0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (29)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Networking

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki
R2,981 Discovery Miles 29 810 Ships in 12 - 19 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R2,716 Discovery Miles 27 160 Ships in 12 - 19 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

Cache Memory Book, The (Hardcover, 2nd edition): Jim Handy Cache Memory Book, The (Hardcover, 2nd edition)
Jim Handy
R3,328 Discovery Miles 33 280 Ships in 10 - 15 working days

The Second Edition of The Cache Memory Book introduces systems designers to the concepts behind cache design. The book teaches the basic cache concepts and more exotic techniques. It leads readers through someof the most intricate protocols used in complex multiprocessor caches. Written in an accessible, informal style, this text demystifies cache memory design by translating cache concepts and jargon into practical methodologies and real-life examples. It also provides adequate detail to serve as a reference book for ongoing work in cache memory design.
The Second Edition includes an updated and expanded glossary of cache memory terms and buzzwords. The book provides new real world applications of cache memory design and a new chapter on cache"tricks."
Key Features
* Illustrates detailed example designs of caches
* Provides numerous examples in the form of block diagrams, timing waveforms, state tables, and code traces
* Defines and discusses more than 240 cache specific buzzwords, comparing in detail the relative merits of different design methodologies
* Includes an extensive glossary, complete with clear definitions, synonyms, and references to the appropriate text discussions

Computer Networks ISE - A Systems Approach (Paperback, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks ISE - A Systems Approach (Paperback, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,850 R1,733 Discovery Miles 17 330 Save R117 (6%) Ships in 12 - 19 working days

Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. The newly revised edition continues to offer an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The focus is not just on the specifications comprising today's systems but how key technologies and protocols actually work in real-world setting to solve specific problems. The new edition features increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features, a structure that makes it easier to teach top-down, less dependence on code to explain protocols, vastly improved ancillary package to include robust lecture slide package, and shift to higher levels in the protocol stock where the real innovation is happening currently. the book is targeted at networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.

IPv6 Socket API Extensions: Programmer's Guide (Paperback): Qing Li, Jinmei Tatuya, Keiichi Shima IPv6 Socket API Extensions: Programmer's Guide (Paperback)
Qing Li, Jinmei Tatuya, Keiichi Shima
R1,084 Discovery Miles 10 840 Ships in 10 - 15 working days

"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6 application programming intercfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPV6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need know to get up and running with IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6 APIsIncludes extensive line-by-line code sets with meticulous explanations of their implementationNumerous diagrams and illustrations to aid in fully understanding the socket APIs

Mobile IPv6 - Protocols and Implementation (Paperback): Qing Li, Tatuya Jinmei, Keiichi Shima Mobile IPv6 - Protocols and Implementation (Paperback)
Qing Li, Tatuya Jinmei, Keiichi Shima
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).

This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book. Source code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6 standard
Includes extensive line-by-line code sets with meticulous explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the implementation

Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed): Timothy J. Thompson, C.Bala... Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed)
Timothy J. Thompson, C.Bala Kumar, Paul J. Kline
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

Adoption of Bluetooth wireless technology has become ubiquitous in the last few years. One of the biggest steps forward is the standardization of Java APIs for Bluetooth wireless technology (JABWT). The latest updates to this standard is explained in detail in this book. The JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded overwhelmingly to the JABWT specification by implementing JABWT applications in mobile phones and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the Java APIs" explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in developing the standards of JABWT, this book provides the authoritative explanations and concrete examples needed to get started right away.
This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use. A NEW chapter on the Push Registry definition (a new feature in the 1.1 version of JSR-82) has been added. Finally, the new Essentials version of the book will update the remaining chapters to reflect changes in the latest Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added content on the website. This "bonus material" includes complete source code from examples in the book, the javex.bluetooth code package, the java.obex code package, an enhanced set of "Example Applications," and a tutorial on "Implementing JABWT on a Device." These code-heavy sections are actually more effective in electonic format where the application can be easily downloaded.

KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables software and hardware vendors to quickly develop Bluetooth applications for mobile devices in an increasingly competitive market.
* The updated material examines crucial programming areas (including RFCOMM, OBEX, device discovery, service discovery, and L2CAP), which allows developers to not only successfully design, but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal Push Registry feature ? a recent development that will help programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in implementing the Java APIs specification, the book allows developers to identify with the text and encourages repeated reference.

