![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
This complete hands-on guide to setting up and running a TCP/IP network starts with the fundamentals: what protocols do and how they work, how addresses and routing are used, and how to set up your network connection. The book also covers advanced routing protocols and provides tutorials on configuring important network services. The expanded third edition includes sections on Samba, Apache web server, network security, and much more.
Building a simple but powerful recommendation system is much easier than you think. Approachable for all levels of expertise, this report explains innovations that make machine learning practical for business production settings--and demonstrates how even a small-scale development team can design an effective large-scale recommendation system. Apache Mahout committers Ted Dunning and Ellen Friedman walk you through a design that relies on careful simplification. You'll learn how to collect the right data, analyze it with an algorithm from the Mahout library, and then easily deploy the recommender using search technology, such as Apache Solr or Elasticsearch. Powerful and effective, this efficient combination does learning offline and delivers rapid response recommendations in real time. Understand the tradeoffs between simple and complex recommenders Collect user data that tracks user actions--rather than their ratings Predict what a user wants based on behavior by others, using Mahoutfor co-occurrence analysis Use search technology to offer recommendations in real time, complete with item metadata Watch the recommender in action with a music service example Improve your recommender with dithering, multimodal recommendation, and other techniques
iOS development is a real pleasure, that is until you have to try and integrate the freewheeling development style of iOS with the realities of enterprise software deployment. This book leads you through the steps needed to create successful applications in the enterprise, both for internal consumption and sale to end users. You'll learn the pitfalls of concurrent project development, how to interface Objective-C applications to legacy backend systems, how to create unit tests and code metrics, how to implement automated XCode builds, and more. The Apple App Store is a great marketplace, but do you know how it can bite enterprise developers in the rear? How do you maintain iOS applications for the long term? If you are developing iOS applications in a corporate setting, you need to read this book.
The exponential increase in mobile device users and high-bandwidth applications has pushed the current 3G and 4G wireless networks to their capacity. Moreover, it is predicted that mobile data traffic will continue to grow by over 300 percent by 2017. To handle this spectacular growth, the development of improved wireless networks for the future has been of paramount importance. The Future of Wireless Networks: Architectures, Protocols, and Services discusses the future of wireless networks, including the emerging network architectures, underlying protocols, services, and applications. The first part of the book focuses on new wireless network architectures that are being developed, such as mobile SDN, wireless local area networks (i.e., 802.11), and wireless sensor networks for the Smart Grid. In the second part of the book, the authors discuss the new protocols and enabling technologies for the different wireless network architectures. These include wireless MAC protocols, resource allocation in cognitive radio networks, multicast transmission, and femtocells, which provide enhanced indoor coverage and increased network capacity. The book's final section discusses several new services and applications that are springing up, such as multisource selection for wireless peer-to-peer (P2P) networks and device-to-device (D2D) content sharing, which reduces duplicated downloads of the same contents on cellular links by offloading the traffic onto other networks. This section also covers the next generation of wireless security and privacy control techniques that service providers can use to ensure that their infrastructures and services are adequately protected against all kinds of threats.
