Filter
(found 6663 products)
Book cover image
Explore the features included in the latest versions of MQTT for IoT and M2M communications and use them with modern Python 3. Key Features Make your connected devices less prone to attackers by understanding security mechanisms Take advantage of MQTT features for IoT and Machine-to-Machine communications The only book that ...
Hands-On MQTT Programming with Python: Work with the lightweight IoT protocol in Python
Explore the features included in the latest versions of MQTT for IoT and M2M communications and use them with modern Python 3. Key Features Make your connected devices less prone to attackers by understanding security mechanisms Take advantage of MQTT features for IoT and Machine-to-Machine communications The only book that covers MQTT with a single language, Python Book Description MQTT is a lightweight messaging protocol for small sensors and mobile devices. This book explores the features of the latest versions of MQTT for IoT and M2M communications, how to use them with Python 3, and allow you to interact with sensors and actuators using Python. The book begins with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. You will use different utilities and diagrams to understand the most important concepts related to MQTT. You will learn to make all the necessary configuration to work with digital certificates for encrypting all data sent between the MQTT clients and the server. You will also work with the different Quality of Service levels and later analyze and compare their overheads. You will write Python 3.x code to control a vehicle with MQTT messages delivered through encrypted connections (TLS 1.2), and learn how leverage your knowledge of the MQTT protocol to build a solution based on requirements. Towards the end, you will write Python code to use the PubNub cloud-based real-time MQTT provider to monitor a surfing competition. In the end, you will have a solution that was built from scratch by analyzing the requirements and then write Python code that will run on water-proof IoT boards connected to multiple sensors in surfboards. What you will learn Learn how MQTT and its lightweight messaging system work Understand the MQTT puzzle: clients, servers (formerly known as brokers), and connections Explore the features included in the latest versions of MQTT for IoT and M2M communications Publish and receive MQTT messages with Python Learn the difference between blocking and threaded network loops Take advantage of the last will and testament feature Work with cloud-based MQTT interfaces in Python Who this book is for This book is for developers who want to learn about the MQTT protocol for their IoT projects. Prior knowledge of working with IoT and Python will be helpful.
https://magrudy-assets.storage.googleapis.com/9781789138542.jpg
36.740000 USD

Hands-On MQTT Programming with Python: Work with the lightweight IoT protocol in Python

by Gaston C. Hillar
Paperback
Book cover image
Become familiar with ICND1 (100-105) exam objectives, and learn how to get ready for the exam Key Features A step by step guide that will build you skills from basic concepts to completely understanding network communication Comprehensive coverage to help you implement the knowledge you've gained in real-world scenarios Take ...
CCENT/CCNA: ICND1 100-105 Certification Guide: Learn computer network essentials and enhance your networking skills by obtaining the CCENT certification
Become familiar with ICND1 (100-105) exam objectives, and learn how to get ready for the exam Key Features A step by step guide that will build you skills from basic concepts to completely understanding network communication Comprehensive coverage to help you implement the knowledge you've gained in real-world scenarios Take practice questions and mock tests to check how prepared you are for the CCENT exam Book DescriptionCCENT is the entry-level certification for those looking to venture into the networking world. This guide will help you stay up-to date with your networking skills. This book starts with the basics and will take you through everything essential to pass the certification exam. It extensively covers IPv4 and IPv6 addressing, IP data networks, switching and routing, network security, and much more-all in some detail. This guide will provide real-world examples with a bunch of hands-on labs to give you immense expertise in important networking tasks, with a practical approach. Each chapter consists of practice questions to help you take up a challenge from what you have procured. This book ends with mock tests with several examples to help you confidently pass the certification. This Certification Guide consists of everything you need to know in order to pass the ICND 1 100-105 Exam, thus obtaining a CCENT certification. However, practicing with real switches and routers or a switch or router simulator will help you succeed. What you will learn Get to grips with the computer network concepts Understand computer network components and learn to create a computer network Understand switching and learn how to configure a switch Understand routing and learn how to configure a router Understand network services and the maintenance process Learn how to troubleshoot networking issues Become familiar with, and learn how to prepare for, the ICND1 100-105 exam Who this book is forIf you are a Network Administrator, Network Technician, Networking professional, or would simply like to prepare for your CCENT certification, then this book is for you. Some basic understanding of networks and how they work would be helpful. Sufficient information will be provided to those new to this field.
https://magrudy-assets.storage.googleapis.com/9781788621434.jpg
31.490000 USD

