0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,137 Discovery Miles 11 370 Ships in 18 - 22 working days
Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover):... Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover)
Emmanuel Udoh, Frank Zhigang Wang
R6,632 Discovery Miles 66 320 Ships in 18 - 22 working days

Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.

Software Piracy Exposed (Paperback): Ron Honick Software Piracy Exposed (Paperback)
Ron Honick
R926 Discovery Miles 9 260 Ships in 10 - 15 working days

This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
* This book is about software piracy--what it is and how it's done
* This is the first book ever to describe how software is actually stolen and traded over the internet
* Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software

Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover): Chittaranjan Pradhan, Himansu Das,... Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover)
Chittaranjan Pradhan, Himansu Das, Bighnaraj Naik, Nilanjan Dey
R8,036 Discovery Miles 80 360 Ships in 18 - 22 working days

Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.

Security and Privacy for Big Data, Cloud Computing and Applications (Hardcover): Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo,... Security and Privacy for Big Data, Cloud Computing and Applications (Hardcover)
Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa
R3,338 R3,015 Discovery Miles 30 150 Save R323 (10%) Ships in 18 - 22 working days

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition): Marvin Zelkowitz Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition)
Marvin Zelkowitz
R3,908 Discovery Miles 39 080 Ships in 10 - 15 working days

This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.


Key features:


- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.
- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.

Funny Spam Emails (Paperback): Manley Peterson Funny Spam Emails (Paperback)
Manley Peterson
R295 Discovery Miles 2 950 Ships in 18 - 22 working days
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback): Fred Eady Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback)
Fred Eady
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices.
This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work.
The book thoroughly covers:
* Laptop wireless Ethernet card introduction and theory
*Introduction to CompactFlash-to-microcontroller interfacing
* Implementing the laptop wireless Ethernet card in an embedded environment
In addition, the book includes access to a companion website containing all of the code, schematics and programs necessary to implement embedded 802.11 wireless networking.
* Covers the hottest new embedded market area- wireless networking
* Shows designers how to save money and time by using microcontrollers in their embedded wireless designs instead of expensive, complex prefab boards
* Companion website accompanying book contains all the code, schematics and programs necessary to get started now

Network Security, Administration and Management - Advancing Technology and Practice (Hardcover): Dulal Chandra Kar, Mahbubur... Network Security, Administration and Management - Advancing Technology and Practice (Hardcover)
Dulal Chandra Kar, Mahbubur Rahman Syed
R4,953 Discovery Miles 49 530 Ships in 18 - 22 working days

The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes. Network Security, Administration and Management: Advancing Technology and Practice identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.

Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover): Jianwen "Wendy" Chen, Yan Zhang, Ron... Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover)
Jianwen "Wendy" Chen, Yan Zhang, Ron Gottschalk
R8,120 Discovery Miles 81 200 Ships in 18 - 22 working days

Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers.

Firewalls - Jumpstart for Network and Systems Administrators (Paperback): John R Vacca, Scott Ellis Firewalls - Jumpstart for Network and Systems Administrators (Paperback)
John R Vacca, Scott Ellis
R2,289 Discovery Miles 22 890 Ships in 10 - 15 working days

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
-Install and configure proxy-based and stateful-filtering firewalls
-Protect internal IP addresses with NAT and deploy a secure DNS architecture
-Develop an Internet/intranet security policy to protect your organization's systems and data
-Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,135 Discovery Miles 11 350 Ships in 10 - 15 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Swiped - How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves (Paperback, First Trade Paper... Swiped - How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves (Paperback, First Trade Paper Edition)
Adam Levin, Beau Friedlander; As told to Adam Levin, Beau Friedlander
R453 R422 Discovery Miles 4 220 Save R31 (7%) Ships in 18 - 22 working days

Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there - a lot of them - who treat stealing your identity as a full-time job.One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even purchases made in person are still logged by retailers like Target, who are famously vulnerable to hackers. Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage. The book is also organized around the different problems caused by identity theft: financial, criminal, medical, familial, etc., enabling readers to dip into the sections most relevant to them. Swiped is a practical, lively book that is essential to surviving the ever-changing world of online security. It is invaluable not only for preventing problems but helping cope when they arrive.

