Filter
(found 5720 products)
Book cover image
The development of computer software for nonlinear control systems has provided many benefits for teaching, research, and the development of control systems design. MATLAB is considered the dominant software platforms for linear and nonlinear control systems analysis. This book provides an easy way to learn nonlinear control systems such as ...
Nonlinear Control Systems using MATLAB (R)
The development of computer software for nonlinear control systems has provided many benefits for teaching, research, and the development of control systems design. MATLAB is considered the dominant software platforms for linear and nonlinear control systems analysis. This book provides an easy way to learn nonlinear control systems such as feedback linearization technique and Sliding mode control (Structure variable control) which are one of the most used techniques in nonlinear control dynamical systems; therefore teachers-students and researchers are all in need to handle such techniques; and since they are too difficult for them to handle such nonlinear controllers especially for a more complicated systems such as induction motor, satellite, and vehicles dynamical models. Thus, this document it is an excellent resource for learning the principle of feedback linearization and sliding mode techniques in an easy and simple way: Provides a briefs description of the feedback linearization and sliding mode control strategies Includes a simple method on how to determine the right and appropriate controller (P-PI-PID) for feedback linearization control strategy. A Symbolic MATLAB Based function for finding the feedback linearization and sliding mode controllers are developed and tested using several examples. A simple method for finding the approximate sliding mode controller parameters is introduced Where the program used to construct the nonlinear controller uses symbolic computations; such that the user should provide the program with the necessary functions f(x), g(x) and h(x) using the symbolic library.
https://magrudy-assets.storage.googleapis.com/9781138359550.jpg
92.14 USD

Nonlinear Control Systems using MATLAB (R)

by Mourad Boufadene
Hardback
Book cover image
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, ...
Regulating Blockchain: Critical Perspectives in Law and Technology
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as `revolutionary' and `disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its `ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.
https://magrudy-assets.storage.googleapis.com/9781138592766.jpg
196.22 USD

Regulating Blockchain: Critical Perspectives in Law and Technology

by Robert Herian
Hardback
Book cover image
Over the last decade, the digital technologies in everyday life have multiplied. Our lives have been gradually taken over by digital devices, networks, and services. Although useful, they have also become invasive additions to our personal, professional and public lives. This process has occurred in a globalized and deregulated economy ...
Internet Oligopoly: The Corporate Takeover of Our Digital World
Over the last decade, the digital technologies in everyday life have multiplied. Our lives have been gradually taken over by digital devices, networks, and services. Although useful, they have also become invasive additions to our personal, professional and public lives. This process has occurred in a globalized and deregulated economy and a few US-based start-ups transformed into an oligopoly of multinationals that today govern the informational infrastructure of our societies. This book offers an analytical framework of the contemporary internet studied through the lens of history and political economy. Google, Apple, Facebook, Amazon and Microsoft are examined as emblematic products of a new capitalist order that is resolutely opposed to the original project of the internet. The author retraces the process of commodification that resulted in financial rationales taking over from collective and individual emancipation and uncovers how this internet oligopoly uses its exorbitant market power to eliminate competition; take advantage of global financialization to exploit human labour on a global scale and to avoid taxation; and how it implements strategies to control our communication methods for accessing information and content online, thus increasingly controlling the digital public sphere. The book reveals how the reshaping of society via private company business models impact on the place of work in future societies, social and economic inequalities, and, ultimately, democracy.
https://magrudy-assets.storage.googleapis.com/9781787692008.jpg
68.25 USD

Internet Oligopoly: The Corporate Takeover of Our Digital World

by Nikos Smyrnaios
Paperback / softback
Book cover image
This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and ...
5G LTE Narrowband Internet of Things (NB-IoT)
This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and capability. NB-IoT is designed to connect a large number of devices in a wide range of application domains forming so-called Internet of Things (IoT). Connected devices are to communicate through cellular infrastructure. This technology is new within the 3GPP specifications and is part of upcoming new wireless technology known as 5G. Table of Contents Preface. Acknowledgments. Author. List of Abbreviations. 1. Internet of Things. 2. 4G and 5G Systems. 3. Radio Resource Control Sublayer. 4. Packet Data Convergence Protocol Sublayer. 5. Radio Link Control Sublayer. 6. Medium Access Control Sublayer. 7. Physical Sublayer. 8. Quality of Service Architecture. 9. Use Cases and Deployment. References. Index.
https://magrudy-assets.storage.googleapis.com/9781138317604.jpg
105.78 USD

