Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


901. 

Multimedia Transcoding in Mobile and Wireless Networks

Multimedia Transcoding in Mobile and Wireless Networks

By: Ashraf M.A. Ahmad; Ismail Khalil Ibrahim

Publisher: IGI Global

Publication Date: 31-JUL-2008

Insert Date: 30-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Multimedia Transcoding in Mobile and Wireless Networks addresses the transcoding of all multimedia elements including video, audio and text, while addressing both practical and theoretical problems in the field. This must-have book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research. ...

902. 

Multimedia Forensics and Security

Multimedia Forensics and Security

By: Chang-Tsun Li

Publisher: IGI Global

Publication Date: 31-JUL-2008

Insert Date: 30-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Multimedia Forensics and Security provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification. ...

903. 

Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection

Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection

By: Yun Wang

Publisher: IGI Global

Publication Date: 31-OCT-2008

Insert Date: 30-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection bridges between applied statistical modeling techniques and network security to provide statistical modeling and simulating approaches to address the needs for intrusion detection and protection. This authoritative source collects must-read research for network administrators and researchers in related fields. ...

904. 

IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find this a valuable and up-to-date resource. This hands-on guide is designed so that you can select, design, and implement an actual network using the tutorials and steps in the book. Coverage includes an overview of networking technologies, including the hardware, software, transmission media, and data transfer processes; in-depth coverage of OSI...

905. 

Network Access Control For Dummies®

Network Access Control For Dummies®

By: 

Publisher: For Dummies

Publication Date: 11-MAY-2009

Insert Date: 24-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You’ll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you’ll become familiar with what NAC is (and what it isn’t) as well as the key business drivers for deploying...

906. 

OPTICAL NETWORKING BEST PRACTICES HANDBOOK

Optical Networking Best Practices Handbook

By: 

Publisher: Wiley-Interscience

Publication Date: 28-NOV-2006

Insert Date: 20-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Optical Networking Best Practices Handbook presents optical networking in a very comprehensive way for nonengineers needing to understand the fundamentals of fiber, high-capacity, high-speed equipment and networks, and upcoming carrier services. The book provides a practical understanding of fiber optics as a physical medium, sorting out single-mode versus multi-mode and the crucial concept of Dense Wave-Division Multiplexing. ...

907. 

Hacking For Dummies® 3rd Edition

Hacking For Dummies® 3rd Edition

By: 

Publisher: For Dummies

Publication Date: 12-JAN-2010

Insert Date: 20-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application...

908. 

With around 3 billion subscribers, GSM is the world's most commonly used technology for wireless communication. Providing an overview of the innovations that have fuelled this phenomena, GSM: Architecture, Protocols and Services, Third Edition offers a clear introduction to the field of cellular systems. Special emphasis is placed on system architecture and protocol aspects, and topics range from addressing concepts through mobility management to network management. This third edition contains around 25% new and reworked material and has been thoroughly updated to encompass recent...

909. 

#20: Running the Numbers: System, Network, and Environment Monitoring

#20: Running the Numbers: System, Network, and Environment Monitoring

By: 

Publisher: The USENIX Association

Publication Date: 01-JAN-2010

Insert Date: 14-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

This booklet is about one aspect of system and network monitoring: collecting, storing, reviewing, and acting on numbers (or, more formally, data points) that tell us something relevant about our environment. We are concentrating on instrumenting our systems and networks rather than on examining or monitoring the services we provide. We focus on monitoring our environment and less on controlling the equipment that controls it. But with any monitoring process comes the ability to influence the thing being monitored, either automatically or through conscious action on the part of the...

910. 

Data Leaks For Dummies®

Data Leaks For Dummies®

By: 

Publisher: For Dummies

Publication Date: 24-FEB-2009

Insert Date: 13-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Data leaks expose your customers to identity theft and your business to security risks. But how do you set up a data loss prevention plan? Start with Data Leaks For Dummies! Now more than ever, it’s critical to keep your company data locked up tighter than Fort Knox. Data Leaks For Dummies has the scoop on what’s at risk, how leaks happen, how to keep your data safe without being inflexible, and even what to do if the worst happens. It shows you how to: Identify risk by learning to see your data the way a criminal would Recognize how innocent mistakes, common carelessness, and...

