|
Books > Academic & Education > Professional & Technical > Networking
Offering new services is a great way for your organization to drive
traffic and boost revenue, and what better foundation for these
services than IP? This much is a given. The difficulty is uniting
business and technical perspectives in a cohesive development and
deployment process.
Meeting this challenge is the focus of "Developing IP-Based
Services." The only book of its kind devoted exclusively to
IP-based services, it provides a blueprint for all the engineers,
managers, and analysts who must come together to build these
services and bring them online.
Inside, you'll find just the right balance of business and
technical coverage, introduced with a lucid discussion of the
principles of service development and wrapped up with three case
studies illustrating effective provisioning in today's marketplace.
Read the chapters relating to your role, and you'll play it more
successfully. Have your team read the entire book, and you'll
achieve a level of collaboration and shared understanding that will
quickly accrue to the bottom line.
* Valuable insight from authors with extensive service provisioning
and product development experience.
* Written for business and technical readers at a wide range of
companies, including established telecoms, ISPs, ASPs, Clecs,
bandwidth brokers, and vendors.
* Probes the business issues that will make or break your effort,
including shortening the development cycle and choosing a
competitive model.
* Provides the technical coverage required for successful
implementation, according to the terms of the business model you
choose.
* Focuses on the IP technologies that offer your service and its
users the greatest value, including MPLS, Voice Over IP, and
multicast.
* Helps you meet tough challenges relating to security and Quality
of Service.
* Concludes with case studies illustrating successful service
development and deployment in three companies.
""This is a comprehensive book covering architecture,
implementation, and operational use of all the current approaches
to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not
only covers most of the modern approaches to management but also
includes interoperation between these approaches and the use of
stand-alone tools such as protocol analyzers. It will be very
useful as a reference book for students, researchers, and industry
practitioners.""
-Professor Morris Sloman, Department of Computing, Imperial
College of Science Technology and Medicine
""A comprehensive reference on the management of networked
systems, this book is a must-have for any network or management
system architect and anybody else in need of a deep understanding
of network management technologies, tools, and practices. Professor
Hegering and his team present a complete analysis of integrated
network management architectures, tools, system development, and
operational use.""
-Branislav Meandzija, General Instrument Corporation
""Highly respected experts Hegering, Abeck, and Neumair offer
the most comprehensive presentation of systems and network
management that I've seen to date. This book provides an excellent
foundation of traditional and emergent technologies that every
student and industry practitioner should read.""
-Lisa Phifer, Vice President, Core Competence, Inc.
Features
Teaches the enduring principles at work in a holistic, integrated
approach to systems management.
Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as
Java- and Web-based management architectures.
Presents the perspective of an IT service provider responsible for
maintaining Quality of Service levels.
Describes the functionality of management tools used in the real
world-and expert advice on choosing one right for your
organization.
* Teaches the enduring principles at work in a holistic, integrated
approach to systems management.
* Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as
Java- and Web-based management architectures.
* Presents the perspective of an IT service provider responsible
for maintaining Quality of Service levels.
* Describes the functionality of management tools used in the real
world-and expert advice on choosing one right for your
organization.
Policy-Based Network Management (PBNM) systems enable business
rules and procedures to be translated into policies that configure
and control the network and its services. Those who manage network
systems are aware that this approach can benefit both network
management as well as the development of applications that use
network services; however, the details surrounding these systems
has been obscured by marketing hype, numerous acronyms, and
theoretical complexities.
Policy-Based Network Management: Solutions for the Next Generation
cuts through the hype surrounding PBNM and makes it approachable
for those who really need to understand what it has to offer. The
author, founder of the IETF Policy Framework working group,
discusses system requirements, information models, and system
components for Policy-Based Management. He also provide
practitioners with a resource for developing and/or incorporating
PBNM systems. As network systems become larger and more complex,
creating policies for them has become a crucial step in the
management of network systems, and this book is a welcome addition
to this exciting approach.
* Presents a completely new approach to PBNM that unites the
business, system, and implementation spheres.
* As the basis for examples and discussion, uses the DEN-ng
information model, an easy-to-understand open standard tied closely
to eTOM and NGOSS.