5G LTE Narrowband Internet of Things (NB-IoT)

by Hossam Fattah
Hardback
Book cover image
This book will help readers comprehend technical and policy elements of telecommunication particularly in the context of 5G. It first presents an overview of the current research and standardization practices and lays down the global frequency spectrum allocation process. It further lists solutions to accommodate 5G spectrum requirements. The readers ...
5G Mobile Communications: Concepts and Technologies
This book will help readers comprehend technical and policy elements of telecommunication particularly in the context of 5G. It first presents an overview of the current research and standardization practices and lays down the global frequency spectrum allocation process. It further lists solutions to accommodate 5G spectrum requirements. The readers will find a considerable amount of information on 4G (LTE-Advanced), LTE-Advance Pro, 5G NR (New Radio); transport network technologies, 5G NGC (Next Generation Core), OSS (Operations Support Systems), network deployment and end-to-end 5G network architecture. Some details on multiple network elements (end products) such as 5G base station/small cells and the role of semiconductors in telecommunication are also provided. Keeping trends in mind, service delivery mechanisms along with state-of-the-art services such as MFS (mobile financial services), mHealth (mobile health) and IoT (Internet-of-Things) are covered at length. At the end, telecom sector's burning challenges and best practices are explained which may be looked into for today's and tomorrow's networks. The book concludes with certain high level suggestions for the growth of telecommunication, particularly on the importance of basic research, departure from ten-year evolution cycle and having a 20-30 year plan.
https://magrudy-assets.storage.googleapis.com/9781498751551.jpg
242.29 USD

5G Mobile Communications: Concepts and Technologies

by Saad Asif
Hardback
Book cover image
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book DescriptionThe tech world has been taken over by digitization to ...
Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book DescriptionThe tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. What you will learn Develop a cost-effective end-to-end vulnerability management program Implement a vulnerability management program from a governance perspective Learn about various standards and frameworks for vulnerability assessments and penetration testing Understand penetration testing with practical learning on various supporting tools and techniques Gain insight into vulnerability scoring and reporting Explore the importance of patching and security hardening Develop metrics to measure the success of the vulnerability management program Who this book is forNetwork Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.
https://magrudy-assets.storage.googleapis.com/9781788627252.jpg
41.990000 USD

Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure

by Sagar Rahalkar
Paperback / softback
Book cover image
Master the art of using Python for a diverse range of network engineering tasks Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively Use Python for network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python ...
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition
Master the art of using Python for a diverse range of network engineering tasks Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively Use Python for network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python Book DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In this second edition of Mastering Python Networking, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This book begins by reviewing the basics of Python and teaches you how Python can interact with both legacy and API-enabled network devices. As you make your way through the chapters, you will then learn to leverage high-level Python packages and frameworks to perform network engineering tasks for automation, monitoring, management, and enhanced security. In the concluding chapters, you will use Jenkins for continuous network integration as well as testing tools to verify your network. By the end of this book, you will be able to perform all networking tasks with ease using Python. What you will learn Use Python libraries to interact with your network Integrate Ansible 2.5 using Python to control Cisco, Juniper, and Arista eAPI network devices Leverage existing frameworks to construct high-level APIs Learn how to build virtual networks in the AWS Cloud Understand how Jenkins can be used to automatically deploy changes in your network Use PyTest and Unittest for Test-Driven Network Development Who this book is forMastering Python Networking is for network engineers and programmers who want to use Python for networking. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.
https://magrudy-assets.storage.googleapis.com/9781789135992.jpg
52.490000 USD

Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition

by Eric Chou
Paperback / softback
Book cover image
The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what services the Internet offers. It is designed for readers who do not have a strong technical background - early chapters clearly explain the terminology and concepts needed to understand all the ...
The Internet Book: Everything You Need to Know about Computer Networking and How the Internet Works
The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what services the Internet offers. It is designed for readers who do not have a strong technical background - early chapters clearly explain the terminology and concepts needed to understand all the services. It helps the reader to understand the technology behind the Internet, appreciate how the Internet can be used, and discover why people find it so exciting. In addition, it explains the origins of the Internet and shows the reader how rapidly it has grown. It also provides information on how to avoid scams and exaggerated marketing claims. The first section of the book introduces communication system concepts and terminology. The second section reviews the history of the Internet and its incredible growth. It documents the rate at which the digital revolution occurred, and provides background that will help readers appreciate the significance of the underlying design. The third section describes basic Internet technology and capabilities. It examines how Internet hardware is organized and how software provides communication. This section provides the foundation for later chapters, and will help readers ask good questions and make better decisions when salespeople offer Internet products and services. The final section describes application services currently available on the Internet. For each service, the book explains both what the service offers and how the service works. About the Author Dr. Douglas Comer is a Distinguished Professor at Purdue University in the departments of Computer Science and Electrical and Computer Engineering. He has created and enjoys teaching undergraduate and graduate courses on computer networks and Internets, operating systems, computer architecture, and computer software. One of the researchers who contributed to the Internet as it was being formed in the late 1970s and 1980s, he has served as a member of the Internet Architecture Board, the group responsible for guiding the Internet's development. Prof. Comer is an internationally recognized expert on computer networking, the TCP/IP protocols, and the Internet, who presents lectures to a wide range of audiences. In addition to research articles, he has written a series of textbooks that describe the technical details of the Internet. Prof. Comer's books have been translated into many languages, and are used in industry as well as computer science, engineering, and business departments around the world. Prof. Comer joined the Internet project in the late 1970s, and has had a high-speed Internet connection to his home since 1981. He wrote this book as a response to everyone who has asked him for an explanation of the Internet that is both technically correct and easily understood by anyone. An Internet enthusiast, Comer displays INTRNET on the license plate of his car.
https://magrudy-assets.storage.googleapis.com/9781138330290.jpg
131.39 USD

The Internet Book: Everything You Need to Know about Computer Networking and How the Internet Works

by Douglas E. Comer
Paperback / softback
Book cover image
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes ...
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes the inherent technology of IoT, the architectural components and the philosophy behind this emerging technology. Then it shows the various potential applications of the Internet of Things that can bring benefits to the human society. Finally, it discusses various necessities to provide a secured and trustworthy IoT service.
https://magrudy-assets.storage.googleapis.com/9781138710443.jpg
105.78 USD

Internet of Things, for Things, and by Things

by Abhik Chaudhuri
Hardback
Book cover image
5G NR: The Next Generation Wireless Access Technology follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR. After an initial discussion of the background to 5G, including requirements, spectrum aspects and the standardization timeline, all technology features of the ...
5G NR: The Next Generation Wireless Access Technology
5G NR: The Next Generation Wireless Access Technology follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR. After an initial discussion of the background to 5G, including requirements, spectrum aspects and the standardization timeline, all technology features of the first phase of NR are described in detail. Included is a detailed description of the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects and co-existence and interworking with LTE. The book provides a good understanding of NR and the different NR technology components, giving insight into why a certain solution was selected. Content includes: Key radio-related requirements of NR, design principles, technical features Details of basic NR transmission structure, showing where it has been inherited from LTE and where it deviates from it, and the reasons why NR Multi-antenna transmission functionality Detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information, random access and paging LTE/NR co-existence in the same spectrum, the benefits of their interworking as one system The different aspects of mobility in NR RF requirements for NR will be described both for BS and UE, both for the legacy bands and for the new mm-wave bands
https://magrudy-assets.storage.googleapis.com/9780128143230.jpg
104.950000 USD

5G NR: The Next Generation Wireless Access Technology

by Johan Skold, Stefan Parkvall, Erik Dahlman
Paperback / softback
Book cover image
In 2016, Google's Site Reliability Engineering book ignited an industry discussion on what it means to run production services today-and why reliability considerations are fundamental to service design. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show ...
The Site Reliability Workbook: Practical ways to implement SRE
In 2016, Google's Site Reliability Engineering book ignited an industry discussion on what it means to run production services today-and why reliability considerations are fundamental to service design. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment. This new workbook not only combines practical examples from Google's experiences, but also provides case studies from Google's Cloud Platform customers who underwent this journey. Evernote, The Home Depot, The New York Times, and other companies outline hard-won experiences of what worked for them and what didn't. Dive into this workbook and learn how to flesh out your own SRE practice, no matter what size your company is. You'll learn: How to run reliable services in environments you don't completely control-like cloud Practical applications of how to create, monitor, and run your services via Service Level Objectives How to convert existing ops teams to SRE-including how to dig out of operational overload Methods for starting SRE from either greenfield or brownfield
https://magrudy-assets.storage.googleapis.com/9781492029502.jpg
61.41 USD