911. 

Cisco® Network Professional's: Advanced Internetworking Guide

Cisco® Network Professional's: Advanced Internetworking Guide

By: 

Publisher: Sybex

Publication Date: 11-MAY-2009

Insert Date: 13-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Ideal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification. The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP, etherchannel, and trunking, all the way to application layer security topics such as firewall inspection and intrusion prevention systems. Items being covered in the middle will include all the common routing protocols RIP, EIGRP, OSPF and BGP. Many other...

912. 

Business Data Communications and Networking, Tenth Edition

Business Data Communications and Networking

By: 

Publisher: John Wiley & Sons

Publication Date: 09-JAN-2009

Insert Date: 11-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Over the past few years, many fundamental changes have occurred in data communications and networking that will shape the future for decades to come. Updated with the latest advances in the field, Jerry FitzGerald and Alan Dennis' 10th Edition of Business Data Communications and Networking continues to provide the fundamental concepts and cutting-edge coverage applications that students need to succeed in this fast-moving field.  Authors FitzGerald and Dennis have developed a foundation and balanced presentation from which new technologies and applications can be easily understood,...

913. 

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Unauthorised Access: Physical Penetration Testing For IT Security Teams

By: 

Publisher: John Wiley & Sons

Publication Date: 22-SEP-2009

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any...

914. 

Security in a Web 2.0+ World: A Standards-Based Approach

Security in a Web 2.0+ World: A Standards-Based Approach

By: 

Publisher: John Wiley & Sons

Publication Date: 04-MAY-2009

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems – a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol. Many companies are currently applying...

915. 

Windows Server® 2008 R2 Administration: Instant Reference

Windows Server® 2008 R2 Administration: Instant Reference

By: 

Publisher: Sybex

Publication Date: 26-JAN-2010

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

All your Windows Server 2008 R2 questions answered—on the spot! Get up to speed on the new features of Windows Server 2008 R2 with this indispensableguide. Designed for busy IT professionals, it's the perfect go-to resource for quick answers and real-world solutions as you administer the new server OS. You'll find easy-to-read lists, quick-reference tables, helpful thumb tabs, and much more in a handy, compact format that puts the information you need at your fingertips. Topics include: Getting started and adding roles and functionality Automating tasks Managing users,...

916. 

Network Security Bible, 2nd Edition

Network Security Bible, 2nd Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 08-SEP-2009

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security. Covers all core areas...

917. 

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

By: 

Publisher: John Wiley & Sons

Publication Date: 14-DEC-2009

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service...

918. 

TCP/IP For Dummies®, 6th Edition

TCP/IP For Dummies®, 6th Edition

By: 

Publisher: For Dummies

Publication Date: 11-AUG-2009

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for beginners as well as the perfect go-to resource for TCP/IP veterans. The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step...

919. 

Networking Bible

Networking Bible

By: 

Publisher: John Wiley & Sons

Publication Date: 15-SEP-2009

Insert Date: 05-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Everything you need to set up and maintain large or small networks Barrie Sosinsky Networking Bible Create a secure network for home or enterprise Learn basic building blocks and standards Set up for broadcasting, streaming, and more The book you need to succeed! Your A-Z guide to networking essentials Whether you're setting up a global infrastructure or just networking two computers at home, understanding of every part of the process is crucial to the ultimate success of your system. This comprehensive book is your complete, step-by-step guide to networking—from different...

920. 

Computer Evidence: Collection and Preservation, Second Edition

Computer Evidence: Collection and Preservation, Second Edition

By: Christopher L. T. Brown

Publisher: Course Technology PTR

Publication Date: 01-JUN-2009

Insert Date: 26-FEB-2010

Slots: 1.0

Table of Contents • Start Reading

As computers and data systems continue to evolve, they expand into every facet of our personal and business lives. Never before has our society been so information and technology driven. Because computers, data communications, and data storage devices have become ubiquitous, few crimes or civil disputes do not involve them in some way. This book teaches law enforcement, system administrators, information technology security professionals, legal professionals, and students of computer forensics how to identify, collect, and maintain digital artifacts to preserve their reliability for admission...