Now that Apple has introduced the GameKit framework to its iOS SDK, you can integrate Game Center features directly into your iPhone and iPad apps. This concise cookbook shows you how it's done, with 18 targeted recipes for adding leaderboards, user authentication, achievements, multiplayer games, and many other features. How do you display players' scores and achievements? How do you create Game Center accounts and add friends? Each recipe in this book includes a simple code solution you can put to work immediately, along with a detailed discussion that offers insight into why and how the recipe works. Recipes include techniques to: Set up Game Center for an iOS App Use block objects and Grand Central Dispatch to write Game Center apps Authenticate a local player in Game Center Use iTunes Connect to create leaderboards and achievements Retrieve leaderboard and achievement information programmatically Handle players' state changes in multiplayer games
Create real-time, highly interactive apps quickly with the powerful XMPP protocol XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search. This book teaches you how to harness the power of XMPP in your own apps and presents you with all the tools you need to build the next generation of apps using XMPP or add new features to your current apps. Featuring the JavaScript language throughout and making use of the jQuery library, the book contains several XMPP apps of increasing complexity that serve as ideal learning tools. Coverage Includes: Getting to Know XMPPDesigning XMPP ApplicationsSaying Hello: The First ApplicationExploring the XMPP Protocol: A Debugging ConsoleMicroblogging in Real Time: An Identica ClientTalking with Friends: One-on-One ChatExploring Services: Service Discovery and BrowsingGroup Chatting: A Multi-User Chat ClientPublishing and Subscribing: A Shared Sketch Pad IntroductionWriting with Friends: A Collaborative Text EditorPlaying Games: Head to Head Tic-Tac-ToeGetting Attached: Bootstrapping BOSHDeploying XMPP ApplicationsWriting Strophe Plug-ins Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
This book features selected papers presented at the 5th International Conference on Wireless Communications and Applications (ICWCA 2021), held at Hainan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithms and network technologies in smart communications, with application in underwater communications, IoT-based marine surface communications as well as state-of-the-art real-time precise location technologies, Wi-Fi/Bluetooth locationing, array signal processing, and many others.
The exponential increase in mobile device users and high-bandwidth applications has pushed the current 3G and 4G wireless networks to their capacity. Moreover, it is predicted that mobile data traffic will continue to grow by over 300 percent by 2017. To handle this spectacular growth, the development of improved wireless networks for the future has been of paramount importance. The Future of Wireless Networks: Architectures, Protocols, and Services discusses the future of wireless networks, including the emerging network architectures, underlying protocols, services, and applications. The first part of the book focuses on new wireless network architectures that are being developed, such as mobile SDN, wireless local area networks (i.e., 802.11), and wireless sensor networks for the Smart Grid. In the second part of the book, the authors discuss the new protocols and enabling technologies for the different wireless network architectures. These include wireless MAC protocols, resource allocation in cognitive radio networks, multicast transmission, and femtocells, which provide enhanced indoor coverage and increased network capacity. The book's final section discusses several new services and applications that are springing up, such as multisource selection for wireless peer-to-peer (P2P) networks and device-to-device (D2D) content sharing, which reduces duplicated downloads of the same contents on cellular links by offloading the traffic onto other networks. This section also covers the next generation of wireless security and privacy control techniques that service providers can use to ensure that their infrastructures and services are adequately protected against all kinds of threats.
It used to be that two laptops, sitting side by side, couldn't communicate with each other; they may as well have been a thousand miles apart. But that was then, before the advent of Zero Configuration Networking technology. This amazing cross-platform open source technology automatically connects electronic devices on a network, allowing them to interoperate seamlessly-without any user configuration. So now you don't have to lift a finger! Needless to say, it has completely changed the way people connect to devices and programs for printing, file sharing, and other activities. "Zero Configuration Networking: The Definitive Guide" walks you through this groundbreaking network technology, with a complete description of the protocols and ways to implement network-aware applications and devices. Written by two Zero Configuration Networking experts, including one of Apple's own computer scientists, the book covers more than just file sharing and printing. Zero Configuration Networking also enables activities such as music and photo sharing and automatic buddy discovery on Instant Messaging applications. In fact, Zero Configuration Networking can be used for virtually any device that can be controlled by a computer. And this handy guide has the inside scoop on all of its capabilities-and how you can easily apply them in your own environment. For the technically advanced, "Zero Configuration Networking: The Definitive Guide" examines the three core technologies that make up Zero Configuration Networking: Link-Local Addressing, Multicast DNS, and DNS Service Discovery. It also reviews a series of APIs, including C-API, Java API, CFNetServices, and Cocoa's NSNetServices. Whether you want to understand how iTunes works, or you want to network a series of laptops and other devices at your office for maximum efficiency, you'll find all the answers in this authoritative guide.
