0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (66)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Networking

Internet QoS - Architectures and Mechanisms for Quality of Service (Hardcover): Zheng Wang Internet QoS - Architectures and Mechanisms for Quality of Service (Hardcover)
Zheng Wang
R2,613 Discovery Miles 26 130 Ships in 10 - 15 working days



Guaranteeing performance and prioritizing data across the Internet may seem nearly impossible because of an increasing number of variables that can affect and undermine service. But if you're involved in developing and implementing streaming video or voice, or other time-sensitive Internet applications, you understand exactly what's at stake in establishing Quality of Service (QoS) and recognize the benefits it will bring to your company.


What you need is a reliable guide to the latest QoS techniques that addresses the Internet's special challenges. "Internet QoS" is it-the first book to dig deep into the issues that affect your ability to provide performance and prioritization guarantees to your customers and users This book gives a comprehensive view of key technologies and discusses various analytical techniques to help you get the most out of network resources as you strive to make, and adhere to, meaningful QoS guarantees.
* Includes valuable insights from a Bell Labs engineer with 14 years of experience in data networking and Internet protocol design.
* Details the enhancements to current Internet architectures and discusses new mechanisms and network management capabilities that QoS will require.
* Focuses on the four main areas of Internet QoS: integrated services, differentiated services, MPLS (Multiprotocol Label Switching), and traffic engineering.

Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover): Heinz-Gerd... Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover)
Heinz-Gerd Hegering, Sebastian Abeck, Bernhard Neumair
R3,726 Discovery Miles 37 260 Ships in 10 - 15 working days

""This is a comprehensive book covering architecture, implementation, and operational use of all the current approaches to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not only covers most of the modern approaches to management but also includes interoperation between these approaches and the use of stand-alone tools such as protocol analyzers. It will be very useful as a reference book for students, researchers, and industry practitioners.""

-Professor Morris Sloman, Department of Computing, Imperial College of Science Technology and Medicine

""A comprehensive reference on the management of networked systems, this book is a must-have for any network or management system architect and anybody else in need of a deep understanding of network management technologies, tools, and practices. Professor Hegering and his team present a complete analysis of integrated network management architectures, tools, system development, and operational use.""

-Branislav Meandzija, General Instrument Corporation

""Highly respected experts Hegering, Abeck, and Neumair offer the most comprehensive presentation of systems and network management that I've seen to date. This book provides an excellent foundation of traditional and emergent technologies that every student and industry practitioner should read.""

-Lisa Phifer, Vice President, Core Competence, Inc.

Features
Teaches the enduring principles at work in a holistic, integrated approach to systems management.
Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

* Teaches the enduring principles at work in a holistic, integrated approach to systems management.
* Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
* Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
* Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

Virtual Private Networks - Making the Right Connection (Paperback): Dennis Fowler Virtual Private Networks - Making the Right Connection (Paperback)
Dennis Fowler
R2,033 Discovery Miles 20 330 Ships in 10 - 15 working days

Network-dependent companies are excited by the benefits promised by the virtual private network, including lower costs, greater flexibility, and improvements in connectivity. But they also have questions: What benefits are real? How can they be measured? What are the expenses and the dangers?

Virtual Private Networks: Making the Right Connection is an intelligent introduction written especially for business and IT professionals who want a realistic assessment of what a VPN can provide for their organizations. Covering advantages and risks, this book expands your understanding of what you can do with a VPN, while detailing all that implementing it will demand of you. With its help, you'll find your way through VPN hype to the answers you need to make sound decisions.
* Thoroughly explains VPN concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions.
* Covers essential VPN topics like tunneling, encapsulation, encryption, security, and protocols.
* Provides detailed points of comparison between typical VPN costs and the costs of maintaining traditional WANs.
* Offers frank consideration of the hidden costs and risks sometimes associated with VPNs, helping you decide if a VPN is right for you.
* Lists and assesses the software and hardware products you may need to implement a VPN.
* Discusses both Internet-based VPNs and VPN services offered by providers of "private" ATM and frame relay networks, detailing the pros and cons of each.

Digital Compression for Multimedia - Principles and Standards (Hardcover): Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich... Digital Compression for Multimedia - Principles and Standards (Hardcover)
Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich Baker, David Lindbergh
R3,943 Discovery Miles 39 430 Ships in 9 - 15 working days

Drawing on their experience in industry, research, and academia, this powerful author team combines their expertise to provide an accessible guide to data compression standards and techniques and their applications. The essential ideas and motivation behind the various compression methods are presented, and insight is provided into the evolution of the standards. Standards-compliant design alternatives are discussed, and some noncompliant designs also are treated.

