Computer networking and communications Books

525 products


  • CISA Certified Information Systems Auditor Study

    John Wiley & Sons CISA Certified Information Systems Auditor Study

    1 in stock

    Book Synopsis

    1 in stock

    £47.50

  • Fundamentals of 5G Communications Connectivity

    McGraw-Hill Education Fundamentals of 5G Communications Connectivity

    10 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Explore the foundations and applications of 5G technologyThis comprehensive guide contains practical information from telecommunications experts working at the forefront of 5G innovation. The authors discuss the foundations of 5G technologyânot just the new standards, but the reasons and stories behind them. Fundamentals of 5G Communications features coverage of all major vertical domains with a focus on practical, commercial applications. This book serves both as an essential reference for telecom professionals and as a textbook for students learning about 5G.Coverage includes: 5G versus 4G: Whatâs new? Deployment scenarios and architecture options The evolution of 5G architecture Numerology and slot structure Table of ContentsForewordIntroductionAcronyms1 5G versus 4G: What’s New? 1.1 Overview 1.2 LTE: A Success Story 1.3 Physical Layer Changes in 5G 1.4 Protocol Changes in 5G 1.5 Main Physical Layer Features of LTE over Releases2 Deployment Scenarios 2.1 LTE-NR Spectrum Sharing 2.2 Switched NR UL Carrier Aggregation Enhancements 2.3 Nonaligned Carrier Aggregation Operation 2.4 Frequency Ranges and Frequency Bands3 Architecture Options for 5G 3.1 Introduction 3.2 The 5G RAN Architecture 3.3 The 5G Core 3.4 EPC versus 5GC (What Is 5GC For?) 3.5 Main Functional Entities of the 5G Core 3.6 High-Level Features of 5G Core 3.7 Network Slicing 3.8 QoS 3.9 Interworking with Non-3GPP Access Technologies 3.10 Policy Control 3.11 5G Security 3.12 Access Control and Barring 3.13 Support for Operator and Regulatory Services 3.14 Interworking with EPC 3.15 EPC to 5GC Migration4 Evolution of 5G Architecture 4.1 Introduction 4.2 Non-Public Networks 4.3 Cellular V2X 4.4 Cellular IoT 4.5 “Big Data” Collection (Enhanced Network Automation) 4.6 Enhancements to Interworking with Non-3GPP Accesses 4.7 URLLC 4.8 Slice Authentication 4.9 Other Release 16 Features5 Numerology and Slot Structure 5.1 Numerology and Slot Structure in 4G LTE 5.2 Lessons Learned from 4G LTE and 5G Considerations 5.3 SCSs for 5G NR 5.4 Frequency Ranges, Bandwidths, and Bands for 5G NR 5.5 gNB Channel Bandwidth versus UE Channel Bandwidth 5.6 Symbol, Slot, Subframe, and Frame for 5G NR 5.7 Slot Structure for 5G NR and Forward Compatibility Considerations6 Initial Access and Mobility 6.1 Overview 6.2 Initial Access 6.3 Random Access 6.4 Paging 6.5 Mobility7 Downlink Control Operation 7.1 Downlink Control in 4G LTE 7.2 Control Region Management in 5G NR 7.3 PDCCH Structure in 5G NR 7.4 Search Space for NR PDCCH 7.5 DCI Formats for NR PDCCH 7.6 Physical Layer Block Diagram for NR PDCCH 7.7 Power Saving Considerations8 Downlink Data Operation 8.1 Channel Coding for Data 8.2 Channel Code Rate Matching 8.3 DL Soft Buffer Management 8.4 DL MCS and TBS Determination 8.5 DL Resource Allocation in the Time Domain 8.6 DL Resource Allocation in the Frequency Domain 8.7 DL Rate Matching 8.8 DL HARQ Operation 8.9 DL Data Rate Capability 8.10 Processing Time for DL Data 8.11 Demodulation Reference Signals for Data 8.12 PDSCH DM-RS 8.13 DL Phase Tracking Reference Signal 8.14 Channel State Information Reference Signal 8.15 Tracking Reference Signal 8.16 DL MIMO Scheme 8.17 CSI Feedback 8.18 Beam Management for the PDSCH 8.19 Signal Quasi Co-Location9 Uplink Control Operation 9.1 Uplink Control in 4G LTE 9.2 UCI Types and Payload Sizes in 5G NR 9.3 PUCCH Formats in 5G NR 9.4 PUCCH Resource Determination in 5G NR 9.5 UCI on PUSCH in 5G NR 9.6 Channel Coding for UCI10 Uplink Data Operation 10.1 UL MCS and TBS Determination 10.2 UL Resource Allocation in the Time Domain 10.3 UL Resource Allocation in the Frequency Domain 10.4 UL Rate Matching 10.5 UL HARQ Operation 10.6 UL Soft Buffer Management 10.7 UL Data Rate Capability 10.8 Processing Time for UL Data 10.9 PUSCH DM-RS 10.10 UL Phase Tracking Reference Signal 10.11 Sounding Reference Signal 10.12 UL MIMO Scheme 10.13 Beam Management for the PUSCH 10.14 UL Power Control 10.15 UL Timing11 Coexistence of 4G and 5G 11.1 Adjacent Channel Coexistence 11.2 Same Channel Coexistence 11.3 EN-DC Power Control 11.4 Switched EN-DC UL12 5G in Unlicensed and Shared Spectrum 12.1 Unlicensed Operation in LTE 12.2 Overview 12.3 Channel Access 12.4 Discovery Burst 12.5 Physical Layer Extensions for Uplink 12.6 Increased Scheduling Flexibility13 Vertical Expansion: URLLC 13.1 A Brief History of 3GPP Standardization Related to URLLC 13.2 Use Cases and Deployment Scenarios for 5G NR URLLC 13.3 Resource Management for URLLC 13.4 Optimizing Link Efficiency for URLLC 13.5 Downlink Resource Sharing for Distinct Service Types 13.6 Uplink Resource Sharing for Distinct Service Types 13.7 Handling Distinct Services at the UE 13.8 Other Related Aspects14 Vertical Expansion: MTC 14.1 A Brief History of MTC in 3GPP 14.2 Key Technical Enablers for eMTC 14.3 Key Technical Enablers for NB-IoT 14.4 Integration of eMTC and NB-IoT into 5G NR 14.5 Future Trends15 5G Vertical Expansion: V2X 15.1 Overview 15.2 Background: LTE V2X 15.3 NR V2X16 Vertical Expansion: Broadcast and Multicast17 Miscellaneous Topics for 5G 17.1 Overview 17.2 Interference Management 17.3 UE Power Savings 17.4 NR Positioning 17.5 Two-Step RACH 17.6 Multi-RAT DC/CA Enhancements 17.7 Mobility Enhancements 17.8 Integrated Access and Backhaul18 A Look at Typical 5G Commercial Deployments19 5G: What’s Next? 19.1 Overview 19.2 Radio Projects in Release 17 19.3 Systems Projects in Release 17 19.4 NR Expansion into Higher Frequencies 19.5 Sidelink Beyond V2X 19.6 Relaying Operation 19.7 Edge Applications 19.8 On the Path to 6GIndex

    10 in stock

    £88.19

  • Security Engineering

    John Wiley & Sons Inc Security Engineering

    15 in stock

    Book SynopsisTable of ContentsPreface to the Third Edition xxxvii Preface to the Second Edition xli Preface to the First Edition xliii Formy daughter, and other lawyers… xlvii Foreword xlix Part I Chapter 1 What Is Security Engineering? 3 1.1 Introduction 3 1.2 A framework 4 1.3 Example 1 – a bank 6 1.4 Example 2 – a military base 7 1.5 Example 3 – a hospital 8 1.6 Example 4 – the home 10 1.7 Definitions 11 1.8 Summary 16 Chapter 2 Who Is the Opponent? 17 2.1 Introduction 17 2.2 Spies 19 2.2.1 The Five Eyes 19 2.2.1.1 Prism 19 2.2.1.2 Tempora 20 2.2.1.3 Muscular 21 2.2.1.4 Special collection 22 2.2.1.5 Bullrun and Edgehill 22 2.2.1.6 Xkeyscore 23 2.2.1.7 Longhaul 24 2.2.1.8 Quantum 25 2.2.1.9 CNE 25 2.2.1.10 The analyst’s viewpoint 27 2.2.1.11 Offensive operations 28 2.2.1.12 Attack scaling 29 2.2.2 China 30 2.2.3 Russia 35 2.2.4 The rest 38 2.2.5 Attribution 40 2.3 Crooks 41 2.3.1 Criminal infrastructure 42 2.3.1.1 Botnet herders 42 2.3.1.2 Malware devs 44 2.3.1.3 Spam senders 45 2.3.1.4 Bulk account compromise 45 2.3.1.5 Targeted attackers 46 2.3.1.6 Cashout gangs 46 2.3.1.7 Ransomware 47 2.3.2 Attacks on banking and payment systems 47 2.3.3 Sectoral cybercrime ecosystems 49 2.3.4 Internal attacks 49 2.3.5 CEO crimes 49 2.3.6 Whistleblowers 50 2.4 Geeks 52 2.5 The swamp 53 2.5.1 Hacktivism and hate campaigns 54 2.5.2 Child sex abuse material 55 2.5.3 School and workplace bullying 57 2.5.4 Intimate relationship abuse 57 2.6 Summary 59 Research problems 60 Further reading 61 Chapter 3 Psychology and Usability 63 3.1 Introduction 63 3.2 Insights from psychology research 64 3.2.1 Cognitive psychology 65 3.2.2 Gender, diversity and interpersonal variation 68 3.2.3 Social psychology 70 3.2.3.1 Authority and its abuse 71 3.2.3.2 The bystander effect 72 3.2.4 The social-brain theory of deception 73 3.2.5 Heuristics, biases and behavioural economics 76 3.2.5.1 Prospect theory and risk misperception 77 3.2.5.2 Present bias and hyperbolic discounting 78 3.2.5.3 Defaults and nudges 79 3.2.5.4 The default to intentionality 79 3.2.5.5 The affect heuristic 80 3.2.5.6 Cognitive dissonance 81 3.2.5.7 The risk thermostat 81 3.3 Deception in practice 81 3.3.1 The salesman and the scamster 82 3.3.2 Social engineering 84 3.3.3 Phishing 86 3.3.4 Opsec 88 3.3.5 Deception research 89 3.4 Passwords 90 3.4.1 Password recovery 92 3.4.2 Password choice 94 3.4.3 Difficulties with reliable password entry 94 3.4.4 Difficulties with remembering the password 95 3.4.4.1 Naïve choice 96 3.4.4.2 User abilities and training 96 3.4.4.3 Design errors 98 3.4.4.4 Operational failures 100 3.4.4.5 Social-engineering attacks 101 3.4.4.6 Customer education 102 3.4.4.7 Phishing warnings 103 3.4.5 System issues 104 3.4.6 Can you deny service? 105 3.4.7 Protecting oneself or others? 105 3.4.8 Attacks on password entry 106 3.4.8.1 Interface design 106 3.4.8.2 Trusted path, and bogus terminals 107 3.4.8.3 Technical defeats of password retry counters 107 3.4.9 Attacks on password storage 108 3.4.9.1 One-way encryption 109 3.4.9.2 Password cracking 109 3.4.9.3 Remote password checking 109 3.4.10 Absolute limits 110 3.4.11 Using a password manager 111 3.4.12 Will we ever get rid of passwords? 113 3.5 CAPTCHAs 115 3.6 Summary 116 Research problems 117 Further reading 118 Chapter 4 Protocols 119 4.1 Introduction 119 4.2 Password eavesdropping risks 120 4.3 Who goes there? – simple authentication 122 4.3.1 Challenge and response 124 4.3.2 Two-factor authentication 128 4.3.3 The MIG-in-the-middle attack 129 4.3.4 Reflection attacks 132 4.4 Manipulating the message 133 4.5 Changing the environment 134 4.6 Chosen protocol attacks 135 4.7 Managing encryption keys 136 4.7.1 The resurrecting duckling 137 4.7.2 Remote key management 137 4.7.3 The Needham-Schroeder protocol 138 4.7.4 Kerberos 139 4.7.5 Practical key management 141 4.8 Design assurance 141 4.9 Summary 143 Research problems 143 Further reading 144 Chapter 5 Cryptography 145 5.1 Introduction 145 5.2 Historical background 146 5.2.1 An early stream cipher – the Vigenère 147 5.2.2 The one-time pad 148 5.2.3 An early block cipher – Playfair 150 5.2.4 Hash functions 152 5.2.5 Asymmetric primitives 154 5.3 Security models 155 5.3.1 Random functions – hash functions 157 5.3.1.1 Properties 157 5.3.1.2 The birthday theorem 158 5.3.2 Random generators – stream ciphers 159 5.3.3 Random permutations – block ciphers 161 5.3.4 Public key encryption and trapdoor one-way permutations 163 5.3.5 Digital signatures 164 5.4 Symmetric crypto algorithms 165 5.4.1 SP-networks 165 5.4.1.1 Block size 166 5.4.1.2 Number of rounds 166 5.4.1.3 Choice of S-boxes 167 5.4.1.4 Linear cryptanalysis 167 5.4.1.5 Differential cryptanalysis 168 5.4.2 The Advanced Encryption Standard (AES) 169 5.4.3 Feistel ciphers 171 5.4.3.1 The Luby-Rackoff result 173 5.4.3.2 DES 173 5.5 Modes of operation 175 5.5.1 How not to use a block cipher 176 5.5.2 Cipher block chaining 177 5.5.3 Counter encryption 178 5.5.4 Legacy stream cipher modes 178 5.5.5 Message authentication code 179 5.5.6 Galois counter mode 180 5.5.7 XTS 180 5.6 Hash functions 181 5.6.1 Common hash functions 181 5.6.2 Hash function applications – HMAC, commitments and updating 183 5.7 Asymmetric crypto primitives 185 5.7.1 Cryptography based on factoring 185 5.7.2 Cryptography based on discrete logarithms 188 5.7.2.1 One-way commutative encryption 189 5.7.2.2 Diffie-Hellman key establishment 190 5.7.2.3 ElGamal digital signature and DSA 192 5.7.3 Elliptic curve cryptography 193 5.7.4 Certification authorities 194 5.7.5 TLS 195 5.7.5.1 TLS uses 196 5.7.5.2 TLS security 196 5.7.5.3 TLS 1.3 197 5.7.6 Other public-key protocols 197 5.7.6.1 Code signing 197 5.7.6.2 PGP/GPG 198 5.7.6.3 QUIC 199 5.7.7 Special-purpose primitives 199 5.7.8 How strong are asymmetric cryptographic primitives? 200 5.7.9 What else goes wrong 202 5.8 Summary 203 Research problems 204 Further reading 204 Chapter 6 Access Control 207 6.1 Introduction 207 6.2 Operating system access controls 209 6.2.1 Groups and roles 210 6.2.2 Access control lists 211 6.2.3 Unix operating system security 212 6.2.4 Capabilities 214 6.2.5 DAC and MAC 215 6.2.6 Apple’s macOS 217 6.2.7 iOS 217 6.2.8 Android 218 6.2.9 Windows 219 6.2.10 Middleware 222 6.2.10.1 Database access controls 222 6.2.10.2 Browsers 223 6.2.11 Sandboxing 224 6.2.12 Virtualisation 225 6.3 Hardware protection 227 6.3.1 Intel processors 228 6.3.2 Arm processors 230 6.4 What goes wrong 231 6.4.1 Smashing the stack 232 6.4.2 Other technical attacks 234 6.4.3 User interface failures 236 6.4.4 Remedies 237 6.4.5 Environmental creep 238 6.5 Summary 239 Research problems 240 Further reading 240 Chapter 7 Distributed Systems 243 7.1 Introduction 243 7.2 Concurrency 244 7.2.1 Using old data versus paying to propagate state 245 7.2.2 Locking to prevent inconsistent updates 246 7.2.3 The order of updates 247 7.2.4 Deadlock 248 7.2.5 Non-convergent state 249 7.2.6 Secure time 250 7.3 Fault tolerance and failure recovery 251 7.3.1 Failure models 252 7.3.1.1 Byzantine failure 252 7.3.1.2 Interaction with fault tolerance 253 7.3.2 What is resilience for? 254 7.3.3 At what level is the redundancy? 255 7.3.4 Service-denial attacks 257 7.4 Naming 259 7.4.1 The Needham naming principles 260 7.4.2 What else goes wrong 263 7.4.2.1 Naming and identity 264 7.4.2.2 Cultural assumptions 265 7.4.2.3 Semantic content of names 267 7.4.2.4 Uniqueness of names 268 7.4.2.5 Stability of names and addresses 269 7.4.2.6 Restrictions on the use of names 269 7.4.3 Types of name 270 7.5 Summary 271 Research problems 272 Further reading 273 Chapter 8 Economics 275 8.1 Introduction 275 8.2 Classical economics 276 8.2.1 Monopoly 278 8.3 Information economics 281 8.3.1 Why information markets are different 281 8.3.2 The value of lock-in 282 8.3.3 Asymmetric information 284 8.3.4 Public goods 285 8.4 Game theory 286 8.4.1 The prisoners’ dilemma 287 8.4.2 Repeated and evolutionary games 288 8.5 Auction theory 291 8.6 The economics of security and dependability 293 8.6.1 Why is Windows so insecure? 294 8.6.2 Managing the patching cycle 296 8.6.3 Structural models of attack and defence 298 8.6.4 The economics of lock-in, tying and DRM 300 8.6.5 Antitrust law and competition policy 302 8.6.6 Perversely motivated guards 304 8.6.7 Economics of privacy 305 8.6.8 Organisations and human behaviour 307 8.6.9 Economics of cybercrime 308 8.7 Summary 310 Research problems 311 Further reading 311 Part II Chapter 9 Multilevel Security 315 9.1 Introduction 315 9.2 What is a security policy model? 316 9.3 Multilevel security policy 318 9.3.1 The Anderson report 319 9.3.2 The Bell-LaPadula model 320 9.3.3 The standard criticisms of Bell-LaPadula 321 9.3.4 The evolution of MLS policies 323 9.3.5 The Biba model 325 9.4 Historical examples of MLS systems 326 9.4.1 SCOMP 326 9.4.2 Data diodes 327 9.5 MAC: from MLS to IFC and integrity 329 9.5.1 Windows 329 9.5.2 SELinux 330 9.5.3 Embedded systems 330 9.6 What goes wrong 331 9.6.1 Composability 331 9.6.2 The cascade problem 332 9.6.3 Covert channels 333 9.6.4 The threat from malware 333 9.6.5 Polyinstantiation 334 9.6.6 Practical problems with MLS 335 9.7 Summary 337 Research problems 338 Further reading 339 Chapter 10 Boundaries 341 10.1 Introduction 341 10.2 Compartmentation and the lattice model 344 10.3 Privacy for tigers 346 10.4 Health record privacy 349 10.4.1 The threat model 351 10.4.2 The BMA security policy 353 10.4.3 First practical steps 356 10.4.4 What actually goes wrong 357 10.4.4.1 Emergency care 358 10.4.4.2 Resilience 359 10.4.4.3 Secondary uses 359 10.4.5 Confidentiality – the future 362 10.4.6 Ethics 365 10.4.7 Social care and education 367 10.4.8 The Chinese Wall 369 10.5 Summary 371 Research problems 372 Further reading 373 Chapter 11 Inference Control 375 11.1 Introduction 375 11.2 The early history of inference control 377 11.2.1 The basic theory of inference control 378 11.2.1.1 Query set size control 378 11.2.1.2 Trackers 379 11.2.1.3 Cell suppression 379 11.2.1.4 Other statistical disclosure control mechanisms 380 11.2.1.5 More sophisticated query controls 381 11.2.1.6 Randomization 382 11.2.2 Limits of classical statistical security 383 11.2.3 Active attacks 384 11.2.4 Inference control in rich medical data 385 11.2.5 The third wave: preferences and search 388 11.2.6 The fourth wave: location and social 389 11.3 Differential privacy 392 11.4 Mind the gap? 394 11.4.1 Tactical anonymity and its problems 395 11.4.2 Incentives 398 11.4.3 Alternatives 399 11.4.4 The dark side 400 11.5 Summary 401 Research problems 402 Further reading 402 Chapter 12 Banking and Bookkeeping 405 12.1 Introduction 405 12.2 Bookkeeping systems 406 12.2.1 Double-entry bookkeeping 408 12.2.2 Bookkeeping in banks 408 12.2.3 The Clark-Wilson security policy model 410 12.2.4 Designing internal controls 411 12.2.5 Insider frauds 415 12.2.6 Executive frauds 416 12.2.6.1 The post office case 418 12.2.6.2 Other failures 419 12.2.6.3 Ecological validity 420 12.2.6.4 Control tuning and corporate governance 421 12.2.7 Finding the weak spots 422 12.3 Interbank payment systems 424 12.3.1 A telegraphic history of E-commerce 424 12.3.2 SWIFT 425 12.3.3 What goes wrong 427 12.4 Automatic teller machines 430 12.4.1 ATM basics 430 12.4.2 What goes wrong 433 12.4.3 Incentives and injustices 437 12.5 Credit cards 438 12.5.1 Credit card fraud 439 12.5.2 Online card fraud 440 12.5.3 3DS 443 12.5.4 Fraud engines 444 12.6 EMV payment cards 445 12.6.1 Chip cards 445 12.6.1.1 Static data authentication 446 12.6.1.2 ICVVs, DDA and CDA 450 12.6.1.3 The No-PIN attack 451 12.6.2 The preplay attack 452 12.6.3 Contactless 454 12.7 Online banking 457 12.7.1 Phishing 457 12.7.2 CAP 458 12.7.3 Banking malware 459 12.7.4 Phones as second factors 459 12.7.5 Liability 461 12.7.6 Authorised push payment fraud 462 12.8 Nonbank payments 463 12.8.1 M-Pesa 463 12.8.2 Other phone payment systems 464 12.8.3 Sofort, and open banking 465 12.9 Summary 466 Research problems 466 Further reading 468 Chapter 13 Locks and Alarms 471 13.1 Introduction 471 13.2 Threats and barriers 472 13.2.1 Threat model 473 13.2.2 Deterrence 474 13.2.3 Walls and barriers 476 13.2.4 Mechanical locks 478 13.2.5 Electronic locks 482 13.3 Alarms 484 13.3.1 How not to protect a painting 485 13.3.2 Sensor defeats 486 13.3.3 Feature interactions 488 13.3.4 Attacks on communications 489 13.3.5 Lessons learned 493 13.4 Summary 494 Research problems 495 Further reading 495 Chapter 14 Monitoring and Metering 497 14.1 Introduction 497 14.2 Prepayment tokens 498 14.2.1 Utility metering 499 14.2.2 How the STS system works 501 14.2.3 What goes wrong 502 14.2.4 Smart meters and smart grids 504 14.2.5 Ticketing fraud 508 14.3 Taxi meters, tachographs and truck speed limiters 509 14.3.1 The tachograph 509 14.3.2 What goes wrong 511 14.3.2.1 How most tachograph manipulation is done 511 14.3.2.2 Tampering with the supply 512 14.3.2.3 Tampering with the instrument 512 14.3.2.4 High-tech attacks 513 14.3.3 Digital tachographs 514 14.3.3.1 System-level problems 515 14.3.3.2 Other problems 516 14.3.4 Sensor defeats and third-generation devices 518 14.3.5 The fourth generation – smart tachographs 518 14.4 Curfew tags: GPS as policeman 519 14.5 Postage meters 522 14.6 Summary 526 Research problems 527 Further reading 527 Chapter 15 Nuclear Command and Control 529 15.1 Introduction 529 15.2 The evolution of command and control 532 15.2.1 The Kennedy memorandum 532 15.2.2 Authorization, environment, intent 534 15.3 Unconditionally secure authentication 534 15.4 Shared control schemes 536 15.5 Tamper resistance and PALs 538 15.6 Treaty verification 540 15.7 What goes wrong 541 15.7.1 Nuclear accidents 541 15.7.2 Interaction with cyberwar 542 15.7.3 Technical failures 543 15.8 Secrecy or openness? 544 15.9 Summary 545 Research problems 546 Further reading 546 Chapter 16 Security Printing and Seals 549 16.1 Introduction 549 16.2 History 550 16.3 Security printing 551 16.3.1 Threat model 552 16.3.2 Security printing techniques 553 16.4 Packaging and seals 557 16.4.1 Substrate properties 558 16.4.2 The problems of glue 558 16.4.3 PIN mailers 559 16.5 Systemic vulnerabilities 560 16.5.1 Peculiarities of the threat model 562 16.5.2 Anti-gundecking measures 563 16.5.3 The effect of random failure 564 16.5.4 Materials control 564 16.5.5 Not protecting the right things 565 16.5.6 The cost and nature of inspection 566 16.6 Evaluation methodology 567 16.7 Summary 569 Research problems 569 Further reading 570 Chapter 17 Biometrics 571 17.1 Introduction 571 17.2 Handwritten signatures 572 17.3 Face recognition 575 17.4 Fingerprints 579 17.4.1 Verifying positive or negative identity claims 581 17.4.2 Crime scene forensics 584 17.5 Iris codes 588 17.6 Voice recognition and morphing 590 17.7 Other systems 591 17.8 What goes wrong 593 17.9 Summary 596 Research problems 597 Further reading 597 Chapter 18 Tamper Resistance 599 18.1 Introduction 599 18.2 History 601 18.3 Hardware security modules 601 18.4 Evaluation 607 18.5 Smartcards and other security chips 609 18.5.1 History 609 18.5.2 Architecture 610 18.5.3 Security evolution 611 18.5.4 Random number generators and PUFs 621 18.5.5 Larger chips 624 18.5.6 The state of the art 628 18.6 The residual risk 630 18.6.1 The trusted interface problem 630 18.6.2 Conflicts 631 18.6.3 The lemons market, risk dumping and evaluation games 632 18.6.4 Security-by-obscurity 632 18.6.5 Changing environments 633 18.7 So what should one protect? 634 18.8 Summary 636 Research problems 636 Further reading 636 Chapter 19 Side Channels 639 19.1 Introduction 639 19.2 Emission security 640 19.2.1 History 641 19.2.2 Technical surveillance and countermeasures 642 19.3 Passive attacks 645 19.3.1 Leakage through power and signal cables 645 19.3.2 Leakage through RF signals 645 19.3.3 What goes wrong 649 19.4 Attacks between and within computers 650 19.4.1 Timing analysis 651 19.4.2 Power analysis 652 19.4.3 Glitching and differential fault analysis 655 19.4.4 Rowhammer, CLKscrew and Plundervolt 656 19.4.5 Meltdown, Spectre and other enclave side channels 657 19.5 Environmental side channels 659 19.5.1 Acoustic side channels 659 19.5.2 Optical side channels 661 19.5.3 Other side-channels 661 19.6 Social side channels 663 19.7 Summary 663 Research problems 664 Further reading 664 Chapter 20 Advanced Cryptographic Engineering 667 20.1 Introduction 667 20.2 Full-disk encryption 668 20.3 Signal 670 20.4 Tor 674 20.5 HSMs 677 20.5.1 The xor-to-null-key attack 677 20.5.2 Attacks using backwards compatibility and time-memory tradeoffs 678 20.5.3 Differential protocol attacks 679 20.5.4 The EMV attack 681 20.5.5 Hacking the HSMs in CAs and clouds 681 20.5.6 Managing HSM risks 681 20.6 Enclaves 682 20.7 Blockchains 685 20.7.1 Wallets 688 20.7.2 Miners 689 20.7.3 Smart contracts 689 20.7.4 Off-chain payment mechanisms 691 20.7.5 Exchanges, cryptocrime and regulation 692 20.7.6 Permissioned blockchains 695 20.8 Crypto dreams that failed 695 20.9 Summary 696 Research problems 698 Further reading 698 Chapter 21 Network Attack and Defence 699 21.1 Introduction 699 21.2 Network protocols and service denial 701 21.2.1 BGP security 701 21.2.2 DNS security 703 21.2.3 UDP, TCP, SYN floods and SYN reflection 704 21.2.4 Other amplifiers 705 21.2.5 Other denial-of-service attacks 706 21.2.6 Email – from spies to spammers 706 21.3 The malware menagerie – Trojans, worms and RATs 708 21.3.1 Early history of malware 709 21.3.2 The Internet worm 710 21.3.3 Further malware evolution 711 21.3.4 How malware works 713 21.3.5 Countermeasures 714 21.4 Defense against network attack 715 21.4.1 Filtering: firewalls, censorware and wiretaps 717 21.4.1.1 Packet filtering 718 21.4.1.2 Circuit gateways 718 21.4.1.3 Application proxies 719 21.4.1.4 Ingress versus egress filtering 719 21.4.1.5 Architecture 720 21.4.2 Intrusion detection 722 21.4.2.1 Types of intrusion detection 722 21.4.2.2 General limitations of intrusion detection 724 21.4.2.3 Specific problems detecting network attacks 724 21.5 Cryptography: the ragged boundary 725 21.5.1 SSH 726 21.5.2 Wireless networking at the periphery 727 21.5.2.1 WiFi 727 21.5.2.2 Bluetooth 728 21.5.2.3 HomePlug 729 21.5.2.4 VPNs 729 21.6 CAs and PKI 730 21.7 Topology 733 21.8 Summary 734 Research problems 734 Further reading 735 Chapter 22 Phones 737 22.1 Introduction 737 22.2 Attacks on phone networks 738 22.2.1 Attacks on phone-call metering 739 22.2.2 Attacks on signaling 742 22.2.3 Attacks on switching and configuration 743 22.2.4 Insecure end systems 745 22.2.5 Feature interaction 746 22.2.6 VOIP 747 22.2.7 Frauds by phone companies 748 22.2.8 Security economics of telecomms 749 22.3 Going mobile 750 22.3.1 GSM 751 22.3.2 3G 755 22.3.3 4G 757 22.3.4 5G and beyond 758 22.3.5 General MNO failings 760 22.4 Platform security 761 22.4.1 The Android app ecosystem 763 22.4.1.1 App markets and developers 764 22.4.1.2 Bad Android implementations 764 22.4.1.3 Permissions 766 22.4.1.4 Android malware 767 22.4.1.5 Ads and third-party services 768 22.4.1.6 Pre-installed apps 770 22.4.2 Apple’s app ecosystem 770 22.4.3 Cross-cutting issues 774 22.5 Summary 775 Research problems 776 Further reading 776 Chapter 23 Electronic and Information Warfare 777 23.1 Introduction 777 23.2 Basics 778 23.3 Communications systems 779 23.3.1 Signals intelligence techniques 781 23.3.2 Attacks on communications 784 23.3.3 Protection techniques 785 23.3.3.1 Frequency hopping 786 23.3.3.2 DSSS 787 23.3.3.3 Burst communications 788 23.3.3.4 Combining covertness and jam resistance 789 23.3.4 Interaction between civil and military uses 790 23.4 Surveillance and target acquisition 791 23.4.1 Types of radar 792 23.4.2 Jamming techniques 793 23.4.3 Advanced radars and countermeasures 795 23.4.4 Other sensors and multisensor issues 796 23.5 IFF systems 797 23.6 Improvised explosive devices 800 23.7 Directed energy weapons 802 23.8 Information warfare 803 23.8.1 Attacks on control systems 805 23.8.2 Attacks on other infrastructure 808 23.8.3 Attacks on elections and political stability 809 23.8.4 Doctrine 811 23.9 Summary 812 Research problems 813 Further reading 813 Chapter 24 Copyright and DRM 815 24.1 Introduction 815 24.2 Copyright 817 24.2.1 Software 817 24.2.2 Free software, free culture? 823 24.2.3 Books and music 827 24.2.4 Video and pay-TV 828 24.2.4.1 Typical system architecture 829 24.2.4.2 Video scrambling techniques 830 24.2.4.3 Attacks on hybrid scrambling systems 832 24.2.4.4 DVB 836 24.2.5 DVD 837 24.3 DRM on general-purpose computers 838 24.3.1 Windows media rights management 839 24.3.2 FairPlay, HTML5 and other DRM systems 840 24.3.3 Software obfuscation 841 24.3.4 Gaming, cheating, and DRM 843 24.3.5 Peer-to-peer systems 845 24.3.6 Managing hardware design rights 847 24.4 Information hiding 848 24.4.1 Watermarks and copy generation management 849 24.4.2 General information hiding techniques 849 24.4.3 Attacks on copyright marking schemes 851 24.5 Policy 854 24.5.1 The IP lobby 857 24.5.2 Who benefits? 859 24.6 Accessory control 860 24.7 Summary 862 Research problems 862 Further reading 863 Chapter 25 New Directions? 865 25.1 Introduction 865 25.2 Autonomous and remotely-piloted vehicles 866 25.2.1 Drones 866 25.2.2 Self-driving cars 867 25.2.3 The levels and limits of automation 869 25.2.4 How to hack a self-driving car 872 25.3 AI / ML 874 25.3.1 ML and security 875 25.3.2 Attacks on ML systems 876 25.3.3 ML and society 879 25.4 PETS and operational security 882 25.4.1 Anonymous messaging devices 885 25.4.2 Social support 887 25.4.3 Living off the land 890 25.4.4 Putting it all together 891 25.4.5 The name’s Bond. James Bond 893 25.5 Elections 895 25.5.1 The history of voting machines 896 25.5.2 Hanging chads 896 25.5.3 Optical scan 898 25.5.4 Software independence 899 25.5.5 Why electronic elections are hard 900 25.6 Summary 904 Research problems 904 Further reading 905 Part III Chapter 26 Surveillance or Privacy? 909 26.1 Introduction 909 26.2 Surveillance 912 26.2.1 The history of government wiretapping 912 26.2.2 Call data records (CDRs) 916 26.2.3 Search terms and location data 919 26.2.4 Algorithmic processing 920 26.2.5 ISPs and CSPs 921 26.2.6 The Five Eyes’ system of systems 922 26.2.7 The crypto wars 925 26.2.7.1 The back story to crypto policy 926 26.2.7.2 DES and crypto research 927 26.2.7.3 CryptoWar 1 – the Clipper chip 928 26.2.7.4 CryptoWar 2 – going spotty 931 26.2.8 Export control 934 26.3 Terrorism 936 26.3.1 Causes of political violence 936 26.3.2 The psychology of political violence 937 26.3.3 The role of institutions 938 26.3.4 The democratic response 940 26.4 Censorship 941 26.4.1 Censorship by authoritarian regimes 942 26.4.2 Filtering, hate speech and radicalisation 944 26.5 Forensics and rules of evidence 948 26.5.1 Forensics 948 26.5.2 Admissibility of evidence 950 26.5.3 What goes wrong 951 26.6 Privacy and data protection 953 26.6.1 European data protection 953 26.6.2 Privacy regulation in the USA 956 26.6.3 Fragmentation? 958 26.7 Freedom of information 960 26.8 Summary 961 Research problems 962 Further reading 962 Chapter 27 Secure Systems Development 965 27.1 Introduction 965 27.2 Risk management 966 27.3 Lessons from safety-critical systems 969 27.3.1 Safety engineering methodologies 970 27.3.2 Hazard analysis 971 27.3.3 Fault trees and threat trees 971 27.3.4 Failure modes and effects analysis 972 27.3.5 Threat modelling 973 27.3.6 Quantifying risks 975 27.4 Prioritising protection goals 978 27.5 Methodology 980 27.5.1 Top-down design 981 27.5.2 Iterative design: from spiral to agile 983 27.5.3 The secure development lifecycle 985 27.5.4 Gated development 987 27.5.5 Software as a Service 988 27.5.6 From DevOps to DevSecOps 991 27.5.6.1 The Azure ecosystem 991 27.5.6.2 The Google ecosystem 992 27.5.6.3 Creating a learning system 994 27.5.7 The vulnerability cycle 995 27.5.7.1 The CVE system 997 27.5.7.2 Coordinated disclosure 998 27.5.7.3 Security incident and event management 999 27.5.8 Organizational mismanagement of risk 1000 27.6 Managing the team 1004 27.6.1 Elite engineers 1004 27.6.2 Diversity 1005 27.6.3 Nurturing skills and attitudes 1007 27.6.4 Emergent properties 1008 27.6.5 Evolving your workflow 1008 27.6.6 And finally… 1010 27.7 Summary 1010 Research problems 1011 Further reading 1012 Chapter 28 Assurance and Sustainability 1015 28.1 Introduction 1015 28.2 Evaluation 1018 28.2.1 Alarms and locks 1019 28.2.2 Safety evaluation regimes 1019 28.2.3 Medical device safety 1020 28.2.4 Aviation safety 1023 28.2.5 The Orange book 1025 28.2.6 FIPS 140 and HSMs 1026 28.2.7 The common criteria 1026 28.2.7.1 The gory details 1027 28.2.7.2 What goes wrong with the Common Criteria 1029 28.2.7.3 Collaborative protection profiles 1031 28.2.8 The ‘Principle of Maximum Complacency’ 1032 28.2.9 Next steps 1034 28.3 Metrics and dynamics of dependability 1036 28.3.1 Reliability growth models 1036 28.3.2 Hostile review 1039 28.3.3 Free and open-source software 1040 28.3.4 Process assurance 1042 28.4 The entanglement of safety and security 1044 28.4.1 The electronic safety and security of cars 1046 28.4.2 Modernising safety and security regulation 1049 28.4.3 The Cybersecurity Act 2019 1050 28.5 Sustainability 1051 28.5.1 The Sales of goods directive 1052 28.5.2 New research directions 1053 28.6 Summary 1056 Research problems 1057 Further reading 1058 Chapter 29 Beyond “Computer Says No” 1059 Bibliography 1061 Index 1143

