0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (25)
  • R500+ (373)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Network and Protocol Architectures for Future Satellite Systems (Paperback): Tomaso De Cola, Alberto Ginesi, Giovanni Giambene,... Network and Protocol Architectures for Future Satellite Systems (Paperback)
Tomaso De Cola, Alberto Ginesi, Giovanni Giambene, George C. Polyzos, Vasilios A. Siris
R2,301 Discovery Miles 23 010 Ships in 10 - 15 working days

Since their conception satellites have offered the promise of more capacity for terrestrial communication systems or to exploit their inherent multicasting and broadcasting capabilities. Recent advances in satellite technology have resulted in the integration of satellite and terrestrial networks to meet the quality and capacity requirements of modern day communication systems. Network and Protocol Architectures for Future Satellite Systems reviews the emerging technologies being deployed in the networking architectures being proposed in the framework of the Future Internet. Novel protocols such as Multi Path TCP (MPTCP) and networking trends such as Information Centric Networking (ICN) are described in depth and their application in segments deploying both satellite and terrestrial networks are illustrated. This is also the first monograph to review content-based networking extensively. This is becoming increasingly important driven by the ubiquitous nature of the internet. Applications to satellite communications are illustrated and the technical challenges to be further addressed are highlighted.

Network Fighter (Paperback): Ervin Clane Network Fighter (Paperback)
Ervin Clane
R1,697 Discovery Miles 16 970 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-3) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk Journal of Cyber Security and Mobility (6-3) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk; Neeli R. Prasad
R1,081 Discovery Miles 10 810 Ships in 10 - 15 working days
MQTT Essentials - A Lightweight IoT Protocol (Paperback): Gaston C Hillar MQTT Essentials - A Lightweight IoT Protocol (Paperback)
Gaston C Hillar
R1,114 Discovery Miles 11 140 Ships in 10 - 15 working days

Send and receive messages with the MQTT protocol for your IoT solutions. About This Book * Make your connected devices less prone to attackers by understanding practical security mechanisms * Dive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examples * Learn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examples Who This Book Is For This book is a great resource for developers who want to learn more about the MQTT protocol to apply it to their individual IoT projects. Prior knowledge of working with IoT devices is essential. What You Will Learn * Understand how MQTTv3.1 and v3.1.1 works in detail * Install and secure a Mosquitto MQTT broker by following best practices * Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate * Explore the features included in MQTT for IoT and Machine-to-Machine communications * Publish and receive MQTT messages with Python, Java, Swift, JavaScript, and Node.js * Implement the security best practices while setting up the MQTT Mosquitto broker In Detail This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages Style and approach This step-by-step guide describes the MQTT protocol for your IoT projects

Learning Python Network Programming (Paperback): Dr M O Faruque Sarker, Sam Washington Learning Python Network Programming (Paperback)
Dr M O Faruque Sarker, Sam Washington
R1,402 Discovery Miles 14 020 Ships in 10 - 15 working days

0

Journal of Cyber Security and Mobility (6-1) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-1) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,068 Discovery Miles 10 680 Ships in 10 - 15 working days
Opportunistic Routing in Wireless Networks (Paperback): Tara Javidi, Eric Van Buhler Opportunistic Routing in Wireless Networks (Paperback)
Tara Javidi, Eric Van Buhler
R2,289 Discovery Miles 22 890 Ships in 10 - 15 working days

Wireless multi-hop networks have become an important part of many modern communication systems. Some of the earliest examples were military communication networks utilizing wireless relays in remote areas. More recently, many industries have used wireless multi-hop networks to create a multitude of fascinating tools and systems. Motivated by classical routing solutions in the Internet, conventional routing attempts to find a fixed path along which the packets are forwarded. Such fixed path schemes fail to take advantage of the broadcast nature and opportunities provided by the wireless medium, and result in unnecessary packet retransmissions. In opportunistic routing, decisions are made in an online manner by choosing the next relay based on the actual transmission outcomes as well as a rank ordering of neighboring nodes. Opportunistic Routing in Wireless Networks provides the motivation for opportunistic routing, and presents several different algorithms which achieve better performance, in most scenarios, than conventional shortest path routing. This comprehensive survey provides a starting point for all researchers and students wishing to learn the background and technical details of opportunistic routing.

Modern Random Access Protocols (Paperback): Matteo Berioli, Giuseppe Cocco, Gianluigi Liva, Andrea Munari Modern Random Access Protocols (Paperback)
Matteo Berioli, Giuseppe Cocco, Gianluigi Liva, Andrea Munari
R2,199 Discovery Miles 21 990 Ships in 10 - 15 working days

Modern day wireless communication systems rely heavily on the random access schemes that were originally developed in the 1970s. The pioneering Aloha protocol has become a key component of many communications standards, ranging from satellite networks to ad hoc and cellular scenarios. Recent developments, however, have seen a fundamental leap forward based on using the principles of successive interference cancellation. The modern random access protocols using these new techniques have opened up a wealth of new applications. This tutorial style monograph explores the main ideas and design principles that are behind some of these novel schemes. It introduces the reader to the analytical tools used to model such performance. Focussing on slotted solutions it shows how Aloha can be combined with successive interference cancellation and optimized using the theory of codes on graphs. These techniques are illustrated in applications using physical layer network coding to resolve collisions among users and receiver diversity. It concludes by introducing the reader to the recently asynchronous (or unslotted) schemes. Modern Random Access Protocols is a comprehensive and erudite introduction to a set of techniques that will form part of many future modern communication or networked system.

Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif (Paperback): Bruno Blanchet Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif (Paperback)
Bruno Blanchet
R2,200 Discovery Miles 22 000 Ships in 10 - 15 working days

The verification of security protocols has been an active research area since the 1990s. This topic is interesting for several reasons. Security protocols are ubiquitous: they are used for e-commerce, wireless networks, credit cards, e-voting, among others. The design of security protocols is notoriously error-prone. These errors can also have serious consequences. Hence, the formal verification or proof of protocols is particularly desirable. This survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks. ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic primitives, defined by rewrite rules or by equations. It can prove various security properties: secrecy, authentication, and process equivalences, for an unbounded message space and an unbounded number of sessions. It takes as input a description of the protocol to verify in a dialect of the applied pi calculus, an extension of the pi calculus with cryptography. It automatically translates this protocol description into Horn clauses and determines whether the desired security properties hold by resolution on these clauses. This survey presents an overview of the research on ProVerif and is the most comprehensive text available on the topic.

Gnu Anubis Reference Manual (Paperback): Wojciech Polak, Sergey Poznyakoff Gnu Anubis Reference Manual (Paperback)
Wojciech Polak, Sergey Poznyakoff
R538 Discovery Miles 5 380 Ships in 10 - 15 working days
Mastering Wireshark (Paperback): Charit Mishra Mastering Wireshark (Paperback)
Charit Mishra
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book * Master Wireshark and train it as your network sniffer * Impress your peers and get yourself pronounced as a network doctor * Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what's going on in a network? Do you get frustrated when you are unable to detect the cause of problems in your networks? This is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn * Install Wireshark and understand its GUI and all the functionalities of it * Create and use different filters * Analyze different layers of network protocols and know the amount of packets that flow through the network * Decrypt encrypted wireless traffic * Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware * Troubleshoot all the network anomalies with help of Wireshark * Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you'll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.

Journal of Cyber Security and Mobility (5-3) (Paperback): Antoni Gobeo, Connor Fowler, William J. Buchanan Journal of Cyber Security and Mobility (5-3) (Paperback)
Antoni Gobeo, Connor Fowler, William J. Buchanan
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days
Bind DNS Administration Reference (Paperback, 2nd ed.): Jeremy C. Reed Bind DNS Administration Reference (Paperback, 2nd ed.)
Jeremy C. Reed
R758 Discovery Miles 7 580 Ships in 10 - 15 working days
Wireshark Essentials (Paperback): James H Baxter Wireshark Essentials (Paperback)
James H Baxter
R746 Discovery Miles 7 460 Ships in 10 - 15 working days

This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity with common network and application services terms and technologies is assumed; however, expertise in advanced networking topics or protocols is not required. Readers in any IT field can develop the analysis skills specifically needed to complement and support their respective areas of responsibility and interest.

Master Excel - All About Formulas and Functions (Paperback): Thomas Clayton Master Excel - All About Formulas and Functions (Paperback)
Thomas Clayton
R170 Discovery Miles 1 700 Ships in 10 - 15 working days
TCP/IP For Dummies 6e (Paperback, 6th Edition): C Leiden TCP/IP For Dummies 6e (Paperback, 6th Edition)
C Leiden
R800 R687 Discovery Miles 6 870 Save R113 (14%) Ships in 9 - 17 working days

Packed with the latest information on TCP/IP standards and protocols

TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. "TCP/IP For Dummies, 6th Edition, " is both an introduction to the basics for beginners as well as the perfect go-to resource for TCP/IP veterans.

The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step instructions show you how to install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies, and much more.Transmission Control Protocol / Internet Protocol (TCP/IP) is the de facto standard transmission medium worldwide for computer-to-computer communications; intranets, private internets, and the Internet are all built on TCP/IPThe book shows you how to install and configure TCP/IP and its applications on clients and servers; explains intranets, extranets, and virtual private networks (VPNs); provides step-by-step information on building and enforcing security; and covers all the newest protocolsYou'll learn how to use encryption, authentication, digital certificates, and signatures to set up a secure Internet credit card transaction

Find practical security tips, a Quick Start Security Guide, and still more in this practical guide.

