Skip to main content

Books in Computer systems organization

41-50 of 263 results in All results

Network Performance and Security

  • 1st Edition
  • March 9, 2016
  • Chris Chapman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 5 8 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 0 1 - 3
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory.   The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.   Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.

Computer Organization and Design ARM Edition

  • 1st Edition
  • March 2, 2016
  • David A. Patterson + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 7 3 3 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 8 3 5 - 4
The new ARM Edition of Computer Organization and Design features a subset of the ARMv8-A architecture, which is used to present the fundamentals of hardware technologies, assembly language, computer arithmetic, pipelining, memory hierarchies, and I/O. With the post-PC era now upon us, Computer Organization and Design moves forward to explore this generational change with examples, exercises, and material highlighting the emergence of mobile computing and the Cloud. Updated content featuring tablet computers, Cloud infrastructure, and the ARM (mobile computing devices) and x86 (cloud computing) architectures is included. An online companion Web site provides links to a free version of the DS-5 Community Edition (a free professional quality tool chain developed by ARM), as well as additional advanced content for further study, appendices, glossary, references, and recommended reading.

Advances in Computers

  • 1st Edition
  • Volume 101
  • February 23, 2016
  • Atif Memon
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 5 1 5 8 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 6 9 - 6
Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Energy Efficiency in Data Centers and Clouds

  • 1st Edition
  • Volume 100
  • January 26, 2016
  • Suyel Namasudra + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 4 7 7 8 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 7 3 - 3
Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Meeting People via WiFi and Bluetooth

  • 1st Edition
  • December 9, 2015
  • Henry Dalziel + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 7 2 1 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 0 8 - 5
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

Practical Deployment of Cisco Identity Services Engine (ISE)

  • 1st Edition
  • November 12, 2015
  • Andy Richter + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 4 - 6
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

Internet Congestion Control

  • 1st Edition
  • August 17, 2015
  • Subir Varma
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 5 8 3 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 0 0 - 6
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing. Internet Congestion Control provides practicing network engineers and researchers with a comprehensive and accessible coverage of analytical models of congestion control algorithms, and gives readers everything needed to understand the latest developments and research in this area.

Advances in Computers

  • 1st Edition
  • Volume 98
  • June 17, 2015
  • Suyel Namasudra
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 2 1 3 2 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 4 0 - 2
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.

Python Passive Network Mapping

  • 1st Edition
  • June 10, 2015
  • Chet Hosmer
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 2 1 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 4 2 - 4
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

Modeling and Simulation of Computer Networks and Systems

  • 1st Edition
  • April 21, 2015
  • Faouzi Zarai + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 8 8 7 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 1 5 8 - 4
Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems. It focuses on the theories, tools, applications and uses of modeling and simulation in order to effectively optimize networks. It describes methodologies for modeling and simulation of new generations of wireless and mobiles networks and cloud and grid computing systems. Drawing upon years of practical experience and using numerous examples and illustrative applications recognized experts in both academia and industry, discuss: Important and emerging topics in computer networks and systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks Methodologies, strategies and tools, and strategies needed to build computer networks and systems modeling and simulation from the bottom up Different network performance metrics including, mobility, congestion, quality of service, security and more... Modeling and Simulation of Computer Networks and Systems is a must have resource for network architects, engineers and researchers who want to gain insight into optimizing network performance through the use of modeling and simulation.