    15 in stock

    £43.31

  • CCNA 200301 Network Simulator

    Pearson Education (US) CCNA 200301 Network Simulator

    15 in stock

    Book SynopsisSean Wilkins (@Sean_R_Wilkins) is an accomplished networking consultant and writer for infoDispersion who has been in the IT field for more than 20 years, working with several large enterprises. Sean holds certifications with Cisco (CCNP/CCDP), Microsoft (MCSE), and CompTIA (A+ and Network+). His educational accomplishments include a Masters of Science in Information Technology with a focus in Network Architecture and Design, a Masters of Science in Organizational Management, a Masters Certificate in Network Security, a Bachelors of Science in Computer Networking, and an Associates of Applied Science in Computer Information Systems. Sean spends most of his time writing articles and books for various clients including Cisco Press, Pearson, Tom's IT Pro, and PluralSight, as well as being an active video training author for PluralSight.Table of Contents ICND1 Skill Builders Part I: Navigation and Administration Lab 1: Switch CLI Exec Mode Lab 2: Switch CLI Configuration Process I Lab 3: Switch CLI Configuration Process II Lab 4: Router CLI Exec Mode I Lab 5: Router CLI Exec Mode II Lab 6: Router CLI Configuration Process Lab 7: Setting Switch Passwords Lab 8: Configuring Switch IP Settings Lab 9: Setting Router Passwords Lab 10: Configuring Router IP Settings Lab 11: Configuring Local Usernames Lab 12: Using and Suspending Telnet Connections Lab 13: Configuring SSH Lab 14: Migrating to a New IOS Image Lab 15: Setting the Configuration Register Lab 16: Comparing Configuration Files Lab 17: Examining the IP Routing Table Lab 18: Using debug Lab 19: Testing Using Pings with Hostnames Lab 20: Ignoring the Startup-config File Lab 21: Booting a New Router IOS Lab 22: Terminal History I Lab 23: Terminal History II Lab 24: Topology Analysis Part II: LAN Switching Lab 1: Interface Settings I Lab 2: Interface Settings II Lab 3: Interface Settings III Lab 4: Switch Forwarding I Lab 5: Switch IP Connectivity I Lab 6: VLANs I Lab 7: VLANs II Lab 8: VLANs III Lab 9: Interface Status I Lab 10: Interface Status II Lab 11: Interface Status III Lab 12: Interface Status IV Lab 13: Switch Security I Lab 14: Switch Security II Lab 15: Switch Security III Lab 16: Switch Security IV Part III: IP Addressing, Routing, and WANs Lab 1: Configuring IP Addresses I Lab 2: Configuring IP Addresses II Lab 3: Configuring IP Addresses III Lab 4: Configuring IP Addresses IV Lab 5: Connected Routes Lab 6: Static Routes I Lab 7: Static Routes II Lab 8: Static Routes III Lab 9: Static Routes IV Lab 10: Default Routes Lab 11: IP Classless Lab 12: Subnet Zero I Lab 13: Subnet Zero II Lab 14: Loopback Interfaces Lab 15: RIP Configuration I Lab 16: RIP Configuration II Lab 17: RIP Configuration III Lab 18: RIP Configuration IV Lab 19: RIP Configuration V Lab 20: RIP Configuration VI Lab 21: RIP Verification I Lab 22: RIP Verification II Lab 23: Configuring Hostnames Lab 24: PC IP Commands I Lab 25: PC IP Commands II Lab 26: PC IP Commands III Lab 27: Serial Link Configuration I Lab 28: Serial Link Configuration II Lab 29: Serial Link Configuration III Lab 30: Serial Link Configuration IV Lab 31: Interface Status V Lab 32: Interface Status VI Configuration Scenarios Part I: Navigation and Administration Lab 1: The Initial Configuration Dialogue (Setup) Lab 2: New Job I Lab 3: Rebuild a Configuration Lab 4: SSH and Telnet Part II: LAN Switching Lab 1: Switch Interfaces and Forwarding Lab 2: Switch IP Connectivity Lab 3: Switch Security Lab 4: Configuring VLANs Part III: IP Addressing, Routing, and WANs Lab 1: Subnetting and Addressing I Lab 2: Subnetting and Addressing II Lab 3: Subnetting and Addressing III Lab 4: Static Routing I Lab 5: Static Routing II Lab 6: RIP-2 Configuration I Lab 7: RIP-2 Configuration II Lab 8: RIP Auto-summary Lab 9: Serial Link Configuration I Lab 10: IP and MAC Address Comparisons Lab 11: IP Classless Troubleshooting Scenarios Lab 1: Switch Forwarding I Lab 2: Path Analysis I Lab 3: Port Security Lab 4: Network Discovery I Lab 5: Network Discovery II Lab 6: Addressing and Routing Lab 7: IP Routing I Lab 8: IP Routing II Subnetting Exercises Part I: Subnet ID Calculation Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part II: IP Address Rejection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part III: IP Route Selection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 ICND 2 Skill Builders Part I: VLANs and Trunking Lab 1: VLAN Configuration I Lab 2: VLAN Configuration II Lab 3: VLAN Configuration III Lab 4: VLAN Configuration IV Lab 5: VLAN Configuration V Lab 6: VTP Configuration I Lab 7: VTP Configuration II Lab 8: VTP Configuration III Lab 9: VTP Configuration IV Lab 10: VTP Configuration V Lab 11: Trunking Configuration I Lab 12: Trunking Configuration II Lab 13: Trunking Configuration III Lab 14: Trunking Configuration IV Lab 15: STP Analysis I Lab 16: STP Analysis II Lab 17: STP Configuration I Lab 18: STP Configuration II Lab 19: STP Configuration III Lab 20: EtherChannel Part II: IP Addressing and Routing Lab 1: IP Addressing I Lab 2: IP Addressing II Lab 3: IP Addressing III Lab 4: Traceroute I Lab 5: Default Route I Lab 6: Zero Subnet Lab 7: Switch IP Address Lab 8: ACL I Lab 9: ACL II Lab 10: ACL III Lab 11: ACL IV Lab 12: ACL V Lab 13: ACL VI Lab 14: Named ACL I Lab 15: Named ACL II Lab 16: Named ACL III Lab 17: ACL Analysis I Lab 18: Auto-summary Lab 19: Routing Analysis I Lab 20: Traceroute II Part III: IP Routing Protocols Lab 1: EIGRP Serial Configuration I Lab 2: EIGRP Serial Configuration II Lab 3: EIGRP Serial Configuration III Lab 4: EIGRP Serial Configuration IV Lab 5: EIGRP Serial Configuration V Lab 6: EIGRP Serial Configuration VI Lab 7: EIGRP Frame Relay Configuration I Lab 8: EIGRP Frame Relay Configuration II Lab 9: EIGRP Frame Relay Configuration III Lab 10: EIGRP Authentication I Lab 11: EIGRP Authentication II Lab 12: EIGRP Route Tuning I Lab 13: EIGRP Route Tuning II Lab 14: EIGRP Route Tuning III Lab 15: EIGRP Route Tuning IV Lab 16: EIGRP Neighbors I Lab 17: EIGRP Neighbors II Lab 18: EIGRP Neighbors III Lab 19: OSPF Serial Configuration I Lab 20: OSPF Serial Configuration II Lab 21: OSPF Serial Configuration III Lab 22: OSPF Serial Configuration IV Lab 23: OSPF Serial Configuration V Lab 24: OSPF Serial Configuration VI Lab 25: OSPF Router ID I Lab 26: OSPF Router ID II Lab 27: OSPF Frame Relay Configuration I Lab 28: OSPF Frame Relay Configuration II Lab 29: OSPF Frame Relay Configuration III Lab 30: OSPF Authentication I Lab 31: OSPF Authentication II Lab 32: OSPF Metric Tuning I Lab 33: OSPF Metric Tuning II Lab 34: OSPF Metric Tuning III Lab 35: OSPF Neighbors I Lab 36: OSPF Neighbors II Lab 37: OSPF Neighbors III Lab 38: OSPF Neighbors IV Lab 39: OSPF Neighbors V Part IV: WAN Lab 1: Serial Configuration I Lab 2: Serial Configuration II Lab 3: Serial Authentication I Lab 4: Serial Authentication II Lab 5: Frame Relay Configuration I Lab 6: Frame Relay Configuration II Lab 7: Frame Relay Configuration III Lab 8: Frame Relay Configuration IV Lab 9: Frame Relay Configuration V Lab 10: Frame Relay Verification I Lab 11: Frame Relay Verification II Lab 12: Frame Relay Verification III Part V: Scaling IP Lab 1: NAT Configuration I Lab 2: NAT Configuration II Lab 3: NAT Configuration III Lab 4: NAT Configuration IV Lab 5: NAT Configuration V Lab 6: NAT Configuration VI Lab 7: NAT Configuration VII Lab 8: IPv6 Address Configuration I Lab 9: IPv6 Address Configuration II Lab 10: IPv6 Address Configuration III Lab 11: IPv6 Address Configuration IV Lab 12: IPv6 Address Configuration V Lab 13: IPv6 Address Configuration VI Lab 14: IPv6 Address Configuration VII Lab 15: IPv6 Address Configuration VIII Lab 16: IPv6 Address Configuration IX Lab 17: IPv6 Routing Configuration I Lab 18: IPv6 Routing Configuration II Lab 19: IPv6 Routing Configuration III Lab 20: IPv6 Hostnames Configuration Scenarios Part I: VLANs and Trunking Lab 1: VTP I Lab 2: VTP Transparent Mode Lab 3: VLAN Trunking I Lab 4: VLAN Trunking II Lab 5: STP Analysis I Lab 6: STP Configuration II Part II: IP Addressing and Routing Lab 1: IP Addressing and Configuration I Lab 2: IP Addressing and Configuration II Lab 3: IP Default Routing and IP Classless Lab 4: Default Routes Lab 5: Standard ACL I Lab 6: Extended ACL I Lab 7: Extended ACL II Part III: IP Routing Protocols Lab 1: OSPF Configuration I Lab 2: OSPF Configuration II Lab 3: OSPF Configuration III Lab 4: OSPF Metric Manipulation Lab 5: EIGRP Serial Configuration I Lab 6: EIGRP Configuration II Lab 7: EIGRP Metric Manipulation I Lab 8: EIGRP Variance and Maximum Paths I Part IV: WAN Lab 1: Frame Relay Configuration I Lab 2: Frame Relay Inverse ARP Lab 3: Frame Relay Correlation Part V: Scaling IP Lab 1: NAT Configuration I Lab 2: NAT Configuration II Lab 3: IPv6 Configuration I Lab 4: IPv6 Configuration II Troubleshooting Scenarios Lab 1: Path Analysis Lab 2: Path Analysis II Lab 3: Path Analysis III Lab 4: Path Troubleshooting I Lab 5: Path Troubleshooting II Lab 6: Path Troubleshooting III Lab 7: Path Troubleshooting IV Lab 8: VLAN Troubleshooting I Lab 9: OSPF Troubleshooting I Lab 10: Routing Analysis III Lab 11: Network Expansion Lab 12: NAT Lab 13: IP Routing II Subnetting Exercises Part I: VLSM Overlap Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part II: VLSM Route Selection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7

    15 in stock

    £125.30

  • 24 Deadly Sins of Software Security Programming

    McGraw-Hill Education - Europe 24 Deadly Sins of Software Security Programming

    1 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Eradicate the Most Notorious Insecure Designs and Coding VulnerabilitiesFully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security Table of ContentsPart I: Web Application Sins; Chapter 1: SQL Injection; Chapter 2: Server Side Cross-Site Scripting; Chapter 3: Web-Client Related Vulnerabilities; Part II: Implementation Sins; Chapter 4: Use of Magic URLsChapter 5: Buffer Overruns; Chapter 6: Format String Problems; Chapter 7: Integer Overflows; Chapter 8: C++ Catastrophes; Chapter 9: Catching All Exceptions; Chapter 10: Command Injection; Chapter 11: Failure to Handle Errors; Chapter 12: Information Leakage; Chapter 13: Race Conditions; Chapter 14: Poor Usability; Chapter 15: Not Updating Easily; Part III: Cryptographic Sins; Chapter 16: Not Using Least Priveleges; Chapter 17: Weak Password Systems; Chapter 18: Unauthenticated Key Exchange; Chapter 19: Random Numbers;Part IV: Networking Sins;Chapter 20: Wrong Algorithm; Chapter 21: Failure to Protect Network Traffic; Chapter 22: Trusting Name Resolution; Part V: Stored Data Sins; Chapter 23: Improper Use of SSL/TLS; Chapter 24: Failure to Protect Stored Data

    1 in stock

    £45.74

  • Hacking Exposed 7

    McGraw-Hill Education - Europe Hacking Exposed 7

    1 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The latest tactics for thwarting digital attacksâœOur new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hackerâs mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.â --Brett Wahlin, CSO, Sony Network EntertainmentâœStop taking punches--letâs change the game; itâs time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.â --Shawn Henry, former Executive Assistant Director, FBIBolster your systemâs securiTable of Contents1: Footprinting2: Scanning3: Enumeration4. Hacking Windows5. Hacking UNIX6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded)8: Wireless Devices (Expanded)9: Embedded Systems (NEW)10: Web Hacking11. Countermeasures Map (NEW)Appendix A: PortsAppendix B: Top 14 Security VulnerabilitiesAppendix C: Denial of Service (DoS) Attacks

    1 in stock

    £43.99

  • Building  Managing a World Class It Help Desk

    McGraw-Hill Education Building Managing a World Class It Help Desk

    15 in stock

    Book SynopsisGet full details on how to set up an efficient help desk using this comprehensive resource. Real-world examples and step-by-step instructions for doing everything from choosing a staff to implementing the latest technologies make this book truly a blueprint for help desk success.

