0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (40)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Networking

Developing IP-Based Services - Solutions for Service Providers and Vendors (Hardcover): Monique Morrow, Kateel Vijayananda Developing IP-Based Services - Solutions for Service Providers and Vendors (Hardcover)
Monique Morrow, Kateel Vijayananda
R2,354 Discovery Miles 23 540 Ships in 12 - 17 working days


Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process.


Meeting this challenge is the focus of "Developing IP-Based Services." The only book of its kind devoted exclusively to IP-based services, it provides a blueprint for all the engineers, managers, and analysts who must come together to build these services and bring them online.
Inside, you'll find just the right balance of business and technical coverage, introduced with a lucid discussion of the principles of service development and wrapped up with three case studies illustrating effective provisioning in today's marketplace. Read the chapters relating to your role, and you'll play it more successfully. Have your team read the entire book, and you'll achieve a level of collaboration and shared understanding that will quickly accrue to the bottom line.
* Valuable insight from authors with extensive service provisioning and product development experience.
* Written for business and technical readers at a wide range of companies, including established telecoms, ISPs, ASPs, Clecs, bandwidth brokers, and vendors.
* Probes the business issues that will make or break your effort, including shortening the development cycle and choosing a competitive model.
* Provides the technical coverage required for successful implementation, according to the terms of the business model you choose.
* Focuses on the IP technologies that offer your service and its users the greatest value, including MPLS, Voice Over IP, and multicast.
* Helps you meet tough challenges relating to security and Quality of Service.
* Concludes with case studies illustrating successful service development and deployment in three companies.

Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover): Heinz-Gerd... Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover)
Heinz-Gerd Hegering, Sebastian Abeck, Bernhard Neumair
R3,531 Discovery Miles 35 310 Ships in 12 - 17 working days

""This is a comprehensive book covering architecture, implementation, and operational use of all the current approaches to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not only covers most of the modern approaches to management but also includes interoperation between these approaches and the use of stand-alone tools such as protocol analyzers. It will be very useful as a reference book for students, researchers, and industry practitioners.""

-Professor Morris Sloman, Department of Computing, Imperial College of Science Technology and Medicine

""A comprehensive reference on the management of networked systems, this book is a must-have for any network or management system architect and anybody else in need of a deep understanding of network management technologies, tools, and practices. Professor Hegering and his team present a complete analysis of integrated network management architectures, tools, system development, and operational use.""

-Branislav Meandzija, General Instrument Corporation

""Highly respected experts Hegering, Abeck, and Neumair offer the most comprehensive presentation of systems and network management that I've seen to date. This book provides an excellent foundation of traditional and emergent technologies that every student and industry practitioner should read.""

-Lisa Phifer, Vice President, Core Competence, Inc.

Features
Teaches the enduring principles at work in a holistic, integrated approach to systems management.
Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

* Teaches the enduring principles at work in a holistic, integrated approach to systems management.
* Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
* Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
* Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

Policy-Based Network Management - Solutions for the Next Generation (Hardcover, New): John Strassner Policy-Based Network Management - Solutions for the Next Generation (Hardcover, New)
John Strassner
R2,863 Discovery Miles 28 630 Ships in 12 - 17 working days

Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however, the details surrounding these systems has been obscured by marketing hype, numerous acronyms, and theoretical complexities.
Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes it approachable for those who really need to understand what it has to offer. The author, founder of the IETF Policy Framework working group, discusses system requirements, information models, and system components for Policy-Based Management. He also provide practitioners with a resource for developing and/or incorporating PBNM systems. As network systems become larger and more complex, creating policies for them has become a crucial step in the management of network systems, and this book is a welcome addition to this exciting approach.
* Presents a completely new approach to PBNM that unites the business, system, and implementation spheres.
* As the basis for examples and discussion, uses the DEN-ng information model, an easy-to-understand open standard tied closely to eTOM and NGOSS.
* Introduces the Ponder system, then examines Ponder extensions designed to enhance the structure of high-level policies and their application in a PBNM system.
* Filled with examples illustrating how policies are most effectively used in a PBNM system and what new directions PBNM is likely to take.

