Filter
(found 6139 products)
Book cover image
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide ...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide for system administrators to manage mission-critical servers Based on real-world experience - Written by an industry veteran who has made every possible mistake within this field. Book DescriptionManaging your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at how to run a name server or how to DNSSEC sign a domain , Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers. What you will learn Anatomy of a domain - how a domain is the sum of both its DNS zone and its registration data, and why that matters. The domain name ecosystem - the role of registries, registrars and oversight bodies and their effect on your names. How DNS queries work - queries and responses are examined including debugging techniques to zero in on problems. Nameserver considerations - alternative nameserver daemons, numbering considerations, and deployment architectures. DNS use cases - the right way for basic operations such as domain transfers, large scale migrations, GeoDNS, Anycast DNS. Securing your domains - All aspects of security from registrar vendor selection, to DNSSEC and DDOS mitigation strategies. Who this book is forIdeal for sysadmins, webmasters, IT consultants, and developers-anyone responsible for maintaining your organization's core DNS
https://magrudy-assets.storage.googleapis.com/9781789135077.jpg
47.240000 USD

Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

by Mark Jeftovic
Paperback
Book cover image
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis ...
Wireshark 2 Quick Start Guide: Secure your network through protocol analysis
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Book DescriptionWireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. What you will learn Learn how TCP/IP works Install Wireshark and understand its GUI Creation and Usage of Filters to ease analysis process Understand the usual and unusual behaviour of Protocols Troubleshoot network anomalies quickly with help of Wireshark Use Wireshark as a diagnostic tool for network security analysis to identify source of malware Decrypting wireless traffic Resolve latencies and bottleneck issues in the network Who this book is forIf you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.
https://magrudy-assets.storage.googleapis.com/9781789342789.jpg
31.490000 USD

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

by Charit Mishra
Paperback
Book cover image
With the computing power of mobile devices and wireless sensors exceeding previous generation large computers, the demand of wireless networking applications is increasing at a dramatic pace. Developments of advanced wireless networks, however, still suffer from the lack of a theoretical foundation that addresses both concerns of efficiency and modularity. ...
Distributed Coding in A Multiple Access Environment
With the computing power of mobile devices and wireless sensors exceeding previous generation large computers, the demand of wireless networking applications is increasing at a dramatic pace. Developments of advanced wireless networks, however, still suffer from the lack of a theoretical foundation that addresses both concerns of efficiency and modularity. This monograph reviews a new research avenue that begins to address the research problem. Focusing on the physical and data link layers, it proposes an interface enhancement that overcomes an efficiency bottleneck in the wireless part of the network. Distributed Coding in A Multiple Access Environment provides a state-of-the-art review of the topic and puts a framework for the efficiency of distributed networking systems when communication optimization cannot be done fully at the physical layer.
https://magrudy-assets.storage.googleapis.com/9781680834680.jpg
103.950000 USD

Distributed Coding in A Multiple Access Environment

by Yanru Tang, Faeze Heydaryan, Jie Luo
Paperback
Book cover image
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning ...
Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788839235.jpg
41.990000 USD

Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus

by Ajay Singh Chauhan
Paperback
Book cover image
Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book DescriptionLinux is a Unix-like operating system assembled ...
Fundamentals of Linux: Explore the essentials of the Linux command line
Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book DescriptionLinux is a Unix-like operating system assembled under the model of free and open source software development and distribution. Fundamentals of Linux will help you learn all the essentials of the Linux command line required to get you started. The book will start by teaching you how to work with virtualization software and install CentOS 7 Linux as a VM. Then, you will get to grips with the workings of various command line operations, such as cursor movement, commands, options, and arguments. As you make your way through the chapters, the book will not only focus on the most essential Linux commands but also give an introduction to Bash shell scripting. Finally, you will explore advanced topics, such as networking and troubleshooting your system, and you will get familiar with the advanced file permissions: ACL, setuid, and setgid. Fundamentals of Linux includes real-world tasks, use cases, and problems that, as a system administrator, you might encounter in your day-to-day activities. What you will learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files Who this book is forFundamentals of Linux is for individuals looking to work as a Linux system administrator.
https://magrudy-assets.storage.googleapis.com/9781789530957.jpg
31.490000 USD