    15 in stock

    £29.99

  • vpns

    McGraw-Hill Education vpns

    15 in stock

    Book SynopsisIdeal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technology to security features of VPN to actual implementations, this book covers it all.

    15 in stock

    £29.99

  • Hackers Challenge

    McGraw-Hill Education Hackers Challenge

    15 in stock

    Book SynopsisFind out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.

    15 in stock

    £19.79

  • Build Your Own Server

    McGraw-Hill Education Build Your Own Server

    15 in stock

    Book SynopsisThe ultimate guide to building your dream system--without spending a lot of money! This step-by-step guide features more than 200 photographs illustrating how to install and configure hardware components and set up a Workgroup, Domain (Active Directory) and VPN network, using Windows 2000/ .NET Server.

    15 in stock

    £19.99

  • 5G Core Networks

    Elsevier Science 5G Core Networks

    1 in stock

    Book SynopsisTable of Contents1. Introduction 2. Drivers for 5G 3. Architecture overview 4. EPC for 5G 5. Key concepts 6. Session management 7. Mobility Management 8. Security 9. Quality-of-Service 10. Policy control and charging 11. Network slicing 12. Dual connectivity 13. Network functions and services 14. Protocols 15. Selected call flows 16. Architecture extensions and vertical industries 17. Future outlook

    1 in stock

    £86.36

  • Computer Networks

    Elsevier Science Computer Networks

    7 in stock

    Book Synopsis

    7 in stock

    £81.42

  • Computer Networks ISE

    Elsevier Science & Technology Computer Networks ISE

    10 in stock

    Book SynopsisProvides a practical understanding of networks and their building blocks through example-based instruction. This title focuses on the why of network design, not just the specifications comprising systems but how key technologies and protocols actually work in the real world to solve specific problems.Table of Contents1. Foundation 2. Getting Connected 3. Internetworking 4. Advanced Internetworking 5. End-to-End Protocols 6. Congestion Control and Resource Allocation 7. End-to-End Data 8. Network Security 9. Applications

    10 in stock

    £49.39

  • Software Defined Networks

    Elsevier Science Software Defined Networks

    1 in stock

    Book SynopsisTrade Review"The editing in general is very good. The figures are very clearly drawn…The authors have done a good job with this up-to-date book for anyone interested in SDN."--Computing ReviewsTable of Contents1. Introduction2. Why SDN?3. Genesis of SDN4. How SDN Works5. The OpenFlow Specification6. Alternative Definitions of SDN7. Emerging Protocol, Controller, and Application Models8. SDN in the Data Center9. SDN in Other Environments10. Network Functions Virtualization11. Players in the SDN Ecosystem12. SDN Applications13. SDN Open Source14. Business Ramifications15. SDN Futures

    1 in stock

    £40.84

  • Computer Networks

    Elsevier Science & Technology Computer Networks

    1 in stock

    Book SynopsisTrade Review"In the book, consisting of 9 chapters, individual chapters can be grouped into three functional blocks. In the first one, the authors present the principles of accessing computer networks and the basic issues of connecting and integrating various network solutions along with the principles of datagram communication. In the second segment of the book, the emphasis is placed on the quality of communication, in particular flow and congestion control, allowing to counteract overload phenomena in communication between end users.... The last chapters of the book concern data formatting, network security and the principles of realization of selected network applications.An important supplement to the book are numerous examples and a large number of exercises and tasks for the readers. The authors add sketchy solutions to some of them. The book gives therefore interesting and useful material for people who want to learn the basics of computer networks operation." --zbMath/European Mathematical Society and the Heidelberg Academy of Sciences and HumanitiesTable of Contents1. Foundation 2. Getting Connected 3. Internetworking 4. Advanced Internetworking 5. End-to-End Protocols 6. Congestion Control and Resource Allocation 7. End-to-End Data 8. Network Security 9. Applications

    1 in stock

    £87.35

  • Quantum Communication Quantum Networks and

    Elsevier Science Quantum Communication Quantum Networks and

    1 in stock

    Book SynopsisTable of Contents1. Introduction 2. Detection theory, information theory, and channel coding fundamentals 3. Quantum information processing fundamentals 4. Quantum information theory 5. Quantum detection and gaussian quantum information theories 6. Quantum key distribution (QKD) 7. Quantum error correction fundamentals 8. Quantum stabilizer codes and beyond 9. Quantum LDPC codes 10. Quantum networks 11. Quantum sensing 12. QIP and machine learning (ML) 13. Fault-tolerant QEC

    1 in stock

    £103.50

  • Foundations of Modern Networking

    Pearson Education (US) Foundations of Modern Networking

    2 in stock

    Book SynopsisDr. William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer security, computer networking, and computer architecture. He has authored 18 textbooks, and, counting revised editions, a total of 70 books on various aspects of these subjects. His writings have appeared in numerous ACM and IEEE publications, including the Proceedings of the IEEE and ACM Computing Reviews. He has 13 times received the award for the best computer science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. Currently, he is an independent consultant whose clients have included compuTable of ContentsPreface xxi PART I MODERN NETWORKING 3 Chapter 1: Elements of Modern Networking 4 1.1 The Networking Ecosystem . . . . . . . . . . . . . . . . . . . 5 1.2 Example Network Architectures . . . . . . . . . . . . . . . . . 7 A Global Network Architecture . . . . . . . . . . . . . . . . . . 7 A Typical Network Hierarchy . . . . . . . . . . . . . . . . . . 9 1.3 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Applications of Ethernet . . . . . . . . . . . . . . . . . . . . 11 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Ethernet Data Rates . . . . . . . . . . . . . . . . . . . . . 14 1.4 Wi-Fi . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Applications of Wi-Fi . . . . . . . . . . . . . . . . . . . . . 19 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Wi-Fi Data Rates . . . . . . . . . . . . . . . . . . . . . . . 21 1.5 4G/5G Cellular . . . . . . . . . . . . . . . . . . . . . . . . 23 First Generation . . . . . . . . . . . . . . . . . . . . . . . 23 Second Generation . . . . . . . . . . . . . . . . . . . . . . 23 Third Generation . . . . . . . . . . . . . . . . . . . . . . . 24 Fourth Generation . . . . . . . . . . . . . . . . . . . . . . 24 Fifth Generation . . . . . . . . . . . . . . . . . . . . . . . 25 1.6 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . 25 Cloud Computing Concepts . . . . . . . . . . . . . . . . . . 26 The Benefits of Cloud Computing . . . . . . . . . . . . . . . . 27 Cloud Networking . . . . . . . . . . . . . . . . . . . . . . 28 Cloud Storage . . . . . . . . . . . . . . . . . . . . . . . . 28 1.7 Internet of Things. . . . . . . . . . . . . . . . . . . . . . . 28 Things on the Internet of Things . . . . . . . . . . . . . . . . 28 Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Layers of the Internet of Things . . . . . . . . . . . . . . . . . 29 1.8 Network Convergence . . . . . . . . . . . . . . . . . . . . 30 1.9 Unified Communications . . . . . . . . . . . . . . . . . . . 33 1.10 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 37 1.11 References . . . . . . . . . . . . . . . . . . . . . . . . . 37 Chapter 2: Requirements and Technology 38 2.1 Types of Network and Internet Traffic . . . . . . . . . . . . . . 39 Elastic Traffic . . . . . . . . . . . . . . . . . . . . . . . . 39 Inelastic Traffic . . . . . . . . . . . . . . . . . . . . . . . 40 Real-Time Traffic Characteristics . . . . . . . . . . . . . . . . 43 2.2 Demand: Big Data, Cloud Computing, and Mobile Traffic . . . . . . 45 Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . 48 Mobile Traffic . . . . . . . . . . . . . . . . . . . . . . . . 51 2.3 Requirements: QoS and QoE . . . . . . . . . . . . . . . . . . 53 Quality of Service . . . . . . . . . . . . . . . . . . . . . . 53 Quality of Experience . . . . . . . . . . . . . . . . . . . . . 54 2.4 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . 55 Packet Forwarding . . . . . . . . . . . . . . . . . . . . . . 56 Routing Protocols . . . . . . . . . . . . . . . . . . . . . . 57 Elements of a Router . . . . . . . . . . . . . . . . . . . . . 59 2.5 Congestion Control . . . . . . . . . . . . . . . . . . . . . . 60 Effects of Congestion . . . . . . . . . . . . . . . . . . . . . 60 Congestion Control Techniques . . . . . . . . . . . . . . . . 64 2.6 SDN and NFV . . . . . . . . . . . . . . . . . . . . . . . . 67 Software-Defined Networking . . . . . . . . . . . . . . . . . 67 Network Functions Virtualization . . . . . . . . . . . . . . . . 69 2.7 Modern Networking Elements . . . . . . . . . . . . . . . . . 71 2.8 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 72 2.9 References . . . . . . . . . . . . . . . . . . . . . . . . . 73 PART II SOFTWARE DEFINED NETWORKS 75 Chapter 3: SDN: Background and Motivation 76 3.1 Evolving Network Requirements . . . . . . . . . . . . . . . . 77 Demand Is Increasing . . . . . . . . . . . . . . . . . . . . . 77 Supply Is Increasing . . . . . . . . . . . . . . . . . . . . . 77 Traffic Patterns Are More Complex . . . . . . . . . . . . . . . 78 Traditional Network Architectures are Inadequate . . . . . . . . . 79 3.2 The SDN Approach . . . . . . . . . . . . . . . . . . . . . . 80 Requirements. . . . . . . . . . . . . . . . . . . . . . . . 80 SDN Architecture . . . . . . . . . . . . . . . . . . . . . . . 81 Characteristics of Software-Defined Networking . . . . . . . . . . 85 3.3 SDN- and NFV-Related Standards . . . . . . . . . . . . . . . 85 Standards-Developing Organizations . . . . . . . . . . . . . . 87 Industry Consortia . . . . . . . . . . . . . . . . . . . . . . 89 Open Development Initiatives . . . . . . . . . . . . . . . . . 89 3.4 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 91 3.5 References . . . . . . . . . . . . . . . . . . . . . . . . . 91 Chapter 4: SDN Data Plane and OpenFlow 92 4.1 SDN Data Plane . . . . . . . . . . . . . . . . . . . . . . . 93 Data Plane Functions . . . . . . . . . . . . . . . . . . . . . 93 Data Plane Protocols . . . . . . . . . . . . . . . . . . . . . 95 4.2 OpenFlow Logical Network Device . . . . . . . . . . . . . . . 95 Flow Table Structure . . . . . . . . . . . . . . . . . . . . . 98 Flow Table Pipeline . . . . . . . . . . . . . . . . . . . . . 102 The Use of Multiple Tables . . . . . . . . . . . . . . . . . . 106 Group Table . . . . . . . . . . . . . . . . . . . . . . . . 107 4.3 OpenFlow Protocol . . . . . . . . . . . . . . . . . . . . . 109 4.4 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 111 Chapter 5: SDN Control Plane 112 5.1 SDN Control Plane Architecture . . . . . . . . . . . . . . . . 113 Control Plane Functions . . . . . . . . . . . . . . . . . . . 113 Southbound Interface . . . . . . . . . . . . . . . . . . . . 116 Northbound Interface . . . . . . . . . . . . . . . . . . . . 117 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . 119 5.2 ITU-T Model . . . . . . . . . . . . . . . . . . . . . . . . 120 5.3 OpenDaylight . . . . . . . . . . . . . . . . . . . . . . . . 122 OpenDaylight Architecture . . . . . . . . . . . . . . . . . . 122 OpenDaylight Helium . . . . . . . . . . . . . . . . . . . . 124 5.4 REST . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 REST Constraints . . . . . . . . . . . . . . . . . . . . . . 128 Example REST API . . . . . . . . . . . . . . . . . . . . . 130 5.5 Cooperation and Coordination Among Controllers . . . . . . . . 133 Centralized Versus Distributed Controllers . . . . . . . . . . . . 133 High-Availability Clusters . . . . . . . . . . . . . . . . . . . 134 Federated SDN Networks . . . . . . . . . . . . . . . . . . . 135 Border Gateway Protocol . . . . . . . . . . . . . . . . . . . 136 Routing and QoS Between Domains . . . . . . . . . . . . . . 137 Using BGP for QoS Management . . . . . . . . . . . . . . . 138 IETF SDNi . . . . . . . . . . . . . . . . . . . . . . . . . 140 OpenDaylight SNDi . . . . . . . . . . . . . . . . . . . . . 141 5.6 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.7 References . . . . . . . . . . . . . . . . . . . . . . . . . 143 Chapter 6: SDN Application Plane 144 6.1 SDN Application Plane Architecture . . . . . . . . . . . . . . 145 Northbound Interface . . . . . . . . . . . . . . . . . . . . 146 Network Services Abstraction Layer . . . . . . . . . . . . . . 146 Network Applications . . . . . . . . . . . . . . . . . . . . 147 User Interface . . . . . . . . . . . . . . . . . . . . . . . 147 6.2 Network Services Abstraction Layer . . . . . . . . . . . . . . 147 Abstractions in SDN . . . . . . . . . . . . . . . . . . . . . 147 Frenetic . . . . . . . . . . . . . . . . . . . . . . . . . . 150 6.3 Traffic Engineering . . . . . . . . . . . . . . . . . . . . . 153 PolicyCop . . . . . . . . . . . . . . . . . . . . . . . . . 153 6.4 Measurement and Monitoring . . . . . . . . . . . . . . . . . 157 6.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . 157 OpenDaylight DDoS Application . . . . . . . . . . . . . . . . 157 6.6 Data Center Networking . . . . . . . . . . . . . . . . . . . 162 Big Data over SDN . . . . . . . . . . . . . . . . . . . . . 163 Cloud Networking over SDN . . . . . . . . . . . . . . . . . 164 6.7 Mobility and Wireless . . . . . . . . . . . . . . . . . . . . 168 6.8 Information-Centric Networking . . . . . . . . . . . . . . . . 168 CCNx . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Use of an Abstraction Layer . . . . . . . . . . . . . . . . . . 170 6.9 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 173 PART III VIRTUALIATION 175 Chapter 7: Network Functions Virtualization: Concepts and Architecture 176 7.1 Background and Motivation for NFV . . . . . . . . . . . . . . 177 7.2 Virtual Machines . . . . . . . . . . . . . . . . . . . . . . 178 The Virtual Machine Monitor. . . . . . . . . . . . . . . . . . 179 Architectural Approaches . . . . . . . . . . . . . . . . . . . 180 Container Virtualization . . . . . . . . . . . . . . . . . . . . 183 7.3 NFV Concepts . . . . . . . . . . . . . . . . . . . . . . . 184 Simple Example of the Use of NFV . . . . . . . . . . . . . . . 188 NFV Principles . . . . . . . . . . . . . . . . . . . . . . . 189 High-Level NFV Framework . . . . . . . . . . . . . . . . . . 190 7.4 NFV Benefits and Requirements . . . . . . . . . . . . . . . . 191 NFV Benefits . . . . . . . . . . . . . . . . . . . . . . . . 191 NFV Requirements . . . . . . . . . . . . . . . . . . . . . 192 7.5 NFV Reference Architecture . . . . . . . . . . . . . . . . . . 193 NFV Management and Orchestration . . . . . . . . . . . . . . 194 Reference Points . . . . . . . . . . . . . . . . . . . . . . 195 Implementation . . . . . . . . . . . . . . . . . . . . . . . 196 7.6 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 197 7.7 References . . . . . . . . . . . . . . . . . . . . . . . . . 197 Chapter 8: NFV Functionality 198 8.1 NFV Infrastructure . . . . . . . . . . . . . . . . . . . . . . 199 Container Interface . . . . . . . . . . . . . . . . . . . . . 199 Deployment of NFVI Containers . . . . . . . . . . . . . . . . 203 Logical Structure of NFVI Domains . . . . . . . . . . . . . . . 204 Compute Domain . . . . . . . . . . . . . . . . . . . . . . 205 Hypervisor Domain . . . . . . . . . . . . . . . . . . . . . 208 Infrastructure Network Domain . . . . . . . . . . . . . . . . 209 8.2 Virtualized Network Functions . . . . . . . . . . . . . . . . . 213 VNF Interfaces . . . . . . . . . . . . . . . . . . . . . . . 213 VNFC to VNFC Communication . . . . . . . . . . . . . . . . 215 VNF Scaling . . . . . . . . . . . . . . . . . . . . . . . . 216 8.3 NFV Management and Orchestration . . . . . . . . . . . . . . 217 Virtualized Infrastructure Manager . . . . . . . . . . . . . . . 217 Virtual Network Function Manager . . . . . . . . . . . . . . . 218 NFV Orchestrator . . . . . . . . . . . . . . . . . . . . . . 219 Repositories . . . . . . . . . . . . . . . . . . . . . . . . 219 Element Management . . . . . . . . . . . . . . . . . . . . 220 OSS/BSS . . . . . . . . . . . . . . . . . . . . . . . . . 220 8.4 NFV Use Cases . . . . . . . . . . . . . . . . . . . . . . . 221 Architectural Use Cases . . . . . . . . . . . . . . . . . . . 222 Service-Oriented Use Cases . . . . . . . . . . . . . . . . . 223 8.5 SDN and NFV . . . . . . . . . . . . . . . . . . . . . . . . 225 8.6 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 228 8.7 References . . . . . . . . . . . . . . . . . . . . . . . . . 229 Chapter 9: Network Virtualization 230 9.1 Virtual LANs . . . . . . . . . . . . . . . . . . . . . . . . 231 The Use of Virtual LANs . . . . . . . . . . . . . . . . . . . 234 Defining VLANs . . . . . . . . . . . . . . . . . . . . . . . 235 Communicating VLAN Membership . . . . . . . . . . . . . . 236 IEEE 802.1Q VLAN Standard . . . . . . . . . . . . . . . . . 237 Nested VLANs . . . . . . . . . . . . . . . . . . . . . . . 239 9.2 OpenFlow VLAN Support . . . . . . . . . . . . . . . . . . . 240 9.3 Virtual Private Networks . . . . . . . . . . . . . . . . . . . 241 IPsec VPNs . . . . . . . . . . . . . . . . . . . . . . . . 241 MPLS VPNs . . . . . . . . . . . . . . . . . . . . . . . . 243 9.4 Network Virtualization . . . . . . . . . . . . . . . . . . . . 247 A Simplified Example . . . . . . . . . . . . . . . . . . . . 248 Network Virtualization Architecture . . . . . . . . . . . . . . . 250 Benefits of Network Virtualization . . . . . . . . . . . . . . . 252 9.5 OpenDaylight's Virtual Tenant Network. . . . . . . . . . . . . 253 9.6 Software-Defined Infrastructure . . . . . . . . . . . . . . . . 257 Software-Defined Storage . . . . . . . . . . . . . . . . . . 259 SDI Architecture . . . . . . . . . . . . . . . . . . . . . . 261 9.7 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . 263 9.8 References . . . . . . . . . . . . . . . . . . . . . . . . . 263 PART IV DEFINING AND SUPPORTING USER NEEDS 265 Chapter 10: Quality of Service 266 10.1 Background . . . . . . . . . . . . . . . . . . . . . . . . 267 10.2 QoS Architectural Framework . . . . . . . . . . . . . . . . 268 Data Plane . . . . . . . . . . . . . . . . . . . . . . . . . 269 Control Plane . . . . . . . . . . . . . . . . . . . . . . . . 271 Management Plane . . . . . . . . . . . . . . . . . . . . . 272 10.3 Integrated Services Architecture . . . . . . . . . . . . . . . 273 ISA Approach . . . . . . . . . . . . . . . . . . . . . . . . 273 ISA Components . . . . . . . . . . . . . . . . . . . . . . 274 ISA Services . . . . . . . . . . . . . . . . . . . . . . . . 276 Queuing Discipline . . . . . . . . . . . . . . . . . . . . . 277 10.4 Differentiated Services . . . . . . . . . . . . . . . . . . . 279 Services . . . . . . . . . . . . . . . . . . . . . . . . . . 281 DiffServ Field . . . . . . . . . . . . . . . . . . . . . . . . 282 DiffServ Configuration and Operation . . . . . . . . . . . . . . 284 Per-Hop Behavior . . . . . . . . . . . . . . . . . . . . . . 286 Default Forwarding PHB . . . . . . . . . . . . . . . . . . . 287 10.5 Service Level Agreements . . . . . . . . . . . . . . . . . . 291 10.6 IP Performance Metrics . . . . . . . . . . . . . . . . . . . 293 10.7 OpenFlow QoS Support . . . . . . . . . . . . . . . . . . . 296 Queue Structures . . . . . . . . . . . . . . . . . . . . . . 296 Meters . . . . . . . . . . . . . . . . . . . . . . . . . . 297 10.8 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . 299 10.9 References . . . . . . . . . . . . . . . . . . . . . . . . 299 Chapter 11: QoE: User Quality of Experience 300 11.1 Why QoE? . . . . . . . . . . . . . . . . . . . . . . . . 301 Online Video Content Delivery . . . . . . . . . . . . . . . . . 302 11.2 Service Failures Due to Inadequate QoE Considerations . . . . . 304 11.3 QoE-Related Standardization Projects . . . . . . . . . . . . . 304 11.4 Definition of Quality of Experience . . . . . . . . . . . . . . . 305 Definition of Quality . . . . . . . . . . . . . . . . . . . . . 306 Definition of Experience . . . . . . . . . . . . . . . . . . . 306 Quality Formation Process . . . . . . . . . . . . . . . . . . 307 Definition of Quality of Experience . . . . . . . . . . . . . . . 308 11.5 QoE Strategies in Practice . . . . . . . . . . . . . . . . . . 308 The QoE/QoS Layered Model . . . . . . . . . . . . . . . . . 308 Summarizing and Merging the QoE/QoS Layers . . . . . . . . . 310 11.6 Factors Influencing QoE . . . . . . . . . . . . . . . . . . . 311 11.7 Measurements of QoE . . . . . . . . . . . . . . . . . . . 312 Subjective Assessment . . . . . . . . . . . . . . . . . . . . 312 Objective Assessment . . . . . . . . . . . . . . . . . . . . 314 End-User Device Analytics . . . . . . . . . . . . . . . . . . 315 Summarizing the QoE Measurement Methods . . . . . . . . . . 316 11.8 Applications of QoE . . . . . . . . . . . . . . . . . . . . 317 11.9 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . 319 11.10 References . . . . . . . . . . . . . . . . . . . . . . . . 320 Chapter 12: Network Design Implications of QoS and QoE 322 12.1 Classification of QoE/QoS Mapping Models . . . . . . . . . . 323 Black-Box Media-Based QoS/QoE Mapping Models . . . . . . . 323 Glass-Box Parameter-Based QoS/QoE Mapping Models . . . . . . 325 Gray-Box QoS/QoE Mapping Models . . . . . . . . . . . . . . 326 Tips for QoS/QoE Mapping Model Selection . . . . . . . . . . . 327 12.2 IP-Oriented Parameter-Based QoS/QoE Mapping Models . . . . . 327 Network Layer QoE/QoS Mapping Models for Video Services . . . . 328 Application Layer QoE/QoS Mapping Models for Video Services . . 328 12.3 Actionable QoE over IP-Based Networks . . . . . . . . . . . . 330 The System-Oriented Actionable QoE Solution . . . . . . . . . . 330 The Service-Oriented Actionable QoE Solution . . . . . . . . . . 331 12.4 QoE Versus QoS Service Monitoring . . . . . . . . . . . . . . 332 QoS Monitoring Solutions. . . . . . . . . . . . . . . . . . . 334 QoE Mo