Computer Security Threats (Hardcover): Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernandez-Carames Computer Security Threats (Hardcover)
Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernandez-Carames
R3,060 Discovery Miles 30 600 Ships in 18 - 22 working days
Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover): Tolga Soyata Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover)
Tolga Soyata
R4,890 Discovery Miles 48 900 Ships in 18 - 22 working days

Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.

Network Security Attacks and Countermeasures (Hardcover): Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi Network Security Attacks and Countermeasures (Hardcover)
Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi
R5,129 Discovery Miles 51 290 Ships in 18 - 22 working days

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback): Jason Deckard Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback)
Jason Deckard
R839 Discovery Miles 8 390 Ships in 10 - 15 working days

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.
Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
*Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows.
*None of the current-best selling software security books focus exclusively on buffer overflows.
*This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover): Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover)
R4,731 Discovery Miles 47 310 Ships in 18 - 22 working days

Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.

Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover): Luisa Dall'acqua, Irene Maria... Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover)
Luisa Dall'acqua, Irene Maria Gironacci
R5,353 Discovery Miles 53 530 Ships in 18 - 22 working days

The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.

Multimedia Transcoding in Mobile and Wireless Networks (Hardcover): Ashraf M. a. Ahmad, Ismail Khalil Ibrahim Multimedia Transcoding in Mobile and Wireless Networks (Hardcover)
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim
R4,984 Discovery Miles 49 840 Ships in 18 - 22 working days

In recent years, the field of multimedia communication in wireless and mobile video has grown in attraction. As the number of networks, types of devices, and content representation formats increase, the need for multimedia transcoding in wireless and mobile networks intensifies in order to provide a seamless interaction between content creation and usage.""Multimedia Transcoding in Mobile and Wireless Networks"" addresses the transcoding of all multimedia elements, including video, audio and text, while addressing both practical and theoretical problems in the field. A must have resource for all stakeholders in mobile and wireless technologies, this book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research.

Internet of Things - Technology, Applications and Standardization (Hardcover): Jaydip Sen Internet of Things - Technology, Applications and Standardization (Hardcover)
Jaydip Sen
R3,061 Discovery Miles 30 610 Ships in 18 - 22 working days
China's e-Science Blue Book 2018 (Hardcover, 1st ed. 2020): Chinese Academy of Sciences, Cyberspace Administration Of... China's e-Science Blue Book 2018 (Hardcover, 1st ed. 2020)
Chinese Academy of Sciences, Cyberspace Administration Of China, Ministry of Education, Ministry Of Science And Technology, Chinese Academy of Social Sciences, …
R2,710 Discovery Miles 27 100 Ships in 18 - 22 working days

This book is jointly compiled by Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the People's Republic of China, Ministry of Science and Technology of the People's Republic of China, Chinese Academy of Social Sciences, National Natural Science Foundation of China and Chinese Academy of Agricultural Sciences. Over the past several years, Chinese scholars have contributed numerous research works on the development of Chinese scientific information and technology, and produced a range of outstanding achievements. Focusing on the main topic of e-Science, this book explores the forefront of science and technology around the globe, the major demands in China and the main fields in China's economic development. Furthermore, it reviews the major achievements and the typical cases in China's e-Science research. It provides a valuable reference source for future technological innovations and will introduce researchers and students in the area of e-Science to the latest results in China.

Cloud Computing Interview Questions You'll Most Likely Be Asked - Second Edition (Paperback, 2nd ed.): Vibrant Publishers Cloud Computing Interview Questions You'll Most Likely Be Asked - Second Edition (Paperback, 2nd ed.)
Vibrant Publishers
R865 Discovery Miles 8 650 Ships in 18 - 22 working days
Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R1,786 Discovery Miles 17 860 Ships in 10 - 15 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710

 

Partners