![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
In the ever-evolving telecommunication industry, technological improvements alone are not able to keep up with the significant growth of mobile broadband traffic. As such, new research on communications networks is necessary to keep up with rising demand. Convergence of Broadband, Broadcast, and Cellular Network Technologies addresses the problems of broadband, broadcast, and cellular coexistence, including the increasing number of advanced mobile users and their bandwidth demands. This book will serve as a link between academia and industry, serving students, researchers, and industry professionals.
Mobile IPv6 has become the key enabling technology for mobile
data and multimedia services and devices worldwide (i.e., cellular
systems, VoIP handovers over LAN, multi-access network handovers,
location privacy, enterprise mobile networking, etc.). This book covers the IPv6 host mobility protocol known as
"mobile IPv6" and begins with a basic description of mobile IPv6
and then details protocol specifications and data structures as
well as actual implementation. A sample configuration for a real
Mobile IPv6 operation is provided at the end of the book. Source
code will be downloadable form a companion website.
IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.
The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS). This book clearly explains all the hard-to-find information on
architecture, control and management. It serves as your guide at
every step of optical networking-- from planning to implementation
through ongoing maintenance. This book is your key to thoroughly
understanding practical optical networks. Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks. Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.
"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6
application programming intercfaces (API) extensions and
enhancements that have been made to the socket APIs. The book
begins with a brief overview of the API specifications along with
sample code usage. Then an explanation of the internal kernel
implementation that realizes the services offered by the API sets
is detailed. Also descriptions of several standard user libraries
that have been extended or created to support IPV6 are reviewed.
Includes various examples which illustrate how to write portable
applications that can run on either IPv4 or IPv6 networks. Succinct
treatment of everything you need know to get up and running with
IPv6 socket programming in one affordable volume.
Data services, especially those involving multimedia applications, can often be bandwidth intensive and accessed simultaneously by a large number of users. As such, efforts are being made to replace conventional network infrastructure, based on copper lines and coaxial cables, with fiber optic networks for improved performance. Optical Transmission and Networks for Next Generation Internet Traffic Highways provides a broader perspective of the parameters involved in the transmission of optical signals using optical soliton systems, OCDM-WDM, SCM-WDM and OTDM-WDM. This timely publication is ideal for use by technical managers, graduate students, engineers and technicians involved in the fiber-optics industry, and scientists working in the field of optical communications.
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities.
The increasing reliance upon networking and mobile networking devices in the modern world demands constant improvement of network Quality of Service (QoS). Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication explores the interrelated natures of network control mechanisms and QoS and offers fundamental knowledge on the subject, describing the significance of network management and the integration of knowledge to demonstrate how network management is related to QoS in real applications. Engaging and innovative, this book provides practical solutions that integrate network management and QoS strategies for real-world application.
Education and research in the field of electronic commerce technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Electronic Commerce Technologies: Contemporary Applications supplements course instruction and student research with quality articles focused on key issues concerning the technologies and applications of electronic commerce. Containing over 30 chapters from authors across the globe, these selected readings in areas such as e-marketing, IT business, and mobile commerce depict the most relevant and important areas of classroom discussion within the categories of fundamental concepts and theories; development and design methodologies; tools and technologies; application and utilization; critical issues; and emerging trends.
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.
"Windows Server 2012 Security from End to Edge and Beyond" shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test
every subject in a predefined test lab environment. This, combined
with conceptual and deployment guidance, enables you to understand
the technologies and move from lab to production faster than ever
before. Critical material is also presented in key concepts and
scenario-based approaches to evaluation, planning, deployment, and
management. Videos illustrating the functionality in the Test Lab
can be downloaded from the authors blog http:
//blogs.technet.com.b.security_talk/. Each chapter wraps up with a
bullet list summary of key concepts discussed in the chapter.
Radio-frequency (RF) integrated circuits in CMOS technology are gaining increasing popularity in the commercial world, and CMOS technology has become the dominant technology for applications such as GPS receivers, GSM cellular transceivers, wireless LAN, and wireless short-range personal area networks based on IEEE 802.15.1 (Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the increasing interest in wireless technologies and the widespread of wireless communications has prompted an ever increasing demand for radio frequency transceivers. Wireless Radio-Frequency Standards and System Design: Advanced Techniques provides perspectives on radio-frequency circuit and systems design, covering recent topics and developments in the RF area. Exploring topics such as LNA linearization, behavioral modeling and co-simulation of analog and mixed-signal complex blocks for RF applications, integrated passive devices for RF-ICs and baseband design techniques and wireless standards, this is a comprehensive reference for students as well as practicing professionals.
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies. Containing over 30 chapters from authors across the globe, these selected readings in areas such as collaborative technologies, virtual teams, and wireless systems depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
Adoption of Bluetooth wireless technology has become ubiquitous in
the last few years. One of the biggest steps forward is the
standardization of Java APIs for Bluetooth wireless technology
(JABWT). The latest updates to this standard is explained in detail
in this book. The JABWT standard, defined by the JSR-82 Java
Specification Request, supports rapid development of Bluetooth
applications that are portable, secure, and highly-usable. Wireless
device manufacturers have responded overwhelmingly to the JABWT
specification by implementing JABWT applications in mobile phones
and other personal wireless communications products.
Today all companies, U.S. federal agencies, and non-profit
organizations have valuable data on their servers that needs to be
secured. One of the challenges for IT experts is learning how to
use new products in a time-efficient manner, so that new
implementations can go quickly and smoothly. Learning how to set up
sophisticated products is time-consuming, and can be confusing.
GFI's LANguard Network Security Scanner reports vulnerabilities so
that they can be mitigated before unauthorized intruders can wreck
havoc on your network. To take advantage of the best things that
GFI's LANguard Network Security Scanner has to offer, you'll want
to configure it on your network so that it captures key events and
alerts you to potential vulnerabilities before they are exploited.
Luiz Augusto de Carvalho - WANOPT Wide area network
Specialist "Telecommunications is usually responsible for a large percentage of the IT infrastructure costs, usually only surpassed by personnel. Therefore identifying savings, even small in terms of percentage in a large corporate network may mean hundreds of thousands of dollars per month." "The techniques described in this book already helped and continuous helping hundreds of organizations to save millions of dollars with their telecommunications infra-structures." Contents Presents the concepts of the WAN design algorithms Provides practical examples of algorithms and demonstrates how to deploy them Discusses cases where the techniques described were deployed with favorable results Discusses negotiating and managerial strategies Presents a practical guide about how to implement and manage a large WAN
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.
Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security.
This book provides a comprehensive examination of Internet QoS
theory, standards, vendor implementation and network deployment
from the practitioner's point of view, including extensive
discussion of related economic and regulatory issues. Written in a
technology-light way so that a variety of professionals and
researchers in the information and networking industries can easily
grasp the material. Includes case studies based on real-world
experiences from industry. |
You may like...
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd
Paperback
R2,283
Discovery Miles 22 830
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
|