0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (25)
  • R500+ (373)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Processor Networks and Aspects of the Mapping Problem (Paperback): Peter A. J. Hilbers Processor Networks and Aspects of the Mapping Problem (Paperback)
Peter A. J. Hilbers
R1,334 Discovery Miles 13 340 Ships in 12 - 19 working days

Processor networks consisting of a thousand and more processing nodes that interact by sending messages over a communications network are feasible today. They can only meet the market's demand for high-speed, low-cost computing when adequate facilities for the implementation of distributed programs--programs consisting of a collection of processes that communicate and synchronize via the exchange of messages--are offered. This book investigates some of these facilities by viewing both the processor network and the distributed program as a graph. Dr. Hilbers begins by introducing distributed computing with graph theory, and considers processor networks and their price/performance ratios. He goes on to look at obtaining homogeneous distributions of work over networks and considers examples. The author closes by discussing message routing within a processor network.

Application Security for the Android Platform (Paperback): Jeff Six Application Security for the Android Platform (Paperback)
Jeff Six
R539 Discovery Miles 5 390 Ships in 10 - 15 working days

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data.

How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you'll learn how to address real threats to your app, whether or not you have previous experience with security issues. Examine Android's architecture and security model, and how it isolates the filesystem and database Learn how to use Android permissions and restricted system APIs Explore Android component types, and learn how to secure communications in a multi-tier app Use cryptographic tools to protect data stored on an Android device Secure the data transmitted from the device to other parties, including the servers that interact with your app

XMPP (Paperback): Peter Saint-Andre XMPP (Paperback)
Peter Saint-Andre; Contributions by Kevin Smith, Remko Troncon
R978 R839 Discovery Miles 8 390 Save R139 (14%) Ships in 10 - 15 working days

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud computing, and more. XMPP: The Definitive Guide walks you through the thought processes and design decisions involved in building a complete XMPP-enabled application, and adding real-time interfaces to existing applications. You'll not only learn simple yet powerful XMPP tools, but you'll also discover, through real-world developer stories, how common XMPP "building blocks" can help solve particular classes of problems. With this book, you will:

Learn the basics of XMPP technologies, including architectural issues, addressing, and communication primitives Understand the terminology of XMPP and learn about the wealth of XMPP servers, clients, and code libraries Become familiar with the XMPP concepts and services you need to solve common problems Construct a complete business application or real-time service with XMPP

Every day, more software developers and service providers are using XMPP for real-time applications, and with the help of XMPP: The Definitive Guide, you can, too.

Protocols by Invariants (Paperback, New Ed): Anneke A. Schoone Protocols by Invariants (Paperback, New Ed)
Anneke A. Schoone
R1,404 Discovery Miles 14 040 Ships in 12 - 19 working days

When several computers have to cooperate to achieve a certain task (i.e. distributed computing) we need 'recipes' (i.e. protocols) to tell them what to do. Unfortunately, human minds are not well suited to keeping track of what might happen given even a very simple protocol. In this book Dr Schoone shows how we can derive properties of those protocols that always hold (i.e. invariants), irrespective of what actually happens in an execution of the protocol. From these invariants the basic attributes of the protocols can be obtained. Each protocol is explained intuitively, proved correct using invariants, and analysed to establish the relation between parameter settings and its essential features. The protocols belong to a wide range of layers in the ISO reference model hierarchy, and include the following: a class of communication protocols that tolerate and correct message loss, duplication, and resequencing; protocols for determining and maintaining routing information, both in a static and a dynamic environment; connection-management protocols; and atomic commitment protocols for use in distributed database management.

Distributed Network Data (Paperback): Alasdair Allan Distributed Network Data (Paperback)
Alasdair Allan; Contributions by Kipp Bradford
R484 R401 Discovery Miles 4 010 Save R83 (17%) Ships in 12 - 19 working days

Build your own distributed sensor network to collect, analyze, and visualize real-time data about our human environment - including noise level, temperature, and people flow. With this hands-on book, you'll learn how to turn your project idea into working hardware, using the easy-to-learn Arduino microcontroller and off-the-shelf sensors. Authors Alasdair Allan and Kipp Bradford walk you through the entire process, from prototyping a simple sensor node to performing real-time analysis on data captured by a deployed multi-sensor network. Demonstrated at recent O'Reilly Strata Conferences, the future of distributed data is already here. If you have programming experience, you can get started immediately. Wire up a circuit on a breadboard, and use the Arduino to read values from a sensor Add a microphone and infrared motion detector to your circuit Move from breadboard to prototype with Fritzing, a program that converts your circuit design into a graphical representation Simplify your design: learn use cases and limitations for using Arduino pins for power and grounding Build wireless networks with XBee radios and request data from multiple sensor platforms Visualize data from your sensor network with Processing or LabVIEW

