![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Discover exciting "behind-the-scenes" opportunities and challenges in technology today with Schwalbe's unique INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 7E, International Edition. This one-of-a-kind book demonstrates the principles distinctive to managing information technology (IT) projects that extend well beyond standard project management requirements. No book offers more up-to-the minute insights and software tools for IT project management success, including updates that reflect the latest PMBOK(R) Guide, 5th edition, the global standard for managing projects and earning certification. The book weaves today's theory with successful practices for an understandable, integrated presentation that focuses on the concepts, tools, and techniques that are most effective today. INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 7E, International Edition is the only book to apply all ten project management knowledge areas to IT projects. You master skills in project integration, scope, time, cost, quality, human resource, communications, risk, procurement, and stakeholder management as well as all five process groups--initiating, planning, executing, monitoring and controlling, and closing. Intriguing examples from familiar companies featured in today's news, a new Agile case, opportunities with MindView software, and a new chapter on project stakeholder management further ensure you are equipped to manage information technology projects with success.
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics.
This publication provides a standards profile to assist federal agencies in developing plans to acquire and deploy products that implement Internet Protocol version 6 (IPv6). The profile recommends IPv6 capabilities for common network devices, including hosts, routers, intrusion detection systems, and firewalls, and includes a selection of IPv6 standards and specifications needed to meet the minimum operational requirements of most federal agencies.
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.
This is the complete 2 volume set, containing both volumes one (ISBN: 9781599424910) and two (ISBN: 9781599425436) packaged together. The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Section A: Introduction Section B: The Internet Protocol Section uReliable and Unreliable Data Delivery Section D: Quality of Service Section E: Routing Section F: Multicasting in IP Environments Section G: Appendices Volume 2 - Applications, Access & Data Security Section H: An Introduction to Applications & Security in the TCP/IP Suite Section I: IP Application Services Section J: Securing the Communications Channel Section K: Wide Area Communications Section L: Appendices
TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no assumptions as to prior knowledge of the protocols, nor does it assume expertise in LAN access techniques. Instead, in Volume One (Data Delivery and Routing), the reader is guided through the mechanics of Local Area Networks before embarking on discussions of IP Addressing, the Internet Protocol, and the other protocols that together ensure the reliable delivery of data. This volume also explains the error reporting and recovery mechanisms inherent within the protocol suite, the manner in which Quality of Service is implemented, and discusses the use of Broadcasts and other multiple station delivery mechanisms. Finally, Volume One describes the various routing protocols that allow our data to be delivered regardless of changes and failures that may occur within our networks. Volume Two (Applications, Access and Data Security) is available separately.
TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no assumptions as to prior knowledge of the protocols, nor does it assume expertise in LAN access techniques. Volume Two (Applications, Access and Data Security) concentrates on the Application protocols that are in everyday use from Web Operations through to email, and from host configuration and access through to file transfer. In addition, we also examine the way that networks can be managed, the manner in which we can access our networks remotely and possibly one of the most important subjects today - security of our data whilst in transit. Volume One (Data Delivery and Routing) is available separately.
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, t
Sensor motes are small devices with sensing, computing and wireless communication capabilities. Such devices form a Wireless Sensor Network (WSN) which can be used for many applications like gathering of environmental data and even monitoring enemy activity on a battlefield. In order to achieve this efficient ad-hoc routing protocols must be used. Such routing protocols are of prime research interest. There exist many different approaches most of which are studied through simulation only. At the same time real hardware platforms for this research become widely available and affordable. In this book a real world environmental monitoring task is taken and a complete WSN application for this task is developed. As hardware platform Crossbow Technology's Cricket motes are used. They are programmed using TinyOS operating system and the NesC language. The usability of various state-of-the-art routing mechanisms for the specific application is discussed. Finally some of these are selected and implemented for use in the developed WSN application. The performance of the different available routing protocols is then measured and compared through actual deployment of the WSN.
