0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (9)
  • R250 - R500 (17)
  • R500+ (359)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

OpenFlow Cookbook (Paperback, Ed): Kingston Smiler S OpenFlow Cookbook (Paperback, Ed)
Kingston Smiler S
R1,280 Discovery Miles 12 800 Ships in 18 - 22 working days

0

Wireshark Essentials (Paperback): James H Baxter Wireshark Essentials (Paperback)
James H Baxter
R694 Discovery Miles 6 940 Ships in 18 - 22 working days

This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity with common network and application services terms and technologies is assumed; however, expertise in advanced networking topics or protocols is not required. Readers in any IT field can develop the analysis skills specifically needed to complement and support their respective areas of responsibility and interest.

High Income, Zero Debt Strategies for Network Marketers - Easy, Effective, and Free Ways on How to Boost Your Network Marketing... High Income, Zero Debt Strategies for Network Marketers - Easy, Effective, and Free Ways on How to Boost Your Network Marketing Business (Paperback)
Leanne Toinette Higgins
R276 R252 Discovery Miles 2 520 Save R24 (9%) Ships in 18 - 22 working days
BGP for Cisco Networks - A CCIE v5 guide to the Border Gateway Protocol (Paperback): Stuart D Fordham BGP for Cisco Networks - A CCIE v5 guide to the Border Gateway Protocol (Paperback)
Stuart D Fordham
R448 Discovery Miles 4 480 Ships in 18 - 22 working days

BGP is the building block of the internet. Building a complete network topology from the ground up this book will teach you what BGP is, how to configure neighbors (eBGP and iBGP), route reflectors, confederations, building the BGP routing table, how BGP works with IGPs such as EIGRP, OSPF and RIP, and advanced topics such as route filtering, dynamic peering, summarization, tuning the BGP routing decision process, multiprotocol BGP with IPv6 and configuring policies. There are troubleshooting steps from the very basic checks through to more advanced issues. This book has been written for the Cisco CCIE Routing and Switching version 5.0, and covers all the topics required for the written and lab exam. This book is aimed at those studying for the CCIE but will suit anyone looking to get a solid understanding and familiarity of BGP on Cisco IOS and IOS-XE, including CCNA and CCNP students.

Embracing Interference in Wireless Systems (Paperback): Shyamnath Gollakota Embracing Interference in Wireless Systems (Paperback)
Shyamnath Gollakota
R1,546 Discovery Miles 15 460 Ships in 18 - 22 working days

The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.

Troubleshooting with Wireshark - Locate the Source of Performance Problems (Paperback): Laura Chappell Troubleshooting with Wireshark - Locate the Source of Performance Problems (Paperback)
Laura Chappell; Edited by James Aragon; Foreword by Gerald Combs
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

Whether you are a Wireshark newbie or an experienced Wireshark user, this book streamlines troubleshooting techniques used by Laura Chappell in her 20+ years of network analysis experience. Learn insider tips and tricks to quickly detect the cause of poor network performance. This book consists of troubleshooting labs to walk you through the process of measuring client/server/network delays, detecting application error responses, catching delayed responses, locating the point of packet loss, spotting TCP receiver congestion, and more. Key topics include: path delays, client delays, server delays, connection refusals, service refusals, receive buffer overload, rate throttling, packet loss, redirections, queueing along a path, resolution failures, small MTU sizes, port number reuse, missing support for TCP SACK/Window Scaling, misbehaving infrastructure devices, weak signals (WLAN), and more. Book supplements include sample trace files, Laura's Wireshark troubleshooting profile, and a troubleshooting checklist.

Introduction to Software Defined Networking - OpenFlow & VxLAN (Paperback): Vishal Shukla Introduction to Software Defined Networking - OpenFlow & VxLAN (Paperback)
Vishal Shukla
R455 Discovery Miles 4 550 Ships in 18 - 22 working days

This book is written to explain SDN for educational purposes. In addition to the general discussions of SDN, it focuses on one of the most promising protocols of SDN: OpenFlow. This book also touches on other SDN implementation, VxLAN. The book gives an overview of the SDN and then goes in depth of Open flow technology and VxLAN. In openflow it has following explained: - Why Openflow - Openflow Events - Openflow components - Openflow Case study with wireshark captures - All kind of Openflow packets, with details of each field. In VxLAN it has following explained: - Why VxLan - VxLAN events - VxLAN case study - All VxLAN packets, with details of each field. A good read for Developers, testers, network admins & anyone who wants to know SDN and wants to start from scratch and end up knowing end to end of Openflow & VxLAN.

