0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (870)
  • R500+ (13,575)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cloud Computing Patterns - Fundamentals to Design, Build, and Manage Cloud Applications (Hardcover, 2014 ed.): Christoph... Cloud Computing Patterns - Fundamentals to Design, Build, and Manage Cloud Applications (Hardcover, 2014 ed.)
Christoph Fehling, Frank Leymann, Ralph Retter, Walter Schupeck, Peter Arbitter
R6,408 Discovery Miles 64 080 Ships in 10 - 15 working days

The current work provides CIOs, software architects, project managers, developers, and cloud strategy initiatives with a set of architectural patterns that offer nuggets of advice on how to achieve common cloud computing-related goals. The "cloud computing patterns" capture knowledge and experience in an abstract format that is independent of concrete vendor products. Readers are provided with a toolbox to structure cloud computing strategies and design cloud application architectures. By using this book cloud-native applications can be implemented and best suited cloud vendors and tooling for individual usage scenarios can be selected. The "cloud computing patterns" offer a unique blend of academic knowledge and practical experience due to the mix of authors. Academic knowledge is brought in by Christoph Fehling and Professor Dr. Frank Leymann who work on cloud research at the University of Stuttgart. Practical experience in building cloud applications, selecting cloud vendors, and designing enterprise architecture as a cloud customer is brought in by Dr. Ralph Retter who works as an IT architect at T Systems, Walter Schupeck, who works as a Technology Manager in the field of Enterprise Architecture at Daimler AG, and Peter Arbitter, the former head of T Systems cloud architecture and IT portfolio team and now working for Microsoft.

"Voices on Cloud Computing Patterns"

Cloud computing is especially beneficial for large companies such as Daimler AG. Prerequisite is a thorough analysis of its impact on the existing applications and the IT architectures. During our collaborative research with the University of Stuttgart, we identified a vendor-neutral and structured approach to describe properties of cloud offerings and requirements on cloud environments. The resulting Cloud Computing Patterns have profoundly impacted our corporate IT strategy regarding the adoption of cloud computing. They help our architects, project managers and developers in the refinement of architectural guidelines and communicate requirements to our integration partners and software suppliers.

Dr. Michael Gorriz CIO Daimler AG

Ever since 2005 T-Systems has provided a flexible and reliable cloud platform with its Dynamic Services . Today these cloud services cover a huge variety of corporate applications, especially enterprise resource planning, business intelligence, video, voice communication, collaboration, messaging and mobility services. The book was written by senior cloud pioneers sharing their technology foresight combining essential information and practical experiences. This valuable compilation helps both practitioners and clients to really understand which new types of services are readily available, how they really work and importantly how to benefit from the cloud.

Dr. Marcus Hacke Senior Vice President, T-Systems International GmbH

This book provides a conceptual framework and very timely guidance for people and organizations building applications for the cloud. Patterns are a proven approach to building robust and sustainable applications and systems. The authors adapt and extend it to cloud computing, drawing on their own experience and deep contributions to the field. Each pattern includes an extensive discussion of the state of the art, with implementation considerations and practical examples that the reader can apply to their own projects.

By capturing our collective knowledge about building good cloud applications and by providing a format to integrate new insights, this book provides an important tool not just for individual practitioners and teams, but for the cloud computing community at large.

Kristof Kloeckner General Manager, Rational Software, IBMSoftware Group

"

Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016): Stefan Beissel Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016)
Stefan Beissel
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance between financial expenditures and risk mitigation. This is achieved by pursuing a multi-disciplinary approach that combines well-founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk-through for the complete lifecycle of cybersecurity investments. Insights into the economic aspect of the costs and benefits of cybersecurity are supplemented by established and innovative economic indicators. Readers will find practical tools and techniques to support reasonable decision making in cybersecurity investments. Further, they will be equipped to encourage a common understanding using economic aspects, and to provide cost transparency for the senior management.

