0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (870)
  • R500+ (13,582)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

3rd International Winter School and Conference on Network Science - NetSci-X 2017 (Hardcover, 1st ed. 2017): Erez Shmueli,... 3rd International Winter School and Conference on Network Science - NetSci-X 2017 (Hardcover, 1st ed. 2017)
Erez Shmueli, Baruch Barzel, Rami Puzis
R2,945 R1,773 Discovery Miles 17 730 Save R1,172 (40%) Ships in 10 - 15 working days

This book contains original research chapters related to the interdisciplinary field of complex networks spanning biological and environmental networks, social, technological, and economic networks. Many natural phenomena can be modeled as networks where nodes are the primitive compounds and links represent their interactions, similarities, or distances of sorts. Complex networks have an enormous impact on research in various fields like biology, social sciences, engineering, and cyber-security to name a few. The topology of a network often encompasses important information on the functionality and dynamics of the system or the phenomenon it represents. Network science is an emerging interdisciplinary discipline that provides tools and insights to researchers in a variety of domains. NetSci-X is the central winter conference within the field and brings together leading researchers and innovators to connect, meet, and establish interdisciplinary channels for collaboration. It is the largest and best known event in the area of network science. This text demonstrates how ideas formulated by authors with different backgrounds are transformed into models, methods, and algorithms that are used to study complex systems across different domains and will appeal to researchers and students within in the field.

Network Science and Cybersecurity (Hardcover, 2014 ed.): Robinson E. Pino Network Science and Cybersecurity (Hardcover, 2014 ed.)
Robinson E. Pino
R4,203 R1,946 Discovery Miles 19 460 Save R2,257 (54%) Ships in 10 - 15 working days

"Network Science and Cybersecurity" introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .

Cloud Computing for Geospatial Big Data Analytics - Intelligent Edge, Fog and Mist Computing (Hardcover, 1st ed. 2019): Himansu... Cloud Computing for Geospatial Big Data Analytics - Intelligent Edge, Fog and Mist Computing (Hardcover, 1st ed. 2019)
Himansu Das, Rabindra K. Barik, Harishchandra Dubey, Diptendu Sinha Roy
R4,721 Discovery Miles 47 210 Ships in 18 - 22 working days

This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data. It solves a number of problems of cloud computing and big data, such as scheduling, security issues using different techniques, which researchers from industry and academia have been attempting to solve in virtual environments. Some of these problems are of an intractable nature and so efficient technologies like fog, edge and mist computing play an important role in addressing these issues. By exploring emerging advances in cloud computing and big data analytics and their engineering applications, the book enables researchers to understand the mechanisms needed to implement cloud, edge, fog, and mist computing in their own endeavours, and motivates them to examine their own research findings and developments.

Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback): Deborah Gonzalez Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback)
Deborah Gonzalez
R813 Discovery Miles 8 130 Ships in 10 - 15 working days

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.

Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems (Hardcover, 1st ed. 2018): Moamar... Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems (Hardcover, 1st ed. 2018)
Moamar Sayed-Mouchaweh
R2,693 Discovery Miles 26 930 Ships in 18 - 22 working days

Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core. The interaction between both physical and cyber components requires tools allowing analyzing and modeling both the discrete and continuous dynamics. Therefore, many CPS can be modeled as hybrid dynamic systems in order to take into account both discrete and continuous behaviors as well as the interactions between them. Guaranteeing the security and safety of CPS is a challenging task because of the inherent interconnected and heterogeneous combination of behaviors (cyber/physical, discrete/continuous) in these systems. This book presents recent and advanced approaches and tech-niques that address the complex problem of analyzing the diagnosability property of cyber physical systems and ensuring their security and safety against faults and attacks. The CPS are modeled as hybrid dynamic systems using different model-based and data-driven approaches in different application domains (electric transmission networks, wireless communication networks, intrusions in industrial control systems, intrusions in production systems, wind farms etc.). These approaches handle the problem of ensuring the security of CPS in presence of attacks and verifying their diagnosability in presence of different kinds of uncertainty (uncertainty related to the event occurrences, to their order of occurrence, to their value etc.).

Hacking and Penetration Testing with Low Power Devices (Paperback): Philip Polstra Hacking and Penetration Testing with Low Power Devices (Paperback)
Philip Polstra
R1,141 Discovery Miles 11 410 Ships in 10 - 15 working days

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!

Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.): Jan... Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.)
Jan Schaffner
R2,953 R1,782 Discovery Miles 17 820 Save R1,171 (40%) Ships in 10 - 15 working days

With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.

