0
Your cart

Your cart is empty

Browse All departments
Price
  • R250 - R500 (2)
  • R500+ (66)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Networking

Computer Networks ISE - A Systems Approach (Paperback, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks ISE - A Systems Approach (Paperback, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,295 R1,059 Discovery Miles 10 590 Save R236 (18%) Within 7 - 12 working days

Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. The newly revised edition continues to offer an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The focus is not just on the specifications comprising today's systems but how key technologies and protocols actually work in real-world setting to solve specific problems. The new edition features increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features, a structure that makes it easier to teach top-down, less dependence on code to explain protocols, vastly improved ancillary package to include robust lecture slide package, and shift to higher levels in the protocol stock where the real innovation is happening currently. the book is targeted at networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.

Wireless Networks Bundle (Hardcover): Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, Leonidas J Guibas Wireless Networks Bundle (Hardcover)
Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, …
R2,739 R2,388 Discovery Miles 23 880 Save R351 (13%) Within 7 - 12 working days

This essential bundle featuring three definitive titles on wireless networking provides an in-depth, exhaustive, and invaluable asset to anyone working or studying in this rapidly evolving field. Wireless Communications and Networking provides comprehensive coverage of mobile wireless communication, wireless networks, and internetworking/4G technology in one volume with a good blend of fundamental theory and real-world concepts and problem solving methods. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. The book emphasizes conceptual perspectives on modeling, analysis, design and optimization and presents wireless networking within the framework of resource allocation. Designing, implementing, and operating a wireless sensor network involves a wide range of disciplines and many application-specific constraints. To make sense of and take advantage of these systems, a holistic approach is needed-and this is precisely what Wireless Sensor Networks delivers. Bundled together to save you money, there is no quicker or cheaper way to such a comprehensive knowledge of wireless networking.

Wireless Networking Complete (Hardcover): Pei Zheng, Larry L. Peterson, Bruce S. Davie, Adrian Farrel Wireless Networking Complete (Hardcover)
Pei Zheng, Larry L. Peterson, Bruce S. Davie, Adrian Farrel
R1,349 R1,181 Discovery Miles 11 810 Save R168 (12%) Within 7 - 12 working days

Given the explosion of new wireless communications techniques and the host of wireless network technologies and applications currently available or on the drawing board, it is safe to say that we are in the midst of a wireless networking revolution. Industry adoption of next-generation specifications will provide a substantial boost to the market for wireless multimedia networking, prompting growth in excess of 50 million wireless network devices by 2010, according to a market study by Parks Associates.

A compilation of critical content from key MK titles published in recent years on wireless networking and communications. Individual chapters are organized as one complete reference that allows it to be used as a 360-degree view from our bestselling authors for those interested in new and developing aspects of wireless network technology.
Chapters contributed by recognized experts in the field cover theory and practice of wireless network technology, allowing the reader to develop a new level of knowledge and technical expertise Up-to-date coverage of wireless networking issues facilitates learning and lets the reader remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

Computer Networks - A Systems Approach (Hardcover, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks - A Systems Approach (Hardcover, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,389 R1,112 Discovery Miles 11 120 Save R277 (20%) Within 7 - 12 working days

Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.

Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet... Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,073 R944 Discovery Miles 9 440 Save R129 (12%) Within 7 - 12 working days

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. Thisis the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, andis the go-to referencefor deploying the Next Generation model.Thisbook proves areal benefit to networking professionals from service providers, enterprises, the vendor community, and anyone elsewho wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.
Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology

Provides the background necessary to understand current generation multi-play applications and their service requirements

Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki
R1,917 Discovery Miles 19 170 Within 7 - 15 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback): David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback)
David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert
R517 Discovery Miles 5 170 Within 7 - 12 working days

"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it's a good starting book; on the other hand professionals could also take advantage of excellent handy sample code snippets and material on topics like message parsing and asynchronous programming."
Adarsh Khare, SDT, .Net Frameworks Team, Microsoft Corporation

