols actually work in real-world setting to solve specific problems. The new edition features increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features, a structure that makes it easier to teach top-down, less dependence on code to explain protocols, vastly improved ancillary package to include robust lecture slide package, and shift to higher levels in the protocol stock where the real innovation is happening currently. the book is targeted at networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.

Wireless Networks Bundle (Hardcover): Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, Leonidas J Guibas Wireless Networks Bundle (Hardcover)
Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, …
R2,928 Discovery Miles 29 280 Within 8 - 15 working days

This essential bundle featuring three definitive titles on wireless networking provides an in-depth, exhaustive, and invaluable asset to anyone working or studying in this rapidly evolving field.Wireless Communications and Networking provides comprehensive coverage of mobile wireless communication, wireless networks, and internetworking/4G technology in one volume with a good blend of fundamental theory and real-world concepts and problem solving methods. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. The book emphasizes conceptual perspectives on modeling, analysis, design and optimization and presents wireless networking within the framework of resource allocation.Designing, implementing, and operating a wireless sensor network involves a wide range of disciplines and many application-specific constraints. To make sense of and take advantage of these systems, a holistic approach is needed-and this is precisely what Wireless Sensor Networks delivers.Bundled together to save you money, there is no quicker or cheaper way to such a comprehensive knowledge of wireless networking.

Wireless Networking Complete (Hardcover): Pei Zheng, Larry L. Peterson, Bruce S. Davie, Adrian Farrel Wireless Networking Complete (Hardcover)
Pei Zheng, Larry L. Peterson, Bruce S. Davie, Adrian Farrel
R1,284 Discovery Miles 12 840 Within 8 - 15 working days

Given the explosion of new wireless communications techniques and the host of wireless network technologies and applications currently available or on the drawing board, it is safe to say that we are in the midst of a wireless networking revolution. Industry adoption of next-generation specifications will provide a substantial boost to the market for wireless multimedia networking, prompting growth in excess of 50 million wireless network devices by 2010, according to a market study by Parks Associates.

A compilation of critical content from key MK titles published in recent years on wireless networking and communications. Individual chapters are organized as one complete reference that allows it to be used as a 360-degree view from our bestselling authors for those interested in new and developing aspects of wireless network technology.
Chapters contributed by recognized experts in the field cover theory and practice of wireless network technology, allowing the reader to develop a new level of knowledge and technical expertise Up-to-date coverage of wireless networking issues facilitates learning and lets the reader remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

The Illustrated Network - How TCP/IP Works in a Modern Network (Hardcover): Walter J. Goralski The Illustrated Network - How TCP/IP Works in a Modern Network (Hardcover)
Walter J. Goralski
R1,486 Discovery Miles 14 860 Within 7 - 11 working days

In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many.
This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.
Here are ten key differences between the two:
StevensGoralski's
Older operating systems (AIX, svr4, etc.)Newer OSs (XP, Linux, FreeBSD, etc.)
Two routers (Cisco, Telebit (obsolete))Two routers (M-series, J-series)
Slow Ethernet and SLIP linkFast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)
Tcpdump for tracesNewer, better utility to capture traces (Ethereal, now has
a new name )
No IPSecIPSec
No multicastMulticast
No router security discussedFirewall routers detailed
No WebFull Web browser HTML consideration
No IPv6IPv6 overview
Few configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols
New Modern Approach to Popular Topic
Adopts the popular Stevens approach and modernizes it, giving the reader insights into the most up-to-date network equipment, operating systems, and router vendors. Shows and Tells
Presents an illustrated explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations, allowing the reader to follow the discussion with unprecedented clarity and precision.Over 330 Illustrations
True to the title, there are 330 diagrams, screen shots, topology diagrams, and a unique repeating chapter opening diagram to reinforce conceptsBased on Actual Networks
A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, bringing the real world, not theory, into sharp focus.

Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet... Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,034 Discovery Miles 10 340 Within 8 - 15 working days

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. Thisis the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, andis the go-to referencefor deploying the Next Generation model.Thisbook proves areal benefit to networking professionals from service providers, enterprises, the vendor community, and anyone elsewho wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.
Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology

Provides the background necessary to understand current generation multi-play applications and their service requirements

Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"

TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback): David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback)
David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert
R524 Discovery Miles 5 240 Within 7 - 11 working days

"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it's a good starting book; on the other hand professionals could also take advantage of excellent handy sample code snippets and material on topics like message parsing and asynchronous programming."
Adarsh Khare, SDT, .Net Frameworks Team, Microsoft Corporation

The popularity of the C# language and the .NET framework is ever rising due to its ease of use, the extensive class libraries available in the .NET Framework, and the ubiquity of the Microsoft Windows operating system, to name a few advantages. TCP/IP Sockets in C# focuses on the Sockets API, the de facto standard for writing network applications in any programming language. Starting with simple client and server programs that use TCP/IP (the Internet protocol suite), students and practitioners quickly learn the basics and move on to firsthand experience with advanced topics including non-blocking sockets, multiplexing, threads, asynchronous programming, and multicasting. Key network programming concepts such as framing, performance and deadlocks are illustrated through hands-on examples. Using a detailed yet clear, concise approach, this book includes numerous code examples and focused discussions to provide a solid understanding of programming TCP/IP sockets in C#.
Features
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book s companion web site
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book's companion web site"

Computer Networks - A Systems Approach (Hardcover, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks - A Systems Approach (Hardcover, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,148 Discovery Miles 11 480 Within 10 - 17 working days

Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.

TCP/IP Sockets in Java - Practical Guide for Programmers (Paperback, 2nd edition): Kenneth L. Calvert, Michael J. Donahoo TCP/IP Sockets in Java - Practical Guide for Programmers (Paperback, 2nd edition)
Kenneth L. Calvert, Michael J. Donahoo
R454 Discovery Miles 4 540 Within 8 - 15 working days

The networking capabilities of the Java platform have been extended considerably since the first edition of the book. This new edition covers version 1.5-1.7, the most current iterations, as well as making the following improvements:
The API (application programming interface) reference sections in each chapter, which describe the relevant parts of each class, have been replaced with (i) a summary section that lists the classes and methods used in the code, and (ii) a ?gotchas? section that mentions nonobvious or poorly-documented aspects of the objects.
In addition, the book covers several new classes and capabilities introduced in the last few revisions of the Java platform. New abstractions to be covered include NetworkInterface, InterfaceAddress, Inet4/6Address, SocketAddress/InetSocketAddress, Executor, and others; extended access to low-level network information; support for IPv6; more complete access to socket options; and scalable I/O. The example code is also modified to take advantage of new language features such as annotations, enumerations, as well as generics and implicit iterators where appropriate.
Most Internet applications use sockets to implement network communication protocols. This book's focused, tutorial-based approach helps the reader master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Chapter 1 provides a genral overview of networking concepts to allow readers to synchronize the concepts with terminology. Chapter 2 introduces the mechanics of simple clients and servers. Chapter 3 covers basic message construction and parsing. Chapter 4 then deals with techniques used to build more robust clients and servers. Chapter 5 (NEW) introduces the scalable interface facilities which were introduced in Java 1.5, including the buffer and channel abstractions. Chapter 6 discusses the relationship between the programming constructs and the underlying protocol implementations in more detail. Programming concepts are introduced through simple program examples accompanied by line-by-line code commentary that describes the purpose of every part of the program. The book's Web site contains many examples of command-based sockets-related code discussed throughout the book. No other resource presents so concisely or so effectively the material necessary to get up and running with Java sockets programming.
KEY FEATURES
* Focused, tutorial-based instruction in key sockets programming techniques allows reader to quickly come up to speed on Java applications.
* Concise and up-to-date coverage of the most recent platform (1.7) for Java
applications in networking technology
* Provides code for all example programs via a companion Web site to let the reader see the important objects and methods in context and to understand the purpose of each line of code.