* Introduces the Ponder system, then examines Ponder extensions
designed to enhance the structure of high-level policies and their
application in a PBNM system.
* Filled with examples illustrating how policies are most
effectively used in a PBNM system and what new directions PBNM is
likely to take.
For companies in and around the telecommunications field, the past
few years have been a time of extraordinary change-technologically
and legally. The enacting of the Telecommunications Act of 1996 and
the development of international trade agreements have
fundamentally changed the environment in which your business
operates, creating risks, responsibilities, and opportunities that
were not there before.
Until now, you'd have had a hard time finding a serious business
book that offered any more than a cursory glance at this
transformed world. But at last there's a resource you can depend on
for in-depth analysis and sound advice. Written in
easy-to-understand language, "Telecommunications Law in the
Internet Age" systematically examines the complex
interrelationships of new laws, new technologies, and new business
practices, and equips you with the practical understanding you need
to run your enterprise optimally within today's legal
boundaries.
* Offers authoritative coverage from a lawyer and
telecommunications authority who has been working in the field for
over three decades.
* Examines telecommunications law in the U.S., at both the federal
and state level.
* Presents an unparalleled source of information on international
trade regulations and their effects on the industry.
* Covers the modern telecommunications issues with which most
companies are grappling: wireless communication, e-commerce,
satellite systems, privacy and encryption, Internet taxation,
export controls, intellectual property, spamming, pornography,
Internet telephony, extranets, and more.
* Provides guidelines for preventing inadvertent violations of
telecommunications law.
* Offers guidance on fending off legal and illegal attacks by
hackers, competitors, and foreign governments.
* Helps you do more than understand and obey the law: helps you
thrive within it.
Information processing in sensor networks is a rapidly emerging
area of computer science and electrical engineering research.
Because of advances in micro-sensors, wireless networking and
embedded processing, ad hoc networks of sensor are becoming
increasingly available for commercial, military, and homeland
security applications. Examples include monitoring (e.g., traffic,
habitat, security), industrail sensing and diagnostics (e.g.,
factory, appliances), infrastructures (i.e., power grid, water
distribution, waste disposal) and battle awareness (e.g.,
multi-target tracking). This book introduces practitioners to the
fundamental issues and technology constraints concerning various
aspects of sensor networks such as information organization,
querying, routing, and self-organization using concrete examples
and does so by using concrete examples from current research and
implementation efforts.
.Written for practitioners, researchers, and students and relevant
to all application areas, including environmental monitoring,
industrial sensing and diagnostics, automotive and transportation,
security and surveillance, military and battlefield uses, and
large-scale infrastructural maintenance.
.Skillfully integrates the many disciplines at work in wireless
sensor network design: signal processing and estimation,
communication theory and protocols, distributed algorithms and
databases, probabilistic reasoning, energy-aware computing, design
methodologies, evaluation metrics, and more.
.Demonstrates how querying, data routing, and network
self-organization can support high-level information-processing
tasks."
Guaranteeing performance and prioritizing data across the Internet
may seem nearly impossible because of an increasing number of
variables that can affect and undermine service. But if you're
involved in developing and implementing streaming video or voice,
or other time-sensitive Internet applications, you understand
exactly what's at stake in establishing Quality of Service (QoS)
and recognize the benefits it will bring to your company.
What you need is a reliable guide to the latest QoS techniques that
addresses the Internet's special challenges. "Internet QoS" is
it-the first book to dig deep into the issues that affect your
ability to provide performance and prioritization guarantees to
your customers and users This book gives a comprehensive view of
key technologies and discusses various analytical techniques to
help you get the most out of network resources as you strive to
make, and adhere to, meaningful QoS guarantees.
* Includes valuable insights from a Bell Labs engineer with 14
years of experience in data networking and Internet protocol
design.
* Details the enhancements to current Internet architectures and
discusses new mechanisms and network management capabilities that
QoS will require.
* Focuses on the four main areas of Internet QoS: integrated
services, differentiated services, MPLS (Multiprotocol Label
Switching), and traffic engineering.