Fundamentals of Linux: Explore the essentials of the Linux command line

by Oliver Pelz
Paperback
Book cover image
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling ...
Smart Things and Femtocells: From Hype to Reality
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling traffic and deployment strategies in femtocells and provides a review for the use of femtocells and their applications in IoT environments. Moreover, it highlights the efficient real-time medium access, data delivery, caching and security aspects in smart spaces. It concludes by presenting open research issues associated with smart IoT-femtocell based applications.
https://magrudy-assets.storage.googleapis.com/9781138593893.jpg
170.62 USD

Smart Things and Femtocells: From Hype to Reality

by Fadi Al-Turjman
Hardback
Book cover image
Windows 10 hit the scene in 2015 with lots of new features, such as the Edge web browser, Cortana voice-activated personal assistant, and universal apps that run on tablets, phones, and computers. Now, the Windows 10 Creators Update brings even more goodies--and this jargon-free guide helps you get the most ...
Windows 10 - The Missing Manual 2e
Windows 10 hit the scene in 2015 with lots of new features, such as the Edge web browser, Cortana voice-activated personal assistant, and universal apps that run on tablets, phones, and computers. Now, the Windows 10 Creators Update brings even more goodies--and this jargon-free guide helps you get the most out of this supercharged operating system.With Windows 10 Creators Update: The Missing Manual, you'll get up to speed on the entire system, including all of the latest features. Cortana now interacts with your Windows or Android phone, the Windows Store offers more apps and games, and Microsoft Edge gets browser extensions and other improvements, just to name the big updates.You'll learn how to: Explore the desktop, including File Explorer, Taskbar and Action Center, and CortanaWork with programs and documents, Windows starter apps, the Control Panel, and using Windows in 3DConnect with Edge and email, and beef up security and privacySet up hardware and peripherals, including tablets, laptops, hybrids, printers, and gadgetsMaintain computer health with backups, troubleshooting tools, and disk managementLearn about network accounts, file sharing, and setting up your own small networkWritten by David Pogue--founder of Yahoo Tech and former columnist for The New York Times--this updated edition illuminates its subject with technical insight, plenty of wit, and hardnosed objectivity for beginners, veteran standalone PC users, new tablet owners, and those who know their way around a network.
https://magrudy-assets.storage.googleapis.com/9781491981917.jpg
54.59 USD

Windows 10 - The Missing Manual 2e

by David Pogue
Paperback
Book cover image
The service industry is continually improving, forcing service-oriented engineering to improve alongside it. In a digitalized world, technology within the service industry has adapted to support interactions between users and organizations. By identifying key problems and features, service providers can help increase facilitator profitability and user satisfaction. Multidisciplinary Approaches to ...
Multidisciplinary Approaches to Service-Oriented Engineering
The service industry is continually improving, forcing service-oriented engineering to improve alongside it. In a digitalized world, technology within the service industry has adapted to support interactions between users and organizations. By identifying key problems and features, service providers can help increase facilitator profitability and user satisfaction. Multidisciplinary Approaches to Service-Oriented Engineering is a well-rounded collection of research that examines methods of providing optimal system design for service systems and applications engineering. While exploring topics such as cloud ecosystems, interface localization, and requirement prioritization, this publication provides information about the approaches and development of software architectures to improve service quality. This book is a vital resource for engineers, theoreticians, educators, developers, IT consultants, researchers, practitioners, and professionals.
https://magrudy-assets.storage.googleapis.com/9781522559511.jpg
257.250000 USD