CCENT/CCNA: ICND1 100-105 Certification Guide: Learn computer network essentials and enhance your networking skills by obtaining the CCENT certification

by Bekim Dauti
Paperback
Book cover image
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager Current Branch. A team of expert authors offers step-by-step, end-to-end coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager Current Branch for their requirements, and then deploy and ...
System Center Configuration Manager Current Branch Unleashed
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager Current Branch. A team of expert authors offers step-by-step, end-to-end coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager Current Branch for their requirements, and then deploy and use it successfully. The authors begin by introducing Configuration Manager Current Branch and its goals, and explaining how it fits into the broader System Center product suite. Next, they fully address planning, design, and implementation. Finally, they systematically cover each of Configuration Manager Current Branch's most important feature sets. You'll find detailed, expert coverage of these and many other topics: Managing clients and compliance Creating and managing applications, deployment types, packages, and programs Distributing and deploying applications and packages Managing software updates Integrating Intune Hybrid Managing mobile devices Providing conditional access Protecting endpoints Querying and reporting with Configuration Manager Deploying operating systems Enforcing security and delegation Performing backup, recovery, and maintenance The first book on Configuration Manager 2016, System Center Configuration Manager Current Branch Unleashed joins Sams' market-leading series of books on Microsoft's System Center product suite: books that have achieved go-to status amongst IT implementers and administrators worldwide.
https://magrudy-assets.storage.googleapis.com/9780672337901.jpg
62.990000 USD

System Center Configuration Manager Current Branch Unleashed

by Michael Wiles, Kenneth van Surksum, Greg Ramsey, Saud Al-Mishari, Gerry Hampson, Kerrie Meyler
Paperback
Book cover image
Use Wireshark 2 to overcome real-world network problems Key Features Delve into the core functionalities of the latest version of Wireshark Master network security skills with Wireshark 2 Efficiently find the root cause of network-related issues Book DescriptionWireshark, a combination of a Linux distro (Kali) and an open source security ...
Mastering Wireshark 2: Develop skills for network analysis and address a wide range of information security threats
Use Wireshark 2 to overcome real-world network problems Key Features Delve into the core functionalities of the latest version of Wireshark Master network security skills with Wireshark 2 Efficiently find the root cause of network-related issues Book DescriptionWireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people. Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You'll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files. By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes. What you will learn Understand what network and protocol analysis is and how it can help you Use Wireshark to capture packets in your network Filter captured traffic to only show what you need Explore useful statistic displays to make it easier to diagnose issues Customize Wireshark to your own specifications Analyze common network and network application protocols Who this book is forIf you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of using Wireshark, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788626521.jpg
41.990000 USD

Mastering Wireshark 2: Develop skills for network analysis and address a wide range of information security threats

by Andrew Crouthamel
Paperback
Book cover image
Contemporary Consumer Health Informatics
https://magrudy-assets.storage.googleapis.com/9783319798684.jpg
188.990000 USD

Contemporary Consumer Health Informatics

Paperback
Book cover image
Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure
https://magrudy-assets.storage.googleapis.com/9781587144745.jpg
56.29 USD

Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure

by Bill DuFresne, Jose Moreno, Frank Dagenhardt
Undefined
Book cover image
Cloud Computing: Theory and Practice: Second Edition provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and ...
Cloud Computing: Theory and Practice
Cloud Computing: Theory and Practice: Second Edition provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and parallel and distributed systems. Section Two presents such critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software. Section Three covers cloud applications and cloud security, while Section Four presents research topics in cloud computing. Specific topics covered include resource virtualization, resource management and scheduling, and advanced topics like the impact of scale on efficiency, cloud scheduling subject to deadlines, alternative cloud architectures, and vehicular clouds. An included glossary covers terms grouped in several categories, from general to services, virtualization, desirable attributes and security.
https://magrudy-assets.storage.googleapis.com/9780128128107.jpg
88.71 USD

Cloud Computing: Theory and Practice

by Dan C. Marinescu
Paperback
Book cover image
IP multicast is central to today's enterprise and service provider networks. However, the set of technologies and practices surrounding IP multicast has evolved and matured: older books on the topic are severely out of date. IP Multicast Architectures offers comprehensive guidance for deploying modern IP multicast systems of all kinds: ...
IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design
IP multicast is central to today's enterprise and service provider networks. However, the set of technologies and practices surrounding IP multicast has evolved and matured: older books on the topic are severely out of date. IP Multicast Architectures offers comprehensive guidance for deploying modern IP multicast systems of all kinds: basic and advanced, enterprise and service provider. Focused on Cisco devices and technologies,IP Multicast Architectures addresses common features, deployment models, and field best practices. Each section offers immersive real-world explanations of multicast theory, and present multiple case studies showcasing best-practice multicast design methodologies. Each case study is carefully crafted to offer pragmatic first-hand guidance for building the right network for each environment and set of applications. Coverage includes Layer 2 and Layer 3 multicast; routing, forwarding, domains, inter-domain routing, wireless multicast forwarding, Inter-AS, mVPN, mVRF, cloud mVPN transport, and much more. Throughout, the authors' configurations, designs, features, and parameters reflect all that's been learned since IP multicast first became widespread.
https://magrudy-assets.storage.googleapis.com/9781587144936.jpg
73.490000 USD

IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design

by Arvind Durai, Ray Blair, Josh Loveless
Paperback
Book cover image
This book is a comprehensive introduction to Internet Infrastructure. It covers wired and wireless networks, the Internet (specifically the TCP/IP protocol), the domain name system (DNS), web servers and the HTTP/HTTPS protocols, web caches and various proxy server protocols, establishing IP addresses, and cloud computing. The book also includes forms ...
Internet Infrastructure: Networking, Web Services, and Cloud Computing
This book is a comprehensive introduction to Internet Infrastructure. It covers wired and wireless networks, the Internet (specifically the TCP/IP protocol), the domain name system (DNS), web servers and the HTTP/HTTPS protocols, web caches and various proxy server protocols, establishing IP addresses, and cloud computing. The book also includes forms of encryption technologies, securing networks and servers, network analysis tools, load balancing, mechanisms for redundancy, and more. Each concept chapter is followed by a case study chapter to illustrate the concepts presented. The case study chapters are set up so that readers can install servers and experiment with their configurations.
https://magrudy-assets.storage.googleapis.com/9781138039919.jpg
187.69 USD

Internet Infrastructure: Networking, Web Services, and Cloud Computing

by Wei Hao, Richard Fox
Hardback
Book cover image
This book provides a collection of contributions illustrating the latest research in the areas of future networks, applications, enabling technologies, and implementation issues and challenges. The book encompasses research on emerging areas such as the wireless technologies, software-defined networks, Cloud Computing, IoT, and Big Data. These emerging technologies bring promising ...
Networks of the Future: Architectures, Technologies, and Implementations
This book provides a collection of contributions illustrating the latest research in the areas of future networks, applications, enabling technologies, and implementation issues and challenges. The book encompasses research on emerging areas such as the wireless technologies, software-defined networks, Cloud Computing, IoT, and Big Data. These emerging technologies bring promising opportunities and challenges which are also discussed in the book. It will also help researchers and graduate students to explore the latest research and trends in computer networking.
https://magrudy-assets.storage.googleapis.com/9781498783972.jpg
187.69 USD

Networks of the Future: Architectures, Technologies, and Implementations

Hardback
Book cover image
Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. This guide's problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must ...
Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks
Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. This guide's problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions to those problems, and providing examples of these solutions as they've been implemented in protocols both old and new. This book's three sections each cover a different set of problems and solutions. Section I considers data transport (the data plane). Section II covers protocols used to discover and use topology and reachability information (the control plane). Section III considers some common network designs and architectures, including data center fabrics, MPLS cores, and modern Software-Defined Wide Area Networks (SD-WAN). The principles that underlie such technologies as Software Defined Networks (SDNs) are considered throughout the book, as solutions to the common problems faced by all networking technologies. Computer Networking Problems and Solutions is ideal for beginning network engineers, students just starting out in computer networks, and experienced engineers seeking a deeper understanding of the technologies they use every day. Whatever their background, it will help readers quickly recognize problem/solution patterns constantly encountered in computer networks, and quickly apply this knowledge with new protocols, solutions, systems, and network environments.
https://magrudy-assets.storage.googleapis.com/9781587145049.jpg
95.54 USD

Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks

by Russ White
Paperback
Book cover image
Packed with a wealth of hands-on activities, MCSA GUIDE TO IDENTITY WITH WINDOWS SERVER (R) 2016, EXAM 70-742 empowers you to successfully pass the MCSE/MCSA certification exam while also equipping you to face the real-world challenges of a Microsoft (R) networking professional. This engaging full-color presentation emphasizes the skills necessary ...
MCSA Guide to Identity with Windows Server (R) 2016, Exam 70-742
Packed with a wealth of hands-on activities, MCSA GUIDE TO IDENTITY WITH WINDOWS SERVER (R) 2016, EXAM 70-742 empowers you to successfully pass the MCSE/MCSA certification exam while also equipping you to face the real-world challenges of a Microsoft (R) networking professional. This engaging full-color presentation emphasizes the skills necessary to configure identity management with Windows Server (R) 2016. Comprehensive coverage highlights advanced Active Directory configuration and management, Group Policy, Certificate Services, Identity federation, Web Application Proxy and Active Directory Rights Management. Hands-on labs and skill-reinforcing case projects give you plenty of opportunity to apply what you learn to real-world practice.
https://magrudy-assets.storage.googleapis.com/9781337400893.jpg
157.450000 USD