Service Orchestration as Organization - Building Multi-Tenant Service Applications in the Cloud (Paperback): Malinda Kapuruge,... Service Orchestration as Organization - Building Multi-Tenant Service Applications in the Cloud (Paperback)
Malinda Kapuruge, Jun Han, Alan Colman
R1,309 Discovery Miles 13 090 Ships in 10 - 15 working days

Service orchestration techniques combine the benefits of Service Oriented Architecture (SOA) and Business Process Management (BPM) to compose and coordinate distributed software services. On the other hand, Software-as-a-Service (SaaS) is gaining popularity as a software delivery model through cloud platforms due to the many benefits to software vendors, as well as their customers. Multi-tenancy, which refers to the sharing of a single application instance across multiple customers or user groups (called tenants), is an essential characteristic of the SaaS model. Written in an easy to follow style with discussions supported by real-world examples, Service Orchestration as Organization introduces a novel approach with associated language, framework, and tool support to show how service orchestration techniques can be used to engineer and deploy SaaS applications.

User-Centred Engineering - Creating Products for Humans (Hardcover, 2014 ed.): Michael Richter, Markus Fluckiger User-Centred Engineering - Creating Products for Humans (Hardcover, 2014 ed.)
Michael Richter, Markus Fluckiger
R1,782 Discovery Miles 17 820 Ships in 10 - 15 working days

A new product can be easy or difficult to use, it can be efficient or cumbersome, engaging or dispiriting, it can support the way we work and think - or not. What options are available for systematically addressing such parameters and provide users with an appropriate functionality, usability and experience? In the last decades, several fields have evolved that encompass a user-centred approach to create better products for the people who use them. This book provides a comprehensible introduction to the subject. It is aimed first and foremost at people involved in software and product development - product managers, project managers, consultants and analysts, who face the major challenge of developing highly useful and usable products. Topics include: The most important user-centred techniques and their alignment in the development process Planning examples of user-centred activities for projects User-oriented approaches for organisations Real-life case studies Checklists, tips and a lot of background information provide help for practitioners

Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 2 (Hardcover): Information Reso... Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 2 (Hardcover)
Information Reso Management Association
R9,767 Discovery Miles 97 670 Ships in 18 - 22 working days
Antenna Fundamentals for Legacy Mobile Applications and Beyond (Hardcover, 1st ed. 2018): Issa Elfergani, Abubakar Sadiq... Antenna Fundamentals for Legacy Mobile Applications and Beyond (Hardcover, 1st ed. 2018)
Issa Elfergani, Abubakar Sadiq Hussaini, Jonathan Rodriguez, Raed Abd-Alhameed
R4,524 R3,453 Discovery Miles 34 530 Save R1,071 (24%) Ships in 10 - 15 working days

This book highlights technology trends and challenges that trace the evolution of antenna design, starting from 3rd generation phones and moving towards the latest release of LTE-A. The authors explore how the simple monopole and whip antenna from the GSM years have evolved towards what we have today, an antenna design that is compact, multi-band in nature and caters to multiple elements on the same patch to provide high throughput connectivity. The scope of the book targets a broad range of subjects, including the microstrip antenna, PIFA antenna, and the monopole antenna to be used for different applications over three different mobile generations. Beyond that, the authors take a step into the future and look at antenna requirements for 5G communications, which already has the 5G drive in place with prominent scenarios and use-cases emerging. They examine these, and put in place the challenges that lie ahead for antenna design, particularly in mm-Wave design. The book provides a reference for practicing engineers and under/post graduate students working in this field.

Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback): T Lammle Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback)
T Lammle
R2,158 R1,795 Discovery Miles 17 950 Save R363 (17%) Ships in 18 - 22 working days

A two-volume set to help you prepare for success on the NEW Cisco CCNA Certification exam. Get certified and advance your technical career. To earn a Cisco Certified Network Associate (CCNA) certification, you only need to take one exam, which will validate your knowledge and skills related to everything from networking to automation. This inclusive, two-book set provides what you need to know to succeed on the new CCNA exam. The set includes Understanding Cisco Networking Technologies: Volume 1 and the CCNA Certification Study Guide: Volume 2. Understanding Cisco Networking Technologies provides comprehensive information and foundational knowledge about core Cisco technologies, helping you implement and administer Cisco solutions. The CCNA Certification Study Guide prepares you for the new CCNA certification Exam 200-301, which assesses your abilities related to network fundamentals. Both books cover a range of topics so you can get ready for the exam and apply your technical knowledge. Prepare for testing on network and security fundamentals Review network access concepts Solidify your knowledge related to IP connectivity and services Assess your automation and programmability skills Written by a Cisco expert, Todd Lammle, this set helps you master the concepts you need to succeed as a networking administrator. It also connects you to online interactive learning tools, including sample questions, a pre-assessment, practice exam, flashcards, and a glossary. If you want to earn the new CCNA certification and keep moving forward in your IT career, this book and study guide are for you.

Security in Smart Cities: Models, Applications, and Challenges (Hardcover, 1st ed. 2019): Aboul Ella Hassanien, Mohamed... Security in Smart Cities: Models, Applications, and Challenges (Hardcover, 1st ed. 2019)
Aboul Ella Hassanien, Mohamed Elhoseny, Syed Hassan Ahmed, Amit Kumar Singh
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications.