SS7 - The Quiet Revolution That Changed Your Telephone Service (Paperback): Ralph Harvey SS7 - The Quiet Revolution That Changed Your Telephone Service (Paperback)
Ralph Harvey
R224 Discovery Miles 2 240 Ships in 18 - 22 working days

Just about everyone is familiar with cellphones, smartphone apps, and ways to access social media while on the go. But what about the system that connects the world's telephone networks, and that makes seamless roaming and local number portability possible? The Internet? No, the enabling technology is Signaling System 7 or SS7 a signaling and control system that is both ubiquitous and virtually unknown to the public. SS7 has radically changed your life and the world that you live in, but most of the available information about SS7 was developed for telecommunication engineers and network executives. SS7 The Quiet Revolution That Changed Your Telephone Service provides you and other readers with an overview of this fascinating system, how the underlying technologies developed, and how after four decades SS7 enables telecommunication networks to both function and evolve. Written for non-technical readers, this mini-book will be of interest to cellphone and Internet users, students, and adults who may be searching for a new career. This book received Honorable Mention in the Business/Technology category at the 2013 Great Northwest Book Festival."

Foundations of Windows Networking - A Mirthful (Yet Surprisingly Informative) Introduction (Paperback): John August Schumacher Foundations of Windows Networking - A Mirthful (Yet Surprisingly Informative) Introduction (Paperback)
John August Schumacher
R306 Discovery Miles 3 060 Ships in 18 - 22 working days
Twisted Network Programming Essentials, 2e (Paperback, 2nd Revised edition): Jessica McKellar Twisted Network Programming Essentials, 2e (Paperback, 2nd Revised edition)
Jessica McKellar; Contributions by Abe Fettig
R999 Discovery Miles 9 990 Ships in 18 - 22 working days

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you'll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You'll also learn the tools to build new protocols using Twisted's primitives. Start by building basic TCP clients and servers, and then focus on deploying production-grade applications with the Twisted Application infrastructure. Along the way, you can play with and extend examples of common tasks you'll face when building network applications. If you're familiar with Python, you're ready for Twisted. Learn the core components of Twisted servers and clients Write asynchronous code with the Deferred API Construct HTTP servers with Twisted's high-level web APIs Use the Agent API to develop flexible web clients Configure and deploy Twisted services in a robust and standardized fashion Access databases using Twisted's nonblocking interface Add common server components: logging, authentication, threads and processes, and testing Explore ways to build clients and servers for IRC, popular mail protocols, and SSH

Advanced Internet Protocols, Services and Applications (Hardcover): E Oki Advanced Internet Protocols, Services and Applications (Hardcover)
E Oki
R2,687 Discovery Miles 26 870 Ships in 18 - 22 working days

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility.

This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics.

A Profile for IPv6 in the U.S. Government - Version 1.0 (Paperback): Stephen Nightingale, Sheila Frankel, Mark Carson A Profile for IPv6 in the U.S. Government - Version 1.0 (Paperback)
Stephen Nightingale, Sheila Frankel, Mark Carson
R360 Discovery Miles 3 600 Ships in 18 - 22 working days

This publication provides a standards profile to assist federal agencies in developing plans to acquire and deploy products that implement Internet Protocol version 6 (IPv6). The profile recommends IPv6 capabilities for common network devices, including hosts, routers, intrusion detection systems, and firewalls, and includes a selection of IPv6 standards and specifications needed to meet the minimum operational requirements of most federal agencies.

IPv6 Neighbor Discovery - Based on Linux Kernel 2.6.34 (Paperback): M. Ajaykumar, Sameer Seth IPv6 Neighbor Discovery - Based on Linux Kernel 2.6.34 (Paperback)
M. Ajaykumar, Sameer Seth
R449 Discovery Miles 4 490 Ships in 18 - 22 working days

Extending the work done in the authors' recent book, "TCP/IP Architecture, Design, and Implementation in Linux," this concise and practical guide covers the multiple functionalities of IPv6 Neighbor Discovery for Linux kernel 2.6.34, including address resolution using Neighbor Solicitation and Neighbor Advertisement as well as the correct formatting for Neighbor Solicitation and Neighbor Advertisement. Developers, aspirants, and students seeking to understand the implementation of the IPv6 Neighbor Discovery address resolution feature in Linux in comparison with the equivalent protocol in IPv4 will find this to be an essential reference.

