0
Your cart

Your cart is empty

Browse All departments
Price
  • R500+ (68)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Networking

Wireless Networks Bundle (Hardcover): Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, Leonidas J Guibas Wireless Networks Bundle (Hardcover)
Vijay K Garg, Anurag Kumar, D Manjunath, Joy Kuri, Feng Zhao, …
R2,974 R2,542 Discovery Miles 25 420 Save R432 (15%) Within 7 - 12 working days

This essential bundle featuring three definitive titles on wireless networking provides an in-depth, exhaustive, and invaluable asset to anyone working or studying in this rapidly evolving field. Wireless Communications and Networking provides comprehensive coverage of mobile wireless communication, wireless networks, and internetworking/4G technology in one volume with a good blend of fundamental theory and real-world concepts and problem solving methods. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. The book emphasizes conceptual perspectives on modeling, analysis, design and optimization and presents wireless networking within the framework of resource allocation. Designing, implementing, and operating a wireless sensor network involves a wide range of disciplines and many application-specific constraints. To make sense of and take advantage of these systems, a holistic approach is needed-and this is precisely what Wireless Sensor Networks delivers. Bundled together to save you money, there is no quicker or cheaper way to such a comprehensive knowledge of wireless networking.

Computer Networks ISE - A Systems Approach (Paperback, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks ISE - A Systems Approach (Paperback, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,416 R1,127 Discovery Miles 11 270 Save R289 (20%) Within 7 - 12 working days

Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. The newly revised edition continues to offer an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The focus is not just on the specifications comprising today's systems but how key technologies and protocols actually work in real-world setting to solve specific problems. The new edition features increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features, a structure that makes it easier to teach top-down, less dependence on code to explain protocols, vastly improved ancillary package to include robust lecture slide package, and shift to higher levels in the protocol stock where the real innovation is happening currently. the book is targeted at networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.

TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback): David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert TCP/IP Sockets in C# - Practical Guide for Programmers (Paperback)
David B. Makofske, Michael J. Donahoo, Kenneth L. Calvert
R515 Discovery Miles 5 150 Within 7 - 11 working days

"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it's a good starting book; on the other hand professionals could also take advantage of excellent handy sample code snippets and material on topics like message parsing and asynchronous programming."
Adarsh Khare, SDT, .Net Frameworks Team, Microsoft Corporation

The popularity of the C# language and the .NET framework is ever rising due to its ease of use, the extensive class libraries available in the .NET Framework, and the ubiquity of the Microsoft Windows operating system, to name a few advantages. TCP/IP Sockets in C# focuses on the Sockets API, the de facto standard for writing network applications in any programming language. Starting with simple client and server programs that use TCP/IP (the Internet protocol suite), students and practitioners quickly learn the basics and move on to firsthand experience with advanced topics including non-blocking sockets, multiplexing, threads, asynchronous programming, and multicasting. Key network programming concepts such as framing, performance and deadlocks are illustrated through hands-on examples. Using a detailed yet clear, concise approach, this book includes numerous code examples and focused discussions to provide a solid understanding of programming TCP/IP sockets in C#.
Features
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book s companion web site
*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout
*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly
*Important coverage of "under the hood" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets
*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book's companion web site"

Computer Networks - A Systems Approach (Hardcover, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks - A Systems Approach (Hardcover, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,726 R1,454 Discovery Miles 14 540 Save R272 (16%) Within 7 - 12 working days

Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking.

TCP/IP Sockets in C - Practical Guide for Programmers (Paperback, 2nd edition): Michael J. Donahoo, Kenneth L. Calvert TCP/IP Sockets in C - Practical Guide for Programmers (Paperback, 2nd edition)
Michael J. Donahoo, Kenneth L. Calvert
R520 Discovery Miles 5 200 Within 7 - 11 working days

TCP/IP Sockets in C: Practical Guide for Programmers, 2nd Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies.

If you program using Java, be sure to check out this book s companion, "TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition."
Includes completely new and expanded sections that address the IPv6 network environment, defensive programming, and the select() system call, thereby allowing the reader to program in accordance with the most current standards for internetworking. Streamlined and concise tutelage in conjunction with line-by-line code commentary allows readers to quickly program web-based applications without having to wade through unrelated and discursive networking tenets.Grants the reader access to online source code, which the can then be used to directly implement sockets programming procedures.
"

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki
R2,095 Discovery Miles 20 950 Within 7 - 15 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

The Internet Security Guidebook - From Planning to Deployment (Paperback): Juanita Ellis, Tim Speed The Internet Security Guidebook - From Planning to Deployment (Paperback)
Juanita Ellis, Tim Speed
R1,654 Discovery Miles 16 540 Within 7 - 15 working days

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely.
Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.

Network Analysis, Architecture, and Design (Hardcover, 3rd edition): James D. McCabe Network Analysis, Architecture, and Design (Hardcover, 3rd edition)
James D. McCabe
R1,417 R1,320 Discovery Miles 13 200 Save R97 (7%) Within 7 - 11 working days

Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evaluate these parameters in the architecture and design of the system.
Network Analysis, Architecture, and Design, 3e, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers. With a number of examples, analogies, instructor tips, and exercises, this book works through the processes of analysis, architecture, and design step by step, giving designers a solid resource for making good design decisions.
With examples, guidelines, and general principles McCabe illuminates how a network begins as a concept, is built with addressing protocol, routing, and management, and harmonizes with the interconnected technology around it. Other topics covered in the book are learning to recognize problems in initial design, analyzing optimization parameters, and then prioritizing these parameters and incorporating them into the architecture and design of the system. This is an essential book for any professional that will be designing or working with a network on a routine basis.
*Substantially updated design content includes ad hoc networks, GMPLS, IPv6, and mobile networking
*Written by an expert in the field that has designed several large-scale networks for government agencies, universities, and corporations
*Incorporates real-life ideas and experiences of many expert designers along with case studies and end-of-chapter exercises

Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet... Deploying Next Generation Multicast-enabled Applications - Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,165 R1,004 Discovery Miles 10 040 Save R161 (14%) Within 7 - 12 working days

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. Thisis the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, andis the go-to referencefor deploying the Next Generation model.Thisbook proves areal benefit to networking professionals from service providers, enterprises, the vendor community, and anyone elsewho wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.
Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology

Provides the background necessary to understand current generation multi-play applications and their service requirements

Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,075 Discovery Miles 10 750 Within 7 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Smart Phone and Next Generation Mobile Computing (Paperback): Pei Zheng Smart Phone and Next Generation Mobile Computing (Paperback)
Pei Zheng
R1,448 Discovery Miles 14 480 Within 7 - 15 working days

This in-depth technical guide is an essential resource for anyone involved in the development of "smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. "Smart Phone and Next-Generation Mobile Computing" shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

IM Instant Messaging Security (Paperback): John Rittinghouse, James F Ransome IM Instant Messaging Security (Paperback)
John Rittinghouse, James F Ransome
R1,867 Discovery Miles 18 670 Within 7 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Network Security - A Practical Approach (Paperback): Jan L. Harrington Network Security - A Practical Approach (Paperback)
Jan L. Harrington
R1,121 R847 Discovery Miles 8 470 Save R274 (24%) Within 7 - 15 working days

"Network Security" is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
+ Helps you see through a hacker's eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, "malware," and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates."

Wireless Sensor Networks - An Information Processing Approach (Hardcover, New): Feng Zhao, Leonidas Guibas Wireless Sensor Networks - An Information Processing Approach (Hardcover, New)
Feng Zhao, Leonidas Guibas
R1,829 Discovery Miles 18 290 Within 7 - 15 working days

Information processing in sensor networks is a rapidly emerging area of computer science and electrical engineering research. Because of advances in micro-sensors, wireless networking and embedded processing, ad hoc networks of sensor are becoming increasingly available for commercial, military, and homeland security applications. Examples include monitoring (e.g., traffic, habitat, security), industrail sensing and diagnostics (e.g., factory, appliances), infrastructures (i.e., power grid, water distribution, waste disposal) and battle awareness (e.g., multi-target tracking). This book introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.
.Written for practitioners, researchers, and students and relevant to all application areas, including environmental monitoring, industrial sensing and diagnostics, automotive and transportation, security and surveillance, military and battlefield uses, and large-scale infrastructural maintenance.
.Skillfully integrates the many disciplines at work in wireless sensor network design: signal processing and estimation, communication theory and protocols, distributed algorithms and databases, probabilistic reasoning, energy-aware computing, design methodologies, evaluation metrics, and more.
.Demonstrates how querying, data routing, and network self-organization can support high-level information-processing tasks."

Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition):... Mission-Critical Microsoft Exchange 2003 - Designing and Building Reliable Exchange Servers (Paperback, 2nd Revised edition)
Jerry Cochran
R1,667 Discovery Miles 16 670 Within 7 - 15 working days

Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran's Mission-Critical Microsoft Exchange 2000, and complements Tony Redmond's new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability topics as the first edition but also expands the coverage of storage technology, server technology, management, and security. The book meets the needs of an Exchange administrator or system implementer who is striving to maintain a production Exchange environment that delivers superior service levels, high availability, manageability and scalability with the lowest cost of ownership.
.Gives "lessons learned" and other best practices from organizations that have successfully deployed Exchange
.Includes material on the forthcoming release of Exchange 2003
.Offers advice from one of the most experienced storage practitioners"

Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.): Mark A. Franklin, Patrick Crowley, Haldun... Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.)
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
R2,061 Discovery Miles 20 610 Within 7 - 15 working days

Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors.
Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service.
.Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linkopings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington.
.Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum."

Bluetooth Application Programming with the Java APIs (Paperback, 1st ed): C.Bala Kumar, Paul J. Kline, Timothy J. Thompson Bluetooth Application Programming with the Java APIs (Paperback, 1st ed)
C.Bala Kumar, Paul J. Kline, Timothy J. Thompson
R1,678 Discovery Miles 16 780 Within 7 - 15 working days

Adoption of Bluetooth wireless technology has made great strides in the last few years. One of the biggest steps forward the standardization of Java APIs for Bluetooth wireless technology (JABWT) is explained in detail in this book. The JABWT standard, defined by the JSR-82 specification, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded to the JABWT specification by announcing mobile phones and other products that will run JABWT applications. Bluetooth Application Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in the definition of JABWT, this book provides the authoritative explanations and concrete examples you need to get started right away.
About the Authors
"C Bala Kumar" is a Distinguished Member of the Technical Staff at Motorola. He chaired the industry expert group that defined the Java APIs for Bluetooth wireless technology. He currently leads the systems software team for wireless platforms in Motorola's Semiconductor Products Sector. "Paul J. Kline" is a Distinguished Member of the Technical Staff at Motorola and the maintenance lead for the JABWT specification. He currently works on the System Software Architecture team in Motorola's Semiconductor Products Sector. "Timothy J. Thompson" is a Senior Software Engineer on the System Software Architecture team in Motorola's Semiconductor Products Sector. He was the OBEX architect on the JABWT specification team at Motorola.
* Written by experts the authors led the industry team that defined the JABWT standard and the Motorola team that developed the first JABWT implementation
* Covers JABWT in depth and goes beyond the specification to explain how to use the standard effectively
* A helpful resource both to Java programmers interested in Bluetooth wireless technology and to business managers interested in its potential for creating new business opportunities
* Digs deeply into the programming areas you must master to successfully design and build JABWT applications, including RFCOMM, OBEX, device discovery, service discovery, and L2CAP
* Details the real-world issues involved in programming Bluetooth devices and implementing the JABWT specification
* Organized into sections that explicitly address the different needs of programmers, business managers, and project managers"

Developing IP-Based Services - Solutions for Service Providers and Vendors (Hardcover): Monique Morrow, Kateel Vijayananda Developing IP-Based Services - Solutions for Service Providers and Vendors (Hardcover)
Monique Morrow, Kateel Vijayananda
R1,926 Discovery Miles 19 260 Within 7 - 15 working days


Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process.