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 (Paperback): Kieran McCorry Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 (Paperback)
Kieran McCorry
R2,683 Discovery Miles 26 830 Ships in 10 - 15 working days

Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. This book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. The book describes various deployment topologies and environments to cater for a multitude of different organizational requirements. The book has been updated to reflect the new changes that Microsoft introduced with Exchange 2003 and SP1 and SP2 updates in relation to major architectural changes to migrations techniques and other services such as RPC over HTTP and journaling functionality.
* Details for consultants and system administrators to migrate from older versions of Exchange 5.5 and Exchange 2000 to the latest revisions of Exchange 2003
* Critical information on integration with Office 2003 and Windows 2003
* Based on actual implementations of the released version of Exchange
2003 in larger enterprise environments
* NEW! Cover critical updates to Exchange 2003 with updates from SP1 and SP2, such as new implementations of RPC over HTTP and cross site migrations
* NEW! Coverage of the Exchange journaling feature updates in Exchange
2003 SP1 and SP2

GMPLS - Architecture and Applications (Paperback): Adrian Farrel, Igor Bryskin GMPLS - Architecture and Applications (Paperback)
Adrian Farrel, Igor Bryskin
R2,278 Discovery Miles 22 780 Ships in 10 - 15 working days

The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. "GMPLS: Architecture and Applications" brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively.
This book begins by defining GMPLS s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.
+ Written by two industry researchers at the forefront of the development of GMPLS.
+ Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering.
+ Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection.
+ Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs.
+ Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system."

Smart Phone and Next Generation Mobile Computing (Paperback): Pei Zheng, Lionel Ni Smart Phone and Next Generation Mobile Computing (Paperback)
Pei Zheng, Lionel Ni
R2,141 Discovery Miles 21 410 Ships in 10 - 15 working days

This in-depth technical guide is an essential resource for anyone involved in the development of "smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. "Smart Phone and Next-Generation Mobile Computing" shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

Business Continuity and Disaster Recovery for InfoSec Managers (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD,... Business Continuity and Disaster Recovery for InfoSec Managers (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,515 Discovery Miles 25 150 Ships in 10 - 15 working days

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining second site back up and recovery
.Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters"

Globus (R) Toolkit 4 - Programming Java Services (Paperback): Borja Sotomayor, Lisa Childers Globus (R) Toolkit 4 - Programming Java Services (Paperback)
Borja Sotomayor, Lisa Childers
R1,932 Discovery Miles 19 320 Ships in 10 - 15 working days

The Globus Toolkit (http: //www.globus.org/toolkit/) is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. "Globus Toolkit 4: Programming Java Services" provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you're making the leap into Grid Computing using the Globus Toolkit, you'll want "Globus Toolkit 4: Programming Java Services" at your side as you take your first steps.
+ Written for newcomers to Globus Toolkit, but filled with useful information for experienced users.
+ Clearly situates Globus application development within the context of Web Services and evolving Grid standards.
+ Provides detailed coverage of Web Services programming with the Globus Toolkit's Java WS Core component.
+ Covers basic aspects of developing secure services using the Grid Security Infrastructure (GSI).
+ Uses simple, didactic examples throughout the book, but also includes a more elaborate example, the FileBuy application, that showcases common design patterns found in Globus applications.
+ Concludes with useful reference appendices.

IM Instant Messaging Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP IM Instant Messaging Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,683 Discovery Miles 26 830 Ships in 10 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Grid Computing - The Savvy Manager's Guide (Paperback): Pawel Plaszczak, Richard Wellner Jr. Grid Computing - The Savvy Manager's Guide (Paperback)
Pawel Plaszczak, Richard Wellner Jr.
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.
Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company s culture.
Grid Computing has an Online Companion at www.savvygrid.com with contents, details, community forum, and latest updates for the material.
* Sketches the history of grid computing, showing how it made the leap from academia to business.
* Examines the criteria you'll need to meet to make your network "grid-enabled."
* Explains how a grid-based solution can be made to meet key organizational requirements, including security, scheduling, data storage, and fault-tolerance.
* Surveys the approaches currently available and helps you choose the one that will best meet your needs, both now and in the future.
* Focuses heavily on the competitive advantages you can reap from grid computing, and provides advice on convincing your organization to adopt grid computing and making a successful transition."

IPv6 Network Programming (Paperback): Jun-ichiro Hagino IPv6 Network Programming (Paperback)
Jun-ichiro Hagino
R2,252 Discovery Miles 22 520 Ships in 10 - 15 working days

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.): Mark A. Franklin, Patrick Crowley, Haldun... Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.)
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
R2,940 Discovery Miles 29 400 Ships in 10 - 15 working days

Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors.
Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service.
.Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linkopings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington.
.Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum."

