Skip to main content

Books in Computer communication networks

51-60 of 161 results in All results

Introduction to Cyber-Warfare

  • 1st Edition
  • May 16, 2013
  • Paulo Shakarian + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 7 8 1 4 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 9 2 6 - 7
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.

The Wireshark Field Guide

  • 1st Edition
  • May 14, 2013
  • Robert Shimonski
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 0 4 1 3 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 4 9 6 - 9
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.

Mastering Cloud Computing

  • 1st Edition
  • April 5, 2013
  • Rajkumar Buyya + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 4 5 4 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 9 5 3 9 - 7
Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout.

Windows 2012 Server Network Security

  • 1st Edition
  • March 19, 2013
  • Derrick Rountree
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 5 8 - 3
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 6 5 - 1
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. Windows 2012 Server Network Security provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.

Federal Cloud Computing

  • 1st Edition
  • December 31, 2012
  • Matthew Metheny
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 7 3 9 - 8
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.

Connected Computing Environment

  • 1st Edition
  • Volume 90
  • December 2, 2012
  • Suyel Namasudra
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 8 1 1 1 - 6
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field.

Advanced Persistent Threat

  • 1st Edition
  • November 13, 2012
  • Eric Cole
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 4 9 - 1
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 5 5 - 2
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.

The Real MCTS/MCITP Exam 70-646 Prep Kit

  • 1st Edition
  • August 31, 2011
  • Anthony Piltzecker
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 8 7 9 1 4 - 7
This exam is designed to validate skills as a Windows Server 2008 Server Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. A MCITP Server Administrator is responsible for the operations and day-to-day management of an infrastructure of servers for an enterprise organization. Server administrators manage the infrastructure, web, and IT application servers, and use scripts to accomplish tasks on a regular basis. They conduct most server management tasks remotely by using Terminal Server or administration tools installed on their local workstation. MCITP Server Administrators also support engineering projects, and are responsible for server builds and configuration.

The Real MCTS/MCITP Exam 70-647 Prep Kit

  • 1st Edition
  • August 31, 2011
  • Anthony Piltzecker
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 8 7 9 1 3 - 0
This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. A MCITP Enterprise Administrator is responsible for the overall IT environment and architecture, and translates business goals into technology decisions and designs mid-range to long-term strategies. The enterprise administrator is also responsible for infrastructure design and global configuration changes.

Industrial Network Security

  • 1st Edition
  • August 15, 2011
  • Eric D. Knapp + 1 more
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 4 6 - 9
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.