All counter of AlamanShop


Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
Network Processor Design, Volume 3: Issues and Practices

2005 y.
Publisher: Morgan Kaufmann
Description: The past few years have seen significant change in the landscape of high-end network processing. In response to the formidable challenges facing this emerging field, the editors of this series set out to survey the latest research and practices in the design, programming, and use of network processors. Through chapters on hardware, software, performance and modeling, Volume 3 illustrates the potential for new NP applications, helping to lay a theoretical foundation for the architecture, evaluation, and programming of networking processors. Like Volume 2 of the series, Volume 3 further shifts the focus from achieving higher levels of packet processing performance to addressing other critical factors such as ease of programming, application developments, power, and performance prediction. In addition, Volume 3 emphasizes forward-looking, leading-edge research in the areas of architecture, tools and techniques, and applications such as high-speed intrusion detection and… [detailed...]

ISBN: 0120884763
Book size: —; Page extent: 336.

 

PUT TO
THE BASKET
James Macfarlane
Network Routing Basics: Understanding IP Routing in Cisco Systems

2006 y.
Publisher: —
Description: * A fresh look at routing and routing protocols in today`s networks. A primer on the subject, but with thorough, robust coverage of an array of routing topics * Written by a network/routing instructor who could never find quite the right book for his students -so he wrote his own * Coverage of all routing protocols. In-depth coverage of interior routing protocols, with extensive treatment of OSPF. Includes overview of BGP as well. * Not written as a `pass the test` guide. Rather, a close look at real world routing with many examples, making it an excellent choice for preparing for a variety of certification exams * Many extras including a networking primer, TCPIP coverage with thorough explanations of subnetting / VLSMs / CIDR addressing, route summarization, discontiguous networks, longest match principal, and more. [detailed...]

ISBN: 0471772739
Book size: —; Page extent: 432.

 

PUT TO
THE BASKET
Matthew J Castelli
Network Sales and Services Handbook

— y.
Publisher: —
Description: A technical handbook for network sales and customer service personnel Network Sales and Services Handbook covers the following: Foundational concepts and discussions of how networks interconnect The OSI model and its fundamental importance for moving information between computers on an internetwork Customer premises equipment, including a discussion of hardware commonly found at a customer site Threats to a network and methods for protecting a network against such threats Concepts of geographical networks and the three-tiered network hierarchy QoS and a network`s capability to provide better service to select network traffic over various internetworking technologies Methods available to remote users for securely accessing organizational resources Public switched telephone network services and customer access Multiprotocol Label Switching (MPLS) and how it is used in a network backbone The… [detailed...]

ISBN: 1587050900
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Network Science, Nonlinear Science and Infrastructure Systems (International Series in Operations Research &, Management Science)

2007 y.
Publisher: —
Description: Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. [detailed...]

ISBN: 0387710809
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Alan Feldman, Cliff Konold, Bob Coulter, Brian Conroy, Charles Hutchison, Nancy London, Terc
Network Science, a Decade Later: The Internet and Classroom Learning

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0805834265
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Ted G. Lewis
Network Science: Theory and Applications

2009 y.
Publisher: —
Description: The first comprehensive book on the emerging field of network science, Network Science: Theory and Applications is an exhaustive review of terms, ideas, and practices in the various areas of network science. In addition to introducing theory and application in easy-to-understand, topical chapters, this book describes the historical evolution of network science through the use of illustrations, tables, practice problems with solutions, case studies, and applications to related Java software. Researchers, professionals, and technicians in engineering, computing, and biology will benefit from this overview of new concepts in network science. [detailed...]

ISBN: 0470331887
Book size: —; Page extent: 512.

 

PUT TO
THE BASKET
National Research Council (U. S.)
Network Science

2005 y.
Publisher: —
Description: - [detailed...]

ISBN: 0309100267
Book size: —; Page extent: 108.

 

PUT TO
THE BASKET
Owen Poole
Network Security : A Practical Guide (Computer Weekly Professional Series)

— y.
Publisher: —
Description: Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization. The book covers a broad range of issues, starting with an assessment ofnetwork security, including the financial implications of security breaches, and moving on to discuss the different types of security threats facing computer networks. Particular attention is also given to the legal framework for network security. Attention is then turned to increasing security awareness and readiness, including system configuration, acceptable use, business continuity, and explaining technical solutions available such as firewalls and content control. … [detailed...]