Bluetooth Application Programming with the Java APIs (Paperback, 1st ed): C.Bala Kumar, Paul J. Kline, Timothy J. Thompson Bluetooth Application Programming with the Java APIs (Paperback, 1st ed)
C.Bala Kumar, Paul J. Kline, Timothy J. Thompson
R2,441 Discovery Miles 24 410 Ships in 10 - 15 working days

Adoption of Bluetooth wireless technology has made great strides in the last few years. One of the biggest steps forward the standardization of Java APIs for Bluetooth wireless technology (JABWT) is explained in detail in this book. The JABWT standard, defined by the JSR-82 specification, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded to the JABWT specification by announcing mobile phones and other products that will run JABWT applications. Bluetooth Application Programming with the Java APIs explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in the definition of JABWT, this book provides the authoritative explanations and concrete examples you need to get started right away.
About the Authors
"C Bala Kumar" is a Distinguished Member of the Technical Staff at Motorola. He chaired the industry expert group that defined the Java APIs for Bluetooth wireless technology. He currently leads the systems software team for wireless platforms in Motorola's Semiconductor Products Sector. "Paul J. Kline" is a Distinguished Member of the Technical Staff at Motorola and the maintenance lead for the JABWT specification. He currently works on the System Software Architecture team in Motorola's Semiconductor Products Sector. "Timothy J. Thompson" is a Senior Software Engineer on the System Software Architecture team in Motorola's Semiconductor Products Sector. He was the OBEX architect on the JABWT specification team at Motorola.
* Written by experts the authors led the industry team that defined the JABWT standard and the Motorola team that developed the first JABWT implementation
* Covers JABWT in depth and goes beyond the specification to explain how to use the standard effectively
* A helpful resource both to Java programmers interested in Bluetooth wireless technology and to business managers interested in its potential for creating new business opportunities
* Digs deeply into the programming areas you must master to successfully design and build JABWT applications, including RFCOMM, OBEX, device discovery, service discovery, and L2CAP
* Details the real-world issues involved in programming Bluetooth devices and implementing the JABWT specification
* Organized into sections that explicitly address the different needs of programmers, business managers, and project managers"

TCP/IP Clearly Explained (Paperback, 4th edition): Peter Loshin TCP/IP Clearly Explained (Paperback, 4th edition)
Peter Loshin
R2,693 Discovery Miles 26 930 Ships in 10 - 15 working days

With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS).
The improvements go far beyond the updated material: they also include an all-new approach that examines the TCP/IP protocol stack from the top down, beginning with the applications you may already understand and only then moving deeper to the protocols that make these applications possible. You also get a helpful overview of the "life" of an Internet packet, covering all its movements from inception to final disposition.
If you're looking for nothing more than information on the protocols comprising TCP/IP networking, there are plenty of books to choose from. If you want to understand TCP/IP networking-why the protocols do what they do, how they allow applications to be extended, and how changes in the environment necessitate changes to the protocols-there's only the one you hold in your hands.
* Explains-clearly and holistically, but without oversimplification-the core protocols that make the global Internet possible.
* Fully updated to cover emerging technologies that are critical to the present and future of the Internet.
* Takes a top-down approach that begins with the familiar application layer, then proceeds to the protocols underlying it, devoting attention to each layer's specifics.
* Divided into organized, easy-to-follow sections on the concepts and fundamentals of networking, Internet applications, transport protocols, the Internet layer and infrastructure, and practical internetworking.

Multicast Sockets - Practical Guide for Programmers (Paperback): David Makofske, Kevin Almeroth Multicast Sockets - Practical Guide for Programmers (Paperback)
David Makofske, Kevin Almeroth
R1,188 Discovery Miles 11 880 Ships in 10 - 15 working days


"Multicast Sockets: Practical Guide for Programmers" is a hands-on, application-centric approach to multicasting (as opposed to a network-centric one) that is filled with examples, ideas, and experimentation. Each example builds on the last to introduce multicast concepts, frameworks, and APIs in an engaging manner that does not burden the reader with lots of theory and jargon. The book is an introduction to multicasting but assumes that the reader has a background in network programming and is proficient in C or Java. After reading the book, you will have a firm grasp on how to write a multicast program.
Features:
* Author team of instructor and application programmer is reflected in this rich instructional and practical approach to the subject material
* Only book available that provides a clear, concise, application-centric approach to programming multicast applications and covers several languages C, Java, and C# on the .NET platform
* Covers important topics like service models, testing reachability, and addressing and scoping.
* Includes numerous examples and exercises for programmers and students to test what they have learned"

High Performance Data Network Design - Design Techniques and Tools (Paperback): Tony Kenyon High Performance Data Network Design - Design Techniques and Tools (Paperback)
Tony Kenyon
R2,822 Discovery Miles 28 220 Ships in 10 - 15 working days