Multidisciplinary Approaches to Service-Oriented Engineering

Hardback
Book cover image
5G NR: The Next Generation Wireless Access Technology follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR. After an initial discussion of the background to 5G, including requirements, spectrum aspects and the standardization timeline, all technology features of the ...
5G NR: The Next Generation Wireless Access Technology
5G NR: The Next Generation Wireless Access Technology follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR. After an initial discussion of the background to 5G, including requirements, spectrum aspects and the standardization timeline, all technology features of the first phase of NR are described in detail. Included is a detailed description of the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects and co-existence and interworking with LTE. The book provides a good understanding of NR and the different NR technology components, giving insight into why a certain solution was selected. Content includes: Key radio-related requirements of NR, design principles, technical features Details of basic NR transmission structure, showing where it has been inherited from LTE and where it deviates from it, and the reasons why NR Multi-antenna transmission functionality Detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information, random access and paging LTE/NR co-existence in the same spectrum, the benefits of their interworking as one system The different aspects of mobility in NR RF requirements for NR will be described both for BS and UE, both for the legacy bands and for the new mm-wave bands
https://magrudy-assets.storage.googleapis.com/9780128143230.jpg
104.950000 USD

5G NR: The Next Generation Wireless Access Technology

by Erik Dahlman, Stefan Parkvall, Johan Skold
Paperback
Book cover image
The increasing demand for extremely high-data-rate communications has urged researchers to develop new communication systems. Currently, wireless transmission with more than one Giga-bits-per-second (Gbps) data rates is becoming essential due to increased connectivity between different portable and smart devices. To realize Gbps data rates, millimeter-wave (MMW) bands around 60 GHz ...
Low-Power Wireless Communication Circuits and Systems: 60GHz and Beyond
The increasing demand for extremely high-data-rate communications has urged researchers to develop new communication systems. Currently, wireless transmission with more than one Giga-bits-per-second (Gbps) data rates is becoming essential due to increased connectivity between different portable and smart devices. To realize Gbps data rates, millimeter-wave (MMW) bands around 60 GHz is attractive due to the availability of large bandwidth of 9 GHz. Recent research work in the Gbps data rates around 60 GHz band has focused on short-range indoor applications, such as uncompressed video transfer, high-speed file transfer between electronic devices, and communication to and from kiosk. Many of these applications are limited to 10 m or less, because of the huge free space path loss and oxygen absorption for 60 GHz band MMW signal. This book introduces new knowledge and novel circuit techniques to design low-power MMW circuits and systems. It also focuses on unlocking the potential applications of the 60 GHz band for high-speed outdoor applications. The innovative design application significantly improves and enables high-data-rate low-cost communication links between two access points seamlessly. The 60 GHz transceiver system-on-chip provides an alternative solution to upgrade existing networks without introducing any building renovation or external network laying works.
https://magrudy-assets.storage.googleapis.com/9789814745963.jpg
162.10 USD

Low-Power Wireless Communication Circuits and Systems: 60GHz and Beyond

by Kiat-Seng Yeo, Kaixue Ma
Hardback
Book cover image
Install and configure a pfSense router/firewall, and become a pfSense expert in the process. Key Features You can always do more to secure your software - so extend and customize your pfSense firewall Build a high availability security system that's fault-tolerant - and capable of blocking potential threats Put the ...
Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition
Install and configure a pfSense router/firewall, and become a pfSense expert in the process. Key Features You can always do more to secure your software - so extend and customize your pfSense firewall Build a high availability security system that's fault-tolerant - and capable of blocking potential threats Put the principles of better security into practice by implementing examples provided in the text Book DescriptionpfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market - but, like the very best open-source software, it doesn't limit you. You're in control - you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features. What you will learn Configure pfSense services such as DHCP, Dynamic DNS, captive portal, DNS, NTP and SNMP Set up a managed switch to work with VLANs Use pfSense to allow, block and deny traffic, and to implement Network Address Translation (NAT) Make use of the traffic shaper to lower and raise the priority of certain types of traffic Set up and connect to a VPN tunnel with pfSense Incorporate redundancy and high availability by utilizing load balancing and the Common Address Redundancy Protocol (CARP) Explore diagnostic tools in pfSense to solve network problems Who this book is forThis book is for those with at least an intermediate understanding of networking. Prior knowledge of pfSense would be helpful but is not required. Those who have the resources to set up a pfSense firewall, either in a real or virtual environment, will especially benefit, as they will be able to follow along with the examples in the book.
https://magrudy-assets.storage.googleapis.com/9781788993173.jpg
52.490000 USD

Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition

by David Zientara
Paperback
Book cover image
Use Wireshark 2 to overcome real-world network problems Key Features Delve into the core functionalities of the latest version of Wireshark Master network security skills with Wireshark 2 Efficiently find the root cause of network-related issues Book DescriptionWireshark, a combination of a Linux distro (Kali) and an open source security ...
Mastering Wireshark 2: Develop skills for network analysis and address a wide range of information security threats
Use Wireshark 2 to overcome real-world network problems Key Features Delve into the core functionalities of the latest version of Wireshark Master network security skills with Wireshark 2 Efficiently find the root cause of network-related issues Book DescriptionWireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people. Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You'll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files. By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes. What you will learn Understand what network and protocol analysis is and how it can help you Use Wireshark to capture packets in your network Filter captured traffic to only show what you need Explore useful statistic displays to make it easier to diagnose issues Customize Wireshark to your own specifications Analyze common network and network application protocols Who this book is forIf you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of using Wireshark, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788626521.jpg
41.990000 USD

Mastering Wireshark 2: Develop skills for network analysis and address a wide range of information security threats

by Andrew Crouthamel
Paperback
Book cover image
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager Current Branch. A team of expert authors offers step-by-step, end-to-end coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager Current Branch for their requirements, and then deploy and ...
System Center Configuration Manager Current Branch Unleashed
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager Current Branch. A team of expert authors offers step-by-step, end-to-end coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager Current Branch for their requirements, and then deploy and use it successfully. The authors begin by introducing Configuration Manager Current Branch and its goals, and explaining how it fits into the broader System Center product suite. Next, they fully address planning, design, and implementation. Finally, they systematically cover each of Configuration Manager Current Branch's most important feature sets. You'll find detailed, expert coverage of these and many other topics: Managing clients and compliance Creating and managing applications, deployment types, packages, and programs Distributing and deploying applications and packages Managing software updates Integrating Intune Hybrid Managing mobile devices Providing conditional access Protecting endpoints Querying and reporting with Configuration Manager Deploying operating systems Enforcing security and delegation Performing backup, recovery, and maintenance The first book on Configuration Manager 2016, System Center Configuration Manager Current Branch Unleashed joins Sams' market-leading series of books on Microsoft's System Center product suite: books that have achieved go-to status amongst IT implementers and administrators worldwide.
https://magrudy-assets.storage.googleapis.com/9780672337901.jpg
81.89 USD

System Center Configuration Manager Current Branch Unleashed

by Kerrie Meyler, Gerry Hampson, Saud Al-Mishari, Greg Ramsey, Kenneth van Surksum, Michael Wiles
Paperback
Book cover image
Telephony, a Manual of the Design, Construction, and Operation of Telephone Exchanges, Part IV
https://magrudy-assets.storage.googleapis.com/9780649137251.jpg
28.200000 USD

Telephony, a Manual of the Design, Construction, and Operation of Telephone Exchanges, Part IV

by Arthur Vaughan Abbott
Paperback
Book cover image
Foundations of Network Technology 2.0
https://magrudy-assets.storage.googleapis.com/9781720706601.jpg
52.500000 USD

Foundations of Network Technology 2.0

by Robert Spencer
Paperback
Book cover image
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. Key Features Leverage this guide to confidently deliver a system that reduces the risk of being hacked Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, ...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. Key Features Leverage this guide to confidently deliver a system that reduces the risk of being hacked Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionThis book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. What you will learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren't authorized to access Do quick checks to see whether a computer is running network services that it doesn't need to run Learn security techniques that are common to all Linux distros, and some that are distro-specific Who this book is forIf you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.
https://magrudy-assets.storage.googleapis.com/9781788620307.jpg
47.240000 USD