    2 in stock

    £42.27

  • Switching Routing and Wireless Essentials Course

    Pearson Education (US) Switching Routing and Wireless Essentials Course

    15 in stock

    Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.Table of ContentsIntroduction xxviii Chapter 1 Basic Device Configuration 1 Introduction - 1.0 1 Why should I take this module? - 1.0.1 1 What will I learn to do in this module? - 1.0.2 1 Configure a Switch with Initial Settings - 1.1 1 Switch Boot Sequence - 1.1.1 1 The boot system Command - 1.1.2 2 Switch LED Indicators - 1.1.3 2 Recovering from a System Crash - 1.1.4 4 Switch Management Access - 1.1.5 5 Switch SVI Configuration Example - 1.1.6 5 Lab: Basic Switch Configuration - 1.1.7 6 Configure Switch Ports - 1.2 7 Duplex Communication - 1.2.1 7 Configure Switch Ports at the Physical Layer - 1.2.2 7 Auto-MDIX - 1.2.3 8 Switch Verification Commands - 1.2.4 9 Verify Switch Port Configuration - 1.2.5 9 Network Access Layer Issues - 1.2.6 10 Interface Input and Output Errors - 1.2.7 12 Troubleshooting Network Access Layer Issues - 1.2.8 13 Syntax Checker - Configure Switch Ports - 1.2.9 13 Secure Remote Access - 1.3 13 Telnet Operation - 1.3.1 13 SSH Operation - 1.3.2 14 Verify the Switch Supports SSH - 1.3.3 14 Configure SSH - 1.3.4 14 Verify SSH is Operational - 1.3.5 16 Packet Tracer - Configure SSH - 1.3.6 16 Basic Router Configuration - 1.4 17 Configure Basic Router Settings - 1.4.1 17 Syntax Checker - Configure Basic Router Settings - 1.4.2 18 Dual Stack Topology - 1.4.3 18 Configure Router Interfaces - 1.4.4 18 Syntax Checker - Configure Router Interfaces - 1.4.5 19 IPv4 Loopback Interfaces - 1.4.6 19 Packet Tracer - Configure Router Interfaces - 1.4.7 20 Verify Directly Connected Networks - 1.5 20 Interface Verification Commands - 1.5.1 20 Verify Interface Status - 1.5.2 20 Verify IPv6 Link Local and Multicast Addresses - 1.5.3 21 Verify Interface Configuration - 1.5.4 22 Verify Routes - 1.5.5 22 Filter Show Command Output - 1.5.6 24 Syntax Checker - Filter Show Command Output - 1.5.7 26 Command History Feature - 1.5.8 26 Syntax Checker - Command History Features - 1.5.9 26 Packet Tracer - Verify Directly Connected Networks - 1.5.10 26 Check Your Understanding - Verify Directly Connected Networks - 1.5.11 27 Module Practice and Quiz - 1.6 27 Packet Tracer - Implement a Small Network - 1.6.1 27 Lab - Configure Basic Router Settings - 1.6.2 27 What did I learn in this module? - 1.6.3 27 Chapter Quiz - Basic Device Configuration 29 Your Chapter Notes 29 Chapter 2 Switching Concepts 31 Introduction - 2.0 31 Why should I take this module? - 2.0.1 31 What will I learn to do in this module? - 2.0.2 31 Frame Forwarding - 2.1 31 Switching in Networking - 2.1.1 31 The Switch MAC Address Table - 2.1.2 32 The Switch Learn and Forward Method - 2.1.3 32 Video - MAC Address Tables on Connected Switches - 2.1.4 33 Switching Forwarding Methods - 2.1.5 33 Store-and-Forward Switching - 2.1.6 33 Cut-Through Switching - 2.1.7 33 Activity - Switch It! 34 Switching Domains - 2.2 34 Collision Domains - 2.2.1 34 Broadcast Domains - 2.2.2 34 Alleviate Network Congestion - 2.2.3 35 Check Your Understanding - Switching Domains - 2.2.4 36 Module Practice and Quiz - 2.3 36 What did I learn in this module? - 2.3.1 36 Chapter Quiz - Switching Concepts 37 Your Chapter Notes 37 Chapter 3 VLANs 39 Introduction - 3.0 39 Why should I take this module? - 3.0.1 39 What will I learn to do in this module? - 3.0.2 39 Overview of VLANs - 3.1 39 VLAN Definitions - 3.1.1 39 Benefits of a VLAN Design - 3.1.2 40 Types of VLANs - 3.1.3 41 Packet Tracer - Who Hears the Broadcast? - 3.1.4 43 Check Your Understanding - Overview of VLANs - 3.1.5 43 VLANs in a Multi-Switched Environment - 3.2 43 Defining VLAN Trunks - 3.2.1 43 Network without VLANs - 3.2.2 43 Network with VLANs - 3.2.3 43 VLAN Identification with a Tag - 3.2.4 44 Native VLANs and 802.1Q Tagging - 3.2.5 44 Voice VLAN Tagging - 3.2.6 45 Voice VLAN Verification Example - 3.2.7 46 Packet Tracer - Investigate a VLAN Implementation - 3.2.8 46 Check Your Understanding - VLANs in a Multi-Switch Environment - 3.2.9 46 VLAN Configuration - 3.3 46 VLAN Ranges on Catalyst Switches - 3.3.1 46 VLAN Creation Commands - 3.3.2 48 VLAN Creation Example - 3.3.3 48 VLAN Port Assignment Commands - 3.3.4 48 VLAN Port Assignment Example - 3.3.5 49 Data and Voice VLANs - 3.3.6 49 Data and Voice VLAN Example - 3.3.7 49 Verify VLAN Information - 3.3.8 50 Change VLAN Port Membership - 3.3.9 51 Delete VLANs - 3.3.10 52 Syntax Checker - VLAN Configuration - 3.3.11 53 Packet Tracer - VLAN Configuration - 3.3.12 53 VLAN Trunks - 3.4 53 Trunk Configuration Commands - 3.4.1 53 Trunk Configuration Example - 3.4.2 54 Verify Trunk Configuration - 3.4.3 54 Reset the Trunk to the Default State - 3.4.4 55 Packet Tracer - Configure Trunks - 3.4.5 56 Lab - Configure VLANs and Trunking - 3.4.6 57 Dynamic Trunking Protocol - 3.5 57 Introduction to DTP - 3.5.1 57 Negotiated Interface Modes - 3.5.2 58 Results of a DTP Configuration - 3.5.3 58 Verify DTP Mode - 3.5.4 59 Packet Tracer - Configure DTP - 3.5.5 59 Check Your Understanding - Dynamic Trunking Protocol - 3.5.6 59 Module Practice and Quiz - 3.6 59 Packet Tracer - Implement VLANs and Trunking - 3.6.1 59 Lab - Implement VLANs and Trunking - 3.6.2 60 What did I learn in this module? - 3.6.3 60 Chapter Quiz - VLANs 62 Your Chapter Notes 62 Chapter 4 Inter-VLAN Routing 63 Introduction - 4.0 63 Why should I take this module? - 4.0.1 63 What will I learn to do in this module? - 4.0.2 63 Inter-VLAN Routing Operation - 4.1 63 What is Inter-VLAN Routing? - 4.1.1 63 Legacy Inter-VLAN Routing - 4.1.2 64 Router-on-a-Stick Inter-VLAN Routing - 4.1.3 64 Inter-VLAN Routing on a Layer 3 Switch - 4.1.4 65 Check Your Understanding - Inter-VLAN Routing Operation - 4.1.5 66 Router-on-a-Stick Inter-VLAN Routing - 4.2 66 Router-on-a-Stick Scenario - 4.2.1 66 S1 VLAN and Trunking Configuration - 4.2.2 66 S2 VLAN and Trunking Configuration - 4.2.3 68 R1 Subinterface Configuration - 4.2.4 69 Verify Connectivity Between PC1 and PC2 - 4.2.5 70 Router-on-a-Stick Inter-VLAN Routing Verification - 4.2.6 71 Packet Tracer - Configure Router-on-a-Stick Inter-VLAN Routing - 4.2.7 73 Lab - Configure Router-on-a-Stick Inter-VLAN Routing - 4.2.8 74 Inter-VLAN Routing using Layer 3 Switches - 4.3 74 Layer 3 Switch Inter-VLAN Routing - 4.3.1 74 Layer 3 Switch Scenario - 4.3.2 74 Layer 3 Switch Configuration - 4.3.3 75 Layer 3 Switch Inter-VLAN Routing Verification - 4.3.4 76 Routing on a Layer 3 Switch - 4.3.5 77 Routing Scenario on a Layer 3 Switch - 4.3.6 77 Routing Configuration on a Layer 3 Switch - 4.3.7 77 Packet Tracer - Configure Layer 3 Switching and Inter-VLAN Routing - 4.3.8 80 Troubleshoot Inter-VLAN Routing - 4.4 80 Common Inter-VLAN Issues - 4.4.1 80 Troubleshoot Inter-VLAN Routing Scenario - 4.4.2 81 Missing VLANs - 4.4.3 81 Switch Trunk Port Issues - 4.4.4 84 Switch Access Port Issues - 4.4.5 85 Router Configuration Issues - 4.4.6 87 Check Your Understanding - Troubleshoot Inter-VLAN Routing - 4.4.7 89 Packet Tracer - Troubleshoot Inter-VLAN Routing - 4.4.8 89 Lab - Troubleshoot Inter-VLAN Routing - 4.4.9 89 Module Practice and Quiz - 4.5 89 Packet Tracer - Inter-VLAN Routing Challenge - 4.5.1 89 Lab - Implement Inter-VLAN Routing - 4.5.2 89 What did I learn in this module? - 4.5.3 89 Chapter Quiz - Inter-VLAN Routing 92 Your Chapter Notes 92 Chapter 5 STP Concepts 93 Introduction - 5.0 93 Why should I take this module? - 5.0.1 93 What will I learn to do in this module? - 5.0.2 93 Purpose of STP - 5.1 94 Redundancy in Layer 2 Switched Networks - 5.1.1 94 Spanning Tree Protocol - 5.1.2 94 STP Recalculation - 5.1.3 94 Issues with Redundant Switch Links - 5.1.4 94 Layer 2 Loops - 5.1.5 94 Broadcast Storm - 5.1.6 95 The Spanning Tree Algorithm - 5.1.7 95 Video - Observe STP Operation - 5.1.8 97 Packet Tracer - Investigate STP Loop Prevention - 5.1.9 97 Check Your Understanding - Purpose of STP - 5.1.10 97 STP Operations - 5.2 97 Steps to a Loop-Free Topology - 5.2.1 97 1. Elect the Root Bridge - 5.2.2 98 Impact of Default BIDs - 5.2.3 98 Determine the Root Path Cost - 5.2.4 99 2. Elect the Root Ports - 5.2.5 99 3. Elect Designated Ports - 5.2.6 100 4. Elect Alternate (Blocked) Ports - 5.2.7 100 Elect a Root Port from Multiple Equal-Cost Paths - 5.2.8 100 STP Timers and Port States - 5.2.9 101 Operational Details of Each Port State - 5.2.10 102 Per-VLAN Spanning Tree - 5.2.11 103 Check Your Understanding - STP Operations - 5.2.12 103 Evolution of STP - 5.3 103 Different Versions of STP - 5.3.1 103 RSTP Concepts - 5.3.2 104 RSTP Port States and Port Roles - 5.3.3 104 PortFast and BPDU Guard - 5.3.4 105 Alternatives to STP - 5.3.5 105 Check Your Understanding - Evolution of STP - 5.3.6 106 Module Practice and Quiz - 5.4 106 What did I learn in this module? - 5.4.1 106 Chapter Quiz - STP Concepts 109 Your Chapter Notes 109 Chapter 6 EtherChannel 111 Introduction - 6.0 111 Why should I take this module? - 6.0.1 111 What will I learn to do in this module? - 6.0.2 111 EtherChannel Operation - 6.1 111 Link Aggregation - 6.1.1 111 EtherChannel - 6.1.2 112 Advantages of EtherChannel - 6.1.3 112 Implementation Restrictions - 6.1.4 112 AutoNegotiation Protocols - 6.1.5 113 PAgP Operation - 6.1.6 113 PAgP Mode Settings Example - 6.1.7 114 LACP Operation - 6.1.8 114 LACP Mode Settings Example - 6.1.9 115 Check Your Understanding - EtherChannel Operation 116 Configure EtherChannel - 6.2 116 Configuration Guidelines - 6.2.1 116 LACP Configuration Example - 6.2.2 116 Syntax Checker - Configure EtherChannel - 6.2.3 117 Packet Tracer - Configure EtherChannel 117 Verify and Troubleshoot EtherChannel - 6.3 117 Verify EtherChannel - 6.3.1 117 Common Issues with EtherChannel Configurations - 6.3.2 120 Troubleshoot EtherChannel Example - 6.3.3 120 Packet Tracer - Troubleshoot EtherChannel - 6.3.4 123 Module Practice and Quiz - 6.4 123 Packet Tracer - Implement EtherChannel - 6.4.1 123 Lab - Implement EtherChannel - 6.4.2 124 What did I learn in this module? - 6.4.3 124 Chapter Quiz - EtherChannel 126 Your Chapter Notes 126 Chapter 7 DHCPv4 127 Introduction - 7.0 127 Why should I take this module? - 7.0.1 127 What will I learn to do in this module? - 7.0.2 127 DHCPv4 Concepts - 7.1 127 DHCPv4 Server and Client - 7.1.1 127 DHCPv4 Operation - 7.1.2 128 Steps to Obtain a Lease - 7.1.3 128 Steps to Renew a Lease - 7.1.4 129 Check Your Understanding - DHCPv4 Concepts - 7.1.5 130 Configure a Cisco IOS DHCPv4 Server - 7.2 130 Cisco IOS DHCPv4 Server - 7.2.1 130 Steps to Configure a Cisco IOS DHCPv4 Server - 7.2.2 130 Configuration Example - 7.2.3 131 DHCPv4 Verification Commands - 7.2.4 132 Verify DHCPv4 is Operational - 7.2.5 132 Syntax Checker - Configure DHCPv4 - 7.2.6 134 Disable the Cisco IOS DHCPv4 Server - 7.2.7 134 DHCPv4 Relay - 7.2.8 135 Other Service Broadcasts Relayed - 7.2.9 137 Packet Tracer - Configure DHCPv4 - 7.2.10 137 Configure a DHCPv4 Client - 7.3 137 Cisco Router as a DHCPv4 Client - 7.3.1 137 Configuration Example - 7.3.2 138 Home Router as a DHCPv4 Client - 7.3.3 138 Syntax Checker - Configure a Cisco Router as DHCP Client - 7.3.4 138 Module Practice and Quiz - 7.4 138 Packet Tracer - Implement DHCPv4 - 7.4.1 138 Lab - Implement DHCPv4 - 7.4.2 139 What did I learn in this module? - 7.4.3 139 Chapter Quiz - DHCPv4 141 Your Chapter Notes 141 Chapter 8 SLAAC and DHCPv6 143 Introduction - 8.0 143 Welcome - 8.0.1 143 What will I learn to do in this module? - 8.0.2 143 IPv6 GUA Assignment - 8.1 143 IPv6 Host Configuration - 8.1.1 143 IPv6 Host Link-Local Address - 8.1.2 144 IPv6 GUA Assignment - 8.1.3 144 Three RA Message Flags - 8.1.4 145 Check Your Understanding - IPv6 GUA Assignment - 8.1.5 145 SLAAC - 8.2 145 SLAAC Overview - 8.2.1 145 Enabling SLAAC - 8.2.2 146 SLAAC Only Method - 8.2.3 147 ICMPv6 RS Messages - 8.2.4 147 Host Process to Generate Interface ID - 8.2.5 148 Duplicate Address Detection - 8.2.6 148 Check Your Understanding - SLAAC - 8.2.7 149 DHCPv6 - 8.3 149 DHCPv6 Operation Steps - 8.3.1 149 Stateless DHCPv6 Operation - 8.3.2 150 Enable Stateless DHCPv6 on an Interface - 8.3.3 151 Stateful DHCPv6 Operation - 8.3.4 151 Enable Stateful DHCPv6 on an Interface - 8.3.5 152 Check Your Understanding - DHCPv6 - 8.3.6 152 Configure DHCPv6 Server - 8.4 152 DHCPv6 Router Roles - 8.4.1 152 Configure a Stateless DHCPv6 Server - 8.4.2 153 Configure a Stateless DHCPv6 Client - 8.4.3 155 Configure a Stateful DHCPv6 Server - 8.4.4 157 Configure a Stateful DHCPv6 Client - 8.4.5 160 DHCPv6 Server Verification Commands - 8.4.6 162 Configure a DHCPv6 Relay Agent - 8.4.7 163 Verify the DHCPv6 Relay Agent - 8.4.8 164 Check Your Understanding - Configure DHCPv6 Server - 8.4.9 165 Module Practice and Quiz - 8.5 165 Lab - Configure DHCPv6 - 8.5.1 165 What did I learn in this module? - 8.5.2 166 Chapter Quiz - SLAAC and DHCPv6 168 Your Chapter Notes 168 Chapter 9 FHRP Concepts 169 Introduction - 9.0 169 Why should I take this module? - 9.0.1 169 What will I learn to do in this module? - 9.0.2 169 First Hop Redundancy Protocols - 9.1 169 Default Gateway Limitations - 9.1.1 169 Router Redundancy - 9.1.2 170 Steps for Router Failover - 9.1.3 171 FHRP Options - 9.1.4 171 Check Your Understanding - First Hop Redundancy Protocols - 9.1.5 172 HSRP - 9.2 172 HSRP Overview - 9.2.1 172 HSRP Priority and Preemption - 9.2.2 172 HSRP States and Timers - 9.2.3 173 Check Your Understanding - 9.2.4 174 Module Practice and Quiz - 9.3 174 What did I learn in this module? - 9.3.1 174 Chapter Quiz - FHRP Concepts 176 Packet Tracer - HSRP Configuration Guide 176 Your Chapter Notes 176 Chapter 10 LAN Security Concepts 177 Introduction - 10.0 177 Why should I take this module? - 10.0.1 177 What will I learn in this module? - 10.0.2 177 Endpoint Security - 10.1 177 Network Attacks Today - 10.1.1 177 Network Security Devices - 10.1.2 178 Endpoint Protection - 10.1.3 178 Cisco Email Security Appliance - 10.1.4 179 Cisco Web Security Appliance - 10.1.5 179 Check Your Understanding - Endpoint Security 180 Access Control - 10.2 180 Authentication with a Local Password - 10.2.1 180 AAA Components - 10.2.2 181 Authentication - 10.2.3 181 Authorization - 10.2.4 181 Accounting - 10.2.5 181 802.1X - 10.2.6 182 Check Your Understanding - Access Control - 10.2.7 182 Layer 2 Security Threats 182 Layer 2 Vulnerabilities - 10.3.1 182 Switch Attack Categories - 10.3.2 183 Switch Attack Mitigation Techniques - 10.3.3 183 Check Your Understanding - Layer 2 Security Threats - 10.3.4 184 MAC Address Table Attack - 10.4 184 Switch Operation Review - 10.4.1 184 MAC Address Table Flooding - 10.4.2 184 MAC Address Table Attack Mitigation - 10.4.3 185 Check Your Understanding - MAC Address Table Attacks - 10.4.4 186 LAN Attacks - 10.5 186 Video - VLAN and DHCP Attacks - 10.5.1 186 VLAN Hopping Attacks - 10.5.2 186 VLAN Double-Tagging Attack - 10.5.3 186 DHCP Messages - 10.5.4 187 DHCP Attacks - 10.5.5 187 Video - ARP Attacks, STP Attacks, and CDP Reconnaissance - 10.5.6 188 ARP Attacks - 10.5.7 188 Address Spoofing Attack - 10.5.8 189 STP Attack - 10.5.9 190 CDP Reconnaissance - 10.5.10 190 Check Your Understanding - LAN Attacks - 10.5.11 191 Module Practice and Quiz - 10.6 191 What did I learn in this module? - 10.6.1 191 Chapter Quiz - LAN Security Concepts 193 Your Chapter Notes 193 Chapter 11 Switch Security Configuration 195 Introduction - 11.0 195 Why should I take this module? - 11.0.1 195 What will I learn in this module? - 11.0.2 195 Implement Port Security - 11.1 195 Secure Unused Ports - 11.1.1 195 Mitigate MAC Address Table Attacks - 11.1.2 196 Enable Port Security - 11.1.3 196 Limit and Learn MAC Addresses - 11.1.4 198 Port Security Aging - 11.1.5 200 Port Security Violation Modes - 11.1.6 201 Ports in error-disabled State - 11.1.7 202 Verify Port Security - 11.1.8 203 Syntax Checker - Implement Port Security - 11.1.9 205 Packet Tracer - Implement Port Security 205 Mitigate VLAN Attacks - 11.2 206 VLAN Attacks Review - 11.2.1 206 Steps to Mitigate VLAN Hopping Attacks - 11.2.2 206 Syntax Checker - Mitigate VLAN Hopping Attacks - 11.2.3 207 Mitigate DHCP Attacks - 11.3 207 DHCP Attack Review - 11.3.1 207 DHCP Snooping - 11.3.2 207 Steps to Implement DHCP Snooping - 11.3.3 208 DHCP Snooping Configuration Example - 11.3.4 208 Syntax Checker - Mitigate DHCP Attacks - 11.3.5 209 Mitigate ARP Attacks - 11.4 210 Dynamic ARP Inspection - 11.4.1 210 DAI Implementation Guidelines - 11.4.2 210 DAI Configuration Example - 11.4.3 210 Syntax Checker - Mitigate ARP Attacks - 11.4.4 211 Mitigate STP Attacks - 11.5 211 PortFast and BPDU Guard - 11.5.1 211 Configure PortFast - 11.5.2 212 Configure BPDU Guard - 11.5.3 213 Syntax Checker - Mitigate STP Attacks - 11.5.4 214 Module Practice and Quiz - 11.6 214 Packet Tracer - Switch Security Configuration - 11.6.1 214 Lab - Switch Security Configuration - 11.6.2 215 What did I learn in this module? - 11.6.3 215 Chapter Quiz - Switch Security Configuration 217 Your Chapter Notes 217 Chapter 12 WLAN Concepts 219 Introduction - 12.0 219 Why should I take this module? - 12.0.1 219 What will I learn in this module? - 12.0.2 219 Introduction to Wireless - 12.1 219 Benefits of Wireless - 12.1.1 219 Types of Wireless Networks - 12.1.2 220 Wireless Technologies - 12.1.3 220 802.11 Standards - 12.1.4 221 Radio Frequencies - 12.1.5 222 Wireless Standards Organizations - 12.1.6 223 Check Your Understanding - Introduction to Wireless - 12.1.7 223 WLAN Components - 12.2 223 Video - WLAN Components - 12.2.1 223 Wireless NICs - 12.2.2 223 Wireless Home Router - 12.2.3 224 Wireless Access Points - 12.2.4 224 AP Categories - 12.2.5 224 Wireless Antennas - 12.2.6 225 Check Your Understanding - WLAN Components - 12.2.7 226 WLAN Operation - 12.3 226 Video - WLAN Operation - 12.3.1 226 802.11 Wireless Topology Modes - 12.3.2 226 BSS and ESS - 12.3.3 226 802.11 Frame Structure - 12.3.4 227 CSMA/CA - 12.3.5 227 Wireless Client and AP Association - 12.3.6 228 Passive and Active Discover Mode - 12.3.7 229 Check Your Understanding - WLAN Operation - 12.3.8 229 CAPWAP Operation - 12.4 229 Video - CAPWAP - 12.4.1 229 Introduction to CAPWAP - 12.4.2 229 Split MAC Architecture - 12.4.3 230 DTLS Encryption - 12.4.4 230 FlexConnect APs - 12.4.5 230 Check Your Understanding - CAPWAP Operation - 12.4.6 231 Channel Management - 12.5 231 Frequency Channel Saturation - 12.5.1 231 Channel Selection - 12.5.2 231 Plan a WLAN Deployment - 12.5.3 232 Check Your Understanding - Channel Management - 12.5.4 233 WLAN Threats - 12.6 233 Video - WLAN Threats - 12.6.1 233 Wireless Security Overview - 12.6.2 233 DoS Attacks - 12.6.3 233 Rogue Access Points - 12.6.4 234 Man-in-the-Middle Attack - 12.6.5 234 Check Your Understanding - WLAN Threats - 12.6.6 234 Secure WLANs - 12.7 234 Video - Secure WLANs - 12.7.1 234 SSID Cloaking and MAC Address Filtering - 12.7.2 235 802.11 Original Authentication Methods - 12.7.3 235 Shared Key Authentication Methods - 12.7.4 235 Authenticating a Home User - 12.7.5 236 Encryption Methods - 12.7.6 236 Authentication in the Enterprise - 12.7.7 237 WPA3 - 12.7.8 237 Check Your Understanding - Secure WLANs - 12.7.9 238 Module Practice and Quiz - 12.8 238 What did I learn in this module? - 12.8.1 238 Chapter Quiz - WLAN Concepts 241 Your Chapter Notes 241 Chapter 13 WLAN Configuration 243 Introduction - 13.0 243 Why should I take this module? - 13.0.1 243 What will I learn to do in this module? - 13.0.2 243 Remote Site WLAN Configuration - 13.1 243 Video - Configure a Wireless Network - 13.1.1 243 The Wireless Router - 13.1.2 244 Log in to the Wireless Router - 13.1.3 244 Basic Network Setup - 13.1.4 244 Basic Wireless Setup - 13.1.5 245 Configure a Wireless Mesh Network - 13.1.6 247 NAT for IPv4 - 13.1.7 247 Quality of Service - 13.1.8 247 Port Forwarding - 13.1.9 248 Packet Tracer - Configure a Wireless Network - 13.1.10 248 Lab - Configure a Wireless Network - 13.1.11 248 Configure a Basic WLAN on the WLC - 13.2 248 Video - Configure a Basic WLAN on the WLC - 13.2.1 248 WLC Topology - 13.2.2 249 Log in to the WLC - 13.2.3 249 View AP Information - 13.2.4 249 Advanced Settings - 13.2.5 250 Configure a WLAN - 13.2.6 250 Packet Tracer - Configure a Basic WLAN on the WLC - 13.2.7 252 Configure a WPA2 Enterprise WLAN on the WLC - 13.3 252 Video - Define an SNMP and RADIUS Server on the WLC - 13.3.1 252 SNMP and RADIUS - 13.3.2 252 Configure SNMP Server Information - 13.3.3 253 Configure RADIUS Server Information - 13.3.4 253 Video - Configure a VLAN for a New WLAN - 13.3.5 253 Topology with VLAN 5 Addressing - 13.3.6 253 Configure a New Interface - 13.3.7 254 Video - Configure a DHCP Scope - 13.3.8 255 Configure a DHCP Scope - 13.3.9 255 Video - Configure a WPA2 Enterprise WLAN - 13.3.10 256 Configure a WPA2 Enterprise WLAN - 13.3.11 256 Packet Tracer - Configure a WPA2 Enterprise WLAN on the WLC - 13.3.12 257 Troubleshoot WLAN Issues - 13.4 257 Troubleshooting Approaches - 13.4.1 257 Wireless Client Not Connecting - 13.4.2 258 Troubleshooting When the Network Is Slow - 13.4.3 259 Updating Firmware - 13.4.4 259 Packet Tracer - Troubleshoot WLAN Issues - 13.4.5 260 Module Practice and Summary - 13.5 260 Packet Tracer - WLAN Configuration - 13.5.1 260 What did I learn in this module? - 13.5.2 260 Chapter Quiz - WLAN Configuration 262 Your Chapter Notes 262 Chapter 14 Routing Concepts 263 Introduction - 14.0 263 Why should I take this module? - 14.0.1 263 What will I learn to do in this module? - 14.0.2 263 Path Determination - 14.1 263 Two Functions of Router - 14.1.1 263 Router Functions Example - 14.1.2 264 Best Path Equals Longest Match - 14.1.3 264 IPv4 Address Longest Match Example - 14.1.4 264 IPv6 Address Longest Match Example - 14.1.5 265 Build the Routing Table - 14.1.6 265 Check Your Understanding - Path Determination - 14.1.7 266 Packet Forwarding - 14.2 266 Packet Forwarding Decision Process - 14.2.1 266 End-to-End Packet Forwarding - 14.2.2 267 Packet Forwarding Mechanisms - 14.2.3 268 Check Your Understanding - Packet Forwarding - 14.2.4 269 Basic Router Configuration Review - 14.3 269 Topology - 14.3.1 269 Configuration Commands - 14.3.2 269 Verification Commands - 14.3.3 271 Filter Command Output - 14.3.4 276 Packet Tracer - Basic Router Configuration Review - 14.3.5 278 IP Routing Table - 14.4 278 Route Sources - 14.4.1 278 Routing Table Principles - 14.4.2 280 Routing Table Entries - 14.4.3 281 Directly Connected Networks - 14.4.4 281 Static Routes - 14.4.5 282 Static Routes in the IP Routing Table - 14.4.6 282 Dynamic Routing Protocols - 14.4.7 283 Dynamic Routes in the IP Routing Table - 14.4.8 283 Default Route - 14.4.9 284 Structure of an IPv4 Routing Table - 14.4.10 285 Structure of an IPv6 Routing Table - 14.4.11 286 Administrative Distance - 14.4.12 287 Check Your Understanding - IP Routing Table - 14.4.13 288 Static and Dynamic Routing - 14.5 288 Static or Dynamic? - 14.5.1 288 Dynamic Routing Evolution - 14.5.2 289 Dynamic Routing Protocol Concepts - 14.5.3 290 Best Path - 14.5.4 291 Load Balancing - 14.5.5 291 Check Your Understanding - Dynamic and Static Routing - 14.5.6 292 Module Practice and Quiz - 14.6 292 What did I learn in this module? - 14.6.1 292 Chapter Quiz - Routing Concepts 295 Your Chapter Notes 295 Chapter 15 IP Static Routing 297 Introduction - 15.0 297 Why should I take this module? - 15.0.1 297 What will I learn to do in this module? - 15.0.2 297 Static Routes - 15.1 297 Types of Static Routes - 15.1.1 297 Next-Hop Options - 15.1.2 298 IPv4 Static Route Command - 15.1.3 298 IPv6 Static Route Command - 15.1.4 299 Dual-Stack Topology - 15.1.5 300 IPv4 Starting Routing Tables - 15.1.6 300 IPv6 Starting Routing Tables - 15.1.7 301 Check Your Understanding - Static Routes - 15.1.8 303 Configure IP Static Routes - 15.2 303 IPv4 Next-Hop Static Route - 15.2.1 303 IPv6 Next-Hop Static Route - 15.2.2 304 IPv4 Directly Connected Static Route - 15.2.3 305 IPv6 Directly Connected Static Route - 15.2.4 306 IPv4 Fully Specified Static Route - 15.2.5 307 IPv6 Fully Specified Static Route - 15.2.6 308 Verify a Static Route - 15.2.7 308 Syntax Checker - Configure Static Routes - 15.2.8 310 Configure IP Default Static Routes - 15.3 311 Default Static Route - 15.3.1 311 Configure a Default Static Route - 15.3.2 311 Verify a Default Static Route - 15.3.3 312 Syntax Checker - Configure Default Static Routes - 15.3.4 313 Configure Floating Static Routes - 15.4 313 Floating Static Routes - 15.4.1 313 Configure IPv4 and IPv6 Floating Static Routes - 15.4.2 314 Test the Floating Static Route - 15.4.3 315 Syntax Checker - Configure Floating Static Route - 15.4.4 316 Configure Static Host Routes - 15.5 316 Host Routes - 15.5.1 316 Automatically Installed Host Routes - 15.5.2 316 Static Host Routes - 15.5.3 317 Configure Static Host Routes - 15.5.4 317 Verify Static Host Routes - 15.5.5 317 Configure IPv6 Static Host Route with Link-Local Next-Hop - 15.5.6 318 Syntax Checker - Configure Static Host Routes - 15.5.7 318 Module Practice and Quiz - 15.6 318 Packet Tracer - Configure IPv4 and IPv6 Static and Default Routes - 15.6.1 318 Lab - Configure IPv4 and IPv6 Static and Default Routes - 15.6.2 318 What did I learn in this module? - 15.6.3 319 Chapter Quiz - IP Static Routing 321 Your Chapter Notes 321 Chapter 16 Troubleshoot Static and Default Routes 323 Introduction - 16.0 323 Why should I take this module? - 16.0.1 323 What will I learn to do in this module? - 16.0.2 323 Packet Processing with Statics Routes - 16.1 323 Static Routes and Packet Forwarding - 16.1.1 323 Check Your Understanding - Packet Processing with Static Routes - 16.1.2 324 Troubleshoot IPv4 Static and Default Route Configuration - 16.2 324 Network Changes - 16.2.1 324 Common Troubleshooting Commands - 16.2.2 324 Solve a Connectivity Problem - 16.2.3 326 Syntax Checker - Troubleshoot IPv4 Static and Default Routes - 16.2.4 329 Module Practice and Quiz - 16.3 329 Packet Tracer - Troubleshoot Static and Default Routes - 16.3.1 329 Lab - Troubleshoot Static and Default Routes - 16.3.2 330 What did I learn in this module? - 16.3.3 330 Chapter Quiz - Troubleshoot Static and Default Routes 332 Your Chapter Notes 332 9780136634720 TOC 6/25/2020