Drawing on their experience in industry, research, and academia,
this powerful author team combines their expertise to provide an
accessible guide to data compression standards and techniques and
their applications. The essential ideas and motivation behind the
various compression methods are presented, and insight is provided
into the evolution of the standards. Standards-compliant design
alternatives are discussed, and some noncompliant designs also are
treated.
Covering the fundamental underpinnings of the most widely used
compression methods, this book is intended for engineers and
computer scientists designing, manufacturing, and implementing
compression systems, as well as system integrators, technical
managers, and researchers. It provides, in a single source, an
overview of the current standards for speech, audio, video, image,
fax, and file compression.
* Authored by five experts from industry and academia who are
heavily involved in research, development, and standards-setting
activities
* Covers the full spectrum of multimedia compression standards
including those for lossless data compression, speech coding,
high-quality audio coding, still image compression, facsimile, and
video compression
* Provides enough theory for you to understand the building blocks
of the compression systems discussed, with appendices containing
necessary algorithmic details and mathematical foundations
Computer Security, Third Edition contains the best ideas on recent
advances in computer hardware and the spread of personal computer
technology. It includes a complete and comprehensive introduction
to computer security, as well as coverage of computer crime,
systems security, and cryptology. Convinced that there is no such
thing as computer security, only various degrees of insecurity,
John Carroll presents the best concepts that high technology,
classical security practice, and common sense have to offer to help
reduce insecurity to the lowest possible level. This thoroughly
enhanced third edition is an essential text for everyone involved
with the operation and security of the computer complexes that are
the heart of today's businesses. In addition to completely updating
the original matter, Computer Security, Third Edition includes new
information on: computer crime and the law; physical security;
communications; surveillance; and risk management.
Computer Networks ISE, Fifth Edition, is the sole introductory
networking book written by authors with first-hand experience with
several of the protocols covered in the book who have actually
designed some of them as well and who are still actively designing
the computer networks today. The newly revised edition continues to
offer an enduring, practical understanding of networks and their
building blocks through rich, example-based instruction. The focus
is not just on the specifications comprising today's systems but
how key technologies and protocols actually work in real-world
setting to solve specific problems. The new edition features
increased accessibility by clearly separating the advanced material
from more fundamental via special headings and boxed features, a
structure that makes it easier to teach top-down, less dependence
on code to explain protocols, vastly improved ancillary package to
include robust lecture slide package, and shift to higher levels in
the protocol stock where the real innovation is happening
currently. the book is targeted at networking professionals and
upper level undergraduate and graduate students in CS, EE, and CSE
programs.
"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6
application programming intercfaces (API) extensions and
enhancements that have been made to the socket APIs. The book
begins with a brief overview of the API specifications along with
sample code usage. Then an explanation of the internal kernel
implementation that realizes the services offered by the API sets
is detailed. Also descriptions of several standard user libraries
that have been extended or created to support IPV6 are reviewed.
Includes various examples which illustrate how to write portable
applications that can run on either IPv4 or IPv6 networks. Succinct
treatment of everything you need know to get up and running with
IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6
APIsIncludes extensive line-by-line code sets with meticulous
explanations of their implementationNumerous diagrams and
illustrations to aid in fully understanding the socket APIs
Mobile IPv6 has become the key enabling technology for mobile
data and multimedia services and devices worldwide (i.e., cellular
systems, VoIP handovers over LAN, multi-access network handovers,
location privacy, enterprise mobile networking, etc.).
This book covers the IPv6 host mobility protocol known as
"mobile IPv6" and begins with a basic description of mobile IPv6
and then details protocol specifications and data structures as
well as actual implementation. A sample configuration for a real
Mobile IPv6 operation is provided at the end of the book. Source
code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6
standard
Includes extensive line-by-line code sets with meticulous
explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the
implementation
The third edition of Optical Networks continues to be the
authoritative source for information on optical networking
technologies and techniques. Componentry and transmission are
discussed in detail with emphasis on practical networking issues
that affect organizations as they evaluate, deploy, or develop
optical networks. New updates in this rapidly changing technology
are introduced. These updates include sections on pluggable optical
transceivers, ROADM (reconfigurable optical add/drop multiplexer),
and electronic dispersion compensation. Current standards updates
such as G.709 OTN, as well as, those for GPON, EPON, and BPON are
featured. Expanded discussions on multimode fiber with additional
sections on photonic crystal and plastic fibers, as well as
expanded coverage of Ethernet and Multiprotocol Label Switching
(MPLS).
