Skip to main content

Books in Networking

11-20 of 116 results in All results

DNS Security

  • 1st Edition
  • June 10, 2016
  • Allan Liska + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 3 0 6 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 3 3 9 - 5
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.

Malware Diffusion Models for Modern Complex Networks

  • 1st Edition
  • February 2, 2016
  • Vasileios Karyotis + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 1 4 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 1 6 - 5
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Essential Skills for Hackers

  • 1st Edition
  • December 9, 2015
  • Kevin Cardwell + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 1 1 - 5
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Multiscreen UX Design

  • 1st Edition
  • December 8, 2015
  • Wolfram Nagel
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 2 9 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 5 0 - 9
People today use technology on different devices in different locations. Users expect to access information on all relevant screens and across multiple channels through smartphones, tablets, laptops/desktops, smart (internet-connected) TVs, and other devices, such as smartwatches for example. Multiscreen is no longer a nice add-on, it’s a requirement. In this environment, user experience needs to cater to multiple devices. This book provides a holistic approach that will help UX professionals to offer a hands-on guide for UX design across multiple screens. It presents an opportunity to learn how to cater designs for customers. Readers will find patterns, strategies, examples and case studies, methodologies, and insights to help inspire them to develop a viable strategy for their own digital products and services. UX professionals will walk through important elements of multiscreen UX: Investigating the devices and their capabilities Understanding the users and their capabilities Considering the context in which users use these devices Navigating next generation information experiences and the future of content management Designing content and UI architecture for multiscreen projects

Traffic Anomaly Detection

  • 1st Edition
  • October 30, 2015
  • Antonio Cuadra-Sánchez + 1 more
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 0 1 2 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 8 0 7 - 2
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".

Bio-inspired Networking

  • 1st Edition
  • August 19, 2015
  • Daniel Câmara
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 4 6 5 - 4
Bio-inspired techniques are based on principles, or models, of biological systems. In general, natural systems present remarkable capabilities of resilience and adaptability. In this book, we explore how bio-inspired methods can solve different problems linked to computer networks.Future networks are expected to be autonomous, scalable and adaptive. During millions of years of evolution, nature has developed a number of different systems that present these and other characteristics required for the next generation networks. Indeed, a series of bio-inspired methods have been successfully used to solve the most diverse problems linked to computer networks. This book presents some of these techniques from a theoretical and practical point of view.

CMDB Systems

  • 1st Edition
  • March 20, 2015
  • Dennis Drogseth + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 2 6 5 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 3 7 3 - 1
CMDB Systems: Making Change Work in the Age of Cloud and Agile shows you how an integrated database across all areas of an organization’s information system can help make organizations more efficient reduce challenges during change management and reduce total cost of ownership (TCO). In addition, this valuable reference provides guidelines that will enable you to avoid the pitfalls that cause CMDB projects to fail and actually shorten the time required to achieve an implementation of a CMDB. Drawing upon extensive experience and using illustrative real world examples, Rick Sturm, Dennis Drogseth and Dan Twing discuss: Unique insights from extensive industry exposure, research and consulting on the evolution of CMDB/CMS technology and ongoing dialog with the vendor community in terms of current and future CMDB/CMS design and plans Proven and structured best practices for CMDB deployments Clear and documented insights into the impacts of cloud computing and other advances on CMDB/CMS futures

Green Information Technology

  • 1st Edition
  • March 3, 2015
  • Mohammad Dastbaz + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 3 7 9 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 6 7 1 - 8
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA’s estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact.

Cloud Data Centers and Cost Modeling

  • 1st Edition
  • February 27, 2015
  • Caesar Wu + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 4 1 3 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 6 8 8 - 6
Cloud Data Centers and Cost Modeling establishes a framework for strategic decision-makers to facilitate the development of cloud data centers. Just as building a house requires a clear understanding of the blueprints, architecture, and costs of the project; building a cloud-based data center requires similar knowledge. The authors take a theoretical and practical approach, starting with the key questions to help uncover needs and clarify project scope. They then demonstrate probability tools to test and support decisions, and provide processes that resolve key issues. After laying a foundation of cloud concepts and definitions, the book addresses data center creation, infrastructure development, cost modeling, and simulations in decision-making, each part building on the previous. In this way the authors bridge technology, management, and infrastructure as a service, in one complete guide to data centers that facilitates educated decision making.

Optimizing IEEE 802.11i Resource and Security Essentials

  • 1st Edition
  • November 20, 2014
  • Iraj Sadegh Amiri + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 2 2 3 - 8
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.