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

by Donald Tevault
Paperback
Book cover image
Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure
https://magrudy-assets.storage.googleapis.com/9781587144745.jpg
75.06 USD

Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure

by Frank Dagenhardt, Jose Moreno, Bill DuFresne
Undefined
Book cover image
Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. This guide's problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must ...
Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks
Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. This guide's problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions to those problems, and providing examples of these solutions as they've been implemented in protocols both old and new. This book's three sections each cover a different set of problems and solutions. Section I considers data transport (the data plane). Section II covers protocols used to discover and use topology and reachability information (the control plane). Section III considers some common network designs and architectures, including data center fabrics, MPLS cores, and modern Software-Defined Wide Area Networks (SD-WAN). The principles that underlie such technologies as Software Defined Networks (SDNs) are considered throughout the book, as solutions to the common problems faced by all networking technologies. Computer Networking Problems and Solutions is ideal for beginning network engineers, students just starting out in computer networks, and experienced engineers seeking a deeper understanding of the technologies they use every day. Whatever their background, it will help readers quickly recognize problem/solution patterns constantly encountered in computer networks, and quickly apply this knowledge with new protocols, solutions, systems, and network environments.
https://magrudy-assets.storage.googleapis.com/9781587145049.jpg
95.54 USD

Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks

by Russ White
Paperback
Book cover image
Cloud Computing: Theory and Practice: Second Edition provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and ...
Cloud Computing: Theory and Practice
Cloud Computing: Theory and Practice: Second Edition provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and parallel and distributed systems. Section Two presents such critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software. Section Three covers cloud applications and cloud security, while Section Four presents research topics in cloud computing. Specific topics covered include resource virtualization, resource management and scheduling, and advanced topics like the impact of scale on efficiency, cloud scheduling subject to deadlines, alternative cloud architectures, and vehicular clouds. An included glossary covers terms grouped in several categories, from general to services, virtualization, desirable attributes and security.
https://magrudy-assets.storage.googleapis.com/9780128128107.jpg
88.71 USD

Cloud Computing: Theory and Practice

by Dan C. Marinescu
Paperback
Book cover image
The Up-to-Date Guide to Complex Networks for Students, Researchers, and Practitioners Networks with complex and irregular connectivity patterns appear in biology, chemistry, communications, social networks, transportation systems, power grids, the Internet, and many big data applications. Complex Networks offers a novel engineering perspective on these networks, focusing on their key ...
Complex Networks
The Up-to-Date Guide to Complex Networks for Students, Researchers, and Practitioners Networks with complex and irregular connectivity patterns appear in biology, chemistry, communications, social networks, transportation systems, power grids, the Internet, and many big data applications. Complex Networks offers a novel engineering perspective on these networks, focusing on their key communications, networking, and signal processing dimensions. Three leading researchers draw on recent advances to illuminate the design and characterization of complex computer networks and graph signal processing systems. The authors cover both the fundamental concepts underlying graph theory and complex networks, as well as current theory and research. They discuss spectra and signal processing in complex networks, graph signal processing approaches for extracting information from structural data, and advanced techniques for multiscale analysis. What makes networks complex, and how to successfully characterize them Graph theory foundations, definitions, and concepts Full chapters on small-world, scale-free, small-world wireless mesh, and small-world wireless sensor networks Complex network spectra and graph signal processing concepts and techniques Multiscale analysis via transforms and wavelets
https://magrudy-assets.storage.googleapis.com/9780134786995.jpg
109.20 USD