The Site Reliability Workbook: Practical ways to implement SRE

by Stephen Thorne, Kent Kawahara, David Rensin, Niall Richard Murphy, Betsy Beyer
Paperback / softback
Book cover image
Windows 10 hit the scene in 2015 with an all-new web browser (Edge), the Cortana voice assistant, and universal apps that run equally well on tablets, phones, and computers. Now, the Creators Update brings refinement and polish to Windows 10-and this jargon-free guide helps you get the most out of ...
Windows 10 - The Missing Manual 2e
Windows 10 hit the scene in 2015 with an all-new web browser (Edge), the Cortana voice assistant, and universal apps that run equally well on tablets, phones, and computers. Now, the Creators Update brings refinement and polish to Windows 10-and this jargon-free guide helps you get the most out of this supercharged operating system. Windows 10: The Missing Manual covers the entire system, including all the new features, like the three-column Start menu, the extensions in the Microsoft Edge browser, Paint 3D, and live game broadcasting. You'll learn how to: Explore the desktop, including File Explorer, Taskbar, Action Center, and Cortana Work with programs and documents, Windows starter apps, the Control Panel, and 3D apps Connect with Edge and email Beef up security and privacy Set up hardware and peripherals, including tablets, laptops, hybrids, printers, and gadgets Maintain computer health with backups, troubleshooting tools, and disk management Learn about network accounts, file sharing, and setting up your own small network Written by David Pogue-tech critic for Yahoo Finance and former columnist for The New York Times-this updated edition illuminates its subject with technical insight, plenty of wit, and hardnosed objectivity.
https://magrudy-assets.storage.googleapis.com/9781491981917.jpg
54.59 USD

Windows 10 - The Missing Manual 2e

by David Pogue
Paperback / softback
Book cover image
Diffusion processes in large networks have been used to model many real-world phenomena, including how rumors spread on the Internet, epidemics among human beings, emotional contagion through social networks, and even gene regulatory processes. Fundamental estimation principles and efficient algorithms for locating diffusion sources can answer a wide range of ...
Diffusion Source Localization in Large Networks
Diffusion processes in large networks have been used to model many real-world phenomena, including how rumors spread on the Internet, epidemics among human beings, emotional contagion through social networks, and even gene regulatory processes. Fundamental estimation principles and efficient algorithms for locating diffusion sources can answer a wide range of important questions, such as identifying the source of a widely spread rumor on online social networks. This book provides an overview of recent progress on source localization in large networks, focusing on theoretical principles and fundamental limits. The book covers both discrete-time diffusion models and continuous-time diffusion models. For discrete-time diffusion models, the book focuses on the Jordan infection center; for continuous-time diffusion models, it focuses on the rumor center. Most theoretical results on source localization are based on these two types of estimators or their variants. This book also includes algorithms that leverage partial-time information for source localization and a brief discussion of interesting unresolved problems in this area.
https://magrudy-assets.storage.googleapis.com/9781681733692.jpg
68.200000 USD

Diffusion Source Localization in Large Networks

by Kai Zhu, Lei Ying
Hardback
Book cover image
This comprehensive text covers fundamental concepts of smart grid technologies, integrating the tools and techniques of cloud computing and data management for application in smart grids. Different cloud and data management approaches are explained, highlighting energy management, information management, and security in the smart grid. The concepts of plug-in hybrid ...
Smart Grid Technology: A Cloud Computing and Data Management Approach
This comprehensive text covers fundamental concepts of smart grid technologies, integrating the tools and techniques of cloud computing and data management for application in smart grids. Different cloud and data management approaches are explained, highlighting energy management, information management, and security in the smart grid. The concepts of plug-in hybrid electric vehicle and virtual energy storage are explained in separate chapters. The text covers recent trends in cloud computing and data analytics in the field of smart grid. A glossary of important technical terms is provided for the benefit of the readers.
https://magrudy-assets.storage.googleapis.com/9781108475204.jpg
89.240000 USD