This book clearly explains all the hard-to-find information on
architecture, control and management. It serves as your guide at
every step of optical networking-- from planning to implementation
through ongoing maintenance. This book is your key to thoroughly
understanding practical optical networks.
In-depth coverage of optimization, design, and management of the
components and transmission of optical networks.
Filled with examples, figures, and problem sets to aid in
development of dependable, speedy networks.
Focuses on practical, networking-specific issues: everything you
need to know to implement currently available optical
solutions.
Adoption of Bluetooth wireless technology has become ubiquitous in
the last few years. One of the biggest steps forward is the
standardization of Java APIs for Bluetooth wireless technology
(JABWT). The latest updates to this standard is explained in detail
in this book. The JABWT standard, defined by the JSR-82 Java
Specification Request, supports rapid development of Bluetooth
applications that are portable, secure, and highly-usable. Wireless
device manufacturers have responded overwhelmingly to the JABWT
specification by implementing JABWT applications in mobile phones
and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the
Java APIs" explains in detail how to write Bluetooth applications
using the Java APIs to exploit the power of both technologies.
Written by the specification lead for JSR-82 and two other key
participants in developing the standards of JABWT, this book
provides the authoritative explanations and concrete examples
needed to get started right away.
This book provides embedded Java developers with to-the-point
information on the APIs in the specification with detailed
programmatic examples of the APIs in use. A NEW chapter on the Push
Registry definition (a new feature in the 1.1 version of JSR-82)
has been added. Finally, the new Essentials version of the book
will update the remaining chapters to reflect changes in the latest
Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added
content on the website. This "bonus material" includes complete
source code from examples in the book, the javex.bluetooth code
package, the java.obex code package, an enhanced set of "Example
Applications," and a tutorial on "Implementing JABWT on a Device."
These code-heavy sections are actually more effective in electonic
format where the application can be easily downloaded.
KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables
software and hardware vendors to quickly develop Bluetooth
applications for mobile devices in an increasingly competitive
market.
* The updated material examines crucial programming areas
(including RFCOMM, OBEX, device discovery, service discovery, and
L2CAP), which allows developers to not only successfully design,
but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal
Push Registry feature ? a recent development that will help
programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in
implementing the Java APIs specification, the book allows
developers to identify with the text and encourages repeated
reference.
In a local area network (LAN) or intranet, there are many pieces of
hardare trying to gain access to the network transmission media at
the same time (i.e., phone lines, coax, wireless, etc.). However, a
network cable or wireless transmission frequency can physically
only allow one node to use it at a given time. Therefore, there
must be some way to regulate which node has control of the medium
(a media access control, or MAC, protocol). Ethernet is a MAC
protocol; it is one way to regulate physical access to network
tranmission media.
Ethernet networking is used primarily by networks that are
contained within a single physical location. If you need to design,
install, and manage a network in such an envronment, i.e., home or
small business office, then this book will give you an in-depth
understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of
networks so that the reader gains a working familiarity with common
networking terminology and acronyms.
In addition, this books explains not only how to choose and
configure network hardware but also provides practical information
about the types of network devices and software needed to make it
all work. Tips and direction on how to manage an Ethernet network
are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to
look at the entire network from bottom to top, along with enough
technical detail to enable the reader to make intelligent choices
about what types of transmission media are used and the way in
which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current
technologies and emerging trends in gigabit and fast Ethernet,
WiFi, routers, and security issues
*Teaches how to design and select complementary components of
Ethernet networks with a focus on home and small business
applications
*Discuses the various types of cables, software, and hardware
involved in constructing, connecting, operating and monitoring
Ethernet networks
Exchange Server is necessary to support Outlook and SharePoint in
the enterprise messaging at virtually all Fortune 1000 firms.
Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and
Migration describes everything that you need to know about
designing, planning, and implementing an Exchange 2003 environment.