Complex Networks

by B. S. Manoj, Abhishek Chakraborty, Rahul Singh
Hardback
Book cover image
Get More from your Network with Automation tools to increase its effectiveness. About This Book * Get started with network automation (and different automation tasks) with relevant use cases * Apply software design principles such as Continuous Integration and DevOps to your network toolkit * Guides you through some best ...
Practical Network Automation
Get More from your Network with Automation tools to increase its effectiveness. About This Book * Get started with network automation (and different automation tasks) with relevant use cases * Apply software design principles such as Continuous Integration and DevOps to your network toolkit * Guides you through some best practices in automation Who This Book Is For If you are a network engineer looking for an extensive guide to help you automate and manage your network efficiently, then this book is for you. What You Will Learn * Get the detailed analysis of Network automation * Trigger automations through available data factors * Improve data center robustness and security through specific access and data digging * Get an Access to APIs from Excel for dynamic reporting * Set up a communication with SSH-based devices using netmiko * Make full use of practical use cases and best practices to get accustomed with the various aspects of network automation In Detail Network automation is the use of IT controls to supervise and carry out every-day network management functions. It plays a key role in network virtualization technologies and network functions. The book starts by providing an introduction to network automation, SDN, and its applications, which include integrating DevOps tools to automate the network efficiently. It then guides you through different network automation tasks and covers various data digging and reporting methodologies such as IPv6 migration, DC relocations, and interface parsing, all the while retaining security and improving data center robustness. The book then moves on to the use of Python and the management of SSH keys for machine-to-machine (M2M) communication, all followed by practical use cases. The book also covers the importance of Ansible for network automation including best practices in automation, ways to test automated networks using different tools, and other important techniques. By the end of the book, you will be well acquainted with the various aspects of network automation. Style and approach A clear, concise, and straightforward book that will enable you to automate networks and improve performance.
https://magrudy-assets.storage.googleapis.com/9781788299466.jpg
41.990000 USD

Practical Network Automation

by Abhishek Ratan
Paperback
Book cover image
IP multicast is central to today's enterprise and service provider networks. However, the set of technologies and practices surrounding IP multicast has evolved and matured: older books on the topic are severely out of date. IP Multicast Architectures offers comprehensive guidance for deploying modern IP multicast systems of all kinds: ...
IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design
IP multicast is central to today's enterprise and service provider networks. However, the set of technologies and practices surrounding IP multicast has evolved and matured: older books on the topic are severely out of date. IP Multicast Architectures offers comprehensive guidance for deploying modern IP multicast systems of all kinds: basic and advanced, enterprise and service provider. Focused on Cisco devices and technologies,IP Multicast Architectures addresses common features, deployment models, and field best practices. Each section offers immersive real-world explanations of multicast theory, and present multiple case studies showcasing best-practice multicast design methodologies. Each case study is carefully crafted to offer pragmatic first-hand guidance for building the right network for each environment and set of applications. Coverage includes Layer 2 and Layer 3 multicast; routing, forwarding, domains, inter-domain routing, wireless multicast forwarding, Inter-AS, mVPN, mVRF, cloud mVPN transport, and much more. Throughout, the authors' configurations, designs, features, and parameters reflect all that's been learned since IP multicast first became widespread.
https://magrudy-assets.storage.googleapis.com/9781587144936.jpg
95.54 USD

IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design

by Josh Loveless, Ray Blair, Arvind Durai
Paperback
Book cover image
This book is a comprehensive introduction to Internet Infrastructure. It covers wired and wireless networks, the Internet (specifically the TCP/IP protocol), the domain name system (DNS), web servers and the HTTP/HTTPS protocols, web caches and various proxy server protocols, establishing IP addresses, and cloud computing. The book also includes forms ...
Internet Infrastructure: Networking, Web Services, and Cloud Computing
This book is a comprehensive introduction to Internet Infrastructure. It covers wired and wireless networks, the Internet (specifically the TCP/IP protocol), the domain name system (DNS), web servers and the HTTP/HTTPS protocols, web caches and various proxy server protocols, establishing IP addresses, and cloud computing. The book also includes forms of encryption technologies, securing networks and servers, network analysis tools, load balancing, mechanisms for redundancy, and more. Each concept chapter is followed by a case study chapter to illustrate the concepts presented. The case study chapters are set up so that readers can install servers and experiment with their configurations.
https://magrudy-assets.storage.googleapis.com/9781138039919.jpg
187.69 USD