Smart Grid Technology: A Cloud Computing and Data Management Approach

by Samaresh Bera, Sudip Misra
Hardback
Book cover image
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling ...
Smart Things and Femtocells: From Hype to Reality
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling traffic and deployment strategies in femtocells and provides a review for the use of femtocells and their applications in IoT environments. Moreover, it highlights the efficient real-time medium access, data delivery, caching and security aspects in smart spaces. It concludes by presenting open research issues associated with smart IoT-femtocell based applications.
https://magrudy-assets.storage.googleapis.com/9781138593893.jpg
170.62 USD

Smart Things and Femtocells: From Hype to Reality

by Fadi Al-Turjman
Hardback
Book cover image
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide ...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide for system administrators to manage mission-critical servers Based on real-world experience - Written by an industry veteran who has made every possible mistake within this field. Book DescriptionManaging your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at how to run a name server or how to DNSSEC sign a domain , Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers. What you will learn Anatomy of a domain - how a domain is the sum of both its DNS zone and its registration data, and why that matters. The domain name ecosystem - the role of registries, registrars and oversight bodies and their effect on your names. How DNS queries work - queries and responses are examined including debugging techniques to zero in on problems. Nameserver considerations - alternative nameserver daemons, numbering considerations, and deployment architectures. DNS use cases - the right way for basic operations such as domain transfers, large scale migrations, GeoDNS, Anycast DNS. Securing your domains - All aspects of security from registrar vendor selection, to DNSSEC and DDOS mitigation strategies. Who this book is forIdeal for sysadmins, webmasters, IT consultants, and developers-anyone responsible for maintaining your organization's core DNS
https://magrudy-assets.storage.googleapis.com/9781789135077.jpg
47.240000 USD

Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

by Mark E.Jeftovic
Paperback / softback
Book cover image
Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book DescriptionLinux is a Unix-like operating system assembled ...
Fundamentals of Linux: Explore the essentials of the Linux command line
Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book DescriptionLinux is a Unix-like operating system assembled under the model of free and open source software development and distribution. Fundamentals of Linux will help you learn all the essentials of the Linux command line required to get you started. The book will start by teaching you how to work with virtualization software and install CentOS 7 Linux as a VM. Then, you will get to grips with the workings of various command line operations, such as cursor movement, commands, options, and arguments. As you make your way through the chapters, the book will not only focus on the most essential Linux commands but also give an introduction to Bash shell scripting. Finally, you will explore advanced topics, such as networking and troubleshooting your system, and you will get familiar with the advanced file permissions: ACL, setuid, and setgid. Fundamentals of Linux includes real-world tasks, use cases, and problems that, as a system administrator, you might encounter in your day-to-day activities. What you will learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files Who this book is forFundamentals of Linux is for individuals looking to work as a Linux system administrator.
https://magrudy-assets.storage.googleapis.com/9781789530957.jpg
31.490000 USD

Fundamentals of Linux: Explore the essentials of the Linux command line

by Oliver Pelz
Paperback / softback
Book cover image
The service industry is continually improving, forcing service-oriented engineering to improve alongside it. In a digitalized world, technology within the service industry has adapted to support interactions between users and organizations. By identifying key problems and features, service providers can help increase facilitator profitability and user satisfaction. Multidisciplinary Approaches to ...
Multidisciplinary Approaches to Service-Oriented Engineering
The service industry is continually improving, forcing service-oriented engineering to improve alongside it. In a digitalized world, technology within the service industry has adapted to support interactions between users and organizations. By identifying key problems and features, service providers can help increase facilitator profitability and user satisfaction. Multidisciplinary Approaches to Service-Oriented Engineering is a well-rounded collection of research that examines methods of providing optimal system design for service systems and applications engineering. While exploring topics such as cloud ecosystems, interface localization, and requirement prioritization, this publication provides information about the approaches and development of software architectures to improve service quality. This book is a vital resource for engineers, theoreticians, educators, developers, IT consultants, researchers, practitioners, and professionals.
https://magrudy-assets.storage.googleapis.com/9781522559511.jpg
257.250000 USD

