Skip to main content

Books in Networking

71-80 of 116 results in All results

GMPLS

  • 1st Edition
  • December 20, 2005
  • Adrian Farrel + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 6 4 7 - 8
The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLS’s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.

Smart Phone and Next Generation Mobile Computing

  • 1st Edition
  • December 16, 2005
  • Pei Zheng + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 8 3 4 - 2
This in-depth technical guide is an essential resource for anyone involved in the development of “smart” mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. Smart Phone and Next-Generation Mobile Computing shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you’re a manager, engineer, designer, or entrepreneur.

Globus® Toolkit 4

  • 1st Edition
  • December 16, 2005
  • Borja Sotomayor + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 0 0 3 - 1
The Globus Toolkit is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. Globus Toolkit 4: Programming Java Services provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you’re making the leap into Grid Computing using the Globus Toolkit, you’ll want Globus Toolkit 4: Programming Java Services at your side as you take your first steps.

Business Continuity and Disaster Recovery for InfoSec Managers

  • 1st Edition
  • September 20, 2005
  • John Rittinghouse PhD CISM + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 2 8 3 3 - 5
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.

Grid Computing

  • 1st Edition
  • August 26, 2005
  • Pawel Plaszczak + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 0 7 6 - 4
A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing’s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company’s culture.

IM Instant Messaging Security

  • 1st Edition
  • June 15, 2005
  • John Rittinghouse PhD CISM + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 0 7 2 - 7
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today’s corporate environment.

Network Security

  • 1st Edition
  • April 8, 2005
  • Jan L. Harrington
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 5 3 7 - 2
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.

Voice over Internet Protocol (VoIP) Security

  • 1st Edition
  • November 19, 2004
  • James F. Ransome PhD CISM CISSP + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 0 4 6 - 7
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today’s complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.

IPv6 Network Programming

  • 1st Edition
  • October 18, 2004
  • Jun-ichiro itojun Hagino
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 7 9 - 1
This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.

Routing, Flow, and Capacity Design in Communication and Computer Networks

  • 1st Edition
  • July 1, 2004
  • Michal Pioro + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 5 5 7 1 8 9 - 0
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 1 6 4 3 - 1
In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have been under-utilized. At the opposite extreme, you will learn where they tend to fail to contribute to the twin goals of network efficiency and cost-savings. Most of all, you will learn precisely how to tailor theoretical models to make them as useful as possible in practice.Throughout, the authors focus on the traffic demands encountered in the real world of network design. Their generic approach, however, allows problem formulations and solutions to be applied across the board to virtually any type of backbone communication or computer network. For beginners, this book is an excellent introduction. For seasoned professionals, it provides immediate solutions and a strong foundation for further advances in the use of mathematical modeling for network design.