MCSA Guide to Identity with Windows Server (R) 2016, Exam 70-742

by Greg Tomsho
Paperback
Book cover image
Compressed Sensing in Li-Fi and Wi-Fi Networks features coverage of the first applications in optical telecommunications and wireless. After extensive development of basic theory, many techniques are presented, such as non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models. The book can be used ...
Compressed Sensing in Li-Fi and Wi-Fi Networks
Compressed Sensing in Li-Fi and Wi-Fi Networks features coverage of the first applications in optical telecommunications and wireless. After extensive development of basic theory, many techniques are presented, such as non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models. The book can be used as a comprehensive manual for teaching and research in courses covering advanced signal processing, efficient data processing algorithms, and telecommunications. After a thorough review of the basic theory of compressed sensing, many mathematical techniques are presented, including advanced signal modeling, Nyquist sub-sampling of analog signals, the non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models.
https://magrudy-assets.storage.googleapis.com/9781785482007.jpg
209.87 USD

Compressed Sensing in Li-Fi and Wi-Fi Networks

by Mokhtari Hatem, Hadj Batatia, Malek Benslama
Hardback
Book cover image
The goal of this book is to crystallize the emerging mobile computing technologies and trends into positive efforts to focus on the most promising solutions in services computing. Many toys built today are increasingly using these technologies together and it is important to understand the various research and practical issues. ...
Computing in Smart Toys: 2018
The goal of this book is to crystallize the emerging mobile computing technologies and trends into positive efforts to focus on the most promising solutions in services computing. Many toys built today are increasingly using these technologies together and it is important to understand the various research and practical issues. The book will provide clear proof that mobile technologies are playing an ever increasing important and critical role in supporting toy computing, which is a new research discipline in computer science. It is also expected that the book will further research new best practices and directions in toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies. This book is mainly intended for researchers and students working in computer science and engineering, and for toy industry technology providers, having particular interests in mobile services. The wide range of authors of this book will help the various communities understand both specific and common problems. This book facilities software developers and researchers to become more aware of this challenging research opportunity. As well, the book is soliciting shall provide valuable strategic outlook on the emerging toy industry.
https://magrudy-assets.storage.googleapis.com/9783319620718.jpg
146.990000 USD

Computing in Smart Toys: 2018

Hardback
Book cover image
This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being ...
Cosine-/Sine-Modulated Filter Banks: General Properties, Fast Algorithms and Audio/Speech Coding Applications
This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.
https://magrudy-assets.storage.googleapis.com/9783319610788.jpg
262.490000 USD

Cosine-/Sine-Modulated Filter Banks: General Properties, Fast Algorithms and Audio/Speech Coding Applications

by K. R. Rao, Vladimir Britanak
Hardback
Book cover image
Among the many configuration management tools available, Ansible has some distinct advantages-it's minimal in nature, you don't need to install anything on your nodes, and it has an easy learning curve. With this updated second edition, you'll learn how to be productive with this tool quickly, whether you're a developer ...
Ansible - Up and Running: Automating Configuration Management and Deployment the Easy Way
Among the many configuration management tools available, Ansible has some distinct advantages-it's minimal in nature, you don't need to install anything on your nodes, and it has an easy learning curve. With this updated second edition, you'll learn how to be productive with this tool quickly, whether you're a developer deploying code to production or a system administrator looking for a better automation solution. Authors Lorin Hochstein and Rene Moser show you how to write playbooks (Ansible's configuration management scripts), manage remote servers, and explore the tool's real power: built-in declarative modules. You'll discover that Ansible has the functionality you need-and the simplicity you desire. Understand how Ansible differs from other configuration management systems Use the YAML file format to write your own playbooks Work with a complete example to deploy a non-trivial application Deploy applications to Amazon EC2 and other cloud platforms Create Docker images and deploy Docker containers with Ansible
https://magrudy-assets.storage.googleapis.com/9781491979808.jpg
61.41 USD

Ansible - Up and Running: Automating Configuration Management and Deployment the Easy Way

by Rene Moser, Lorin Hochstein
Paperback
Book cover image
D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the ...
Device-to-Device-Based Proximity Service: Architecture, Issues, and Applications
D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.
https://magrudy-assets.storage.googleapis.com/9781498724173.jpg
209.950000 USD