ISBN: 0750650338
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Sean Convery
Network Security Architectures

— y.
Publisher: —
Description: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at… [detailed...]

ISBN: 158705115X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Chris McNab
Network Security Assessment

— y.
Publisher: —
Description: — [detailed...]

ISBN: 059600611X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Eric Cole, Ronald L. Krutz, James Conley
Network Security Bible

2005 y.
Publisher: —
Description: A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness [detailed...]

ISBN: 0764573977
Book size: —; Page extent: 694.

 

PUT TO
THE BASKET
William Stallings
Network Security Essentials: Applications and Standards (3rd Edition)

2006 y.
Publisher: —
Description: This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography–covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists. [detailed...]

ISBN: 0132380331
Book size: —; Page extent: 432.

 

PUT TO
THE BASKET
Thomas M. Thomas
Network Security First-Step

— y.
Publisher: —
Description: Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn about hackers and their attacks Understand security tools and technologies Defend your network with firewalls, routers, and other devices Explore security for wireless networks Learn how to prepare for security incidents Welcome to the world of network security! Computer networks are indispensable-but they`re also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them. No security experience needed! Network Security First-Step explains the basics of network security in… [detailed...]

ISBN: 1587200996
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Gert DeLaet, Gert Schauwers
Network Security Fundamentals (Cisco Press Fundamentals Series)

2004 y.
Publisher: Cisco Press
Description: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace… [detailed...]

ISBN: 1587051672
Book size: —; Page extent: 480.

 

PUT TO
THE BASKET
Matthew Strebe
Network Security JumpStart

— y.
Publisher: —
Description: — [detailed...]

ISBN: 078214120X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Saadat Malik
Network Security Principles and Practices (CCIE Professional Development)

2002 y.
Publisher: —
Description: Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks … [detailed...]

ISBN: 1587050250
Book size: —; Page extent: 800.

 

PUT TO
THE BASKET
Ankit Fadia
Network Security: A Hacker`s Perspective, Second Edition

2006 y.
Publisher: —
Description: Virtually every organization is reliant on its computer system, and when hackers infiltrate, the consequences can be grave?halts in productivity, sensitive information stolen, assets at risk. Network Security: A Hacker?s Perspective, Second Edition will help you step into the minds of computer criminals so that you can predict their moves and stop them before they strike. Written for anyone with some networking experience, this completely updated edition of the bestseller covers the most serious network-related security threats, vulnerabilities, and loopholes related to most major platforms, including Windows, UNIX, and Novell. Using a hands-on approach and numerous real-life case studies, the book identifies the tools, techniques, and methods that criminals use to break into networks for espionage and malicious purposes, with tips for prevention, as well as countermeasures you can take in the event the hackers strike first. In addition to providing information on the significant… [detailed...]

ISBN: 1598631632
Book size: —; Page extent: 432.

 

PUT TO
THE BASKET
Ankit Fadia
Network Security: A Hacker`s Perspective

— y.
Publisher: —
Description: Network Security: A Hackers Perspective will help you step into the minds of computer criminals so you can predict their moves and stop them before they can strike. Youll become a real hacker profiler as you find out the ways in which these attackers caninfiltrate your system, including stealing your identity by obtaining your IP address, gathering information through port scanning, fingerprinting, and sniffing, and attacking password files. Whether you are a network administrator or recreational user of the Internet, you will learn the right countermeasures to protect sensitive information and ensure that neither you nor your company ever become a defenseless target. [detailed...]

ISBN: 1592000452
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Barry Slawter
Network Security: Developing and Implementing Effective Enterprise Strategies

— y.
Publisher: —
Description: — [detailed...]