Rhomobile Beginner's Guide (Paperback): Abhishek Nalwaya Rhomobile Beginner's Guide (Paperback)
Abhishek Nalwaya
R1,150 Discovery Miles 11 500 Ships in 18 - 22 working days
TCP/IP - The Ultimate Protocol Guide - Complete 2 Volume Set (Paperback): Philip M. Miller TCP/IP - The Ultimate Protocol Guide - Complete 2 Volume Set (Paperback)
Philip M. Miller
R2,431 Discovery Miles 24 310 Ships in 18 - 22 working days

This is the complete 2 volume set, containing both volumes one (ISBN: 9781599424910) and two (ISBN: 9781599425436) packaged together. The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Section A: Introduction Section B: The Internet Protocol Section uReliable and Unreliable Data Delivery Section D: Quality of Service Section E: Routing Section F: Multicasting in IP Environments Section G: Appendices Volume 2 - Applications, Access & Data Security Section H: An Introduction to Applications & Security in the TCP/IP Suite Section I: IP Application Services Section J: Securing the Communications Channel Section K: Wide Area Communications Section L: Appendices

DNSSEC Specifications (Paperback, New): Reed Media Services DNSSEC Specifications (Paperback, New)
Reed Media Services
R624 Discovery Miles 6 240 Ships in 18 - 22 working days

DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.

TCP/IP - The Ultimate Protocol Guide - Volume 1 - Data Delivery and Routing (Paperback, New): Philip M. Miller TCP/IP - The Ultimate Protocol Guide - Volume 1 - Data Delivery and Routing (Paperback, New)
Philip M. Miller
R1,769 Discovery Miles 17 690 Ships in 18 - 22 working days

TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no assumptions as to prior knowledge of the protocols, nor does it assume expertise in LAN access techniques. Instead, in Volume One (Data Delivery and Routing), the reader is guided through the mechanics of Local Area Networks before embarking on discussions of IP Addressing, the Internet Protocol, and the other protocols that together ensure the reliable delivery of data. This volume also explains the error reporting and recovery mechanisms inherent within the protocol suite, the manner in which Quality of Service is implemented, and discusses the use of Broadcasts and other multiple station delivery mechanisms. Finally, Volume One describes the various routing protocols that allow our data to be delivered regardless of changes and failures that may occur within our networks. Volume Two (Applications, Access and Data Security) is available separately.

TCP/IP - The Ultimate Protocol Guide - Volume 2 - Applications, Access and Data Security (Paperback, New): Philip M. Miller TCP/IP - The Ultimate Protocol Guide - Volume 2 - Applications, Access and Data Security (Paperback, New)
Philip M. Miller
R1,752 Discovery Miles 17 520 Ships in 18 - 22 working days

TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no assumptions as to prior knowledge of the protocols, nor does it assume expertise in LAN access techniques. Volume Two (Applications, Access and Data Security) concentrates on the Application protocols that are in everyday use from Web Operations through to email, and from host configuration and access through to file transfer. In addition, we also examine the way that networks can be managed, the manner in which we can access our networks remotely and possibly one of the most important subjects today - security of our data whilst in transit. Volume One (Data Delivery and Routing) is available separately.

Hacking Voip (Paperback): Himanshu Dwivedi Hacking Voip (Paperback)
Himanshu Dwivedi
R1,238 Discovery Miles 12 380 Ships in 18 - 22 working days

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, t

Routing in Wireless Sensor Networks (Paperback): Eugen Wittmann Routing in Wireless Sensor Networks (Paperback)
Eugen Wittmann
R1,171 Discovery Miles 11 710 Ships in 18 - 22 working days

Sensor motes are small devices with sensing, computing and wireless communication capabilities. Such devices form a Wireless Sensor Network (WSN) which can be used for many applications like gathering of environmental data and even monitoring enemy activity on a battlefield. In order to achieve this efficient ad-hoc routing protocols must be used. Such routing protocols are of prime research interest. There exist many different approaches most of which are studied through simulation only. At the same time real hardware platforms for this research become widely available and affordable. In this book a real world environmental monitoring task is taken and a complete WSN application for this task is developed. As hardware platform Crossbow Technology's Cricket motes are used. They are programmed using TinyOS operating system and the NesC language. The usability of various state-of-the-art routing mechanisms for the specific application is discussed. Finally some of these are selected and implemented for use in the developed WSN application. The performance of the different available routing protocols is then measured and compared through actual deployment of the WSN.

Protocols and Architectures for Wireless Sensor Networks (Paperback): H. Karl Protocols and Architectures for Wireless Sensor Networks (Paperback)
H. Karl
R2,110 Discovery Miles 21 100 Ships in 18 - 22 working days

Learn all you need to know about wireless sensor networks

"Protocols and Architectures for Wireless Sensor Networks" provides a thorough description of the nuts and bolts of wireless sensor networks.