Device-to-Device-Based Proximity Service: Architecture, Issues, and Applications

by Hongbo Zhu, Qun Jin, Athanasios V Vasilakos, Yufeng Wang
Hardback
Book cover image
The advances in low-power electronic devices integrated with wireless communication capabilities are one of recent areas of research in the field of Wireless Sensor Networks (WSNs). One of the major challenges in WSNs is uniform and least energy dissipation while increasing the lifetime of the network. This is the first ...
Energy-Efficient Wireless Sensor Networks
The advances in low-power electronic devices integrated with wireless communication capabilities are one of recent areas of research in the field of Wireless Sensor Networks (WSNs). One of the major challenges in WSNs is uniform and least energy dissipation while increasing the lifetime of the network. This is the first book that introduces the energy efficient wireless sensor network techniques and protocols. The text covers the theoretical as well as the practical requirements to conduct and trigger new experiments and project ideas. The advanced techniques will help in industrial problem solving for energy-hungry wireless sensor network applications.
https://magrudy-assets.storage.googleapis.com/9781498783347.jpg
170.62 USD

Energy-Efficient Wireless Sensor Networks

Hardback
Book cover image
This book blends the principles of cloud computing theory and discussion of emerging technologies in cloud broker systems, enabling users to realise the potential of an integrated broker system for scientific applications and the Internet of Things (IoT). Due to dynamic situations in user demand and cloud resource status, scalability ...
Cloud Broker and Cloudlet for Workflow Scheduling: 2017
This book blends the principles of cloud computing theory and discussion of emerging technologies in cloud broker systems, enabling users to realise the potential of an integrated broker system for scientific applications and the Internet of Things (IoT). Due to dynamic situations in user demand and cloud resource status, scalability has become crucial in the execution of complex scientific applications. Therefore, data analysts and computer scientists must grasp workflow management issues in order to better understand the characteristics of cloud resources, allocate these resources more efficiently and make critical decisions intelligently. Thus, this book addresses these issues through discussion of some novel approaches and engineering issues in cloud broker systems and cloudlets for workflow scheduling. This book closes the gaps between cloud programmers and scientific applications designers, describing the fundamentals of cloud broker system technology and the state-of-the-art applications in implementation and performance evaluation. The books gives details of scheduling structures and processes, providing guidance and inspiration for users including cloud programmers, application designers and decision makers with involvement in cloud resource management.
https://magrudy-assets.storage.googleapis.com/9789811050701.jpg
124.950000 USD

Cloud Broker and Cloudlet for Workflow Scheduling: 2017

by Chan-Hyun Youn
Hardback
Book cover image
Packed with a wealth of hands-on activities, NETWORKING WITH WINDOWS SERVER (R) 2016, EXAM 70-741 empowers you to successfully pass the MCSE/MCSA certification exam while also equipping you to successfully face the real challenges that you will encounter as a Microsoft (R) networking professional. This engaging, full-color presentation emphasizes the ...
MCSA Guide to Networking with Windows Server (R) 2016, Exam 70-741
Packed with a wealth of hands-on activities, NETWORKING WITH WINDOWS SERVER (R) 2016, EXAM 70-741 empowers you to successfully pass the MCSE/MCSA certification exam while also equipping you to successfully face the real challenges that you will encounter as a Microsoft (R) networking professional. This engaging, full-color presentation emphasizes the key skills necessary to manage and configure a Windows Server 2016 network. Comprehensive coverage addresses TCP/IP configuration, including IPv6, DNS configuration, DHCP implementation and management, deploying remote access, configuring distributed network file services, and high performance network solutions. In addition, hands-on labs and meaningful case projects offer extensive opportunities for you to apply what you've learned in real practice.
https://magrudy-assets.storage.googleapis.com/9781337400787.jpg
157.450000 USD

MCSA Guide to Networking with Windows Server (R) 2016, Exam 70-741

by Greg Tomsho
Paperback
Book cover image
This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by ...
Resource Allocation with Carrier Aggregation in Cellular Networks: Optimality and Spectrum Sharing Using C++ and MATLAB: 2018
This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by network providers to charge mobile users for the allocated resources. The book provides different resource allocation with carrier aggregation solutions, for different spectrum sharing scenarios, and compares them. The provided solutions consider the diverse quality of experience requirement of multiple applications running on the user's equipment since different applications require different application performance. In addition, the book addresses the resource allocation problem for spectrum sharing systems that require user discrimination when allocating the network resources.
https://magrudy-assets.storage.googleapis.com/9783319605395.jpg
178.490000 USD