Learn all you need to know about wireless sensor networks "Protocols and Architectures for Wireless Sensor Networks" provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other. Numerous practical examples, case studies and illustrations demonstrate the theory, techniques and results presented. The clear chapter structure, listing learning objectives, outline and summarizing key points, help guide the reader expertly through the material. "Protocols and Architectures for Wireless Sensor Networks" Covers architecture and communications protocols in detail with practical implementation examples and case studies.Provides an understanding of mutual relationships and dependencies between different protocols and architectural decisions.Offers an in-depth investigation of relevant protocol mechanisms. Shows which protocols are suitable for which tasks within a wireless sensor network and in which circumstances they perform efficiently. Features an extensive website with the bibliography, PowerPoint slides, additional exercises and worked solutions. This text provides academic researchers, graduate students in computer science, computer engineering, and electrical engineering, as well as practitioners in industry and research engineers with an understanding of the specific design challenges and solutions for wireless sensor networks. Check out www.wiley.com/go/wsn for accompanying course material "I am deeply impressed by the book of Karl & Willig. It is by far the most complete source for wireless sensor networks...The book covers almost all topics related to sensor networks, gives an amazing number of references, and, thus, is the perfect source for students, teachers, and researchers. Throughout the book the reader will find high quality text, figures, formulas, comparisons etc. - all you need for a sound basis to start sensor network research." "Prof. Jochen Schiller, Institute of Computer Science, Freie Universitat Berlin"
IPv6 (Internet Protocol version 6) is the future of Internet
telephony. And this book is your guide to that future.
GET THE EDGE with a high-performance service management system
MPLS is many things to many people. If you’re moving IP voice traffic, it may mean performance gains for you. Daniel Minoli’s Voice Over MPLS gives you the technical and business lowdown on innovative new solutions for packet-based voice. What does it take to build flexible, high-performance networks with enhanced quality of service? Maybe not as much as you think. RELIABLE VOICE SERVICES THAT CUSTOMERS CAN AFFORD With VoMPLS, you can deliver the quality associated with VoIP over ATM links without the cost in either bandwidth or equipment. Based on label-switching standards from the IETF and the work of a number of leading companies, Voice over MPLS lets you packetize voice without the added overhead of IP encapsulation. It also suppresses periods of silence, freeing up bandwidth for other uses. From one of the most experienced names in telecom technology, Voice Over MPLS shows you how to— Find the engineering details you need for Label Switched Paths (LSPs), layers, signaling, CoS (Classes of Service), QoS (Quality of Service), VoMPLS in VPNs (Virtual Private Networks), implementation options, deployment, and more.
Bypassing the old circuit-switched hardware, softswitches streamline message traffic and provide a much more efficient service development environment. Along with SIP, this technology leverages Internet technologies to replace plain-old-telephone service. Developers who are freed up by softswitch technology to build cost-effective 3G serives will learn how it works and what applications it can support. Network managers making hard decisions about whether to deploy VoIP will learn pros and cons, costs and benefits, and most importantly how to separate myth from reality.
-- Contains everything network administrators are looking for to
understand Cisco router internetworking, including:
OSI IN THE VOICE ENVIRONMENT
COVERS FOUR KEY PROTOCOLS Jini SLP (Service Location Protocol) UPnP (Universal Plug and Play) Bluetooth SDP Service and Device Discovery is a complete survey of the state-of-the-art in an emerging field. Client/server architectures may not be new, but the world has changed around them. Increasingly complex networked environments and the proliferation of mobile devices create many instances where highly dynamic client/service behavior is the norm and not the exception. Service discovery protocols enable plug and play architectures, where services may be introduced into a network and removed at will, without configuration hassles. In addition, service discovery is an important step toward eliminating manually installed drivers, relying instead on standard interfaces to put devices in touch. WHY SERVICE DISCOVERY? Service discovery will make networked devices significantly less tedious to deploy and use than they are today. As a way to standardize the environments in which client/server applications are developed and used, service discovery technologies have the potential to: INSIDE THE SERVICE DISCOVERY FRAMEWORK, designers and programmers will learn how clients can discover needed services. How services advertise their presence. How catalogs track available services and garbage collection facilities rid the system of outdated information. How multicast is used to support discovery and advertisement. How to enable clients to browse and subtype services. And how to anticipate interoperability issues. In this book, researcher and developer Golden G. Richard III: Service and Device Discovery: Protocols and Programming contains fully documented source code for representative clients and services, for all four technologies, examined and explained in detail.