Internet Infrastructure: Networking, Web Services, and Cloud Computing

by Richard Fox, Wei Hao
Hardback
Book cover image
This book provides a collection of contributions illustrating the latest research in the areas of future networks, applications, enabling technologies, and implementation issues and challenges. The book encompasses research on emerging areas such as the wireless technologies, software-defined networks, Cloud Computing, IoT, and Big Data. These emerging technologies bring promising ...
Networks of the Future: Architectures, Technologies, and Implementations
This book provides a collection of contributions illustrating the latest research in the areas of future networks, applications, enabling technologies, and implementation issues and challenges. The book encompasses research on emerging areas such as the wireless technologies, software-defined networks, Cloud Computing, IoT, and Big Data. These emerging technologies bring promising opportunities and challenges which are also discussed in the book. It will also help researchers and graduate students to explore the latest research and trends in computer networking.
https://magrudy-assets.storage.googleapis.com/9781498783972.jpg
187.69 USD

Networks of the Future: Architectures, Technologies, and Implementations

Hardback
Book cover image
The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, ...
Internet of Things (IoT): Technologies, Applications, Challenges and Solutions
The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, the current technology needs to be improved to enhance privacy and built secure devices by adopting a security-focused approach, reducing the amount of data collected, increasing transparency and providing consumers with a choice to opt out. Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far. Key Points: * Provides an overview of basic concepts and technologies of IoT with communication technologies ranging from 4G to 5G and its architecture. * Discusses recent security and privacy studies and social behavior of human beings over IoT. * Covers the issues related to sensors, business model, principles, paradigms, green IoT and solutions to handle relevant challenges. * Presents the readers with practical ideas of using IoT, how it deals with human dynamics, the ecosystem, the social objects and their relation. * Deals with the challenges involved in surpassing diversified architecture, protocol, communications, integrity and security.
https://magrudy-assets.storage.googleapis.com/9781138035003.jpg
187.69 USD

Internet of Things (IoT): Technologies, Applications, Challenges and Solutions

Hardback
Book cover image
Compressed Sensing in Li-Fi and Wi-Fi Networks features coverage of the first applications in optical telecommunications and wireless. After extensive development of basic theory, many techniques are presented, such as non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models. The book can be used ...
Compressed Sensing in Li-Fi and Wi-Fi Networks
Compressed Sensing in Li-Fi and Wi-Fi Networks features coverage of the first applications in optical telecommunications and wireless. After extensive development of basic theory, many techniques are presented, such as non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models. The book can be used as a comprehensive manual for teaching and research in courses covering advanced signal processing, efficient data processing algorithms, and telecommunications. After a thorough review of the basic theory of compressed sensing, many mathematical techniques are presented, including advanced signal modeling, Nyquist sub-sampling of analog signals, the non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models.
https://magrudy-assets.storage.googleapis.com/9781785482007.jpg
209.87 USD

Compressed Sensing in Li-Fi and Wi-Fi Networks

by Malek Benslama, Hadj Batatia, Mokhtari Hatem
Hardback
Book cover image
Network Routing: Algorithms, Protocols, and Architectures, Second Edition, explores network routing and how it can be broadly categorized into Internet routing, PSTN routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these ...
Network Routing: Algorithms, Protocols, and Architectures
Network Routing: Algorithms, Protocols, and Architectures, Second Edition, explores network routing and how it can be broadly categorized into Internet routing, PSTN routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive.
https://magrudy-assets.storage.googleapis.com/9780128007372.jpg
148.36 USD

