Skip to main content

Books in Computer systems organization

111-120 of 263 results in All results

The Illustrated Network

  • 1st Edition
  • November 25, 2008
  • Walter Goralski
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 5 4 1 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 3 2 2 - 2
In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:Stevens Goralski's Older operating systems (AIX,svr4,etc.) Newer OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series)Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!)No IPSec IPSecNo multicast MulticastNo router security discussed Firewall routers detailedNo Web Full Web browser HTML considerationNo IPv6 IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols

Computer Organization and Design

  • 4th Edition
  • November 17, 2008
  • David A. Patterson + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 2 8 1 - 2
Computer Organization and Design, Fourth Edition, provides a new focus on the revolutionary change taking place in industry today: the switch from uniprocessor to multicore microprocessors. This new emphasis on parallelism is supported by updates reflecting the newest technologies with examples highlighting the latest processor designs, benchmarking standards, languages and tools. As with previous editions, a MIPS processor is the core used to present the fundamentals of hardware technologies, assembly language, computer arithmetic, pipelining, memory hierarchies and I/O. Along with its increased coverage of parallelism, this new edition offers new content on Flash memory and virtual machines as well as a new and important appendix written by industry experts covering the emergence and importance of the modern GPU (graphics processing unit), the highly parallel, highly multithreaded multiprocessor optimized for visual computing. This book contains a new exercise paradigm that allows instructors to reconfigure the 600 exercises included in the book to generate new exercises and solutions of their own. The companion CD provides a toolkit of simulators and compilers along with tutorials for using them as well as advanced content for further study and a search utility for finding content on the CD and in the printed text. This text is designed for professional digital system designers, programmers, application developers, and system software developers as well as undergraduate students in Computer Science, Computer Engineering and Electrical Engineering courses in Computer Organization, Computer Design.

Next Generation SSH2 Implementation

  • 1st Edition
  • November 12, 2008
  • Dale Liu
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 3 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 0 0 0 - 6
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.

SAP Security Configuration and Deployment

  • 1st Edition
  • October 31, 2008
  • Joey Hirao
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 4 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 0 0 1 - 3
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security.

Technical, Commercial and Regulatory Challenges of QoS

  • 1st Edition
  • September 8, 2008
  • XiPeng Xiao
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 3 6 9 3 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 0 3 1 - 3
Technical, Commerical and Regulatory Challenges of QoS provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. Includes case studies based on real-world experiences from industry. The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices. The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and the overall benefits of an improved technical approach. Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions. This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model. This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures.

Designing Storage for Exchange 2007 SP1

  • 1st Edition
  • August 15, 2008
  • Pierre Bijaoui + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 0 0 3 - 8
Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange Server from a 32-bit application to the 64-bit world reduced the I/O footprint on the storage subsystem. This allows users to consider shared storage deployments or go the opposite way and focus on direct attached storage. Supporting large mailboxes is now possible, but how do you back up and recover the increased amount of data? Exchange Server 2007 Continuous Replication and new features in Windows Server 2008 Failover Clustering provides interesting possibilities for geographically dispersed deployments. This book explains these new built-in features of Exchange Server 2007 and compares them with application independent data replication solutions provided by high-end storage subsystems. It is critical to understand these key technologies to make the right decision which storage solution best fits your business needs. The authors share their experience from large scale deployments and depict configurations used during their projects.

Network Processors

  • 1st Edition
  • July 16, 2008
  • Ran Giladi
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 0 8 9 1 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 1 9 5 9 - 1
Network processors are the basic building blocks of today's high-speed, high-demand, quality-oriented communication networks. Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader through the requirements and the underlying theory of networks, network processing, and network processors. It covers implementation of network processors and intergrates EZchip Microcode Development Environment so that you can gain hands-on experience in writing high-speed networking applications. By the end of the book, the reader will be able to write and test applications on a simulated network processor.

Advances in Computers

  • 1st Edition
  • Volume 72
  • June 24, 2008
  • Marvin Zelkowitz
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 8 8 0 3 0 - 3
This is volume 72 of Advances in Computers, a series that began back in 1960 and is the oldest continuing series chronicling the ever-changing landscape of information technology. Each year three volumes are produced, which present approximately 20 chapters that describe the latest technology in the use of computers today. In this volume 72, we present the current status in the development of a new generation of high-performance computers. The computer today has become ubiquitous with millions of machines being sold (and discarded) annually. Powerful machines are produced for only a few hundred U.S. dollars, and one of the problems faced by vendors of these machines is that, due to the continuing adherence to Moore’s law, where the speed of such machines doubles about every 18 months, we typically have more than enough computer power for our needs for word processing, surfing the web, or playing video games. However, the same cannot be said for applications that require large powerful machines. Applications such as weather and climate prediction, fluid flow for designing new airplanes or automobiles, or nuclear plasma flow require as much computer power as we can provide, and even that is not enough. Today’s machines operate at the teraflop level (trillions of floating point operations per second) and this book describes research into the petaflop region (1,015 FLOPS). The six chapters provide an overview of current activities that will provide for the introduction of these machines in the years 2011 through 2015.

Embedded DSP Processor Design

  • 1st Edition
  • Volume 2
  • May 30, 2008
  • Dake Liu
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 1 2 3 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 9 8 7 - 1
This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience. Top-down and bottom-up design methodologies are presented, providing valuable guidance for both students and practicing design engineers. Coverage includes design of internal-external data types, application specific instruction sets, micro architectures, including designs for datapath and control path, as well as memory sub systems. Integration and verification of a DSP-ASIP processor are discussed and reinforced with extensive examples.