Meeting this challenge is the focus of "Developing IP-Based Services." The only book of its kind devoted exclusively to IP-based services, it provides a blueprint for all the engineers, managers, and analysts who must come together to build these services and bring them online.
Inside, you'll find just the right balance of business and technical coverage, introduced with a lucid discussion of the principles of service development and wrapped up with three case studies illustrating effective provisioning in today's marketplace. Read the chapters relating to your role, and you'll play it more successfully. Have your team read the entire book, and you'll achieve a level of collaboration and shared understanding that will quickly accrue to the bottom line.
* Valuable insight from authors with extensive service provisioning and product development experience.
* Written for business and technical readers at a wide range of companies, including established telecoms, ISPs, ASPs, Clecs, bandwidth brokers, and vendors.
* Probes the business issues that will make or break your effort, including shortening the development cycle and choosing a competitive model.
* Provides the technical coverage required for successful implementation, according to the terms of the business model you choose.
* Focuses on the IP technologies that offer your service and its users the greatest value, including MPLS, Voice Over IP, and multicast.
* Helps you meet tough challenges relating to security and Quality of Service.
* Concludes with case studies illustrating successful service development and deployment in three companies.

Networking Explained (Paperback, 2nd edition): Michael Gallo, William M Hancock Networking Explained (Paperback, 2nd edition)
Michael Gallo, William M Hancock
R1,801 Discovery Miles 18 010 Within 7 - 15 working days

Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.
Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
Wireless networks
Convergence of voice and data
Multimedia networking

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,720 Discovery Miles 17 200 Within 7 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover): Heinz-Gerd... Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover)
Heinz-Gerd Hegering, Sebastian Abeck, Bernhard Neumair
R2,578 Discovery Miles 25 780 Within 7 - 15 working days

""This is a comprehensive book covering architecture, implementation, and operational use of all the current approaches to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not only covers most of the modern approaches to management but also includes interoperation between these approaches and the use of stand-alone tools such as protocol analyzers. It will be very useful as a reference book for students, researchers, and industry practitioners.""

-Professor Morris Sloman, Department of Computing, Imperial College of Science Technology and Medicine

""A comprehensive reference on the management of networked systems, this book is a must-have for any network or management system architect and anybody else in need of a deep understanding of network management technologies, tools, and practices. Professor Hegering and his team present a complete analysis of integrated network management architectures, tools, system development, and operational use.""

-Branislav Meandzija, General Instrument Corporation

""Highly respected experts Hegering, Abeck, and Neumair offer the most comprehensive presentation of systems and network management that I've seen to date. This book provides an excellent foundation of traditional and emergent technologies that every student and industry practitioner should read.""

-Lisa Phifer, Vice President, Core Competence, Inc.

Features
Teaches the enduring principles at work in a holistic, integrated approach to systems management.
Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

* Teaches the enduring principles at work in a holistic, integrated approach to systems management.
* Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
* Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
* Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

Virtual Private Networks - Making the Right Connection (Paperback): Dennis Fowler Virtual Private Networks - Making the Right Connection (Paperback)
Dennis Fowler
R1,418 Discovery Miles 14 180 Within 7 - 15 working days

Network-dependent companies are excited by the benefits promised by the virtual private network, including lower costs, greater flexibility, and improvements in connectivity. But they also have questions: What benefits are real? How can they be measured? What are the expenses and the dangers?

Virtual Private Networks: Making the Right Connection is an intelligent introduction written especially for business and IT professionals who want a realistic assessment of what a VPN can provide for their organizations. Covering advantages and risks, this book expands your understanding of what you can do with a VPN, while detailing all that implementing it will demand of you. With its help, you'll find your way through VPN hype to the answers you need to make sound decisions.
* Thoroughly explains VPN concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions.
* Covers essential VPN topics like tunneling, encapsulation, encryption, security, and protocols.
* Provides detailed points of comparison between typical VPN costs and the costs of maintaining traditional WANs.
* Offers frank consideration of the hidden costs and risks sometimes associated with VPNs, helping you decide if a VPN is right for you.
* Lists and assesses the software and hardware products you may need to implement a VPN.
* Discusses both Internet-based VPNs and VPN services offered by providers of "private" ATM and frame relay networks, detailing the pros and cons of each.

