Skip to main content

Books in Networking

51-60 of 116 results in All results

Network Security: Know It All

  • 1st Edition
  • May 16, 2008
  • James Joshi
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 4 6 3 - 0
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 0 1 5 - 1
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field’s leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.

MPLS: Next Steps

  • 1st Edition
  • Volume 1
  • April 17, 2008
  • Bruce S. Davie + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 4 0 0 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 2 9 - 5
Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has resulted in the abandoning of some of the original features of MPLS, and the development of other new features. MPLS has moved from a prospective solution, to a grown-up technology. Now that MPLS has reached this level of maturity, these new tools and features allow more sophisticated services to the users of the network. These tools and features are discussed within various contexts throughout several networking-related books published by MK and this presents us with a unique publishing opportunity. The proposed book is a best-of-the-best collection of existing content from several books MK has published in recent years on MPLS technology (multi-label protocol switching). Individual chapters on MPLS technology are derived from a handful of MK books and are combined in one new volume in a way that makes sense as a reference work for those interested in new and developing aspects of this technology, i.e., network operators and designers who need to determine which aspects of their networks would benefit from MPLS technology and applications. It also serves as a definitive reference for engineers implementing MPLS-based products.This book represents a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources. Suitable and current content will be collected from the following titles: Evans, Deploying IP and MPLS QoS (2006); Farrel, GMPLS (2005); Ash, Traffic Engineering (2006); Vasseur, Network Recovery (2005); Farrel, The Internet and Its Protocols (2004); Nadeau, MPLS Management (2003); and Davie, MPLS Technology and Applications (2000). These chapters will be updated where necessary and two new chapters will be added at the beginning and the end of the book to bring the content into focus and discuss next generation developments.

Wireless Networking

  • 1st Edition
  • March 24, 2008
  • Anurag Kumar + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 2 5 4 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 3 0 - 1
Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous “WiFi” networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field.

Nmap in the Enterprise

  • 1st Edition
  • February 29, 2008
  • Angela Orebaugh + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 4 1 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 7 4 - 5
Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.

Bluetooth Application Programming with the Java APIs Essentials Edition

  • 1st Edition
  • February 14, 2008
  • Timothy J. Thompson + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 3 4 2 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 1 0 0 - 4
Adoption of Bluetooth wireless technology has become ubiquitous in the last few years. One of the biggest steps forward is the standardization of Java APIs for Bluetooth wireless technology (JABWT). The latest updates to this standard is explained in detail in this book. The JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded overwhelmingly to the JABWT specification by implementing JABWT applications in mobile phones and other personal wireless communications products. Bluetooth Application Programming Essentials: Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in developing the standards of JABWT, this book provides the authoritative explanations and concrete examples needed to get started right away.This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use. A NEW chapter on the Push Registry definition (a new feature in the 1.1 version of JSR-82) has been added. Finally, the new Essentials version of the book will update the remaining chapters to reflect changes in the latest Bluetooth spec (2.1) and the industry as a whole.

TCP/IP Sockets in Java

  • 2nd Edition
  • February 8, 2008
  • Kenneth L. Calvert + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 2 5 5 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 8 7 8 - 2
The networking capabilities of the Java platform have been extended considerably since the first edition of the book. This new edition covers version 1.5-1.7, the most current iterations, as well as making the following improvements:The API (application programming interface) reference sections in each chapter, which describe the relevant parts of each class, have been replaced with (i) a summary section that lists the classes and methods used in the code, and (ii) a "gotchas" section that mentions nonobvious or poorly-documented aspects of the objects. In addition, the book covers several new classes and capabilities introduced in the last few revisions of the Java platform. New abstractions to be covered include NetworkInterface, InterfaceAddress, Inet4/6Address, SocketAddress/InetSocketAddress, Executor, and others; extended access to low-level network information; support for IPv6; more complete access to socket options; and scalable I/O. The example code is also modified to take advantage of new language features such as annotations, enumerations, as well as generics and implicit iterators where appropriate.Most Internet applications use sockets to implement network communication protocols. This book's focused, tutorial-based approach helps the reader master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Chapter 1 provides a general overview of networking concepts to allow readers to synchronize the concepts with terminology. Chapter 2 introduces the mechanics of simple clients and servers. Chapter 3 covers basic message construction and parsing. Chapter 4 then deals with techniques used to build more robust clients and servers. Chapter 5 (NEW) introduces the scalable interface facilities which were introduced in Java 1.5, including the buffer and channel abstractions. Chapter 6 discusses the relationship between the programming constructs and the underlying protocol implementations in more detail. Programming concepts are introduced through simple program examples accompanied by line-by-line code commentary that describes the purpose of every part of the program. No other resource presents so concisely or so effectively the material necessary to get up and running with Java sockets programming.

Internet Multimedia Communications Using SIP

  • 1st Edition
  • January 16, 2008
  • Rogelio Martinez Perea
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 3 0 0 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 7 3 7 - 3
Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other, see each other, work collaboratively or send messages in real time. Internet telephony and, in general, Internet multimedia, is the new revolution today and SIP is the key protocol which allows this revolution to grow.The book explains, in tutorial fashion, the underlying technologies that enable real-time IP multimedia communication services in the Internet (voice, video, presence, instant messaging, online picture sharing, white-boarding, etc). Focus is on session initiation protocol (SIP) but also covers session description protocol (SDP), Real-time transport protocol (RTP), and message session relay protocol (MSRP). In addition, it will also touch on other application-related protocols and refer to the latest research work in IETF and 3GPP about these topics. (3GPP stands for "third-generation partnership project" which is a collaboration agreement between ETSI (Europe), ARIB/TTC (Japan), CCSA (China), ATIS (North America) and TTA (South Korea).) The book includes discussion of leading edge theory (which is key to really understanding the technology) accompanied by Java examples that illustrate the theoretical concepts. Throughout the book, in addition to the code snippets, the reader is guided to build a simple but functional IP soft-phone therefore demonstrating the theory with practical examples.This book covers IP multimedia from both a theoretical and practical point of view focusing on letting the reader understand the concepts and put them into practice using Java. It includes lots of drawings, protocol diagrams, UML sequence diagrams and code snippets that allow the reader to rapidly understand the concepts.

Network Simulation Experiments Manual

  • 2nd Edition
  • December 5, 2007
  • Emad Aboelela
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 6 7 6 - 5
Network Simulation Experiments Manual, Second Edition, enables networking professional to visualize how networks work by providing free access to easy-to-install OPNET software. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. The book also goes a step further by providing detailed experiments on core networking topologies for use in this simulation environment. Each experiment is also accompanied by review questions, a lab report, and exercises. This book is recommended for graduate students and networking designers and professionals.

Digital Watermarking and Steganography

  • 2nd Edition
  • November 13, 2007
  • Ingemar Cox + 4 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 2 5 8 5 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 5 8 0 - 5
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.

Information Assurance

  • 1st Edition
  • November 1, 2007
  • Yi Qian + 3 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 3 5 6 6 - 9
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 5 8 8 - 1
In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).