Multi-Camera Networks - Principles and Applications (Hardcover): Hamid Aghajan, Andrea Cavallaro Multi-Camera Networks - Principles and Applications (Hardcover)
Hamid Aghajan, Andrea Cavallaro
R2,717 Discovery Miles 27 170 Ships in 10 - 15 working days

The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoringComprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applicationsPresents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware

This book is the definitive reference in multi-camera networks. It gives clear guidance on the conceptual and implementation issues involved in the design and operation of multi-camera networks, as well as presenting the state-of-the-art in hardware, algorithms and system development. The book is broad in scope, covering smart camera architectures, embedded processing, sensor fusion and middleware, calibration and topology, network-based detection and tracking, and applications in distributed and collaborative methods in camera networks. This book will be an ideal reference for university researchers, R&D engineers, computer engineers, and graduate students working in signal and video processing, computer vision, and sensor networks.

Hamid Aghajan is a Professor of Electrical Engineering (consulting) at Stanford University. His research is on multi-camera networks for smart environments with application to smart homes, assisted living and well being, meeting rooms, and avatar-based communication and social interactions. He is Editor-in-Chief of Journal of Ambient Intelligence and Smart Environments, and was general chair of ACM/IEEE ICDSC 2008.

Andrea Cavallaro is Reader (Associate Professor) at Queen Mary, University of London (QMUL). His research is on target tracking and audiovisual content analysis for advanced surveillance and multi-sensor systems. He serves as Associate Editor of the IEEE Signal Processing Magazine and the IEEE Trans. on Multimedia, and has been general chair of IEEE AVSS 2007, ACM/IEEE ICDSC 2009 and BMVC 2009.
The first book, by the leading experts, on this rapidly developing field with applications to security, smart homes, multimedia, and environmental monitoringComprehensive coverage of fundamentals, algorithms, design methodologies, system implementation issues, architectures, and applicationsPresents in detail the latest developments in multi-camera calibration, active and heterogeneous camera networks, multi-camera object and event detection, tracking, coding, smart camera architecture and middleware"

Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New): Dale Liu Cisco Router and Switch Forensics - Investigating and Analyzing Malicious Network Activity (Paperback, New)
Dale Liu
R1,300 Discovery Miles 13 000 Ships in 10 - 15 working days

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currently covers forensic analysis of Cisco network devices in any detail.
Cisco Router and Switch Forensics is the first book devoted to criminal attacks, incident response, data collection, and legal testimony on the market leader in network devices, including routers, switches, and wireless access points.
Why is this focus on network devices necessary? Because criminals are targeting networks, and network devices require a fundamentally different approach than the process taken with traditional forensics. By hacking a router, an attacker can bypass a network's firewalls, issue a denial of service (DoS) attack to disable the network, monitor and record all outgoing and incoming traffic, or redirect that communication anywhere they like. But capturing this criminal activity cannot be accomplished with the tools and techniques of traditional forensics. While forensic analysis of computers or other traditional media typically involves immediate shut-down of the target machine, creation of a duplicate, and analysis of static data, this process rarely recovers live system data. So, when an investigation focuses on live network activity, this traditional approach obviously fails. Investigators must recover data as it is transferred via the router or switch, because it is destroyed when the network device is powered down. In this case, following the traditional approach outlined in books on general computer forensics techniques is not only insufficient, but also essentially harmful to an investigation.
Jargon buster: A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). A router is a more sophisticated network device that joins multiple wired or wireless networks together.
* The only book devoted to forensic analysis of routers and switches, focusing on the operating system that runs the vast majority of network devices in the enterprise and on the Internet
* Outlines the fundamental differences between router forensics and traditional forensics, a critical distinction for responders in an investigation targeting network activity
* Details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony

Deploying QoS for Cisco IP and Next Generation Networks - The Definitive Guide (Hardcover): Vinod Joseph, Brett Chapman Deploying QoS for Cisco IP and Next Generation Networks - The Definitive Guide (Hardcover)
Vinod Joseph, Brett Chapman
R1,347 Discovery Miles 13 470 Ships in 10 - 15 working days

"Deploying QoS for IP Next Generation Networks: The Definitive Guide" provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference for businesses that plan to deploy a QoS framework for voice, video, mobility and data applications creating a converged infrastructure. It further provides detailed design and implementation details for various service deployments across the various Cisco platforms such as the CRS-1, 12000, 7600 & 7200 series routers that are widely deployed in most Carrier Networks.
The book covers architectural and implementation specific information plus recommendations for almost all the popular line cards across the various hardware platforms widely used in the market. It also addresses QoS architecture and deployment on the Cisco CRS-1 platform and is considered as a unique selling point of this book.
In short the books serve as an "On the Job Manual" which can also be used as a study guide for Cisco specialist certification programs (CCNA, CCIP, CCIE)
This book will includes detailed illustration and configurations. In addition, it provides detailed case studies along with platform specific tests and measurement results. A link to a detailed tutorial on QoS metrics and associated test results will be available at the book's companion website in order to ensure that the reader is able to understand QoS functionality from a deployment standpoint.
Covers the requirements and solutions in deploying QoS for voice, video, IPTV, mobility and data traffic classes (Quad-play networks), saving the reader time in searching for hardware specific QoS information, given the abundance of Cisco platforms and line cards.Presents real-life deployments by means of detailed case studies, allowing the reader to apply the same solutions to situations in the work place.Provides QoS architecture and implementation details on Cisco CRS-1, 12000, 7600, and 7200 routing platforms using Cisco IOS/IOS-XR software, aiding the reader in using these devices and preparing for Cisco specialist certification.

EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed.... EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed. 2019)
Angelica Reyes-Munoz, Ping Zheng, David Crawford, Victor Callaghan
R4,068 Discovery Miles 40 680 Ships in 18 - 22 working days

This book presents the proceedings of the 1st EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE 2017), which took place at Canterbury Christ Church University on September 11-12, 2017. The central theme of the conference is creativity and innovation, especially in relation to technology, business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.

Tools and Algorithms for the Construction and Analysis of Systems (Hardcover): Bernhard Steffen, Fabrice Kordon, Marieke Huisman Tools and Algorithms for the Construction and Analysis of Systems (Hardcover)
Bernhard Steffen, Fabrice Kordon, Marieke Huisman
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days
Nessus Network Auditing (Paperback, 2nd edition): Russ Rogers Nessus Network Auditing (Paperback, 2nd edition)
Russ Rogers
R1,017 Discovery Miles 10 170 Ships in 10 - 15 working days

The Updated Version of the Bestselling Nessus Book.
This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.
* Perform a Vulnerability Assessment
Use Nessus to find programming errors that allow intruders to gain unauthorized access.
* Obtain and Install Nessus
Install from source or binary, set up up clients and user accounts, and update your plug-ins.
* Modify the Preferences Tab
Specify the options for Nmap and other complex, configurable components of Nessus.
* Understand Scanner Logic and Determine Actual Risk
Plan your scanning strategy and learn what variables can be changed.
* Prioritize Vulnerabilities
Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.
* Deal with False Positives
Learn the different types of false positives and the differences between intrusive and nonintrusive tests.
* Get Under the Hood of Nessus
Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).
* Scan the Entire Enterprise Network
Plan for enterprise deployment by gauging network bandwith and topology issues.
* Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times.
* The first edition is still the only book available on the product.
* Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM... The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM (Paperback)
Brien Posey
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

Ranking Queries on Uncertain Data (Hardcover, 2011 ed.): Ming Hua, Jian Pei Ranking Queries on Uncertain Data (Hardcover, 2011 ed.)
Ming Hua, Jian Pei
R3,796 Discovery Miles 37 960 Ships in 18 - 22 working days

Uncertain data is inherent in many important applications, such as environmental surveillance, market analysis, and quantitative economics research. Due to the importance of those applications and rapidly increasing amounts of uncertain data collected and accumulated, analyzing large collections of uncertain data has become an important task. Ranking queries (also known as top-k queries) are often natural and useful in analyzing uncertain data.

"Ranking Queries on Uncertain Data" discusses the motivations/applications, challenging problems, the fundamental principles, and the evaluation algorithms of ranking queries on uncertain data. Theoretical and algorithmic results of ranking queries on uncertain data are presented in the last section of this book. "Ranking Queries on Uncertain Data" is the first book to systematically discuss the problem of ranking queries on uncertain data.

Thinkwork - Working, Learning, and Managing in a Computer-Interactive Society (Hardcover, New): Fred Young Phillips Thinkwork - Working, Learning, and Managing in a Computer-Interactive Society (Hardcover, New)
Fred Young Phillips
R2,543 Discovery Miles 25 430 Ships in 10 - 15 working days

This volume explains how advances in computer technology will augment communication in person-to-person, organizational, and educational settings. It describes the convergence of virtual reality and group decision support, and how these will serve educational and organizational effectiveness. Contributors--experts from business and academia--examine what the computing/communications world will look like in the near future, what the specific needs of various industries will be, and how innovations will fit into organizations and society.

These three topics are addressed with attention to the following questions: What will be the size of initial and future markets for advanced computer and communications technology? What will be the future computing environment in manufacturing operations, in the executive suite, in the office, in the field and on the road, at the point of service, for the computer-integrated enterprise, at home, in the school, and in the global marketplace?

P2P Networking and Applications (Hardcover): John Buford, Heather Yu, Eng Keong Lua P2P Networking and Applications (Hardcover)
John Buford, Heather Yu, Eng Keong Lua
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of academic and clinical information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, Peer-to-Peer Networking and Applications explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models. The book also delineates the latest research directions, thereby providing not only a sophisticated understanding of current systems, but also the means to improve upon these systems with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.
* Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
* Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
* Provides online access to the Overlay Weaver P2P emulator, an open source tool that supports a number of peer-to-peer applications with which readers can practice.

Establishing the Foundation of Collaborative Networks - IFIP TC 5 Working Group 5.5 Eighth IFIP Working Conference on Virtual... Establishing the Foundation of Collaborative Networks - IFIP TC 5 Working Group 5.5 Eighth IFIP Working Conference on Virtual Enterprises September 10-12, 2007, Guimaraes, Portugal (Hardcover, 2007 ed.)
Luis Camarinha-Matos, Hamideh Afsarmanesh, Paulo Novais, Cesar Analide
R2,792 Discovery Miles 27 920 Ships in 18 - 22 working days

This book includes a number of selected papers from the PRO-VE '07 Conference, providing a comprehensive overview of recent advances in various Collaborative Networks domains. It covers trust aspects, performance and value systems, VO breeding environments, VO creation, e-contracting, collaborative architectures and frameworks, professional virtual communities, interoperability issues, business benefits, and case studies and applications in industry and services.

Network Quality of Service Know It All (Hardcover): Adrian Farrel Network Quality of Service Know It All (Hardcover)
Adrian Farrel
R1,816 Discovery Miles 18 160 Ships in 10 - 15 working days

The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. This book brings all of the elements of network quality of service (QoS) together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network QoS, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
* Chapters contributed by recognized experts cover theory and practice of network quality of service (QoS), allowing the reader to develop a new level of knowledge and technical expertise.
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
* Use of examples illustrate core QoS concepts for enhanced comprehension

Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise - A selection of common capabilities validated... Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise - A selection of common capabilities validated in real-life business trials by the BEinGRID consortium (Hardcover, 2010 ed.)
Theo Dimitrakos, Josep Martrat, Stefan Wesner
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

Service-Oriented Infrastructures including Grid and Cloud Computing are technologies in a critical transition to wider adoption by business. Their use may enable enterprises to achieve optimal IT utilization, including sharing resources and services across enterprises and on-demand utilization of those made available by business partners over the network. This book is an essential reference for researchers and practitioners in service-oriented IT. It analyses a selection of common capabilities (services capturing reusable functionality of IT solutions) that have been applied to tackle challenging business problems and were validated by the BEinGRID consortium in real-life business trials covering most European market sectors.

