![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Providing the range of mail-related services expected by organizations can be a confusing, daunting process. "Pro Open Source Mail: Building an Enterprise Mail Solution" presents a comprehensive guide to managing the most important e-mail services, including user administration, mail transfer agents, remote e-mail access, virus protection, spam and e-mail filtering, web-based e-mail, and mailing list maintenance. Beginning with installation and configuration of the popular server-based operating system Fedora Core, the book outlines the system and network preparation process geared towards running a complete enterprise e-mail system. Subsequent chapters cover installation and configuration of sendmail, the popular POP3/IMAP server Dovecot, and ClamAV and SpamAssassin for virus protection and spam filtering. With a nod to the global e-mail availability now required by many organizations, this book also guides you through configuration of a web-based mail interface, mailing-list software, and advanced security and privacy topics.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of the major challenges in online examination. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, especially within education, the need for authentication has increased. Biometric Authentication in Online Learning Environments provides innovative insights into biometrics as a strategy to mitigate risk and provide authentication, while introducing a framework that provides security to improve e-learning and on-line examination by utilizing biometric-based authentication techniques. This book examines e-learning, security, threats in online exams, security considerations, and biometric technologies, and is designed for IT professionals, higher education administrators, professors, researchers, business professionals, academicians, and libraries seeking topics centered on biometrics as an authentication strategy within educational environments.
Network processors are the basic building blocks of today's
high-speed, high-demand, quality-oriented communication networks.
Designing and implementing network processors requires a new
programming paradigm and an in-depth understanding of network
processing requirements. This book leads the reader through the
requirements and the underlying theory of networks, network
processing, and network processors. It covers implementation of
network processors and intergrates EZchip Microcode Development
Environment so that you can gain hands-on experience in writing
high-speed networking applications. By the end of the book, the
reader will be able to write and test applications on a simulated
network processor.
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
Strengthen your understanding of fast-moving WDMA optical network technology, and learn how to better select and design reliable all-optical telecom networks with this practical book. It will help expand your knowledge of LLN, Manhattan, Shuffle, De Bruijn, Gemmet, Matrix, Swift, and Starnet and will show you how to employ an effective method of network organization based on traffic demands.
Sleep medicine has been developing for more than 40 years. The current concepts in sleep technology are mainly centered on polysomnography (PSG) and issues related to sleep technicians. However, the editorsbelieve that the true value of technology is revealed only when benefits to humanity are manifest. To this end, they endeavor to create a new era in sleep technology, one that will improve the quality of people's sleep and daily lives. This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples. Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives. This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples. Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives. Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.
Citrix Presentation Server allows remote users to work off a
network server as if they weren't remote. That means: Incredibly
fast access to data and applications for users, no third party VPN
connection, and no latency issues. All of these features make
Citrix Presentation Server a great tool for increasing access and
productivity for remote users. Unfortunately, these same features
make Citrix just as dangerous to the network it's running on. By
definition, Citrix is granting remote users direct access to
corporate servers?..achieving this type of access is also the holy
grail for malicious hackers. To compromise a server running Citrix
Presentation Server, a hacker need not penetrate a heavily defended
corporate or government server. They can simply compromise the far
more vulnerable laptop, remote office, or home office of any
computer connected to that server by Citrix Presentation Server.
Exchange 2007 represents the biggest advance in the history of
Microsoft Exchange Server technology. Given Exchange's leap to x64
architecture and its wide array of new features, it isn't
surprising that the SP1 release of 2007 would be particularly
robust in terms of hotfixes, security enhancements and additional
functionality.
Network Security: Know It All explains the basics, describes the
protocols, and discusses advanced topics, by the best and brightest
experts in the field of network security.
The Second Edition of the Best Damn Firewall Book Period is
completely revised and updated to include all of the most recent
releases from Microsoft, Cisco, Juniper Network, and Check Point.
Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to "emerged and exciting new computing paradigm of Ubiquitous Computing", includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Marc Weiser presented his vision of disappearing and ubiquitous computing more than 15 years ago. The big picture of the computer introduced into our environment was a big innovation and the starting point for various areas of research. In order to totally adopt the idea of ubiquitous computing several houses were build, equipped with technology and used as laboratory in order to find and test appliances that are useful and could be made available in our everyday life. Within the last years industry picked up the idea of integrating ubiquitous computing and already available products like remote controls for your house were developed and brought to the market. In spite of many applications and projects in the area of ubiquitous and pervasive computing the success is still far away. One of the main reasons is the lack of acceptance of and confidence in this technology. Although researchers and industry are working in all of these areas a forum to elaborate security, reliability and privacy issues, that resolve in trustworthy interfaces and computing environments for people interacting within these ubiquitous environments is important. The user experience factor of trust thus becomes a crucial issue for the success of a UbiComp application. The goal of this book is to provide a state the art of Trustworthy Ubiquitous Computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues.
The future for Nagios in the enterprise is certainly bright!
