Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference The thoroughly revised second edition of IP Address Management is the definitive reference for working with core IP management technologies, like address allocation, assignment, and network navigation via DNS. Accomplished professionals and authors Timothy Rooney and Michael Dooley offer readers coverage of recent IPAM developments in the world of cloud computing, Internet of Things (IoT), and security, as well as a comprehensive treatment of foundational concepts in IPAM. The new edition addresses the way that IPAM needs and methods have evolved since the publication of the first edition. The book covers the impact of mainstream use of private and public cloud services, the maturation of IPv6 implementations, new DNS security approaches, and the proliferation of IoT devices. The authors have also reorganized the flow of the book, with much of the technical reference material appearing at the end and making for a smoother and simpler reading experience. The 2nd edition of IP Address Management also covers topics like such as: Discussions about the fundamentals of Internet Protocol Address Management (IPAM), including IP addressing, address allocation and assignment, DHCP, and DNS An examination of IPAM practices, including core processes and tasks, deployment strategies, IPAM security best-practices, and DNS security approaches A treatment of IPAM in the modern context, including how to adapt to cloud computing, the Internet of Things, IPv6, and new trends in IPAM A one-stop reference for IPAM topics, including IP addressing, DHCP, DNS, IPv6, and DNS security Perfect for IP network engineers and managers, network planners, network architects, and security engineers, the second edition of IP Address Management also belongs on the bookshelves of senior undergraduate and graduate students studying in networking, information technology, and computer security-related courses and programs.
Information Technology is applicable in all areas of life. As a result, computer science is essential to imagine the modern world. Recent advances in information technology represents only a small part of today's computing applications which were the subject of international cooperation between Kazakh, Ukrainian and Polish scientists. A wide range of issues and topics is addressed, from game theory to advanced control issues: - Application of new computational models and their security problems - The integro-differential game approach - Application of information technology for automated translation, from inflected languages to sign language - Mathematical problems of complex systems investigation under uncertainties Recent advances in information technology is of interest to academics and engineers, and to professionals involved in information technology and its applications.
In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study guide also contains flashcards for learning terms. This book is current with The Standard for Program Management, Fourth Edition, and its author is the second person in the world to have earned the PgMP (R) certification. The online versions of the practice test simulate taking the actual exams and provide scoring as above target, target, below target, or needs improvement. Answers come with explanations and references. Questions are written to improve reading skills and teach how to select the best answer, which are key to passing the exam.
In the global economy, the customer has more and better choices than ever before, bringing on one of the biggest challenges the business community faces today - customer loyalty and retention. This book explores how to use CRM to integrate various channels and media of customer contact from the Internet through field sales into one system.
This book offers a complete overview of the new technologies and marketing methods that telecom entrepreneurs are using worldwide. Focusing on dominant telecom giants and nimble upstarts, it gives practical advice on starting a new telecom company and making it successful by providing compelling services and competitive prices.
In recent decades, the world has witnessed, unprecedented in terms of speed and geographic coverage, diffusion of new information and communication technologies (ICT). The on-going digital revolution pervasively impacts and reshapes societies and economies and therefore deserves special attention and interest. This book provides extensive evidence on information and communication technologies development patterns and dynamics of this process across developed economies over the period 1980 to the present day. It adopts newly developed methodology to identification of the 'critical mass' and isolation of technological takeoff intervals, which are intimately related to the process of technology diffusion. The statistically robust analysis of country-specific data demonstrates the key economic, social and institutional prerequisites of ICT diffusion across examined countries, indicating what factors significantly foster or - reversely - hinder the process.
Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering. A key issue in the study of complex networks is to understand the collective behavior of the various elements of these networks. Although the results from graph theory have proven to be powerful in investigating the structures of complex networks, few books focus on the algorithmic aspects of complex network analysis. Filling this need, Complex Networks: An Algorithmic Perspective supplies the basic theoretical algorithmic and graph theoretic knowledge needed by every researcher and student of complex networks. This book is about specifying, classifying, designing, and implementing mostly sequential and also parallel and distributed algorithms that can be used to analyze the static properties of complex networks. Providing a focused scope which consists of graph theory and algorithms for complex networks, the book identifies and describes a repertoire of algorithms that may be useful for any complex network. Provides the basic background in terms of graph theory Supplies a survey of the key algorithms for the analysis of complex networks Presents case studies of complex networks that illustrate the implementation of algorithms in real-world networks, including protein interaction networks, social networks, and computer networks Requiring only a basic discrete mathematics and algorithms background, the book supplies guidance that is accessible to beginning researchers and students with little background in complex networks. To help beginners in the field, most of the algorithms are provided in ready-to-be-executed form. While not a primary textbook, the author has included pedagogical features such as learning objectives, end-of-chapter summaries, and review questions
'A 'must-read' for managers; this is a great guide for pulling the customer back into your management loop.' -- Jerry Vass, author of Soft Selling in the Hard World 'Lior Arussy spins a cautionary tale for the transition companies m
"'A 'must-read' for managers; this is a great guide for pulling the
customer back into your management loop."' -- Jerry Vass, author of
"Soft Selling in the Hard World " "'Lior Arussy spins a cautionary
tale for the transition companies m"
The third book in the Healthcare Payment Systems series, Prospective Payment Systems examines the various types of prospective payment systems (PPS) used by healthcare providers and third-party payers. Emphasizing the basic elements of PPS, it considers the many variations of payment for hospital inpatient and outpatient services, skilled nursing facilities, home health agencies, long-term hospital care, and rehabilitation facilities along with other providers. The book describes the anatomy of PPS, including cost reports, adjudication features and processes, relative weights, and payment processes. It outlines the features and documentation requirements for Medicare Severity Diagnosis Related Groups (MS-DRGs), the Medicare Ambulatory Payment Classifications (APCs), Medicare HHPPS, Medicare Skilled Nursing Resource Utilization Groups (RUGs), and private third-party payers. Provides a framework for understanding and analyzing the characteristics of any PPS Discusses Medicare prospective payment systems and approaches Includes specific references to helpful resources, both online and in print Facilitates a clear understanding of the complexities related to PPS covering specific topics at a high level and revisiting similar topics to reinforce understanding Complete with a detailed listing of the acronyms most-commonly used in healthcare coding, billing, and reimbursement, the book includes a series of case studies that illustrate key concepts. It concludes with a discussion of the challenges with PPS including compliance and overpayment issues to provide you with the real-world understanding needed to make sense of any PPS.
This book presents the Cognitive Information Centric Sensor Network (CICSN) framework for the IoT. This framework is built on top of cognitive nodes, capable of knowledge representation, learning, and reasoning, along with an information-centric approach for data delivery. It also discusses the most appropriate deployment strategy for these cognitive nodes under realistic assumptions that cares about the Quality of Information (QoI). In addition, it uses a QoI aware data delivery strategy, with Analytic Hierarchy Process (AHP) as the reasoning technique to identify data delivery paths that dynamically adapt to changing network conditions and user requirements.
Wireless Sensor Networks have a wide range of applications in different areas. Their main constraint is the limited and irreplaceable power source of the sensor nodes. In many applications, energy conservation of the sensor nodes and their replacement or replenishment due to the hostile nature of the environment is the most challenging issue. Energy efficient clustering and routing are the two main important topics studied extensively for this purpose. This book focuses on the energy efficient clustering and routing with a great emphasis on the evolutionary approaches. It provides a comprehensive and systematic introduction of the fundamentals of WSNs, major issues and effective solutions.
Here's your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents. You'll learn how to identify your company's overall need for data security; how to research any measures already being taken; how to develop employee awareness of security procedures; and how to devise an effective program that will get support from all members of your organization-from senior managers to end users. Topics covered include: developing the policy and mission statements; the four key elements of data classification; volume contents; establishing a review panel; creating the employee awareness program; monitoring company/employee compliance; and computer and information security laws. This results-oriented manual also gives you a list of further resources and data security definitions. Thomas R. Peltier has numerous years of field experience in corporate information security, and is a member of the Advisory Council of the Computer Security Institute (CSI).
-Access Real mode from Protected mode; Protected mode from Real mode Apply OOP concepts to assembly language programs Interface assembly language programs with high-level languages Achieve direct hardware manipulation and memory access Explore the archite
Software testing is at a very important crossroad, where it is going back to the roots on certain fronts while moving inexorably forward. For instance, test automation is growing in prominence, but manual testing is becoming a niche; we are increasingly collaborating with the developers, breaking the bounds of unrealistic independence in testing, and bringing in true conscious quality. At such an important stage, it is important to take stock of the past, present, and future to define both the direction the discipline will take as well as the careers it will entail for testers. This book looks at a range of topics covering where we are in the product development landscape today, what are the varied disciplines at play, what are the influencing factors bringing in a change in software testing, why is such change important, what did the past look like, what is current decade turning out to be like, and where are we heading. As for future, it looks at it both from near-term and long-term perspectives. It also considers whether the testing fraternity is ready to take on such changes and are empowered enough to do so, or are there gaps that need to be filled. The book closes with perspectives from industry experts on what is in store for the software testing discipline and community in the coming years. After reading the book, you will be confident that you can take on what is in store for testers in the coming years. You will also be positioned to help the industry move to the next level, and influence change not just amongst testers but also in the product engineering industry level as a whole.
Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to networking managers and administrators, is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide, The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting, network address translation, and configuring workstations, servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis, wherever possible each chapter was written to be independent, making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing, the end results are not very efficient. And in the quickly changing global business environment, inefficiency wastes your time and money, both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively.
Within this context, big data analytics (BDA) can be an important tool given that many analytic techniques within the big data world have been created specifically to deal with complexity and rapidly changing conditions. The important task for public sector organizations is to liberate analytics from narrow scientific silos and expand it across internally to reap maximum benefit across their portfolios of programs. This book highlights contextual factors important to better situating the use of BDA within government organizations and demonstrates the wide range of applications of different BDA techniques. It emphasizes the importance of leadership and organizational practices that can improve performance. It explains that BDA initiatives should not be bolted on but should be integrated into the organization's performance management processes. Equally important, the book includes chapters that demonstrate the diversity of factors that need to be managed to launch and sustain BDA initiatives in public sector organizations.
This desk reference for IT professionals in the insurance industry provides information about the latest technologies to improve efficiency and prediction. Topics include: imaging modeling management systems customer systems Internet commerce Issues affecting all financial service sectors, such as the year 2000 problem The Insurance Technology Handbook is geared toward all levels of technology management and financial services management responsible for developing and implementing cutting-edge technology.
Project Management covers the full range of issues of vital concern to IT managers working in today's hurry-up, budget-conscious business environment. The handbook provides valuable advice and guidance on how to get projects finished on-time, within budget, and to the complete satisfaction of users, whether a high-tech, low-tech, financial, manufacturing, or service organization. Project Management Handbook brings together contributions from an all-star team of more than 40 of experts working at leading enterprise organizations and consulting firms across America, and around the world. With the help of dozens of fascinating and instructive case studies and vignettes, reporting experiences in a wide range of business sectors, those experts share their insights and experience and extrapolate practicable guidelines and actions steps that project managers can put to work on their current projects.
Accounting for the rapid and often confusing changes currently underway in the information systems of organizations, such as the rush to replace mainframes with networks and the decentralization of data storage and processing, provides insights on the duties and challenges of a data center manager. Covers strategic planning, management practices, controls, systems and contingency planning, network technology, human resources, desktop computing, and future directions....
In business, driving value is a key strategy and typically starts at the top of an organization. In today's digital age, driving software value is also an important, and often overlooked, key strategy. Executives, and the corporate board, need to expect the highest level of business value from the software the organization is developing, buying, and selling. In today's digital transformation marketplace, it is imperative that organizations start driving business value from software development initiatives. For many years, the cost of software development challenged organizations with questions such as: How do we allocate software development costs? Should these costs be considered an overhead expense? Are we getting the most value possible for our investment? A fundamental problem has been built into these questions - the focus on cost. In almost every other part of the organization, maximizing profit or, in the case of a not-for-profit, maximizing the funds available, provides a clear focus with metrics to determine success or failure. In theory, simply aligning software spending with the maximizing profit goals should be sufficient to avoid any questions about value for money. Unfortunately, this alignment hasn't turned out to be so simple, and the questions persist, particularly at the strategic or application portfolio level. In this book, Michael D.S. Harris describes how a software business value culture-one where all stakeholders, including technology and business-have a clear understanding of the goals and expected business value from software development. The book shows readers how they can transform software development from a cost or profit center to a business value center. Only a culture of software as a value center enables an organization to constantly maximize business value flow through software development. If your organization is starting to ask how it can change software from a cost-center to a value-center, this book is for you.
"John Rhodes' Videoconferencing for the Real World, is a one of the
world's most comprehensive blueprints on the awesome power of
videoconferencing."
Convergence in Broadcast and Communications Media offers concise
and accurate information for engineers and technicians tackling
products and systems combining audio, video, data processing and
communications. Without adequate fundamental knowledge of the core
technologies, products could be flawed or even fail. John Watkinson
has provided a definitive professional guide, designed as a
standard point of reference for engineers, whether you are from an
audio, video, computer or communications background.
This volume comprises a collection of papers from the 12th international conference on information networking. (ICOIN-12) held in Tokyo 1998. Technical papers on communication networks and distributed systems were presented, along side internet-based electronic commerce network systems, academic research papers, e.g. high-speed communication ATM, multimedia communications and systems, and distributed algorithms.
Is the Unified Process the be all and end all standard for developing object-oriented component-based software? This book is the second in a four volume series that presents a critical review of the Unified Process. The authors present a survey of the alt |
You may like...
Introduction to Networking Basics
Patrick Ciccarelli, Christina Faulkner, …
Paperback
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
Loose Leaf for Data Communications and…
Behrouz A. Forouzan
Loose-leaf
R3,943
Discovery Miles 39 430
|