Mobility Models for Next Generation Wireless Networks - Ad Hoc, Vehicular and Mesh Networks (Hardcover): PP Santi Mobility Models for Next Generation Wireless Networks - Ad Hoc, Vehicular and Mesh Networks (Hardcover)
PP Santi
R2,747 Discovery Miles 27 470 Ships in 12 - 19 working days

"Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks" provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and opportunistic networksDemonstrates the practices for designing effective protocol/applications for next generation wireless networksIncludes case studies showcasing the importance of properly understanding fundamental mobility model properties in wireless network performance evaluation

T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed): Matthew S. Gast T1: A Survival Guide - Provisioning & Managing Leased-Line Circuits (Book, 1st ed)
Matthew S. Gast
R960 R738 Discovery Miles 7 380 Save R222 (23%) Ships in 12 - 19 working days

This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

Network Troubleshooting Tools (Book, 1st ed): Joseph D. Sloan Network Troubleshooting Tools (Book, 1st ed)
Joseph D. Sloan
R1,359 Discovery Miles 13 590 Ships in 10 - 15 working days

Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones that are best for your needs. It also shows you how to approach network troubleshooting using these tools, how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise so you can solve them more effectively.

Routing TCP/IP, Volume 1 (Hardcover, 2nd edition): Jeff Doyle, Jennifer Carroll Routing TCP/IP, Volume 1 (Hardcover, 2nd edition)
Jeff Doyle, Jennifer Carroll
R2,045 R1,867 Discovery Miles 18 670 Save R178 (9%) Ships in 12 - 19 working days

A detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1, Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.

SIP: Understanding the Session Initiation Protocol, Fourth Edition (Hardcover, Unabridged edition): Alan Johnston SIP: Understanding the Session Initiation Protocol, Fourth Edition (Hardcover, Unabridged edition)
Alan Johnston
R3,031 R2,803 Discovery Miles 28 030 Save R228 (8%) Ships in 9 - 17 working days

Now in its fourth edition, the ground-breaking Artech House bestseller SIP: Understanding the Session Initiation Protocol offers you the most comprehensive and current understanding of this revolutionary protocol for call signaling and IP Telephony. The fourth edition incorporates changes in SIP from the last five years with new chapters on internet threats and attacks, WebRTC and SIP, and substantial updates throughout. This cutting-edge book shows how SIP provides a highly-scalable and cost-effective way to offer new and exciting telecommunication feature sets, helping practitioners design "next generation" network and develop new applications and software stacks. Other key discussions include SIP as a key component in the Internet multimedia conferencing architecture, request and response messages, devices in a typical network, types of servers, SIP headers, comparisons with existing signaling protocols including H.323, related protocols SDP (Session Description Protocol) and RTP (Real-time Transport Protocol), and the future direction of SIP.

Cisco IOS Cookbook 2e (Paperback, 2nd edition): Kevin Dooley Cisco IOS Cookbook 2e (Paperback, 2nd edition)
Kevin Dooley; Contributions by Ian Brown
R1,527 R1,153 Discovery Miles 11 530 Save R374 (24%) Ships in 12 - 19 working days

Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly. That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right. Thoroughly revised and expanded, "Cisco IOS Cookbook, 2nd Edition" adds sections on MPLS, Security, IPv6, and IP Mobility and presents solutions to the most common configuration problems, including: configuring interfaces of many types, from serial to ATM and Frame Relay; configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP); configuring authentication; configuring other services, including DHCP and NTP; setting up backup links, and using HSRP to configure backup routers; managing the router, including SNMP and other solutions; and using access lists to control the traffic through the router. If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced - if you've just been given responsibility for managing a network with Cisco routers - this book could be a job-saver.

Processor Networks and Aspects of the Mapping Problem (Hardcover, New): Peter A. J. Hilbers Processor Networks and Aspects of the Mapping Problem (Hardcover, New)
Peter A. J. Hilbers
R2,183 Discovery Miles 21 830 Ships in 12 - 19 working days

In this 1991 book, Hilbers discusses the general case of how to use processors simultaneously in order to solve a single problem rather than any specific application, and develops a theory independent of particular architectures. He starts by introducing distributed computing with graph theory, and considers processor networks and their price/performance ratios. He goes on to look at obtaining homogeneous distributions of work over networks and considers examples. Finally he discusses message routing within a processor network. This is intended to be a fundamental treatment of the relevant subjects and is aimed at computer scientists and graduate students in computer science who have experience with parallel processing: it will also be useful to others interested in processor networks.