Put your phone system on your computer network and see the savings. See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office. Using this work: discover how to Use VoIP for your business or home phone service, choose the best network type, set up VoIP on a wireless network, understand transports and services, and demonstrate VoIP's advantages to management.
With Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems. This book provides a solid, high-level overview of how devices use BLE to communicate with each other. You'll learn useful low-cost tools for developing and testing BLE-enabled mobile apps and embedded firmware and get examples using various development platforms including iOS and Android for app developers and embedded platforms for product designers and hardware engineers. Understand how data is organized and transferred by BLE devices Explore BLEs concepts, key limitations, and network topology Dig into the protocol stack to grasp how and why BLE operates Learn how BLE devices discover each other and establish secure connections Set up the tools and infrastructure for BLE application development Get examples for connecting BLE to iPhones, iPads, Android devices, and sensors Develop code for a simple device that transmits heart rate data to a mobile device
How can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of multivendor Multiprotocol Label Switching (MPLS) services on networks, down to the configuration level. You'll learn where Juniper Network's Junos, Cisco's IOS XR, and OpenContrail, interoperate and where they don't. Two network and cloud professionals from Juniper describe how MPLS technologies and applications have rapidly evolved through services and architectures such as Ethernet VPNs, Network Function Virtualization, Seamless MPLS, Egress Protection, External Path Computation, and more. This book contains no vendor bias or corporate messages, just solid information on how to get a multivendor network to function optimally. Topics include: Introduction to MPLS and Software-Defined Networking (SDN) The four MPLS Builders (LDP, RSVP-TE, IGP SPRING, and BGP) Layer 3 unicast and multicast MPLS services, Layer 2 VPN, VPLS, and Ethernet VPN Inter-domain MPLS Services Underlay and overlay architectures: data centers, NVO, and NFV Centralized Traffic Engineering and TE bandwidth reservations Scaling MPLS transport and services Transit fast restoration based on the IGP and RSVP-TE FIB optimization and egress service for fast restoration
The LISP overlay protocol helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility. LISP Network Deployment and Troubleshooting is the single source for understanding, configuring and troubleshooting LISP on Cisco IOS, IOS XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to troubleshoot LISP-related issues such as scalability and convergence. Focusing on design and deployment in real production environments, leading Cisco LISP engineers Tarique Shakil and Vinit Jain offer authoritative coverage of deploying LISP, verifying its operation, and optimizing its performance in widely diverse environments. Drawing on their unsurpassed experience supporting LISP deployments, they share detailed configuration examples, templates, and best practices designed to help you succeed with LISP no matter how you intend to use it. Coverage includes: Problems LISP solves, current use cases, and powerful emerging applications Standards and architecture, including control and data planes, packets, messaging, and communication processes LISP IPv4 unicast routing, IPv6 enablement/transition, and multicast LISP mobility in traditional data center and VXLAN fabrics LISP network virtualization and multi-tenancy LISP in the enterprise multi-homed Internet/WAN edge Securing, managing, and automating LISP
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide presents you with an organized test preparation routine using proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Master Cisco Certified DevNet Associate DEVASC 200-901 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions in the practice test software Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Four leading Cisco technology experts share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exams Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports More than two hours of video training from the author A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and template to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, , and video instruction, this official study guide helps you master the concepts and techniques that ensure your exam success. This official study guide helps you master all the topics on the Cisco Certified DevNet Associate DEVASC 200-901 exam, including Software Development and Design: Concepts, methods, tools, including Python programming Understanding and Using APIs: Application Programming Interfaces, including REST APIs Cisco Platforms and Development: platforms and APIs for managing enterprise networking, data centers, compute, collaboration, and security Application Deployment and Security: Deploying applications, including DevOps and Docker; securing applications via modern networking components, tools, and OWASP Top 10 threat mitigation Infrastructure and Automation: Infrastructure as code and model-driven programmability Network Fundamentals: Networking components and IP services for network programmers Companion Website: The companion website contains hundreds of practice exam questions, over two hours of video training, and more. Includes Exclusive Offers for Up to 80% Off Practice Tests, Video Training, and more Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above; Safari version 12 and above; Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7". Internet access required. Pearson Test Prep offline system requirements: Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases Also available from Cisco Press for Cisco Certified DevNet Associate study is the Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide Premium Edition eBook and Practice Test. This digital-only certification preparation product combines an eBook with enhanced Pearson Test Prep Practice Test. This integrated learning package: Allows you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most
Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology. With this concise guide, you'll learn about services involved in VoIP and get a first-hand view of network data packets from the time the phones boot through calls and subsequent connection teardown. With packet captures available on the companion website, this book is ideal whether you're an instructor, student, or professional looking to boost your skill set. Each chapter includes a set of review questions, as well as practical, hands-on lab exercises. Learn the requirements for deploying packetized voice and video Understand traditional telephony concepts, including local loop, tip and ring, and T carriers Explore the Session Initiation Protocol (SIP), VoIP's primary signaling protocol Learn the operations and fields for VoIP's standardized RTP and RTCP transport protocols Delve into voice and video codecs for converting analog data to digital format for transmission Get familiar with Communications Systems H.3 23, SIP's widely used predecessor Examine the Skinny Client Control Protocol used in Cisco VoIP phones in networks around the world
The iPhone and iPad allow user positioning via multiple methods, including GPS. The growing number location-aware, and location-fenced, applications now arriving in the App Store make heavy use of these abilities. This book walks you through the basic tools you need to build geo-aware applications before diving into the available third-party geo-SDKs available for the iOS platform.
If your organization is gearing up for IPv6, this in-depth book provides the practical information and guidance you need to plan for, design, and implement this vastly improved protocol. Author Silvia Hagen takes system and network administrators, engineers, and network designers through the technical details of IPv6 features and functions, and provides options for those who need to integrate IPv6 with their current IPv4 infrastructure. The flood of Internet-enabled devices has made migrating to IPv6 a paramount concern worldwide. In this updated edition, Hagen distills more than ten years of studying, working with, and consulting with enterprises on IPv6. It's the only book of its kind. IPv6 Essentials covers: Address architecture, header structure, and the ICMPv6 message formatIPv6 mechanisms such as Neighbor Discovery, Stateless Address autoconfiguration, and Duplicate Address detectionNetwork-related aspects and services: Layer 2 support, Upper Layer Protocols, and ChecksumsIPv6 security: general practices, IPSec basics, IPv6 security elements, and enterprise security modelsTransitioning to IPv6: dual-stack operation, tunneling, and translation techniquesMobile IPv6: technology for a new generation of mobile servicesPlanning options, integration scenarios, address plan, best practices, and dos and don'ts
Whether you are a developer, engineer, researcher or student, this practical guide gives you everything you need to know about NFC technology and its applications. You will learn what differentiates NFC from other short-range technologies such as contactless cards, RFID and Bluetooth, as well as discovering the opportunities it provides, from a fast and instinctive user interface with no infrastructure requirements to the world of Secure Elements, Trusted Service Managers, mobile wallets and the Internet of Things. With critical applications in areas including advertising, retail and transportation, this book demonstrates how you can use NFC technology practically to make transactions easier and quicker. All of this is supplemented with an array of in-depth case studies and real-life examples to reinforce your understanding, along with detailed coverage of the problems associated with the wider commercial introduction of NFC and strategies that can be used to aid its future development.
Wireless sensor networks are an emerging technology with a wide range of applications in military and civilian domains. The book begins by detailing the basic principles and concepts of wireless sensor networks, including information gathering, energy management and the structure of sensory nodes. It proceeds to examine advanced topics, covering localisation, topology, security and evaluation of wireless sensor networks, highlighting international research being carried out in this area. Finally, it features numerous examples of applications of this technology to a range of domains, such as wireless, multimedia, underwater and underground wireless sensor networks. The concise but clear presentation of the important principles, techniques and applications of wireless sensor networks makes this guide an excellent introduction for anyone new to the subject, as well as an ideal reference for practitioners and researchers.