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R892 R810 Discovery Miles 8 100 Save R82 (9%) Ships in 18 - 22 working days
Elastic Optical Networks - Architectures, Technologies, and Control (Hardcover, 1st ed. 2016): Victor Lopez, Luis Velasco Elastic Optical Networks - Architectures, Technologies, and Control (Hardcover, 1st ed. 2016)
Victor Lopez, Luis Velasco
R4,056 Discovery Miles 40 560 Ships in 10 - 15 working days

This book presents advances in the field of optical networks - specifically on research and applications in elastic optical networks (EON). The material reflects the authors' extensive research and industrial activities and includes contributions from preeminent researchers and practitioners in optical networking. The authors discuss the new research and applications that address the issue of increased bandwidth demand due to disruptive, high bandwidth applications, e.g., video and cloud applications. The book also discusses issues with traffic not only increasing but becoming much more dynamic, both in time and direction, and posits immediate, medium, and long-term solutions throughout the text. The book is intended to provide a reference for network architecture and planning, communication systems, and control and management approaches that are expected to steer the evolution of EONs.

Internet and Intranet Security (Hardcover, 2nd Revised edition): Rolf Oppliger Internet and Intranet Security (Hardcover, 2nd Revised edition)
Rolf Oppliger
R2,766 Discovery Miles 27 660 Ships in 18 - 22 working days

This extensively revised, new edition of the 1998 Artech House classic, "Internet and Intranet Security", offers professionals an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall technologies to help practitioners provide access control service, and discusses the cryptographic protocols used to provide today's communication security services. From TCP/IP networking and cryptographic fundamentals, to firewall technologies, communication security protocols, and public key infrastructures, this handy reference offers practical guidance in utilizing cutting-edge technologies to secure various applications in the field of e-commerce and e-business. The book explores the rationale behind the security technologies that have been proposed and deployed on the Internet, and shows how to implement security mechanisms and corresponding protocol specifications.

Next Generation Wireless LAN (Hardcover): Timothy Kolaya Next Generation Wireless LAN (Hardcover)
Timothy Kolaya
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days
Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition): Thomas Wilhelm Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition)
Thomas Wilhelm
R1,680 Discovery Miles 16 800 Ships in 10 - 15 working days

"Professional Penetration Testing "walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.

Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

All disc-based content for this title is now available on the Web.

Find out how to turn hacking and pen testing skills into a professional career

Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers

Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business

Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

Computer and Information Science (Hardcover, 1st ed. 2018): Roger Lee Computer and Information Science (Hardcover, 1st ed. 2018)
Roger Lee
R2,685 Discovery Miles 26 850 Ships in 18 - 22 working days

This book presents the edited proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), which was held on May 24-26, 2017 in Wuhan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science, share their experiences and exchange new ideas and information. The research results included relate to all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted to solve them. The work selected represents 17 of the most promising papers from the conference, written by authors who are certain to make further significant contributions to the field of computer and information science.

Cyber Warfare - A Reference Handbook (Hardcover): Paul J. Springer Cyber Warfare - A Reference Handbook (Hardcover)
Paul J. Springer
R1,742 Discovery Miles 17 420 Ships in 10 - 15 working days

This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat-from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This essential reference-the only of its kind to include an overview of other cyber warfare literature-emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers. Incorporates expertise from diverse viewpoints from the military, government agencies, industry, and academia Provides an informative timeline of key events in the development of cyber warfare capabilities Highlights the most prominent and effective cyber attacks in history as well as legal attempts to curb them

Development of Distributed Systems from Design to Application and Maintenance (Hardcover): Nik Bessis Development of Distributed Systems from Design to Application and Maintenance (Hardcover)
Nik Bessis
R4,955 Discovery Miles 49 550 Ships in 18 - 22 working days

With the continued research of distributed systems and technologies, the ability to have mixed technologies work together is crucial for the development of many types of society systems. Development of Distributed Systems from Design to Application and Maintenance is a collection of research on the strategies used in the design and development of distributed systems applications. Including research from traditional and emerging areas of applied distributed systems, this book covers theories, practices, and encourages future development for researchers, practitioners, and industry professionals as well as academicians.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback)
James Aweya
R5,034 Discovery Miles 50 340 Ships in 10 - 15 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover)
James Aweya
R12,552 Discovery Miles 125 520 Ships in 10 - 15 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Passive Optical Components for Optical Fiber Transmission (Hardcover): Norio Kashima Passive Optical Components for Optical Fiber Transmission (Hardcover)
Norio Kashima
R2,495 Discovery Miles 24 950 Ships in 18 - 22 working days

Focusing on connection technologies used for both single-mode and multimode fibers, this book explains multifiber connections such as mass-fusion splice and multifiber connectors. Information on fluoride glass fibers, doped fibers (EDFA), and components is included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
Trustworthy Autonomic Computing
Thaddeus Eze Hardcover R2,997 R2,712 Discovery Miles 27 120
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
Network Science - Analysis and…
CAR Pinheiro Hardcover R2,245 Discovery Miles 22 450

 

Partners