![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.
Resources designed to support learners of the 2010 BTEC Level 3 National IT specification*. Extensive unit coverage: Student Book 1 covers 14 units including all the mandatory units, giving learners the breadth to tailor the course to their needs and interests, when combined with Student Book 2. Functional Skills and Personal Learning and Thinking Skills are embedded in activities throughout the book. WorkSpace case studies take learners into the real world of work, showing them how they can apply their knowledge in a real-life context.
Open Radio Access Network (O-RAN) Systems Architecture and Design gives a jump-start to engineers developing O-RAN hardware and software systems, providing a top-down approach to O-RAN systems design. It gives an introduction into why wireless systems look the way they do today before introducing relevant O-RAN and 3GPP standards. The remainder of the book discusses hardware and software aspects of O-RAN system design, including dimensioning and performance targets.
This book presents simple, elegant methods for dealing, both in theory and in application, with a variety of problems that have formulations in terms of flows in capacity-constrained networks. Since the theoretical considerations lead in all cases to computationally efficient solution procedures, the hook provides a common meeting ground for persons interested in operations research, industrial and communications engineering, or combinatorial mathematics. Originally published in 1962. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Discover why routers in the Juniper MX Series-with their advanced feature sets and record-breaking scale-are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features. This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you've learned. This edition includes new chapters on load balancing and vMX-Juniper MX's virtual instance. Discover Junos architecture, MX chassis, and Trio Linecards Work with Juniper MX's bridging, VLAN VXLAN, and virtual switches Create a firewall filter framework and discover the latest flexible filtering options Secure your router and add an extra layer of security with Junos DDOS protection and SCFD feature Discover the advantages of hierarchical scheduling, ingress queuing, and flexible remarking Combine Juniper MX routers, using a virtual chassis or MC-LAG Understand and use classical and advanced Trio Chipset's load balancing features Dive into Trio inline services such as inline NAT, redundant logical tunnel, or filter-based GRE tunnel Discover vMX internal architecture and explore the benefits and typical use case of a virtual router
How can Windows administrators set up different security restrictions for different users? What about setting one policy for a whole group? Or preventing users from modifying hardware and environment settings? These are just a few of the questions that Windows System Policy Editor answers. This book is for anyone who's in charge of administering Windows workstations in a school, library, office, or any other environment where security is crucial.
In today's technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.
Thoroughly updated to reflect the CompTIA (R) Network+ N10-008 exam, Networking Essentials, Sixth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management. Networking Essentials, Sixth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This edition reflects the latest exam topics and objectives associated with network security and hardening, cloud networking, virtualization, 5G, and other recent advances in wireless technology, infrastructure management, and current hardware and devices. It also explains many new terms now addressed by CompTIA's N10-008 exam. Clear goals are outlined for each chapter, and every concept is introduced in easy-to-understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks. CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery KEY TERM DEFINITIONS, LISTINGS, AND EXTENSIVE GLOSSARY to help you master the language of networking QUESTIONS, PROBLEMS, AND CRITICAL THINKING QUESTIONS to help you deepen your understanding
Kubernetes is the operating system of the cloud-native world, providing a reliable and scalable platform for running containerized workloads. This book shows developers and operations staff how to apply industry-standard DevOps practices to Kubernetes in a cloud-native context. You'll learn all about the Kubernetes ecosystem and discover battle-tested solutions to everyday problems. In this friendly, pragmatic book, cloud experts John Arundel and Justin Domingus show you what Kubernetes can do-and what you can do with it. You'll build, step by step, an example cloud-native application and its supporting infrastructure, along with a development environment and continuous deployment pipeline that you can use for your own applications. Understand containers and Kubernetes from first principles-no experience necessary Run your own clusters or choose a managed Kubernetes service from Amazon, Google, and others Design your own cloud-native services and infrastructure Use Kubernetes to manage resource usage and the container lifecycle Optimize clusters for cost, performance, resilience, capacity, and scalability Learn the best tools for developing, testing, and deploying your applications Apply the latest industry practices for observability and monitoring Secure your containers and clusters in production Adopt DevOps principles to help make your development teams lean, fast, and effective
This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.
This guide covers all aspects of deploying Solaris as an enterprise-level network operating system, with a focus on e-commerce. Written for experienced network administrators who want an objective guide to networking with Solaris, the book covers installation on the Intel and Sparc platforms, and instructs you how to setup Solaris as a file server, application server, and database server.