Resource Allocation with Carrier Aggregation in Cellular Networks: Optimality and Spectrum Sharing Using C++ and MATLAB: 2018

by Ahmed Abdelhadi
Hardback
Book cover image
Packed with hands-on activities, MCSA GUIDE TO INSTALLATION, STORAGE, AND COMPUTE WITH MICROSOFT (R) WINDOWS SERVER (R) 2016, EXAM 70-740 equips you to pass the MCSE/MCSA certification exam while preparing you to become a successful Microsoft (R) networking professional. A clear presentation emphasizes the skills to manage a Windows Server ...
MCSA Guide to Installation, Storage, and Compute with Microsoft (R) Windows Server (R)2016, Exam 70-740
Packed with hands-on activities, MCSA GUIDE TO INSTALLATION, STORAGE, AND COMPUTE WITH MICROSOFT (R) WINDOWS SERVER (R) 2016, EXAM 70-740 equips you to pass the MCSE/MCSA certification exam while preparing you to become a successful Microsoft (R) networking professional. A clear presentation emphasizes the skills to manage a Windows Server 2016 system and focuses on installation, management, and configuration. Extensive coverage of all exam objectives introduces Windows Server 2016 and covers server installation, server configuration and management, storage and file systems, Hyper-V virtualization, high availability, and server maintenance and monitoring. A full chapter highlights new Nano Server and Windows Containers. Unlike many certification books, this edition goes beyond the certification objectives to provide an understanding of the core technologies built into Windows Server. Hands-on activities focus on virtualization and can be performed in a classroom or within MindTap (R).
https://magrudy-assets.storage.googleapis.com/9781337400664.jpg
157.450000 USD

MCSA Guide to Installation, Storage, and Compute with Microsoft (R) Windows Server (R)2016, Exam 70-740

by Greg Tomsho
Paperback
Book cover image
From the Foreword: This book lays out much of what we've learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn't to predict the future but to help you design and ...
Building the Network of the Future: Getting Smarter, Faster, and More Flexible with a Software Centric Approach
From the Foreword: This book lays out much of what we've learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn't to predict the future but to help you design and build a network that will be ready for whatever that future holds. Because if there's one thing the last decade has taught us, it's that network demand will always exceed expectations. This book will help you get ready. - Randall Stephenson, Chairman, CEO, and President of AT&T Telecom operators face a continuous challenge for more agility to serve their customers with a better customer experience and a lower cost. This book is a very inspiring and vivid testimony of the huge transformation this means, not only for the networks but for the entire companies, and how AT&T is leading it. It provides a lot of very deep insights about the technical challenges telecom engineers are facing today. Beyond AT&T, I'm sure this book will be extremely helpful to the whole industry. -Alain Maloberti, Group Chief Network Officer, Orange Labs Networks This book is based on the lessons learned from AT&T's software transformation journey starting in 2012 when rampant traffic growth necessitated a change in network architecture and design. Using new technologies such as NFV, SDN, Cloud, and Big Data, AT&T's engineers outlined and implemented a radical network transformation program that dramatically reduced capital and operating expenditures. This book describes the transformation in substantial detail. The subject matter is of great interest to telecom professionals worldwide, as well as academic researchers looking to apply the latest techniques in computer science to solving telecom's big problems around scalability, resilience, and survivability.
https://magrudy-assets.storage.googleapis.com/9781138631526.jpg
66.53 USD

Building the Network of the Future: Getting Smarter, Faster, and More Flexible with a Software Centric Approach

by Gretchen Venditto
Hardback
Book cover image
Build and deliver cutting-edge network services with new generation networks About This Book * Navigate through the complexities of delivering modern networking services with practical techniques and solutions * Build robust software defined networks and solve real-world problems involving challenges with next generation networks * Discover the best practices used ...
Building Modern Networks
Build and deliver cutting-edge network services with new generation networks About This Book * Navigate through the complexities of delivering modern networking services with practical techniques and solutions * Build robust software defined networks and solve real-world problems involving challenges with next generation networks * Discover the best practices used by top industry professionals for network-related architecture, services, and applications and secure your networks Who This Book Is For This book is for Network Engineers and Network Administrators who are taking their first steps when deploying software-defined networks. Network Architects will also find this book useful when designing and building modern networks. What you will learn * Understand Traditional Network Challenges to match modern applications requirements * Find out all about Next Generation Networks (NGN) * Explore the different APIs used to control NGN devices * Understand the different software controllers available to manage NGN hardware * Design a next generation network In Detail As IT infrastructures become more software-defined, networking operations tend to be more automated with falling levels of manual configuration at the hardware level. This book will brush up your knowledge on the modern networking concepts and help you apply them to your software-defined infrastructure. Through this book, you will gain the knowledge necessary to evaluate, choose, and deploy a next generation network design. We will cover open and closed network operating systems (NOS) along with the protocols used to control them such as OpenFlow, Thrift, Opflex, and REST. You will also learn about traffic engineering and security concepts for NGNs. You will also find out how to fine-tune your network using QoS and QoE. By the end of the book, you'll be well versed in simplifying the way you design, build, operate, and troubleshoot your network.
https://magrudy-assets.storage.googleapis.com/9781786466976.jpg
47.240000 USD

Building Modern Networks

by Steven Noble
Paperback
Book cover image
Harness the promise of the cloud with Fugue, an operating system built for the cloud. Program cloud infrastructure in a fraction of the time it takes with current tools, debug infrastructure at design time, and centralize your change control process. Written by the Fugue development team, this is the definitive ...
Scalable Cloud Ops with Fugue
Harness the promise of the cloud with Fugue, an operating system built for the cloud. Program cloud infrastructure in a fraction of the time it takes with current tools, debug infrastructure at design time, and centralize your change control process. Written by the Fugue development team, this is the definitive resource to scalable cloud operations with Fugue.