    15 in stock

    £30.16

  • Ubuntu Linux Unleashed 2021 Edition

    Pearson Education (US) Ubuntu Linux Unleashed 2021 Edition

    15 in stock

    Book SynopsisMatthew Helmke has used Ubuntu since 2005. He has written about Linux for several magazines and websites, is a lead author of The Official Ubuntu Book, and has coauthored both A Practical Guide to Linux: Commands, Editors, and Shell Programming and The VMware Cookbook. In his day job, Matthew works for Gremlin (https://www.gremlin.com/) making the Internet more reliable. Matthew first used UNIX in 1987, while studying Lisp on a Vax at the university. He has run a business using only free and open source software, has consulted, and teaches as an adjunct professor for the University of Arizona. You can find out more about Matthew at https://www.linkedin.com/in/matthewhelmke/ or drop him a line with errata or suggestions at matthew@matthewhelmke.com.Table of ContentsIntroduction xxxi PART I: GETTING STARTED Chapter 1 Installing Ubuntu and Post-Installation Configuration 1 Before You Begin the Installation 1 Researching Your Hardware Specifications 2 Installation Options 2 32-Bit Versus 64-Bit Ubuntu 4 Planning Partition Strategies 5 The Boot Loader 5 Installing from DVD or USB Drive 6 Step-by-Step Installation 6 Installing 7 First Update 11 Shutting Down 11 Finding Programs and Files 12 Software Updater 12 The sudo Command 14 Configuring Software Repositories 15 System Settings 17 Detecting and Configuring a Printer 18 Configuring Power Management in Ubuntu 18 Setting the Time and Date 19 Configuring Wireless Networks 20 Troubleshooting Post-Installation Configuration Problems 21 Chapter 2 Background Information and Resources 23 What Is Linux? 23 Why Use Linux? 25 What Is Ubuntu? 27 Ubuntu for Business 27 Ubuntu in Your Home 28 Getting the Most from Linux and Ubuntu Documentation 28 Linux 29 Ubuntu 30 PART II: DESKTOP UBUNTU Chapter 3 Foundations of the Linux GUI 31 Foundations and the X Server 31 Basic X Concepts 32 Using X 33 Elements of the xorg conf File 34 Starting X 39 Using a Display Manager 39 Changing Window Managers 39 Chapter 4 Ubuntu Desktop Options 41 Desktop Environment 41 Using GNOME: A Primer 42 KDE and Kubuntu 45 Xfce and Xubuntu 46 LXDE and Lubuntu 47 MATE and Ubuntu MATE 48 Ubuntu Budgie 49 Ubuntu Kylin 50 Chapter 5 On the Internet 51 Getting Started with Firefox 52 Checking Out Google Chrome and Chromium 53 Chapter 6 Productivity Applications 55 Introducing LibreOffice 56 Other Useful Productivity Software 58 Working with PDFs 58 Writing Scripts 59 Working with XML and DocBook 59 Working with LaTeX 60 Creating Mind Maps 61 Productivity Applications Written for Microsoft Windows 61 Chapter 7 Multimedia Applications 63 Sound and Music 63 Sound Cards 64 Sound Formats 65 Listening to Music 65 Graphics Manipulation 66 The GNU Image Manipulation Program 66 Using Scanners in Ubuntu 67 Working with Graphics Formats 67 Capturing Screen Images 69 Other Graphics Manipulation Options 70 Using Digital Cameras with Ubuntu 70 Handheld Digital Cameras 70 Using Shotwell Photo Manager 71 Burning CDs and DVDs in Ubuntu 71 Creating CDs and DVDs with Brasero 71 Creating CDs from the Command Line 72 Creating DVDs from the Command Line 73 Viewing Video 75 Video Formats 75 Viewing Video in Linux 76 Recording and Editing Audio 76 Editing Video 77 Chapter 8 Games 79 Ubuntu Gaming 79 Installing Proprietary Video Drivers 80 Online Game Sources 81 Steam 81 GOG com 82 Humble 82 itch io 82 LGDB 82 Game Jolt 82 Installing Games from the Ubuntu Repositories 82 Warsow 82 Scorched 3D 83 Frozen Bubble 84 SuperTux 84 Battle for Wesnoth 85 Frets on Fire 85 FlightGear 87 Speed Dreams 87 Games for Kids 88 Commercial Games 88 Playing Windows Games 88 PART III: SYSTEM ADMINISTRATION Chapter 9 Managing Software 91 Ubuntu Software 91 Using Synaptic for Software Management 92 Staying Up to Date 94 Working on the Command Line 95 Day-to-Day APT Usage 95 Finding Software 98 Using apt-get Instead of apt 99 Compiling Software from Source 100 Compiling from a Tarball 100 Compiling from Source from the Ubuntu Repositories 101 Configuration Management 102 dotdee 102 Ubuntu Core 103 Using the Snappy Package Manager 103 Chapter 10 Command-Line Beginner's Class 105 What Is the Command Line? 106 Accessing the Command Line 107 Text-Based Console Login 107 Logging Out 108 Logging In and Out from a Remote Computer 108 User Accounts 109 Reading Documentation 111 Using Man Pages 111 Using apropros 112 Using whereis 112 Understanding the Linux File System Hierarchy 112 Essential Commands in /bin and /sbin 114 Configuration Files in /etc 114 User Directories: /home 115 Using the Contents of the /proc Directory to Interact with or Obtain Information from the Kernel 115 Working with Shared Data in the /usr Directory 117 Temporary File Storage in the /tmp Directory 117 Accessing Variable Data Files in the /var Directory 117 Navigating the Linux File System 117 Listing the Contents of a Directory with ls 118 Changing Directories with cd 120 Finding Your Current Directory with pwd 120 Working with Permissions 120 Assigning Permissions 121 Directory Permissions 122 Altering File Permissions with chmod 123 File Permissions with umask 124 File Permissions with chgrp 125 Changing File Permissions with chown 125 Understanding Set User ID, Set Group ID, and Sticky Bit Permissions 125 Setting Permissions with Access Control Lists 127 Working with Files 128 Creating a File with touch 128 Creating a Directory with mkdir 129 Deleting a Directory with rmdir 129 Deleting a File or Directory with rm 130 Moving or Renaming a File with mv 131 Copying a File with cp 131 Displaying the Contents of a File with cat 132 Displaying the Contents of a File with less 132 Using Wildcards and Regular Expressions 133 Working as Root 133 Understanding and Fixing sudo 134 Creating Users 136 Deleting Users 137 Shutting Down the System 137 Rebooting the System 138 Commonly Used Commands and Programs 139 Chapter 11 Command-Line Master Class, Part 1 141 Why Use the Command Line? 142 Using Basic Commands 143 Printing the Contents of a File with cat 144 Changing Directories with cd 145 Changing File Access Permissions with chmod 147 Copying Files with cp 147 Printing Disk Usage with du 148 Using echo 148 Finding Files by Searching with find 149 Searches for a String in Input with grep 151 Paging Through Output with less 152 Creating Links Between Files with ln 154 Finding Files from an Index with locate 156 Listing Files in the Current Directory with ls 156 Listing System Information with lsblk, lshw, lsmod, lspci, and neofetch 158 Reading Manual Pages with man 159 Making Directories with mkdir 160 Moving Files with mv 161 Renaming Files with rename 161 Deleting Files and Directories with rm 161 Sorting the Contents of a File with sort 162 Printing the Last Lines of a File with tail 163 Printing the Location of a Command with which 164 Downloading Files with wget 164 Chapter 12 Command-Line Master Class, Part 2 167 Redirecting Output and Input 167 stdin, stdout, stderr, and Redirection 169 Comparing Files 170 Finding Differences in Files with diff 170 Finding Similarities in Files with comm 170 Limiting Resource Use and Job Control 171 Listing Processes with ps 171 Listing Jobs with jobs 173 Running One or More Tasks in the Background 173 Moving Jobs to the Background or Foreground with bg and fg 174 Printing Resource Usage with top 175 Setting Process Priority with nice 177 Combining Commands 178 Pipes 178 Combining Commands with Boolean Operators 180 Running Separate Commands in Sequence 180 Process Substitution 181 Executing Jobs in Parallel 181 Using Environment Variables 182 Using Common Text Editors 185 Working with nano 186 Working with vi 187 Working with emacs 188 Working with sed and awk 189 Working with Compressed Files 191 Using Multiple Terminals with byobu192 Doing a Polite System Reset Using REISUB 194 Fixing an Ubuntu System That Will Not Boot 195 Checking BIOS 195 Checking GRUB 195 Reinstalling GRUB 195 Using Recovery Mode 196 Reinstalling Ubuntu 196 Tips and Tricks 196 Running the Previous Command 196 Running Any Previous Command 197 Running a Previous Command That Started with Specific Letters 197 Running the Same Thing You Just Ran with a Different First Word 197 Viewing Your History and More 197 Doing Two or More Things 198 Using Shortcuts 198 Confining a Script to a Directory 198 Using Coreutils 199 Reading the Contents of the Kernel Ring Buffer with dmesg 200 Chapter 13 Managing Users 201 User Accounts 201 The Super User/Root User 202 User IDs and Group IDs 204 File Permissions 204 Managing Groups 205 Group Listing 205 Group Management Tools 206 Managing Users 207 User Management Tools 208 Adding New Users 209 Monitoring User Activity on the System 211 Managing Passwords 212 System Password Policy 212 The Password File 212 Shadow Passwords 214 Managing Password Security for Users 216 Changing Passwords in a Batch 216 Granting System Administrator Privileges to Regular Users 217 Temporarily Changing User Identity with the su Command 217 Granting Root Privileges on Occasion: The sudo Command 219 Disk Quotas 222 Implementing Quotas 222 Manually Configuring Quotas 223 Related Ubuntu Commands 223 Chapter 14 Automating Tasks and Shell Scripting 225 What Is a Shell? 225 Scheduling Tasks 226 Using at and batch to Schedule Tasks for Later 227 Using cron to Run Jobs Repeatedly 229 Using rtcwake to Wake Your Computer from Sleep Automatically 231 Basic Shell Control 233 The Shell Command Line 233 Shell Pattern-Matching Support 235 Redirecting Input and Output 236 Piping Data 237 Background Processing 237 Writing and Executing a Shell Script 237 Running the New Shell Program 239 Storing Shell Scripts for System-wide Access 240 Interpreting Shell Scripts Through Specific Shells 240 Using Variables in Shell Scripts 242 Assigning a Value to a Variable 242 Accessing Variable Values 243 Positional Parameters 243 A Simple Example of a Positional Parameter 243 Using Positional Parameters to Access and Retrieve Variables from the Command Line 244 Using a Simple Script to Automate Tasks 244 Built-in Variables 246 Special Characters 247 Comparison of Expressions in pdksh and bash 250 Comparing Expressions with tcsh 255 The for Statement 259 The while Statement 261 The until Statement 263 The repeat Statement (tcsh) 263 The select Statement (pdksh) 264 The shift Statement 264 The if Statement 265 The expr Statement 266 The case Statement 267 The break and exit Statements 269 Using Functions in Shell Scripts 269 Chapter 15 The Boot Process 271 Running Services at Boot 271 Beginning the Boot Loading Process 272 Loading the Linux Kernel 274 Starting and Stopping Services with systemd 275 Controlling Services at Boot with Administrative Tools 278 Troubleshooting Runlevel Problems 278 Boot-Repair 278 Chapter 16 System-Monitoring Tools 281 Console-Based Monitoring 281 Using the kill Command to Control Processes 283 Using Priority Scheduling and Control 285 Displaying Free and Used Memory with free 286 Disk Space 286 Disk Quotas 287 Checking Log Files 287 Rotating Log Files 289 Graphical Process- and System-Management Tools 292 System Monitor 292 Conky 292 Other Graphical Process- and System-Monitoring Tools 297 KDE Process- and System-Monitoring Tools 298 Enterprise Server Monitoring 298 Chapter 17 Backing Up 301 Choosing a Backup Strategy 301 Why Data Loss Occurs 302 Assessing Your Backup Needs and Resources 303 Evaluating Backup Strategies 304 Making the Choice 308 Choosing Backup Hardware and Media 308 External Hard Drive 308 Network Storage 308 Tape Drive Backups 309 Cloud Storage 309 Using Backup Software 309 tar: The Most Basic Backup Tool 310 The GNOME File Roller 312 The KDE ark Archiving Tool 312 Déjà Dup 313 Back In Time 314 Unison 315 Amanda 315 Alternative Backup Software 316 Copying Files 316 Copying Files Using tar 317 Compressing, Encrypting, and Sending tar Streams 318 Copying Files Using cp 318 Using rsync 319 Version Control for Configuration Files 320 System Rescue 323 The Ubuntu Rescue Disc 323 Restoring the GRUB2 Boot Loader 323 Saving Files from a Nonbooting Hard Drive 324 Chapter 18 Networking 325 Laying the Foundation: The localhost Interface 326 Checking for the Availability of the Loopback Interface 326 Configuring the Loopback Interface Manually 327 Checking Connections with ping, traceroute, and mtr 328 Networking with TCP/IP 330 TCP/IP Addressing 331 Using IP Masquerading in Ubuntu 332 Ports 333 IPv6 Basics 334 Network Organization 337 Subnetting 337 Subnet Masks 337 Broadcast, Unicast, and Multicast Addressing 338 Hardware Devices for Networking 338 Network Interface Cards 338 Network Cable 340 Hubs and Switches 342 Routers and Bridges 343 Initializing New Network Hardware 343 Using Network Configuration Tools 345 Command-Line Network Interface Configuration 346 Network Configuration Files 350 Using Graphical Configuration Tools 355 Dynamic Host Configuration Protocol 355 How DHCP Works 356 Activating DHCP at Installation and Boot Time 357 DHCP Software Installation and Configuration 358 Using DHCP to Configure Network Hosts 359 Other Uses for DHCP 361 Wireless Networking 361 Support for Wireless Networking in Ubuntu 361 Choosing from Among Available Wireless Protocols 363 Beyond the Network and onto the Internet 363 Common Configuration Information 364 Configuring Digital Subscriber Line Access 365 Understanding PPP over Ethernet 366 Configuring a PPPoE Connection Manually 366 Configuring Dial-up Internet Access 367 Troubleshooting Connection Problems 368 Chapter 19 Remote Access with SSH and VNC 371 Setting Up an SSH Server 371 SSH Tools 372 Using scp to Copy Individual Files Between Machines 372 Using sftp to Copy Many Files Between Machines 373 Using ssh-keygen to Enable Key-Based Logins 373 Virtual Network Computing 375 Guacamole 377 Chapter 20 Securing Your Machines 379 Understanding Computer Attacks 379 Assessing Your Vulnerability 381 Protecting Your Machine 382 Securing a Wireless Network 382 Passwords and Physical Security 383 Configuring and Using Tripwire 384 Securing Devices 385 Viruses 385 Configuring Your Firewall 386 AppArmor 388 Forming a Disaster Recovery Plan 390 Chapter 21 Performance Tuning 393 Storage Disk 394 Linux File Systems 394 The hdparm Command 395 File System Tuning 396 The tune2fs Command 396 The e2fsck Command 397 The badblocks Command 397 Disabling File Access Time 397 Kernel 398 Tuned 399 Chapter 22 Kernel and Module Management 401 The Linux Kernel 402 The Linux Source Tree 403 Types of Kernels 405 Managing Modules 406 When to Recompile 408 Kernel Versions 409 Obtaining the Kernel Sources 409 Patching the Kernel 410 Compiling the Kernel 412 Using xconfig to Configure the Kernel 414 Creating an Initial RAM Disk Image 418 When Something Goes Wrong 418 Errors During Compile 418 Runtime Errors, Boot Loader Problems, and Kernel Oops 419 PART IV: UBUNTU AS A SERVER Chapter 23 Sharing Files and Printers 421 Using Network File System 422 Installing and Starting or Stopping NFS 422 NFS Server Configuration 422 NFS Client Configuration 423 Putting Samba to Work 424 Manually Configuring Samba with /etc/samba/smb conf 426 Testing Samba with the testparm Command 429 Starting, Stopping, and Restarting the smbd Daemon 429 Mounting Samba Shares 430 Network and Remote Printing with Ubuntu 431 Creating Network Printers 431 Using the CUPS GUI 433 Avoiding Printer Support Problems 434 Chapter 24 Common Web Server Stacks 437 LAMP 437 LEMP 439 MEAN 440 Chapter 25 Apache Web Server Management 443 About the Apache Web Server 443 Installing the Apache Server 444 Starting and Stopping Apache 444 Runtime Server Configuration Settings 446 Runtime Configuration Directives 446 Editing apache2 conf 447 Apache Multiprocessing Modules 449 Using htaccess Configuration Files 450 File System Authentication and Access Control 452 Restricting Access with Require 452 Authentication 453 Final Words on Access Control 455 Apache Modules 455 mod_access 456 mod_alias 456 mod_asis 456 mod_auth 457 mod_auth_anon 457 mod_auth_dbm 457 mod_auth_digest 457 mod_autoindex4 58 mod_cgi 458 mod_dir and mod_env 458 mod_expires 458 mod_headers 458 mod_include 459 mod_info and mod_log_config 459 mod_mime and mod_mime_magic 459 mod_negotiation 459 mod_rewrite 459 mod_setenvif 460 mod_speling 460 mod_status 460 mod_ssl 460 mod_unique_id 460