This book covers, in detail, the tools and techniques that
messaging system planners and administrators will require in order
to establish a functioning interoperability environment between
Exchange 2003 and previous versions of Exchange including Exchange
5.5 and Exchange 2000. The book describes various deployment
topologies and environments to cater for a multitude of different
organizational requirements. The book has been updated to reflect
the new changes that Microsoft introduced with Exchange 2003 and
SP1 and SP2 updates in relation to major architectural changes to
migrations techniques and other services such as RPC over HTTP and
journaling functionality.
* Details for consultants and system administrators to migrate from
older versions of Exchange 5.5 and Exchange 2000 to the latest
revisions of Exchange 2003
* Critical information on integration with Office 2003 and Windows
2003
* Based on actual implementations of the released version of
Exchange
2003 in larger enterprise environments
* NEW! Cover critical updates to Exchange 2003 with updates from
SP1 and SP2, such as new implementations of RPC over HTTP and cross
site migrations
* NEW! Coverage of the Exchange journaling feature updates in
Exchange
2003 SP1 and SP2
The Globus Toolkit (http: //www.globus.org/toolkit/) is a key
technology in Grid Computing, the exciting new computing paradigm
that allows users to share processing power, data, storage, and
other computing resources across institutional and geographic
boundaries. "Globus Toolkit 4: Programming Java Services" provides
an introduction to the latest version of this widely acclaimed
toolkit. Based on the popular web-based The Globus Toolkit 4
Programmer's Tutorial, this book far surpasses that document,
providing greater detail, quick reference appendices, and many
additional examples. If you're making the leap into Grid Computing
using the Globus Toolkit, you'll want "Globus Toolkit 4:
Programming Java Services" at your side as you take your first
steps.
+ Written for newcomers to Globus Toolkit, but filled with useful
information for experienced users.
+ Clearly situates Globus application development within the
context of Web Services and evolving Grid standards.
+ Provides detailed coverage of Web Services programming with the
Globus Toolkit's Java WS Core component.
+ Covers basic aspects of developing secure services using the Grid
Security Infrastructure (GSI).
+ Uses simple, didactic examples throughout the book, but also
includes a more elaborate example, the FileBuy application, that
showcases common design patterns found in Globus
applications.
+ Concludes with useful reference appendices.
The last two years have seen significant developments in the
standardization of GMPLS and its implementation in optical and
other networks. "GMPLS: Architecture and Applications" brings you
completely up to date, providing the practical information you need
to put the growing set of GMPLS-supported services to work and
manage them effectively.
This book begins by defining GMPLS s place in a transport network,
leveraging your knowledge of MPLS to give you an understanding of
this radically new control plane technology. An overview of GMPLS
protocols follows, but the real focus is on what comes afterwards:
in-depth examinations of the architectures underpinning GMPLS in
real-world network environments and current and emerging GMPLS
applications. This one-of-a-kind resource delivers immensely useful
information for software architects, designers and programmers,
hardware developers, system testers, and network operators--and
also for managers and other decision-makers.
+ Written by two industry researchers at the forefront of the
development of GMPLS.
+ Provides a practical look at GMPLS protocols for signaling,
routing, link and resource management, and traffic
engineering.
+ Delves deep into the world of GMPLS applications, including
traffic engineering, path computation, layer one VPNs,
point-to-multipoint connectivity, service management, and resource
protection.
+ Explores three distinct GMPLS control plane architectures: peer,
overlay, and hybrid, and explains the GMPLS UNI and NNIs.
+ Explains how provisioning challenges can be met in multi-region
networks and details the provisioning systems and tools relied on
by the GMPLS control plane, along with the standard MIB modules
used to manage a GMPLS system."