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki
R1,655 Discovery Miles 16 550 Within 7 - 11 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

Computer and Information Security Handbook (Hardcover): John R Vacca Computer and Information Security Handbook (Hardcover)
John R Vacca; Edited by John R Vacca
R2,002 Discovery Miles 20 020 Within 7 - 11 working days

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.
* Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise
* Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions

TCP/IP Sockets in C - Practical Guide for Programmers (Paperback, 2nd edition): Michael J. Donahoo, Kenneth L. Calvert TCP/IP Sockets in C - Practical Guide for Programmers (Paperback, 2nd edition)
Michael J. Donahoo, Kenneth L. Calvert
R529 Discovery Miles 5 290 Within 7 - 11 working days

TCP/IP Sockets in C: Practical Guide for Programmers, 2nd Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies.

If you program using Java, be sure to check out this book s companion, "TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition."
Includes completely new and expanded sections that address the IPv6 network environment, defensive programming, and the select() system call, thereby allowing the reader to program in accordance with the most current standards for internetworking. Streamlined and concise tutelage in conjunction with line-by-line code commentary allows readers to quickly program web-based applications without having to wade through unrelated and discursive networking tenets.Grants the reader access to online source code, which the can then be used to directly implement sockets programming procedures.
"

IPv6 - Theory, Protocol, and Practice (Paperback, 2nd edition): Peter Loshin IPv6 - Theory, Protocol, and Practice (Paperback, 2nd edition)
Peter Loshin
R1,180 Discovery Miles 11 800 Within 7 - 11 working days

The second edition of "IPv6: Theory, Protocol, and Practice" guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so much time and effort has been expended on revising IPv4. In the Protocol section is a comprehensive review of the specifics of IPv6 and related protocols. Finally, the Practice section provides hands-on explanations of how to roll out IPv6 support and services.
This completely rewritten edition offers updated and comprehensive coverage of important topics including router and server configuration, security, the impact of IPv6 on mobile networks, and evaluating the impact of IPv6-enabled networks globally. Pete Loshin's famously lucid explanations benefit readers at every turn, making "Ipv6: Theory, Protocol, and Practice" the best way for a large diverse audience to get up to speed on this groundbreaking technology.
* The comprehensive, accessible, and up-to-date resource needed by network engineers and support staff, product developers and managers, programmers, and marketing professionals
* Divided into sections on theory, the protocol's technical details, and techniques for building Ipv6 networks, this book covers not only the protocol but the ways in which the protocol can be integrated into networks.
* Covers critical topics in depth, including router and server configuration, security, value assessment, and the impact of Ipv6 on global networks

The Internet Security Guidebook - From Planning to Deployment (Paperback): Juanita Ellis, Tim Speed The Internet Security Guidebook - From Planning to Deployment (Paperback)
Juanita Ellis, Tim Speed
R1,647 Discovery Miles 16 470 Within 7 - 15 working days

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely.
Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.

Digital Compression for Multimedia - Principles and Standards (Hardcover): Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich... Digital Compression for Multimedia - Principles and Standards (Hardcover)
Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich Baker, David Lindbergh
R3,183 Discovery Miles 31 830 Within 7 - 15 working days

Drawing on their experience in industry, research, and academia, this powerful author team combines their expertise to provide an accessible guide to data compression standards and techniques and their applications. The essential ideas and motivation behind the various compression methods are presented, and insight is provided into the evolution of the standards. Standards-compliant design alternatives are discussed, and some noncompliant designs also are treated.

Covering the fundamental underpinnings of the most widely used compression methods, this book is intended for engineers and computer scientists designing, manufacturing, and implementing compression systems, as well as system integrators, technical managers, and researchers. It provides, in a single source, an overview of the current standards for speech, audio, video, image, fax, and file compression.
* Authored by five experts from industry and academia who are heavily involved in research, development, and standards-setting activities
* Covers the full spectrum of multimedia compression standards including those for lossless data compression, speech coding, high-quality audio coding, still image compression, facsimile, and video compression
* Provides enough theory for you to understand the building blocks of the compression systems discussed, with appendices containing necessary algorithmic details and mathematical foundations

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,069 Discovery Miles 10 690 Within 7 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Smart Phone and Next Generation Mobile Computing (Paperback): Pei Zheng Smart Phone and Next Generation Mobile Computing (Paperback)
Pei Zheng
R1,440 Discovery Miles 14 400 Within 7 - 15 working days

