0
Your cart

Your cart is empty

Browse All departments
Price
  • R500+ (68)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Networking

Wireless Networks Bundle (Hardcover): Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, Leonidas J Guibas Wireless Networks Bundle (Hardcover)
Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, …
R2,974 R2,542 Discovery Miles 25 420 Save R432 (15%) Within 7 - 12 working days

This essential bundle featuring three definitive titles on wireless networking provides an in-depth, exhaustive, and invaluable asset to anyone working or studying in this rapidly evolving field. Wireless Communications and Networking provides comprehensive coverage of mobile wireless communication, wireless networks, and internetworking/4G technology in one volume with a good blend of fundamental theory and real-world concepts and problem solving methods. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. The book emphasizes conceptual perspectives on modeling, analysis, design and optimization and presents wireless networking within the framework of resource allocation. Designing, implementing, and operating a wireless sensor network involves a wide range of disciplines and many application-specific constraints. To make sense of and take advantage of these systems, a holistic approach is needed-and this is precisely what Wireless Sensor Networks delivers. Bundled together to save you money, there is no quicker or cheaper way to such a comprehensive knowledge of wireless networking.

Computer Networks ISE - A Systems Approach (Paperback, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks ISE - A Systems Approach (Paperback, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,386 R1,127 Discovery Miles 11 270 Save R259 (19%) Within 7 - 12 working days

Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. The newly revised edition continues to offer an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The focus is not just on the specifications comprising today's systems but how key technologies and protocols actually work in real-world setting to solve specific problems. The new edition features increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features, a structure that makes it easier to teach top-down, less dependence on code to explain protocols, vastly improved ancillary package to include robust lecture slide package, and shift to higher levels in the protocol stock where the real innovation is happening currently. the book is targeted at networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.

Computer Networks - A Systems Approach (Hardcover, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks - A Systems Approach (Hardcover, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,636 Discovery Miles 16 360 Within 7 - 11 working days

Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.

Wireless Networking Complete (Hardcover): Pei Zheng, Larry L. Peterson, Bruce S. Davie, Adrian Farrel Wireless Networking Complete (Hardcover)
Pei Zheng, Larry L. Peterson, Bruce S. Davie, Adrian Farrel
R1,464 R1,256 Discovery Miles 12 560 Save R208 (14%) Within 7 - 12 working days

Given the explosion of new wireless communications techniques and the host of wireless network technologies and applications currently available or on the drawing board, it is safe to say that we are in the midst of a wireless networking revolution. Industry adoption of next-generation specifications will provide a substantial boost to the market for wireless multimedia networking, prompting growth in excess of 50 million wireless network devices by 2010, according to a market study by Parks Associates.

A compilation of critical content from key MK titles published in recent years on wireless networking and communications. Individual chapters are organized as one complete reference that allows it to be used as a 360-degree view from our bestselling authors for those interested in new and developing aspects of wireless network technology.
Chapters contributed by recognized experts in the field cover theory and practice of wireless network technology, allowing the reader to develop a new level of knowledge and technical expertise Up-to-date coverage of wireless networking issues facilitates learning and lets the reader remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback): David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback)
David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert
R535 Discovery Miles 5 350 Within 7 - 12 working days

"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it's a good starting book; on the other hand professionals could also take advantage of excellent handy sample code snippets and material on topics like message parsing and asynchronous programming."
Adarsh Khare, SDT, .Net Frameworks Team, Microsoft Corporation

The popularity of the C# language and the .NET framework is ever rising due to its ease of use, the extensive class libraries available in the .NET Framework, and the ubiquity of the Microsoft Windows operating system, to name a few advantages. TCP/IP Sockets in C# focuses on the Sockets API, the de facto standard for writing network applications in any programming language. Starting with simple client and server programs that use TCP/IP (the Internet protocol suite), students and practitioners quickly learn the basics and move on to firsthand experience with advanced topics including non-blocking sockets, multiplexing, threads, asynchronous programming, and multicasting. Key network programming concepts such as framing, performance and deadlocks are illustrated through hands-on examples. Using a detailed yet clear, concise approach, this book includes numerous code examples and focused discussions to provide a solid understanding of programming TCP/IP sockets in C#.
Features
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book s companion web site
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book's companion web site"

TCP/IP Sockets in C - Practical Guide for Programmers (Paperback, 2nd edition): Michael J. Donahoo, Kenneth L. Calvert TCP/IP Sockets in C - Practical Guide for Programmers (Paperback, 2nd edition)
Michael J. Donahoo, Kenneth L. Calvert
R540 Discovery Miles 5 400 Within 7 - 12 working days

TCP/IP Sockets in C: Practical Guide for Programmers, 2nd Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies.