Journal of Ict Standardization (Paperback): Anand R Prasad Journal of Ict Standardization (Paperback)
Anand R Prasad
R967 Discovery Miles 9 670 Ships in 10 - 15 working days
Wireless Edge Caching - Modeling, Analysis, and Optimization (Hardcover): Thang X. Vu, Ejder Bastug, Symeon Chatzinotas, Tony... Wireless Edge Caching - Modeling, Analysis, and Optimization (Hardcover)
Thang X. Vu, Ejder Bastug, Symeon Chatzinotas, Tony Q. S. Quek
R3,144 Discovery Miles 31 440 Ships in 12 - 19 working days

Understand both uncoded and coded caching techniques in future wireless network design. Expert authors present new techniques that will help you to improve backhaul, load minimization, deployment cost reduction, security, energy efficiency and the quality of the user experience. Covering topics from high-level architectures to specific requirement-oriented caching design and analysis, including big-data enabled caching, caching in cloud-assisted 5G networks, and security, this is an essential resource for academic researchers, postgraduate students and engineers working in wireless communications.

Enterprise IPv6 for Enterprise Networks (Paperback): Mohammed Fathe Mubin, Mike Westley Enterprise IPv6 for Enterprise Networks (Paperback)
Mohammed Fathe Mubin, Mike Westley; Introduction by Rayne Alfred Collins
R230 Discovery Miles 2 300 Ships in 10 - 15 working days
Mosh (Mobile Shell) - A New Era of Remote Access (Paperback): Aditya Raj Mosh (Mobile Shell) - A New Era of Remote Access (Paperback)
Aditya Raj
R179 Discovery Miles 1 790 Ships in 10 - 15 working days

Mosh- A new application which supports mobile shell technique, can eliminate the regular issues of SSH session, capable of providing the roaming facility, is the central element of this book. In addition, this book also covers DHCP and DNS configuration for networking and communication.

VPNs and NAT for Cisco Networks - A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT (Paperback): Stuart D Fordham VPNs and NAT for Cisco Networks - A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT (Paperback)
Stuart D Fordham
R517 Discovery Miles 5 170 Ships in 10 - 15 working days
CCNA Routing & Switching By Example (Paperback): M Irfan Basharat CCNA Routing & Switching By Example (Paperback)
M Irfan Basharat
R1,091 Discovery Miles 10 910 Ships in 10 - 15 working days
OpenFlow Cookbook (Paperback, Ed): Kingston Smiler S OpenFlow Cookbook (Paperback, Ed)
Kingston Smiler S
R1,383 Discovery Miles 13 830 Ships in 10 - 15 working days

0

High Income, Zero Debt Strategies for Network Marketers - Easy, Effective, and Free Ways on How to Boost Your Network Marketing... High Income, Zero Debt Strategies for Network Marketers - Easy, Effective, and Free Ways on How to Boost Your Network Marketing Business (Paperback)
Leanne Toinette Higgins
R299 R274 Discovery Miles 2 740 Save R25 (8%) Ships in 10 - 15 working days
IPv6 Neighbor Discovery - Based on Linux Kernel 2.6.34 (Paperback): M. Ajaykumar, Sameer Seth IPv6 Neighbor Discovery - Based on Linux Kernel 2.6.34 (Paperback)
M. Ajaykumar, Sameer Seth
R487 Discovery Miles 4 870 Ships in 10 - 15 working days

Extending the work done in the authors' recent book, "TCP/IP Architecture, Design, and Implementation in Linux," this concise and practical guide covers the multiple functionalities of IPv6 Neighbor Discovery for Linux kernel 2.6.34, including address resolution using Neighbor Solicitation and Neighbor Advertisement as well as the correct formatting for Neighbor Solicitation and Neighbor Advertisement. Developers, aspirants, and students seeking to understand the implementation of the IPv6 Neighbor Discovery address resolution feature in Linux in comparison with the equivalent protocol in IPv4 will find this to be an essential reference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Essential Spectrum-based Fault…
Xiaoyuan Xie, Baowen Xu Hardcover R2,873 Discovery Miles 28 730
A Treatise On The Differential Geometry…
Luther Pfahler Eisenhart Hardcover R1,191 Discovery Miles 11 910
A Surprise for Christmas and Other…
Martin Edwards Paperback R382 Discovery Miles 3 820
Mathematics and Computing - ICMC 2018…
Debdas Ghosh, Debasis Giri, … Hardcover R2,960 Discovery Miles 29 600
Bayesian Statistics in Action - BAYSM…
Raffaele Argiento, Ettore Lanzarone, … Hardcover R4,945 Discovery Miles 49 450
Complex Kleinian Groups
Angel Cano, Juan Pablo Navarrete, … Hardcover R1,551 Discovery Miles 15 510
Introduction to Stochastic Dynamic…
Sheldon M. Ross Paperback R1,488 Discovery Miles 14 880
Proceedings of the 8th International…
Magd Abdel Wahab Hardcover R5,750 Discovery Miles 57 500
Fluid Mechanics - A Problem-Solving…
Naseem Uddin Hardcover R3,556 Discovery Miles 35 560
New Approaches to Circle Packing in a…
Peter Gabor Szabo, Mihaly Csaba Markot, … Hardcover R3,018 Discovery Miles 30 180

 

Partners