Green and Software-defined Wireless Networks - From Theory to Practice (Hardcover): Chih-Lin I, Guanding Yu, Shuangfeng Han,... Green and Software-defined Wireless Networks - From Theory to Practice (Hardcover)
Chih-Lin I, Guanding Yu, Shuangfeng Han, Geoffrey Ye Li
R2,784 Discovery Miles 27 840 Ships in 12 - 19 working days

Understand the fundamental theory and practical design aspects of green and soft wireless communications networks with this expert text. It provides comprehensive and unified coverage of 5G physical layer design, as well as design of the higher and radio access layers and the core network, drawing on viewpoints from both academia and industry. Get to grips with the theory through authoritative discussion of information-theoretical results, and learn about fundamental green design trade-offs, software-defined network architectures, and energy efficient radio resource management strategies. Applications of wireless big data and artificial intelligence to wireless network design are included, providing an excellent design reference, and real-world examples of employment in software-defined 5G networks and energy saving solutions from wireless communications companies and cellular operators help to connect theory with practice. This is an essential text for graduate students, professionals and researchers.

Basic Sensors in iOS (Paperback): Alasdair Allan Basic Sensors in iOS (Paperback)
Alasdair Allan
R476 R391 Discovery Miles 3 910 Save R85 (18%) Ships in 12 - 19 working days

What really sets the iPhone apart from laptops and PCs is its use of onboard sensors, including those that are location-enabled. This concise book takes experienced iPhone and Mac developers on a detailed tour of iPhone and iPad hardware by explaining how these sensors work, and what they're capable of doing.

With this book, you'll build sample applications for each sensor, and learn hands-on how to take advantage of the data each sensor produces. You'll gain valuable experience that you can immediately put to work inside your own iOS applications for the iPhone, iPod touch, and iPad. This book helps you focus on: Camera: learn how to take pictures and video, create video thumbnails, customize video, and save media to the photo albumAudio: use the media picker controller and access the iPod music library in your own application, and enable your app to record and play sampled audioAccelerometer: write an application that uses this sensor to determine device orientationMagnetometer: learn how this sensor verifies compass headingsCore Motion: use this framework to receive motion data from both the accelerometer and the vibrational gyroscope

This short book is part of a collection that will, along with new material, be compiled into a larger book, iOS Sensor Programming. The other books in this collection are Augmented Reality in iOS, Geolocation in iOS, and iOS Sensor Apps with Arduino.

Packet Guide to Routing and Switching (Paperback): Bruce Hartpence Packet Guide to Routing and Switching (Paperback)
Bruce Hartpence
R611 R502 Discovery Miles 5 020 Save R109 (18%) Ships in 12 - 19 working days

Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. An ideal follow-up to "Packet Guide to Core Network Protocols," this concise guide dissects several of these protocols to explain their structure and operation.

This isn't a book on packet theory. Author Bruce Hartpence built topologies in a lab as he wrote this guide, and each chapter includes several packet captures. You'll learn about protocol classification, static vs. dynamic topologies, and reasons for installing a particular route.

This guide covers: Host routing--Process a routing table and learn how traffic starts out across a network Static routing--Build router routing tables and understand how forwarding decisions are made and processed Spanning Tree Protocol--Learn how this protocol is an integral part of every network containing switches Virtual Local Area Networks--Use VLANs to address the limitations of layer 2 networks Trunking--Get an indepth look at VLAN tagging and the 802.1Q protocol Routing Information Protocol--Understand how this distance vector protocol works in small, modern communication networks Open Shortest Path First--Discover why convergence times of OSPF and other link state protocols are improved over distance vectors

Software Defined Networks (Paperback): Vinod K Mishra Software Defined Networks (Paperback)
Vinod K Mishra
R1,120 R928 Discovery Miles 9 280 Save R192 (17%) Ships in 10 - 15 working days
802.11ac (Paperback): Matthew Gast 802.11ac (Paperback)
Matthew Gast
R483 R399 Discovery Miles 3 990 Save R84 (17%) Ships in 12 - 19 working days

