Skip to main content

Books in Computer communication networks

41-50 of 161 results in All results

Service Orchestration as Organization

  • 1st Edition
  • August 12, 2014
  • Malinda Kapuruge + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 9 3 8 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 0 9 7 - 6
Service orchestration techniques combine the benefits of Service Oriented Architecture (SOA) and Business Process Management (BPM) to compose and coordinate distributed software services. On the other hand, Software-as-a-Service (SaaS) is gaining popularity as a software delivery model through cloud platforms due to the many benefits to software vendors, as well as their customers. Multi-tenancy, which refers to the sharing of a single application instance across multiple customers or user groups (called tenants), is an essential characteristic of the SaaS model. Written in an easy to follow style with discussions supported by real-world examples, Service Orchestration as Organization introduces a novel approach with associated language, framework, and tool support to show how service orchestration techniques can be used to engineer and deploy SaaS applications.

Data Communication Systems and Their Performance

  • 1st Edition
  • May 23, 2014
  • G. Pujolle + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 8 4 1 - 2
The research papers in this volume describe recent, original developments in techniques, tools and applications in the area of communication system performance. Involved in the project are researchers from the world's leading universities, research institutes and companies.

Social Engineering Penetration Testing

  • 1st Edition
  • April 11, 2014
  • Gavin Watson + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 1 2 4 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 1 8 2 - 8
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.

Collaboration with Cloud Computing

  • 1st Edition
  • April 7, 2014
  • Ric Messier
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 0 4 0 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 2 3 - 7
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network

Applied Network Security Monitoring

  • 1st Edition
  • November 26, 2013
  • Chris Sanders + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 2 0 8 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 2 1 6 - 6
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.

Enterprise Applications Administration

  • 1st Edition
  • November 25, 2013
  • Jeremy Faircloth
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 7 7 7 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 8 8 7 - 1
Enterprise Applications Administration prepares you for the full breadth of work associated with administering large enterprise applications. This book provides essential information on tasks such as operating systems administration, network design, system architecture, project planning, working within a team, protecting the network, and how to keep applications up and running. The book effectively bridges the gap between what is taught in the technology-specific literature and the real world of enterprise application administrators.

The Fundamental Role of Teletraffic in the Evolution of Telecommunications Networks

  • 1st Edition
  • October 22, 2013
  • J. Labetoulle + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 1 8 - 6
The International Teletraffic Congress (ITC) is a recognized international organization taking part in the work of the International Telecommunications Union. The congress traditionally deals with the development of teletraffic theory and its applications to the design, planning and operation of telecommunication systems, networks and services. The contents of ITC 14 illustrate the important role of teletraffic in the current period of rapid evolution of telecommunication networks. A large number of papers address the teletraffic issues behind developments in broadband communications and ATM technology. The extension of possiblities for user mobility and personal communications together with the generalization of common channnel signalling and the provision of new intelligent network services are further extremely significant developments whose teletraffic implications are explored in a number of contributions. ITC 14 also addresses traditional teletraffic subjects, proposing enhancements to traffic engineering practices for existing circuit and packet switched telecommunications networks and making valuable original contributions to the fundamental mathematical tools on which teletraffic theory is based. The contents of these Proceedings accurately reflect the extremely wide scope of the ITC, extending from basic mathematical theory to day-to-day traffic engineering practices, and constitute the state of the art in 1994 of one of the fundamental telecommunications sciences.

Network Convergence

  • 1st Edition
  • September 28, 2013
  • Vinod Joseph + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 9 7 8 7 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 3 9 7 8 8 1 - 3
Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments. This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture. If you're a network designer or architect, a technical sales professional, or if you're pursuing technical certifications, you will benefit from Network Convergence's fundamental information on this rapidly evolving technology.

The Basics of Cloud Computing

  • 1st Edition
  • September 3, 2013
  • Derrick Rountree + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 5 9 3 2 - 0
As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn’t a part of their day-to-day responsibility. Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud. The book will be presented as an introduction to the cloud, and reference will be made in the introduction to other Syngress cloud titles for readers who want to delve more deeply into the topic. This book gives readers a conceptual understanding and a framework for moving forward with cloud computing, as opposed to competing and related titles, which seek to be comprehensive guides to the cloud.

Professional Penetration Testing

  • 2nd Edition
  • June 27, 2013
  • Thomas Wilhelm
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 3 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 6 1 8 - 4
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web.