Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


1. 

Wireless Body Area Networks: Technology, Implementation, and Applications

Wireless Body Area Networks: Technology, Implementation, and Applications

By: Mehmet Yuce; Jamil Khan

Publisher: Pan Stanford Publishing

Publication Date: 06-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN...

2. 

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

By: Frank Siepmann

Publisher: Auerbach Publications

Publication Date: 09-DEC-2013

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book explains how to address the risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book provides the fundamental understanding and guidance readers need to keep information, processes,...

3. 

Security De-Engineering: Solving the Problems in Information Risk Management

Security De-Engineering: Solving the Problems in Information Risk Management

By: Ian Tibble

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

With organizations facing growing security challenges from both automated and manual attacks, these incidents now represent more of a threat to the bottom line than ever before. This book explains the problems in corporate information security and how to solve them. Based on more than a decade of global experience, the author explains how the industry has faltered and how a gradual decline in analytical skills has led the corporate world on a disastrous collision course with automated malware attacks and manual intrusions. ...

4. 

IP Telephony Interconnection Reference: Challenges, Models, and Engineering

IP Telephony Interconnection Reference: Challenges, Models, and Engineering

By: Mohamed Boucadair; Isabel Borges; Pedro Neves; Olafur Einarsson

Publisher: CRC Press

Publication Date: 04-NOV-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Written to address the growth of IP telephony service offerings within the corporate and residential realm, this book discusses technical and regulatory issues related to IP Telephony Interconnection. It describes business and interconnection models and solutions, and provides an overview of emerging architectures such as IMS and TISPAN. The authors offer a detailed overview of the SPPEERMINT activity and proposed architecture, the current work undertaken in DRINKS, the use of ENUM for interconnection, and ENUM implementation status, among others. This text is a first of its kind to offer...

5. 

Communication Architectures for Systems-on-Chip

Communication Architectures for Systems-on-Chip

By: José Ayala

Publisher: CRC Press

Publication Date: 14-MAR-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book covers the current communication architectures that are implemented in manufactured systems-on-chip, as well as those that are being proposed to overcome the existing limitations. The text addresses well-established communication buses and less-common networks on chip, along with modern technologies that propose the use of carbon nano tubes and optical links to speed up data transfer and increase both security levels and quality of service. Contributors address on-chip transaction security involving critical information and the mechanisms to protect from an external attack,...

6. 

Advanced Windows RT Memory Dump Analysis: ARM Version

Advanced Windows RT Memory Dump Analysis: ARM Version

By: 

Publisher: OpenTask

Publication Date: 18-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The full transcript of Software Diagnostics Services training with 9 step-by-step exercises. Learn how to navigate through memory dump space and Windows data structures to perform memory forensics, troubleshoot and debug complex software incidents. The training uses a unique and innovative pattern-driven analysis approach to speed up the learning curve. It consists of practical step-by-step exercises using WinDbg to diagnose structural and behavioural patterns in Windows RT kernel and complete (physical) memory dumps. Additional topics include memory search, kernel linked list navigation,...

7. 

Managing Trust in Cyberspace

Managing Trust in Cyberspace

By: Sabu Thampi; Bharat Bhargava; Pradeep Atrey

Publisher: Chapman and Hall/CRC

Publication Date: 14-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Bringing together cross-disciplinary expertise, this illustrated, tutorial-style text addresses fundamentals underpinning computational trust models and covers trust management processes for dynamic open systems and applications. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book walks through online identity management, examines using trust and argumentation in recommender...

8. 

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications

By: Xiangyun Zhou; Lingyang Song; Yan Zhang

Publisher: CRC Press

Publication Date: 15-NOV-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in...

9. 

Improving the Performance of Wireless LANs: A Practical Guide

Improving the Performance of Wireless LANs: A Practical Guide

By: Nurul Sarkar

Publisher: Chapman and Hall/CRC

Publication Date: 08-JAN-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book quantifies the key factors of WLAN performance and describes methods for improvement. It provides theoretical background and empirical results for the optimum planning and deployment of indoor WLAN systems, explaining the fundamentals while supplying guidelines for design, modeling, and performance evaluation. It discusses environmental effects on WLAN systems, protocol redesign for routing and MAC, and traffic distribution; examines emerging and future network technologies; and includes radio propagation and site measurements, simulations for various network design scenarios,...

10. 

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

By: Douglas Landoll

Publisher: CRC Press

Publication Date: 20-MAY-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Picking up where the bestselling first edition left off, this second edition explains how to conduct an effective risk assessment. Supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting, it provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence. Trusted to assess security for leading organizations and government agencies, including the CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals...