High-Performance Data Network Design contains comprehensive coverage of network design, performance, and availability. Tony Kenyon provides the tools to solve medium- to large-scale data network design problems from the ground up. He lays out a practical and systematic approach that integrates network planning, research, design, and deployment, using state-of-the-art techniques in performance analysis, cost analysis, simulation, and topology modeling.
The proliferation and complexity of data networks today is challenging our ability to design and manage them effectively. A new generation of Internet, e-commerce, and multimedia applications has changed traditional assumptions on traffic dynamics, and demands tight quality of service and security guarantees. These issues, combined with the economics of moving large traffic volumes across international backbones, mean that the demands placed on network designers, planners, and managers are now greater than ever before. High-Performance Data Network Design is a "must have" for anyone seriously involved in designing data networks. Together with the companion volume, Data Networks: Routing, Security, and Performance Optimization, this book gives readers the guidance they need to plan, implement, and optimize their enterprise infrastructure.
-Provides real insight into the entire design process
-Includes basic principles, practical advice, and examples of design for industrial-strength enterprise data networks
-Integrates topics often overlooked-backbone optimization, bottleneck analysis, simulation tools, and network costing

Networking Explained (Paperback, 2nd edition): Michael Gallo, William M Hancock Phd Cissp Cism Networking Explained (Paperback, 2nd edition)
Michael Gallo, William M Hancock Phd Cissp Cism
R2,613 Discovery Miles 26 130 Ships in 10 - 15 working days

Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.
Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
Wireless networks
Convergence of voice and data
Multimedia networking

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R2,442 Discovery Miles 24 420 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Virtual Private Networks - Making the Right Connection (Paperback): Dennis Fowler Virtual Private Networks - Making the Right Connection (Paperback)
Dennis Fowler
R2,029 Discovery Miles 20 290 Ships in 10 - 15 working days

Network-dependent companies are excited by the benefits promised by the virtual private network, including lower costs, greater flexibility, and improvements in connectivity. But they also have questions: What benefits are real? How can they be measured? What are the expenses and the dangers?

Virtual Private Networks: Making the Right Connection is an intelligent introduction written especially for business and IT professionals who want a realistic assessment of what a VPN can provide for their organizations. Covering advantages and risks, this book expands your understanding of what you can do with a VPN, while detailing all that implementing it will demand of you. With its help, you'll find your way through VPN hype to the answers you need to make sound decisions.
* Thoroughly explains VPN concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions.
* Covers essential VPN topics like tunneling, encapsulation, encryption, security, and protocols.
* Provides detailed points of comparison between typical VPN costs and the costs of maintaining traditional WANs.
* Offers frank consideration of the hidden costs and risks sometimes associated with VPNs, helping you decide if a VPN is right for you.
* Lists and assesses the software and hardware products you may need to implement a VPN.
* Discusses both Internet-based VPNs and VPN services offered by providers of "private" ATM and frame relay networks, detailing the pros and cons of each.

Digital Compression for Multimedia - Principles and Standards (Hardcover): Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich... Digital Compression for Multimedia - Principles and Standards (Hardcover)
Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich Baker, David Lindbergh
R3,700 Discovery Miles 37 000 Ships in 9 - 17 working days

Drawing on their experience in industry, research, and academia, this powerful author team combines their expertise to provide an accessible guide to data compression standards and techniques and their applications. The essential ideas and motivation behind the various compression methods are presented, and insight is provided into the evolution of the standards. Standards-compliant design alternatives are discussed, and some noncompliant designs also are treated.

Covering the fundamental underpinnings of the most widely used compression methods, this book is intended for engineers and computer scientists designing, manufacturing, and implementing compression systems, as well as system integrators, technical managers, and researchers. It provides, in a single source, an overview of the current standards for speech, audio, video, image, fax, and file compression.
* Authored by five experts from industry and academia who are heavily involved in research, development, and standards-setting activities
* Covers the full spectrum of multimedia compression standards including those for lossless data compression, speech coding, high-quality audio coding, still image compression, facsimile, and video compression
* Provides enough theory for you to understand the building blocks of the compression systems discussed, with appendices containing necessary algorithmic details and mathematical foundations

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dynamic Business Process Formation for…
Nikolay Mehandjiev, Paul Grefen Hardcover R4,507 Discovery Miles 45 070
Wireless Communication Electronics by…
Robert Sobot Hardcover R2,729 Discovery Miles 27 290
Regional Innovation Impact of…
Robert Tijssen, John Edwards, … Hardcover R3,024 Discovery Miles 30 240
Jo's Boys
Louisa May Alcott Hardcover R839 Discovery Miles 8 390
The Curse Of Teko Modise
Nikolaos Kirkinis Paperback  (2)
R250 R226 Discovery Miles 2 260
Around the World in 80 Days
Jules Verne Hardcover R671 Discovery Miles 6 710
The Land Is Ours - Black Lawyers And The…
Tembeka Ngcukaitobi Paperback  (11)
R400 R360 Discovery Miles 3 600
Jacobians Of Matrix Transformation And…
Arak M. Mathai Hardcover R2,689 Discovery Miles 26 890
Space Capacity Building in the XXI…
Stefano Ferretti Hardcover R2,952 Discovery Miles 29 520
Frege: A Guide for the Perplexed
Edward Kanterian Hardcover R3,535 Discovery Miles 35 350

 

Partners