Network Routing: Algorithms, Protocols, and Architectures

by Deepankar Medhi, Karthikeyan Ramasamy
Paperback
Book cover image
This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization. In particular, the technical focus covers the comprehensive understanding of network big data, efficient collection and management of network big ...
Big Data and Computational Intelligence in Networking
This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization. In particular, the technical focus covers the comprehensive understanding of network big data, efficient collection and management of network big data, distributed and scalable online analytics for network big data, and emerging applications of network big data for computational intelligence.
https://magrudy-assets.storage.googleapis.com/9781498784863.jpg
196.22 USD

Big Data and Computational Intelligence in Networking

Hardback
Book cover image
Provides unique coverage of wireless sensor system applications in space, underwater, underground, and extreme industrial environments in one volume This book covers the challenging aspects of wireless sensor systems and the problems and conditions encountered when applying them in outer space, under the water, below the ground, and in extreme ...
Wireless Sensor Systems for Extreme Environments: Space, Underwater, Underground, and Industrial
Provides unique coverage of wireless sensor system applications in space, underwater, underground, and extreme industrial environments in one volume This book covers the challenging aspects of wireless sensor systems and the problems and conditions encountered when applying them in outer space, under the water, below the ground, and in extreme industrial environments. It explores the unique aspects of designs and solutions that address those problems and challenges, and illuminates the connections, similarities, and differences between the challenges and solutions in those various environments. The creation of Wireless Sensor Systems for Extreme Environments is a response to the spread of wireless sensor technology into fields of health, safety, manufacturing, space, environmental, smart cities, advanced robotics, surveillance, and agriculture. It is the first of its kind to present, in a single reference, the unique aspects of wireless sensor system design, development, and deployment in such extreme environments and to explore the similarities and possible synergies between them. The application of wireless sensor systems in these varied environments has been lagging dramatically behind their application in more conventional environments, making this an especially relevant book for investigators and practitioners in all of these areas. Wireless Sensor Systems for Extreme Environments is presented in five parts that cover: Wireless Sensor Systems for Extreme Environments Generic Solutions Space WSS Solutions and Applications Underwater and Submerged WSS Solutions Underground and Confined Environments WSS Solutions Industrial and Other WSS Solutions This book is a welcome guide for researchers, post-graduate students, engineers and scientists who design and build operational and environmental control systems, emergency response systems, and situational awareness systems for unconventional environments.
https://magrudy-assets.storage.googleapis.com/9781119126461.jpg
147.000000 USD

Wireless Sensor Systems for Extreme Environments: Space, Underwater, Underground, and Industrial

Hardback
Book cover image
Biz Stone, the co-founder of Twitter, discusses innovation, creativity and the secrets of being a successful entrepreneur, through stories from his remarkable life and career. THINGS A LITTLE BIRD TOLD ME From GQ's 'Nerd of the Year' to one of Time's most influential people in the world, Biz Stone represents ...
Things a Little Bird Told Me
Biz Stone, the co-founder of Twitter, discusses innovation, creativity and the secrets of being a successful entrepreneur, through stories from his remarkable life and career. THINGS A LITTLE BIRD TOLD ME From GQ's 'Nerd of the Year' to one of Time's most influential people in the world, Biz Stone represents different things to different people. But he is known to all as the creative, effervescent, funny, charmingly positive and remarkably savvy co-founder of Twitter -- the social media platform that singlehandedly changed the way the world works. Now, Biz tells fascinating, pivotal, and personal stories from his early life and his careers at Google and Twitter, sharing his knowledge about the nature and importance of ingenuity today. In Biz's world: -Opportunity can be manufactured -Great work comes from abandoning a linear way of thinking -Creativity never runs out -Asking questions is free -Empathy is core to personal and global success In this book, Biz also addresses failure, the value of vulnerability, ambition, and corporate culture. Whether seeking behind-the-scenes stories, advice, or wisdom and principles from one of the most successful businessmen of the new century, THINGS A LITTLE BIRD TOLD ME will satisfy every reader.
https://magrudy-assets.storage.googleapis.com/9781447271123.jpg
17.06 USD

Things a Little Bird Told Me

by Biz Stone
Paperback
Page 1 of 40