11. 

Near Field Communication

Near Field Communication

By: Sheli McHugh; Kristen Yarmey

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 11-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Near Field Communication is a radio frequency technology that allows objects, such as mobile phones, computers, tags, or posters, to exchange information wirelessly across a small distance. This report on the progress of Near Field Communication reviews the features and functionality of the technology and summarizes the broad spectrum of its current and anticipated applications. We explore the development of NFC technology in recent years, introduce the major stakeholders in the NFC ecosystem, and project its movement toward mainstream adoption. Several examples of early implementation of NFC...

12. 

Kali Linux – Assuring Security by Penetration Testing

Kali Linux – Assuring Security by Penetration Testing

By: Tedi Heriyanto; Lee Allen; Shakeel Ali

Publisher: Packt Publishing

Publication Date: 07-APR-2014

Insert Date: 10-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Master the art of penetration testing Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing...

13. 

Telecommunication Network Economics

Telecommunication Network Economics

By: Patrick Maillé; Bruno Tuffin

Publisher: Cambridge University Press

Publication Date: 28-FEB-2014

Insert Date: 05-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Presenting a balance of theory and practice, this up-to-date guide provides a comprehensive overview of the key issues in telecommunication network economics, as well as the mathematical models behind the solutions. These mathematical foundations enable the reader to understand the economic issues arising at this pivotal time in network economics, from business, research and political perspectives. This is followed by a unique practical guide to current topics, including app stores, volume-based pricing, auctions for advertisements, search engine business models, the network neutrality...

14. 

Advanced Communication Protocol Technologies

Advanced Communication Protocol Technologies

By: Katalin Tarnay; Gusztáv Adamis; Tibor Dulai

Publisher: IGI Global

Publication Date: 30-JUN-2011

Insert Date: 03-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The rapid improvements brought about by modern telecommunications are made possible by unfettered transmission of information, which relies on the ability to send, receive and properly utilize communication. Advanced Communication Protocol Technologies: Solutions, Methods, and Applications explores the complications and solutions created by communication required between ever-expanding technologies. The research in this book encompasses the fundamentals of protocol functions and protocol operations, the controlling protocols of ISDN and mobile networks, the evolution of IP-based protocols,...

15. 

Server Time Protocol Implementation Guide

Server Time Protocol Implementation Guide

By: Octavian Lascu; Hans-Peter Eckam; George Kozakos; Paulo Vitor Pereira

Publisher: IBM Redbooks

Publication Date: 28-JUN-2013

Insert Date: 01-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of IBM® zEnterprise EC12 (zEC12), IBM zEnterprise 196 (z196), IBM zEnterprise 114 (z114), IBM System z10®, and IBM System z9®. It provides improved time synchronization in both a sysplex or non-sysplex configuration. This IBM Redbooks® publication will help you configure a Mixed Coordinated Timing Network (CTN) or an STP-only CTN. It is intended for technical support personnel requiring information about: -Installing and configuring a Coordinated Timing Network -Using STP functions...

16. 

Deploying IP and MPLS QoS for Multiservice Networks

Deploying IP and MPLS QoS for Multiservice Networks

By: John William Evans; Clarence Filsfils

Publisher: Morgan Kaufmann

Publication Date: 26-JUL-2010

Insert Date: 29-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

QoS, short for “quality of service,? is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional. The authors have provided a comprehensive treatise on this...

17. 

Cyberwar and Information Warfare

Cyberwar and Information Warfare

By: Daniel Ventre

Publisher: John Wiley & Sons

Publication Date: 15-AUG-2011

Insert Date: 28-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations,...

18. 

Rough Cuts
Information Security: Principles and Practices, Second Edition

Information Security: Principles and Practices, Second Edition

By: Mark S. Merkow; Jim Breithaupt

Publisher: Pearson Certification

Publication Date: 05-JUN-2014

Insert Date: 28-MAR-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Authored by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field. This edition addresses today's newest trends,...

19. 

Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World

By: Hamid Nemati

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 26-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein....

20. 

Learning Nagios 4

Learning Nagios 4

By: Wojciech Kocjan

Publisher: Packt Publishing

Publication Date: 21-MAR-2014

Insert Date: 25-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn how to set up Nagios 4 in order to monitor your systems efficiently Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a simplified manner In Detail One of the most important challenges in system monitoring is to detect and report any malfunctioning system or device as soon as possible, so that you as an administrator are aware of the problem before a user runs into...