This in-depth technical guide is an essential resource for anyone involved in the development of "smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. "Smart Phone and Next-Generation Mobile Computing" shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

IM Instant Messaging Security (Paperback): James Ransome, John Rittinghouse IM Instant Messaging Security (Paperback)
James Ransome, John Rittinghouse
R1,859 Discovery Miles 18 590 Within 7 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Network Security - A Practical Approach (Paperback): Jan L. Harrington Network Security - A Practical Approach (Paperback)
Jan L. Harrington
R1,353 Discovery Miles 13 530 Within 7 - 15 working days

"Network Security" is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
+ Helps you see through a hacker's eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, "malware," and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates."

Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition):... Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition)
Jerry Cochran
R1,659 Discovery Miles 16 590 Within 7 - 15 working days

Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran's Mission-Critical Microsoft Exchange 2000, and complements Tony Redmond's new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability topics as the first edition but also expands the coverage of storage technology, server technology, management, and security. The book meets the needs of an Exchange administrator or system implementer who is striving to maintain a production Exchange environment that delivers superior service levels, high availability, manageability and scalability with the lowest cost of ownership.
.Gives "lessons learned" and other best practices from organizations that have successfully deployed Exchange
.Includes material on the forthcoming release of Exchange 2003
.Offers advice from one of the most experienced storage practitioners"

Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.): Mark A. Franklin, Patrick Crowley, Haldun... Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.)
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
R2,053 Discovery Miles 20 530 Within 7 - 15 working days

Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors.
Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service.
.Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linkopings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington.
.Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum."

Bluetooth Application Programming with the Java APIs (Paperback, 1st ed): C.Bala Kumar, Paul J. Kline, Timothy J. Thompson Bluetooth Application Programming with the Java APIs (Paperback, 1st ed)
C.Bala Kumar, Paul J. Kline, Timothy J. Thompson
R1,670 Discovery Miles 16 700 Within 7 - 15 working days

Adoption of Bluetooth wireless technology has made great strides in the last few years. One of the biggest steps forward the standardization of Java APIs for Bluetooth wireless technology (JABWT) is explained in detail in this book. The JABWT standard, defined by the JSR-82 specification, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded to the JABWT specification by announcing mobile phones and other products that will run JABWT applications. Bluetooth Application Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in the definition of JABWT, this book provides the authoritative explanations and concrete examples you need to get started right away.
About the Authors
"C Bala Kumar" is a Distinguished Member of the Technical Staff at Motorola. He chaired the industry expert group that defined the Java APIs for Bluetooth wireless technology. He currently leads the systems software team for wireless platforms in Motorola's Semiconductor Products Sector. "Paul J. Kline" is a Distinguished Member of the Technical Staff at Motorola and the maintenance lead for the JABWT specification. He currently works on the System Software Architecture team in Motorola's Semiconductor Products Sector. "Timothy J. Thompson" is a Senior Software Engineer on the System Software Architecture team in Motorola's Semiconductor Products Sector. He was the OBEX architect on the JABWT specification team at Motorola.
* Written by experts the authors led the industry team that defined the JABWT standard and the Motorola team that developed the first JABWT implementation
* Covers JABWT in depth and goes beyond the specification to explain how to use the standard effectively
* A helpful resource both to Java programmers interested in Bluetooth wireless technology and to business managers interested in its potential for creating new business opportunities
* Digs deeply into the programming areas you must master to successfully design and build JABWT applications, including RFCOMM, OBEX, device discovery, service discovery, and L2CAP
* Details the real-world issues involved in programming Bluetooth devices and implementing the JABWT specification
* Organized into sections that explicitly address the different needs of programmers, business managers, and project managers"

Developing IP-Based Services - Solutions for Service Providers and Vendors (Hardcover): Monique Morrow, Kateel Vijayananda Developing IP-Based Services - Solutions for Service Providers and Vendors (Hardcover)
Monique Morrow, Kateel Vijayananda
R1,918 Discovery Miles 19 180 Within 7 - 15 working days


Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process.


