Skip to main content

Books in Computer communication networks

81-90 of 161 results in All results

Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress

  • 1st Edition
  • July 3, 2007
  • David E. Williams
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 3 9 3 - 1
Complete Coverage of Xen, Including Version 3.2Virtualization with Xen is the first book to demonstrate to readers how to install, administer, and maintain a virtual infrastructure based on XenSource’s latest release, Xen 3.2. It discusses best practices for setting up a Xen environment correctly the first time, maximizing the utilization of server assets while taking advantage of the fastest and most secure enterprise-grade paravirtualization architecture. It covers both basic and advanced topics, such as planning and installation, physical-to-virtual migrations, virtual machine provisioning, resource management, and monitoring and troubleshooting guests and Xen hosts.* Explore Xen’s Virtualization ModelFind a complete overview of the architecture model as well of all products: Xen 3.0 , Xen Express, XenServer, and Xen Enterprise.* Deploy XenUnderstand the system requirements, learn installation methods, and see how to install Xen on a free Linux distribution.* Master the Administrator ConsoleLearn how to use the command-line tools and the remote Java-based consoler that manages the configuration and operations of XenServer hosts and VMs.* Manage Xen with Third-Party ToolsUse products like openQRM, Enomalism, and Project ConVirt to manage the VMM.* Deploy a Virtual Machine in XenLearn about workload planning and installing modified guests, unmodified guests, and Windows guests.* Explore Advanced Xen ConceptsBuild a Xen Cluster, complete a XenVM migration, and discover XenVM backup and recovery solutions.* See the Future of VirtualizationSee the unofficial Xen road map and what virtual infrastructure holds for tomorrow’s data center.* See Other Virtualization Technologies and How They Compare with XenTake a look at the different types of server virtualization, other virtual machine software available, and how they compare with Xen.

Microsoft Exchange Server 2007: Tony Redmond's Guide to Successful Implementation

  • 1st Edition
  • May 29, 2007
  • Tony Redmond
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 8 9 8 - 2
Microsoft Exchange Server 2007 marks the biggest advancement in the history of the Exchange Product group. The completely re-engineered server system will change the face of how IT administrators approach Exchange. Tony Redmond, one of the world’s most acclaimed Exchange experts, offers insider insight from the very basics of the newly transformed architecture to understanding the nuances of the new and improved Microsoft Management Console (MMC) 3.0 and the two new administrative interfaces—the Exchange Management Console (EMC) and the Exchange Management Shell (EMS).

Secure Roaming in 802.11 Networks

  • 1st Edition
  • May 17, 2007
  • Paul Goransson + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 8 9 4 - 4
Secure Roaming in 802.11 Networks offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques. The book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. It helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we’re mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and can’t, in its "pure" form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. It reviews coverage of user authentication in 802.11, as well as roaming between 802.11 and other wireless technologies. It also discusses wireless technologies and application programming interfaces. This book will appeal to RF/wireless engineers and designers, computer/data network engineers, and graduate students.

Computer Networks

  • 4th Edition
  • April 16, 2007
  • Larry L. Peterson + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 6 7 - 4
Computer Networks, Fourth Edition, continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. This expanded and completely updated edition covers the why of network design, focusing not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems. It is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the text, who have actually designed some of them as well, and who are still actively designing the computer networks today. The book makes less use of computer code to explain protocols than earlier editions. Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers. Other new features are: increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features; the material is structured in such a way as to make it easier to teach top-down. Furthermore, the book outstrips the competitors in offering a more robust ancillary package for student and instructor support. The text is complemented with figures as well as links to networking resources on the Web and links to author-created materials on author-maintained Web site. Computer Networks, Fourth Edition, will be an invaluable resource for networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.