The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other. Numerous practical examples, case studies and illustrations demonstrate the theory, techniques and results presented. The clear chapter structure, listing learning objectives, outline and summarizing key points, help guide the reader expertly through the material.

"Protocols and Architectures for Wireless Sensor Networks" Covers architecture and communications protocols in detail with practical implementation examples and case studies.Provides an understanding of mutual relationships and dependencies between different protocols and architectural decisions.Offers an in-depth investigation of relevant protocol mechanisms. Shows which protocols are suitable for which tasks within a wireless sensor network and in which circumstances they perform efficiently. Features an extensive website with the bibliography, PowerPoint slides, additional exercises and worked solutions.

This text provides academic researchers, graduate students in computer science, computer engineering, and electrical engineering, as well as practitioners in industry and research engineers with an understanding of the specific design challenges and solutions for wireless sensor networks.

Check out www.wiley.com/go/wsn for accompanying course material

"I am deeply impressed by the book of Karl & Willig. It is by far the most complete source for wireless sensor networks...The book covers almost all topics related to sensor networks, gives an amazing number of references, and, thus, is the perfect source for students, teachers, and researchers. Throughout the book the reader will find high quality text, figures, formulas, comparisons etc. - all you need for a sound basis to start sensor network research."

"Prof. Jochen Schiller, Institute of Computer Science, Freie Universitat Berlin"

Voice Over MPLS - Planning and Designing Networks (Paperback, Ed): Daniel Minoli Voice Over MPLS - Planning and Designing Networks (Paperback, Ed)
Daniel Minoli
R1,544 Discovery Miles 15 440 Ships in 18 - 22 working days

MPLS is many things to many people. If you’re moving IP voice traffic, it may mean performance gains for you.

Daniel Minoli’s Voice Over MPLS gives you the technical and business lowdown on innovative new solutions for packet-based voice. What does it take to build flexible, high-performance networks with enhanced quality of service? Maybe not as much as you think.

RELIABLE VOICE SERVICES THAT CUSTOMERS CAN AFFORD

With VoMPLS, you can deliver the quality associated with VoIP over ATM links without the cost in either bandwidth or equipment. Based on label-switching standards from the IETF and the work of a number of leading companies, Voice over MPLS lets you packetize voice without the added overhead of IP encapsulation. It also suppresses periods of silence, freeing up bandwidth for other uses.

From one of the most experienced names in telecom technology, Voice Over MPLS shows you how to—
* Provide multiple, high-quality services without costly leased lines
* Deliver low-bandwidth voice over ATM, Frame Relay, or IP
* Add phone “lines” without adding equipment
* Solve scaling issues for small- and medium-sized users
* Obtain consistent call quality without crunching bandwidth
* Discover ways to protect revenues during deployment
* Evaluate the potential role of VoMPLS in big-picture convergence
* Evaluate VoMPLS’s impact on public networks

Find the engineering details you need for Label Switched Paths (LSPs), layers, signaling, CoS (Classes of Service), QoS (Quality of Service), VoMPLS in VPNs (Virtual Private Networks), implementation options, deployment, and more.

Softswitch - Applications, Protocols and Platforms (Paperback, Ed): Franklin D. Ohrtman Softswitch - Applications, Protocols and Platforms (Paperback, Ed)
Franklin D. Ohrtman
R1,301 Discovery Miles 13 010 Ships in 18 - 22 working days

Bypassing the old circuit-switched hardware, softswitches streamline message traffic and provide a much more efficient service development environment. Along with SIP, this technology leverages Internet technologies to replace plain-old-telephone service. Developers who are freed up by softswitch technology to build cost-effective 3G serives will learn how it works and what applications it can support. Network managers making hard decisions about whether to deploy VoIP will learn pros and cons, costs and benefits, and most importantly how to separate myth from reality.

OSI Reference Model for Telecommunications (Paperback): Debbra Wetteroth OSI Reference Model for Telecommunications (Paperback)
Debbra Wetteroth
R1,311 Discovery Miles 13 110 Ships in 18 - 22 working days

OSI IN THE VOICE ENVIRONMENT


HERE’S STRAIGHTFORWARD EXPLANATIONS OF THE OSI LAYERS AND THEIR RELATIONSHIP TO TELECOM SERVICE AND EQUIPMENT. WHETHER YOU NEED ANWERS ON HARDWARE, SOFTWARE, ERROR CONTROL OR INTERFACES, LOOK INSIDE FOR BASIC FACTS AND HOW TO MANAGE THOSE CRITICAL “SPECIAL CIRCUMSTANCES”


The OSI (Open System Interconnection) Reference Model is a cornerstone of modern network design. Although the OSI model has become almost synonymous with data communications, it serves the public switched telephone network (PSTN) as well and is a productive way to organize and teach the building blocks of telecom systems.