If you program using Java, be sure to check out this book s companion, "TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition."
Includes completely new and expanded sections that address the IPv6 network environment, defensive programming, and the select() system call, thereby allowing the reader to program in accordance with the most current standards for internetworking. Streamlined and concise tutelage in conjunction with line-by-line code commentary allows readers to quickly program web-based applications without having to wade through unrelated and discursive networking tenets.Grants the reader access to online source code, which the can then be used to directly implement sockets programming procedures.
"

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki
R2,095 Discovery Miles 20 950 Within 7 - 15 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

The Internet Security Guidebook - From Planning to Deployment (Paperback): Juanita Ellis, Tim Speed The Internet Security Guidebook - From Planning to Deployment (Paperback)
Juanita Ellis, Tim Speed
R1,654 Discovery Miles 16 540 Within 7 - 15 working days

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely.
Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.

Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet... Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,165 R1,004 Discovery Miles 10 040 Save R161 (14%) Within 7 - 12 working days

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. Thisis the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, andis the go-to referencefor deploying the Next Generation model.Thisbook proves areal benefit to networking professionals from service providers, enterprises, the vendor community, and anyone elsewho wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.
Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology

Provides the background necessary to understand current generation multi-play applications and their service requirements

Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"

Network Analysis, Architecture, and Design (Hardcover, 3rd edition): James D. McCabe Network Analysis, Architecture, and Design (Hardcover, 3rd edition)
James D. McCabe
R1,373 Discovery Miles 13 730 Within 7 - 12 working days

Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evaluate these parameters in the architecture and design of the system.
Network Analysis, Architecture, and Design, 3e, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers. With a number of examples, analogies, instructor tips, and exercises, this book works through the processes of analysis, architecture, and design step by step, giving designers a solid resource for making good design decisions.
With examples, guidelines, and general principles McCabe illuminates how a network begins as a concept, is built with addressing protocol, routing, and management, and harmonizes with the interconnected technology around it. Other topics covered in the book are learning to recognize problems in initial design, analyzing optimization parameters, and then prioritizing these parameters and incorporating them into the architecture and design of the system. This is an essential book for any professional that will be designing or working with a network on a routine basis.
*Substantially updated design content includes ad hoc networks, GMPLS, IPv6, and mobile networking
*Written by an expert in the field that has designed several large-scale networks for government agencies, universities, and corporations
*Incorporates real-life ideas and experiences of many expert designers along with case studies and end-of-chapter exercises

Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed): C.Bala Kumar, Timothy J.... Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed)
C.Bala Kumar, Timothy J. Thompson, Paul J. Kline
R1,069 Discovery Miles 10 690 Within 7 - 15 working days

Adoption of Bluetooth wireless technology has become ubiquitous in the last few years. One of the biggest steps forward is the standardization of Java APIs for Bluetooth wireless technology (JABWT). The latest updates to this standard is explained in detail in this book. The JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded overwhelmingly to the JABWT specification by implementing JABWT applications in mobile phones and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the Java APIs" explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in developing the standards of JABWT, this book provides the authoritative explanations and concrete examples needed to get started right away.
This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use. A NEW chapter on the Push Registry definition (a new feature in the 1.1 version of JSR-82) has been added. Finally, the new Essentials version of the book will update the remaining chapters to reflect changes in the latest Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added content on the website. This "bonus material" includes complete source code from examples in the book, the javex.bluetooth code package, the java.obex code package, an enhanced set of "Example Applications," and a tutorial on "Implementing JABWT on a Device." These code-heavy sections are actually more effective in electonic format where the application can be easily downloaded.

KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables software and hardware vendors to quickly develop Bluetooth applications for mobile devices in an increasingly competitive market.
* The updated material examines crucial programming areas (including RFCOMM, OBEX, device discovery, service discovery, and L2CAP), which allows developers to not only successfully design, but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal Push Registry feature ? a recent development that will help programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in implementing the Java APIs specification, the book allows developers to identify with the text and encourages repeated reference.

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,075 Discovery Miles 10 750 Within 7 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Smart Phone and Next Generation Mobile Computing (Paperback): Pei Zheng Smart Phone and Next Generation Mobile Computing (Paperback)
Pei Zheng
R1,448 Discovery Miles 14 480 Within 7 - 15 working days

This in-depth technical guide is an essential resource for anyone involved in the development of "smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. "Smart Phone and Next-Generation Mobile Computing" shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

Globus (R) Toolkit 4 - Programming Java Services (Paperback): Borja Sotomayor, Lisa Childers Globus (R) Toolkit 4 - Programming Java Services (Paperback)
Borja Sotomayor, Lisa Childers
R1,301 Discovery Miles 13 010 Within 7 - 15 working days

The Globus Toolkit (http: //www.globus.org/toolkit/) is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. "Globus Toolkit 4: Programming Java Services" provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you're making the leap into Grid Computing using the Globus Toolkit, you'll want "Globus Toolkit 4: Programming Java Services" at your side as you take your first steps.
+ Written for newcomers to Globus Toolkit, but filled with useful information for experienced users.
+ Clearly situates Globus application development within the context of Web Services and evolving Grid standards.
+ Provides detailed coverage of Web Services programming with the Globus Toolkit's Java WS Core component.
+ Covers basic aspects of developing secure services using the Grid Security Infrastructure (GSI).
+ Uses simple, didactic examples throughout the book, but also includes a more elaborate example, the FileBuy application, that showcases common design patterns found in Globus applications.
+ Concludes with useful reference appendices.