This in-depth technical guide is an essential resource for anyone
involved in the development of "smart" mobile wireless technology,
including devices, infrastructure, and applications. Written by
researchers active in both academic and industry settings, it
offers both a big-picture introduction to the topic and detailed
insights into the technical details underlying all of the key
trends. "Smart Phone and Next-Generation Mobile Computing" shows
you how the field has evolved, its real and potential current
capabilities, and the issues affecting its future direction. It
lays a solid foundation for the decisions you face in your work,
whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the
terminal side, and the integration of different network types on
the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing
on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming
environments, including Microsoft Windows Mobile, Palm OS, Symbian,
J2ME, and Linux
+ Considers the limitations of existing terminal designs and
several pressing application design issues
+ Explores challenges and possible solutions relating to the next
phase of smart phone development, as it relates to services,
devices, and networks
+ Surveys a collection of promising applications, in areas ranging
from gaming to law enforcement to financial processing
Every year, nearly one in five businesses suffers a major
disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly
important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the
operational and day-to-day security
management requirements of business stability and disaster recovery
planning specifically tailored for the needs and requirements of an
Information Security Officer.
This book has been written by battle tested security consultants
who have based all the material, processes and problem- solving on
real-world planning and recovery events in enterprise environments
world wide.
John has over 25 years experience in the IT and security sector. He
is an often sought management consultant for large enterprise and
is currently a member of the Federal Communication Commission's
Homeland Security Network Reliability and Interoperability Council
Focus Group on Cybersecurity, working in the Voice over Internet
Protocol workgroup.
James has over 30 years experience in security operations and
technology assessment as a corporate security executive and
positions within the intelligence, DoD, and federal law enforcement
communities. He has a Ph.D. in information systems specializing in
information security and is a member of Upsilon Pi Epsilon (UPE),
the International Honor Society for the Computing and Information
Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business
functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining
second site back up and recovery
.Gives managers viable and efficient processes that meet new
government rules for saving and protecting data in the event of
disasters"
A decade ago, the corporate world viewed grid computing as a
curiosity. Today, it views it as an opportunity--a chance to reduce
costs, improve performance, fund new projects, and take advantage
of under-utilized capacity. The engineering behind this
transformation has been amply documented. Until now, however,
little has been written to prepare managers, executives, and other
decision-makers to implement grid computing in a sensible and
effective way.
Grid Computing: The Savvy Manager's Guide examines the technology
from a rigorous business perspective, equipping you with the
practical knowledge you need to assess your options and determine
what grid computing approach is right for your enterprise. This
book is heavy on real-world experience, distilling from a rich
assortment of case studies the best practices currently at work in
a variety of industries. Always attentive to grid computing s many
competitive advantages, it is also realistic about the challenges
of selling the idea to staff and making it a part of your company s
culture.
Grid Computing has an Online Companion at www.savvygrid.com with
contents, details, community forum, and latest updates for the
material.
* Sketches the history of grid computing, showing how it made the
leap from academia to business.
* Examines the criteria you'll need to meet to make your network
"grid-enabled."
* Explains how a grid-based solution can be made to meet key
organizational requirements, including security, scheduling, data
storage, and fault-tolerance.
* Surveys the approaches currently available and helps you choose
the one that will best meet your needs, both now and in the
future.
* Focuses heavily on the competitive advantages you can reap from
grid computing, and provides advice on convincing your organization
to adopt grid computing and making a successful transition."
BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the
operational and day-to-day security management requirements. IM,
used in enterprise networks can easily be reconfigured and allow
for potentially nonstop exposure; they require the level of
security be scrutinized carefully. This includes inherent security
flaws in various network architectures that result in additional
risks to otherwise secure converged networks. A few books cover
components of the architecture, design, theory, issues, challenges,
and recommended policies for IM security, but none of them address
IM issues in a manner that is useful for the day-to-day operations
and management of enterprise networks. IM Security is intended to
bridge this gap.
UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the
architecture, design, theory, issues, challenges, and recommended
policies for IM security. No book we know of addresses IM security
in a manner useful for day-to-day operations and management of
IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues,
challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of
IM-capable networks in today s corporate environment"
"Network Security" is a comprehensive resource written for anyone
who plans or implements network security measures, including
managers and practitioners. It offers a valuable dual perspective
on security: how your network looks to hackers who want to get
inside, and how you need to approach it on the inside to keep them
at bay.