    15 in stock

    £41.30

  • CCDE v3 Practice Labs

    Pearson Education (US) CCDE v3 Practice Labs

    10 in stock

    Book SynopsisMartin J. Duggan, CCDE#2016::6 and CCIE#7942, is a Principal Network Architect designing network solutions for global financial accounts at Systal Technology Solutions. He is one of Systal's key technical leadership resources, helping Systal to be a dynamic and innovative services integrator and provider that offers fast, agile, and tailored support to meet business aspirations and challenges. Martin gained his Routing & Switching CCIE in 2001 and has been passionate about Cisco qualifications and mentoring ever since. He wrote the CCIE Routing & Switching Practice Labs series for Cisco Press and was keen to do the same for the CCDE program after completing his CCDE. He resides in the UK, where he draws inspiration for his CCDE scenarios from his successful career in the communications industry. Martin enjoys gliding, cycling, snowboarding, and karate when not designing networks, and he creates content for multiple Cisco exam tracks. Follow Martin on TTable of Contents Foreword xx Introduction: A License to Design xxi Chapter 1 CCDE Practice Lab 1: Jacobs 1 Practice Lab Navigation 1 Practice Lab 1 Summary 114 Chapter 2 CCDE Practice Lab 2: Squid Energy 115 Practice Lab Navigation 115 Practice Lab 116 Summary 382 Chapter 3 CCDE Practice Lab 3: Bank of Jersey 229 Practice Lab Navigation 229 Practice Lab 230 Summary 382 9780137499854, TOC, 6/17/2022

    10 in stock

    £75.64

  • Network Automation Made Easy

    Pearson Education (US) Network Automation Made Easy

    15 in stock

    Book SynopsisIvo Pinto, CCIE No. 57162 (R&S, Security, and Data Center), CISSP, is a Solutions Architect with many years of experience in the fields of multicloud, automation, and enterprise and data center networking. Ivo has worked at Cisco in different roles and different geographies, and he has led the architecture creation and deployment of many automated global-scale solutions for Fortune 50 companies that are in production today. In his latest role, he is responsible for multicloud innovation at the Customer Experience CTO office. Ivo is the founder of IT OnTrack (www.itontrack.com), a provider of services to young professionals who are looking to further their careers in IT. Ivo has authored Cisco white papers and multiple Cisco exam questions. Follow Ivo on LinkedIn @ivopinto01.Table of Contents Introduction xvii Chapter 1 Types of Network Automation 1 Data-Driven Automation 2 Task-Based Automation 11 End-to-End Automation 16 Tools 22 Summary 39 Review Questions 40 Chapter 2 Data for Network Automation 43 The Importance of Data 43 Data Formats and Models 44 Methods for Gathering Data 66 Summary 84 End Notes 84 Review Questions 85 Chapter 3 Using Data from Your Network 87 Data Preparation 87 Data Visualization 100 Data Insights 104 Case Studies 112 Summary 116 Review Questions 117 Chapter 4 Ansible Basics 119 Ansible Characteristics 119 Installing Ansible 120 Variables 126 Playbooks 131 Conditionals 133 Loops 136 Handlers 140 Executing a Playbook 143 Roles 149 Summary 152 Review Questions 153 Chapter 5 Using Ansible for Network Automation 155 Interacting with Files 155 Interacting with Devices 160 Interacting with APIs 187 Case Studies 189 Summary 195 Review Questions 196 Chapter 6 Network DevOps 199 What NetDevOps Is 199 NetDevOps Tools 214 How to Build Your Own NetDevOps Environment 228 Case Studies 233 Summary 238 Review Questions 238 Chapter 7 Automation Strategies 241 What an Automation Strategy Is 241 Why You Need an Automation Strategy 250 How to Build Your Own Automation Strategy 251 How to Use an Automation Strategy 268 Summary 270 Review Questions 271 Appendix A Answers to Review Questions 273 TOC, 9780137455928, 10/5/2021

    15 in stock

    £40.49

  • ModelDriven DevOps

    Pearson Education (US) ModelDriven DevOps

    15 in stock

    Book SynopsisSteven Carter has more than 25 years of industry experience working in large universities, government research and development laboratories, and private sector companies. He has been a speaker at several industry conferences and written blogs and articles in technical journals. He has spent time as a system administrator running some of the world's largest supercomputers and a network engineer building out the world's first SDN network for the Department of Energy. In addition, Steven has a wide range of experience in networking, including operations, embedded software development, and sales. He has spent the past 5 years working for Red Hat Ansible and Cisco Systems consulting and coding for many of the world's largest organizations as they modernize and secure their operations by incorporating DevOps. He currently works as a principal DevOps engineer for Cisco Systems creating CI/CD pipelines for deploying cloud applications and network infrastructure in secure anTable of ContentsChapter 1: A Lightbulb Goes Off Enterprise IT as a Source of Risk to the Business Observations of a Train WreckDevOps Seems Like a Better Way What Is DevOps? Automation Infrastructure as Code CI/CD Apps vs. Infrastructure Harnessing Automation-at-ScaleWhy Are Enterprise IT Departments Not Adopting DevOps? Human Factors Business FactorsSummaryChapter 2: A Better Way The Goal: Business Transformation Constraints-Based IT Business Transformation DevOps in ActionWhy Model-Driven DevOps? Network Infrastructure Is Different What Is Model-Driven DevOps? What Is a Data Model? Source of Truth DevOps as a FrameworkDevSecOps: Baked-In SecuritySummaryChapter 3: Consumable Infrastructure APIs Why API over CLI?Platforms Physical Hardware Provisioning Consolidated Control Point Northbound vs. Southbound APIs API and Feature Normalization Fabricwide Services ScalabilitySummaryChapter 4: Infrastructure as Code Why Infrastructure as Code?Source of Truth Data Models Common IaC Tools Organization Types of Source of TruthCode Data FlowSummaryChapter 5: Continuous Integration/Continuous Deployment CI/CD Overview Applications vs. Infrastructure CI/CD in ActionSource Code Management Core Features Collaboration Features SCM SummaryContinuous Integration Tools CI Engines How They Work Sample WorkflowInfrastructure Simulation Tools Cisco Modeling LabsTest and Validation Linting Schema/Model Validation Functional Testing Test and Validation SummaryContinuous DeploymentContinuous MonitoringSummaryChapter 6: Implementation Model-Driven DevOps Reference ImplementationThe GoalDevOps RoadmapArchitecture Network as an Application ConsistencySimulationAutomation Creating a Source of Truth Moving Data MDD Source of Truth Automation Tooling MDD Data Automation Runner Cisco Network Services OrchestratorTesting Linting Snapshotting the Test Network Data Validation and State Checking Data Validation Pushing Data to the Devices State Checking Restore Continuous Integration Workflow SummaryDeployment Scale Starting WorkflowsSummaryChapter 7: Human Factors Culture and the Need for ChangeStart with the WhyOrganization Leadership Role Models Building a Team Break Down the Silos Community New Tools Summary of Organization-Level ChangesIndividual Programming vs. Automation Version Control Tools Data Formats APIs Templating Linux/UNIX Wait! Where Do I Fit In?Summary9780137644674 TOC 6/23/2022

    15 in stock

    £34.19

  • Cisco Intersight

    Pearson Education (US) Cisco Intersight

    15 in stock

    Book SynopsisMatthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown, Bradley TerEick, and Mohit Vaswani are Solutions Architects within the Cisco Cloud Infrastructure & Software Group who are passionate about helping customers build high-value hybrid cloud and multi-cloud solutions. Every day, they work directly with Cisco customers and partners to combine Cisco, third-party, open-source, and public cloud technologies to achieve key business objectives.Table of Contents Foreword xviii Introduction xix Chapter 1 Intersight Foundations 1 Introduction 1 Intersight Architecture 1 Licensing 21 Summary 21 References 21 Chapter 2 Security 23 Introduction 23 Connectivity 23 Claiming 24 Role-Based Access Control (RBAC) 26 Audit Logs 28 Data Security 29 Security Advantages 30 Summary 31 References 31 Chapter 3 Infrastructure Operations 33 Introduction 33 Device Health and Monitoring 33 Linking Intelligence Feeds 38 Integrated Support 47 Infrastructure Configuration 50 ITSM Integration 54 UCS Director Integration 56 Summary 61 References 61 Chapter 4 Server Operations 63 Introduction 63 Supported Systems 63 Server Actions 64 Server Deployment 69 Server Policies 69 ID Pools 70 Domain Management 73 Firmware Updates 80 Summary 83 Reference 83 Chapter 5 Network Operations 85 Introduction 85 Policy-Driven Network Infrastructure 85 Summary 90 Reference 90 Chapter 6 Storage Operations 91 Introduction 91 HyperFlex 92 Deploying HyperFlex Clusters 101 Managing HX Clusters 105 Traditional Storage Operations 113 Summary 116 References 116 Chapter 7 Virtualization Operations 117 Introduction 117 Claiming a vCenter Target 118 Claiming an AWS Target 120 Contextual Visibility 121 Contextual Operations 130 Virtualization Orchestration 132 Summary 134 Reference 134 Chapter 8 Kubernetes 135 Introduction 135 Intersight Kubernetes Service 136 Benefits of IKS 138 Cluster Management 139 Intersight Workload Engine 161 Summary 165 References 166 Chapter 9 Workload Optimization 167 Introduction 167 Users and Roles 169 Targets and Configuration 170 The Supply Chain 172 Actions 174 Groups and Policies 175 Planning and Placement 180 The Public Cloud 182 Summary 185 References 185 Chapter 10 Orchestration 187 Introduction 187 Automation and Orchestration 187 Intersight Orchestration 188 Use Cases 200 Summary 203 Chapter 11 Programmability 205 Introduction 205 Client SDKs 209 Authentication and Authorization 210 Crawl, Walk, Run 213 Advanced Usage 237 Next Steps: Use Cases 244 Summary 255 References 255 Chapter 12 Infrastructure as Code 257 Introduction 257 What Is Infrastructure as Code? 258 HashiCorp Terraform 262 Intersight and Infrastructure as Code 263 IST and Intersight Cloud Orchestrator 272 Summary 273 9780137937288, TOC, 10/3/2022

    15 in stock

    £40.49

  • Automating and Orchestrating Networks with

    Pearson Education Automating and Orchestrating Networks with

    1 in stock

    Book SynopsisIvo Pinto, CCIE No. 57162 (R&S, Security, and Data Center), CISSP, is a Solutions Architect with many years of experience in the fields of cloud, automation, and enterprise and data center networking. Ivo has worked at Cisco in different roles and different geographies, and he has led the architecture and deployment of many automated global-scale solutions for Fortune 50 companies that are in production today. In his latest role, he is responsible for the architecture of multiple ISV products at Amazon Web Services (AWS). Ivo has authored multiple white papers, blogs, and the book Network Automation Made Easy. You can follow Ivo on LinkedIn @ivopinto01. Faisal Chaudhry, CCIE No. 2706 (R&S and Voice), is a Distinguished Engineer in Cisco Customer Experience (CX). In his current role, Faisal works with Cisco customers and industry on cloud automation and orchestration, software-defined networking (SDN) solutions, and network fun

    1 in stock

    £42.74

  • DevSecOps in Oracle Cloud

    Pearson Education DevSecOps in Oracle Cloud

    15 in stock

    Book Synopsis

    15 in stock

    £44.19

  • Designing RealWorld Multidomain Networks

    Pearson Education Designing RealWorld Multidomain Networks

    1 in stock

    Book SynopsisDhrumil Prajapati: Dhrumil is a principal architect within Cisco CX's GES Architecture team. His focus lies on multi-domain networks, and he has been offering a complete lifecycle of professional services and architecture advisory for the past 13 years. His expertise extends to serving enterprise, government, and service provider entities across the globe. His services are designed to assist clients in planning, designing, deploying, managing, and interoperating all networking technology domains within their private or public infrastructure and application environments.   In his networking career, Dhrumil has designed networks for more than 150 organizations, which inspired him to write a book on the subject. He is a coauthor of Cisco SD-Access for Industry Verticals (https://cs.co/sda-verticals-book), and holds patents and has given multiple presentations in Cisco Live on SD-Access and multi-domain.   Dhrumil holds dua

    1 in stock

    £33.74

  • Cisco Meraki Fundamentals

    Pearson Education (US) Cisco Meraki Fundamentals

    1 in stock

    Book SynopsisArun Paul serves as a technical solutions architect at Cisco Meraki, focusing on supporting public sector SLED customers in the Midwest states. With more than a decade of experience in the technology industry, Arun has held diverse roles ranging from engineering to technical sales. Arun's tech journey began as a software engineer at the Cisco Catalyst 6500 BU, where he played a pivotal role as a point of contact for Catalyst design recommendations and escalations. Arun showcased his innovative spirit by proposing Cisco innovation ideas and process improvements. Beyond corporate roles, Arun co-founded a security consulting and training business, gaining valuable entrepreneurial experience. This venture provided insights into customer challenges in the modern technology landscape. Arun holds an MS in Information Security from George Mason University, graduating with a Distinguished Achievement Award. Arun has consistently demonstrated dedication

    1 in stock

    £43.19

  • Pearson Education Zero Trust in Resilient Cloud and Network

    15 in stock

    Book Synopsis

    15 in stock

    £47.59

  • The AI Revolution in Networking Cybersecurity and

    Pearson Education (US) The AI Revolution in Networking Cybersecurity and

    1 in stock

    Book SynopsisOmar Santos is a cybersecurity thought leader with a passion for driving industry-wide initiatives to enhance the security of critical infrastructures. Omar is the lead of the DEF CON Red Team Village, chair of the Common Security Advisory Framework (CSAF) technical committee, and board member of the OASIS Open standards organization. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is a renowned expert in ethical hacking, vulnerability research, and incident response. He employs his deep understanding of these disciplines to help organizations stay ahead of emerging threats. His dedication to cybersecurity has made a significant impact on businesses, academic institutions, law enforcement agencies, and other entities striving to bolster their security measures. With over twenty books, video courses, Trade Review“As AI promises to revolutionize many aspects of work and society, there is a critical need for IT professionals to understand how AI can help them in practice. This book provides a highly accessible overview of how new and emerging AI capabilities can improve many key areas of IT. The authors were early industry pioneers in applying AI to improve networking, cybersecurity, and the design & operation of AI-based systems for large enterprises -- and their real-world AI experience is clearly shown throughout the book.”--John Apostolopoulos, Area Tech Lead Communication & Collaboration, Google, formerly VP/CTO Enterprise Networking Business, CiscoTable of ContentsPreface xix Chapter 1. Introducing the Age of AI: Emergence, Growth, and Impact on Technology 1 The End of Human Civilization 2 Significant Milestones in AI Development (This Book Is Already Obsolete) 2 The AI Black Box Problem and Explainable AI 5 What's the Difference Between Large Language Models and Traditional Machine Learning? 6 Hugging Face Hub: A Game-Changer in Collaborative Machine Learning 12 AI's Expansion Across Industries: Networking, Cloud Computing, Security, Collaboration, and IoT 14 AI's Impacts on the Job Market 15 AI's Impacts on Security, Ethics, and Privacy 17 Summary 30 References 31 Chapter 2. Connected Intelligence: AI in Computer Networking 33 The Role of AI in Computer Networking 34 AI for Network Management 37 AI for Network Optimization 45 AI for Network Security 49 AI for Traffic Classification and Prediction 52 AI in Network Digital Twins 54 Summary 55 References 56 Chapter 3. Securing the Digital Frontier: AI's Role in Cybersecurity 59 AI in Incident Response: Analyzing Potential Indicators to Determine the Type of Attack 59 AI in Vulnerability Management and Vulnerability Prioritization 71 AI in Security Governance, Policies, Processes, and Procedures 73 Using AI to Create Secure Network Designs 74 AI and Security Implications of IoT, OT, Embedded, and Specialized Systems 75 AI and Physical Security 76 AI in Security Assessments, Red Teaming, and Penetration Testing 77 AI in Identity and Account Management 80 Using AI for Fraud Detection and Prevention 86 AI and Cryptography 87 AI in Secure Application Development, Deployment, and Automation 90 Summary 93 References 94 Chapter 4. AI and Collaboration Building Bridges, Not Walls 95 Collaboration Tools and the Future of Work 96 AI for Collaboration 101 The Contact Center: A Bridge to Customers 109 AR/VR: A Closer Look 113 Affective Computing 116 Summary 116 References 117 Chapter 5. AI in the Internet of Things (AIoT) 119 Understanding the IoT Landscape 120 AI for Data Analytics and Decision Making 122 AI for IoT Resource Optimization 125 AI for IoT in Supply Chain 127 AI for IoT Security 130 AI for IoT in Sustainability 133 Summary 137 References 137 Chapter 6. Revolutionizing Cloud Computing with AI 139 Understanding the Cloud Computing Environment 139 AI in Cloud Infrastructure Management 145 AI for Cloud Security 147 AI for Cloud Optimization 151 AI and Machine Learning as a Service 153 Challenges of AI and Machine Learning in the Cloud 158 What Lies Ahead 158 References 159 Chapter 7. Impact of AI in Other Emerging Technologies 161 Executive Order on the Development and Use of Artificial Intelligence 162 AI in Quantum Computing 163 How AI Can Revolutionize Quantum Hardware Optimization 167 Data Analysis and Interpretation 168 AI in Blockchain Technologies 169 AI in Autonomous Vehicles and Drones 175 AI in Edge Computing 175 Summary 183 References 184 Index 185

    1 in stock

    £25.19

  • Cisco ThousandEyes

    Pearson Education Cisco ThousandEyes

    15 in stock

    Book SynopsisAaron Trompeter is a technical solutions architect within the ThousandEyes global enterprise segment at Cisco, focusing on visibility and operational awareness for onprem, SaaS, and cloud native. In this role, he aligns his passion for education and learning with his motivation for helping the infrastructure community grow and learn to harness tools to provide use cases that fit each organization. Prior to this role, Aaron spent 6 years as a data center TSA within Cisco and had a few other roles within Cisco as a service provider specialist and software engineer in the Cloud Engineering unit. Aaron has more than 20 years of experience in the IT and engineering areas and has continued to focus on networking and software. Rob Webb began his technical career when, at 17 years old, he enlisted in the military as a teletype technician. His military service spanned more than 28 years, during which time he trained and worked in telecommunications sy

    15 in stock

    £40.79

  • Cisco Catalyst SDWAN

    Pearson Education Cisco Catalyst SDWAN

    15 in stock

    Book SynopsisAnastasiya Volkova, CCIE No. 54378 (EN and Security), is a Solutions Architect on the Cisco Global Demo Engineering team, with a focus on Enterprise networking, Security and Cloud solutions, and multi-domain integrations. Anastasiya has more than 12 years of industry experience. Her background includes different areas of expertise, from hands-on experience in design, implementation, and support of network solutions to conducting trainings and technical presentations. She is very passionate about sharing her knowledge with others, hoping to help more people fall in love with the technology.   Osvaldo Salazar Tovar is a Technical Solutions Architect/Solutions Engineer in the Cisco Enterprise Routing and SD-WAN group. Throughout his career, he has supported the Global Service Provider and Enterprise Networking teams in LATAM through various technical sales engineering roles. He is currently working with different verticals in the Uni

    15 in stock

    £50.99

  • Parallel Scientific Computation 2e A Structured

    Oxford University Press Parallel Scientific Computation 2e A Structured

    1 in stock

    Book SynopsisParallel Scientific Computation presents a methodology for designing parallel algorithms and writing parallel computer programs for modern computer architectures with multiple processors.Trade ReviewThe author presents a detailed study describing how parallel computation can be applied to a collection of numerical problems. He considers LU decomposition of dense matrices, the fast Fourier transform (FFT), multiplication of a sparse matrix by a dense vector, as well as matching vertices in a sparse graph and sorting. He uses these to teach design and implementation of well-structured efficient parallel algorithms...The book is best suited for a graduate course in parallel scientific processing for mathematics or computer science students. * Bill Satzer, MAA Reviews *

    1 in stock

    £43.69

  • Bavarialift           FINENECKLACEBRACELETANKLET

    Pearson Education Limited Bavarialift FINENECKLACEBRACELETANKLET

    1 in stock

    Book Synopsis

    1 in stock

    £16.88

  • Clio Wired

    Columbia University Press Clio Wired

    1 in stock

    Book SynopsisTrade ReviewFor the archivist, these essays ask provocative questions and point to some interesting opportunities, both for repositories and users. -- Christine D'Arpa Archival Issues teachers esepcially should welcome this collection Journal of American HistoryTable of ContentsIntroduction: Roy Rosenzweig: Scholarship as Community, by Anthony Grafton Note to Readers, by Deborah Kaplan Rethinking History in New Media 1. Scarcity or Abundance? Preserving the Past 2. Web of Lies? Historical Knowledge on the Internet, with Daniel J. Cohen 3. Wikipedia: Can History Be Open Source? Practicing History in New Media: Teaching, Researching, Presenting, Collecting 4. Historians and Hypertext: Is It More Than Hype?, with Steve Brier 5. Rewiring the History and Social Studies Classroom: Needs, Frameworks, Dangers, Proposals, with Randy Bass 6. The Riches of Hypertext for Scholarly Journals 7. Should Historical Scholarship Be Free? 8. Collecting History Online Surveying History in New Media 9. Brave New World or Blind Alley? American History on the World Wide Web, with Michael O'Malley 10. Wizards, Bureaucrats, Warriors, and Hackers: Writing the History of the Internet 11. The Road to Xanadu: Public and Private Pathways on the History Web Acknowledgments Notes Index

    1 in stock

    £70.40

  • The Wired Neighborhood

    Yale University Press The Wired Neighborhood

    15 in stock

    Book SynopsisThis exploration of the nature of cyberspace and increasing virtualization of everyday life argues that electronic neighbourhoods should be less important to us than our geophysical neighbourhoods, speaking in favour of civic networking.