Telecommunications Law in the Internet Age (Hardcover): Sharon K Black Telecommunications Law in the Internet Age (Hardcover)
Sharon K Black
R3,508 Discovery Miles 35 080 Ships in 12 - 17 working days


For companies in and around the telecommunications field, the past few years have been a time of extraordinary change-technologically and legally. The enacting of the Telecommunications Act of 1996 and the development of international trade agreements have fundamentally changed the environment in which your business operates, creating risks, responsibilities, and opportunities that were not there before.


Until now, you'd have had a hard time finding a serious business book that offered any more than a cursory glance at this transformed world. But at last there's a resource you can depend on for in-depth analysis and sound advice. Written in easy-to-understand language, "Telecommunications Law in the Internet Age" systematically examines the complex interrelationships of new laws, new technologies, and new business practices, and equips you with the practical understanding you need to run your enterprise optimally within today's legal boundaries.
* Offers authoritative coverage from a lawyer and telecommunications authority who has been working in the field for over three decades.
* Examines telecommunications law in the U.S., at both the federal and state level.
* Presents an unparalleled source of information on international trade regulations and their effects on the industry.
* Covers the modern telecommunications issues with which most companies are grappling: wireless communication, e-commerce, satellite systems, privacy and encryption, Internet taxation, export controls, intellectual property, spamming, pornography, Internet telephony, extranets, and more.
* Provides guidelines for preventing inadvertent violations of telecommunications law.
* Offers guidance on fending off legal and illegal attacks by hackers, competitors, and foreign governments.
* Helps you do more than understand and obey the law: helps you thrive within it.

Wireless Sensor Networks - An Information Processing Approach (Hardcover, New): Feng Zhao, Leonidas Guibas Wireless Sensor Networks - An Information Processing Approach (Hardcover, New)
Feng Zhao, Leonidas Guibas
R2,515 Discovery Miles 25 150 Ships in 12 - 17 working days

Information processing in sensor networks is a rapidly emerging area of computer science and electrical engineering research. Because of advances in micro-sensors, wireless networking and embedded processing, ad hoc networks of sensor are becoming increasingly available for commercial, military, and homeland security applications. Examples include monitoring (e.g., traffic, habitat, security), industrail sensing and diagnostics (e.g., factory, appliances), infrastructures (i.e., power grid, water distribution, waste disposal) and battle awareness (e.g., multi-target tracking). This book introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.
.Written for practitioners, researchers, and students and relevant to all application areas, including environmental monitoring, industrial sensing and diagnostics, automotive and transportation, security and surveillance, military and battlefield uses, and large-scale infrastructural maintenance.
.Skillfully integrates the many disciplines at work in wireless sensor network design: signal processing and estimation, communication theory and protocols, distributed algorithms and databases, probabilistic reasoning, energy-aware computing, design methodologies, evaluation metrics, and more.
.Demonstrates how querying, data routing, and network self-organization can support high-level information-processing tasks."

Internet QoS - Architectures and Mechanisms for Quality of Service (Hardcover): Zheng Wang Internet QoS - Architectures and Mechanisms for Quality of Service (Hardcover)
Zheng Wang
R2,501 Discovery Miles 25 010 Ships in 12 - 17 working days



Guaranteeing performance and prioritizing data across the Internet may seem nearly impossible because of an increasing number of variables that can affect and undermine service. But if you're involved in developing and implementing streaming video or voice, or other time-sensitive Internet applications, you understand exactly what's at stake in establishing Quality of Service (QoS) and recognize the benefits it will bring to your company.


What you need is a reliable guide to the latest QoS techniques that addresses the Internet's special challenges. "Internet QoS" is it-the first book to dig deep into the issues that affect your ability to provide performance and prioritization guarantees to your customers and users This book gives a comprehensive view of key technologies and discusses various analytical techniques to help you get the most out of network resources as you strive to make, and adhere to, meaningful QoS guarantees.
* Includes valuable insights from a Bell Labs engineer with 14 years of experience in data networking and Internet protocol design.
* Details the enhancements to current Internet architectures and discusses new mechanisms and network management capabilities that QoS will require.
* Focuses on the four main areas of Internet QoS: integrated services, differentiated services, MPLS (Multiprotocol Label Switching), and traffic engineering.