Whether you're preparing for your service management foundation exam, or simply want to understand service management better, this new edition of our popular book covers the latest thinking and provides a comprehensive, practical introduction to IT service management. Building on their collective service management experience, the authors walk you through essential concepts including processes, functions and roles and illustrate these with real-life examples.
Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems - as well as various databases - this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75 per cent new material. "Backup & Recovery" starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. "Backup & Recovery" then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so. For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to: automate the backup of popular databases without a commercial utility; perform bare metal recovery of any popular open systems platform, including your PC or laptop; utilize valuable but often unknown open source backup products; understand the state of commercial backup software, including explanations of CDP and data de-duplication software; and access the current state of backup hardware, including Virtual Tape Libraries (VTLs).
This long-awaited new edition of a classic, now updated for NFS Version 3 and based on Solaris 8, shows how to set up and manage a network filesystem installation. Managing NFS and NIS is the only practical book devoted entirely to NFS and the distributed database NIS; it's a "must-have" for anyone interested in Unix networking.
The release of R5 has made Domino easier for its 55 million users than ever before. For example, it's now possible to centrally modify client configurations or visually monitor the health and status of the network's Domino servers from a single screen. Lotus Domino Administration in a Nutshell is the quick reference for getting the most out of this reliable and scalable integrated server platform.
A quick and reliable way to build proven databases for core business functions
Presenting a reference model architecture for the design of intelligent systems Engineering of Mind presents the foundations for a computational theory of intelligence. It discusses the main streams of investigation that will eventually converge in a scientific theory of mind and proposes an avenue of research that might best lead to the development of truly intelligent systems. This book presents a model of the brain as a hierarchy of massive parallel computational modules and data structures interconnected by information pathways. Using this as the basic model on which intelligent systems should be based, the authors propose a reference model architecture that accommodates concepts from artificial intelligence, control theory, image understanding, signal processing, and decision theory. Algorithms, procedures, and data embedded within this architecture would enable the analysis of situations, the formulation of plans, the choice of behaviors, and the computation of uncertainties. The computational power to implement the model can be achieved in practical systems in the foreseeable future through hierarchical and parallel distribution of computational tasks. The authors’ reference model architecture is expressed in terms of the Real-time Control System (RCS) that has been developed primarily at the National Institute of Standards and Technology. Suitable for engineers, computer scientists, researchers, and students, Engineering of Mind blends current theory and practice to achieve a coherent model for the design of intelligent systems.
This book presents simple, elegant methods for dealing, both in theory and in application, with a variety of problems that have formulations in terms of flows in capacity-constrained networks. Since the theoretical considerations lead in all cases to computationally efficient solution procedures, the hook provides a common meeting ground for persons interested in operations research, industrial and communications engineering, or combinatorial mathematics. Originally published in 1962. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This book constitutes the proceedings of the 19th International Conference on Theory and Practice of Digital Libraries, TPDL 2015, held in Poznan, Poland, in September 2015. The 22 full papers and 14 poster and demo papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: interoperability and information integration; multimedia information management and retrieval and digital curation; personal information management and personal digital libraries; exploring semantic web and linked data; user studies for and evaluation of digital library systems and applications; applications of digital libraries; digital humanities; and social-technical perspectives of digital information.
With this essential guide to vehicular networking, you will learn about everything from conceptual approaches and state-of-the-art protocols, to system designs and their evaluation. Covering both in- and inter-vehicle communication, this comprehensive work outlines the foundations of vehicular networking as well as demonstrating its commercial applications, from improved vehicle performance, to entertainment, and traffic information systems. All of this is supported by in-depth case studies and detailed information on proposed protocols and solutions for access technologies and information dissemination, as well as topics on rulemaking, regulations, and standardization. Importantly, for a field which is attracting increasing commercial interest, you will learn about the future trends of this technology, its problems, and solutions to overcome them. Whether you are a student, a communications professional or a researcher, this is an invaluable resource.