You get all the hands-on technical advice you need to succeed, but
also higher-level administrative guidance for developing an
effective security policy. There may be no such thing as absolute
security, but, as the author clearly demonstrates, there is a huge
difference between the protection offered by routine reliance on
third-party products and what you can achieve by actively making
informed decisions. You ll learn to do just that with this book s
assessments of the risks, rewards, and trade-offs related
implementing security measures.
+ Helps you see through a hacker's eyes so you can make your
network more secure.
+ Provides technical advice that can be applied in any environment,
on any platform, including help with intrusion detection systems,
firewalls, encryption, anti-virus software, and digital
certificates.
+ Emphasizes a wide range of administrative considerations,
including security policies, user management, and control of
services and devices.
+ Covers techniques for enhancing the physical security of your
systems and network.
+ Explains how hackers use information-gathering to find and
exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining
root access to a server.
+ Addresses Denial of Service attacks, "malware," and
spoofing.
+ Includes appendices covering the TCP/IP protocol stack,
well-known ports, and reliable sources for security warnings and
updates."
This book contains everything you need to make your application
program support IPv6. IPv6 socket APIs (RFC2553) are fully
described with real-world examples. It covers security, a great
concern these days. To secure the Internet infrastructure, every
developer has to take a security stance - to audit every line of
code, to use proper API and write correct and secure code as much
as possible. To achieve this goal, the examples presented in this
book are implemented with a security stance. Also, the book leads
you to write secure programs. For instance, the book recommends
against the use of some of the IPv6 standard APIs - unfortunately,
there are some IPv6 APIs that are inherently insecure, so the book
tries to avoid (and discourage) the use of such APIs. Another key
issue is portability. The examples in the book should be applicable
to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for
future systems
* Deals with security concerns, including spam and email, by
presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world
examples
* Allows for portability to UNIX-based operating systems, MacOS X,
and Windows XP
In designing a network device, you make dozens of decisions that
affect the speed with which it will perform sometimes for better,
but sometimes for worse. Network Algorithmics provides a complete,
coherent methodology for maximizing speed while meeting your other
design goals.
Author George Varghese begins by laying out the implementation
bottlenecks that are most often encountered at four disparate
levels of implementation: protocol, OS, hardware, and architecture.
He then derives 15 solid principles ranging from the commonly
recognized to the groundbreaking that are key to breaking these
bottlenecks.
The rest of the book is devoted to a systematic application of
these principles to bottlenecks found specifically in endnodes,
interconnect devices, and specialty functions such as security and
measurement that can be located anywhere along the network. This
immensely practical, clearly presented information will benefit
anyone involved with network implementation, as well as students
who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this
title simply register on our textbook website
(textbooks.elsevier.com)and request access to the Computer Science
subject area. Once approved (usually within one business day) you
will be able to access all of the instructor-only materials through
the "Instructor Manual" link on this book's academic web page at
textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices,
(data copying, control transfer, demultiplexing, timers, and more)
and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including
Web servers.
. Presents techniques suitable specifically for interconnect
devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of
valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."
"Network Recovery" is the first book to provide detailed
information on protecting and restoring communication networks, and
it sets a sky-high standard for any that may follow. Inside, you ll
learn specific techniques that work at each layer of the networking
hierarchy including optical, SONET-SDH, IP, and MPLS as well as
multi-layer escalation strategies that offer the highest level of
protection. The authors begin with an incisive introduction to the
issues that define the field of network protection and restoration,
and as the book progresses they explain everything you need to know
about the relevant protocols, providing theoretical analyses
wherever appropriate. If you work for a network-dependent
organization, large or small, you ll want to keep Network Recovery
within reach at all times.
* Shows you how to implement protection and recovery techniques
that will save your organization time and money.
* Documents techniques for the optical, SONET-SDH, IP, and MPLS
layers, as well as multi-layer escalation strategies.
* Shows you how to evaluate these techniques in relation to one
another, so you can develop an optimal network recovery
design.
* Provides industry examples and simulation results.
* Delves into the inner workings of relevant protocols and offers
theoretical analyses wherever this information contributes to your
practical knowledge."
|
You may like...
Networking Explained
Michael Gallo, William M Hancock Phd Cissp Cism
Paperback
R2,746
Discovery Miles 27 460
|