Skip to main content

Books in Computer communication networks

121-130 of 161 results in All results

Network Simulation Experiments Manual

  • 1st Edition
  • June 25, 2003
  • Emad Aboelela
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 0 7 4 - 8
The lab exercises contained in the network simulation experiments manual are based on the OPNET simulator (v. 9), a network simulation tool that was originally developed at M.I.T. It provides networking professionals with the option of implementing experiments from their homes or workplaces and the lab manual comes with directions for downloading the free easy-to-install software (special version to this book only--see system requirements below). These labs run through simulations closely tied to the material in the text so that you can visualize the discussions covering core network topologies. Various scenarios are presented within each topology, and review questions and a lab report exercise accompany each lab experiment. The experiments also follows the organization of Computer Networks, Third Edition, by Larry Peterson and Bruce Davie.System requirements for using the OPNET IT Guru Academic Edition release 9.1:-Intel Pentium III, 4 or compatible (500 MHz or better)-256 MB RAM-400 MB disk space-Display: 1024 x 768 or higher resolution, 256 or more colors-The English language version of the following operating systems are supported:Microsoft Windows NT (Service Pack 3, 5, or 6a)Windows 2000 (Service Pack 1 and 2 are supported but not required)Windows XP (Service Pack 1 is required)

Stealing The Network

  • 1st Edition
  • May 15, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 1 1 - 1
Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.

Configuring IPv6 For Cisco IOS

  • 1st Edition
  • August 16, 2002
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 6 - 6
"By building IPv6 into Cisco IOS software, we are enabling continued growth of the Internet and its expansion into new applications and capabilities in a way that maintains compatibility with existing Internet services." -- Stephen Deering, Cisco Fellow and lead designer of the protocol Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. Two years ago, in response to the exponential increase in demand for new IP addresses, the Internet Engineering Task Force finalized its revision on IP addressing, called IP Version 6 and key hardware vendors such as Cisco and major Internet Service Providers like AOL announced plans to migrate to IP Version 6. That is now happening. Cisco Systems began incorporating Internet Protocol version 6 (IPv6) in its Cisco IOS Software in June, 2001. Cisco is currently the only major networking vendor to deliver IPv6 across multiple platforms. This book provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network.

Interconnection Networks

  • 1st Edition
  • July 29, 2002
  • Jose Duato + 2 more
  • English
  • Hardback
    9 7 8 - 1 - 5 5 8 6 0 - 8 5 2 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 0 8 9 9 - 3
The performance of most digital systems today is limited by their communication or interconnection, not by their logic or memory. As designers strive to make more efficient use of scarce interconnection bandwidth, interconnection networks are emerging as a nearly universal solution to the system-level communication problems for modern digital systems. Interconnection networks have become pervasive in their traditional application as processor-memory and processor-processor interconnect. Point-to-point interconnection networks have replaced buses in an ever widening range of applications that include on-chip interconnect, switches and routers, and I/O systems. In this book, the authors present in a structured way the basic underlying concepts of most interconnection networks and provide representative solutions that have been implemented in the industry or proposed in the research literature.

Data Networks

  • 1st Edition
  • June 18, 2002
  • Tony Kenyon
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 0 3 6 6 - 0
Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for day-to-day problems facing network designers and IT managers. In this book, you will find optimization advice from an experienced practitioner that you can put to work in your own system.As security and network performance become more and more critical to a company's success, the system administrator's job becomes even more difficult. Use the principles, tips, and techniques Kenyon offers here to enhance and protect the flow of data within your enterprise.

Managing Cisco Network Security

  • 2nd Edition
  • May 29, 2002
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 0 5 - 7
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

Disappearing Cryptography

  • 2nd Edition
  • April 29, 2002
  • Peter Wayner
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 0 4 6 5 - 0
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.

Biz Talk Server 2000 Developer's Guide

  • 1st Edition
  • March 6, 2002
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 1 1 - 7
The BizTalk 2000 Developer's Guide is written for developers who are responsible for installing, configuring and deploying the BizTalk Server in their organizations IT infrastructure. The opening chapters of the book discuss the benefits of seamless business-to-business application integration, summarize the features and enhancements of BizTalk Server 2000, and offer an introduction to XML - the driving force behind BizTalk. The next chapters explore the multiple tools that are incorporated into BizTalk that will transform the way in which information is created, transmitted and maintained in the server environment. Other chapters include complete coverage of the security considerations for BizTalk, and an examination of the various third-party plug-ins for enhancing BizTalk Server 2000.

TCP/IP Sockets in C

  • 1st Edition
  • February 13, 2002
  • Michael J. Donahoo + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 1 8 4 7 - 3
For example code from the text, Winsock adaptations of text code, sample programming exercises and more,click on the grey "COMPANION SITE" button to the right. Note: This title was formerly known as Pocket Guide to TCP/IP Socket Programming in C, ISBN 1-55860-686-6.TCP/IP Sockets in C: Practical Guide for Programmers is a quick and affordable way to gain the knowledge and skills you need to develop sophisticated and powerful networked-based programs using sockets. Written by two experienced networking instructors, this book provides a series of examples that demonstrate basic sockets techniques for clients and servers. Using plenty of real-world examples, this book is a complete beginner's guide to socket programming and a springboard to more advanced networking topics, including multimedia protocols.

High Performance Data Network Design

  • 1st Edition
  • January 8, 2002
  • Tony Kenyon
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 1 4 5 - 5
High-Performance Data Network Design contains comprehensive coverage of network design, performance, and availability. Tony Kenyon provides the tools to solve medium- to large-scale data network design problems from the ground up. He lays out a practical and systematic approach that integrates network planning, research, design, and deployment, using state-of-the-art techniques in performance analysis, cost analysis, simulation, and topology modeling.The proliferation and complexity of data networks today is challenging our ability to design and manage them effectively. A new generation of Internet, e-commerce, and multimedia applications has changed traditional assumptions on traffic dynamics, and demands tight quality of service and security guarantees. These issues, combined with the economics of moving large traffic volumes across international backbones, mean that the demands placed on network designers, planners, and managers are now greater than ever before. High-Performance Data Network Design is a "must have" for anyone seriously involved in designing data networks. Together with the companion volume, Data Networks: Routing, Security, and Performance Optimization, this book gives readers the guidance they need to plan, implement, and optimize their enterprise infrastructure.