Digital Compression for Multimedia - Principles and Standards (Hardcover): Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich... Digital Compression for Multimedia - Principles and Standards (Hardcover)
Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich Baker, David Lindbergh
R3,773 Discovery Miles 37 730 Ships in 9 - 15 working days

Drawing on their experience in industry, research, and academia, this powerful author team combines their expertise to provide an accessible guide to data compression standards and techniques and their applications. The essential ideas and motivation behind the various compression methods are presented, and insight is provided into the evolution of the standards. Standards-compliant design alternatives are discussed, and some noncompliant designs also are treated.

Covering the fundamental underpinnings of the most widely used compression methods, this book is intended for engineers and computer scientists designing, manufacturing, and implementing compression systems, as well as system integrators, technical managers, and researchers. It provides, in a single source, an overview of the current standards for speech, audio, video, image, fax, and file compression.
* Authored by five experts from industry and academia who are heavily involved in research, development, and standards-setting activities
* Covers the full spectrum of multimedia compression standards including those for lossless data compression, speech coding, high-quality audio coding, still image compression, facsimile, and video compression
* Provides enough theory for you to understand the building blocks of the compression systems discussed, with appendices containing necessary algorithmic details and mathematical foundations

Computer Security (Hardcover, 3rd edition): John M Carroll Computer Security (Hardcover, 3rd edition)
John M Carroll
R1,897 Discovery Miles 18 970 Ships in 12 - 17 working days

Computer Security, Third Edition contains the best ideas on recent advances in computer hardware and the spread of personal computer technology. It includes a complete and comprehensive introduction to computer security, as well as coverage of computer crime, systems security, and cryptology. Convinced that there is no such thing as computer security, only various degrees of insecurity, John Carroll presents the best concepts that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This thoroughly enhanced third edition is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. In addition to completely updating the original matter, Computer Security, Third Edition includes new information on: computer crime and the law; physical security; communications; surveillance; and risk management.

Computer Networks ISE - A Systems Approach (Paperback, 5th edition): Larry L. Peterson, Bruce S. Davie Computer Networks ISE - A Systems Approach (Paperback, 5th edition)
Larry L. Peterson, Bruce S. Davie
R1,887 R1,767 Discovery Miles 17 670 Save R120 (6%) Ships in 12 - 17 working days

Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. The newly revised edition continues to offer an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The focus is not just on the specifications comprising today's systems but how key technologies and protocols actually work in real-world setting to solve specific problems. The new edition features increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features, a structure that makes it easier to teach top-down, less dependence on code to explain protocols, vastly improved ancillary package to include robust lecture slide package, and shift to higher levels in the protocol stock where the real innovation is happening currently. the book is targeted at networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.

IPv6 Socket API Extensions: Programmer's Guide (Paperback): Qing Li, Jinmei Tatuya, Keiichi Shima IPv6 Socket API Extensions: Programmer's Guide (Paperback)
Qing Li, Jinmei Tatuya, Keiichi Shima
R1,137 Discovery Miles 11 370 Ships in 10 - 15 working days

"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6 application programming intercfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPV6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need know to get up and running with IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6 APIsIncludes extensive line-by-line code sets with meticulous explanations of their implementationNumerous diagrams and illustrations to aid in fully understanding the socket APIs

Mobile IPv6 - Protocols and Implementation (Paperback): Qing Li, Tatuya Jinmei, Keiichi Shima Mobile IPv6 - Protocols and Implementation (Paperback)
Qing Li, Tatuya Jinmei, Keiichi Shima
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).

This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book. Source code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6 standard
Includes extensive line-by-line code sets with meticulous explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the implementation

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki
R3,220 Discovery Miles 32 200 Ships in 10 - 15 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed): Timothy J. Thompson, C.Bala... Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed)
Timothy J. Thompson, C.Bala Kumar, Paul J. Kline
R1,647 Discovery Miles 16 470 Ships in 10 - 15 working days

Adoption of Bluetooth wireless technology has become ubiquitous in the last few years. One of the biggest steps forward is the standardization of Java APIs for Bluetooth wireless technology (JABWT). The latest updates to this standard is explained in detail in this book. The JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded overwhelmingly to the JABWT specification by implementing JABWT applications in mobile phones and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the Java APIs" explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in developing the standards of JABWT, this book provides the authoritative explanations and concrete examples needed to get started right away.
This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use. A NEW chapter on the Push Registry definition (a new feature in the 1.1 version of JSR-82) has been added. Finally, the new Essentials version of the book will update the remaining chapters to reflect changes in the latest Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added content on the website. This "bonus material" includes complete source code from examples in the book, the javex.bluetooth code package, the java.obex code package, an enhanced set of "Example Applications," and a tutorial on "Implementing JABWT on a Device." These code-heavy sections are actually more effective in electonic format where the application can be easily downloaded.

KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables software and hardware vendors to quickly develop Bluetooth applications for mobile devices in an increasingly competitive market.
* The updated material examines crucial programming areas (including RFCOMM, OBEX, device discovery, service discovery, and L2CAP), which allows developers to not only successfully design, but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal Push Registry feature ? a recent development that will help programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in implementing the Java APIs specification, the book allows developers to identify with the text and encourages repeated reference.

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 (Paperback): Kieran McCorry Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2 (Paperback)
Kieran McCorry
R2,820 Discovery Miles 28 200 Ships in 10 - 15 working days

Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. This book covers, in detail, the tools and techniques that messaging system planners and administrators will require in order to establish a functioning interoperability environment between Exchange 2003 and previous versions of Exchange including Exchange 5.5 and Exchange 2000. The book describes various deployment topologies and environments to cater for a multitude of different organizational requirements. The book has been updated to reflect the new changes that Microsoft introduced with Exchange 2003 and SP1 and SP2 updates in relation to major architectural changes to migrations techniques and other services such as RPC over HTTP and journaling functionality.
* Details for consultants and system administrators to migrate from older versions of Exchange 5.5 and Exchange 2000 to the latest revisions of Exchange 2003
* Critical information on integration with Office 2003 and Windows 2003
* Based on actual implementations of the released version of Exchange
2003 in larger enterprise environments
* NEW! Cover critical updates to Exchange 2003 with updates from SP1 and SP2, such as new implementations of RPC over HTTP and cross site migrations
* NEW! Coverage of the Exchange journaling feature updates in Exchange
2003 SP1 and SP2

Globus (R) Toolkit 4 - Programming Java Services (Paperback): Borja Sotomayor, Lisa Childers Globus (R) Toolkit 4 - Programming Java Services (Paperback)
Borja Sotomayor, Lisa Childers
R2,029 Discovery Miles 20 290 Ships in 10 - 15 working days

The Globus Toolkit (http: //www.globus.org/toolkit/) is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. "Globus Toolkit 4: Programming Java Services" provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you're making the leap into Grid Computing using the Globus Toolkit, you'll want "Globus Toolkit 4: Programming Java Services" at your side as you take your first steps.
+ Written for newcomers to Globus Toolkit, but filled with useful information for experienced users.
+ Clearly situates Globus application development within the context of Web Services and evolving Grid standards.
+ Provides detailed coverage of Web Services programming with the Globus Toolkit's Java WS Core component.
+ Covers basic aspects of developing secure services using the Grid Security Infrastructure (GSI).
+ Uses simple, didactic examples throughout the book, but also includes a more elaborate example, the FileBuy application, that showcases common design patterns found in Globus applications.
+ Concludes with useful reference appendices.

GMPLS - Architecture and Applications (Paperback): Adrian Farrel, Igor Bryskin GMPLS - Architecture and Applications (Paperback)
Adrian Farrel, Igor Bryskin
R2,394 Discovery Miles 23 940 Ships in 10 - 15 working days

The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. "GMPLS: Architecture and Applications" brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively.
This book begins by defining GMPLS s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.
+ Written by two industry researchers at the forefront of the development of GMPLS.
+ Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering.
+ Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection.
+ Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs.
+ Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system."