Semantic Web services promise to automate tasks such as discovery, mediation, selection, composition, and invocation of services, enabling fully flexible automated e-business. Their usage, however, still requires a significant amount of human intervention due to the lack of support for a machine-processable description. In this book, Jos de Bruijn and his coauthors lay the foundations for understanding the requirements that shape the description of the various aspects related to Semantic Web services, such as the static background knowledge in the form of ontologies, the functional description of the service, and the behavioral description of the service. They introduce the Web Service Modeling Language (WSML), which provides means for describing the functionality and behavior of Web services, as well as the underlying business knowledge, in the form of ontologies, with a conceptual grounding in the Web Service Modeling Ontology. Academic and industrial researchers as well as professionals will find a comprehensive overview of the concepts and challenges in the area of Semantic Web services, the Web Services Modeling Language and its relation to the Web Services Modeling Ontology, and an in-depth treatment of both enabling technologies and theoretical foundations.
According to the W3C Semantic Web Activity [1]: The Semantic Web provides a common framework that allows data to be shared and reused across appli- tion, enterprise, and community boundaries. This statement clearly explains that the Semantic Web is about data sharing. Currently, the Web uses hyperlinks to connect Web pages. The Semantic Web goes beyond that and focuses on data and envisions the creation of the web of data. On the Semantic Web, anyone can say anything about any resource on the Web. This is fully based on the concept of semantic - notations, where each resource on the Web can have an assigned meaning. This is done through the use of ontologies as a formal and explicit representation of domain concepts and their relationships [2]. Ontologies are formally based on description logics. This enables agents and applications to reason over the data when searching the Web, which has not previously been possible. Web 2. 0 has gradually evolved from letting the Web users play a more active role. Unlike the initial version of the Web, where the users mainly "consumed" content, users are now offered easy-to-use services for content production and publication. Mashups, blogs, wikis, feeds, interface remixes, and social networking/tagging s- tems are examples of these well-known services. The success and wide adoption of Web 2. 0 was in its reliance on social interactions as an inevitable characteristic of the use and life of the Web. In particular, Web 2.
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
Hypermedia & the Web An Engineering Approach David Lowe, University of Technology, Sydney, Australia Wendy Hall, University of Southampton, UK The rich online world offered through the Web is marred by the chaos which underlies it. At the very early stages of understanding how to harness the power of this new medium, electronic document creators, managers and researchers often spend time on technology innovations at the expense of adopting the sound engineering principles which have paid such dividends in the software industry. Hypermedio & the Web approaches interactive information (concentrating on hypertext documents) as a structure requiring management, quantification and documentation. From analysing the purpose for which a website, CD-ROM or online archive is created, assessing the characteristics and resources needed for the process of building each one, to the assessment of the end product itself, this book attempts to carve out features that are essential to the successful structuring of information in an electronic environment. This is an ambitious book charting an emerging discipline. It is an essential tool to help developers and educators shape and maintain useful and relevant electronic information. 'Hypermedia Engineering hasn't produced many tangible benefits in real-life situations, because very few people practise it. That's why the book is needed.' David Barron, Southampton University 'This book is interesting and excellently fulfills a current need [by] providing an exhaustive and up-to-date vision of the hypermedia field.' Fabio Vitali, University of Bologna 'The strength of this book is its breadth - it covers many of the issues in hypermedia with examples from thetechnical to the managerial. Students could use these as starting points when designing or evaluating hypermedia systems.' David Sharp, Imperial College of Science and Technology 'Information systems developers and managers should find this a helpful guide for developing hypermedia applications.' H Ashman, University of Nottingham Visit our Website at: http: //www.wiley.com/compbooks/
This book constitutes the refereed proceedings of the 12th International Conference on Database and Expert Systems Applications, DEXA 2001, held in Munich, Germany in September 2001. The 93 revised full papers presented were carefully reviewed and selected from 175 submissions. The papers are organized in topical sections on advanced databases, information retrieval, digital libraries, user interfaces, multimedia databases, workflow aspects, active databases, spatial databases, distributed databases, web aspects, knowledge management aspects, datawarehouses, hypermedia, indexing, object-oriented databases, database queries, and transaction processing. |
![]() ![]() You may like...
Theories of School Psychology - Critical…
Kristy K. Kelly, S. Andrew Garbacz, …
Hardcover
R4,319
Discovery Miles 43 190
Harry Potter - A History of Magic - The…
British Library
Paperback
![]()
The Voice of - - Public Opinion-forming…
Angelika Burtscher, Freek Lomme
Paperback
R499
Discovery Miles 4 990
|