    15 in stock

    £28.19

  • Developing Series 60 Applications

    Pearson Education Developing Series 60 Applications

    1 in stock

    Book SynopsisThe Series 60 Platform is a multi-vendor, open standards-based platform for one-handed smart phone application development. It delivers applications ranging from Web browsing to games to e-mail and messaging services, as well as other PDA functions including synchronization with PC applications such as Outlook. It also allows for video recording and playback. Nokia not only develops its own smart phones using Series 60 but also licenses this development platform to other smart phone manufacturers. The bottomline: Series 60 presents developers with a compelling opportunity to create a new wave of applications and services for global deployment on handsets from multiple manufacturers. Series 60 Software Development, the first book in the Nokia Mobile Developer Series, will be the official guide for developers creating applications for mobile devices based on the feature-rich Series 60 platform. This book covers the complete suite of development tools available for this platform includ

    1 in stock

    £48.76

  • Mathematical Foundations of Computer Networking

    Pearson Education Mathematical Foundations of Computer Networking

    1 in stock

    Book SynopsisSrinivasan Keshav is a Professor and a Canada Research Chair at the David R. Cheriton School of Computer Science, University of Waterloo, Ontario, Canada.Table of ContentsPreface xv Chapter 1: Probability 1 1.1 Introduction 1 1.2 Joint and Conditional Probability 7 1.3 Random Variables 14 1.4 Moments and Moment Generating Functions 21 1.5 Standard Discrete Distributions 25 1.6 Standard Continuous Distributions 29 1.7 Useful Theorems 35 1.8 Jointly Distributed Random Variables 42 1.8.1 Bayesian Networks 44 1.9 Further Reading 47 1.10 Exercises 47 Chapter 2: Statistics 53 2.1 Sampling a Population 53 2.2 Describing a Sample Parsimoniously 57 2.3 Inferring Population Parameters from Sample Parameters 66 2.4 Testing Hypotheses about Outcomes of Experiments 70 2.5 Independence and Dependence: Regression and Correlation 86 2.6 Comparing Multiple Outcomes Simultaneously: Analysis of Variance 95 2.7 Design of Experiments 99 2.8 Dealing with Large Data Sets 100 2.9 Common Mistakes in Statistical Analysis 103 2.10 Further Reading 105 2.11 Exercises 105 Chapter 3: Linear Algebra 109 3.1 Vectors and Matrices 109 3.2 Vector and Matrix Algebra 111 3.3 Linear Combinations, Independence, Basis, and Dimension 114 3.4 Using Matrix Algebra to Solve Linear Equations 117 3.5 Linear Transformations, Eigenvalues, and Eigenvectors 125 3.6 Stochastic Matrices 138 3.7 Exercises 143 Chapter 4: Optimization 147 4.1 System Modeling and Optimization 147 4.2 Introduction to Optimization 149 4.3 Optimizing Linear Systems 152 4.4 Integer Linear Programming 157 4.5 Dynamic Programming 162 4.6 Nonlinear Constrained Optimization 164 4.7 Heuristic Nonlinear Optimization 167 4.8 Exercises 170 Chapter 5: Signals, Systems, and Transforms 173 5.1 Background 173 5.2 Signals 185 5.3 Systems 188 5.4 Analysis of a Linear Time-Invariant System 189 5.5 Transforms 195 5.6 The Fourier Series 196 5.7 The Fourier Transform and Its Properties 200 5.8 The Laplace Transform 209 5.9 The Discrete Fourier Transform and Fast Fourier Transform 216 5.10 The Z Transform 226 5.11 Further Reading 233 5.12 Exercises 234 Chapter 6: Stochastic Processes and Queueing Theory 237 6.1 Overview 237 6.2 Stochastic Processes 240 6.3 Continuous-Time Markov Chains 252 6.4 Birth-Death Processes 255 6.5 The M/M/1 Queue 262 6.6 Two Variations on the M/M/1 Queue 266 6.7 Other Queueing Systems 270 6.8 Further Reading 272 6.9 Exercises 272 Chapter 7: Game Theory 277 7.1 Concepts and Terminology 278 7.2 Solving a Game 291 7.3 Mechanism Design 301 7.4 Limitations of Game Theory 314 7.5 Further Reading 315 7.6 Exercises 316 Chapter 8: Elements of Control Theory 319 8.1 Overview of a Controlled System 320 8.2 Modeling a System 323 8.3 A First-Order System 329 8.4 A Second-Order System 331 8.5 Basics of Feedback Control 336 8.6 PID Control 341 8.7 Advanced Control Concepts 346 8.8 Stability 350 8.9 State Space–Based Modeling and Control 360 8.10 Digital Control 364 8.11 Partial Fraction Expansion 367 8.12 Further Reading 370 8.13 Exercises 370 Chapter 9: Information Theory 373 9.1 Introduction 373 9.2 A Mathematical Model for Communication 374 9.3 From Messages to Symbols 378 9.4 Source Coding 379 9.5 The Capacity of a Communication Channel 386 9.6 The Gaussian Channel 399 9.7 Further Reading 407 9.8 Exercises 407 Solutions to Exercises 411 Index 457

    1 in stock

    £56.69

  • Blockchain Technology Solutions for the Security

    Elsevier Science Blockchain Technology Solutions for the Security

    1 in stock

    Book SynopsisTable of Contents1. IoT: Fundamentals and challenges 2. Security issues of IoT 3. IoT-based Healthcare Systems 4. Emerging e-Health IoT Applications 5. Blockchain: Concept and Emergence 6. Application of Blockchain for security 7. Role of Blockchain in IoT based healthcare systems 8. Decentralized management of healthcare IoT devices 9. Blockchain based insurance and healthcare 10. Blockchain adoption strategies

    1 in stock

    £103.50

  • Microsoft 365 Modern Desktop Administrator Guide

    Cengage Learning, Inc Microsoft 365 Modern Desktop Administrator Guide

    1 in stock

    Book SynopsisWright/Plesniarski's MICROSOFT SPECIALIST GUIDE TO MICROSOFT EXAM MD-100: WINDOWS 10 ensures you are well prepared for the Microsoft exam as well as a successful career in system administration. Completely up to date, this student-friendly guide walks you step by step through all aspects of installing, configuring and maintaining Windows 10 as a client operating system. Engaging exercises throughout enable you to experience the processes involved in Windows 10 configuration and management -- with plenty of troubleshooting tips that offer solutions to common problems. Review Questions help you prepare for the Microsoft certification exam, while Case Projects provide practice in situations that must be managed in a live networking environment. Giving you added flexibility, labs can be completed on physical or virtual machines. Also available: MindTap digital learning solution.Table of Contents1. Introduction to Windows 10. 2. Configuring Windows 10. 3. User Management. 4. Networking. 5. Managing Disks and File Systems. 6. Windows 10 Security Features. 7. User Productivity Tools. 8. Application Support. 9. Performance Tuning and System Recovery. 10. Enterprise Computing. 11. Managing Enterprise Clients. 12. Automating Windows 10 Deployment. Appendix: Exam MD-100. Appendix: Preparing for Exams. Appendix: Client Hyper-V.

    1 in stock

    £66.49

  • CompTIA Cloud Guide to Cloud Computing

    CompTIA Cloud Guide to Cloud Computing

    1 in stock

    Book SynopsisContent maps to the exam objectives from the latest CompTIA Cloud+ Exam, CV0-002. Modules are broken down into multiple modalities such as readings, videos, and hands-on projects that walk learners through various popular Cloud platforms, including AWS, Google Cloud Platform, and Microsoft Azure. The course begins with a pre-assessment and ends with a post-assessment helping learners build confidence and track their progress. Learners will work with OpenStack in the live virtual machine labs to provide hands-on practice and troubleshoot, practice, explore, and try different solutions in a secure, private Cloud sandbox environment.Table of ContentsPart 1: Getting to the Cloud. 1. Introduction to Cloud Computing. 2. Virtual Hardware. 3. Migration to the Cloud. Part 2: What���s in the Cloud. 4. Cloud Infrastructure. 5. Cloud Connectivity and Troubleshooting. 6. Securing Cloud Resources. 7. Identity and Access Management. 8. Cloud Storage. Part 3: Taking Care of Your Cloud. 9. Managing Cloud Capacity and Performance. 10. Cloud Automation.

    1 in stock

    £183.35

  • Library Networking Current Problems and Future

    Taylor & Francis Library Networking Current Problems and Future

    15 in stock

    Book SynopsisIn this book, first published in 1983, experts in US national, state, and regional network associations provide stimulating discussions of their experiences, problems, and successes. This volume is based on the symposium, âNetworking: Where From Here?â.Table of Contents1. The Honourable Jim Edgar 2. Barbara Markuson 3. Frank P. Grisham 4. Laima Mockus 5. Richard McCoy 6. Rowland Brown 7. Toni Carbo Bearman 8. Panel Discussion

    15 in stock

    £87.39

  • Fieldbus and Networking in Process Automation

    CRC Press Fieldbus and Networking in Process Automation

    1 in stock

    Book SynopsisOver the last two decades, fieldbus has totally revolutionized the way communication takes place in the fields of process control, automation, and manufacturing industries. Recent introduction of real-time fieldbuses has opened up its application in multi-axis motor control and other time-critical applications. Fieldbus is designed to ensure easy interoperability, smarter network designs, increased data availability, and lessened stress on the design aspects of safety protocols.This second edition of Fieldbus and Networking in Process Automation discusses the different facets of fieldbus technology including design, wiring, installation, and commissioning as well as safety aspects in hostile application areas. The book:â Explains basic communication principles and networkingâa must for understanding fieldbusesâ Considers the advantages and shortcomings of individual fieldbusesâ Provides a broad spectrum of different fieldbuses used in both pTable of ContentsChapter 1 Data Communication..............................................................1Chapter 2 Networking...........................................................................25Chapter 3 Network Models...................................................................35Chapter 4 Networks in Process Automation.........................................53Chapter 5 Fieldbuses.............................................................................63Chapter 6 Highway Addressable Remote Transducer (HART)................ 75Chapter 7 Foundation Fieldbus.............................................................89Chapter 8 PROFIBUS......................................................................... 119Chapter 9 Modbus and Modbus Plus.................................................. 145Chapter 10 CAN Bus............................................................................ 157Chapter 11 DeviceNet........................................................................... 163Chapter 12 AS-i.................................................................................... 169Chapter 13 Seriplex............................................................................... 175Chapter 14 Interbus-S........................................................................... 179Chapter 15 ControlNet.......................................................................... 189Chapter 16 Common Industrial Protocol.............................................. 201Chapter 17 Ethernet and Ethernet/IP.................................................... 213Chapter 18 EtherCAT...........................................................................225Chapter 19 Sercos III............................................................................237Chapter 20 Ethernet Powerlink............................................................. 251Chapter 21 Profinet IRT........................................................................257Chapter 22 Intrinsically Safe Fieldbus Systems....................................265Chapter 23 Wiring, Installation, and Commissioning..........................277Chapter 24 Wireless Sensor Networks..................................................303Chapter 25 WirelessHART (WHART)................................................ 317Chapter 26 ISA100.11a..........................................................................343

    1 in stock

    £43.69

  • Introduction to Industrial Internet of Things and

    CRC Press Introduction to Industrial Internet of Things and

    2 in stock

    Book SynopsisIndustrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead authorâs massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT.The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.Table of ContentsPart 1. Prerequisites. Chapter 1. Overview of Internet of Things. Part 2. Introduction. Chapter 2. Introduction to Industry 4.0 and Industrial Internet of Things. Chapter 3. Industry 4.0: Basics. Chapter 4. Industrial Internet of Things: Basics. Chapter 5. Business Models and Reference Architecture of IIoT. Part 3. Technological Aspects of Industry 4.0 and IIoT. Chapter 6. Key Technologies-Part 1. Chapter 7. Key Technologies-Part 2. Part 4. Enabling Technologies of IIoT. Chapter 8. Connectivity. Chapter 9. Communication. Chapter 10. Interoperability. Part 5. IIoT Analytics. Chapter 11. Introduction to Analytics. Chapter 12. Machine Learning and Data Science. Part 6. Applications and Case Studies. Chapter 13. Healthcare. Chapter 14. Inventory Management & Quality Control. Chapter 15. Plant Safety and Security. Chapter 16. Case Studies.

    2 in stock

    £71.24

  • Internet Measurement

    John Wiley & Sons Inc Internet Measurement

    15 in stock

    Book SynopsisThis book provides all the ingredients necessary for a full understanding of the increasingly important discipline of Internet Measurement ranging from its role in the different layers of architecture to the various applications where it plays a critical role. This book and its subject help to build foundational knowledge for other areas of internet and computing courses particularly in regard to internet security, whose subject matter depend upon information derived from this source. Students studying courses that look at web applications or P2P file-sharingapplications will find this book provides crucial information for their subject areas. The experience of the authors, who are at the heart of the Internet Measurement community, and the emerging importance of the discipline make this the authoratitive and defining book of the field.Trade Review"The book will be a valuable resource for students and researchers starting to work on internet measurements." (IEEE Network Magazine, May/June 2007)Table of ContentsAcknowledgments xxi I Background 1 1 Introduction 3 1.1 Why Measure the Internet? 5 1.2 How to Read this Book 6 1.3 Resources for More Information 10 2 Internet Architecture 13 2.1 The Internet’s Architecture 13 2.1.1 The History of the Internet 14 2.1.2 The Organization of the Internet 17 2.1.3 Design Principles of the Internet 22 2.2 Details of Internet Operation 25 2.2.1 Endsystems, Links, and Routers 25 2.2.2 Autonomous Systems 26 2.2.3 Routing 26 2.3 Protocols 31 2.3.1 IP 32 2.3.2 TCP 33 2.3.3 UDP 34 2.3.4 Routing Protocols 35 2.3.5 ICMP 35 2.3.6 SNMP 36 2.3.7 IP Multicast 37 2.3.8 DNS 37 2.3.9 HTTP 39 2.3.10 P2P 40 2.4 Applications 42 3 Analytic Background 45 3.1 Linear Algebra 45 3.2 Probability 48 3.2.1 Background 49 3.2.2 Special Issues in the Internet 55 3.3 Statistics 58 3.3.1 Background 58 3.3.2 Special Issues in the Internet 61 3.4 Graphs 64 3.4.1 Background 64 3.4.2 Special Issues in the Internet 66 3.5 Metrics 70 3.6 Measurement and Modeling 73 3.6.1 Models in General 73 3.6.2 The Use of Probability Models 76 4 Practical Issues in Internet Measurement 79 4.1 Where can Measurements be Made? 80 4.1.1 Local Area Network 82 4.1.2 Inside a Backbone 82 4.1.3 Entry Points into a Network 84 4.1.4 Mirror Sites/Network Exchange Points 86 4.1.5 Wide Area Network 87 4.2 Role of Time 89 4.2.1 Background 90 4.2.2 Sources of Time Information 91 4.2.3 Synchronized Time 93 4.3 Role of Internet Directories and Databases 94 4.3.1 Internet Address and Routing Registries 95 4.3.2 Domain Name System 97 4.3.3 Measurement-related Issues in Dealing with Databases 98 4.4 Measurements Across Various Protocol Layers 99 4.4.1 Issues in Capturing Data 99 4.4.2 Changes to Infrastructure/Instrumentation 102 4.4.3 Local vs Remote vs Distributed Data Gathering 103 4.4.4 Measurement on Overlays 104 II In Depth 105 5 Infrastructure 107 5.1 Properties 107 5.1.1 Physical Device Properties 107 5.1.2 Topology Properties 111 5.1.3 Interaction of Traffic and Network 112 5.2 Challenges 115 5.2.1 Core Simplicity 115 5.2.2 Hidden Layers 116 5.2.3 Hidden Pieces 116 5.2.4 Administrative Barriers 117 5.3 Tools 117 5.3.1 Active Measurement 118 5.3.2 Passive Measurement 124 5.3.3 Fused Measurements 127 5.3.4 Bandwidth Measurement 127 5.3.5 Latency Measurement and Estimation 136 5.3.6 Geolocation 142 5.3.7 Inference 147 5.3.8 Other Tools 152 5.4 State of the Art 152 5.4.1 Equipment Properties 153 5.4.2 Topology Properties 154 5.4.3 Interaction of Traffic and Network 165 6 Traffic 171 6.1 Properties 172 6.1.1 The Basics: Packets and Bytes 172 6.1.2 Higher-level Structure 173 6.1.3 Flows 175 6.1.4 Semantically Distinct Traffic Types 176 6.2 Challenges 176 6.2.1 Practical Issues 177 6.2.2 Statistical Difficulties 179 6.3 Tools 188 6.3.1 Packet Capture 188 6.3.2 Data Management 191 6.3.3 Data Reduction 192 6.3.4 Inference 212 6.4 State of the Art 215 6.4.1 Packets and Bytes 216 6.4.2 Higher-level Structure 234 6.4.3 Flows 236 6.4.4 Control Traffic 238 6.4.5 Wireless 239 7 Applications 241 7.1 Application Mix 242 7.2 DNS 244 7.2.1 DNS Measurement Properties 245 7.2.2 DNS Measurement Challenges 248 7.2.3 DNS Measurement Tools 251 7.2.4 Use of DNS in Other Applications 256 7.2.5 State of the Art 258 7.3 Web 269 7.3.1 Web Measurement Properties 270 7.3.2 Web Measurement Challenges 273 7.3.3 Web Measurement Tools 278 7.3.4 State of the Art 286 7.4 P2P 309 7.4.1 P2P Measurement Properties 310 7.4.2 P2P Measurement Challenges 314 7.4.3 P2P Measurement Tools 317 7.4.4 State of the Art 321 7.5 Online Games 331 7.5.1 Games and Measurement Properties 332 7.5.2 Networked Games Measurement Challenges 337 7.5.3 State of the Art 340 7.6 Other Applications 346 7.6.1 Streaming Multimedia 346 III In Perspective 353 8 Anonymization 355 8.1 Definitions 356 8.2 General Motivation for Anonymizing Data 357 8.3 Obstacles and Risks in Sharing Data 358 8.4 What Should be Anonymized: Data Categorization 360 8.5 How Data is Anonymized: Process and Techniques 365 8.5.1 Anonymization Process 365 8.5.2 Anonymization Techniques 367 8.6 Anonymization Examples at Different Layers 369 8.6.1 Configuration Data 369 8.6.2 Router-level Data 370 8.6.3 Packet-level Traces 370 8.6.4 Application-level Data 373 8.7 Attacks Against Anonymized Data 374 8.8 Anonymizing Data: Metrics for Success 376 8.9 Alternatives to Anonymization 377 9 Security 379 9.1 Role of Internet Measurement in Security 380 9.2 Intranet Measurements in Aid of Security 382 9.3 Gateway Measurements in Aid of Security 384 9.4 Inter-domain Measurements Impact on Security 386 9.5 Wide-area Measurements in Aid of Security 387 9.6 Application-level Measurements of Attacks 394 10 Case Studies 395 10.1 Low-level Monitoring Tools 395 10.2 Individual Toolsets for Network Measurement 397 10.2.1 Windmill 398 10.2.2 Click 399 10.2.3 dss 400 10.2.4 Gigascope 403 10.3 Large-scale Measurement Projects 404 10.3.1 RIPE 405 10.3.2 High-energy Physics 407 10.3.3 CAIDA 410 10.3.4 PlanetLab 414 11 Conclusions and Prospects 419 11.1 Trends in Internet Measurement 419 11.2 Difficulties 424 11.3 Future Work 426 11.3.1 Research Challenges 426 11.3.2 Emerging Questions 428 Bibliography 431 Index 473