ISBN: 1566070740
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Charlie Kaufman, Radia Perlman, Mike Speciner
Network Security: Private Communication in a Public World, Second Edition

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0130460192
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Network Security

2008 y.
Publisher: —
Description: This book provides a reference tool for the increasing number of the scientists whose research is related to sensor network security. The book is organized into several sections, each including some chapters exploring a specific topic. Network security is attracting great attention and there are many research topics waiting to be studied. In this book, the topics covered include network design and modeling, network management, data management, security and applications. The aim, intent, and motivation of this book is to provide a reference tool for the increasing number of scientists whose research is more or less involved in network security. [detailed...]

ISBN: 0387738207
Book size: —; Page extent: 370.

 

PUT TO
THE BASKET
Emad Aboelela
Network Simulation Experiments Manual, Second Edition

2007 y.
Publisher: Morgan Kaufmann
Description: Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information `stick` is to create an environment where networking professionals and students canvisualize how networks work, utilizing a software tool that simulates the functions within a network. The tool itself is highly useful in that it provides a virtual environment for an assortment of desirable features such as modeling a network based on spcified criteria and predicting its performance. The Network Simulation Experiments Manual takes this instructional tool a step further and provides detailed experiments on core networking topologies for use in this simulation environment. Varios scenarios are presented within each topology and review questions, a lab report, and exercises accompany each assignment as well. The manual also comes with directions for downloading the free easy-to-install software, the OPNET IT… [detailed...]

ISBN: 0123739742
Book size: —; Page extent: 197.

 

PUT TO
THE BASKET
Douglas E. Comer
Network Systems Design Using Network Processors: Intel 2XXX Version

2005 y.
Publisher: Prentice Hall
Description: Assuming no knowledge of industry jargon, this book describes the design of network systems such as routers, bridges, switches, firewalls, and other equipment used in the Internet. It considers the functionality required for protocol processing, and explains how the functionality has been implemented on a range of hardware architectures. The author focuses on network processor technology, a recent development that has become one of the standard tools used by designers. This book explores network processors and surveys network processor architectures, explains design complexity, covers architectural approaches and gives examples of commercial network processors that follow each approach, and uses the Intel IXP 2xxx series of network processors as a detailed example. For network and web designers, implementers, and administrators, and for anyone interested in how the Internet works. [detailed...]

ISBN: 0131872869
Book size: —; Page extent: 600.

 

PUT TO
THE BASKET
Douglas E. Comer
Network Systems Design Using Network Processors

— y.
Publisher: —
Description: The first comprehensive book on network processors. Focuses on how to build network systems - a feature not found in other books! Covers Intel`s network processor including architecture, programming model, details, and example software. Written by renowned networking expert and professor, Douglas Comer. Network System Design Using Network Processors is the right book at the right time. Networking expert Douglas Comer divides this book intofour major sections: a quick review of basics and packet header formats, Traditional Protocol Processing Systems, Network Processors - an independent overview of the technology, including motivation, economics, inherent complexities, and various examplesof commercial architectures, and Intel`s network processor. Network processor complexity is boiled down and simplified by allowing readers to see example code for a commercial processor, detailed explanations on the motivation and… [detailed...]

ISBN: 0131417924
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Kathleen Hannon
Network Theory and Vascular Laboratories: Uncovering What it Takes to be a Successful Diagnostic Lab in the Competitive World of Medicine

2008 y.
Publisher: —
Description: The medical community is a network of physicians, nurses, technologists, patients, insurance companies, and administrators who interact with each other to provide patient care. Within this vast network is the vascular laboratory. Using actor network theory described by Stanley Milgram, Bruno Latour, and Albert-Laszlo Barabasi I am able to identify different factors called actors that play a pivotal role in the survival of a vascular laboratory(or any other diagnostic lab) in today`s medical community. In the historical perspective of the vascular lab network, technology has blurred the separation of gender roles between the typical physician (masculine) and nurse (feminine). Furthermore, other, less recognized interactions, such as trust and confidence between physician and technologist play a part in the patient care network on a micro and macro level. [detailed...]

ISBN: 3639083474
Book size: —; Page extent: 56.