Virtualization for Security - Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting... Virtualization for Security - Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting (Paperback)
John Hoopes
R1,219 Discovery Miles 12 190 Ships in 10 - 15 working days

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives.
Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.
About the Technologies
A sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.
Virtualization has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.
A honeypot is a system that looks and acts like a production environment but is actually a monitored trap, deployed in a network with enough interesting data to attract hackers, but created to log their activity and keep them from causing damage to the actual production environment. A honeypot exposes new threats, tools, and techniques used by hackers before they can attack the real systems, which security managers patch based on the information gathered. Before virtualization became mainstream, setting up a machine or a whole network (a honeynet) for research purposes only was prohibitive in both cost and time management. Virtualization makes this technique more viable as a realistic approach for companies large and small.
* The first book to collect a comprehensive set of all virtualization security tools and strategies in a single volume
* Covers all major virtualization platforms, including market leader VMware, Xen, and Microsoft's Hyper-V virtualization platform, a new part of Windows Server 2008 releasing in June 2008
* Breadth of coverage appeals to a wide range of security professionals, including administrators, researchers, consultants, and forensic

Next Generation SSH2 Implementation - Securing Data in Motion (Paperback): Dale Liu Next Generation SSH2 Implementation - Securing Data in Motion (Paperback)
Dale Liu
R991 Discovery Miles 9 910 Ships in 10 - 15 working days

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.
This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.

* Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox.

The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback): Brien Posey The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback)
Brien Posey
R1,017 Discovery Miles 10 170 Ships in 10 - 15 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.

* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

Network Management Know It All (Hardcover): Adrian Farrel Network Management Know It All (Hardcover)
Adrian Farrel
R1,822 Discovery Miles 18 220 Ships in 10 - 15 working days

Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems, which includes controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a network. This book brings all of the elements of network management together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network management, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
* Chapters contributed by recognized experts in the field cover theory and practice of network management, allowing the reader to develop a new level of knowledge and technical expertise.
* This book's up-to-date coverage of network quality of service issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
* Use of examples illustrate core network management concepts for enhanced comprehension.

Innovation in Manufacturing Networks - Eighth IFIP International Conference on Information Technology for Balanced Automation... Innovation in Manufacturing Networks - Eighth IFIP International Conference on Information Technology for Balanced Automation Systems, Porto, Portugal, June 23-25, 2008 (Hardcover, 2008 ed.)
Americo Azevedo
R2,853 Discovery Miles 28 530 Ships in 18 - 22 working days

Innovation in Manufacturing Networks A fundamental concept of the emergent business, scientific and technological paradigms ces area, innovation the ability to apply new ideas to products, processes, organizational practices and business models - is crucial for the future competitiveness of organizations in a continually increasingly globalised, knowledge-intensive marketplace. Responsiveness, agility as well as the high performance of manufacturing systems is responsible for the recent changes in addition to the call for new approaches to achieve cost-effective responsiveness at all the levels of an enterprise. Moreover, creating appropriate frameworks for exploring the most effective synergies between human potential and automated systems represents an enormous challenge in terms of processes characterization, modelling, and the development of adequate support tools. The implementation and use of Automation Systems requires an ever increasing knowledge of enabling technologies and Business Practices. Moreover, the digital and networked world will surely trigger new business practices. In this context and in order to achieve the desired effective and efficiency performance levels, it is crucial to maintain a balance between both the technical aspects and the human and social aspects when developing and applying new innovations and innovative enabling technologies. BASYS conferences have been developed and organized so as to promote the development of balanced automation systems in an attempt to address the majority of the current open issues.

Broadband Cable Access Networks - The HFC Plant (Hardcover, 3): David Large, James Farmer Broadband Cable Access Networks - The HFC Plant (Hardcover, 3)
David Large, James Farmer
R2,000 Discovery Miles 20 000 Ships in 10 - 15 working days

This book focuses on broadband distribution and systems architecture and concentrates on practical concepts that will allow the reader to do their own design, improvement, and troubleshooting work. The objective is to enhance the skill sets of a large population that designs and builds broadband cable plants, as well as those maintaining and troubleshooting it. A large cross-section of technical personnel who need to learn these skills design, maintain, and service HFC systems from signal creation through transmission to reception and processing at the customer end point. In addition, data/voice and video specialists need to master and reference the basics of HFC design and distribution before contending with the intricacies of their own unique services. This book serves as an essential reference to all cable engineers-those who specifically design and maintain the HFC distribution plant as well as those primarily concerned with data/voice technology as well as video technology. Included is an online component consisting of spreadsheets that were used in developing the material presented in the book.
* Concentrates on practical concepts that will allow the user to do his own design, improvement, and trouble-shooting work.
* Prepares cable engineers and technicians to work with assurance as they face the latest developments and future directions.
* Concise and tightly focused, allowing readers to easily find answers to questions about an idea or concept they are developing in this area.

Nokia Firewall, VPN, and IPSO Configuration Guide (Paperback): Andrew Hay, Keli Hay, Peter Giannoulis Nokia Firewall, VPN, and IPSO Configuration Guide (Paperback)
Andrew Hay, Keli Hay, Peter Giannoulis
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."
--Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.
Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.
According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.
The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.

* Only book on the market covering Nokia Firewall/VPN appliances, which hold 6.6% of a $6 billion market
* Companion website offers video walkthroughs on various installation and troubleshooting tips from the authors
* Special chapters detail mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface

E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation... E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support (Paperback)
Karen A. Schuler
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2 billion industry, a 60% increase from 2004, projected to double by 2009. The core reason for the explosion of e-discovery is sheer volume; evidence is digital and 75% of modern day lawsuits entail e-discovery.
A recent survey reports that U.S. companies face an average of 305 pending lawsuits internationally. For large U.S. companies ($1 billion or more in revenue)that number has soared to 556 on average, with an average of 50 new disputes emerging each year for nearly half of them. To properly manage the role of digital information in an investigative or legal setting, an enterprise--whether it is a Fortune 500 company, a small accounting firm or a vast government agency--must develop an effective electronic discovery program. Since the amendments to the Federal Rules of Civil Procedure, which took effect in December 2006, it is even more vital that the lifecycle of electronically stored information be understood and properly managed to avoid risks and costly mistakes.
This books holds the keys to success for systems administrators, information security and other IT department personnel who are charged with aiding the e-discovery process.
*Comprehensive resource for corporate technologists, records managers, consultants, and legal team members to the e-discovery process, with information unavailable anywhere else
*Offers a detailed understanding of key industry trends, especially the Federal Rules of Civil Procedure, that are driving the adoption of e-discovery programs
*Includes vital project management metrics to help monitor workflow, gauge costs and speed the process
*Companion Website offers e-discovery tools, checklists, forms, workflow examples, and other tools to be used when conducting e-discovery strategy

Mobile Malware Attacks and Defense (Paperback): Ken Dunham Mobile Malware Attacks and Defense (Paperback)
Ken Dunham
R1,233 Discovery Miles 12 330 Ships in 10 - 15 working days

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use "MobileSandbox" to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats

Wireless Security: Know It All (Paperback): Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A.... Wireless Security: Know It All (Paperback)
Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A. Rackley, …
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf
Communications engineers need to master a wide area of topics to excel. The "Wireless Security Know It All" covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
Research Anthology on Architectures…
Information R Management Association Hardcover R12,639 Discovery Miles 126 390
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Guide to Networking Essentials
Greg Tomsho Paperback R1,419 R1,315 Discovery Miles 13 150
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690

 

Partners