"Nagios 3 Enterprise Network Monitoring" can help you harness the
full power of Nagios in your organization. Nagios 3 contains many
significant new features and updates, and this book details them
all for you. Once up and running, you'll see how a number of useful
add-ons and enhancements for Nagios can extend the functionality of
Nagios throughout your organization. And, if you want to learn how
to write your own plugins...this is the book for you! In these
pages you'll find a cookbook-style chapter full of useful plugins
that monitor a variety of devices, from HTTP-based applications to
CPU utilization to LDAP servers and more.
Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.
SHORT DESCRIPTION:
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.
Over the past decade, the world has witnessed an explosion in the
development and deployment of new wireless network technologies.
From cellular mobile telephony to the ubiquitous "WiFi" networks in
coffee-shops and airports, to the emerging WiMAX wireless broadband
access networks, the menu of wireless access systems has become so
comprehensive that wireline access to user devices may soon become
a relic of the past. Wireless Networking serves as a one-stop view
of cellular, WiFi, and WiMAX networks, as well as the emerging
wireless ad hoc and sensor networks. Rather than provide
descriptive accounts of these technologies and standards, the book
emphasizes conceptual perspectives on the modeling, analysis,
design and optimization of such networks. Furthermore, the authors
present wireless networking within the unifying framework of
resource allocation, using simple abstractions of the underlying
physical wireless communication. In short, Wireless Networking is
an in-depth, exhaustive, and invaluable asset to anyone working in
this rapidly evolving field.
Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies.
"Digital Design: An Embedded Systems Approach Using VHDL" provides
a foundation in digital design for students in computer
engineering, electrical engineering and computer science courses.
It takes an up-to-date and modern approach of presenting digital
logic design as an activity in a larger systems design context.
Offering a structured approach to handling and recovering from a
catastrophic data loss, this book will help both technical and
non-technical professionals put effective processes in place to
secure their business-critical information and provide a roadmap of
the appropriate recovery and notification steps when calamity
strikes.
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.
This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. Aside the adoption of Internet as the global network infrastructure these last years have shown the growing of a set of new network architectures without a rigid and known a priori architecture using wireless techniques, like sensor and ad-hoc networks. These new types of networks are opening the possibility to create a large number of new applications ranging from domestic to nature surveying. These new networks are generating new technical challenges like the capability of auto-reconfiguration in order to give the network an optimal configuration, the energy saving need when the nodes have not a source of energy other than a small battery, new protocols to access the network and to convey the information across the network when its structure is not completely known or should be discovered, new paradigms for keeping the needed information security and privacy in a quite uncontrolled environment, and others.
Nmap, or Network Mapper, is a free, open source tool that is
available under the GNU General Public License as published by the
Free Software Foundation. It is most often used by network
administrators and IT security professionals to scan corporate
networks, looking for live hosts, specific services, or specific
operating systems. Part of the beauty of Nmap is its ability to
create IP packets from scratch and send them out utilizing unique
methodologies to perform the above-mentioned types of scans and
more. This book provides comprehensive coverage of all Nmap
features, including detailed, real-world case studies.
"Software Defined Networks" discusses the historical networking
environment that gave rise to SDN, as well as the latest advances
in SDN technology. The book gives you the state of the art
knowledge needed for successful deployment of an SDN, including:
How to explain to the non-technical business decision makers in
your organization the potential benefits, as well as the risks, in
shifting parts of a network to the SDN modelHow to make intelligent
decisions about when to integrate SDN technologies in a networkHow
to decide if your organization should be developing its own SDN
applications or looking to acquire these from an outside vendorHow
to accelerate the ability to develop your own SDN application, be
it entirely novel or a more efficient approach to a long-standing
problem
This book adheres to the vision that in the future compelling user experiences will be key differentiating benefits of products and services. Evaluating the user experience plays a central role, not only during the design process, but also during regular usage: for instance a video recorder that recommends TV programs that fit your current mood, a product that measures your current level of relaxation and produces advice on how to balance your life, or a module that alerts a factory operator when he is getting drowsy. Such systems are required to assess and interpret user experiences (almost) in real-time, and that is exactly what this book is about. How to achieve this? What are potential applications of psychophysiological measurements? Are real-time assessments based on monitoring of user behavior possible? If so, which elements are critical? Are behavioral aspects important? Which technology can be used? How important are intra-individual differences? What can we learn from products already on the market? The book gathers a group of invited authors from different backgrounds, such as technology, academy and business. This is a mosaic of their work, and that of Philips Research, in the assessment of user experience, covering the full range from academic research to commercial propositions.. |
You may like...
Joseph Babinski - A Biography
Jacques MD Philippon, Jacques MD Poirier
Hardcover
R1,826
Discovery Miles 18 260
Before We Went Wireless - David Edward…
Ivor Hughes, David Evans
Paperback
R883
Discovery Miles 8 830
Chasing The Internet - From Backyards To…
Alan Knott-Craig
Paperback
|