Cloud computing represents the greatest shift in computing in more than a decade. But the promise of the cloud is unrealized. The cloud isn't just about shedding the physical data center - it's about shedding the data center mindset. Cloud infrastructure can be controlled via API calls. This means we can view it as a giant general-purpose compute - and program it. That's where the Fugue operating system and the Ludwig language come in. They automate the creation, operation, enforcement, and termination of infrastructure in the cloud.

This definitive Fugue guide starts with a simple website and moves on to a more robust application with evolving infrastructure needs as you walk through the steps to harnessing the cloud. With Amazon Web Services, launch infrastructure quickly. Debug in design time. Automate deployment and enforcement of your cloud. Centralize your change control process and automate continuous auditing. Rest easy knowing configuration drift, unwanted changes, and infrastructure quality issues are addressed, continuously and automatically. Hands-on chapters lead you through creating this application step by step.

If you're a software engineer, architect, DevOps professional, or enterprise team leader using cloud computing for running applications and websites, this book will change the way you view cloud computing.

What You Need:

An Amazon Web Services (AWS) account and a basic familiarity with the AWS Console.

https://magrudy-assets.storage.googleapis.com/9781680502343.jpg
65.69 USD

Scalable Cloud Ops with Fugue

by Josha Stella
Paperback
Book cover image
The automotive industry is at an inflection point between old and new technologies. More sensors are being incorporated into vehicles in an effort to realize safer and more efficient traffic. The increase in sensors and sensor complexity has a number of implications on the next generation of vehicles. These sensors ...
Millimeter Wave Vehicular Communications: A Survey
The automotive industry is at an inflection point between old and new technologies. More sensors are being incorporated into vehicles in an effort to realize safer and more efficient traffic. The increase in sensors and sensor complexity has a number of implications on the next generation of vehicles. These sensors will generate a huge amount of data that needs to be processed. This sensor data places additional computational requirements on the vehicle and requires higher data rate connectivity in the vehicle. Future systems will need to transmit anywhere from tens to thousands of megabits-per-second. Existing systems manage 6Mbps. The large spectral channels at millimetre wave (mmWave) bands make it a promising candidate to realize high data rates. Furthermore, recent advances in CMOS technology make this cost-effective now. This monograph provides a survey on mmWave vehicular networks including channel propagation measurement, PHY design, and MAC design. The reader is given a comprehensive and up-to-date overview of the technical) aspects the technology used in' the automotive environment. It serves as a trusted starting point for all researchers and designers working on millimetre wave communication for vehicular applications.
https://magrudy-assets.storage.googleapis.com/9781680831481.jpg
89.250000 USD

Millimeter Wave Vehicular Communications: A Survey

by Robert W. Heath, Gaurav Bansal, Takayuki Shimizu, Vutha Va
Paperback
Book cover image
Wireless multi-hop networks have become an important part of many modern communication systems. Some of the earliest examples were military communication networks utilizing wireless relays in remote areas. More recently, many industries have used wireless multi-hop networks to create a multitude of fascinating tools and systems. Motivated by classical routing ...
Opportunistic Routing in Wireless Networks
Wireless multi-hop networks have become an important part of many modern communication systems. Some of the earliest examples were military communication networks utilizing wireless relays in remote areas. More recently, many industries have used wireless multi-hop networks to create a multitude of fascinating tools and systems. Motivated by classical routing solutions in the Internet, conventional routing attempts to find a fixed path along which the packets are forwarded. Such fixed path schemes fail to take advantage of the broadcast nature and opportunities provided by the wireless medium, and result in unnecessary packet retransmissions. In opportunistic routing, decisions are made in an online manner by choosing the next relay based on the actual transmission outcomes as well as a rank ordering of neighbouring nodes. Opportunistic Routing in Wireless Networks provides the motivation for opportunistic routing, and presents several different algorithms which achieve better performance, in most scenarios, than conventional shortest path routing. This comprehensive survey provides a starting point for all researchers and students wishing to learn the background and technical details of opportunistic routing.
https://magrudy-assets.storage.googleapis.com/9781680831504.jpg
103.950000 USD

