Skip to main content

Books in Networking

41-50 of 116 results in All results

Multi-Camera Networks

  • 1st Edition
  • April 25, 2009
  • Hamid Aghajan + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 6 3 3 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 8 7 8 0 0 - 3
The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoring Comprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applications Presents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware This book is the definitive reference in multi-camera networks. It gives clear guidance on the conceptual and implementation issues involved in the design and operation of multi-camera networks, as well as presenting the state-of-the-art in hardware, algorithms and system development. The book is broad in scope, covering smart camera architectures, embedded processing, sensor fusion and middleware, calibration and topology, network-based detection and tracking, and applications in distributed and collaborative methods in camera networks. This book will be an ideal reference for university researchers, R&D engineers, computer engineers, and graduate students working in signal and video processing, computer vision, and sensor networks. Hamid Aghajan is a Professor of Electrical Engineering (consulting) at Stanford University. His research is on multi-camera networks for smart environments with application to smart homes, assisted living and well being, meeting rooms, and avatar-based communication and social interactions. He is Editor-in-Chief of Journal of Ambient Intelligence and Smart Environments, and was general chair of ACM/IEEE ICDSC 2008. Andrea Cavallaro is Reader (Associate Professor) at Queen Mary, University of London (QMUL). His research is on target tracking and audiovisual content analysis for advanced surveillance and multi-sensor systems. He serves as Associate Editor of the IEEE Signal Processing Magazine and the IEEE Trans. on Multimedia, and has been general chair of IEEE AVSS 2007, ACM/IEEE ICDSC 2009 and BMVC 2009.

Deploying QoS for Cisco IP and Next Generation Networks

  • 1st Edition
  • April 10, 2009
  • Vinod Joseph + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 4 6 1 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 2 5 5 - 3
Deploying QoS for IP Next Generation Networks: The Definitive Guide provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference for businesses that plan to deploy a QoS framework for voice, video, mobility and data applications creating a converged infrastructure. It further provides detailed design and implementation details for various service deployments across the various Cisco platforms such as the CRS-1, 12000, 7600 & 7200 series routers that are widely deployed in most Carrier Networks. The book covers architectural and implementation specific information plus recommendations for almost all the popular line cards across the various hardware platforms widely used in the market. It also addresses QoS architecture and deployment on the Cisco CRS-1 platform and is considered as a unique selling point of this book. In short the books serve as an "On the Job Manual" which can also be used as a study guide for Cisco specialist certification programs (CCNA, CCIP, CCIE)This book will includes detailed illustration and configurations. In addition, it provides detailed case studies along with platform specific tests and measurement results. A link to a detailed tutorial on QoS metrics and associated test results will be available at the book's companion website in order to ensure that the reader is able to understand QoS functionality from a deployment standpoint.

TCP/IP Sockets in C

  • 2nd Edition
  • March 2, 2009
  • Michael J. Donahoo + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 5 4 0 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 3 2 1 - 5
TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies. If you program using Java, be sure to check out this book’s companion, TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition.

P2P Networking and Applications

  • 1st Edition
  • December 12, 2008
  • John Buford + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 2 1 4 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 1 1 9 - 8
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, the book explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models and also provides the means to improve upon these models with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practitioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.

Disappearing Cryptography

  • 3rd Edition
  • December 3, 2008
  • Peter Wayner
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 4 7 9 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 2 7 0 - 6
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.

Network Quality of Service Know It All

  • 1st Edition
  • October 23, 2008
  • Adrian Farrel
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 5 9 7 - 2
The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. This book brings all of the elements of network quality of service (QoS) together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network QoS, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.

Broadband Cable Access Networks

  • 1st Edition
  • October 17, 2008
  • David Large + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 4 0 1 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 2 1 4 - 0
Broadband Cable Access Networks focuses on broadband distribution and systems architecture and concentrates on practical concepts that will allow the reader to do their own design, improvement, and troubleshooting work. The objective is to enhance the skill sets of a large population that designs and builds broadband cable plants, as well as those maintaining and troubleshooting it. A large cross-section of technical personnel who need to learn these skills design, maintain, and service HFC systems from signal creation through transmission to reception and processing at the customer end point. In addition, data/voice and video specialists need to master and reference the basics of HFC design and distribution before contending with the intricacies of their own unique services. This book serves as an essential reference to all cable engineers—those who specifically design and maintain the HFC distribution plant as well as those primarily concerned with data/voice technology as well as video technology.

Network Management Know It All

  • 1st Edition
  • October 16, 2008
  • Adrian Farrel
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 5 9 8 - 9
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 3 4 2 - 0
Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems, which includes controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a network. This book brings all of the elements of network management together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network management, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.

Technical, Commercial and Regulatory Challenges of QoS

  • 1st Edition
  • September 8, 2008
  • XiPeng Xiao
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 3 6 9 3 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 0 3 1 - 3
Technical, Commerical and Regulatory Challenges of QoS provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. Includes case studies based on real-world experiences from industry. The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices. The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and the overall benefits of an improved technical approach. Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions. This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model. This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures.

Netcat Power Tools

  • 1st Edition
  • June 13, 2008
  • Jan Kanclirz
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 5 7 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 7 3 - 8
Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.