Meeting this challenge is the focus of "Developing IP-Based Services." The only book of its kind devoted exclusively to IP-based services, it provides a blueprint for all the engineers, managers, and analysts who must come together to build these services and bring them online.
Inside, you'll find just the right balance of business and technical coverage, introduced with a lucid discussion of the principles of service development and wrapped up with three case studies illustrating effective provisioning in today's marketplace. Read the chapters relating to your role, and you'll play it more successfully. Have your team read the entire book, and you'll achieve a level of collaboration and shared understanding that will quickly accrue to the bottom line.
* Valuable insight from authors with extensive service provisioning and product development experience.
* Written for business and technical readers at a wide range of companies, including established telecoms, ISPs, ASPs, Clecs, bandwidth brokers, and vendors.
* Probes the business issues that will make or break your effort, including shortening the development cycle and choosing a competitive model.
* Provides the technical coverage required for successful implementation, according to the terms of the business model you choose.
* Focuses on the IP technologies that offer your service and its users the greatest value, including MPLS, Voice Over IP, and multicast.
* Helps you meet tough challenges relating to security and Quality of Service.
* Concludes with case studies illustrating successful service development and deployment in three companies.

Networking Explained (Paperback, 2nd edition): Michael Gallo, William M Hancock Phd Cissp Cism Networking Explained (Paperback, 2nd edition)
Michael Gallo, William M Hancock Phd Cissp Cism
R1,793 Discovery Miles 17 930 Within 7 - 15 working days

Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.
Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
Wireless networks
Convergence of voice and data
Multimedia networking

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,713 Discovery Miles 17 130 Within 7 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover): Heinz-Gerd... Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover)
Heinz-Gerd Hegering, Sebastian Abeck, Bernhard Neumair
R2,567 Discovery Miles 25 670 Within 7 - 15 working days

""This is a comprehensive book covering architecture, implementation, and operational use of all the current approaches to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not only covers most of the modern approaches to management but also includes interoperation between these approaches and the use of stand-alone tools such as protocol analyzers. It will be very useful as a reference book for students, researchers, and industry practitioners.""

-Professor Morris Sloman, Department of Computing, Imperial College of Science Technology and Medicine

""A comprehensive reference on the management of networked systems, this book is a must-have for any network or management system architect and anybody else in need of a deep understanding of network management technologies, tools, and practices. Professor Hegering and his team present a complete analysis of integrated network management architectures, tools, system development, and operational use.""

-Branislav Meandzija, General Instrument Corporation

""Highly respected experts Hegering, Abeck, and Neumair offer the most comprehensive presentation of systems and network management that I've seen to date. This book provides an excellent foundation of traditional and emergent technologies that every student and industry practitioner should read.""

-Lisa Phifer, Vice President, Core Competence, Inc.

Features
Teaches the enduring principles at work in a holistic, integrated approach to systems management.
Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

* Teaches the enduring principles at work in a holistic, integrated approach to systems management.
* Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
* Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
* Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Virtual Private Networks - Making the…
Dennis Fowler Paperback R1,412 Discovery Miles 14 120
Computer Security
John M Carroll Hardcover R1,552 Discovery Miles 15 520
Sendmail: Theory and Practice
Frederick M. Avolio, Paul Vixie Paperback R1,507 Discovery Miles 15 070
Interconnecting Smart Objects with IP…
Jean-Philippe Vasseur, Adam Dunkels Paperback R1,059 Discovery Miles 10 590
Technical, Commercial and Regulatory…
Xipeng Xiao Hardcover R887 Discovery Miles 8 870
Wireless Communications & Networking
Vijay K Garg Hardcover R1,692 Discovery Miles 16 920
Network Quality of Service Know It All
Adrian Farrel Hardcover R1,440 Discovery Miles 14 400
GMPLS - Architecture and Applications
Adrian Farrel, Igor Bryskin Paperback R1,116 Discovery Miles 11 160
Wireless Networking
Anurag Kumar, D Manjunath, … Hardcover R1,443 Discovery Miles 14 430
Network Algorithmics - An…
George Varghese Hardcover R1,318 Discovery Miles 13 180

 

Loyalty partners