IM Instant Messaging Security (Paperback): John Rittinghouse, James F Ransome IM Instant Messaging Security (Paperback)
John Rittinghouse, James F Ransome
R1,867 Discovery Miles 18 670 Within 7 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Business Continuity and Disaster Recovery for InfoSec Managers (Paperback): John W Rittinghouse, James F Ransome Business Continuity and Disaster Recovery for InfoSec Managers (Paperback)
John W Rittinghouse, James F Ransome
R1,745 Discovery Miles 17 450 Within 7 - 15 working days

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining second site back up and recovery
.Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters"

Network Security - A Practical Approach (Paperback): Jan L. Harrington Network Security - A Practical Approach (Paperback)
Jan L. Harrington
R1,121 R847 Discovery Miles 8 470 Save R274 (24%) Within 7 - 15 working days

"Network Security" is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
+ Helps you see through a hacker's eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, "malware," and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates."

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R1,483 Discovery Miles 14 830 Special order

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

IPv6 Network Programming (Paperback): Jun-ichiro Hagino IPv6 Network Programming (Paperback)
Jun-ichiro Hagino
R1,215 Discovery Miles 12 150 Special order

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Wireless Sensor Networks - An Information Processing Approach (Hardcover, New): Feng Zhao, Leonidas Guibas Wireless Sensor Networks - An Information Processing Approach (Hardcover, New)
Feng Zhao, Leonidas Guibas
R1,829 Discovery Miles 18 290 Within 7 - 15 working days

Information processing in sensor networks is a rapidly emerging area of computer science and electrical engineering research. Because of advances in micro-sensors, wireless networking and embedded processing, ad hoc networks of sensor are becoming increasingly available for commercial, military, and homeland security applications. Examples include monitoring (e.g., traffic, habitat, security), industrail sensing and diagnostics (e.g., factory, appliances), infrastructures (i.e., power grid, water distribution, waste disposal) and battle awareness (e.g., multi-target tracking). This book introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.
.Written for practitioners, researchers, and students and relevant to all application areas, including environmental monitoring, industrial sensing and diagnostics, automotive and transportation, security and surveillance, military and battlefield uses, and large-scale infrastructural maintenance.
.Skillfully integrates the many disciplines at work in wireless sensor network design: signal processing and estimation, communication theory and protocols, distributed algorithms and databases, probabilistic reasoning, energy-aware computing, design methodologies, evaluation metrics, and more.
.Demonstrates how querying, data routing, and network self-organization can support high-level information-processing tasks."

Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover): Jean-Philippe Vasseur, Mario... Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover)
Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester
R1,569 Discovery Miles 15 690 Special order

"Network Recovery" is the first book to provide detailed information on protecting and restoring communication networks, and it sets a sky-high standard for any that may follow. Inside, you ll learn specific techniques that work at each layer of the networking hierarchy including optical, SONET-SDH, IP, and MPLS as well as multi-layer escalation strategies that offer the highest level of protection. The authors begin with an incisive introduction to the issues that define the field of network protection and restoration, and as the book progresses they explain everything you need to know about the relevant protocols, providing theoretical analyses wherever appropriate. If you work for a network-dependent organization, large or small, you ll want to keep Network Recovery within reach at all times.
* Shows you how to implement protection and recovery techniques that will save your organization time and money.
* Documents techniques for the optical, SONET-SDH, IP, and MPLS layers, as well as multi-layer escalation strategies.
* Shows you how to evaluate these techniques in relation to one another, so you can develop an optimal network recovery design.
* Provides industry examples and simulation results.
* Delves into the inner workings of relevant protocols and offers theoretical analyses wherever this information contributes to your practical knowledge."

Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition):... Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition)
Jerry Cochran
R1,667 Discovery Miles 16 670 Within 7 - 15 working days

Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran's Mission-Critical Microsoft Exchange 2000, and complements Tony Redmond's new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability topics as the first edition but also expands the coverage of storage technology, server technology, management, and security. The book meets the needs of an Exchange administrator or system implementer who is striving to maintain a production Exchange environment that delivers superior service levels, high availability, manageability and scalability with the lowest cost of ownership.
.Gives "lessons learned" and other best practices from organizations that have successfully deployed Exchange
.Includes material on the forthcoming release of Exchange 2003
.Offers advice from one of the most experienced storage practitioners"

Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.): Mark A. Franklin, Patrick Crowley, Haldun... Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.)
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
R2,061 Discovery Miles 20 610 Within 7 - 15 working days

Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors.
Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service.
.Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linkopings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington.
.Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum."