The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast - an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance - explains how 802.11ac will not only increase the speed of your network, but its capacity as well. Whether you need to serve more clients with your current level of throughput, or serve your existing client load with higher throughput, 802.11ac is the solution. This book gets you started. Understand how the 802.11ac protocol works to improve the speed and capacity of a wireless LAN Explore how beamforming increases speed capacity by improving link margin, and lays the foundation for multi-user MIMO Learn how multi-user MIMO increases capacity by enabling an AP to send data to multiple clients simultaneously Plan when and how to upgrade your network to 802.11ac by evaluating client devices, applications, and network connections

VoIP Hacks - Tips And Tools For Internet Telephony (Paperback): Thoeodore Wallingford VoIP Hacks - Tips And Tools For Internet Telephony (Paperback)
Thoeodore Wallingford
R726 R580 Discovery Miles 5 800 Save R146 (20%) Ships in 12 - 19 working days

Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also cheaper, because VoIP is free of the endless government regulations and tariffs imposed upon phone companies. VoIP is simply overflowing with hack potential, and VoIP Hacks is the practical guide from O'Reilly that presents these possibilities to you. It provides dozens of hands-on projects for building a VoIP network, showing you how to tweak and customize a multitude of exciting things to get the job done. Along the way, you'll also learn which standards and practices work best for your particular environment. Among the quick and clever solutions showcased in the book are those for: * gauging VoIP readiness on an enterprise network * using SIP, H.3 23, and other signaling specifications * providing low-layer security in a VoIP environment * employing IP hardphones, analog telephone adapters, and softPBX servers * dealing with and avoiding the most common VoIP deployment mistakes In reality, VoIP Hacks contains only a small subset of VoIP knowledge-enough to serve as an introduction to the world of VoIP and teach you how to use it to save money, be more productive, or just impress your friends. If you love to tinker and optimize, this is the one technology, and the one book, you must investigate.

Switching to VoIP (Paperback): Theodore Wallingford Switching to VoIP (Paperback)
Theodore Wallingford
R977 R755 Discovery Miles 7 550 Save R222 (23%) Ships in 12 - 19 working days

More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP.

VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers

businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm.

Developed from real-world experience by a senior developer, O'Reilly's "Switching to VoIP" provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll

discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed andprojects presented:

building a softPBX

configuring IP phones

ensuring quality of service

scalability

standards-compliance

topological considerations

coordinating a complete system ?switchover?

migrating applications like voicemail and directory

services

retro-interfacing to traditional telephony

supporting mobile users

security and survivability

dealing with the challenges of NAT

To help you grasp the core principles at work, "Switching to VoIP" uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium.

You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. "Switching to VoIP" remains vendor-neutral and advocates standards, not brands. Some of the standards explored include:

SIP

H.323, SCCP, and IAX

Voice codecs

802.3af

Type of Service, IP precedence, DiffServ, and RSVP

802.1a/b/g WLAN

If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.

Essential SNMP 2e (Paperback, 2nd Revised edition): Douglas Mauro Essential SNMP 2e (Paperback, 2nd Revised edition)
Douglas Mauro
R1,199 R901 Discovery Miles 9 010 Save R298 (25%) Ships in 12 - 19 working days

Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing into an interface, to far more esoteric items, like the air temperature inside a router. In spite of its name, though, SNMP is not especially simple to learn.

O'Reilly has answered the call for help with a practical introduction that shows how to install, configure, and manage SNMP. Written for network and system administrators, the book introduces the basics of SNMP and then offers a technical background on how to use it effectively. "Essential SNMP" explores both commercial and open source packages, and elements like OIDs, MIBs, community strings, and traps are covered in depth. The book contains five new chapters and various updates throughout. Other new topics include:

Expanded coverage of SNMPv1, SNMPv2, and SNMPv3

Expanded coverage of SNMPc

The concepts behind network management and change management

RRDTool and Cricket

The use of scripts for a variety of tasks

How Java can be used to create SNMP applications

Net-SNMP's Perl module

The bulk of the book is devoted to discussing, with real examples, how to use SNMP for system and network administration tasks. Administrators will come away with ideas for writing scripts to help them manage their networks, create managed objects, and extend the operation of SNMP agents.

Once demystified, SNMP is much more accessible. If you're looking for a way to more easily manage your network, look no further than "Essential SNMP, 2nd Edition,"

Cisco IOS in a Nutshell 2e (Paperback, 2nd Revised edition): James Boney Cisco IOS in a Nutshell 2e (Paperback, 2nd Revised edition)
James Boney
R994 R772 Discovery Miles 7 720 Save R222 (22%) Ships in 12 - 19 working days

Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS.

If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly.

Fortunately, there's help. This second edition of "Cisco IOS in a Nutshell" consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly.

