Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. This book includes coverage of the topics of importance to networking professionals and students, including P2P, wireless, security, and applications.
Explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. This book is suitable for Java programmers interested in Bluetooth wireless technology and business managers interested in its potential for creating fresh business opportunities.
Devoted exclusively to IP-based services, this work focuses on the IP technologies that offer your service and its users the greatest value, including MPLS, Voice Over IP, and multicast. It also provides the technical coverage required for successful implementation, according to the terms of the business model you choose.
Explains Virtual Private Network (VPN) concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions. This book covers VPN topics like tunneling, encapsulation, encryption, security, and protocols. It lists and assesses the software and hardware products you may need to implement a VPN.
Teaches the principles at work in an integrated approach to systems management. This book covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures. It describes the functionality of management tools used in the real world - and advice on choosing one right for your organization.
Offers a dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. This book provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, and encryption.
Examines the complex interrelationships of laws, technologies, and business practices, and equips you with the practical understanding you need to run your enterprise optimally within legal boundaries. This work also explores telecommunications law in the US, at both the federal and state level.
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. This work discusses system requirements, information models, and system components for Policy-Based Management. It cuts through the hype surrounding PBNM making it approachable.
Explains how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use.
The Globus Toolkit is a key technology in Grid Computing that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. This book situates Globus application development within the context of Web Services and evolving Grid standards.
Introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.
Explores TCP/IP networking that can benefit newcomers and veterans alike. This book reflects technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS).
Serving as a guide to the Quality of Service (QoS) techniques, this title addresses the Internet's special challenges. It focuses on the four main areas of Internet QoS: integrated services, differentiated services, MPLS (Multiprotocol Label Switching), and traffic engineering.
Presents information on protecting and restoring communication networks. This title helps you learn specific techniques that work at various layers of the networking hierarchy - including optical, SONET-SDH, IP, and MPLS-as well as multi-layer escalation strategies that offer the highest level of protection.
Suitable for software architects, designers and programmers, hardware developers, system testers and network operators - and also for managers and other decision-makers, this work provides a practical look at GMPLS protocols for signaling, routing, link and resource management and traffic engineering.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.