Covering the fundamental underpinnings of the most widely used compression methods, this book is intended for engineers and computer scientists designing, manufacturing, and implementing compression systems, as well as system integrators, technical managers, and researchers. It provides, in a single source, an overview of the current standards for speech, audio, video, image, fax, and file compression.
* Authored by five experts from industry and academia who are heavily involved in research, development, and standards-setting activities
* Covers the full spectrum of multimedia compression standards including those for lossless data compression, speech coding, high-quality audio coding, still image compression, facsimile, and video compression
* Provides enough theory for you to understand the building blocks of the compression systems discussed, with appendices containing necessary algorithmic details and mathematical foundations

Computer Security (Hardcover, 3rd edition): John M Carroll Computer Security (Hardcover, 3rd edition)
John M Carroll
R2,293 Discovery Miles 22 930 Ships in 10 - 15 working days

Computer Security, Third Edition contains the best ideas on recent advances in computer hardware and the spread of personal computer technology. It includes a complete and comprehensive introduction to computer security, as well as coverage of computer crime, systems security, and cryptology. Convinced that there is no such thing as computer security, only various degrees of insecurity, John Carroll presents the best concepts that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This thoroughly enhanced third edition is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. In addition to completely updating the original matter, Computer Security, Third Edition includes new information on: computer crime and the law; physical security; communications; surveillance; and risk management.

Sendmail: Theory and Practice (Paperback): Frederick M. Avolio, Paul Vixie Sendmail: Theory and Practice (Paperback)
Frederick M. Avolio, Paul Vixie
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

* Provides 'cookbook recipes' and simplified explanations on how Sendmail works and how to manage a mail system * Examines e-mail and Sendmail by laying ground work and defining key terms * Progresses from the simple to the complex, providing knowledge
essential for both the interested user and the experienced system manager.

Sendmail is the ULTRIX, OSF/1, and BSD UNIX standard mail deliverer; however, Sendmail has been and is still considered by many to be impossible to understand. Sendmail: Theory and Practice explains Sendmail's history, architecture, configuration, and
maintenance. Systems managers wanting to learn how to set-up and maintain their mail system (made up of one or many computers) and interested readers wanting to learn more about electronic mail will find this book beneficial. The book explains how and
why Sendmail does what it does and provides practical advnce about designing and maintaining an electronic mail system. 'You need this book if you run a mail gateway, or if you have a really strong curiosity about how email works.' - C Vu, November 1995

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,586 Discovery Miles 15 860 Ships in 10 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Smart Phone and Next Generation Mobile Computing (Paperback): Pei Zheng, Lionel Ni Smart Phone and Next Generation Mobile Computing (Paperback)
Pei Zheng, Lionel Ni
R2,152 Discovery Miles 21 520 Ships in 10 - 15 working days

This in-depth technical guide is an essential resource for anyone involved in the development of "smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. "Smart Phone and Next-Generation Mobile Computing" shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.
+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

Globus (R) Toolkit 4 - Programming Java Services (Paperback): Borja Sotomayor, Lisa Childers Globus (R) Toolkit 4 - Programming Java Services (Paperback)
Borja Sotomayor, Lisa Childers
R1,941 Discovery Miles 19 410 Ships in 10 - 15 working days

The Globus Toolkit (http: //www.globus.org/toolkit/) is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. "Globus Toolkit 4: Programming Java Services" provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you're making the leap into Grid Computing using the Globus Toolkit, you'll want "Globus Toolkit 4: Programming Java Services" at your side as you take your first steps.
+ Written for newcomers to Globus Toolkit, but filled with useful information for experienced users.
+ Clearly situates Globus application development within the context of Web Services and evolving Grid standards.
+ Provides detailed coverage of Web Services programming with the Globus Toolkit's Java WS Core component.
+ Covers basic aspects of developing secure services using the Grid Security Infrastructure (GSI).
+ Uses simple, didactic examples throughout the book, but also includes a more elaborate example, the FileBuy application, that showcases common design patterns found in Globus applications.
+ Concludes with useful reference appendices.

GMPLS - Architecture and Applications (Paperback): Adrian Farrel, Igor Bryskin GMPLS - Architecture and Applications (Paperback)
Adrian Farrel, Igor Bryskin
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. "GMPLS: Architecture and Applications" brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively.
This book begins by defining GMPLS s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.
+ Written by two industry researchers at the forefront of the development of GMPLS.
+ Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering.
+ Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection.
+ Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs.
+ Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system."

Grid Computing - The Savvy Manager's Guide (Paperback): Pawel Plaszczak, Richard Wellner Jr. Grid Computing - The Savvy Manager's Guide (Paperback)
Pawel Plaszczak, Richard Wellner Jr.
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.
Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company s culture.
Grid Computing has an Online Companion at www.savvygrid.com with contents, details, community forum, and latest updates for the material.
* Sketches the history of grid computing, showing how it made the leap from academia to business.
* Examines the criteria you'll need to meet to make your network "grid-enabled."
* Explains how a grid-based solution can be made to meet key organizational requirements, including security, scheduling, data storage, and fault-tolerance.
* Surveys the approaches currently available and helps you choose the one that will best meet your needs, both now and in the future.
* Focuses heavily on the competitive advantages you can reap from grid computing, and provides advice on convincing your organization to adopt grid computing and making a successful transition."

