Skip to main content

Books in Computer communication networks

61-70 of 161 results in All results

Securing the Cloud

  • 1st Edition
  • April 21, 2011
  • Vic (J.R.) Winkler
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 5 9 2 - 9
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability, scalability, and in the case of security - resilience. Securing the Cloud explains how to make the move to the cloud, detailing the strengths and weaknesses of securing a company's information with different cloud approaches. It offers a clear and concise framework to secure a business' assets while making the most of this new technology.This book considers alternate approaches for securing a piece of the cloud, such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust. It discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery. It also describes the benefits of moving to the cloud - solving for limited availability of space, power, and storage.This book will appeal to network and security IT staff and management responsible for design, implementation and management of IT structures from admins to CSOs, CTOs, CIOs and CISOs.

Digital Evidence and Computer Crime

  • 3rd Edition
  • April 12, 2011
  • Eoghan Casey
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 2 6 8 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 1 4 8 - 8
Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks. This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks. New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides. This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).

Architecture of Network Systems

  • 1st Edition
  • January 12, 2011
  • Dimitrios Serpanos + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 4 9 4 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 2 8 2 - 9
Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more. Leading researchers Dimitrios Serpanos and Tilman Wolf develop architectures for all network sub-systems, bridging the gap between operation and VLSI.This book provides comprehensive coverage of the technical aspects of network systems, including system-on-chip technologies, embedded protocol processing and high-performance, and low-power design. It develops a functional approach to network system architecture based on the OSI reference model, which is useful for practitioners at every level. It also covers both fundamentals and the latest developments in network systems architecture, including network-on-chip, network processors, algorithms for lookup and classification, and network systems for the next-generation Internet.The book is recommended for practicing engineers designing the architecture of network systems and graduate students in computer engineering and computer science studying network system design.

IT Manager's Handbook

  • 2nd Edition
  • July 26, 2010
  • Bill Holtsnider + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 5 7 4 - 6
IT Manager's Handbook, Second Edition, provides essential information to help students understand the responsibilities of today’s IT Management professionals: not only planning network security and implementing disaster recovery plans, but also such vital tasks as creating budgets, administering compliance, and managing staff. In particular, the book discusses business practices that are most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendor. This updated version includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulatory compliance, and project management. Information is organized modularly so that instructors and students can delve directly into only the topics needed. Each chapter contains additional resources sections for books, articles, and websites relevant to that topic. It contains new material on key technology topics such as open source, outsourcing, offshoring, and handhelds, plus updated coverage of e-commerce, remote access, intranets, and LAN/WAN management.

The Real Citrix CCA Exam Preparation Kit

  • 1st Edition
  • April 16, 2009
  • Shawn Tooley
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 4 1 9 - 9
The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of general network expertise. The number of CCAs is estimated at between 65 and 70K, up from 45,000 in 2003. Citrix recently released a new version of its most popular product, XenApp (formerly Presentation Server). This new version is fully compatible with Windows Server 2008. To retain their CCA credential, all current CCAs will need to upgrade to the new software. This will be particularly important to those companies enrolled in Citrix partner programs, as current certification is a requirement of the program. When packaged with practice exams, this prep kit will offer an affordable, effective solution for CCA certification and re-certification.

TCP/IP Sockets in C

  • 2nd Edition
  • March 2, 2009
  • Michael J. Donahoo + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 5 4 0 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 3 2 1 - 5
TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies. If you program using Java, be sure to check out this book’s companion, TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition.

The Illustrated Network

  • 1st Edition
  • November 25, 2008
  • Walter Goralski
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 5 4 1 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 3 2 2 - 2
In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:Stevens Goralski's Older operating systems (AIX,svr4,etc.) Newer OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series)Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!)No IPSec IPSecNo multicast MulticastNo router security discussed Firewall routers detailedNo Web Full Web browser HTML considerationNo IPv6 IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols

Next Generation SSH2 Implementation

  • 1st Edition
  • November 12, 2008
  • Dale Liu
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 3 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 0 0 0 - 6
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.

Technical, Commercial and Regulatory Challenges of QoS

  • 1st Edition
  • September 8, 2008
  • XiPeng Xiao
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 3 6 9 3 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 0 3 1 - 3
Technical, Commerical and Regulatory Challenges of QoS provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. Includes case studies based on real-world experiences from industry. The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices. The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and the overall benefits of an improved technical approach. Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions. This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model. This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures.

Designing Storage for Exchange 2007 SP1

  • 1st Edition
  • August 15, 2008
  • Pierre Bijaoui + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 0 0 3 - 8
Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange Server from a 32-bit application to the 64-bit world reduced the I/O footprint on the storage subsystem. This allows users to consider shared storage deployments or go the opposite way and focus on direct attached storage. Supporting large mailboxes is now possible, but how do you back up and recover the increased amount of data? Exchange Server 2007 Continuous Replication and new features in Windows Server 2008 Failover Clustering provides interesting possibilities for geographically dispersed deployments. This book explains these new built-in features of Exchange Server 2007 and compares them with application independent data replication solutions provided by high-end storage subsystems. It is critical to understand these key technologies to make the right decision which storage solution best fits your business needs. The authors share their experience from large scale deployments and depict configurations used during their projects.