In OSI Reference Model for Telecommunications, hands-on expert Debbra Wetteroth provides telecom staffers the information they need to gain a working knowledge of this essential telecom service architecture and equipment. Her style that breaks down the barriers between data and voice vocabularies. This quick reference to the OSI model puts the data you need everyday at your fingertips.


Look inside for an understandable schematics of:

* Mapping PSTN functions to OSI

* The basics of successful data transmissions

* What OSI is and does

* The components that make up OSI

* OSI “common knowledge” (the kind that’s not always so common), such as numbering system, signaling rates, and noise distortion data

* A detailed description of Layers 1 to 3 and a thorough review of the Transport Layer. For each layer, you’ll learn roles, functions, definitions, and more


This unique volume will prove invaluable to telecommunications technicians, field supervisors, switch managers, network analysts, network designers, and anyone else who needs detailed explanation of the many components of OSI.




Service Discovery Protocols and Programming (Paperback, Ed): Golden G. Richard III Service Discovery Protocols and Programming (Paperback, Ed)
Golden G. Richard III
R1,373 R1,146 Discovery Miles 11 460 Save R227 (17%) Ships in 18 - 22 working days

COVERS FOUR KEY PROTOCOLS

Jini

SLP (Service Location Protocol)

UPnP (Universal Plug and Play)

Bluetooth SDP

Service and Device Discovery is a complete survey of the state-of-the-art in an emerging field. Client/server architectures may not be new, but the world has changed around them. Increasingly complex networked environments and the proliferation of mobile devices create many instances where highly dynamic client/service behavior is the norm and not the exception. Service discovery protocols enable plug and play architectures, where services may be introduced into a network and removed at will, without configuration hassles. In addition, service discovery is an important step toward eliminating manually installed drivers, relying instead on standard interfaces to put devices in touch.

WHY SERVICE DISCOVERY?

Service discovery will make networked devices significantly less tedious to deploy and use than they are today. As a way to standardize the environments in which client/server applications are developed and used, service discovery technologies have the potential to:
* make interactions between clients and services much more dynamic
* provide software tools for developing machine-to-machine communications
* automate discovery of required services and peripherals
* reduce administrative overhead for deploying or interfacing services
* minimize re-configuration and encourage more device mobility
* build more interesting applications for networked environments

INSIDE THE SERVICE DISCOVERY FRAMEWORK, designers and programmers will learn how clients can discover needed services. How services advertise their presence. How catalogs track available services and garbage collection facilities rid the system of outdated information. How multicast is used to support discovery and advertisement. How to enable clients to browse and subtype services. And how to anticipate interoperability issues.

In this book, researcher and developer Golden G. Richard III:
* Condenses thousands of pages of protocol specifications to their essentials and helps you interpret predictably terse material
* Investigates all four leading protocols for service discovery
* Provides complete client and service examples in Java and C

Service and Device Discovery: Protocols and Programming contains fully documented source code for representative clients and services, for all four technologies, examined and explained in detail.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rules and Rule Markup Languages for the…
Asaf Adi, Suzette Stoutenburg, … Paperback R1,463 Discovery Miles 14 630
Handbook of Research on Web Log Analysis
Bernard J Jansen, Amanda Spink, … Hardcover R6,726 Discovery Miles 67 260
Innovations, Developments, and…
Miltiadis D Lytras, Naif Aljohani, … Hardcover R6,132 Discovery Miles 61 320
Semantic Web Services for Web Databases
Mourad Ouzzani, Athman Bouguettaya Hardcover R1,399 Discovery Miles 13 990
Foundations for the Web of Information…
Dieter Fensel Hardcover R4,059 Discovery Miles 40 590
Big Data and Knowledge Sharing in…
Albert Gyamfi, Idongesit Williams Hardcover R5,369 Discovery Miles 53 690
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970
Adaptive and Personalized Semantic Web
Spiros Sirmakessis Hardcover R2,710 Discovery Miles 27 100
Ambient Intelligence Services in IoT…
Dmitry Korzun, Ekaterina Balandina, … Hardcover R4,855 Discovery Miles 48 550
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300

 

Partners