Network Security - A Practical Approach (Paperback): Jan L. Harrington Network Security - A Practical Approach (Paperback)
Jan L. Harrington
R1,985 Discovery Miles 19 850 Ships in 10 - 15 working days

"Network Security" is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You ll learn to do just that with this book s assessments of the risks, rewards, and trade-offs related implementing security measures.
+ Helps you see through a hacker's eyes so you can make your network more secure.
+ Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
+ Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
+ Covers techniques for enhancing the physical security of your systems and network.
+ Explains how hackers use information-gathering to find and exploit security flaws.
+ Examines the most effective ways to prevent hackers from gaining root access to a server.
+ Addresses Denial of Service attacks, "malware," and spoofing.
+ Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates."

Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover): Jean-Philippe Vasseur, Mario... Network Recovery - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS (Hardcover)
Jean-Philippe Vasseur, Mario Pickavet, Piet Demeester
R2,902 Discovery Miles 29 020 Ships in 10 - 15 working days

"Network Recovery" is the first book to provide detailed information on protecting and restoring communication networks, and it sets a sky-high standard for any that may follow. Inside, you ll learn specific techniques that work at each layer of the networking hierarchy including optical, SONET-SDH, IP, and MPLS as well as multi-layer escalation strategies that offer the highest level of protection. The authors begin with an incisive introduction to the issues that define the field of network protection and restoration, and as the book progresses they explain everything you need to know about the relevant protocols, providing theoretical analyses wherever appropriate. If you work for a network-dependent organization, large or small, you ll want to keep Network Recovery within reach at all times.
* Shows you how to implement protection and recovery techniques that will save your organization time and money.
* Documents techniques for the optical, SONET-SDH, IP, and MPLS layers, as well as multi-layer escalation strategies.
* Shows you how to evaluate these techniques in relation to one another, so you can develop an optimal network recovery design.
* Provides industry examples and simulation results.
* Delves into the inner workings of relevant protocols and offers theoretical analyses wherever this information contributes to your practical knowledge."

Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.): Mark A. Franklin, Patrick Crowley, Haldun... Network Processor Design, Volume 2 - Issues and Practices (Paperback, 2nd ed.)
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors.
Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service.
.Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linkopings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington.
.Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum."

IPv6 - Theory, Protocol, and Practice (Paperback, 2nd edition): Pete Loshin IPv6 - Theory, Protocol, and Practice (Paperback, 2nd edition)
Pete Loshin
R2,466 Discovery Miles 24 660 Ships in 10 - 15 working days

The second edition of "IPv6: Theory, Protocol, and Practice" guides readers through implemetation and deployment of IPv6. The Theory section takes a close, unbiased look at why so much time and effort has been expended on revising IPv4. In the Protocol section is a comprehensive review of the specifics of IPv6 and related protocols. Finally, the Practice section provides hands-on explanations of how to roll out IPv6 support and services.
This completely rewritten edition offers updated and comprehensive coverage of important topics including router and server configuration, security, the impact of IPv6 on mobile networks, and evaluating the impact of IPv6-enabled networks globally. Pete Loshin's famously lucid explanations benefit readers at every turn, making "Ipv6: Theory, Protocol, and Practice" the best way for a large diverse audience to get up to speed on this groundbreaking technology.
* The comprehensive, accessible, and up-to-date resource needed by network engineers and support staff, product developers and managers, programmers, and marketing professionals
* Divided into sections on theory, the protocol's technical details, and techniques for building Ipv6 networks, this book covers not only the protocol but the ways in which the protocol can be integrated into networks.
* Covers critical topics in depth, including router and server configuration, security, value assessment, and the impact of Ipv6 on global networks

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R2,451 Discovery Miles 24 510 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Deploying Next Generation…
Vinod Joseph, Srinivas Mulugu Paperback R1,532 R1,429 Discovery Miles 14 290
Modern Cable Television Technology
David Large, James Farmer Hardcover R2,694 Discovery Miles 26 940
Broadband Cable Access Networks - The…
David Large, James Farmer Hardcover R2,056 Discovery Miles 20 560
P2P Networking and Applications
John Buford, Heather Yu, … Hardcover R1,640 Discovery Miles 16 400
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan Paperback R1,251 Discovery Miles 12 510
Wireless Communications & Networking
Vijay Garg Hardcover R2,275 Discovery Miles 22 750
Network Simulation Experiments Manual
Emad Aboelela Paperback R706 Discovery Miles 7 060
Network Routing - Algorithms, Protocols…
Hardcover R1,965 Discovery Miles 19 650
Interconnecting Smart Objects with IP…
Jean-Philippe Vasseur, Adam Dunkels Paperback R1,586 Discovery Miles 15 860
Deploying QoS for Cisco IP and Next…
Vinod Joseph, Brett Chapman Hardcover R1,378 Discovery Miles 13 780

 

Partners