This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks.

The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software MajorRelease 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.

DHCP for Windows 2000 (Paperback, 2000 ed.): Neall Alcott DHCP for Windows 2000 (Paperback, 2000 ed.)
Neall Alcott
R963 R741 Discovery Miles 7 410 Save R222 (23%) Ships in 12 - 19 working days

DHCP for Windows 2000 is custom-designed for system administrators who are responsible for configuring and maintaining networks with Windows 2000 servers. It explains the DHCP protocol and how to install and manage DHCP on both servers and clients--including client platforms other than Windows 2000.

Cybersecurity: The Beginner's Guide - A comprehensive guide to getting started in cybersecurity (Paperback): Dr. Erdal... Cybersecurity: The Beginner's Guide - A comprehensive guide to getting started in cybersecurity (Paperback)
Dr. Erdal Ozkaya
R901 Discovery Miles 9 010 Ships in 10 - 15 working days

Understand the nitty-gritty of Cybersecurity with ease Key Features Align your security knowledge with industry leading concepts and tools Acquire required skills and certifications to survive the ever changing market needs Learn from industry experts to analyse, implement, and maintain a robust environment Book DescriptionIt's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best Plan your transition into cybersecurity in an efficient and effective way Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is forThis book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.

Game Theory for Next Generation Wireless and Communication Networks - Modeling, Analysis, and Design (Hardcover): Zhu Han,... Game Theory for Next Generation Wireless and Communication Networks - Modeling, Analysis, and Design (Hardcover)
Zhu Han, Dusit Niyato, Walid Saad, Tamer Basar
R2,814 Discovery Miles 28 140 Ships in 12 - 19 working days

Discover the very latest game-theoretic approaches for designing, modeling, and optimizing emerging wireless communication networks and systems with this unique text. Providing a unified and comprehensive treatment throughout, it explains basic concepts and theories for designing novel distributed wireless networking mechanisms, describes emerging game-theoretic tools from an engineering perspective, and provides an extensive overview of recent applications. A wealth of new tools is covered - including matching theory and games with bounded rationality - and tutorial chapters show how to use these tools to solve current and future wireless networking problems in areas such as 5G networks, network virtualization, software defined networks, cloud computing, the Internet of Things, context-aware networks, green communications, and security. This is an ideal resource for telecommunications engineers, and researchers in industry and academia who are working on the design of efficient, scalable, and robust communication protocols for future wireless networks, as well as graduate students in these fields.

Packet Guide to Core Network Protocols (Paperback): Bruce Hartpence Packet Guide to Core Network Protocols (Paperback)
Bruce Hartpence
R612 R503 Discovery Miles 5 030 Save R109 (18%) Ships in 12 - 19 working days

Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this concise book, you'll delve into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers.

Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.Understand basic network architecture, and how protocols and functions fit together Learn the structure and operation of the Ethernet protocol Examine TCP/IP, including the protocol fields, operations, and addressing used for networks Explore the address resolution process in a typical IPv4 network Become familiar with switches, access points, routers, and other network components that process packets Discover how the Internet Control Message Protocol (ICMP) provides error messages during network operations Learn about the network mask (subnetting) and how it helps determine the network

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introductory Statistics and Random…
Manfred Denker Hardcover R1,783 Discovery Miles 17 830
Applied Bayesian Modelling
P. Congdon Hardcover R3,105 Discovery Miles 31 050
Data Science for Fake News - Surveys and…
Deepak P, Tanmoy Chakraborty, … Hardcover R4,591 Discovery Miles 45 910
Head First Java, 3rd Edition - A…
Kathy Sierra, Bert Bates, … Paperback R1,622 R1,431 Discovery Miles 14 310
Linear and Integer Programming Made Easy
T.C. Hu, Andrew B. Kahng Hardcover R2,248 Discovery Miles 22 480
Computing with Data - An Introduction to…
Guy Lebanon, Mohamed El-Geish Hardcover R2,907 Discovery Miles 29 070
Proceedings of the First US/Japan…
H. Bozdogan Hardcover R3,085 Discovery Miles 30 850
Emerging Technologies in Data Mining and…
Joao Manuel R.S. Tavares, Satyajit Chakrabarti, … Hardcover R5,821 Discovery Miles 58 210
Geospatial Web Services - Advances in…
Peisheng Zhao Hardcover R5,057 Discovery Miles 50 570
Probability and Statistics for…
Rao V. Dukkipati, Q Paperback R1,292 Discovery Miles 12 920

 

Partners