What once seemed nearly impossible has turned into reality. The number of available Internet addresses is now nearly exhausted, due mostly to the explosion of commercial websites and entries from an expanding number of countries. This growing shortage has effectively put the Internet community--and some of its most brilliant engineers--on alert for the last decade. Their solution was to create IPv6, a new Internet standard which will ultimately replace the current and antiquated IPv4. As the new backbone of the Internet, this new protocol would fix the most difficult problems that the Internet faces today--scalability and management. And even though IPv6's implementation has met with some resistance over the past few years, all signs are now pointing to its gradual worldwide adoption in the very near future. Sooner or later, all network administrators will need to understand IPv6, and now is a good time to get started. "IPv6 Network Administration" offers administrators the complete inside info on IPv6. This book reveals the many benefits as well as the potential downsides of this next-generation protocol. It also shows readers exactly how to set up and administer an IPv6 network. A must-have for network administrators everywhere, "IPv6 Network Administration" delivers an even-handed approach to what will be the most fundamental change to the Internet since its inception. Some of the other IPv6 assets that are covered include: routing integrated auto-configuration quality-of-services (QoS) enhanced mobility end-to-end security "IPv6 Network Administration" explains what works, what doesn't, and most of all, what's practical when considering upgradingnetworks from the current protocol to IPv6.
* Focuses on open standards rather than proprietary systems, which are expensive and incompatible with other systems. * Can be used by someone who already knows advanced programming and implementation but doesn't understand how everything fits together. * Scripting for network administrators who want to perform tasks but aren't necessarily programmers.
If you've been searching for a way to get up to speed on IEEE 802.11n and 802.11ac WLAN standards without having to wade through the entire specification, then look no further. This comprehensive overview describes the underlying principles, implementation details and key enhancing features of 802.11n and 802.11ac. For many of these features the authors outline the motivation and history behind their adoption into the standard. A detailed discussion of key throughput, robustness, and reliability enhancing features (such as MIMO, multi-user MIMO, 40/80/160 MHz channels, transmit beamforming and packet aggregation) is given, plus clear summaries of issues surrounding legacy interoperability and coexistence. Now updated and significantly revised, this 2nd edition contains new material on 802.11ac throughput, including revised chapters on MAC and interoperability, plus new chapters on 802.11ac PHY and multi-user MIMO. An ideal reference for designers of WLAN equipment, network managers, and researchers in the field of wireless communications.
With ever-increasing demands on capacity, quality of service, speed, and reliability, current Internet systems are under strain and under review. Combining contributions from experts in the field, this book captures the most recent and innovative designs, architectures, protocols, and mechanisms that will enable researchers to successfully build the next-generation Internet. A broad perspective is provided, with topics including innovations at the physical/transmission layer in wired and wireless media, as well as the support for new switching and routing paradigms at the device and sub-system layer. The proposed alternatives to TCP and UDP at the data transport layer for emerging environments are also covered, as are the novel models and theoretical foundations proposed for understanding network complexity. Finally, new approaches for pricing and network economics are discussed, making this ideal for students, researchers, and practitioners who need to know about designing, constructing, and operating the next-generation Internet. |
You may like...
The Hacker's Guide to OS X - Exploiting…
Robert Bathurst, Russ Rogers, …
Paperback
Salvador Dali: The Paintings
Robert Descharnes, Gilles Neret
Hardcover
(1)
The Business of iPhone App Development…
Dave Wooldridge, Michael Schneider
Paperback
Pro iOS Persistence - Using Core Data
Michael Privat, Robert Warner
Paperback
R2,518
Discovery Miles 25 180
iOS 5 Recipes - A Problem-Solution…
Shawn Grimes, Colin Francis
Paperback
|