The popularity of the C# language and the .NET framework is ever rising due to its ease of use, the extensive class libraries available in the .NET Framework, and the ubiquity of the Microsoft Windows operating system, to name a few advantages. TCP/IP Sockets in C# focuses on the Sockets API, the de facto standard for writing network applications in any programming language. Starting with simple client and server programs that use TCP/IP (the Internet protocol suite), students and practitioners quickly learn the basics and move on to firsthand experience with advanced topics including non-blocking sockets, multiplexing, threads, asynchronous programming, and multicasting. Key network programming concepts such as framing, performance and deadlocks are illustrated through hands-on examples. Using a detailed yet clear, concise approach, this book includes numerous code examples and focused discussions to provide a solid understanding of programming TCP/IP sockets in C#.
Features
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book s companion web site
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book's companion web site"

The Internet Security Guidebook - From Planning to Deployment (Paperback): Juanita Ellis, Tim Speed The Internet Security Guidebook - From Planning to Deployment (Paperback)
Juanita Ellis, Tim Speed
R1,516 Discovery Miles 15 160 Within 7 - 15 working days

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely.
Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.

Digital Compression for Multimedia - Principles and Standards (Hardcover): Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich... Digital Compression for Multimedia - Principles and Standards (Hardcover)
Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich Baker, David Lindbergh
R2,927 Discovery Miles 29 270 Within 7 - 15 working days

Drawing on their experience in industry, research, and academia, this powerful author team combines their expertise to provide an accessible guide to data compression standards and techniques and their applications. The essential ideas and motivation behind the various compression methods are presented, and insight is provided into the evolution of the standards. Standards-compliant design alternatives are discussed, and some noncompliant designs also are treated.

Covering the fundamental underpinnings of the most widely used compression methods, this book is intended for engineers and computer scientists designing, manufacturing, and implementing compression systems, as well as system integrators, technical managers, and researchers. It provides, in a single source, an overview of the current standards for speech, audio, video, image, fax, and file compression.
* Authored by five experts from industry and academia who are heavily involved in research, development, and standards-setting activities
* Covers the full spectrum of multimedia compression standards including those for lossless data compression, speech coding, high-quality audio coding, still image compression, facsimile, and video compression
* Provides enough theory for you to understand the building blocks of the compression systems discussed, with appendices containing necessary algorithmic details and mathematical foundations

TCP/IP Sockets in Java - Practical Guide for Programmers (Paperback, 2nd edition): Kenneth L. Calvert, Michael J. Donahoo TCP/IP Sockets in Java - Practical Guide for Programmers (Paperback, 2nd edition)
Kenneth L. Calvert, Michael J. Donahoo
R483 Discovery Miles 4 830 Within 8 - 13 working days

The networking capabilities of the Java platform have been extended considerably since the first edition of the book. This new edition covers version 1.5-1.7, the most current iterations, as well as making the following improvements:
The API (application programming interface) reference sections in each chapter, which describe the relevant parts of each class, have been replaced with (i) a summary section that lists the classes and methods used in the code, and (ii) a ?gotchas? section that mentions nonobvious or poorly-documented aspects of the objects.
In addition, the book covers several new classes and capabilities introduced in the last few revisions of the Java platform. New abstractions to be covered include NetworkInterface, InterfaceAddress, Inet4/6Address, SocketAddress/InetSocketAddress, Executor, and others; extended access to low-level network information; support for IPv6; more complete access to socket options; and scalable I/O. The example code is also modified to take advantage of new language features such as annotations, enumerations, as well as generics and implicit iterators where appropriate.
Most Internet applications use sockets to implement network communication protocols. This book's focused, tutorial-based approach helps the reader master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Chapter 1 provides a genral overview of networking concepts to allow readers to synchronize the concepts with terminology. Chapter 2 introduces the mechanics of simple clients and servers. Chapter 3 covers basic message construction and parsing. Chapter 4 then deals with techniques used to build more robust clients and servers. Chapter 5 (NEW) introduces the scalable interface facilities which were introduced in Java 1.5, including the buffer and channel abstractions. Chapter 6 discusses the relationship between the programming constructs and the underlying protocol implementations in more detail. Programming concepts are introduced through simple program examples accompanied by line-by-line code commentary that describes the purpose of every part of the program. The book's Web site contains many examples of command-based sockets-related code discussed throughout the book. No other resource presents so concisely or so effectively the material necessary to get up and running with Java sockets programming.
KEY FEATURES
* Focused, tutorial-based instruction in key sockets programming techniques allows reader to quickly come up to speed on Java applications.
* Concise and up-to-date coverage of the most recent platform (1.7) for Java
applications in networking technology
* Provides code for all example programs via a companion Web site to let the reader see the important objects and methods in context and to understand the purpose of each line of code.

Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed): C.Bala Kumar, Timothy J.... Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed)
C.Bala Kumar, Timothy J. Thompson, Paul J. Kline
R980 Discovery Miles 9 800 Within 7 - 15 working days

Adoption of Bluetooth wireless technology has become ubiquitous in the last few years. One of the biggest steps forward is the standardization of Java APIs for Bluetooth wireless technology (JABWT). The latest updates to this standard is explained in detail in this book. The JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded overwhelmingly to the JABWT specification by implementing JABWT applications in mobile phones and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the Java APIs" explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in developing the standards of JABWT, this book provides the authoritative explanations and concrete examples needed to get started right away.
This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use. A NEW chapter on the Push Registry definition (a new feature in the 1.1 version of JSR-82) has been added. Finally, the new Essentials version of the book will update the remaining chapters to reflect changes in the latest Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added content on the website. This "bonus material" includes complete source code from examples in the book, the javex.bluetooth code package, the java.obex code package, an enhanced set of "Example Applications," and a tutorial on "Implementing JABWT on a Device." These code-heavy sections are actually more effective in electonic format where the application can be easily downloaded.

KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables software and hardware vendors to quickly develop Bluetooth applications for mobile devices in an increasingly competitive market.
* The updated material examines crucial programming areas (including RFCOMM, OBEX, device discovery, service discovery, and L2CAP), which allows developers to not only successfully design, but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal Push Registry feature ? a recent development that will help programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in implementing the Java APIs specification, the book allows developers to identify with the text and encourages repeated reference.

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R985 Discovery Miles 9 850 Within 7 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 (Paperback): Kieran McCorry Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 (Paperback)
Kieran McCorry
R1,700 Discovery Miles 17 000 Within 7 - 15 working days

Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. This book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. The book describes various deployment topologies and environments to cater for a multitude of different organizational requirements. The book has been updated to reflect the new changes that Microsoft introduced with Exchange 2003 and SP1 and SP2 updates in relation to major architectural changes to migrations techniques and other services such as RPC over HTTP and journaling functionality.
* Details for consultants and system administrators to migrate from older versions of Exchange 5.5 and Exchange 2000 to the latest revisions of Exchange 2003
* Critical information on integration with Office 2003 and Windows 2003
* Based on actual implementations of the released version of Exchange
2003 in larger enterprise environments
* NEW! Cover critical updates to Exchange 2003 with updates from SP1 and SP2, such as new implementations of RPC over HTTP and cross site migrations
* NEW! Coverage of the Exchange journaling feature updates in Exchange
2003 SP1 and SP2

Globus (R) Toolkit 4 - Programming Java Services (Paperback): Borja Sotomayor, Lisa Childers Globus (R) Toolkit 4 - Programming Java Services (Paperback)
Borja Sotomayor, Lisa Childers
R1,191 Discovery Miles 11 910 Within 7 - 15 working days

The Globus Toolkit (http: //www.globus.org/toolkit/) is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. "Globus Toolkit 4: Programming Java Services" provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you're making the leap into Grid Computing using the Globus Toolkit, you'll want "Globus Toolkit 4: Programming Java Services" at your side as you take your first steps.
+ Written for newcomers to Globus Toolkit, but filled with useful information for experienced users.
+ Clearly situates Globus application development within the context of Web Services and evolving Grid standards.
+ Provides detailed coverage of Web Services programming with the Globus Toolkit's Java WS Core component.
+ Covers basic aspects of developing secure services using the Grid Security Infrastructure (GSI).
+ Uses simple, didactic examples throughout the book, but also includes a more elaborate example, the FileBuy application, that showcases common design patterns found in Globus applications.
+ Concludes with useful reference appendices.