Multidisciplinary Approaches to Service-Oriented Engineering

Hardback
Book cover image
Diffusion processes in large networks have been used to model many real-world phenomena, including how rumors spread on the Internet, epidemics among human beings, emotional contagion through social networks, and even gene regulatory processes. Fundamental estimation principles and efficient algorithms for locating diffusion sources can answer a wide range of ...
Diffusion Source Localization in Large Networks
Diffusion processes in large networks have been used to model many real-world phenomena, including how rumors spread on the Internet, epidemics among human beings, emotional contagion through social networks, and even gene regulatory processes. Fundamental estimation principles and efficient algorithms for locating diffusion sources can answer a wide range of important questions, such as identifying the source of a widely spread rumor on online social networks. This book provides an overview of recent progress on source localization in large networks, focusing on theoretical principles and fundamental limits. The book covers both discrete-time diffusion models and continuous-time diffusion models. For discrete-time diffusion models, the book focuses on the Jordan infection center; for continuous-time diffusion models, it focuses on the rumor center. Most theoretical results on source localization are based on these two types of estimators or their variants. This book also includes algorithms that leverage partial-time information for source localization and a brief discussion of interesting unresolved problems in this area.
https://magrudy-assets.storage.googleapis.com/9781681733678.jpg
47.200000 USD

Diffusion Source Localization in Large Networks

by Kai Zhu, Lei Ying
Paperback / softback
Book cover image
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis ...
Wireshark 2 Quick Start Guide: Secure your network through protocol analysis
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Book DescriptionWireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. What you will learn Learn how TCP/IP works Install Wireshark and understand its GUI Creation and Usage of Filters to ease analysis process Understand the usual and unusual behaviour of Protocols Troubleshoot network anomalies quickly with help of Wireshark Use Wireshark as a diagnostic tool for network security analysis to identify source of malware Decrypting wireless traffic Resolve latencies and bottleneck issues in the network Who this book is forIf you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.
https://magrudy-assets.storage.googleapis.com/9781789342789.jpg
31.490000 USD

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

by Charit Mishra
Paperback / softback
Book cover image
Networking Made Easy: Get Yourself Connected
https://magrudy-assets.storage.googleapis.com/9781720034100.jpg
14.690000 USD

Networking Made Easy: Get Yourself Connected

by James Bernstein
Paperback / softback
Book cover image
With the computing power of mobile devices and wireless sensors exceeding previous generation large computers, the demand of wireless networking applications is increasing at a dramatic pace. Developments of advanced wireless networks, however, still suffer from the lack of a theoretical foundation that addresses both concerns of efficiency and modularity. ...
Distributed Coding in A Multiple Access Environment
With the computing power of mobile devices and wireless sensors exceeding previous generation large computers, the demand of wireless networking applications is increasing at a dramatic pace. Developments of advanced wireless networks, however, still suffer from the lack of a theoretical foundation that addresses both concerns of efficiency and modularity. This monograph reviews a new research avenue that begins to address the research problem. Focusing on the physical and data link layers, it proposes an interface enhancement that overcomes an efficiency bottleneck in the wireless part of the network. Distributed Coding in A Multiple Access Environment provides a state-of-the-art review of the topic and puts a framework for the efficiency of distributed networking systems when communication optimization cannot be done fully at the physical layer.
https://magrudy-assets.storage.googleapis.com/9781680834680.jpg
103.950000 USD

Distributed Coding in A Multiple Access Environment

by Jie Luo, Faeze Heydaryan, Yanru Tang
Paperback / softback
Book cover image
Internet Password Logbook: Internet Address, Password Book
https://magrudy-assets.storage.googleapis.com/9781718093669.jpg
7.340000 USD

Internet Password Logbook: Internet Address, Password Book

by Harlak Linwood
Paperback / softback
Book cover image
Itech-Nically Said That
https://magrudy-assets.storage.googleapis.com/9781773702001.jpg
26.240000 USD

Itech-Nically Said That

by Kimber Woods
Paperback / softback
Book cover image
Itech-Nically Said That
https://magrudy-assets.storage.googleapis.com/9781773701981.jpg
35.690000 USD