Opportunistic Routing in Wireless Networks

by Eric Van Buhler, Tara Javidi
Paperback
Book cover image
Modern day wireless communication systems rely heavily on the random access schemes that were originally developed in the 1970s. The pioneering Aloha protocol has become a key component of many communications standards, ranging from satellite networks to ad hoc and cellular scenarios. Recent developments, however, have seen a fundamental leap ...
Modern Random Access Protocols
Modern day wireless communication systems rely heavily on the random access schemes that were originally developed in the 1970s. The pioneering Aloha protocol has become a key component of many communications standards, ranging from satellite networks to ad hoc and cellular scenarios. Recent developments, however, have seen a fundamental leap forward based on using the principles of successive interference cancellation. The modern random access protocols using these new techniques have opened up a wealth of new applications. This tutorial style monograph explores the main ideas and design principles that are behind some of these novel schemes. It introduces the reader to the analytical tools used to model such performance. Focussing on slotted solutions it shows how Aloha can be combined with successive interference cancellation and optimized using the theory of codes on graphs. These techniques are illustrated in applications using physical layer network coding to resolve collisions among users and receiver diversity. It concludes by introducing the reader to the recently asynchronous (or unslotted) schemes. Modern Random Access Protocols is a comprehensive and erudite introduction to a set of techniques that will form part of many future modern communication or networked system.
https://magrudy-assets.storage.googleapis.com/9781680832167.jpg
99.750000 USD

Modern Random Access Protocols

by Andrea Munari, Gianluigi Liva, Giuseppe Cocco, Matteo Berioli
Paperback
Book cover image
A basic question in wireless networking is how to optimize the wireless network resource allocation for utility maximization and interference management. How can we overcome interference to efficiently optimize fair wireless resource allocation, under various stochastic constraints on quality of service demands? Network designs are traditionally divided into layers. How ...
Wireless Network Optimization by Perron-Frobenius Theory
A basic question in wireless networking is how to optimize the wireless network resource allocation for utility maximization and interference management. How can we overcome interference to efficiently optimize fair wireless resource allocation, under various stochastic constraints on quality of service demands? Network designs are traditionally divided into layers. How does fairness permeate through layers? Can physical layer innovation be jointly Optimized with network layer routing control? How should large complex wireless networks be analyzed and designed with clearly-defined fairness using beamforming? Wireless Network Optimization by Perron-Frobenius Theory provides a comprehensive survey of the models, algorithms, analysis, and methodologies using a Perron-Frobenius theoretic framework to solve wireless utility maximization problems. This approach overcomes the notorious non-convexity barriers in these problems, and the optimal value and solution of the optimization problems can be analytically characterized by the spectral property of matrices induced by nonlinear positive mappings. It can even solve several previously open problems in the wireless networking Iiterature. This survey will be of interest to all researchers, students and engineers working on wireless networking.
https://magrudy-assets.storage.googleapis.com/9781680830507.jpg
84.000000 USD

Wireless Network Optimization by Perron-Frobenius Theory

by Chee Wei Tan
Paperback
Book cover image
Biz Stone, the co-founder of Twitter, discusses innovation, creativity and the secrets of being a successful entrepreneur, through stories from his remarkable life and career. THINGS A LITTLE BIRD TOLD ME From GQ's 'Nerd of the Year' to one of Time's most influential people in the world, Biz Stone represents ...
Things a Little Bird Told Me
Biz Stone, the co-founder of Twitter, discusses innovation, creativity and the secrets of being a successful entrepreneur, through stories from his remarkable life and career. THINGS A LITTLE BIRD TOLD ME From GQ's 'Nerd of the Year' to one of Time's most influential people in the world, Biz Stone represents different things to different people. But he is known to all as the creative, effervescent, funny, charmingly positive and remarkably savvy co-founder of Twitter -- the social media platform that singlehandedly changed the way the world works. Now, Biz tells fascinating, pivotal, and personal stories from his early life and his careers at Google and Twitter, sharing his knowledge about the nature and importance of ingenuity today. In Biz's world: -Opportunity can be manufactured -Great work comes from abandoning a linear way of thinking -Creativity never runs out -Asking questions is free -Empathy is core to personal and global success In this book, Biz also addresses failure, the value of vulnerability, ambition, and corporate culture. Whether seeking behind-the-scenes stories, advice, or wisdom and principles from one of the most successful businessmen of the new century, THINGS A LITTLE BIRD TOLD ME will satisfy every reader.
https://magrudy-assets.storage.googleapis.com/9781447271123.jpg
17.06 USD

Things a Little Bird Told Me

by Biz Stone
Paperback
Page 1 of 40