Smart Phone and Next Generation Mobile Computing (Paperback): Pei Zheng Smart Phone and Next Generation Mobile Computing (Paperback)
Pei Zheng
R1,325 Discovery Miles 13 250 Within 7 - 15 working days

This in-depth technical guide is an essential resource for anyone involved in the development of "smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. "Smart Phone and Next-Generation Mobile Computing" shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

Business Continuity and Disaster Recovery for InfoSec Managers (Paperback): John W Rittinghouse, James F Ransome Business Continuity and Disaster Recovery for InfoSec Managers (Paperback)
John W Rittinghouse, James F Ransome
R1,599 Discovery Miles 15 990 Within 7 - 15 working days

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining second site back up and recovery
.Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters"

IM Instant Messaging Security (Paperback): John Rittinghouse, James F Ransome IM Instant Messaging Security (Paperback)
John Rittinghouse, James F Ransome
R1,710 Discovery Miles 17 100 Within 7 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Network Security - A Practical Approach (Paperback): Jan L. Harrington Network Security - A Practical Approach (Paperback)
Jan L. Harrington
R1,245 Discovery Miles 12 450 Within 7 - 15 working days

"Network Security" is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
+ Helps you see through a hacker's eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, "malware," and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates."

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R1,725 Discovery Miles 17 250 Within 7 - 15 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

IPv6 Network Programming (Paperback): Jun-ichiro Hagino IPv6 Network Programming (Paperback)
Jun-ichiro Hagino
R1,428 Discovery Miles 14 280 Within 7 - 15 working days

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover): Jean-Philippe Vasseur, Mario... Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover)
Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester
R1,832 Discovery Miles 18 320 Within 7 - 15 working days

"Network Recovery" is the first book to provide detailed information on protecting and restoring communication networks, and it sets a sky-high standard for any that may follow. Inside, you ll learn specific techniques that work at each layer of the networking hierarchy including optical, SONET-SDH, IP, and MPLS as well as multi-layer escalation strategies that offer the highest level of protection. The authors begin with an incisive introduction to the issues that define the field of network protection and restoration, and as the book progresses they explain everything you need to know about the relevant protocols, providing theoretical analyses wherever appropriate. If you work for a network-dependent organization, large or small, you ll want to keep Network Recovery within reach at all times.
* Shows you how to implement protection and recovery techniques that will save your organization time and money.
* Documents techniques for the optical, SONET-SDH, IP, and MPLS layers, as well as multi-layer escalation strategies.
* Shows you how to evaluate these techniques in relation to one another, so you can develop an optimal network recovery design.
* Provides industry examples and simulation results.
* Delves into the inner workings of relevant protocols and offers theoretical analyses wherever this information contributes to your practical knowledge."

Wireless Sensor Networks - An Information Processing Approach (Hardcover, New): Feng Zhao, Leonidas Guibas Wireless Sensor Networks - An Information Processing Approach (Hardcover, New)
Feng Zhao, Leonidas Guibas
R1,675 Discovery Miles 16 750 Within 7 - 15 working days

Information processing in sensor networks is a rapidly emerging area of computer science and electrical engineering research. Because of advances in micro-sensors, wireless networking and embedded processing, ad hoc networks of sensor are becoming increasingly available for commercial, military, and homeland security applications. Examples include monitoring (e.g., traffic, habitat, security), industrail sensing and diagnostics (e.g., factory, appliances), infrastructures (i.e., power grid, water distribution, waste disposal) and battle awareness (e.g., multi-target tracking). This book introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.
.Written for practitioners, researchers, and students and relevant to all application areas, including environmental monitoring, industrial sensing and diagnostics, automotive and transportation, security and surveillance, military and battlefield uses, and large-scale infrastructural maintenance.
.Skillfully integrates the many disciplines at work in wireless sensor network design: signal processing and estimation, communication theory and protocols, distributed algorithms and databases, probabilistic reasoning, energy-aware computing, design methodologies, evaluation metrics, and more.
.Demonstrates how querying, data routing, and network self-organization can support high-level information-processing tasks."

Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition):... Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition)
Jerry Cochran
R1,527 Discovery Miles 15 270 Within 7 - 15 working days

Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran's Mission-Critical Microsoft Exchange 2000, and complements Tony Redmond's new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability topics as the first edition but also expands the coverage of storage technology, server technology, management, and security. The book meets the needs of an Exchange administrator or system implementer who is striving to maintain a production Exchange environment that delivers superior service levels, high availability, manageability and scalability with the lowest cost of ownership.
.Gives "lessons learned" and other best practices from organizations that have successfully deployed Exchange
.Includes material on the forthcoming release of Exchange 2003
.Offers advice from one of the most experienced storage practitioners"

Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.): Mark A. Franklin, Patrick Crowley, Haldun... Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.)
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
R1,888 Discovery Miles 18 880 Within 7 - 15 working days

Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors.
Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service.
.Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linkopings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington.
.Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum."

Bluetooth Application Programming with the Java APIs (Paperback, 1st ed): C.Bala Kumar, Paul J. Kline, Timothy J. Thompson Bluetooth Application Programming with the Java APIs (Paperback, 1st ed)
C.Bala Kumar, Paul J. Kline, Timothy J. Thompson
R1,537 Discovery Miles 15 370 Within 7 - 15 working days

Adoption of Bluetooth wireless technology has made great strides in the last few years. One of the biggest steps forward the standardization of Java APIs for Bluetooth wireless technology (JABWT) is explained in detail in this book. The JABWT standard, defined by the JSR-82 specification, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded to the JABWT specification by announcing mobile phones and other products that will run JABWT applications. Bluetooth Application Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in the definition of JABWT, this book provides the authoritative explanations and concrete examples you need to get started right away.
About the Authors
"C Bala Kumar" is a Distinguished Member of the Technical Staff at Motorola. He chaired the industry expert group that defined the Java APIs for Bluetooth wireless technology. He currently leads the systems software team for wireless platforms in Motorola's Semiconductor Products Sector. "Paul J. Kline" is a Distinguished Member of the Technical Staff at Motorola and the maintenance lead for the JABWT specification. He currently works on the System Software Architecture team in Motorola's Semiconductor Products Sector. "Timothy J. Thompson" is a Senior Software Engineer on the System Software Architecture team in Motorola's Semiconductor Products Sector. He was the OBEX architect on the JABWT specification team at Motorola.
* Written by experts the authors led the industry team that defined the JABWT standard and the Motorola team that developed the first JABWT implementation
* Covers JABWT in depth and goes beyond the specification to explain how to use the standard effectively
* A helpful resource both to Java programmers interested in Bluetooth wireless technology and to business managers interested in its potential for creating new business opportunities
* Digs deeply into the programming areas you must master to successfully design and build JABWT applications, including RFCOMM, OBEX, device discovery, service discovery, and L2CAP
* Details the real-world issues involved in programming Bluetooth devices and implementing the JABWT specification
* Organized into sections that explicitly address the different needs of programmers, business managers, and project managers"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Policy-Based Network Management…
John Strassner Hardcover R1,905 Discovery Miles 19 050
Developing IP-Based Services - Solutions…
Monique Morrow, Kateel Vijayananda Hardcover R1,764 Discovery Miles 17 640
IPv6 - Theory, Protocol, and Practice
Peter Loshin Paperback R1,540 Discovery Miles 15 400
Networking Explained
Michael Gallo, William M Hancock Paperback R1,649 Discovery Miles 16 490
The Personal Internet Security Guidebook…
Tim Speed, Juanita Ellis, … Paperback R1,576 Discovery Miles 15 760
Telecommunications Law in the Internet…
Sharon K Black Hardcover R2,343 Discovery Miles 23 430
Internet QoS - Architectures and…
Zheng Wang Hardcover R1,665 Discovery Miles 16 650
High Performance Data Network Design…
Tony Kenyon Paperback R1,793 Discovery Miles 17 930
Integrated Management of Networked…
Heinz-Gerd Hegering, Sebastian Abeck, … Hardcover R2,360 Discovery Miles 23 600
Virtual Private Networks - Making the…
Dennis Fowler Paperback R1,300 Discovery Miles 13 000

 

Loyalty partners