Smart Phone and Next Generation Mobile Computing (Paperback): Pei Zheng, Lionel Ni Smart Phone and Next Generation Mobile Computing (Paperback)
Pei Zheng, Lionel Ni
R2,249 Discovery Miles 22 490 Ships in 10 - 15 working days

This in-depth technical guide is an essential resource for anyone involved in the development of "smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. "Smart Phone and Next-Generation Mobile Computing" shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

Business Continuity and Disaster Recovery for InfoSec Managers (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD,... Business Continuity and Disaster Recovery for InfoSec Managers (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,643 Discovery Miles 26 430 Ships in 10 - 15 working days

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining second site back up and recovery
.Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters"

Grid Computing - The Savvy Manager's Guide (Paperback): Pawel Plaszczak, Richard Wellner Jr. Grid Computing - The Savvy Manager's Guide (Paperback)
Pawel Plaszczak, Richard Wellner Jr.
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.
Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company s culture.
Grid Computing has an Online Companion at www.savvygrid.com with contents, details, community forum, and latest updates for the material.
* Sketches the history of grid computing, showing how it made the leap from academia to business.
* Examines the criteria you'll need to meet to make your network "grid-enabled."
* Explains how a grid-based solution can be made to meet key organizational requirements, including security, scheduling, data storage, and fault-tolerance.
* Surveys the approaches currently available and helps you choose the one that will best meet your needs, both now and in the future.
* Focuses heavily on the competitive advantages you can reap from grid computing, and provides advice on convincing your organization to adopt grid computing and making a successful transition."

IM Instant Messaging Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP IM Instant Messaging Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,820 Discovery Miles 28 200 Ships in 10 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Network Security - A Practical Approach (Paperback): Jan L. Harrington Network Security - A Practical Approach (Paperback)
Jan L. Harrington
R2,078 Discovery Miles 20 780 Ships in 10 - 15 working days

"Network Security" is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
+ Helps you see through a hacker's eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, "malware," and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates."

IPv6 Network Programming (Paperback): Jun-ichiro Hagino IPv6 Network Programming (Paperback)
Jun-ichiro Hagino
R2,366 Discovery Miles 23 660 Ships in 10 - 15 working days

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R2,872 Discovery Miles 28 720 Ships in 10 - 15 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover): Jean-Philippe Vasseur, Mario... Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover)
Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester
R3,032 Discovery Miles 30 320 Ships in 10 - 15 working days

"Network Recovery" is the first book to provide detailed information on protecting and restoring communication networks, and it sets a sky-high standard for any that may follow. Inside, you ll learn specific techniques that work at each layer of the networking hierarchy including optical, SONET-SDH, IP, and MPLS as well as multi-layer escalation strategies that offer the highest level of protection. The authors begin with an incisive introduction to the issues that define the field of network protection and restoration, and as the book progresses they explain everything you need to know about the relevant protocols, providing theoretical analyses wherever appropriate. If you work for a network-dependent organization, large or small, you ll want to keep Network Recovery within reach at all times.
* Shows you how to implement protection and recovery techniques that will save your organization time and money.
* Documents techniques for the optical, SONET-SDH, IP, and MPLS layers, as well as multi-layer escalation strategies.
* Shows you how to evaluate these techniques in relation to one another, so you can develop an optimal network recovery design.
* Provides industry examples and simulation results.
* Delves into the inner workings of relevant protocols and offers theoretical analyses wherever this information contributes to your practical knowledge."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mission-Critical Microsoft Exchange 2003…
Jerry Cochran Paperback R2,533 Discovery Miles 25 330
Network Processor Design, Volume 2…
Mark A. Franklin, Patrick Crowley, … Paperback R3,091 Discovery Miles 30 910
Bluetooth Application Programming with…
C.Bala Kumar, Paul J. Kline, … Paperback R2,565 Discovery Miles 25 650
TCP/IP Clearly Explained
Peter Loshin Paperback R2,831 Discovery Miles 28 310
Multicast Sockets - Practical Guide for…
David Makofske, Kevin Almeroth Paperback R1,246 Discovery Miles 12 460
The Internet Security Guidebook - From…
Juanita Ellis, Tim Speed Paperback R2,495 Discovery Miles 24 950
High Performance Data Network Design…
Tony Kenyon Paperback R2,966 Discovery Miles 29 660
Networking Explained
Michael Gallo, William M Hancock Phd Cissp Cism Paperback R2,746 Discovery Miles 27 460
The Personal Internet Security Guidebook…
Tim Speed, Juanita Ellis, … Paperback R2,567 Discovery Miles 25 670
Virtual Private Networks - Making the…
Dennis Fowler Paperback R2,131 Discovery Miles 21 310

 

Partners