Design and deploy broadband networking solutions Whether you're a seasoned networking professional, an administrator, or a marketing manager, you'll benefit from this book's comprehensive review of the current and emerging technologies enabling the broadband revolution. Inside, you'll find a full overview of broadband technologies and trends as well as details on networking solutions for home, multiunit buildings, and corporate offices. The book covers the various types of access networks being used for broadband services and examines the technologies that make up the Metro and Core Network. You'll also get an analysis of content services and issues of convergence.Review market drivers and the applications provoking change--Digital and Interactive TV, distance learning, and more Examine various networking solutions--phone-line, power-line, wireless, Ethernet, Long-Reach Ethernet (LRE), and VPNs Implement DSL technologies--ADSL, HDSL, and VDSL Get full details on cable access networks Understand wireless access networking technologies, including WiFi, LMDS, MMDS, 3G, DBS, and LEOs Get the edge on FTTx access networks Apply digital transmission and Frame Relay access solutions Take advantage of Gigabit Ethernet for broadband access Utilize Fiber optics and WDM/DWDM Find out about SONET/SDH, ATM standards, and MPLS Work with Content Delivery Networks and Layer 4 switching
Insider details on the world’s most successful wireless Internet application
Learn to design secure and reliable IP-based networks
step-by-step. Design and implement an IP-based corporate network using this focused, in-depth guide. Covering all the important new areas in IP design--including IP over ATM and Voice over IP--this hands-on reference shows you everything you need to know to build a scalable and secure network using today's most widely used protocol. Including numerous case studies and an 8-page blueprint section for additional visual guidance, this book offers you the most complete and authoritative coverage on IP network design available. And it's written by an internetworking expert so you can trust that the solutions contained inside are proven and field-tested. With this book you will be able to:
Whether you are involved in the design or implementation of an IP-based network or network professional simply wanting to assess your company's networking requirements, then this book is exactly what you need.
Get the latest information on optical networking technologies, companies and trends. Penetrate the facts behind the speculation on optical networking’s promise as a potential solution to skyrocketing Internet traffic. With Steve Shepard’s Optical Networking Crash Course, you’ll discover what’s what, who’s who, and how it all works together in the speed-of-light world of optical networking. From technologies, equipment, companies and competitors to nitty-gritty issues such as security, signal sinks, backhoe fade, add-drop mix and much, much more, this state-of-the-art guide is a must-read if you want to:
Get unplugged for the wireless Internet revolution Start building wireless Web applications and Web sites for the next generation of cellular telephones and Internet devices with the in-depth information contained in this volume. "WAP: A Beginner's Guide is an authoritative yet easy-to-understand reference that covers every aspect of this fast-growing protocol. Inside, you'll learn how to develop and deploy dynamic, platform-independent sites that will run smoothly on any WAP-enabled mobile device. Plus, you'll get step-by-step database integration, debugging, and security instructions. All of the functions and syntaxes of WML and WMLScript are covered, with real-world examples and in-depth explanations that will have you programming for wireless devices in no time.
-- Step by step approach shows how to analyze networks carrying
mission critical data such as voice over IP applications, streaming
video and e-commerce.
The Most Trusted Guide to Cisco Routers and TCP/IP. Now in an Updated Third Edition! "This is a valuable reference that no networking pro should be without! This should have been in the box from Cisco." Jerry Curtis, Staff Writer, Windows NT User Group See why thousands of networking professionals turn to Cisco TCP/IP Routing Professional Reference, time and time again for reliable hands-on guidance to implementing TCP/IP over Cisco routers. This practical reference features complete coverage on topics from router and protocol basics and security concerns to supporting legacy networks and performance troubleshooting, plus much more. Clearly written and packed with easy-to-follow instructions, this one-stop manual contains solutions appropriate for novices and seasoned professionals alike. And like the previous editions, you'll find more in this book than in current Cisco documentation. All configurations are fully updated to reflect the latest technological advancements and current versions of Cisco IOS 11 and 12. New coverage includes: Added section on VPNs, including VPN implementation, management, and security Coverage of IOS firewall features New material on Cisco hardware Updated configuration examples for implementation on a 2600 platform and IOS versions 11 and 12 |
You may like...
United States Circuit Court of Appeals…
U S Court of Appeals Ninth Circuit
Paperback
R972
Discovery Miles 9 720
United States Circuit Court of Appeals…
United States Circuit Court of Appeals
Hardcover
R906
Discovery Miles 9 060
United States Circuit Court of Appeals…
United States Court of Appeals
Paperback
R848
Discovery Miles 8 480
Special Senate Investigation on Charges…
Committee On Government Operations
Paperback
R492
Discovery Miles 4 920
Guide to Canadian English Usage…
Margery Fee, Janice McAlpine
Hardcover
R1,132
Discovery Miles 11 320
How To Identify Trees In South Africa
Braam van Wyk, Piet van Wyk
Paperback
|