    15 in stock

    £53.19

  • Web Engineering The Discipline of Systematic

    John Wiley & Sons Inc Web Engineering The Discipline of Systematic

    15 in stock

    Book SynopsisThe World Wide Web has a massive and permanent influence on our lives. Economy, industry, education, healthcare, public administration, entertainment - there is hardly any part of our daily lives which has not been pervaded by the Internet.Table of ContentsPreface xv Foreword xvii 1 An Introduction to Web Engineering 1Gerti Kappel, Birgit Pröll, Siegfried Reich, Werner Retschitzegger 1.1 Motivation 1 1.2 Categories of Web Applications 4 1.3 Characteristics of Web Applications 7 1.3.1 Product-related Characteristics 8 1.3.2 Usage-related Characteristics 12 1.3.3 Development-related Characteristics 14 1.3.4 Evolution 16 1.4 Objectives and Structure of the Book 17 2 Requirements Engineering for Web Applications 23Paul Grünbacher 2.1 Introduction 23 2.2 Fundamentals 24 2.2.1 Where Do Requirements Come From? 24 2.2.2 Requirements Engineering Activities 25 2.3 RE Specifics in Web Engineering 26 2.4 Principles for RE of Web Applications 30 2.5 Adapting RE Methods to Web Application Development 32 2.5.1 Requirement Types 32 2.5.2 Notations 34 2.5.3 Tools 36 2.6 Outlook 37 3 Modeling Web Applications 39Wieland Schwinger, Nora Koch 3.1 Introduction 39 3.2 Fundamentals 40 3.3 Modeling Specifics in Web Engineering 41 3.3.1 Levels 41 3.3.2 Aspects 42 3.3.3 Phases 42 3.3.4 Customization 43 3.4 Modeling Requirements 43 3.5 Content Modeling 45 3.5.1 Objectives 45 3.5.2 Concepts 45 3.6 Hypertext Modeling 46 3.6.1 Objectives 47 3.6.2 Hypertext Structure Modeling Concepts 47 3.6.3 Access Modeling Concepts 49 3.6.4 Relation to Content Modeling 50 3.7 Presentation Modeling 51 3.7.1 Objectives 51 3.7.2 Concepts 51 3.7.3 Relation to Hypertext Modeling 52 3.8 Customization Modeling 53 3.8.1 Objectives 54 3.8.2 Concepts 54 3.8.3 Relation to Content, Hypertext, and Presentation Modeling 58 3.9 Methods and Tools 58 3.9.1 Modeling Methods: An Overview 58 3.9.2 Model-Driven Development 61 3.9.3 Tool Support 61 3.10 Outlook 63 4 Web Application Architectures 65Christian Eichinger 4.1 Introduction 65 4.2 Fundamentals 66 4.2.1 What is an Architecture? 66 4.2.2 Developing Architectures 67 4.2.3 Categorizing Architectures 69 4.3 Specifics of Web Application Architectures 70 4.4 Components of a Generic Web Application Architecture 71 4.5 Layered Architectures 72 4.5.1 2-Layer Architectures 72 4.5.2 N-Layer Architectures 73 4.6 Data-aspect Architectures 79 4.6.1 Database-centric Architectures 80 4.6.2 Architectures for Web Document Management 80 4.6.3 Architectures for Multimedia Data 81 4.7 Outlook 84 5 Technology-aware Web Application Design 85Gerhard Austaller, Andreas Hartl, Markus Lauff, Fernando Lyardet, Max Mühlhaüser 5.1 Introduction 86 5.2 Web Design from an Evolutionary Perspective 89 5.2.1 Background 89 5.2.2 Information Design: An Authoring Activity 90 5.2.3 Software Design: A Programming Activity 92 5.2.4 Merging Information Design and Software Design 93 5.2.5 Problems and Restrictions in Integrated Web Design 94 5.2.6 A Proposed Structural Approach 95 5.3 Presentation Design 95 5.3.1 Presentation of Nodes and Meshes 96 5.3.2 Device-independent Development Approaches 97 5.4 Interaction Design 98 5.4.1 User Interaction 98 5.4.2 User Interface Organization 100 5.4.3 Navigation Design 101 5.4.4 Designing a Link Representation: The Anchor 101 5.4.5 Designing Link Internals: The URL 102 5.4.6 Navigation and Orientation 102 5.4.7 Structured Dialog for Complex Activities 103 5.4.8 Interplay with Technology and Architecture 104 5.5 Functional Design 105 5.5.1 Integration 105 5.5.2 Communication Paradigms and Middleware 105 5.5.3 Distributed Cross-corporate Web Applications 106 5.6 Outlook 107 5.6.1 Context-aware Applications 107 5.6.2 Device-independent Applications 108 5.6.3 Reusability 109 5.7 Summary 110 6 Technologies for Web Applications 111Martin Nussbaumer, Martin Gaedke 6.1 Introduction 111 6.2 Fundamentals 112 6.2.1 Markup 112 6.2.2 Hypertext and Hypermedia 112 6.3 Client/Server Communication on the Web 113 6.3.1 SMTP – Simple Mail Transfer Protocol. 113 6.3.2 RTSP – Real Time Streaming Protocol 113 6.3.3 HTTP – HyperText Transfer Protocol 113 6.3.4 Session Tracking 114 6.4 Client-side Technologies 116 6.4.1 Helpers and Plug-ins 116 6.4.2 Java Applets 116 6.4.3 ActiveX Controls 116 6.5 Document-specific Technologies 117 6.5.1 HTML – Hypertext Markup Language 117 6.5.2 SVG – Scalable Vector Graphics 117 6.5.3 SMIL – Synchronized Multimedia Integration Language 118 6.5.4 XML – eXtensible Markup Language 118 6.5.5 XSL – eXtensible Stylesheet Language 122 6.6 Server-side Technologies 126 6.6.1 URI Handlers 126 6.6.2 Web Services 129 6.6.3 Middleware Technologies 130 6.7 Outlook 132 7 Testing Web Applications 133Christoph Steindl, Rudolf Ramler, Josef Altmann 7.1 Introduction 133 7.2 Fundamentals 134 7.2.1 Terminology 134 7.2.2 Quality Characteristics 135 7.2.3 Test Objectives 136 7.2.4 Test Levels 136 7.2.5 Role of the Tester 137 7.3 Test Specifics in Web Engineering 138 7.4 Test Approaches 140 7.4.1 Conventional Approaches 140 7.4.2 Agile Approaches 140 7.5 Test Scheme 142 7.5.1 Three Test Dimensions 142 7.5.2 Applying the Scheme to Web Applications 143 7.5.3 Examples of Using the Test Scheme 145 7.6 Test Methods and Techniques 145 7.6.1 Link Testing 147 7.6.2 Browser Testing 147 7.6.3 Usability Testing 148 7.6.4 Load, Stress, and Continuous Testing 148 7.6.5 Testing Security 149 7.6.6 Test-driven Development 150 7.7 Test Automation 150 7.7.1 Benefits and Drawbacks of Automated Tests 150 7.7.2 Test Tools 151 7.7.3 Selecting Test Tools 152 7.8 Outlook 152 8 Operation and Maintenance of Web Applications 155Arno Ebner, Birgit Pröll, Hannes Werthner 8.1 Introduction 155 8.2 Challenges Following the Launch of a Web Application 156 8.3 Promoting a Web Application 157 8.3.1 Newsletters 158 8.3.2 Affiliate Marketing 158 8.3.3 Search Engine Marketing 159 8.3.4 Content-related Marketing 162 8.3.5 Domain Management 162 8.4 Content Management 163 8.4.1 Content Update Rate and Demand on Currency 164 8.4.2 Content Syndication 165 8.5 Usage Analysis 165 8.5.1 Usage Analysis Techniques 165 8.5.2 Statistical Indicators 167 8.5.3 User Behavior Analysis 168 8.6 Outlook 169 9 Web Project Management 171Herwig Mayr 9.1 From Software Project Management to Web Project Management 171 9.1.1 Objectives of Software Project Management 171 9.1.2 The Tasks of Software Project Management 172 9.1.3 Conflicting Areas in Projects 173 9.1.4 Specifics of Web Project Management 173 9.2 Challenges in Web Project Management 175 9.2.1 General Challenges in Software Development 175 9.2.2 Development-related Challenges in Web Projects 176 9.2.3 Product-related Challenges in Web Projects 179 9.3 Managing Web Teams 182 9.3.1 Software Development: A Human-centered Task 182 9.3.2 The Web Project Team 183 9.3.3 The Web Project Manager 184 9.4 Managing the Development Process of a Web Application 185 9.4.1 Deploying the Tools 185 9.4.2 Measuring Progress 188 9.4.3 Project Risks 190 9.4.4 Risk Management 193 9.5 Outlook 194 10 The Web Application Development Process 197Gregor Engels, Marc Lohmann, Annika Wagner 10.1 Motivation 197 10.2 Fundamentals 198 10.3 Requirements for a Web Application Development Process 201 10.3.1 Handling Short Development Cycles 201 10.3.2 Handling Changing Requirements 201 10.3.3 Releases with Fixed Deadlines and Flexible Contents 203 10.3.4 Parallel Development of Different Releases 203 10.3.5 Reuse and Integration 204 10.3.6 Adapting to Web Application’s Complexity Level 204 10.3.7 Summary 205 10.4 Analysis of the Rational Unified Process 205 10.4.1 Introduction 205 10.4.2 General Suitability for Web Application Development 208 10.4.3 Does RUP meet the Requirements of Web Applications? 209 10.5 Analysis of Extreme Programming 211 10.5.1 Introduction 211 10.5.2 Does XP meet the Requirements of Web Application Development? 214 10.6 Outlook 216 11 Usability of Web Applications 219Martin Hitz, Gerhard Leitner, Rudolf Melcher 11.1 Motivation 219 11.2 What is Usability? 220 11.3 What Characterizes the Usability of Web Applications? 222 11.4 Design Guidelines 225 11.4.1 Response Times 225 11.4.2 Interaction Efficiency 225 11.4.3 Colors 226 11.4.4 Text Layout 227 11.4.5 Page Structure 228 11.4.6 Navigation Structure 228 11.4.7 Multiculturality 230 11.4.8 Confidence-generating Measures 231 11.4.9 Other Design Criteria 232 11.5 Web Usability Engineering Methods 232 11.5.1 Requirements Analysis 234 11.5.2 Design 237 11.5.3 Implementation 238 11.5.4 Operation 238 11.6 Web Usability Engineering Trends 239 11.6.1 Usability Patterns 239 11.6.2 Mobile Usability 241 11.6.3 Accessibility 243 11.7 Outlook 245 12 Performance of Web Applications 247Gabriele Kotsis 12.1 Introduction 247 12.2 What Is Performance? 248 12.3 What Characterizes the Performance of Web Applications? 250 12.4 System Definition and Indicators 251 12.5 Characterizing the Workload 252 12.6 Analytical Techniques 254 12.6.1 Operational Analysis 254 12.6.2 Queuing Networks and Simulation Models 255 12.6.3 Measuring Approaches 257 12.7 Representing and Interpreting Results 258 12.8 Performance Optimization Methods 259 12.8.1 Acceleration Within a Web Application 260 12.8.2 Reducing Transmission Time 261 12.8.3 Server Tuning 263 12.9 Outlook 263 13 Security for Web Applications 265Martin Wimmer, Alfons Kemper, Stefan Seltzsam 13.1 Introduction 265 13.2 Aspects of Security 266 13.3 Encryption, Digital Signatures and Certificates 268 13.3.1 Symmetric Cryptography 268 13.3.2 Asymmetric Cryptography 270 13.3.3 Digital Signatures 271 13.3.4 Certificates and Public Key Infrastructure 272 13.4 Secure Client/Server-Interaction 272 13.4.1 Point-to-Point Security 272 13.4.2 End-to-End Security 274 13.4.3 User Authentication and Authorization 276 13.4.4 Electronic Payment Systems 278 13.5 Client Security Issues 279 13.5.1 Preserving Privacy 279 13.5.2 Mobile Code Security 281 13.5.3 Phishing and Web Spoofing 282 13.5.4 Desktop Security 283 13.6 Service Provider Security Issues 285 13.6.1 Cross-Site Scripting 285 13.6.2 SQL Injection 287 13.6.3 Security of CGI Programs 289 13.6.4 Service Availability 290 13.6.5 Host Security 291 13.7 Outlook 292 14 The Semantic Web – The Network of Meanings in the Network of Documents 293Wernher Behrendt, Nitin Arora 14.1 Fundamentals of the Semantic Web 293 14.1.1 The Role of Software Agents 294 14.1.2 The Role of Semantic Markup 296 14.1.3 The Role of Ontologies 297 14.2 Technological Concepts 298 14.2.1 Agents According to the FIPA Standard 298 14.2.2 Ontologies 300 14.2.3 Semantic Markup on the Web 303 14.3 Specifics of Semantic Web Applications 308 14.3.1 Semantic Markup 308 14.3.2 Agents 309 14.3.3 Ontologies 309 14.3.4 Semantic Web Services 310 14.3.5 Integration into Web Engineering 313 14.4 Tools 314 14.5 Outlook 315 Glossary 317 Author Biographies 329 Bibliography 337 Credits 357 Index 359

    15 in stock

    £48.44

  • Network Congestion Control Managing Internet

    John Wiley & Sons Inc Network Congestion Control Managing Internet

    15 in stock

    Book SynopsisAs the Internet becomes increasingly heterogeneous, the issue of congestion control becomes ever more important. In order to maintain good network performance, mechanisms must be provided to prevent the network from being congested for any significant period of time.Trade Review"…a good supplement to the companion toolbox…" (Computing Reviews.com, May 19, 2006)Table of ContentsForeword. Preface. List of Tables. List of Figures. 1. Introduction . 1.1 Who should read this book? 1.2 Contents. 1.3 Structure. 2. Congestion control principles. 2.1 What is congestion? 2.2 Congestion collapse. 2.3 Controlling congestion: design considerations. 2.4 Implicit feedback. 2.5 Source behaviour with binary feedback. 2.6 Stability. 2.7 Rate-based versus window-based control. 2.8 RTT estimation. 2.9 Traffic phase effects. 2.10 Queue management. 2.11 Scalability. 2.12 Explicit feedback. 2.13 Special environments. 2.14 Congestion control and OSI layers. 2.15 Multicast congestion control. 2.16 Incentive issues. 2.17 Fairness. 2.18 Conclusion. 3. Present technology. 3.1 Introducing TCP. 3.2 TCP window management. 3.3 TCP RTO calculation. 3.4 TCP congestion control and reliability. 3.5 Concluding remarks about TCP. 3.6 The Stream Control Transmission Protocol (SCTP). 3.7 Random Early Detection (RED). 3.8 The ATM‘Available Bit Rate’ service. 4. Experimental enhancements. 4.1 Ensuring appropriate TCP behaviour. 4.2 Maintaining congestion state. 4.3 Transparent TCP improvements. 4.4 Enhancing active queue management. 4.5 Congestion control for multimedia applications. 4.6 Better-than-TCP congestion control. 4.7 Congestion control in special environments. 5. Internet traffic management – the ISP perspective. 5.1 The nature of Internet traffic. 5.2 Traffic engineering. 5.3 Quality of Service (QoS). 5.4 Putting it all together. 6. The future of Internet congestion control. 6.1 Small deltas or big ideas? 6.2 Incentive issues. 6.3 Tailor-made congestion control. Appendix A: Teaching congestion control with tools. A.1 CAVT. A.1.1 Writing script. A.1.2 Teaching with CAVT. A.1.3 Internals. A.2 ns. A.2.1 Using ns for teaching: the problem. A.2.2 Using ns for teaching: the solution. A.2.3 NSBM. A.2.4 Example exercises. Appendix B: Related IETF work. B.1 Overview. B.2 Working groups. B.3 Finding relevant documents. Appendix C: List of abbreviations. Bibliography. Index.

    15 in stock

    £95.36

  • SelfOrganization in Sensor and Actor Networks

    John Wiley & Sons Inc SelfOrganization in Sensor and Actor Networks

    10 in stock

    Book SynopsisSelf-Organization in Sensor and Actor Networks explores self-organization mechanisms and methodologies concerning the efficient coordination between intercommunicating autonomous systems.Self-organization is often referred to as the multitude of algorithms and methods that organise the global behaviour of a system based on inter-system communication. Studies of self-organization in natural systems first took off in the 1960s. In technology, such approaches have become a hot research topic over the last 4-5 years with emphasis upon management and control in communication networks, and especially in resource-constrained sensor and actor networks. In the area of ad hoc networks new solutions have been discovered that imitate the properties of self-organization. Some algorithms for on-demand communication and coordination, including data-centric networking, are well-known examples. Key features include: Detailed treatment of self-organization, mobile sensor and actoTable of ContentsForeword. Preface. About the Author. List of Abbreviations. I Self-Organization. 1 Introduction to Self-Organization. 1.1 Understanding self-organization. 1.2 Application scenarios for self-organization. 2 System Management and Control – A Historical Overview. 2.1 System architecture. 2.2 Management and control. 2.2.1 Centralized control. 2.2.2 Distributed systems. 2.2.3 Self-organizing systems. 3 Self-Organization – Context and Capabilities. 3.1 Complex systems. 3.2 Self-organization and emergence. 3.3 Systems lacking self-organization. 3.3.1 External control. 3.3.2 Blueprints and templates. 3.4 Self-X capabilities. 3.5 Consequences of emergent properties. 3.6 Operating self-organizing systems. 3.6.1 Asimov’s Laws of Robotics. 3.6.2 Attractors. 3.7 Limitations of self-organization. 4 Natural Self-Organization. 4.1 Development of understandings. 4.2 Examples in natural sciences. 4.2.1 Biology. 4.2.2 Chemistry. 4.3 Differentiation self-organization and bio-inspired. 4.3.1 Exploring bio-inspired. 4.3.2 Bio-inspired techniques. 4.3.3 Self-organization vs. bio-inspired. 5 Self-Organization in Technical Systems. 5.1 General applicability. 5.1.1 Autonomous systems. 5.1.2 Multi-robot systems. 5.1.3 Autonomic networking. 5.1.4 Mobile Ad Hoc Networks. 5.1.5 Sensor and Actor Networks. 5.2 Operating Sensor and Actor Networks. 6 Methods and Techniques. 6.1 Basic methods. 6.1.1 Positive and negative feedback. 6.1.2 Interactions among individuals and with the environment. 6.1.3 Probabilistic techniques. 6.2 Design paradigms for self-organization. 6.2.1 Design process. 6.2.2 Discussion of the design paradigms. 6.3 Developing nature-inspired self-organizing systems. 6.4 Modeling self-organizing systems. 6.4.1 Overview to modeling techniques. 6.4.2 Differential equation models. 6.4.3 Monte Carlo simulations. 6.4.4 Choosing the right modeling technique. Appendix I Self-Organization – Further Reading. II Networking Aspects: Ad Hoc and Sensor Networks. 7 Mobile Ad Hoc and Sensor Networks. 7.1 Ad hoc networks. 7.1.1 Basic properties of ad hoc networks. 7.1.2 Mobile Ad Hoc Networks. 7.2 Wireless Sensor Networks. 7.2.1 Basic properties of sensor networks. 7.2.2 Composition of single sensor nodes. 7.2.3 Communication in sensor networks. 7.2.4 Energy aspects. 7.2.5 Coverage and deployment. 7.2.6 Comparison between MANETs and WSNs. 7.2.7 Application examples. 7.3 Challenges and research issues. 7.3.1 Required functionality and constraints. 7.3.2 Research objectives. 8 Self-Organization in Sensor Networks. 8.1 Properties and objectives. 8.2 Categorization in two dimensions. 8.2.1 Horizontal dimension. 8.2.2 Vertical dimension. 8.3 Methods and application examples. 8.3.1 Mapping with primary self-organization methods. 8.3.2 Global state. 8.3.3 Location information. 8.3.4 Neighborhood information. 8.3.5 Local state. 8.3.6 Probabilistic techniques. 9 Medium Access Control. 9.1 Contention-based protocols. 9.2 Sensor MAC. 9.2.1 Synchronized listen/sleep cycles. 9.2.2 Performance aspects. 9.2.3 Performance evaluation. 9.3 Power-Control MAC protocol. 9.4 Conclusion. 10 Ad Hoc Routing. 10.1 Overview and categorization. 10.1.1 Address-based routing vs. data-centric forwarding. 10.1.2 Classification of ad hoc routing protocols. 10.2 Principles of ad hoc routing protocols. 10.2.1 Destination Sequenced Distance Vector. 10.2.2 Dynamic Source Routing. 10.2.3 Ad Hoc on Demand Distance Vector. 10.2.4 Dynamic MANET on Demand. 10.3 Optimized route stability. 10.4 Dynamic address assignment. 10.4.1 Overview and centralized assignment. 10.4.2 Passive Duplicate Address Detection. 10.4.3 Dynamic Address Allocation. 10.5 Conclusion. 11 Data-Centric Networking. 11.1 Overview and classification. 11.1.1 Data dissemination. 11.1.2 Network-centric operation. 11.1.3 Related approaches. 11.2 Flooding, gossiping, and optimizations. 11.2.1 Flooding. 11.2.2 Pure gossiping. 11.2.3 Optimized gossiping. 11.3 Agent-based techniques. 11.4 Directed diffusion. 11.4.1 Basic algorithm. 11.4.2 Mobility support. 11.4.3 Energy efficiency. 11.5 Data aggregation. 11.5.1 Principles and objectives. 11.5.2 Aggregation topologies. 11.6 Conclusion. 12 Clustering. 12.1 Principles of clustering. 12.1.1 Requirements and classification. 12.1.2 k-means. 12.1.3 Hierarchical clustering. 12.2 Clustering for efficient routing. 12.2.1 Low-Energy Adaptive Clustering Hierarchy. 12.2.2 Hybrid Energy-Efficient Distributed Clustering Approach. 12.3 Conclusion. Appendix II Networking Aspects – Further reading. III Coordination and Control: Sensor and Actor Networks. 13 Sensor and Actor Networks. 13.1 Introduction. 13.1.1 Composition of SANETs – an example. 13.1.2 Properties and capabilities. 13.1.3 Components of SANET nodes. 13.1.4 Application examples. 13.2 Challenges and research objectives. 13.2.1 Communication and coordination. 13.2.2 Collaboration and task allocation. 13.3 Limitations. 14 Communication and Coordination. 14.1 Synchronization vs. coordination. 14.1.1 Problem statement. 14.1.2 Logical time. 14.1.3 Coordination. 14.2 Time synchronization in WSNs and SANETs. 14.2.1 Requirements and objectives. 14.2.2 Conventional approaches. 14.2.3 Algorithms for WSNs. 14.3 Distributed coordination. 14.3.1 Scalable coordination. 14.3.2 Selected algorithms. 14.3.3 Integrated sensor-actor and actor-actor coordination. 14.3.4 Problems with selfish nodes. 14.4 In-network operation and control. 14.5 Conclusion. 15 Collaboration and Task Allocation. 15.1 Introduction to MRTA. 15.1.1 Primary objectives. 15.1.2 Classification and taxonomy. 15.2 Intentional cooperation – auction-based task allocation. 15.2.1 Open Agent Architecture. 15.2.2 MURDOCH. 15.2.3 Dynamic negotiation algorithm. 15.3 Emergent cooperation. 15.3.2 Stimulation by state. 15.4 Conclusion. Appendix III Coordination and Control – Further reading. IV Self-Organization Methods in Sensor and Actor Networks. 16 Self-Organization Methods – Revisited. 16.1 Self-organization methods in SANETs. 16.2 Positive and negative feedback. 16.3 Interactions among individuals and with the environment . 16.4 Probabilistic techniques. 17 Evaluation Criteria. 17.1 Scalability. 17.2 Energy considerations. 17.2.1 Energy management. 17.2.2 Transmission power management. 17.3 Network lifetime. 17.3.1 Definition of network lifetime. 17.3.2 Scenario-based comparisons of network lifetime. V Bio-inspired Networking. 18 Bio-inspired Systems. 18.1 Introduction and overview. 18.1.1 Ideas and concepts. 18.1.2 Bio-inspired research fields. 18.2 Swarm Intelligence. 18.2.1 Principles of ant foraging. 18.2.2 Ant-based routing. 18.2.3 Ant-based task allocation. 18.3 Artificial Immune System. 18.3.1 Principles of the immune system. 18.3.2 Application examples. 18.4 Cellular signaling pathways. 18.4.1 Introduction to signaling pathways. 18.4.2 Applicability in SANETs. 18.5 Conclusion. Appendix IV Bio-inspired Networking – Further reading. Bibliography. Index.

    10 in stock

    £93.05

  • Wireless Sensor Networks

    John Wiley & Sons Inc Wireless Sensor Networks

    15 in stock

    Book SynopsisThis book presents an in-depth study on recent advances and research in Wireless Sensor Networks (WSNs). Existing WSN applications are described, followed by discussing the ongoing research efforts on some WSNs applications that show the usefulness of sensor networks. Theoretical analysis and factors influencing protocol design are highlighted.Trade Review"It is intended for advanced students but also would be useful for researchers, system and chip designers, and other professionals in related fields." (Booknews, 1 February 2011) "The book is written in an accessible, textbook style, and includes problems and solutions to assist learning." (Dark Fiber, 8 February 2011)Table of ContentsAbout the Series Editor xvii Preface xix 1 Introduction 1 1.1 Sensor Mote Platforms 2 1.2 WSN Architecture and Protocol Stack 10 References 15 2 WSN Applications 17 2.1 Military Applications 17 2.2 Environmental Applications 21 2.3 Health Applications 26 2.4 Home Applications 29 2.5 Industrial Applications 31 References 33 3 Factors Influencing WSN Design 37 3.1 Hardware Constraints 37 3.2 Fault Tolerance 39 3.3 Scalability 40 3.4 Production Costs 40 3.5 WSN Topology 40 3.6 Transmission Media 41 3.7 Power Consumption 43 References 49 4 Physical Layer 53 4.1 Physical Layer Technologies 53 4.2 Overview of RF Wireless Communication 57 4.3 Channel Coding (Error Control Coding) 59 4.4 Modulation 62 4.5 Wireless Channel Effects 66 4.6 PHY Layer Standards 72 References 75 5 Medium Access Control 77 5.1 Challenges for MAC 77 5.2 CSMA Mechanism 80 5.3 Contention-Based Medium Access 83 5.4 Reservation-Based Medium Access 103 5.5 Hybrid Medium Access 110 References 115 6 Error Control 117 6.1 Classification of Error Control Schemes 117 6.2 Error Control in WSNs 120 6.3 Cross-layer Analysis Model 123 6.4 Comparison of Error Control Schemes 131 References 137 7 Network Layer 139 7.1 Challenges for Routing 139 7.2 Data-centric and Flat-Architecture Protocols 141 7.3 Hierarchical Protocols 148 7.4 Geographical Routing Protocols 152 7.5 QoS-Based Protocols 159 References 163 8 Transport Layer 167 8.1 Challenges for Transport Layer 167 8.2 Reliable Multi-Segment Transport (RMST) Protocol 169 8.3 Pump Slowly, Fetch Quickly (PSFQ) Protocol 171 8.4 Congestion Detection and Avoidance (CODA) Protocol 175 8.5 Event-to-Sink Reliable Transport (ESRT) Protocol 177 8.6 GARUDA 180 8.7 Real-Time and Reliable Transport (RT)2 Protocol 185 References 189 9 Application Layer 191 9.1 Source Coding (Data Compression) 191 9.2 Query Processing 195 9.3 Network Management 212 References 218 10 Cross-layer Solutions 221 10.1 Interlayer Effects 222 10.2 Cross-layer Interactions 224 10.3 Cross-layer Module 229 References 240 11 Time Synchronization 243 11.1 Challenges for Time Synchronization 243 11.2 Network Time Protocol 245 11.3 Definitions 246 11.4 Timing-Sync Protocol for Sensor Networks (TPSN) 248 11.5 Reference-Broadcast Synchronization (RBS) 251 11.6 Adaptive Clock Synchronization (ACS) 253 11.7 Time Diffusion Synchronization Protocol (TDP) 254 11.8 Rate-Based Diffusion Protocol (RDP) 257 11.9 Tiny- and Mini-Sync Protocols 258 11.10 Other Protocols 260 References 262 12 Localization 265 12.1 Challenges in Localization 265 12.2 Ranging Techniques 268 12.3 Range-Based Localization Protocols 272 12.4 Range-Free Localization Protocols 280 References 284 13 Topology Management 287 13.1 Deployment 288 13.2 Power Control 289 13.3 Activity Scheduling 296 13.4 Clustering 308 References 317 14 Wireless Sensor and Actor Networks 319 14.1 Characteristics of WSANs 321 14.2 Sensor–Actor Coordination 325 14.3 Actor–Actor Coordination 337 14.4 WSAN Protocol Stack 345 References 348 15 Wireless Multimedia Sensor Networks 349 15.1 Design Challenges 350 15.2 Network Architecture 353 15.3 Multimedia Sensor Hardware 357 15.4 Physical Layer 365 15.5 MAC Layer 367 15.6 Error Control 371 15.7 Network Layer 374 15.8 Transport Layer 379 15.9 Application Layer 383 15.10 Cross-layer Design 388 15.11 Further Research Issues 392 References 394 16 Wireless Underwater Sensor Networks 399 16.1 Design Challenges 401 16.2 Underwater Sensor Network Components 402 16.3 Communication Architecture 405 16.4 Basics of Underwater Acoustic Propagation 409 16.5 Physical Layer 414 16.6 MAC Layer 416 16.7 Network Layer 426 16.8 Transport Layer 435 16.9 Application Layer 437 16.10 Cross-layer Design 437 References 440 17 Wireless Underground Sensor Networks 443 17.1 Applications 445 17.2 Design Challenges 447 17.3 Network Architecture 450 17.4 Underground Wireless Channel for EM Waves 453 17.5 Underground Wireless Channel for Magnetic Induction 463 17.6 Wireless Communication in Mines and Road/Subway Tunnels 466 17.7 Communication Architecture 474 References 480 18 Grand Challenges 483 18.1 Integration of Sensor Networks and the Internet 483 18.2 Real-Time and Multimedia Communication 484 18.3 Protocol Stack 485 18.4 Synchronization and Localization 485 18.5 WSNs in Challenging Environments 486 18.6 Practical Considerations 488 18.7 Wireless Nano-sensor Networks 488 References 489 Index 491

    15 in stock

    £79.16

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account