Computer Security (Hardcover, 3rd edition): John M Carroll Computer Security (Hardcover, 3rd edition)
John M Carroll
R1,291 R976 Discovery Miles 9 760 Save R315 (24%) Within 7 - 15 working days

Computer Security, Third Edition contains the best ideas on recent advances in computer hardware and the spread of personal computer technology. It includes a complete and comprehensive introduction to computer security, as well as coverage of computer crime, systems security, and cryptology. Convinced that there is no such thing as computer security, only various degrees of insecurity, John Carroll presents the best concepts that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This thoroughly enhanced third edition is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. In addition to completely updating the original matter, Computer Security, Third Edition includes new information on: computer crime and the law; physical security; communications; surveillance; and risk management.

Sendmail: Theory and Practice (Paperback): Frederick M. Avolio, Paul Vixie Sendmail: Theory and Practice (Paperback)
Frederick M. Avolio, Paul Vixie
R1,512 Discovery Miles 15 120 Within 7 - 15 working days

* Provides 'cookbook recipes' and simplified explanations on how Sendmail works and how to manage a mail system * Examines e-mail and Sendmail by laying ground work and defining key terms * Progresses from the simple to the complex, providing knowledge
essential for both the interested user and the experienced system manager.

Sendmail is the ULTRIX, OSF/1, and BSD UNIX standard mail deliverer; however, Sendmail has been and is still considered by many to be impossible to understand. Sendmail: Theory and Practice explains Sendmail's history, architecture, configuration, and
maintenance. Systems managers wanting to learn how to set-up and maintain their mail system (made up of one or many computers) and interested readers wanting to learn more about electronic mail will find this book beneficial. The book explains how and
why Sendmail does what it does and provides practical advnce about designing and maintaining an electronic mail system. 'You need this book if you run a mail gateway, or if you have a really strong curiosity about how email works.' - C Vu, November 1995

Interconnecting Smart Objects with IP - The Next Internet (Paperback): Jean-Philippe Vasseur, Adam Dunkels Interconnecting Smart Objects with IP - The Next Internet (Paperback)
Jean-Philippe Vasseur, Adam Dunkels
R1,205 R1,018 Discovery Miles 10 180 Save R187 (16%) Within 7 - 12 working days

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. "Interconnecting Smart Objects with IP" is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless sensor networks, ubiquitous and pervasive computing, mobile telephony and telemetry, and mobile computer networking. This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, and protocols for smart objects, and Part III provides case studies on how and where smart objects are being used today and in the future. The book covers the fundamentals of IP communication for smart objects, IPv6, and web services, as well as several newly specified low-power IP standards such as the IETF 6LoWPAN adaptation layer and the RPL routing protocol. This book contains essential information not only for the technical reader but also for policy makers and decision makers in the area of smart objects both for private IP networks and the Internet.
Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network Simulation Experiments Manual
Emad Aboelela Paperback R583 Discovery Miles 5 830
TCP/IP Sockets in Java - Practical Guide…
Kenneth L. Calvert, Michael J. Donahoo Paperback R546 Discovery Miles 5 460
Wireless Communications & Networking
Vijay K Garg Hardcover R1,767 Discovery Miles 17 670
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam-Kee Tan Paperback R1,070 Discovery Miles 10 700
Network Routing - Algorithms, Protocols…
Hardcover R1,949 Discovery Miles 19 490
Deploying IP and MPLS QoS for…
John William Evans, Clarence Filsfils Hardcover R1,370 Discovery Miles 13 700
Deploying QoS for Cisco IP and Next…
Vinod Joseph, Brett Chapman Hardcover R1,368 Discovery Miles 13 680
Broadband Cable Access Networks - The…
David Large, James Farmer Hardcover R2,060 Discovery Miles 20 600
Communication Networking - An Analytical…
Joy Kuri Hardcover R2,144 Discovery Miles 21 440
Multicast Sockets - Practical Guide for…
Kevin C. Almeroth, David B. Makofske Paperback R590 R527 Discovery Miles 5 270

 

Loyalty partners