Bluetooth Application Programming with the Java APIs (Paperback, 1st ed): C.Bala Kumar, Paul J. Kline, Timothy J. Thompson Bluetooth Application Programming with the Java APIs (Paperback, 1st ed)
C.Bala Kumar, Paul J. Kline, Timothy J. Thompson
R1,678 Discovery Miles 16 780 Within 7 - 15 working days

Adoption of Bluetooth wireless technology has made great strides in the last few years. One of the biggest steps forward the standardization of Java APIs for Bluetooth wireless technology (JABWT) is explained in detail in this book. The JABWT standard, defined by the JSR-82 specification, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded to the JABWT specification by announcing mobile phones and other products that will run JABWT applications. Bluetooth Application Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in the definition of JABWT, this book provides the authoritative explanations and concrete examples you need to get started right away.
About the Authors
"C Bala Kumar" is a Distinguished Member of the Technical Staff at Motorola. He chaired the industry expert group that defined the Java APIs for Bluetooth wireless technology. He currently leads the systems software team for wireless platforms in Motorola's Semiconductor Products Sector. "Paul J. Kline" is a Distinguished Member of the Technical Staff at Motorola and the maintenance lead for the JABWT specification. He currently works on the System Software Architecture team in Motorola's Semiconductor Products Sector. "Timothy J. Thompson" is a Senior Software Engineer on the System Software Architecture team in Motorola's Semiconductor Products Sector. He was the OBEX architect on the JABWT specification team at Motorola.
* Written by experts the authors led the industry team that defined the JABWT standard and the Motorola team that developed the first JABWT implementation
* Covers JABWT in depth and goes beyond the specification to explain how to use the standard effectively
* A helpful resource both to Java programmers interested in Bluetooth wireless technology and to business managers interested in its potential for creating new business opportunities
* Digs deeply into the programming areas you must master to successfully design and build JABWT applications, including RFCOMM, OBEX, device discovery, service discovery, and L2CAP
* Details the real-world issues involved in programming Bluetooth devices and implementing the JABWT specification
* Organized into sections that explicitly address the different needs of programmers, business managers, and project managers"

Policy-Based Network Management - Solutions for the Next Generation (Hardcover, New): John Strassner Policy-Based Network Management - Solutions for the Next Generation (Hardcover, New)
John Strassner
R2,081 Discovery Miles 20 810 Within 7 - 15 working days

Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities.
Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes it approachable for those who really need to understand what it has to offer. The author, founder of the IETF Policy Framework working group, discusses system requirements, information models, and system components for Policy-Based Management. He also provide practitioners with a resource for developing and/or incorporating PBNM systems. As network systems become larger and more complex, creating policies for them has become a crucial step in the management of network systems, and this book is a welcome addition to this exciting approach.
* Presents a completely new approach to PBNM that unites the business, system, and implementation spheres.
* As the basis for examples and discussion, uses the DEN-ng information model, an easy-to-understand open standard tied closely to eTOM and NGOSS.
* Introduces the Ponder system, then examines Ponder extensions designed to enhance the structure of high-level policies and their application in a PBNM system.
* Filled with examples illustrating how policies are most effectively used in a PBNM system and what new directions PBNM is likely to take.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Developing IP-Based Services - Solutions…
Monique Morrow, Kateel Vijayananda Hardcover R1,926 Discovery Miles 19 260
IPv6 - Theory, Protocol, and Practice
Peter Loshin Paperback R1,324 Discovery Miles 13 240
Networking Explained
Michael Gallo, William M Hancock Paperback R1,801 Discovery Miles 18 010
The Personal Internet Security Guidebook…
Tim Speed, Juanita Ellis, … Paperback R1,720 Discovery Miles 17 200
Internet QoS - Architectures and…
Zheng Wang Hardcover R1,415 Discovery Miles 14 150
Integrated Management of Networked…
Heinz-Gerd Hegering, Sebastian Abeck, … Hardcover R2,578 Discovery Miles 25 780
Virtual Private Networks - Making the…
Dennis Fowler Paperback R1,418 Discovery Miles 14 180
Computer Security
John M Carroll Hardcover R1,291 R976 Discovery Miles 9 760
Sendmail: Theory and Practice
Frederick M. Avolio, Paul Vixie Paperback R1,512 Discovery Miles 15 120
Interconnecting Smart Objects with IP…
Jean-Philippe Vasseur, Adam Dunkels Paperback R1,185 R1,019 Discovery Miles 10 190

 

Loyalty partners