Skip to main content

Books in Computer communication networks

    • Digital Evidence and Computer Crime

      • 3rd Edition
      • April 12, 2011
      • Eoghan Casey
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 3 2 8 9
      • Hardback
        9 7 8 0 1 2 3 7 4 2 6 8 1
      • eBook
        9 7 8 0 0 8 0 9 2 1 4 8 8
      Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks. This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks. New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides. This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).
    • TCP/IP Sockets in C

      • 2nd Edition
      • March 2, 2009
      • Michael J. Donahoo + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 7 4 5 4 0 8
      • eBook
        9 7 8 0 0 8 0 9 2 3 2 1 5
      TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies. If you program using Java, be sure to check out this book’s companion, TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition.
    • 3C Vision

      • 1st Edition
      • September 16, 2009
      • Virginio Cantoni + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 3 8 5 2 2 0 5
      • Paperback
        9 7 8 0 3 2 3 1 6 5 0 9 9
      • eBook
        9 7 8 0 1 2 3 8 5 2 2 1 2
      The exponential explosion of images and videos concerns everybody's common life, since this media is now present everywhere and in all human activities. Scientists, artists and engineers, in any field, need to be aware of the basic mechanisms that allow them to understand how images are essentially information carriers. Images bear a strong evocative power because their perception quickly brings into mind a number of related pictorial contents of past experiences and even of abstract concepts like pleasure, attraction or aversion.This book analyzes the visual hints, thanks to which images are generally interpreted, processed and exploited both by humans and computer programs.
    • Microsoft Exchange Server 2007 with SP1

      • 1st Edition
      • April 30, 2008
      • Tony Redmond
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 5 5 2
      • eBook
        9 7 8 0 0 8 0 5 6 0 1 6 8
      Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality. Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:*install enabling on Windows Server 2008 *IVp6 support*Unified Messaging inclusion*EMC enhancements*Client Access Improvements for Outlook Web Access and Activesync*New user interfaces for POP3 and IMAP4*System resource monitoring and message routing improvements*New features for the mailbox server role*.pst file data managment improvements*new high-availability features*optimizatio... for mobile access*and much more!
    • The Real MCTS/MCITP Exam 70-648 Prep Kit

      • 1st Edition
      • April 18, 2008
      • Brien Posey
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 3 6 2
      • eBook
        9 7 8 0 0 8 0 8 7 7 9 3 8
      This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
    • Technical, Commercial and Regulatory Challenges of QoS

      • 1st Edition
      • September 8, 2008
      • XiPeng Xiao
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 4 8 5 1
      • Hardback
        9 7 8 0 1 2 3 7 3 6 9 3 2
      • eBook
        9 7 8 0 0 8 0 9 2 0 3 1 3
      Technical, Commerical and Regulatory Challenges of QoS provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. Includes case studies based on real-world experiences from industry. The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices. The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and the overall benefits of an improved technical approach. Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions. This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model. This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures.
    • Next Generation SSH2 Implementation

      • 1st Edition
      • November 12, 2008
      • Dale Liu
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 8 3 6
      • eBook
        9 7 8 0 0 8 0 5 7 0 0 0 6
      New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA... SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
    • The Illustrated Network

      • 1st Edition
      • November 25, 2008
      • Walter Goralski
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 5 4 1 5
      • eBook
        9 7 8 0 0 8 0 9 2 3 2 2 2
      In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:Stevens Gora... Older operating systems (AIX,svr4,etc.) Newe... OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series)Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!)No IPSec IPSecNo multicast Multica... router security discussed Firewall routers detailedNo Web Full Web browser HTML considerationNo IPv6 IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols
    • Wireless Networking

      • 1st Edition
      • March 24, 2008
      • Anurag Kumar + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 2 5 4 4
      • Paperback
        9 7 8 0 3 2 3 2 8 1 1 1 9
      • eBook
        9 7 8 0 0 8 0 5 5 8 3 0 1
      Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous “WiFi” networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field.
    • The Real MCTS/MCITP Exam 70-649 Prep Kit

      • 1st Edition
      • April 23, 2008
      • Brien Posey
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 3 4 8
      • eBook
        9 7 8 0 0 8 0 8 7 7 9 1 4
      This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.