Itech-Nically Said That

by Kimber Woods
Hardback
Book cover image
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning ...
Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788839235.jpg
41.990000 USD

Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus

by Ajay Singh Chauhan
Paperback / softback
Book cover image
The increasing demand for extremely high-data-rate communications has urged researchers to develop new communication systems. Currently, wireless transmission with more than one Giga-bits-per-second (Gbps) data rates is becoming essential due to increased connectivity between different portable and smart devices. To realize Gbps data rates, millimeter-wave (MMW) bands around 60 GHz ...
Low-Power Wireless Communication Circuits and Systems: 60GHz and Beyond
The increasing demand for extremely high-data-rate communications has urged researchers to develop new communication systems. Currently, wireless transmission with more than one Giga-bits-per-second (Gbps) data rates is becoming essential due to increased connectivity between different portable and smart devices. To realize Gbps data rates, millimeter-wave (MMW) bands around 60 GHz is attractive due to the availability of large bandwidth of 9 GHz. Recent research work in the Gbps data rates around 60 GHz band has focused on short-range indoor applications, such as uncompressed video transfer, high-speed file transfer between electronic devices, and communication to and from kiosk. Many of these applications are limited to 10 m or less, because of the huge free space path loss and oxygen absorption for 60 GHz band MMW signal. This book introduces new knowledge and novel circuit techniques to design low-power MMW circuits and systems. It also focuses on unlocking the potential applications of the 60 GHz band for high-speed outdoor applications. The innovative design application significantly improves and enables high-data-rate low-cost communication links between two access points seamlessly. The 60 GHz transceiver system-on-chip provides an alternative solution to upgrade existing networks without introducing any building renovation or external network laying works.
https://magrudy-assets.storage.googleapis.com/9789814745963.jpg
162.10 USD

Low-Power Wireless Communication Circuits and Systems: 60GHz and Beyond

by Kaixue Ma, Kiat-Seng Yeo
Hardback
Book cover image
Understand Networking: Fundamentals to Security
https://magrudy-assets.storage.googleapis.com/9781722683573.jpg
6.200000 USD

Understand Networking: Fundamentals to Security

by MS Nehal K Dave Nkd, MS Ripal D Ranpara Rdr, MS Miral K Kothari Mkk
Paperback / softback
Book cover image
Install and configure a pfSense router/firewall, and become a pfSense expert in the process. Key Features You can always do more to secure your software - so extend and customize your pfSense firewall Build a high availability security system that's fault-tolerant - and capable of blocking potential threats Put the ...
Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition
Install and configure a pfSense router/firewall, and become a pfSense expert in the process. Key Features You can always do more to secure your software - so extend and customize your pfSense firewall Build a high availability security system that's fault-tolerant - and capable of blocking potential threats Put the principles of better security into practice by implementing examples provided in the text Book DescriptionpfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market - but, like the very best open-source software, it doesn't limit you. You're in control - you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features. What you will learn Configure pfSense services such as DHCP, Dynamic DNS, captive portal, DNS, NTP and SNMP Set up a managed switch to work with VLANs Use pfSense to allow, block and deny traffic, and to implement Network Address Translation (NAT) Make use of the traffic shaper to lower and raise the priority of certain types of traffic Set up and connect to a VPN tunnel with pfSense Incorporate redundancy and high availability by utilizing load balancing and the Common Address Redundancy Protocol (CARP) Explore diagnostic tools in pfSense to solve network problems Who this book is forThis book is for those with at least an intermediate understanding of networking. Prior knowledge of pfSense would be helpful but is not required. Those who have the resources to set up a pfSense firewall, either in a real or virtual environment, will especially benefit, as they will be able to follow along with the examples in the book.
https://magrudy-assets.storage.googleapis.com/9781788993173.jpg
52.490000 USD

Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition

by David Zientara
Paperback / softback
Book cover image
Internet Password Book: Record User and Password 400+ (5x8) Alphabetical Password Book Journal and Notebook: Password Book
https://magrudy-assets.storage.googleapis.com/9781722432454.jpg
6.290000 USD

Internet Password Book: Record User and Password 400+ (5x8) Alphabetical Password Book Journal and Notebook: Password Book

by Maskoric Farcono
Paperback / softback
Page 1 of 40