IPv6 Advanced Protocols Implementation

  • 1st Edition
  • April 6, 2007
  • Qing Li + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 0 4 7 9 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 9 3 0 - 8
IPv6 Advanced Protocols Implementation is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Specifically, this book engages the readers in advanced topics such as routing, multicasting, DNS, DHCPv6, mobility, and security. This two-volume series covers a wide spectrum of the IPv6 technology, help the readers establish solid and empirical understanding on IPv6 and the KAME reference implementation paralleled by none. Key Features: Extensive code listings with meticulous line-by-line explanation of rationale and use for KAME snapshot implementations on advanced IPv6 related protocols, including: Unicast and multicast routing and DNS client based on KAME snapshot dated April 2003, which are a base of more recent versions of BSD variants Mobile IPv6 based on KAME snapshot dated July 2004, a predecessor version of the "SHISA" implementation DHCPv6 based on KAME snapshot dated May 2005, a base of the WIDE-DHCPv6 implementation available at SourceForge today Numerous diagrams and illustrations help in visualizing the implementation In-depth discussion of the standards provides intrinsic understanding of the specifications An introduction to the IP security protocols along with the use of the racoon key exchange daemon Two CD-ROMs filled with the complete KAME IPv6 protocol stack and FreeBSD software

Deploying IP and MPLS QoS for Multiservice Networks

  • 1st Edition
  • March 9, 2007
  • John William Evans + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 0 5 4 9 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 8 6 8 - 4
QoS, short for “quality of service,” is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional.The authors have provided a comprehensive treatise on this subject. They have included topics such as traffic engineering, capacity planning, and admission control. This book provides real world case studies of QoS in multiservice networks. These case studies remove the mystery behind QoS by illustrating the how, what, and why of implementing QoS within networks. Readers will be able to learn from the successes and failures of these actual working designs and configurations.

Developing Practical Wireless Applications

  • 1st Edition
  • January 4, 2007
  • Dean A. Gratton
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 9 6 0 - 7
In a constant stream of new ideas, wireless technologies continue to emerge offering a range of capabilities, each affording simplicity and ease-of-use. Such diversity and choice should surely beg the question, “are manufacturers using the right technology for the right product?” Developing Practical Wireless Applications will explore this question and, in doing so, will illustrate many of the wireless technologies currently available whilst drawing upon their individual strengths and weaknesses. More specifically, the book will draw your attention to the diverse collection of standardized and proprietary solutions available to manufacturers. As developers and innovators your choices are not restricted to any norm and, as such, a standardized or proprietary solution may afford you greater benefits in realising any product roadmap. Developing Practical Wireless Applications will provide you with a comprehensive understanding of how each technology works, coupled with an exploration into overlapping, complementary and competing technologies. In establishing this foundation, we will explore wireless applications in their context and address their suitability. In contrast, the book also considers the practicality of a wireless world in an attempt to better understand our audience and specific demographic groups. Coupled with a richer understanding of our consumers, along with our technology make-up we can indeed target wireless products more effectively.

Microsoft Windows Security Fundamentals

  • 1st Edition
  • October 30, 2006
  • Jan De Clercq + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 1 8 8 - 2
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.

Configuring Microsoft Outlook 2003

  • 1st Edition
  • August 26, 2005
  • Sue Mosher + 3 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 6 4 6 - 1
One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.

Managing Microsoft's Remote Installation Services

  • 1st Edition
  • July 15, 2005
  • Soren Rasmussen + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 0 4 1 - 3
BRIEF DESCRIPTION OF CONTENT: The authors have been working with Remote Installation Services since its birth in 1999. We are really enthusiastic about working with it. From their experiences from very different customers with very different requirements to their Windows infrastructure environment, they have gained a tremendous deal of experience and in-depth knowledge with Remote Installation Services that other people can benefit from. This includes basic understanding, a lot of theory and best-practices, but also how you can stretch Remote Installation Services to really do what any system or network administrator would require. This information is essential for anyone wishing to implement Remote Installation Services and use the advanced features and tools it contains. There is much more than up grades, adding and deleting programs from a central administrator that can be done In addition it can save the cost adding a costly third party software package like Alteris to the enterprise network. This is the reason that the authors are now gathering all the experience and knowledge, and focusing on forming a single point of entry to everything you must know about Remote Installation Services in form of a book. Note based on my (TRS) and reviewers comments the book will be over 320 pages as authors ad numerous consulting client examples and illustrations UNIQUE FEATURE: Book is excellent companion to Windows and Exchange series and WMI books by Lissoir: Authors are top quality IBM Consultants