 

PUT TO
THE BASKET
Victor Moreno, Kumar Reddy
Network Virtualization

2006 y.
Publisher: Cisco Press
Description: Share network resources and reduce costs while providing secure network services to diverse user communities Presents the business drivers for network virtualization and the major challenges facing network designers today Shows how to use virtualization designs with existing applications, such as VoIP and network services, such as quality of service and multicast Provides design alternatives for different real-world deployment scenarios, with configuration examples and case studiesA Today`s enterprises have several groups of users with specific needs. The differences between these groups translate into specific network requirements. Within some organizations, these requirements are so dissimilar that the different groups need to be treated as totally separate customers by the enterprise`s IT department. As the number of groups increases, keeping them separate and secure is a… [detailed...]

ISBN: 1587052482
Book size: —; Page extent: 408.

 

PUT TO
THE BASKET
Charles D.A. Ruffolo
Network You Way to Success

— y.
Publisher: —
Description: Network Your Way to Success Charles Ruffolo`s guide to the power of Networking Charisma is generally difficult to transfer to the printed page, unless, of course, you are Charles `Ruf` Ruffolo, MPA, the self-proclaimed NetworKING, a Professional Networker, Speaker and Trainer known for his inimitable style and wildfire networking events held throughout the Netherlands. Ruffolo`s first book, Network Your Way to Success, which he wrote with author and public relations consultant Shirley Agudo, bothof whom are natives of Pittsburgh, Pennsylvania, is a basic but complete guide to the complete networking, A to Z… and then some, with a strong infusion of his infectious charisma. Based on Ruffolo`s very convincing premise that anyone can and everyone should and everyone already does network, he illuminates the whys, wherefores and wisdom of the power of networking for life. In an entertaining way, Ruffolo utilizes personal anecdotes from his wayward youth, 20-year military… [detailed...]

ISBN: 9080823619
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
John Timperley
Network Your Way to Success: Discover the Secrets of the World`s Top Connectors

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0749922834
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Clyde C. Lowstuter, David P. Robertson
Network Your Way to Your Next Job…Fast

— y.
Publisher: —
Description: A companion to the highly successful In Search of the Perfect Job, this book shows job changers how to overcome their limitations and gain the needed visibility and support necessary to uncover the right job. Personal networking is the focus of this razor-sharp guide. It leads readers through the bewildering, often-scary process of overcoming self-limitations to help them gain the visibility and support needed to uncover the perfect job. As Lowstuter and Robertson put it: `The really good jobs go to people who are the best at job hunting-not necessarily the best at doing the job.` [detailed...]

ISBN: 0070388830
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Mark S. Daskin, Mark S. Daskin
Network and Discrete Location: Models, Algorithms, and Applications

— y.
Publisher: —
Description: The comprehensive introduction to the art and science of locating facilities to make your organization more efficient, effective, and profitable. For the professional siting facilities, the task of translating organizational goals and objectives into concrete facilities requires a working familiarity with the theoretical and practical fundamentals of facility location planning and modeling. The first hands-on guide to using and developing facility location models, Network and Discrete Location offers a practiceoriented introduction to model-building methods and solution algorithms, complete with software to solve classical problems of realistic size and end-of-chapter exercises to enhance the reader?s understanding. The text introduces the reader tothe key classical location problems (covering, center, median, and fixed charge) which form the nucleus of facility location modeling. It also discusses real-life extensions of the basic models used in locating: production and… [detailed...]

ISBN: 047101897X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Fay Sudweeks, Margaret L. McLaughlin, Sheizaf Rafaeli
Network and Netplay: Virtual Groups on the Internet

— y.
Publisher: —
Description: foreword by Ronald Rice The vast, international web of computer networks that is the Internet offers millions of users the opportunity to exchange electronic mail, photographs, and sound clips, to search databases for books, CDs, cars, and term papers, to participate in real-time audio- and video-conferencing, and to shop for products both virtual and physical. This huge conglomerate of links, hyperlinks, and virtual links is not just a technology for linking computers--it is a medium for communication. The convergence of computer and communication technologies creates a social convergence as well. People meet in chat rooms and discussion groups to converse on everything from auto mechanics to postmodern art. Networked groups form virtually and on-the-fly, as common interests dictate. Like interpersonal communication, the networks are participatory, their content made up by their audience. Like mass-mediated communication,… [detailed...]

ISBN: 0262692066
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz