Computer networking and communications Books
John Wiley & Sons Inc It Disaster Recovery Planning for Dummies
Book SynopsisIf you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off.Table of ContentsForeword xix Introduction 1 About This Book 1 How This Book Is Organized 2 Part I: Getting Started with Disaster Recovery 2 Part II: Building Technology Recovery Plans 2 Part III: Managing Recovery Plans 2 Part IV: The Part of Tens 3 What This Book Is — and What It Isn’t 3 Assumptions about Disasters 3 Icons Used in This Book 4 Where to Go from Here 4 Write to Us! 5 Part I: Getting Started with Disaster Recovery 7 Chapter 1: Understanding Disaster Recovery 9 Disaster Recovery Needs and Benefits 9 The effects of disasters 10 Minor disasters occur more frequently 11 Recovery isn’t accidental 12 Recovery required by regulation 12 The benefits of disaster recovery planning 13 Beginning a Disaster Recovery Plan 13 Starting with an interim plan 14 Beginning the full DR project 15 Managing the DR Project 18 Conducting a Business Impact Analysis 18 Developing recovery procedures 22 Understanding the Entire DR Lifecycle 25 Changes should include DR reviews 26 Periodic review and testing 26 Training response teams 26 Chapter 2: Bootstrapping the DR Plan Effort 29 Starting at Square One 30 How disaster may affect your organization 30 Understanding the role of prevention 31 Understanding the role of planning 31 Resources to Begin Planning 32 Emergency Operations Planning 33 Preparing an Interim DR Plan 34 Staffing your interim DR plan team 35 Looking at an interim DR plan overview 35 Building the Interim Plan 36 Step 1 — Build the Emergency Response Team 37 Step 2 — Define the procedure for declaring a disaster 37 Step 3 — Invoke the interim DR plan 39 Step 4 — Maintain communications during a disaster 39 Step 5 — Identify basic recovery plans 41 Step 6 — Develop processing alternatives 42 Step 7 — Enact preventive measures 44 Step 8 — Document the interim DR plan 46 Step 9 — Train ERT members 48 Testing Interim DR Plans 48 Chapter 3: Developing and Using a Business Impact Analysis 51 Understanding the Purpose of a BIA 52 Scoping the Effort 53 Conducting a BIA: Taking a Common Approach 54 Gathering information through interviews 55 Using consistent forms and worksheets 56 Capturing Data for the BIA 58 Business processes 59 Information systems 60 Assets 61 Personnel 62 Suppliers 62 Statements of impact 62 Criticality assessment 63 Maximum Tolerable Downtime 64 Recovery Time Objective 64 Recovery Point Objective 65 Introducing Threat Modeling and Risk Analysis 66 Disaster scenarios 67 Identifying potential disasters in your region 68 Performing Threat Modeling and Risk Analysis 68 Identifying Critical Components 69 Processes and systems 70 Suppliers 71 Personnel 71 Determining the Maximum Tolerable Downtime 72 Calculating the Recovery Time Objective 72 Calculating the Recovery Point Objective 73 Part II: Building Technology Recovery Plans 75 Chapter 4: Mapping Business Functions to Infrastructure 77 Finding and Using Inventories 78 Using High-Level Architectures 80 Data flow and data storage diagrams 80 Infrastructure diagrams and schematics 84 Identifying Dependencies 90 Inter-system dependencies 91 External dependencies 95 Chapter 5: Planning User Recovery 97 Managing and Recovering End-User Computing 98 Workstations as Web terminals 99 Workstation access to centralized information 102 Workstations as application clients 104 Workstations as local computers 108 Workstation operating systems 113 Managing and Recovering End-User Communications 119 Voice communications 119 E-mail 121 Fax machines 125 Instant messaging 126 Chapter 6: Planning Facilities Protection and Recovery 129 Protecting Processing Facilities 129 Controlling physical access 130 Getting charged up about electric power 140 Detecting and suppressing fire 141 Chemical hazards 144 Keeping your cool 145 Staying dry: Water/flooding detection and prevention 145 Selecting Alternate Processing Sites 146 Hot, cold, and warm sites 147 Other business locations 149 Data center in a box: Mobile sites 150 Colocation facilities 150 Reciprocal facilities 151 Chapter 7: Planning System and Network Recovery 153 Managing and Recovering Server Computing 154 Determining system readiness 154 Server architecture and configuration 155 Developing the ability to build new servers 157 Distributed server computing considerations 159 Application architecture considerations 160 Server consolidation: The double-edged sword 161 Managing and Recovering Network Infrastructure 163 Implementing Standard Interfaces 166 Implementing Server Clustering 167 Understanding cluster modes 168 Geographically distributed clusters 169 Cluster and storage architecture 170 Chapter 8: Planning Data Recovery 173 Protecting and Recovering Application Data 173 Choosing How and Where to Store Data for Recovery 175 Protecting data through backups 176 Protecting data through resilient storage 179 Protecting data through replication and mirroring 180 Protecting data through electronic vaulting 182 Deciding where to keep your recovery data 182 Protecting data in transit 184 Protecting data while in DR mode 185 Protecting and Recovering Applications 185 Application version 186 Application patches and fixes 186 Application configuration 186 Application users and roles 187 Application interfaces 189 Application customizations 189 Applications dependencies with databases,operating systems, and more 190 Applications and client systems 191 Applications and networks 192 Applications and change management 193 Applications and configuration management 193 Off-Site Media and Records Storage 194 Chapter 9: Writing the Disaster Recovery Plan 197 Determining Plan Contents 198 Disaster declaration procedure 198 Emergency contact lists and trees 200 Emergency leadership and role selection 202 Damage assessment procedures 203 System recovery and restart procedures 205 Transition to normal operations 207 Recovery team 209 Structuring the Plan 210 Enterprise-level structure 210 Document-level structure 211 Managing Plan Development 212 Preserving the Plan 213 Taking the Next Steps 213 Part III: Managing Recovery Plans 215 Chapter 10: Testing the Recovery Plan 217 Testing the DR Plan 217 Why test a DR plan? 218 Developing a test strategy 219 Developing and following test procedures 220 Conducting Paper Tests 221 Conducting Walkthrough Tests 222 Walkthrough test participants 223 Walkthrough test procedure 223 Scenarios 224 Walkthrough results 225 Debriefing 225 Next steps 226 Conducting Simulation Testing 226 Conducting Parallel Testing 227 Parallel testing considerations 228 Next steps 229 Conducting Cutover Testing 230 Cutover test procedure 231 Cutover testing considerations 233 Planning Parallel and Cutover Tests 234 Clustering and replication technologies and cutover tests 235 Next steps 236 Establishing Test Frequency 236 Paper test frequency 237 Walkthrough test frequency 238 Parallel test frequency 239 Cutover test frequency 240 Chapter 11: Keeping DR Plans and Staff Current 241 Understanding the Impact of Changes on DR Plans 241 Technology changes 242 Business changes 243 Personnel changes 245 Market changes 247 External changes 248 Changes — some final words 249 Incorporating DR into Business Lifecycle Processes 250 Systems and services acquisition 250 Systems development 251 Business process engineering 252 Establishing DR Requirements and Standards 253 A Multi-Tiered DR Standard Case Study 254 Maintaining DR Documentation 256 Managing DR documents 257 Updating DR documents 258 Publishing and distributing documents 260 Training Response Teams 261 Types of training 261 Indoctrinating new trainees 262 Chapter 12: Understanding the Role of Prevention 263 Preventing Facilities-Related Disasters 264 Site selection 265 Preventing fires 270 HVAC failures 272 Power-related failures 272 Protection from civil unrest and war 273 Avoiding industrial hazards 274 Preventing secondary effects of facilities disasters 275 Preventing Technology-Related Disasters 275 Dealing with system failures 276 Minimizing hardware and software failures 276 Pros and cons of a monoculture 277 Building a resilient architecture 278 Preventing People-Related Disasters 279 Preventing Security Issues and Incidents 280 Prevention Begins at Home 283 Chapter 13: Planning for Various Disaster Scenarios 285 Planning for Natural Disasters 285 Earthquakes 285 Wildfires 287 Volcanoes 288 Floods 289 Wind and ice storms 290 Hurricanes 291 Tornadoes 292 Tsunamis 293 Landslides and avalanches 295 Pandemic 297 Planning for Man-Made Disasters 300 Utility failures 300 Civil disturbances 301 Terrorism and war 302 Security incidents 303 Part IV: The Part of Tens 305 Chapter 14: Ten Disaster Recovery Planning Tools 307 Living Disaster Recovery Planning System (LDRPS) 307 BIA Professional 308 COBRA Risk Analysis 308 BCP Generator 309 DRI Professional Practices Kit 310 Disaster Recovery Plan Template 310 SLA Toolkit 311 LBL ContingencyPro Software 312 Emergency Management Guide for Business and Industry 312 DRJ’s Toolbox 313 Chapter 15: Eleven Disaster Recovery Planning Web Sites 315 DRI International 315 Disaster Recovery Journal 316 Business Continuity Management Institute 316 Disaster Recovery World 317 Disaster Recovery Planning.org 317 The Business Continuity Institute 318 Disaster-Resource.com 319 Computerworld Disaster Recovery 319 CSO Business Continuity and Disaster Recovery 320 Federal Emergency Management Agency (FEMA) 320 Rothstein Associates Inc 321 Chapter 16: Ten Essentials for Disaster Planning Success 323 Executive Sponsorship 323 Well-Defined Scope 324 Committed Resources 325 The Right Experts 325 Time to Develop the Project Plan 326 Support from All Stakeholders 326 Testing, Testing, Testing 327 Full Lifecycle Commitment 327 Integration into Other Processes 328 Luck 329 Chapter 17: Ten Benefits of DR Planning 331 Improved Chances of Surviving “The Big One” 331 A Rung or Two Up the Maturity Ladder 332 Opportunities for Process Improvements 332 Opportunities for Technology Improvements 333 Higher Quality and Availability of Systems 334 Reducing Disruptive Events 334 Reducing Insurance Premiums 335 Finding Out Who Your Leaders Are 336 Complying with Standards and Regulations 336 Competitive Advantage 338 Index 339
£17.84
John Wiley & Sons Inc Skype For Dummies For Dummies S
Book SynopsisSee how to use Skype for secure chats and connect SkypeOut and SkypeIN.Table of ContentsForeword. Introduction. Part I: Getting Started with Skype. Chapter 1: What’s All the Hoopla about Skype? Chapter 2: Hooking Up with Skype. Chapter 3: Getting Familiar with Skype’s Interface. Part II: As You Like It: Skype Your Way. Chapter 4: Customizing Skype Options to Suit Your Style. Chapter 5: Getting Personal. Chapter 6: The Mad Chatter. Chapter 7: Skyping Eye to Eye: Skype with Video. Chapter 8: The Ins and Outs of SkypeIn and SkypeOut. Part III: Calling All Seasoned Skypers. Chapter 9: Managing Your Messages. Chapter 10: Partying On — On the Conference Line! Chapter 11: Spicing Things Up with Great Gadgets and Add-Ons. Part IV: The Professional Skyper. Chapter 12: “Skypifying” Your Business. Chapter 13: Exploring Skype Communities. Chapter 14: Skypecasting. Part V: The Part of Tens. Chapter 15: Ten Reasons Your Mom (and Other Family) Will Love Skype. Chapter 16: (Almost) Ten Ways to Promote Your Business Using Skype. Chapter 17: Ten Ways to Use Skype at School. Appendix A: Skype Multilanguage Support. Appendix B: Skype Tips and Tricks Guide. Index.
£18.39
John Wiley & Sons Inc High Performance Switches and Routers Wiley IEEE
Book SynopsisLearn to Design High Performance Switches and Routers for Today's Ever Growing Internet Traffic As Internet traffic continues to grow, and demands for quality of service become more stringent, researchers and engineers can turn to High Performance Switches and Routers for tested and proven solutions.Trade Review"Unique in its approach and scope, and written in an easy-to-follow manner, I strongly recommend it to the interested reading community." (ComputingReviews.com, December 17, 2007)Table of ContentsPreface xv Acknowledgments xvii 1 Introduction 1 1.1 Architecture of the Internet: Present and Future 2 1.1.1 The Present 2 1.1.2 The Future 4 1.2 Router Architectures 5 1.3 Commercial Core Router Examples 9 1.3.1 T640 TX-Matrix 9 1.3.2 Carrier Routing System (CRS-1) 11 1.4 Design of Core Routers 13 1.5 IP Network Management 16 1.5.1 Network Management System Functionalities 16 1.5.2 NMS Architecture 17 1.5.3 Element Management System 18 1.6 Outline of the Book 19 2 IP Address Lookup 25 2.1 Overview 25 2.2 Trie-Based Algorithms 29 2.2.1 Binary Trie 29 2.2.2 Path-Compressed Trie 31 2.2.3 Multi-Bit Trie 33 2.2.4 Level Compression Trie 35 2.2.5 Lulea Algorithm 37 2.2.6 Tree Bitmap Algorithm 42 2.2.7 Tree-Based Pipelined Search 45 2.2.8 Binary Search on Prefix Lengths 47 2.2.9 Binary Search on Prefix Range 48 2.3 Hardware-Based Schemes 51 2.3.1 DIR-24-8-BASIC Scheme 51 2.3.2 DIR-Based Scheme with Bitmap Compression (BC-16-16) 53 2.3.3 Ternary CAM for Route Lookup 57 2.3.4 Two Algorithms for Reducing TCAM Entries 58 2.3.5 Reducing TCAM Power – CoolCAMs 60 2.3.6 TCAM-Based Distributed Parallel Lookup 64 2.4 IPv6 Lookup 67 2.4.1 Characteristics of IPv6 Lookup 67 2.4.2 A Folded Method for Saving TCAM Storage 67 2.4.3 IPv6 Lookup via Variable-Stride Path and Bitmap Compression 69 2.5 Comparison 73 3 Packet Classification 77 3.1 Introduction 77 3.2 Trie-Based Classifications 81 3.2.1 Hierarchical Tries 81 3.2.2 Set-Pruning Trie 82 3.2.3 Grid of Tries 83 3.2.4 Extending Two-Dimensional Schemes 84 3.2.5 Field-Level Trie Classification (FLTC) 85 3.3 Geometric Algorithms 90 3.3.1 Background 90 3.3.2 Cross-Producting Scheme 91 3.3.3 Bitmap-Intersection 92 3.3.4 Parallel Packet Classification (P2C) 93 3.3.5 Area-Based Quadtree 95 3.3.6 Hierarchical Intelligent Cuttings 97 3.3.7 HyperCuts 98 3.4 Heuristic Algorithms 103 3.4.1 Recursive Flow Classification 103 3.4.2 Tuple Space Search 107 3.5 TCAM-Based Algorithms 108 3.5.1 Range Matching in TCAM-Based Packet Classification 108 3.5.2 Range Mapping in TCAMs 110 4 Traffic Management 114 4.1 Quality of Service 114 4.1.1 QoS Parameters 115 4.1.2 Traffic Parameters 116 4.2 Integrated Services 117 4.2.1 Integrated Service Classes 117 4.2.2 IntServ Architecture 117 4.2.3 Resource ReSerVation Protocol (RSVP) 119 4.3 Differentiated Services 121 4.3.1 Service Level Agreement 122 4.3.2 Traffic Conditioning Agreement 123 4.3.3 Differentiated Services Network Architecture 123 4.3.4 Network Boundary Traffic Classification and Conditioning 124 4.3.5 Per Hop Behavior (PHB) 126 4.3.6 Differentiated Services Field 127 4.3.7 PHB Implementation with Packet Schedulers 128 4.4 Traffic Policing and Shaping 129 4.4.1 Location of Policing and Shaping Functions 130 4.4.2 ATM’s Leaky Bucket 131 4.4.3 IP’s Token Bucket 133 4.4.4 Traffic Policing 134 4.4.5 Traffic Shaping 135 4.5 Packet Scheduling 136 4.5.1 Max-Min Scheduling 136 4.5.2 Round-Robin Service 138 4.5.3 Weighted Round-Robin Service 139 4.5.4 Deficit Round-Robin Service 140 4.5.5 Generalized Processor Sharing (GPS) 141 4.5.6 Weighted Fair Queuing (WFQ) 146 4.5.7 Virtual Clock 150 4.5.8 Self-Clocked Fair Queuing 153 4.5.9 Worst-Case Fair Weighted Fair Queuing (WF2Q) 155 4.5.10 WF2Q+ 158 4.5.11 Comparison 159 4.5.12 Priorities Sorting Using a Sequencer 160 4.6 Buffer Management 163 4.6.1 Tail Drop 163 4.6.2 Drop on Full 164 4.6.3 Random Early Detection (RED) 164 4.6.4 Differential Dropping: RIO 167 4.6.5 Fair Random Early Detection (FRED) 168 4.6.6 Stabilized Random Early Detection (SRED) 170 4.6.7 Longest Queue Drop (LQD) 172 5 Basics of Packet Switching 176 5.1 Fundamental Switching Concept 177 5.2 Switch Fabric Classification 181 5.2.1 Time-Division Switching 181 5.2.2 Space-Division Switching 183 5.3 Buffering Strategy in Switching Fabrics 187 5.3.1 Shared-Memory Queuing 188 5.3.2 Output Queuing (OQ) 188 5.3.3 Input Queuing 189 5.3.4 Virtual Output Queuing (VOQ) 189 5.3.5 Combined Input and Output Queuing 190 5.3.6 Crosspoint Queuing 191 5.4 Multiplane Switching and Multistage Switching 191 5.5 Performance of Basic Switches 195 5.5.1 Traffic Model 196 5.5.2 Input-Buffered Switches 197 5.5.3 Output-Buffered Switches 199 5.5.4 Completely Shared-Buffered Switches 201 6 Shared-memory Switches 207 6.1 Linked List Approach 208 6.2 Content Addressable Memory Approach 213 6.3 Space-Time-Space Approach 215 6.4 Scaling the Shared-Memory Switches 217 6.4.1 Washington University Gigabit Switch 217 6.4.2 Concentrator-Based Growable Switch Architecture 218 6.4.3 Parallel Shared-Memory Switches 218 6.5 Multicast Shared-Memory Switches 220 6.5.1 Shared-Memory Switch with a Multicast Logical Queue 220 6.5.2 Shared-Memory Switch with Cell Copy 220 6.5.3 Shared-Memory Switch with Address Copy 222 7 Input-buffered Switches 225 7.1 Scheduling in VOQ-Based Switches 226 7.2 Maximum Matching 229 7.2.1 Maximum Weight Matching 229 7.2.2 Approximate MWM 229 7.2.3 Maximum Size Matching 230 7.3 Maximal Matching 231 7.3.1 Parallel Iterative Matching (PIM) 232 7.3.2 Iterative Round-Robin Matching (iRRM) 233 7.3.3 Iterative Round-Robin with SLIP (iSLIP) 234 7.3.4 Firm 241 7.3.5 Dual Round-Robin Matching (DRRM) 241 7.3.6 Pipelined Maximal Matching 245 7.3.7 Exhaustive Dual Round-Robin Matching (EDRRM) 248 7.4 Randomized Matching Algorithms 249 7.4.1 Randomized Algorithm with Memory 250 7.4.2 A Derandomized Algorithm with Memory 250 7.4.3 Variant Randomize Matching Algorithms 251 7.4.4 Polling Based Matching Algorithms 254 7.4.5 Simulated Performance 258 7.5 Frame-based Matching 262 7.5.1 Reducing the Reconfiguration Frequency 263 7.5.2 Fixed Size Synchronous Frame-Based Matching 267 7.5.3 Asynchronous Variable-Size Frame-Based Matching 270 7.6 Stable Matching with Speedup 273 7.6.1 Output-Queuing Emulation with Speedup of 4 274 7.6.2 Output-Queuing Emulation with Speedup of 2 275 7.6.3 Lowest Output Occupancy Cell First (LOOFA) 278 8 Banyan-based Switches 284 8.1 Banyan Networks 284 8.2 Batcher-Sorting Network 287 8.3 Output Contention Resolution Algorithms 288 8.3.1 Three-Phase Implementation 288 8.3.2 Ring Reservation 288 8.4 The Sunshine Switch 292 8.5 Deflection Routing 294 8.5.1 Tandem Banyan Switch 294 8.5.2 Shuffle-Exchange Network with Deflection Routing 296 8.5.3 Dual Shuffle-Exchange Network with Error-Correcting Routing 297 8.6 Multicast Copy Networks 303 8.6.1 Broadcast Banyan Network 304 8.6.2 Encoding Process 308 8.6.3 Concentration 309 8.6.4 Decoding Process 310 8.6.5 Overflow and Call Splitting 310 8.6.6 Overflow and Input Fairness 311 9 Knockout-based Switches 316 9.1 Single-Stage Knockout Switch 317 9.1.1 Basic Architecture 317 9.1.2 Knockout Concentration Principle 318 9.1.3 Construction of the Concentrator 320 9.2 Channel Grouping Principle 323 9.2.1 Maximum Throughput 324 9.2.2 Generalized Knockout Principle 325 9.3 Two-Stage Multicast Output-Buffered ATM Switch (MOBAS) 327 9.3.1 Two-Stage Configuration 327 9.3.2 Multicast Grouping Network (MGN) 330 9.4 Appendix 333 10 The Abacus Switch 336 10.1 Basic Architecture 337 10.2 Multicast Contention Resolution Algorithm 340 10.3 Implementation of Input Port Controller 342 10.4 Performance 344 10.4.1 Maximum Throughput 344 10.4.2 Average Delay 347 10.4.3 Cell Loss Probability 349 10.5 ATM Routing and Concentration (ARC) Chip 351 10.6 Enhanced Abacus Switch 354 10.6.1 Memoryless Multi-Stage Concentration Network 354 10.6.2 Buffered Multi-Stage Concentration Network 357 10.6.3 Resequencing Cells 359 10.6.4 Complexity Comparison 361 10.7 Abacus Switch for Packet Switching 362 10.7.1 Packet Interleaving 362 10.7.2 Cell Interleaving 364 11 Crosspoint Buffered Switches 367 11.1 Combined Input and Crosspoint Buffered Switches 368 11.2 Combined Input and Crosspoint Buffered Switches with VOQ 370 11.2.1 CIXB with One-Cell Crosspoint Buffers (CIXB-1) 371 11.2.2 Throughput and Delay Performance 371 11.2.3 Non-Negligible Round-Trip Times in CIXB-k 376 11.3 OCF_OCF: Oldest Cell First Scheduling 376 11.4 LQF_RR: Longest Queue First and Round-Robin Scheduling in CIXB-1 378 11.5 MCBF: Most Critical Buffer First Scheduling 379 12 Clos-network Switches 382 12.1 Routing Property of Clos Network Switches 383 12.2 Looping Algorithm 387 12.3 m-Matching Algorithm 388 12.4 Euler Partition Algorithm 388 12.5 Karol’s Algorithm 389 12.6 Frame-Based Matching Algorithm for Clos Network (f-MAC) 391 12.7 Concurrent Matching Algorithm for Clos Network (c-MAC) 392 12.8 Dual-Level Matching Algorithm for Clos Network (d-MAC) 395 12.9 The ATLANTA Switch 398 12.10 Concurrent Round-Robin Dispatching (CRRD) Scheme 400 12.11 The Path Switch 404 12.11.1 Homogeneous Capacity and Route Assignment 406 12.11.2 Heterogeneous Capacity Assignment 408 13 Multi-plane Multi-stage Buffered Switch 413 13.1 TrueWay Switch Architecture 414 13.1.1 Stages of the Switch 415 13.2 Packet Scheduling 417 13.2.1 Partial Packet Interleaving (PPI) 419 13.2.2 Dynamic Packet Interleaving (DPI) 419 13.2.3 Head-of-Line (HOL) Blocking 420 13.3 Stage-To-Stage Flow Control 420 13.3.1 Back-Pressure 421 13.3.2 Credit-Based Flow Control 421 13.3.3 The DQ Scheme 422 13.4 Port-To-Port Flow Control 424 13.4.1 Static Hashing 424 13.4.2 Dynamic Hashing 425 13.4.3 Time-Stamp-Based Resequence 428 13.4.4 Window-Based Resequence 428 13.5 Performance Analysis 431 13.5.1 Random Uniform Traffic 431 13.5.2 Hot-Spot Traffic 432 13.5.3 Bursty Traffic 432 13.5.4 Hashing Schemes 432 13.5.5 Window-Based Resequencing Scheme 434 13.6 Prototype 434 14 Load-balanced Switches 438 14.1 Birkhoff–Von Neumann Switch 438 14.2 Load-Balanced Birkhoff–von Neumann Switches 441 14.2.1 Load-Balanced Birkhoff–von Neumann Switch Architecture 441 14.2.2 Performance of Load-Balanced Birkhoff–von Neumann Switches 442 14.3 Load-Balanced Birkhoff–von Neumann Switches With FIFO Service 444 14.3.1 First Come First Served (FCFS) 446 14.3.2 Earliest Deadline First (EDF) and EDF-3DQ 450 14.3.3 Full Frames First (FFF) 451 14.3.4 Full Ordered Frames First (FOFF) 455 14.3.5 Mailbox Switch 456 14.3.6 Byte-Focal Switch 459 15 Optical Packet Switches 468 15.1 Opto-Electronic Packet Switches 469 15.1.1 Hypass 469 15.1.2 Star-Track 471 15.1.3 Cisneros and Brackett 472 15.1.4 BNR (Bell-North Research) Switch 473 15.1.5 Wave-Mux Switch 474 15.2 Optoelectronic Packet Switch Case Study I 475 15.2.1 Speedup 476 15.2.2 Data Packet Flow 477 15.2.3 Optical Interconnection Network (OIN) 477 15.2.4 Ping-Pong Arbitration Unit 482 15.3 Optoelectronic Packet Switch Case Study II 490 15.3.1 Petabit Photonic Packet Switch Architecture 490 15.3.2 Photonic Switch Fabric (PSF) 495 15.4 All Optical Packet Switches 503 15.4.1 The Staggering Switch 503 15.4.2 Atmos 504 15.4.3 Duan’s Switch 505 15.4.4 3M Switch 506 15.5 Optical Packet Switch with Shared Fiber Delay Lines Single-stage Case 509 15.5.1 Optical Cell Switch Architecture 509 15.5.2 Sequential FDL Assignment (SEFA) Algorithm 512 15.5.3 Multi-Cell FDL Assignment (MUFA) Algorithm 518 15.6 All Optical Packet Switch with Shared Fiber Delay Lines – Three Stage Case 524 15.6.1 Sequential FDL Assignment for Three-Stage OCNS (SEFAC) 526 15.6.2 Multi-Cell FDL Assignment for Three-Stage OCNS (MUFAC) 526 15.6.3 FDL Distribution in Three-Stage OCNS 528 15.6.4 Performance Analysis of SEFAC and MUFAC 530 15.6.5 Complexity Analysis of SEFAC and MUFAC 532 16 High-speed Router Chip Set 538 16.1 Network Processors (NPs) 538 16.1.1 Overview 538 16.1.2 Design Issues for Network Processors 539 16.1.3 Architecture of Network Processors 542 16.1.4 Examples of Network Processors – Dedicated Approach 543 16.2 Co-Processors for Packet Classification 554 16.2.1 LA-1 Bus 554 16.2.2 TCAM-Based Classification Co-Processor 556 16.2.3 Algorithm-Based Classification Co-Processor 562 16.3 Traffic Management Chips 567 16.3.1 Overview 567 16.3.2 Agere’s TM Chip Set 567 16.3.3 IDT TM Chip Set 573 16.3.4 Summary 579 16.4 Switching Fabric Chips 579 16.4.1 Overview 579 16.4.2 Switch Fabric Chip Set from Vitesse 580 16.4.3 Switch Fabric Chip Set from AMCC 589 16.4.4 Switch Fabric Chip Set from IBM (now of AMCC) 593 16.4.5 Switch Fabric Chip Set from Agere 597 Index 606
£149.35
John Wiley & Sons Inc Asterisk For Dummies
Book SynopsisBridge data and voice with Asterisk! Create and maintain an economical Asterisk phone system from scratch Asterisk is the open-source PBX software that offers you the chance to save real money on your voice communications.Table of ContentsForeword. Introduction. Part I: Introducing . . . ASTERISK! Chapter 1: Evaluating the Possibilities with Asterisk. Chapter 2: Installing Asterisk. Chapter 3: Installing AsteriskNOW. Chapter 4: Configuring the Hardware. Part II: Using Dialplans — the Building Blocks of Asterisk. Chapter 5: Comprehending Dialplan Syntax. Chapter 6: Adding Features to Dialplans. Chapter 7: Building Dialplan Infrastructure. Chapter 8: Operating the AsteriskNOW GUI. Chapter 9: Utilizing VoIP Codecs. Part III: Maintaining Your Phone Service with Asterisk. Chapter 10: Troubleshooting VoIP Calls with Packet Captures. Chapter 11: Maintaining Your Telecom Services. Chapter 12: Addressing Call-Quality Concerns and Completion Issues. Chapter 13: Handling Dedicated Digital Troubles. Chapter 14: Managing Asterisk for Peak Capacity. Chapter 15: Providing Long-Term Health for Your Asterisk Switch. Part IV: The Part of Tens. Chapter 16: Ten Things You Should Never Do with Asterisk. Chapter 17: Ten Fun Things to Do with Your Asterisk. Chapter 18: Ten Places to Go for Help. Part V: Appendixes. Appendix A: Visualizing the Dialplan. Appendix B: VoIP Basics. Appendix C: Understanding Basic Linux. Index.
£21.59
John Wiley & Sons Inc Wiley Pathways Introduction to Database
Book SynopsisYou can get there Where do you want to go? You might already be working in the information technology field and may be looking to expand your skills. You might be setting out on a new career path. Or, you might want to learn more about exciting opportunities in database management.Table of Contents1 Introducing to Data and Data Management 1 Introduction 2 1.1 Understanding the Role of Data and Databases 2 1.1.1 A Practical Example 3 1.1.2 Understanding Data Management5 1.1.3 The Need for Data Management 5 Self-Check 7 1.2 Understanding Data Sources7 1.2.1 Picking a Starting Point 7 1.2.2 Identifying Primary Processes 8 1.2.3 Specific Data Sources 9 Self-Check 12 1.3 Potential Data Concerns 12 1.3.1 Managing Data Accuracy 13 1.3.2 Managing Data Security 13 1.3.3 Managing Data Organization 16 1.3.4 Managing Data Access 16 Self-Check 18 Summary 19 Key Terms 19 Assess Your Understanding 20 Summary Questions 20 Applying This Chapter 22 You Try It 23 2 Introducing Databases and Database Management Systems 24 Introduction 25 2.1Introduction to Key Database Concepts 25 2.1.1Database Approach to Data 25 2.1.2Understanding Basic Concepts 26 2.1.3Database Use 29 Self-Check31 2.2 Understanding Basic Database Models 31 2.2.1 The Hierarchical Database Model 32 2.2.2 The Network Database Model 33 2.2.3 The Relational Database Model 34 2.2.4 The Object-Oriented Database Model 35 2.2.5 The Object-Relational Database Model 36 Self-Check 37 2.3 Database Components 38 2.3.1 Hardware Components 40 2.3.2 Software Requirements 43 2.3.3 DBMS Components45 2.3.4 Understanding People and Procedures 50 Self-Check 53 Summary 54 Key Terms 54 Assess Your Understanding 55 Summary Questions 55 Applying This Chapter 57 You Try It 59 3 Data Modeling 60 Introduction 61 3.1 Understanding Database Design 61 3.1.1 Understanding the Design Process 61 3.1.2 Determining the Database Type 63 3.1.3 Understanding Modeling Goals 66 3.1.4 Understanding Business Rules 67 Self-Check 70 3.2 Understanding Relational Database Models 70 3.2.1 Entity-Relationship (E-R) Modeling Concepts 71 3.2.2 Introducing Basic Database Objects 75 Self-Check 79 3.3 Understanding Relationships 79 3.3.1 Binary Relationships 80 3.3.2 Unary Relationships 84 3.3.3 Ternary Relationships 86 3.3.4 Breaking Down Many-to-Many Relationships 87 Self-Check91 3.4 Comparing Data Models 91 3.4.1 Choosing a Modeling Tool 92 3.4.2 The General Hardware Company 93 3.4.3 Good Reading Bookstores 95 Self-Check 97 Summary 97 Key Terms 97 Assess Your Understanding 99 Summary Questions 99 Applying This Chapter 101 You Try It103 4 Designing a Database 104 Introduction 105 4.1Designing Relational Tables 105 4.1.1Converting a Single Entity 105 4.1.2Converting Binary Relationships 106 4.1.3Converting Unary Relationships 113 Self-Check 117 4.2 Comparing Relational Designs 117 4.2.1 Designing General Hardware 117 4.2.2 Designing Good Reading Bookstores 120 Self-Check 123 4.3 Normalizing Data 123 4.3.1 Using Normalization Techniques 123 4.3.2 Normalizing Data by the Numbers 125 4.3.3 Shortening the Process 134 4.3.4 Denormalizing Data 134 Self-Check 136 Summary 136 Key Terms 137 Assess Your Understanding 138 Summary Questions 138 Applying This Chapter 140 You Try It 142 5 Implementing a Database 146 Introduction 147 5.1 Physical Design and Implementation 147 5.1.1 Understanding Design Requirements 147 5.1.2 Business Environment Requirements 149 5.1.3 Data Characteristics 149 5.1.4 Application Characteristics 151 5.1.5 Operational Requirements 152 5.1.6 The Hardware and Software Environment 152 5.1.7 Evaluating Implementation Options 154 Self-Check 158 5.2 Adjusting Your Design to the Real World 158 5.2.1 Ensuring Data Integrity 159 5.2.2 Adjusting Factors Related to Performance 162 Self-Check 171 5.3 Implementing Database Objects 171 5.3.1 Implementing Your Final Table Design 171 5.3.2 Implementing Indexes 173 5.3.3 Implementing Views 175 Self-Check 177 Summary 177 Key Terms 177 Assess Your Understanding 178 Summary Questions 178 Applying This Chapter 180 You Try It182 6 Understanding the SQL Language 184 Introduction 185 6.1 Introducing the SQL Language 185 6.1.1 Understanding SQL Features 185 6.1.2 Using SQL 186 6.1.3 Understanding Command Basics 190 Self-Check 192 6.2 Understanding SELECT Fundamentals 192 6.2.1 Working with SELECT 192 6.2.2 Using Simple Data Retrieval 193 6.2.3 Retrieving Other Values 194 Self-Check 196 6.3 Understanding Operators and Functions 196 6.3.1 Arithmetic Operators 196 6.3.2 Comparison and Logical Operators 197 6.3.3 Standard SQL Functions 201 6.3.4 Function Variations 202 Self-Check 208 6.4 Understanding DML Commands 208 6.4.1 Using INSERT 208 6.4.2 Using UPDATE 209 6.4.3 Using DELETE 211 Self-Check213 6.5 Understanding DDL Commands 213 6.5.1 Using CREATE 214 6.5.2 Using ALTER 216 6.5.3 Using DROP 216 Self-Check 216 Summary 217 Key Terms 217 Assess Your Understanding 218 Summary Questions 218 Applying This Chapter 220 You Try It222 7 Data Access and Manipulation 223 Introduction224 7.1 Using SELECT Statement Advanced Syntax 224 7.1.1 Understanding SELECT Statement Syntax 224 7.1.2 Filtering Your Result 226 7.1.3 Managing Your Result Set 229 7.1.4 Sorting, Organizing, and Grouping Data 231 7.1.5 Understanding Operator Precedence 237 7.1.6 Combining Statement Results 239 7.1.7 Using SELECT with Other Commands 240 Self-Check 242 7.2 Using Joins and Subqueries 242 7.2.1 Understanding Joins 242 7.2.2 Using Different Join Syntaxes 244 7.2.3 Using Basic Subqueries 246 Self-Check 250 7.3 Using Batches and Scripts 250 7.3.1 Writing Batches and Scripts 251 7.3.2 Understanding Basic Programming Concepts 252 Self-Check 256 Summary 256 Key Terms 256 Assess Your Understanding 257 Summary Questions 257 Applying This Chapter 259 You Try It262 8 Improving Data Access 263 Introduction 264 8.1 Understanding Performance Roadblocks 264 8.1.1 Recognizing Potential Bottlenecks 265 8.1.2 Understanding Hardware Performance 265 8.1.3 Understanding Database Performance 270 8.1.4 Performance Monitoring 270 8.1.5 Knowing What to Use 274 Self-Check 275 8.2 Using Indexes and Views 275 8.2.1 Working with Indexes 276 8.2.2 Working with Views 280 Self-Check 283 8.3Using Programmable Objects 284 8.3.1Understanding Procedures 284 8.3.2Understanding Functions 287 Self-Check 292 Summary 292 Key Terms 292 Assess Your Understanding 294 Summary Questions 294 Applying This Chapter 296 You Try It298 9 Database Administration 300 Introduction 301 9.1 Understanding the Need for Administration 301 9.1.1 Identifying Administration Roles 302 9.1.2 Justifying the Need for Administration 302 Self-Check 306 9.2 Identifying Administration Responsibilities 307 9.2.1 Understanding Data Administration Responsibilities 308 9.2.2 Understanding Database Administration Responsibilities 313 Self-Check 318 9.3 Understanding Management Tasks 318 9.3.1 Considering “What” and “When” 319 9.3.2 Considering “When” and “How” 319 9.3.3 Ongoing Management Tasks 321 9.3.4 Considering Troubleshooting 324 Self-Check 326 Summary 326 Key Terms 326 Assess Your Understanding 327 Summary Questions 327 Applying This Chapter 329 You Try It 330 10 Transactions and Locking 332 Introduction333 10.1 Understanding Transaction Basics 333 10.1.1 Understanding Transaction Processing 333 10.1.2 Using Transaction Commands 336 10.1.3 Understanding Transaction Properties 341 10.1.4 Understanding Transaction Scope 341 10.1.5 Recognizing and Resolving Potential Problems 345 Self-Check 347 10.2 Managing Concurrency Control 347 10.2.1 The Need for Concurrency Management 348 10.2.2 Recognizing Concurrency Problems 348 10.2.3 Designing for Concurrency 352 10.2.4 Concurrency Methods 352 Self-Check 355 10.3 SQL Server Transaction Management 355 10.3.1 Understanding Transaction Processing 355 10.3.2 Managing Locks, Locking, and Transaction Isolation 356 10.3.3 Recognizing, Clearing, and Preventing Deadlocks 358 Self-Check 362 Summary 362 Key Terms 363 Assess Your Understanding 364 Summary Questions 364 Applying This Chapter 366 You Try It 367 11 Data Access and Security 368 Introduction369 11.1 Understanding Database Connections 369 11.1.1 Understanding Connectivity Concepts 369 11.1.2 Understanding Client/Server Connectivity 376 11.1.3 Understanding Multitier Connectivity 379 Self-Check 382 11.2 Managing Access Control 382 11.2.1 Controlling Server Access 383 11.2.2 Controlling Database Access 386 11.2.3 Understanding the Connection Process 387 Self-Check 392 11.3 Protecting Your Data 392 11.3.1 Implementing Data Permissions 393 11.3.2 Minimizing Table Access 397 11.3.3 Keeping Data Safe 397 11.3.4 Understanding RAID Configurations 397 11.3.5 Using Data Backups 400 11.3.6 Protecting Your Server 404 Self-Check 405 Summary 406 Key Terms 406 Assess Your Understanding 407 Summary Questions 407 Applying This Chapter 409 You Try It 411 12 Supporting Database Applications 412 Introduction 413 12.1 Supporting a Centralized Database 413 12.1.1 Understanding Local Area Networks (LANs) 413 12.1.2 Understanding Data Configurations 414 12.1.3 Understanding Server Configurations 416 12.1.4 Consolidating Data Sources 417 Self-Check 419 12.2 Supporting a Distributed Database 419 12.2.1 Understanding Distributed Data 419 12.2.2 Understanding Replicated Data 423 12.2.3 Understanding Partitioned Data 425 12.2.4 Distributed Data Support Issues 429 Self-Check 434 12.3 Understanding Internet Issues 434 12.3.1 Managing Performance Issues 435 12.3.2 Managing Availability Issues 436 12.3.3 Managing Security and Privacy Issues 438 Self-Check 441 Summary 442 Key Terms 442 Assess Your Understanding 443 Summary Questions 443 Applying This Chapter 445 You Try It 447 Glossary 448 Index 465
£80.96
John Wiley & Sons Inc Home Networking For Dummies 4th Edition For
Book SynopsisHaving a network in your home increases work efficiency and minimizes confusion. If you want to set up a network in your home but you're not quite sure where to start, then Home Networking for Dummies makes it easy for you to become your household's network administrator.Table of ContentsIntroduction 1 Part I: Network Basics 7 Chapter 1: Planning the Lay of the LAN 9 Chapter 2: Installing Network Adapters 27 Chapter 3: Installing Ethernet Cable 35 Chapter 4: Using Wires That Are Already There 53 Chapter 5: Look Ma, No Wires 69 Part II: Configuring Computers for Networking 85 Chapter 6: Putting It All Together 87 Chapter 7: Configuring Computer Sharing 113 Chapter 8: Setting Up Users 127 Part III: Communicating Across the Network 139 Chapter 9: Printing Across the Network 141 Chapter 10: Getting Around the Neighborhood 165 Chapter 11: Using Files from Other Computers 183 Part IV: Network Security and Maintenance 203 Chapter 12: Making Your Network Secure 205 Chapter 13: Disaster Planning and Recovery 235 Chapter 14: Using Windows Maintenance Tools 257 Part V: The Part of Tens 283 Chapter 15: Ten Clever Things to Do on Your Network 285 Chapter 16: Ten Fun Things to Do on Your Network 301 Chapter 17: Ten Ways to Make the Internet Safe for Children 307 Index 321
£16.99
John Wiley & Sons Inc Connections
Book SynopsisIn their fascinating analysis of the recent history of information technology, H. Peter Alesso and Craig F. Smith reveal the patterns in discovery and innovation that have brought us to the present tipping point. . . . A generation from now, every individual will have personally tailored access to the whole of knowledge . . . the sooner we all begin to think about how we got here, and where we''re going, the better. This exciting book is an essential first step. From the Foreword by James Burke Many people envision scientists as dispassionate characters who slavishly repeat experiments until eurekasomething unexpected happens. Actually, there is a great deal more to the story of scientific discovery, but seeing the big picture is not easy. Connections: Patterns of Discovery uses the primary tools of forecasting and three archetypal patterns of discoverySerendipity, Proof of Principle, and 1% Inspiration and 99% Perspirationto discern relationships of past develoTable of ContentsForeword. Introduction. Acknowledgements. Organization of this Book. Chapter 1: Connecting Information. The Google Story. Information Revolution. Defining Information. Looking Good. Google Connects Information. Patterns of Discovery. Forecast for Connecting Information. Chapter 2: Connecting Circuits. The Moore' Law Story. Edison's Electric Light. The Vacuum Tube Diode. The First Programmable Computers. ENIAC. The Transistor. How Transistors Work. The Proof of Principle for the Transistor. The Microprocessor. How Microprocessors Work. Moore's law. Patterns of Discovery. Forecast for Connecting Circuits . Chapter 3: Connecting Chips. The Personal Computer Story. Vannevar Bush. Robert Taylor. J.C.R. Licklider. Alan Kay. Butler Lampson. Charles (Chuck) Thacker. Personal Computing. The Xerox Alto. Apple Computer. IBM PC. Patterns of Discovery. Forecast for Connecting Chips. Chapter 4: Connecting Processes. The Software Story. John Von Neumann. Claude Shannon. The Evolution of Programming Languages. Sir Charles Antony Richard (Tony) Hoare. Software as an Industry. Software Productivity. Fourth Generation Languages. Proprietary versus Open Standards. Emergent Fifth Generation Languages (5GLs). Charles Simonyi. William H. Gates. Linus Torvalds. Patterns of Discovery. Forecast for Connecting Processes. Chapter 5: Connecting Machines. The Ethernet Story. Xerox PARC and Ethernet. Robert Metcalf. Patterns of Discovery. Forecast for Connecting Machines. Chapter 6: Connecting Networks. The Internet Story. Vint Cerf. Transition to the World Wide Web. Berners-Lee. Patterns of Discovery. Forecast for Connecting Machines. Chapter 7: Connecting Devices. The Ubiquitous Computing Story. Ubiquitous Computing. Mark Weiser. Jeff Hawkins. Patterns of Discovery. Forecast for Connecting Devices. Chapter 8: Connecting the Web. The Ubiquitous Web Story. Michael Dertouzos. Project Oxygen. Perfect Search. Berners-Lee and the Semantic Web. Patterns of Discovery. Forecast for Connecting the Web. Chapter 9: Connecting the Intelligence. The Ubiquitous Intelligence Story. Kurt Gödel. Alan Turing. Marvin Minsky. Ubiquitous Intelligence . The Web 'Brain'. What is Web Intelligence? Patterns of Discovery. Forecast for Connecting Intelligence. Chapter 10: Connecting Patterns. Ray Kurzweil. Evolving Complex Intelligence. The Law of Accelerating Returns. Singularities. The Software of Intelligence. Patterns. Connecting Pattern. Patterns of Discovery. Forecasts for Connecting Patterns. Epilog. Bibliography. Glossary. Index.
£62.06
John Wiley & Sons Inc Wiley Pathways Network Security Fundamentals
Book SynopsisAs networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.Table of Contents1. Computer and Network Security Principles 1.1. Identifying and Analyzing Risk 2 1.2. Installing Windows XP Professional 6 1.3. Installing Windows Server 2003 9 1.4. Using Microsoft Security Baseline Analyzer 13 1.5. Viewing Local Security Policy 18 1.6. Creating a Written Security Policy 24 2. Network and Server Security 2.1. Managing Server Roles 28 2.2. Managing Services and Ports 34 2.3. Using Network Monitor 38 2.4. Configuring Windows Firewall 42 2.5. Designing Border Security 45 3. Cryptography 3.1. Understanding Cryptography Concepts 48 3.2. Managing Driver Signing 49 3.3. Using Encrypting File System 53 3.4. Installing Certificate Services 57 3.5. Managing Certificate Authority Trusts 63 3.6. Requesting and Issuing Certificates 67 3.7. Revoking Certificates 70 4. Authentication 4.1. Comparing Credentials 75 4.2. Creating User Accounts 76 4.3. Configuring an Active Directory Domain Controller 82 4.4. Joining a Domain 89 4.5. Managing Password and Account Lockout Policies 93 4.6. Managing Authentication Protocols 101 4.7. Managing Logon Restrictions 103 5. Authorization and Access Control 5.1. Comparing Access Control Models 111 5.2. Managing Groups 112 5.3. Assigning Permissions 117 5.4. Troubleshooting Effective Permissions 125 5.5. Viewing User Right Assignments 129 6. Securing Network Transmission 6.1. Designing Network Perimeters 133 6.2. Implementing IP Address Filtering on IIS 135 6.3. Using IPsec Default Policies 139 6.4. Implementing Packet Filtering with IPsec 143 6.5. Implementing IPsec Encryption 150 7. Remote Access and Wireless Security 7.1. Understanding Remote Access Protocols and Wireless Security 156 7.2. Designing Remote Access and Wireless Access 158 7.3. Enabling Routing and Remote Access 160 7.4. Configuring a Dial-up Client 166 7.5. Configuring a VPN Client 171 7.6. Defining Remote Access Policies 176 8. Server Roles and Security 8.1. Using Default Templates 183 8.2. Creating and Applying a Baseline Template 188 8.3. Creating and Applying an Incremental Template 193 8.4. Securing DNS 197 8.5. Securing a File Server 203 8.6. Securing a Web and FTP Server 209 9. Protecting Against Malware 9.1. Identifying Malware 217 9.2. Comparing Antivirus, Anti-Spyware, and Anti-Malware Programs 218 9.3. Creating a Managed Computer 221 9.4. Securing Internet Explorer 224 9.5. Securing Outlook Express 232 10. Ongoing Security Management 10.1. Configuring Automatic Updates 237 10.2. Configuring Auditing 241 10.3. Using Event Viewer 245 10.4. Performing Remote Management with MMC 250 10.5. Using Telnet 256 10.6. Using Remote Desktop for Administration 260 11. Disaster Recovery and Fault Tolerance 11.1. Planning for the Worst 264 11.2. Responding to a Security Incident 270 11.3. Configuring Backups 272 11.4. Planning a RAID Configuration 282 11.5. Eliminating Single Points of Failure 284 12. Intrusion Detection and Forensics 12.1. Understanding Terminology 288 12.2. Comparing Intrusion Detection System Types 290 12.3. Investigating the Honeynet Project 292 12.4. Using Forensics Tools 294 12.5. Investigating an Attack 299
£38.25
Wiley Information Security Governance
Book SynopsisThis book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance.Table of ContentsINTRODUCTION. CHAPTER 1: GOVERNANCE OVERVIEW. 1.1 What Is It? 1.2 Back to Basics. 1.3 Origins of Governance. 1.4 Governance Definition. 1.5 Information Security Governance. 1.6 Six Outcomes of Effective Security Governance. 1.7 Defining Information, Data, Knowledge. 1.8 Value of Information. CHAPTER 2: WHY GOVERNANCE? 2.1 Benefits of Good Governance. 2.1.1 Aligning Security with Business Objectives. 2.1.2 Providing the structure and framework to optimize allocations of limited resources. 2.1.3 Providing assurance that critical decisions are not based on faulty information. 2.1.4 Ensuring accountability for safeguarding critical assets. 2.1.5 Increasing trust of customers and stakeholders. 2.1.6 Increasing the company’s worth. 2.1.7 Reducing liability for information inaccuracy or lack of due care in protection. 2.1.8 Increasing predictability and reducing uncertainty of business operations. 2.2 A Management Problem. CHAPTER 3: LEGAL AND REGULATORY REQUIREMENTS. 3.1 Security Governance and Regulation. CHAPTER 4: ROLES & RESPONSIBILITIES. 4.1 The Board of Directors. 4.2 Executive Management. 4.3 Security Steering Committee. 4.4 The CISCO. CHAPTER: STRATEGIC METRICS. 5.1 Governance Objectives. 5.1.1 Strategic Direction. 5.1.2 Ensuring Objectives are Achieved. 5.1.3. Risks Managed Appropriately. 5.1.4 Verifying Resources are Used Responsibly. CHAPTER 6: INFORMATION SECURITY OUTCOMES. 6.1 Defining Outcomes. 6.1.1 Strategic alignment. 6.1.2 Risk Management. 6.1.3 Business process assurance / convergence. 6.1.4 Value delivery. 6.1.5 Resource management. 6.1.6 Performance measurement. CHAPTER 7: SECURITY GOVERNANCE OBJECTIVES. 7.1 Security Architecture. 7.1.1 Managing Complexity. 7.1.2 Providing a Framework & Road Map. 7.1.3 Simplicity & Clarity through Layering & Modularisation. 7.1.4 Business Focus beyond the Technical Domain. 7.1.5 Objectives of Information Security Architectures. 7.1.6 SABSA Framework for Security Service Management. 7.1.7 SABSA Development Process. 7.1.8 SABSA Lifecycle. 7.1.9 SABSA Attributes. 7.2 COBIT. 7.3 Capability Maturity Model. 7.4 ISO/IEC 27001/ 27002. 7.4.1 ISO 27001. 7.4.2 ISO 27002. 7.5 Other Approaches. 7.5.1 National Cybersecurity Task Force. CHAPTER 8: RISK MANAGEMENT OBJECTIVES. Risk Management Responsibilities. Managing Risk Appropriately. 8.1 Determining Risk Management Objectives. 8.1.1 Recovery Time Objectives. CHAPTER 9: CURRENT STATE. 9.1 Current State of Security. 9.2 Current State of Risk Management. 9.3 Gap Analysis - Unmitigated Risk. 9.3.1 SABSA. 9.3.2 CMM. CHAPTER 10: DEVELOPING A SECURITY STRATEGY. 10.1 Failures of Strategy. 10.2 Attributes of A Good Security Strategy. 10.3 Strategy Resources. 10.3.1 Utilizing Architecture for Strategy Development. 10.3.2 Using Cobit for Strategy Development. 10.3.3 Using CMM for Strategy Development. 10.4 STRATEGY CONSTRAINTS. 10.4.1 Contextual constraints. 10.4.2 Operational constraints. CHAPTER 11: SAMPLE STRATEGY DEVELOPMENT. 11.1 The Process. CHAPTER 12: IMPLEMENTING STRATEGY. Action Plan Intermediate Goals. Action Plan Metrics. Re-engineering. Inadequate Performance. 12.1 Elements Of Strategy. 12.1.1 Policy Development. Attributes of Good Policies. Sample Policy Development. Other Policies. 12.1.2 Standards. Attributes of Good Standards. Sample Standards. Classifications. Standard Statement. CHAPTER 13: SECURITY PROGRAM DEVELOPMENT METRICS. 13.1 Information Security Program Development Metrics. 13.2 Program Development Operational Metrics. CHAPTER 14: INFORMATION SECURITY MANAGEMENT METRICS. 14.1 Management Metrics. 14.2 Security Management Decision Support Metrics. 14.4 CISO Decisions. 14.2.1 Strategic alignment. 14.2.2 Risk Management. 14.2.3 Metrics for Risk Management. 14.2.4 Assurance Process Integration. 14.2.5 Value Delivery. 14.2.6 Resource Management. 14.2.7 Performance Measurement. 14.7 Information Security Operational Metrics. 14.3.1 IT and Information Security Management. 14.3.2 Compliance Metrics. CHAPTER 15: INCIDENT MANAGEMENT AND RESPONSE METRICS. 15.1 Incident Management Decision Support Metrics. Conclusion. Appendix A. SABSA Business Attributes & Metrics. Appendix B. Cultural Worldviews. Heirarchists. Egalitarians. Individualists. Fatalists.
£77.36
Wiley Analysis of DNA Microarrays
Book SynopsisThe rapid uncontrolled growth of classification methods in DNA microarray studies has resulted in a body of information scattered throughout literature, numerous conference proceedings, and others. This book brings together many of the unsupervised and supervised classification methods now dispersed in the literature.
£83.66
John Wiley & Sons Inc Wireless Broadband Networks
Book SynopsisThis book combines theory with advanced practical applications in wireless broadband networks, presenting the reader with a standard reference that covers all aspects of the technology. It discusses the key theories underlying wireless broadband networks and shows readers how these theories are applied to real-world systems.Table of ContentsPreface xiii I Enabling Technologies for Wireless Broadband Networks 1 1 Orthogonal Frequency-Division Multiplexing and Other Block-Based Transmissions 3 1.1 Introduction 3 1.2 Wireless Communication Systems 3 1.3 Block-Based Transmissions 5 1.4 Orthogonal Frequency-Division Multiplexing Systems 9 1.5 Single-Carrier Cyclic Prefix Systems 11 1.6 Orthogonal Frequency-Division Multiple Access 12 1.7 Interleaved Frequency-Division Multiple Access 13 1.8 Single-Carrier Frequency-Division Multiple Access 16 1.9 CP-Based Code Division Multiple Access 17 1.10 Receiver Design 18 Summary 25 Appendix 26 References 27 2 Multiple-Input, Multiple-Output Antenna Systems 31 2.1 Introduction 31 2.2 MIMO System Model 32 2.3 Channel Capacity 33 2.4 Diversity 42 2.5 Diversity and Spatial Multiplexing Gain 43 2.6 SIMO Systems 44 2.7 MISO Systems 45 2.8 Space–Time Coding 45 2.9 MIMO Transceiver Design 50 2.10 SVD-Based Eigen-Beamforming 52 2.11 MIMO for Frequency-Selective Fading Channels 52 2.12 Transmitting Diversity for Frequency-Selective Fading Channels 56 2.13 Cyclic Delay Diversity 59 Summary 62 References 62 3 Ultrawideband 65 3.1 Introduction 65 3.2 Time-Hopping Ultrawideband 67 3.3 Direct Sequence Ultrawideband 84 3.4 Multiband 94 3.5 Other Types of UWB 97 Summary 107 References 110 4 Medium Access Control 115 4.1 Introduction 115 4.2 Slotted ALOHA MAC 117 4.3 Carrier-Sense Multiple Access with Collision Avoidance MAC 119 4.4 Polling MAC 126 4.5 Reservation MAC 127 4.6 Energy-Efficient MAC 132 4.7 Multichannel MAC 139 4.8 Directional-Antenna MAC 141 4.9 Multihop Saturated Throughput of IEEE 802.11 MAC 147 4.10 Multiple-Access Control 156 Summary 161 References 161 5 Mobility Resource Management 165 5.1 Introduction 165 5.2 Types of Handoffs 167 5.3 Handoff Strategies 169 5.4 Channel Assignment Schemes 170 5.5 Multiclass Channel Assignment Schemes 195 5.6 Location Management 218 5.7 Mobile IP 220 5.8 Cellular IP 221 5.9 HAWAII 222 Summary 223 References 224 6 Routing Protocols for Multihop Wireless Broadband Networks 227 6.1 Introduction 227 6.2 Multihop Wireless Broadband Networks: Mesh Networks 227 6.3 Importance of Routing Protocols 230 6.4 Routing Metrics 239 6.5 Classification of Routing Protocols 245 6.6 MANET Routing Protocols 254 Summary 262 References 262 7 Radio Resource Management for Wireless Broadband Networks 267 7.1 Introduction 267 7.2 Packet Scheduling 268 7.3 Admission Control 295 Summary 303 References 304 8 Quality of Service for Multimedia Services 307 8.1 Introduction 307 8.2 Traffic Models 309 8.3 Quality of Service in Wireless Systems 321 8.4 Outage Probability for Video Services in a Multirate DS-CDMA System 326 Summary 336 References 337 II Systems for Wireless Broadband Networks 339 9 Long-Term-Evolution Cellular Networks 341 9.1 Introduction 341 9.2 Network Architecture 343 9.3 Physical Layer 343 9.4 Medium Access Control Scheduling 354 9.5 Mobility Resource Management 361 9.6 Radio Resource Management 362 9.7 Security 363 9.8 Quality of Service 364 9.9 Applications 365 Summary 365 References 366 10 Wireless Broadband Networking with WiMAX 367 10.1 Introduction 367 10.2 WiMAX Overview 367 10.3 Competing Technologies 370 10.4 Overview of the Physical Layer 371 10.5 PMP Mode 374 10.6 Mesh Mode 378 10.7 Multihop Relay Mode 384 Summary 387 References 387 11 Wireless Local Area Networks 391 11.1 Introduction 391 11.2 Network Architectures 393 11.3 Physical Layer of IEEE 802.11n 393 11.4 Medium Access Control 404 11.5 Mobility Resource Management 422 11.6 Quality of Service 425 11.7 Applications 426 Summary 426 References 427 12 Wireless Personal Area Networks 429 12.1 Introduction 429 12.2 Network Architecture 430 12.3 Physical Layer 431 12.4 Medium Access Control 437 12.5 Mobility Resource Management 459 12.6 Routing 460 12.7 Quality of Service 460 12.8 Applications 460 Summary 461 References 461 13 Convergence of Networks 463 13.1 Introduction 463 13.2 3GPP/WLAN Interworking 464 13.3 IEEE 802.11u Interworking with External Networks 467 13.4 LAN/WLAN/WiMax/3G Interworking Based on IEEE 802.21 Media-Independent Handoff 468 13.5 Future Cellular/WiMax/WLAN/WPAN Interworking 471 13.6 Analytical Model for Cellular/WLAN Interworking 474 Summary 478 References 478 Appendix Basics of Probability, Random Variables, Random Processes, and Queueing Systems 481 A.1 Introduction 481 A.2 Probability 481 A.3 Random Variables 483 A.4 Poisson Random Process 486 A.5 Birth–Death Processes 487 A.6 Basic Queueing Systems 489 References 501 Index 503
£128.20
John Wiley & Sons Inc Mastering UNIX Shell Scripting 2e Bash Bourne and
Book SynopsisUNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting solution. Covering Bash, Bourne, and Korn shell scripting, this updated edition provides complete shell scripts plus detailed descriptions of each part. UNIX programmers and system administrators can tailor these to build tools that monitor for specific system events and situations, building solid UNIX shell scripting skills to solve real-world system administration problems.Table of ContentsAcknowledgments xxv Introduction xxvii Part One The Basics of Shell Scripting Chapter 1 Scripting Quick Start and Review 3 Chapter 2 24 Ways to Process a File Line-by-Line 67 Chapter 3 Automated Event Notification 131 Chapter 4 Progress Indicators Using a Series of Dots, a Rotating Line, or Elapsed Time 143 Part Two Scripts for Programmers, Testers, and Analysts Chapter 5 Working with Record Files 157 Chapter 6 Automated FTP Stuff 187 Chapter 7 Using rsync to Efficiently Replicate Data 219 Chapter 8 Automating Interactive Programs with Expect and Autoexpect 291 Chapter 9 Finding Large Files and Files of a Specific Type 325 Chapter 10 Process Monitoring and Enabling Pre-Processing, Startup, and Post-Processing Events 335 Chapter 11 Pseudo-Random Number and Data Generation 369 Chapter 12 Creating Pseudo-Random Passwords 401 Chapter 13 Floating-Point Math and the bc Utility 433 Chapter 14 Number Base Conversions 475 Chapter 15 hgrep: Highlighted grep Script 515 Chapter 16 Monitoring Processes and Applications 527 Part Three Scripts for Systems Administrators Chapter 17 Filesystem Monitoring 553 Chapter 18 Monitoring Paging and Swap Space 603 Chapter 19 Monitoring System Load 641 Chapter 20 Monitoring for Stale Disk Partitions (AIX-Specific) 677 Chapter 21 Turning On/Off SSA Identification Lights 697 Chapter 22 Automated Hosts Pinging with Notification of Failure 723 Chapter 23 Creating a System-Configuration Snapshot 741 Chapter 24 Compiling, Installing, Configuring, and Using sudo 777 Chapter 25 Print-Queue Hell: Keeping the Printers Printing 809 Chapter 26 Those Pesky Sarbanes-Oxley (SOX) Audits 851 Chapter 27 Using Dirvish with rsync to Create Snapshot-Type Backups 867 Chapter 28 Monitoring and Auditing User Keystrokes 935 Appendix A What’s on the Web Site 955 Index 977
£51.75
John Wiley & Sons Inc Technical Writing for Teams
Book SynopsisMS Word is the most popular word processing program in the world. Yet, because of its perceived shortcomings when working on technical documents and papers, many researchers must learn the intricacies of a completely different format, LaTek, to publish their research.Table of ContentsPREFACE. ACKNOWLEDGMENTS. CHAPTER 1. INTRODUCTION. 1.1 IN THIS CHAPTER. 1.2 OUR AUDIENCE. 1.2.1 A few horror stories. 1.2.2 Some history. 1.3 THE NEED FOR A GOOD "WRITING SYSTEM". 1.4 INTRODUCING STREAM TOOLS. 1.4.1 What is STREAM Tools? 1.4.2 Why use STREAM Tools? 1.4.3 The software of STREAM Tools. 1.4.3.1 Recommended packages. 1.4.3.2 A brief comparison of Microsoft Word vs. LaTeX: history and myths. 1.5 HOW TO USE THIS BOOK. 1.6 EXERCISES. CHAPTER 2. QUICK START GUIDE FOR STREAM TOOLS. 2.1 IN THIS CHAPTER. 2.2 A GENERAL OVERVIEW OF THE WRITING PROCESS. 2.3 INTRODUCTION TO WRITING QUALITY TOOLS: THE STREAM TOOLS EDITORIAL MARK-UP TABLE. 2.4 INTRODUCTION TO DOCUMENT DESIGN TOOLS. 2.4.1 Important fundamental concepts. 2.4.1.1 Step 1: Use template files to create your new manuscripts. 2.4.1.2 Step 2: Copy existing elements and paste them into a new location. 2.4.1.3 Step 3: Edit the element. 2.4.1.4 Step 4: Cross-referencing elements. 2.4.2 Creating Elements in a Document. 2.4.2.1 Headings. 2.4.2.2 Equations. 2.4.2.3 Figures. 2.4.2.4 Tables. 2.4.2.5 References (literature citations). 2.5 INTRODUCTION TO FILE MANAGEMENT: OPTIMIZING YOUR WORKFLOW. 2.5.1 General principles. 2.5.2 Using a wiki for file management. 2.5.3 Version control. 2.6 CONCLUSIONS. 2.7 EXERCISES. CHAPTER 3. DOCUMENT DESIGN. 3.1 IN THIS CHAPTER. 3.2 CREATING TEMPLATES. 3.2.1 Headings. 3.2.1.1 How to create and cross-reference a heading template. 3.2.1.2 How to alter a heading template. 3.2.1.3 Common formatting mistakes in headings. 3.2.1.4 Common stylistic mistakes for headings. 3.2.1.5 Tips and tricks. 3.2.2 Equations. 3.2.2.1 How to create and cross-reference an equation template. 3.2.2.2 How to alter an equation template. 3.2.2.3 Common formatting mistakes for equations. 3.2.2.4 Common stylistic mistakes for equations. 3.2.2.5 Tips and tricks. 3.2.3 Figures. 3.2.3.1 How to create and cross-reference a figure template. 3.2.3.2 How to alter a figure template. 3.2.3.3 Common formatting mistakes in figures. 3.2.3.4 Common stylistic mistakes in figures. 3.2.3.5 Tips and tricks for figures. 3.2.4 Tables. 3.2.4.1 How to create and cross-reference a table template. 3.2.4.2 How to alter a table template. 3.2.4.3 Common typesetting mistakes. 3.2.4.4 Common stylistic mistakes in tables. 3.2.4.5 Tips and tricks for tables. 3.2.5 Front matter. 3.2.5.1 Controlling page numbers. 3.2.5.2 Table of contents. 3.2.6 Back matter. 3.2.6.1 Appendices. 3.2.6.2 Indices. 3.3 USING MULTIPLE TEMPLATES. 3.3.1 Controlling styles. 3.3.2 Switching between single-column and double-column formats. 3.3.3 Master documents. 3.4 PRACTICE PROBLEMS. 3.4.1 Headings. 3.4.2 Equations. 3.4.3 Figures. 3.4.4 Tables. 3.5 ADDITIONAL RESOURCES. 3.6 EXERCISES. CHAPTER 4. USING BIBLIOGRAPHIC DATABASES. 4.1 IN THIS CHAPTER. 4.2 WHY USE A BIBLIOGRAPHIC DATABASE? 4.3 CHOICE OF SOFTWARE. 4.4 USING ENDNOTE. 4.4.1 Setting up the interface. 4.4.2 Adding references. 4.4.3 Citing references. 4.5 SHARING A DATABASE. 4.5.1 Numbering the database entries. 4.5.2 Compatibility with BiBTeX. 4.6 FORMATTING REFERENCES. 4.7 EXERCISES. CHAPTER 5. PLANNING, DRAFTING, AND EDITING DOCUMENTS. 5.1 IN THIS CHAPTER. 5.2 DEFINITION STAGE. 5.2.1 Select your team members. 5.2.2 Hold a kick-off meeting. 5.2.3 Analyze the audience. 5.2.4 Formulate the purpose. 5.2.4.1 Persuasion. 5.2.4.2 Exposition. 5.2.4.3 Instruction. 5.2.5 Select the optimum combination of STREAM Tools. 5.3 PREPARATION STAGE. 5.3.1 Evaluate historical documents. 5.3.1.1 Journal articles. 5.3.1.2 Proceedings/papers. 5.3.1.3 Theses and dissertations. 5.3.1.4 Proposals. 5.3.1.5 Reports. 5.3.2 Populate the file repository. 5.3.3 Create a comprehensive outline of the document. 5.3.3.1 Using deductive structures. 5.3.3.2 Using Microsoft Word’s Outline feature. 5.3.4 Populate all sections with "yellow text". 5.3.5 Distribute writing tasks among team members. 5.3.5.1 Choose a drafting strategy. 5.3.5.2 Synchronize writing styles. 5.4 WRITING STAGE. 5.4.1 Enter content. 5.4.1.1 Legacy content. 5.4.1.2 New content. 5.4.1.3 Control versions of shared files. 5.4.2 Request that team members submit their drafts. 5.4.3 Verify that each section is headed in the right direction. 5.4.4 Construct the whole document. 5.4.5 Revise for content and distribute additional writing tasks. 5.4.5.1 Comprehensive editing. 5.4.5.2 STREAM Tools Editorial Mark-up table (STEM Table). 5.4.5.3 Strategies for editing electronic copy using Microsoft Word--an overview of Microsoft Word’s commenting, reviewing, and proofing features. 5.4.6 Distribute additional writing tasks. 5.5 COMPLETION STAGE. 5.5.1 Copy edit the document. 5.5.2 Send out for a final review of content and clarity. 5.5.3 Proofread the document. 5.5.4 Submit the document. 5.5.5 Conduct the final process-improvement review session. 5.6 EXERCISES. 5.7 ADDITIONAL RESOURCES. CHAPTER 6. BUILDING HIGH QUALITY WRITING TEAMS. 6.1 IN THIS CHAPTER. 6.2 UNDERSTANDING THE BENEFITS AND CHALLENGES OF TEAMWORK. 6.2.1 The payoff of teamwork. 6.2.2 Some principle challenges of teamwork. 6.3 IDENTIFYING TEAM GOALS AND ASSIGNING MEMBER ROLES. 6.3.1 Define roles and procedures clearly. 6.3.1.1 Define team roles. 6.3.1.2 Define team procedures. 6.4 MANAGING TEAMWORK AT A DISTANCE. 6.4.1 Building trust in virtual teams. 6.4.2 Demonstrating sensitivity to cultural differences. 6.5 SELECTING COMMUNICATION TOOLS TO SUPPORT TEAMWORK. 6.5.1 Wikis. 6.5.1.1 Creating a wiki. 6.5.1.2 Editing. 6.5.1.3 Organizing. 6.5.1.4 Monitoring edits. 6.5.1.5 Other suggestions for wiki use. 6.5.2 SharePoint. 6.5.2.1 Lists. 6.5.2.2 Web pages. 6.5.2.3 Alerts and site management. 6.6 EXERCISES. 6.7 ADDITIONAL RESOURCES. CHAPTER 7. ASSURING QUALITY WRITING. 7.1 IN THIS CHAPTER. 7.2 CHOOSING THE BEST WORDS 278. 7.2.1 Choose strong words. 7.2.1.1 Use strong nouns and verbs. 7.2.1.2 Choose words with the right level of formality. 7.2.2 Avoid weak words. 7.2.2.1 Check for confusing or frequently misused words. 7.2.2.2 Avoid double negatives, and change negatives to affirmatives. 7.2.2.3 Avoid changing verbs to nouns. 7.2.2.4 Delete meaningless words and modifiers. 7.2.2.5 Steer clear of jargon. 7.2.2.6 Avoid sexist or discriminatory language. 7.3 WRITING STRONG SENTENCES. 7.3.1 Write economically. 7.3.2 Include a variety of sentence types. 7.4 AVOIDING WEAK SENTENCE CONSTRUCTION. 7.4.1.1 Comma splices. 7.4.1.2 Fragments. 7.4.1.3 Fused or run-on sentences. 7.4.1.4 Misplaced, dangling, or two-way modifiers. 7.4.1.5 Faulty parallelism. 7.5 PUNCTUATING FOR CLARITY. 7.5.1 End punctuation. 7.5.1.1 Periods. 7.5.1.2 Question marks. 7.5.1.3 Exclamation points. 7.5.2 Commas. 7.5.3 Semicolons. 7.5.4 Colons. 7.5.5 Apostrophes. 7.5.6 Dashes and hyphens. 7.6 FINAL CONSIDERATIONS. 7.6.1 Abbreviations and acronyms. 7.6.2 Capitalization. 7.6.3 Numbers. 7.6.4 Dates. 7.6.5 Fractions and percentages. 7.6.6 Units of measure. 7.7 A FINAL NOTE ON GRAMMAR. 7.8 ADDITIONAL RESOURCES. CHAPTER 8. CONCLUDING REMARKS. 8.1 IN THIS CHAPTER. 8.2 BUSINESS CASE. 8.3 FREQUENTLY ASKED QUESTIONS. 8.4 SUCCESS STORIES. 8.5 ADDITIONAL READING. 8.5.1 Useful books and articles. 8.5.2 Useful weblinks. 8.6 EXERCISES.
£66.45
John Wiley & Sons Inc Mastering Active Directory for Windows Server
Book SynopsisFind all the information you need to manage and maintain Active Directory in Mastering Active Directory for Windows Server(R) 2008 , an in-depth guide updated with over 300 pages of new material.Trade Review"The authors have compiled an incredibly useful list of web references...how to work effectively to get the maximum out of the new features" (IT Training, March 2009)Table of ContentsIntroduction xxv Part 1 • Active Directory Design 1 Chapter 1 • Active Directory Fundamentals 3 Chapter 2 • Domain Name System Design 17 Chapter 3 • Active Directory Domain Services Forest and Domain Design 43 Chapter 4 • Organizing the Physical and Logical Aspects of AD DS 79 Chapter 5 • Flexible Single Master Operations Design 119 Part 2 • Active Directory Object Management 127 Chapter 6 • Managing Accounts: User, Group, and Computer 129 Chapter 7 • Maintaining Organizational Units 179 Chapter 8 • Managing Group Policy 207 Chapter 9 • Managing Active Directory Security 245 Part 3 • Active Directory Service Management 265 Chapter 10 • Managing Access with Active Directory Services 267 Chapter 11 • Managing Active Directory Rights Management Services 297 Chapter 12 • Managing Active Directory Certificate Services 329 Chapter 13 • Managing the Flexible Single Master Operations Roles 365 Chapter 14 • Maintaining the Active Directory Database 387 Part 4 • Active Directory Best Practices and Troubleshooting 409 Chapter 15 • Microsoft’s Troubleshooting Methodology for Active Directory 411 Chapter 16 • Troubleshooting Problems Related to Network Infrastructure 425 Chapter 17 • Troubleshooting Problems Related to the Active Directory Database 451 Part 5 • Streamlining Management with Scripts 483 Chapter 18 • ADSI Primer 485 Chapter 19 • Active Directory Scripts 541 Chapter 20 • Monitoring Active Directory 615 Chapter 21 • Managing Active Directory with PowerShell 653 Appendix A • The Bottom Line 683 Index 709
£49.50
John Wiley & Sons Inc Data Mining with Microsoft SQL Server 2008
Book SynopsisUnderstand how to use the new features of Microsoft SQL Server 2008 for data mining by using the tools in Data Mining with Microsoft SQL Server 2008 , which will show you how to use the SQL Server Data Mining Toolset with Office 2007 to mine and analyze data.Table of Contents1. Introduction to Data Mining. 2. Applied Data Mining Using Microsoft Excel 2007. 3. DMX and SQL Server Data Mining Concepts. 4. Using SQL Server Data Mining. 5. Implementing a Data Mining Process Using Office 2007. 6. Microsoft Naïve Bayes. 7. Microsoft Decision Trees Algorithm. 8. Microsoft Time Series Algorithm. 9. Microsoft Clustering. 10. Microsoft Sequence Clustering. 11. Microsoft Association Rules. 12. Microsoft Neural Network and Logistic Regression. 13. Mining OLAP Cubes. 14. Data Mining with SQL Server Integration Services. 15. SQL Server Data Mining Architecture. 16. Programming SQL Server Data Mining. 17. Extending SQL Server Data Mining. 18. Implementing a Web Cross-Selling Application. 19. Conclusion and Additional Resources. Appendix A. Datasets. Appendix B. Supported Functions. Index.
£36.09
John Wiley & Sons Inc Active Directory For Dummies
Book SynopsisYour guide to learning Active Directory the quick and easy way Whether you''re new to Active Directory (AD) or a savvy system administrator looking to brush up on your skills,?Active Directory for Dummies will steer you in the right direction. Since its original release, Microsoft''s implementation of the lightweight directory access protocol (LDAP) for the Windows Server line of networking software has become one of the most popular directory service products in the world. If you''re involved with the design and support of Microsoft directory services and/or solutions, you''re in the right place. This comprehensive guide starts by showing you the basics of AD, so you can utilize its structures to simplify your life and secure your digital environment. From there, you''ll discover how to exert fine-grained control over groups, assets, security, permissions, and policies on a Windows network and efficiently configure, manage, and update the network. With coverage of secTable of ContentsIntroduction 1 Part I: Getting Started 5 Chapter 1: Understanding Active Directory 7 Chapter 2: Analyzing Requirements for Active Directory 23 Chapter 3: Designing an Active Directory Implementation Plan 41 Part II: Planning and Deploying with Active Directory Domain Services 53 Chapter 4: Playing the Name Game 55 Chapter 5: Creating a Logical Structure 71 Chapter 6: Getting Physical 83 Chapter 7: Ready to Deploy! 103 Part III: New Active Directory Features 127 Chapter 8: AD LDS: Active Directory on a Diet 129 Chapter 9: Federating Active Directory 141 Chapter 10: AD Certificate Services and Rights Management Services 157 Part IV: Managing Active Directory 173 Chapter 11: Managing Users, Groups, and Other Objects 175 Chapter 12: Managing Active Directory Replication 203 Chapter 13: Schema-ing! 219 Chapter 14: Managing Security with Active Directory Domain Services 233 Chapter 15: Maintaining Active Directory 253 Part V: The Part of Tens 271 Chapter 16: The Ten Most Important Active Directory Design Points 273 Chapter 17: Ten Cool Web Sites for Active Directory Info 279 Chapter 18: Ten Troubleshooting Tips for Active Directory 285 Part VI: Appendixes 291 Appendix A: Windows 2008 AD Command Line Tools 293 Appendix B: Glossary 305 Index 315
£22.09
John Wiley & Sons Inc Storage Area Networks For Dummies
Book SynopsisIf you've been charged with setting up storage area networks for your company, learning how SANs work and managing data storage problems might seem challenging. Storage Area Networks For Dummies, 2nd Edition comes to the rescue with just what you need to know. Whether you already a bit SAN savvy or you're a complete novice, here's the scoop on how SANs save money, how to implement new technologies like data de-duplication, iScsi, and Fibre Channel over Ethernet, how to develop SANs that will aid your company's disaster recovery plan, and much more. For example, you can: Understand what SANs are, whether you need one, and what you need to build one Learn to use loops, switches, and fabric, and design your SAN for peak performance Create a disaster recovery plan with the appropriate guidelines, remote site, and data copy techniques Discover how to connect or extend SANs and how compression can reduce costs CTable of ContentsIntroduction. Part I: SAN 101. Chapter 1: The Storage Area Network. Chapter 2: SAN Building Blocks. Chapter 3: What Makes a SAN Go. Chapter 4: What Makes a SAN Stop. Part II: Designing and Building a SAN. Chapter 5: Designing the SAN. Chapter 6: SANs and Disaster Recovery. Chapter 7: Putting It All Together. Part III: Using Advanced SAN Features. Chapter 8: Networking SANs. Chapter 9: SAN-Based Backup. Chapter 10: Mirror, Mirror: Point-in-Time Copies. Part IV: SAN Management and Troubleshooting. Chapter 11: Approaches to SAN Management. Chapter 12: Troubleshooting SANs. Part V: Understanding the Cool Stuff. Chapter 13: Using Data De-Duplication to Lighten the Load. Chapter 14: Continuous Data Protection. Chapter 15: Everything You Ever Wanted to Know about Virtualization. Part VI: The Par t of Tens. Chapter 16: Ten Reasons to Use a SAN. Chapter 17: Ten Reasons NOT to Use a SAN. Index.
£18.39
John Wiley & Sons Inc MySQL Administrators Bible
Book SynopsisWith special focus on the next major release of MySQL, this resource provides a solid framework for anyone new to MySQL or transitioning from another database platform, as well as experience MySQL administrators. The high-profile author duo provides essential coverage of the fundamentals of MySQL database managementincluding MySQL's unique approach to basic database features and functionsas well as coverage of SQL queries, data and index types, stores procedure and functions, triggers and views, and transactions. They also present comprehensive coverage of such topics as MySQL server tuning, managing storage engines, caching, backup and recovery, managing users, index tuning, database and performance monitoring, security, and more.Table of ContentsIntroduction xxvii Part I First Steps with MySQL Chapter 1: Introduction to MySQL 3 MySQL Mission — Speed, Reliability, and Ease of Use 3 Company background 4 Community and Enterprise server versions 5 The MySQL Community 6 How to contribute 6 Reasons to contribute 7 Summary 7 Chapter 2: Installing and Upgrading MySQL Server 9 Before Installation 9 Choosing the MySQL version 11 MySQL support 12 Downloads 12 Installation 12 MySQL Server installations on Unix 13 MySQL Server Installation on Windows 20 Installing MySQL from a Noinstall Zip Archive 24 Starting and stopping MySQL from the Windows command line 25 Starting and stopping MySQL as a Windows service 26 Initial Configuration 29 Unix configuration file 31 Windows configuration file 31 MySQL Configuration Wizard on Windows 31 Detailed Configuration 32 The Server Type screen 33 Database Usage screen 33 InnoDB Tablespace screen 34 Concurrent Connections screen 34 Networking Options and Strict Mode Options screen 34 Character Set screen 35 Service Options screen 35 Security Options screen 35 Confirmation screen 36 MySQL Post-Install Configuration on Unix 36 Initializing the system tables 36 Setting initial passwords 37 Root user password assignment 37 Anonymous users 39 Securing Your System 40 Windows PATH Variable Configuration 42 Automated startup 42 Starting and stopping mysqld on System V-based Unix 42 System V run levels 43 Upgrading mysqld 45 The MySQL changelog 45 Upgrading MySQL on Windows 46 Troubleshooting 47 Summary 48 Chapter 3: Accessing MySQL 49 Accessing mysqld with Command-Line Tools 49 Frequently used options 50 Using the command-line mysql client 52 mysqladmin — Client for administering a server 62 GUI Tools 66 SQLyog 66 phpMyAdmin 69 MySQL Query Browser 71 MySQL Administrator 74 MySQL Workbench 80 Summary 83 Part II Developing with MySQL Chapter 4: How MySQL Extends and Deviates from SQL 87 Learning MySQL Language Structure 88 Comments and portability 88 Case-sensitivity 90 Escape characters 91 Naming limitations and quoting 93 Dot notation 95 Time zones 97 Character sets and collations 98 Understanding MySQL Deviations 105 Privileges and permissions 110 Transaction management 110 Check constraints 111 Upsert statements 112 Using MySQL Extensions 114 Aliases 115 Alter Table extensions 115 Create Extensions 118 DML Extensions 119 Drop Extensions 124 The LIMIT Extension 125 SELECT Extensions 126 Select Into Outfile/Select Into Dumpfile 126 Sql_Small_Result/Sql_Big_Result 127 Union Order By 127 Select For Update 127 Select Lock In Share Mode 128 Distinctrow 128 Sql_Buffer_Result 129 High_Priority/Low_Priority 129 Server maintenance extensions 129 The Set extension and user-defined variables 131 The Show extension 135 Table definition extensions 147 Table maintenance extensions 150 Transactional statement extensions 156 Summary 158 Chapter 5: MySQL Data Types 159 Looking at MySQL Data Types 159 Character String Types 160 Length 162 Character string type attributes 164 National Character String Types 166 Binary Large Object String Types 168 Blob values 169 Binary values 169 Binary length 169 Varbinary length 170 Numeric Types 170 Numeric data sizes and ranges 172 Numeric data type attributes 177 Boolean Types 180 Datetime Types 183 Allowed input values 185 Microsecond input 186 Automatic updates 187 Conversion issues 188 Numeric functions and Datetime types 188 Other conversion issues 190 Datetime data type attributes 191 The effect of time zones 192 Interval Types 193 ENUM and SET Types 195 Enumerations 195 ENUM and SET data type attributes 198 Choosing SQL Modes 201 Invalid data 201 SQL modes 203 Using NULL Values 211 Finding an Optimal Data Type for Existing Data 212 Small data samples and Procedure Analyse() 215 Summary 217 Chapter 6: MySQL Index Types 219 Looking at Keys and Indexes 219 Using Indexes to Speed Up Lookups 221 Creating and dropping indexes 223 Index order 225 Index length 226 Index types 228 Redundant indexes 230 Creating and Dropping Key Constraints 231 Creating and dropping unique key constraints 231 Creating and dropping foreign key constraints 232 Foreign key constraints and data changes 234 Requirements for foreign key constraints 235 Using FULLTEXT Indexes 237 Summary 239 Chapter 7: Stored Routines, Triggers, and Events 241 Comparing Stored Routines, Triggers, and Events 241 Using Triggers 242 Creating a trigger 243 Dropping a trigger 244 Multiple SQL statements in triggers 245 Changing a trigger 246 Triggers on views and temporary tables 247 Trigger runtime behavior 248 Finding all triggers 252 Trigger storage and backup 252 Triggers and replication 254 Trigger limitations 254 Using Stored Routines 255 Performance implications of stored routines 256 Stored procedures vs stored functions 256 Creating a stored routine 256 Invoking a stored procedure 259 Dropping a stored routine 261 Multiple SQL statements in stored routines 261 INOUT arguments to a stored procedure 261 Local variables 262 Stored routine runtime behavior 264 Options when creating routines 265 Creating a basic stored function 268 Full Create Function syntax 269 Invoking a stored function 269 Changing a stored routine 270 Naming: stored routines 271 Stored procedure result sets 273 Stored routine errors and warnings 274 Conditions and handlers 275 Stored routine flow control 282 Recursion 284 Stored routines and replication 285 Stored function limitations 285 Stored routine backup and storage 286 Using Cursors 287 Using Events 289 Turning on the event scheduler 289 Creating an event 291 Dropping an event 292 Multiple SQL statements in events 293 Start and end times for periodic events 293 Event status 294 Finding all events 295 Changing an event 295 After the last execution of an event 296 Event logging 297 Event runtime behavior 298 Event limitations 299 Event backup and storage 300 Summary 300 Chapter 8: MySQL Views 301 Defining Views 302 View definition limitations and unexpected behavior 304 Security and privacy 305 Specify a view’s definer 306 Abstraction and simplification 307 Performance 308 Updatable views 313 Changing a View Definition 317 Replication and Views 317 Summary 318 Chapter 9: Transactions in MySQL 319 Understanding ACID Compliance 320 Atomicity 321 Consistency 321 Isolation 321 Durability 321 Using Transactional Statements 322 Begin, Begin Work, and Start Transaction 322 Commit 322 Rollback 322 Savepoints 323 Autocommit 324 Using Isolation Levels 325 Read Uncommited 329 Read Committed 331 Repeatable Read 332 Serializable 334 Multi-version concurrency control 335 Explaining Locking and Deadlocks 336 Table-level locks 338 Page-level locks 341 Row-level locks 341 Recovering MySQL Transactions 343 Summary 344 Part III Core MySQL Administration Chapter 10: MySQL Server Tuning 349 Choosing Optimal Hardware 349 Tuning the Operating System 352 Operating system architecture 352 File systems and partitions 353 Buffers 356 Kernel parameters 357 Linux 357 Other daemons 360 Tuning MySQL Server 360 Status variables 360 System variables 361 Option file 361 Dynamic variables 371 Summary 373 Chapter 11: Storage Engines 375 Understanding Storage Engines 375 Storage engines as plugins 376 Storage engine comparison 376 Using Different Storage Engines 378 MyISAM storage engine 378 InnoDB storage engine 384 Memory storage engine 394 Maria storage engine 396 Falcon storage engine 401 PBXT storage engine 410 Federated storage engine 415 NDB storage engine 417 Archive storage engine 417 Blackhole storage engine 419 CSV storage engine 420 Working with Storage Engines 421 Create Table 421 Alter Table 421 Drop Table 422 Summary 422 Chapter 12: Caching with MySQL 423 Implementing Cache Tables 424 Working with the Query Cache 427 What gets stored in the query cache? 427 Query cache memory usage and tuning 429 Query cache fragmentation 433 Utilizing memcached 434 Summary 438 Chapter 13: Backups and Recovery 439 Backing Up MySQL 439 Uses for backups 441 Backup frequency 443 What to back up 445 Backup locations 445 Backup methods 445 Online backup 460 mysqlhotcopy 462 Commercial options 464 Copying Databases to Another Machine 467 Recovering from Crashes 468 Planning for Disasters 471 Summary 472 Chapter 14: User Management 473 Learning about MySQL Users 473 Access Control Lists 474 Wildcards 475 System tables 476 Managing User Accounts 478 Grant and Revoke commands 481 Show Grants and mk-show-grants 485 Resetting the Root Password 487 Windows server 488 Unix-based server 489 Debugging User Account Problems 490 Bad password 490 Access issues 491 Client does not support authentication protocol 491 Can’t connect to local mysqld through socket ‘/path/to/mysqld.sock’ 492 I do not have the right permissions! 493 Summary 494 Chapter 15: Partitioning 495 Learning about Partitioning 495 Partitioning Tables 496 RANGE partitioning 497 LIST partitioning 502 HASH partitioning 503 KEY partitioning 504 Composite partitioning 504 Partition management commands 507 Restrictions of partitioning 510 Merge Tables 510 Creating a Merge table 511 Changing a Merge table 512 Advantages of Merge tables 513 Partitioning with MySQL Cluster 513 Programmatic Partitioning 514 Summary 514 Chapter 16: Logging and Replication 517 Log Files 517 Error log 517 Binary logs 518 Relay logs 520 General and slow query logs 520 Rotating logs 522 Other methods of rotating 523 Replication 524 Setting up semisynchronous replication 525 Statement-based, row-based, and mixed-based replication 527 Replication Configurations 529 Simple replication 529 Change Master statement 534 More complex setups 534 Additional replication configuration options 539 Correcting Data Drift 540 mk-table-checksum overview 540 mk-table-sync overview 542 Putting this together 542 Summary 543 Chapter 17: Measuring Performance 545 Benchmarking 546 mysqlslap 547 SysBench 552 Benchmarking recommendations 565 Profiling 566 Show Global Status 566 mysqltuner 568 mysqlreport 572 mk-query-profiler 580 mysqldumpslow 583 Capacity Planning 585 Summary 585 Part IV Extending Your Skills Chapter 18: Query Analysis and Index Tuning 589 Using Explain 590 Explain plan basics 590 Data access strategy 596 Explain plan indexes 606 Rows 607 Extra 608 Subqueries and Explain 611 Explain Extended 612 Explain on Non-Select Statements 614 Other Query Analysis Tools 614 Optimizing Queries 615 Factors affecting key usage 615 Optimizer hints 616 Adding an Index 616 Optimizing away Using temporary 620 Using an index by eliminating functions 623 Non-index schema changes 626 Batching expensive operations 628 Optimizing frequent operations 629 Summary 631 Chapter 19: Monitoring Your Systems 633 Deciding What to Monitor 634 Examining Open Source Monitoring 636 Nagios 636 Cacti 637 Hyperic HQ 638 OpenNMS 640 Zenoss Core 641 Munin 642 Monit 643 Examining Commercial Monitoring 644 MySQL enterprise monitor 644 MONyog 645 Summary 646 Chapter 20: Securing MySQL 649 Access Control Lists 649 Wildcards and blank values 650 Privilege and privilege levels 651 Accessing the Operating System 654 Database access 654 Changing MySQL connectivity defaults 654 Operating system login 654 Securing Backups and Logs 656 Data Security 656 Data flow 657 Encrypted connectivity 659 Data security using MySQL objects 664 Creating Security Policies 665 Summary 666 Chapter 21: The MySQL Data Dictionary 667 Object Catalog 668 Schemata 668 Tables 670 Views 674 Columns 676 Statistics 679 Table_Constraints 681 Key_Column_Usage 682 Referential_Constraints 684 Triggers 685 Routines 686 Parameters 690 Events 691 Partitions 693 System Information 695 Character_Sets 695 Collations 696 Collation_Character_Set_Applicability 696 Engines 697 Plugins 697 Processlist 698 Profiling 709 Global_Variables 710 Session_Variables 710 Global_Status 711 Session_Status 711 Displaying Permissions 711 Column_Privileges 712 Table_Privileges 713 Schema_Privileges 714 User_Privileges 715 Storage Engine-Specific Metadata 716 Custom Metadata 716 Defining the plugin 716 Compiling the plugin 722 Installing the plugin 724 Summary 725 Chapter 22: Scaling and High Availability Architectures 727 Replication 728 One read slave 729 Promoting a new master 729 Many read slaves 734 Master/master replication 735 Circular replication 736 SAN 737 DRBD 738 MySQL and DRBD setup 738 MySQL Proxy 739 Scaling read queries 740 Automated failover 740 Read/write splitting 742 Sharding 742 Linux-HA Heartbeat 742 MySQL Cluster 744 Connection Pooling 746 memcached 747 Summary 748 Appendix A: MySQL Proxy 749 Appendix B: Functions and Operators 783 Appendix C: Resources 813 Index 821
£45.12
John Wiley & Sons Inc Risk Centric Threat Modeling
Book SynopsisThis book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the fTable of ContentsForeword ix Preface xv List of Figures xvii List of Tables xxiii 1 Threat Modeling Overview 1 Definitions 1 Origins and Use 3 Summary 8 Rationale and Evolution of Security Analysis 9 Summary 19 Building A Better Risk Model 19 Summary 31 Threat Anatomy 33 Summary 48 Crowdsourcing Risk Analytics 48 2 Objectives and Benefits of Threat Modeling 63 Defining a Risk Mitigation Strategy 63 Improving Application Security 82 Building Security in the Software Development Life Cycle 92 Identifying Application Vulnerabilities and Design Flaws 104 Analyzing Application Security Risks 118 3 Existing Threat Modeling Approaches 137 Security Software Risk-Based Variants 137 4 Threat Modeling Within the SDLC 195 Building Security in SDLC with Threat Modeling 195 Integrating Threat Modeling Within The Different Types of SDLCs 205 5 Threat Modeling and Risk Management 235 Data Breach Incidents and Lessons for Risk Management 235 Threats and Risk Analysis 259 Risk-Based Threat Modeling 282 Threat Modeling in Information Security and Risk Management Processes 289 Threat Modeling Within Security Incident Response Processes 306 6 Intro to PASTA 317 Risk-Centric Threat Modeling 317 7 Diving Deeper into PASTA 343 Exploring the Seven Stages and Embedded Threat Modeling Activities 343 Chapter Summary 478 8 PASTA Use Case 479 PASTA Use Case Example Walk-Through 479 Glossary 633 References 653 Index 657
£84.56
John Wiley & Sons Inc Network Security Bible
Book SynopsisThe comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.Table of ContentsIntroduction xxxv Part I: Network Security Landscape Chapter 1: State of Network Security 3 Cyber Security 3 Summary 7 Chapter 2: New Approaches to Cyber Security 9 General Trends 9 The Changing Face of Cyber Security 16 Summary 17 Chapter 3: Interfacing with the Organization 19 An Enterprise Security Methodology 19 Key Questions to Manage Risk 27 Summary 32 Part II: Security Principles and Practices Chapter 4: Information System Security Principles 35 Key Principles of Network Security 35 Formal Processes 37 Risk Management 60 Calculating and Managing Risk 70 Summary 71 Chapter 5: Information System Security Management 73 Security Policies 73 Security Awareness 77 Managing the Technical Effort 79 Configuration Management 87 Business Continuity and Disaster Recovery Planning 90 Physical Security 98 Legal and Liability Issues 105 Summary 107 Chapter 6: Access Control 109 Control Models 109 Types of Access Control Implementations 112 Identification and Authentication 115 Databases 121 Remote Access 123 Summary 125 Chapter 7: Attacks and Threats 127 Malicious Code 127 Review of Common Attacks 129 External Attack Methodologies Overview 136 Internal Threat Overview 140 Summary 142 Part III: Operating Systems and Applications Chapter 8: Windows Security 145 Windows Security at the Heart of the Defense 147 Out-of-the-Box Operating System Hardening 151 Installing Applications 171 Putting the Workstation on the Network 175 Operating Windows Safely 177 Upgrades and Patches 191 Maintain and Test the Security 194 Attacks Against the Windows Workstation 198 Summary 205 Chapter 9: UNIX and Linux Security 207 The Focus of UNIX/Linux Security 207 Physical Security 212 Controlling the Configuration 217 Operating UNIX Safely 224 Hardening UNIX 245 Summary 253 Chapter 10: Web Browser and Client Security 255 Web Browser and Client Risk 255 How a Web Browser Works 259 Web Browser Attacks 268 Operating Safely 271 Web Browser Configurations 276 Summary 286 Chapter 11: Web Security 287 What Is HTTP? 287 How Does HTTP Work? 289 Server Content 301 Client Content 303 State 309 Attacking Web Servers 315 Web Services 317 Summary 321 Chapter 12: Electronic mail (E-mail) Security 323 The E-mail Risk 323 The E-mail Protocols 340 E-mail Authentication 345 Operating Safely When Using E-mail 348 Summary 355 Chapter 13: Domain Name System 357 DNS Basics 358 Purpose of DNS 364 Setting Up DNS 375 Security Issues with DNS 377 DNS Attacks 384 Designing DNS 386 Master Slave DNS 388 Detailed DNS Architecture 388 DNS SEC 389 Summary 393 Chapter 14: Server Security 395 General Server Risks 395 Security by Design 396 Operating Servers Safely 413 Server Applications 417 Multi-Level Security and Digital Rights Management 421 Summary 427 Part IV: Network Security Fundamentals Chapter 15: Network Protocols 431 Protocols 431 The Open Systems Interconnect Model 432 The OSI Layers 433 The TCP/IP Model 439 TCP/IP Model Layers 441 Internet Protocol 442 VoIP 450 Summary 457 Chapter 16: Wireless Security 459 Electromagnetic Spectrum 459 The Cellular Phone Network 462 Placing a Cellular Telephone Call 464 Wireless Transmission Systems 469 Pervasive Wireless Data Network Technologies 473 IEEE Wireless LAN Specifications 478 IEEE 802.11 480 IEEE 802.11 Wireless Security 485 Bluetooth 503 Wireless Application Protocol 504 Future of Wireless 506 Summary 508 Chapter 17: Network Architecture Fundamentals 509 Network Segments 510 Perimeter Defense 511 Network Address Translation 511 Basic Architecture Issues 513 Subnetting, Switching, and VLANs 516 Address Resolution Protocol and Media Access Control 517 Dynamic Host Configuration Protocol and Addressing Control 518 Zero Configuration Networks 519 System Design and Architecture Against Insider Threats 525 Common Attacks 528 Summary 529 Chapter 18: Firewalls 531 Firewalls 531 Firewall Rules 537 The Use of Personal Firewalls 542 Summary 548 Chapter 19: Intrusion Detection/Prevention 549 Intrusion Detection Systems 549 Responses to Intrusion Detection 556 Emerging Technologies in Intrusion Detection Systems 556 Summary 567 Part V: Communication Chapter 20: Secret Communication 571 What is Cryptography? 572 General Terms 576 Principles of Cryptography 577 The Four Cryptographic Primitives 587 Putting These Primitives Together to Achieve CIA 602 The Difference Between Algorithm and Implementation 603 Proprietary Versus Open Source Algorithms 606 Attacks on Hash Functions 607 Quantum Cryptography 617 Summary 628 Chapter 21: Covert Communication 631 Where Hidden Data Hides 631 Where Did It Come From? 633 Where Is It Going? 633 Overview of Steganography 634 History of Steganography 639 Core Areas of Network Security and Their Relation to Steganography 641 Principles of Steganography 643 Steganography Compared to Cryptography 644 Types of Steganography 646 Products That Implement Steganography 654 Steganography Versus Digital Watermarking 673 Types of Digital Watermarking 675 Goals of Digital Watermarking 676 Digital Watermarking and Stego 676 Summary 679 Chapter 22: Applications of Secure/Covert Communication 681 E-mail 682 Authentication Servers 685 Working Model 686 Public Key Infrastructure 688 Virtual Private Networks 692 Secure Sockets Layer/Transport Layer Security 699 SSL Handshake 700 Summary 704 Part VI: The Security Threat and Response Chapter 23: Intrusion Detection and Response 707 Intrusion Detection Mechanisms 707 Honeypots 712 Incident Handling 716 Summary 727 Chapter 24: Digital Forensics 729 Computer Forensics Defined 730 Traditional Computer Forensics 730 Proactive Forensics 746 Future Research Areas 748 The Forensic Life Cycle 750 Summary 750 Chapter 25: Security Assessments, Testing, and Evaluation 751 Information Assurance Approaches and Methodologies 751 Certification and Accreditation 756 Diacap 760 Federal Information Processing Standard 102 763 OMB Circular A-130 764 The National Institute of Standards and Technology Assessment Guidelines 765 Penetration Testing 770 Auditing and Monitoring 772 Summary 774 Part VII: Integrated Cyber Security Chapter 26: Validating Your Security 777 Overview 777 Current State of Penetration Testing 780 Formal Penetration Testing Methodology 783 Steps to Exploiting a System 787 Summary 795 Chapter 27: Data Protection 797 Endpoint Security 799 Insider Threats and Data Protection 805 Summary 806 Chapter 28: Putting Everything Together 809 Critical Problems Facing Organizations 809 General Tips for Protecting a Site 815 Security Best Practices 819 Summary 834 Chapter 29: The Future 835 Approaching the Problem 835 Mission Resilience 837 Limiting Failure Points 844 Summary 847 Index 849
£38.00
John Wiley & Sons Inc eDiscovery for Dummies
Book SynopsisDiscover the process of e-discovery and put good practices in place. Electronic information involved in a lawsuit requires a completely different process for management and archiving than paper information.Table of ContentsIntroduction 1 Who Should Read This Book? 1 About This Book 2 What You’re Not to Read 2 Foolish Assumptions 2 How This Book Is Organized 3 Part I: Examining e-Discovery and ESI Essentials 3 Part II: Guidelines for e-Discovery and Professional Competence 3 Part III: Identifying, Preserving, and Collecting ESI 4 Part IV: Processing, Protecting, and Producing ESI 4 Part V: Getting Litigation Ready 4 Part VI: Strategizing for e-Discovery Success 5 Part VII: The Part of Tens 5 Glossary 5 Icons Used in This Book 5 Where to Go from Here 6 Part I: Examining e-Discovery and ESI Essentials 7 Chapter 1: Knowing Why e-Discovery Is a Burning Issue 9 Getting Thrust into the Biggest Change in the Litigation 10 New rules put electronic documents under a microscope 11 New rules and case law expand professional responsibilities 12 Distinguishing Electronic Documents from Paper Documents 14 ESI has more volume 15 ESI is more complex 15 ESI is more fragile 16 ESI is harder to delete 17 ESI is more software and hardware dependent 18 Viewing the Litigation Process from 1,000 Feet 18 Examining e-Discovery Processes 20 Creating and retaining electronic records 20 Identifying, preserving, and collecting data relevant to a legal matter 21 Processing and filtering to remove the excess 22 Reviewing and analyzing for privilege 22 Producing what’s required 23 Clawing back what sneaked out 23 Presenting at trial 24 Chapter 2: Taking a Close Look at Electronically Stored Information (ESI) 25 Spotting the ESI in the Game Plan 26 Viewing the Life of Electronic Information 27 Accounting for age 27 Tracking the rise and fall of an e-mail 29 Understanding Zubulake I 30 Taking the two-tier test 34 Preserving the Digital Landscape 36 Facing Sticker Shock: What ESI Costs 37 Estimating hard and hidden costs 39 Looking at the costs of being surprised by a request 40 Chapter 3: Building e-Discovery Best Practices into Your Company 43 Setting Up a Reasonable Defensive Strategy 44 Heeding judicial advice 45 Keeping ESI intact and in-reach 46 Braking for Litigation Holds 48 Insuring a stronghold 48 Getting others to buy-in 49 Holding on tight to your ESI 50 Putting Best Practices into Place 51 Forming Response Teams 54 Putting Project Management into Practice 55 Tackling the triple constraints 56 Managing the critical path 57 Maintaining Ethical Conduct and Credibility 57 Part II: Guidelines for e-Discovery and Professional Competence 59 Chapter 4: The Playbook: Federal Rules and Advisory Guidelines 61 Knowing the Rules You Must Play By 62 Deciphering the FRCP 63 FRCP 1 63 FRCP 16 63 FRCP 26 65 FRCP 33 and 34 66 Applying the Rules to Criminal Cases 66 F.R. Crim. P. Rule 41 71 F. R. Crim. P. Rule 16 71 F. R. Crim. P. Rule 17 and 17.1 71 Learning about Admissibility 71 Lessening the Need for Judicial Intervention by Cooperation 73 Limiting e-Discovery 74 Finding Out About Sanctions 75 Rulings on Metadata 77 Getting Guidance but Not Authority from Sedona Think Tanks 79 Collecting the Wisdom of the Chief Justices and National Law Conference 79 Minding the e-Discovery Reference Model 80 Following the Federal Rules Advisory Committee 81 Chapter 5: Judging Professional Competence and Conduct 83 Making Sure Your Attorney Gives a Diligent Effort 84 Looking at what constitutes a diligent effort 84 Searching for evidence 85 Producing ESI 86 Providing a certification 86 Avoiding Being Sanctioned 87 FRCP sanctions 87 Inherent power sanctions 89 Knowing the Risks Introduced by Legal Counsel 91 Acting bad: Attorney e-discovery misconduct 91 Relying on the American Bar Association and state rules of professional conduct 93 Learning from Those Who Gambled Their Cases and Lost 94 Policing e-Discovery in Criminal Cases 96 Part III: Identifying, Preserving, and Collecting ESI 99 Chapter 6: Identifying Potentially Relevant ESI 101 Calling an e-Discovery Team into Action 102 Clarifying the Scope of e-Discovery 104 Reducing the Burden with the Proportionality Principle 107 Proportionality of scale 107 Negotiating with proportionality 108 Mapping the Information Architecture 108 Creating a data map 108 Overlooking ESI 111 Describing data retention policies and procedures 112 Proving the reasonable accessibility of ESI sources 113 Taking Lessons from the Mythical Member 113 Chapter 7: Complying with ESI Preservation and a Litigation Hold 115 Distinguishing Duty to Preserve from Preservation 116 Following The Sedona Conference 116 The Sedona Conference WG1 guidelines 117 Seeing the rules in the WG1 decision tree 119 Recognizing a Litigation Hold Order and Obligation 119 Knowing what triggers a litigation hold 120 Knowing when to issue a litigation hold 120 Knowing when a hold delay makes you eligible for sanctions 122 Accounting for downsizing and departing employees 122 Throwing a Wrench into Digital Recycling 123 Suspending destructive processes 123 Where do you put a terabyte? 124 Implementing the Litigation Hold 125 Documenting that custodians are in compliance 127 Rounding up what needs to be collected 127 Judging whether a forensics-level preservation is needed 130 Chapter 8: Managing e-Discovery Conferences and Protocols 133 Complying with the Meet-and-Confer Session 133 Preparing for the Meet-and-Confer Session 136 Preservation of evidence 136 Form of production 137 Privileged or protected ESI 138 Any other issues regarding ESI 139 Agreeing on a Timetable 139 Selecting a Rule 30(b)(6) Witness 140 Finding Out You and the Opposing Party May Have Mutual Interests 141 Part IV: Processing, Protecting, and Producing ESI 143 Chapter 9: Processing, Filtering, and Reviewing ESI 145 Planning, Tagging, and Bagging 146 Taking a finely tuned approach 147 Finding exactly what you need 147 Stop and identify yourself 149 Two wrongs and a right 150 Learning through Trial and Error 151 Doing Early Case Assessment 152 Vetting vendors 153 Breaking Out the ESI 154 Crafting the Hunt 156 Deciding on filters 156 Keyword or phrase searching 157 Deduping 157 Concept searching 158 Heeding the Grimm roadmap 158 Sampling to Validate 159 Testing the validity of the search 159 Documenting sampling efforts 160 Doing the Review 161 Choosing a review platform 161 How to perform a review 163 Chapter 10: Protecting Privilege, Privacy, and Work Product 165 Facing the Rising Tide of Electronic Information 166 Respecting the Rules of the e-Discovery Game 166 Targeting relevant information 167 Seeing where relevance and privilege intersect 168 Managing e-discovery of confidential information 170 Listening to the Masters 172 Getting or Avoiding a Waiver 172 Asserting a claim 173 Preparing a privilege log 173 Responding to ESI disclosure 175 Applying FRE 502 to disclosure 175 Leveling the Playing Field through Agreement 177 Checking out the types of agreements 177 Shoring up your agreements by court order 178 Chapter 11: Producing and Releasing Responsive ESI 181 Producing Data Sets 182 Packing bytes 183 Staging production 184 Being alert to native production motions 185 Redacting prior to disclosure 187 Providing Detailed Documentation 190 Showing an Unbroken Chain of Custody 192 Keeping Metadata Intact 193 Part V: Getting Litigation Ready 199 Chapter 12: Dealing with Evidentiary Issues and Challenges 201 Looking at the Roles of the Judge and Jury 202 Qualifying an Expert 202 Getting Through the Five Hurdles of Admissibility 204 Admitting Relevant ESI 204 Authenticating ESI 205 Self-authenticating ESI 206 Following the chain of custody 206 Authenticating specific types of ESI 207 Analyzing the Hearsay Rule 208 Providing the Best Evidence 210 Probing the Value of the ESI 210 Chapter 13: Bringing In Special Forces: Computer Forensics 211 Powering Up Computer Forensics 212 Knowing when to hire an expert 212 Knowing what to expect from an expert 214 Judging an expert like judges do 214 Doing a Scientific Forensic Search 215 Testing, Sampling, and Refining Searches for ESI 216 Applying C-Forensics to e-Discovery 218 Following procedure 219 Preparing for an investigation 220 Acquiring and preserving the image 222 Authenticating with hash 223 Recovering deleted ESI 224 Analyzing to broaden or limit 225 Expressing in Boolean 226 Producing and documenting in detail 228 Reinforcing E-Discovery 229 Fighting against forensic fishing attempts 229 Fighting with forensics on your team 230 Defending In-Depth 231 Part VI: Strategizing for e-Discovery Success 233 Chapter 14: Managing and Archiving Business Records 235 Ratcheting Up IT’s Role in Prelitigation 236 Laying the cornerstone of ERM 236 Pitching your tent before the storm 237 Telling Documents and Business Records Apart 238 Designing a Defensible ERM Program 240 Designing by committee 240 Starting with the basics 240 Getting management on board with your ERM program 242 Crafting a risk-reducing policy 244 Punching up your e-mail policy 245 Building an ERM Program 246 Kicking the keep-it-all habit 248 Doing what you say you are 248 Getting an A+ in Compliance 249 Chapter 15: Viewing e-Discovery Law from the Bench 251 Examining Unsettled and Unsettling Issues 252 Applying a reasonableness standard 252 Forcing cooperation 253 Looking at what’s reasonably accessible 254 Determining who committed misconduct 254 Exploring the Role of the Judge 258 Actively participating 258 Scheduling conferences 259 Appointing experts 259 Determining the scope of costs 262 Chapter 16: e-Discovery for Large-Scale and Complex Litigation 263 Preparing for Complex Litigation 263 Ensuring quality control 265 Getting a project management process in place 266 Proving the merits of a case by using ESI 266 Educating the Court about Your ESI 267 Using summary judgment and other tools 268 Employing an identification system 268 Form of production 269 Creating document depositories 269 Avoiding Judicial Resolution 270 Determining the Scope of Accessibility 271 Doing a good-cause inquiry 272 Cost-shifting 273 Getting Help 274 Partnering with vendors or service providers 274 Selecting experts or consulting companies 274 Chapter 17: e-Discovery for Small Cases 277 Defining Small Cases that Can Benefit from e-Discovery 278 Theft of proprietary data and breaches of contract 278 Marital matters 278 Defamation and Internet defamation 279 Characterizing Small Matters 280 Keeping ESI out of evidence 280 Shared characteristics with large cases 281 Unique characteristics and dynamics 282 Proceeding in Small Cases 283 Curbing e-Discovery with Proportionality 286 Sleuthing Personal Correspondence and Files 286 Part VII: The Part of Tens 289 Chapter 18: Ten Most Important e-Discovery Rules 291 FRCP 26(b)(2)(B) Specific Limitations on ESI 291 FRCP 26(b)(5)(B) Protecting Trial-Preparation Materials and Clawback 292 FRCP 26(a)(1)(C) Time for Pretrial Disclosures; Objections 293 FRCP 26(f) Conference of the Parties; Planning for Discovery 294 FRCP 26(g) Signing Disclosures and Discovery Requests, Responses, and Objections 294 FRCP 30(b)(6) Designation of a Witness 295 FRCP 34(b) Form of Production 296 FRCP 37(e) Safe Harbor from Sanctions for Loss of ESI 297 Federal Rules of Evidence 502(b) Inadvertent Disclosure 298 Federal Rule of Evidence 901 Requirement of Authentication or Identification 298 Chapter 19: Ten Ways to Keep an Edge on Your e-Discovery Expertise 301 The Sedona Conference and Working Group Series 302 Discovery Resources 303 Law Technology News 303 Electronic Discovery Law 304 E-Discovery Team Blog 304 LexisNexis Applied Discovery Online Law Library 305 American Bar Association Journal 305 Legal Technology’s Electronic Data Discovery 306 Supreme Court of the United States 306 Cornell Law School Legal Information Institute and Wex 307 Chapter 20: Ten e-Discovery Cases with Really Good Lessons 309 Zubulake v. UBS Warburg, 2003–2005; Employment Discrimination 309 Qualcomm v. Broadcom, 2008; Patent Dispute 310 Victor Stanley, Inc. v. Creative Pipe, Inc., 2008; Copyright Infringement 311 Doe v. Norwalk Community College, 2007; the Safe Harbor of FRCP Rule 37(e) 312 United States v. O’keefe, 2008; Criminal Case Involving e-discovery 313 Lorraine v. Markel American Insurance Co., 2007; Insurance Dispute 314 Mancia v. Mayflower Textile Services Co., et al., 2008; the Duty of Cooperate and FRCP Rule 26(g) 315 Mikron Industries Inc. v. Hurd Windows & Doors Inc., 2008; Duty to Confer 316 Gross Construction Associates, Inc., v. American Mfrs. Mutual Ins Co., 2009; Keyword Searches 317 Gutman v. Klein, 2008; Termination Sanction and Spoliation 318 Glossary 321 Index 333
£19.19
John Wiley & Sons Inc Core and Metro Networks
Book SynopsisWritten by leading practitioners from such cutting-edge companies as Alcatel, Siemens, Lucent, France Telecom, BT, and Telefonica, Core and Metro Networks provides a comprehensive overview of the status, the challenges, the architectures, and technological solutions for core and metropolitan networks aiming to support broadband services.Table of ContentsPreface 1 The Emerging Core and Metropolitan Networks Andrea Di Giglio, Angel Ferreiro and Marco Schiano 1.1 Introduction 1.2 General Characteristics of Transport Network 1.3 Future Networks Challenges 1.4 New Transport Networks Architectures 1.5 Transport Networks Economics Acronyms References 2 The Advances in Control and Management for Transport Networks Dominique Verchere and Bela Berde 2.1 Drivers Towards More Uniform Management and Control Networks 2.2 Control Plane as Main Enabler to Autonomic Network Integration 2.3 Multilayer Interactions and Network Models 2.4 Evolution of Connection Services and Special Cases of Optical Networks 2.5 Conclusion References 3 Elements from Telecommunications Engineering Chris Matrakidis, John Mitchell and Benn Thomsen 3.1 Digital Optical Communication Systems 3.2 Performance Estimation References 4 Enabling Technologies Stefano Santoni, Roberto Cigliutti, Massimo Giltrelli, Pasquale Donadio, Chris Matrakidis, Andrea Paparella, Tanya Politi, Marcello Potenza, Erwan Pincemin and Alexandros Stavdas 4.1 Introduction 4.2 Transmitters 4.3 Receiver 4.4 The Optical Fiber 4.5 Optical Amplifiers 4.6 Optical Filters and Multiplexers References 5 Assessing Physical Layer Degradations Andrew Lord, Marcello Potenza, Marco Forzati and Erwan Pincemin 5.1 Introduction and Scope 5.2 Optical Power Budgets, Part I 5.3 System Bandwidth 5.4 Comments on Budgets for Nonlinear Effects and Optical Transients 5.5 Semianalytical Models for Penalties 5.6 Translucent or Hybrid Networks 5.7 Appendix References 6 Combating Physical Layer Degradations Herbert Haunstein, Harald Rohde, Marco Forzati, Erwan Pincemin, Jonas Martensson, Anders Djupsj€obacka and Tanya Politi 6.1 Introduction 6.2 Dispersion-Compensating Components and Methods for CD and PMD 6.3 Modulation Formats 6.4 Electronic Equalization of Optical Transmission Impairments 6.5 FEC in Lightwave Systems 6.6 Appendix: Experimental Configuration and Measurement Procedure for Evaluation and Comparison for Different Modulation Formats for 40 Gbit/s Transmission Acknowledgments References Dictionary of Optical Networking Didier Colle, Chris Matrakidis and Josep Sol_e-Pareta Acronyms Index
£110.15
John Wiley & Sons Inc SIP Security
Book SynopsisInternet Telephony is one of the most important and fastest growing technologies for emerging mobile networks, as it provides a viable technical and economical alternative to current telecommunication networks. SIP is a standard protocol that has become the de-facto standard for VoIP and multimedia services.Table of ContentsForeword. About the Authors. Acknowledgment. 1 Introduction. 2 Introduction to Cryptographic Mechanisms. 2.1 Cryptographic Algorithms. 2.2 Secure Channel Establishment. 2.3 Authentication in 3GPP Networks. 2.4 Security Mechanisms Threats and Vulnerabilities. 3 Introduction to SIP. 3.1 What is SIP, Why Should we Bother About it and What are Competing Technologies? 3.2 SIP: the Common Scenarios. 3.3 Introduction to SIP Operation: the SIP Trapezoid. 3.4 SIP Components. 3.5 Addressing in SIP. 3.6 SIP Message Elements. 3.7 SIP Dialogs and Transactions. 3.8 SIP Request Routing. 3.9 Authentication, Authorization, Accounting. 3.10 SIP and Middleboxes. 3.11 Other Parts of the SIP Eco-system. 3.12 SIP Protocol Design and Lessons Learned. 4 Introduction to IMS. 4.1 SIP in IMS. 4.2 General Architecture. 4.3 Session Control and Establishment in IMS. 5 Secure Access and Interworking in IMS. 5.1 Access Security in IMS. 5.2 Network Security in IMS. 6 User Identity in SIP. 6.1 Identity Theft. 6.2 Identity Authentication using S/MIME. 6.3 Identity Authentication in Trusted Environments. 6.4 Strong Authenticated Identity. 6.5 Identity Theft Despite Strong Identity. 6.6 User Privacy and Anonymity. 6.7 Subscription Theft. 6.8 Fraud and SIP. 7 Media Security. 7.1 The Real-time Transport Protocol. 7.2 Secure RTP. 7.3 Key Exchange. 8 Denial-of-service Attacks on VoIP and IMS Services. 8.1 Introduction. 8.2 General Classification of Denial-of-service Attacks. 8.3 Bandwidth Consumption and Denial-of-service Attacks on SIP Services. 8.4 Bandwidth Depletion Attacks. 8.5 Memory Depletion Attacks. 8.6 CPU Depletion Attacks. 8.7 Misuse Attacks. 8.8 Distributed Denial-of-service Attacks. 8.9 Unintentional Attacks. 8.10 Address Resolution-related Attacks. 8.11 Attacking the VoIP Subscriber Database. 8.12 Denial-of-service Attacks in IMS Networks. 8.13 DoS Detection and Protection Mechanisms. 8.14 Detection of DoS Attacks. 8.15 Reacting to DoS Attacks. 8.16 Preventing DoS Attacks. 8.17 DDoS Signature Specification. 9 SPAM over IP Telephony. 9.1 Introduction. 9.2 Spam Over SIP: Types and Applicability. 9.3 Why is SIP Good for Spam? 9.4 Legal Side of Unsolicited Communication. 9.5 Fighting Unsolicited Communication. 9.6 General Antispam Framework. Bibliography. Index.
£80.96
John Wiley and Sons Ltd Digital Forensics
Book SynopsisThe vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements traditional scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidentTrade Review?This book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations.? (Reviews, May 2009)Table of ContentsPreface. Acknowledgments. 1. Introduction. 1.1 Key developments. 1.2 Digital Devices in Society. 1.3 Technology and Culture. 1.4 Comment. 2. Evidential Potential of Digital Devices. 2.1 Closed vs. Open Systems. 2.2 Evaluating Digital Evidence Potential. 3. Device Handling. 3.1 Seizure Issues. 3.2 Device Identification. 3.3 Networked Devices. 3.4 Contamination. 4. Examination Principles. 4.1 Previewing. 4.2 Imaging. 4.3 Continuity and Hashing. 4.4 Evidence locations. 5. Evidence Creation. 5.1 A 7-element security model. 5.2 A developmental model of digital systems. 5.3 Knowing. 5.4 Unknowing. 5.5 Audit and Logs. 6. Evidence Interpretation. 6.1 Data Content. 6.2 Data Context. 7. Internet Activity. 7.1 A little bit of history. 7.2 The ISO/OSI model. 7.3 The Internet Protocol Suite. 7.4 DNS. 7.5 Internet Applications. 8. Mobile Devices. 8.1 Mobile Phones & PDAs. 8.2 GPS. 8.3 Other Personal Technology. 9. Intelligence. 9.1 Device usage. 9.2 Profiling and Cyberprofiling. 9.3 Evaluating Online Crime: Automating the Model. 9.4 Application of the formula to Case Studies. 9.5 From success estimates to profiling. 9.6 Comments. 10. Case Studies and Examples. 10.1 Introduction. 10.2 Copyright Violation. 10.3 Missing person and Murder. 10.4 The view of a defence witness. A The "Aircraft Carrier" PC. B Additional Resources. C SIM card data report. Index.
£158.14
John Wiley and Sons Ltd Digital Forensics
Book SynopsisThe vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements traditional scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidentTrade Review?This book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations.? (Reviews, May 2009)Table of ContentsPreface vii Acknowledgments xi List of Tables xii List of Figures xiii 1 Introduction 1 1.1 Key developments 1 1.2 Digital devices in society 5 1.3 Technology and culture 6 1.4 Comment 7 2 Evidential Potential of Digital Devices 9 2.1 Closed vs. open systems 10 2.2 Evaluating digital evidence potential 17 3 Device Handling 19 3.1 Seizure issues 21 3.2 Device identification 31 3.3 Networked devices 36 3.4 Contamination 40 4 Examination Principles 43 4.1 Previewing 43 4.2 Imaging 47 4.3 Continuity and hashing 48 4.4 Evidence locations 49 5 Evidence Creation 55 5.1 A seven-element security model 56 5.2 A developmental model of digital systems 60 5.3 Knowing 61 5.4 Unknowing 63 5.5 Audit and logs 68 6 Evidence Interpretation 69 6.1 Data content 69 6.2 Data context 83 7 Internet Activity 85 7.1 A little bit of history 85 7.2 The ISO/OSI model 86 7.3 The internet protocol suite 90 7.4 DNS 94 7.5 Internet applications 96 8 Mobile Devices 109 8.1 Mobile phones and PDAs 109 8.2 GPS 116 8.3 Other personal technology 118 9 Intelligence 119 9.1 Device usage 119 9.2 Profiling and cyberprofiling 121 9.3 Evaluating online crime: automating the model 124 9.4 Application of the formula to case studies 126 9.5 From success estimates to profiling 129 9.6 Comments 129 10 Case Studies and Examples 131 10.1 Introduction 131 10.2 Copyright violation 131 10.3 Missing person and murder 133 10.4 The view of a defence witness 137 Appendix A The “Aircraft Carrier” PC 141 Appendix B Additional Resources 145 B.1 Hard disc and storage laboratory tools 145 B.2 Mobile phone/PDA tools 146 B.3 Live CDs 146 B.4 Recommended reading 146 Appendix C SIM Card Data Report 149 References 157 Index 161
£45.86
John Wiley & Sons Inc Malware Analysts Cookbook and DVD
Book SynopsisA computer forensics how-to for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C,
£45.12
John Wiley & Sons Inc Pentaho Kettle Solutions
Book SynopsisA complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETL This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you're a database administrator or developer, you'll first get up to speed on Kettle basics and how to apply Kettle to create ETL solutionsbefore progressing to specialized concepts such as clustering, extensibility, and data vault models. Learn how to design and build every phase of an ETL solution. Shows developers and database administrators how to use the open-source Pentaho Kettle for enterprise-level ETL processes (Extracting, Transforming, and Loading data) Assumes no prior knowledge of Kettle or ETL, and brings beginners thoroughly up to speed at their own pace Explains how to get Kettle solutions up and running, then follows the 34 ETL subsystems model, as created by the Kimball Group, to explore the entire ETL lifecycle, including all aspects of data warehoTable of ContentsIntroduction xxxi Part I Getting Started 1 Chapter 1 ETL Primer 3 OLTP versus Data Warehousing 3 What Is ETL? 5 The Evolution of ETL Solutions 5 ETL Building Blocks 7 ETL, ELT, and EII 8 ELT 9 EII: Virtual Data Integration 10 Data Integration Challenges 11 Methodology: Agile BI 12 ETL Design 14 Data Acquisition 14 Beware of Spreadsheets 15 Design for Failure 15 Change Data Capture 16 Data Quality 16 Data Profiling 16 Data Validation 17 ETL Tool Requirements 17 Connectivity 17 Platform Independence 18 Scalability 18 Design Flexibility 19 Reuse 19 Extensibility 19 Data Transformations 20 Testing and Debugging 21 Lineage and Impact Analysis 21 Logging and Auditing 22 Summary 22 Chapter 2 Kettle Concepts 23 Design Principles 23 The Building Blocks of Kettle Design 25 Transformations 25 Steps 26 Transformation Hops 26 Parallelism 27 Rows of Data 27 Data Conversion 29 Jobs 30 Job Entries 31 Job Hops 31 Multiple Paths and Backtracking 32 Parallel Execution 33 Job Entry Results 34 Transformation or Job Metadata 36 Database Connections 37 Special Options 38 The Power of the Relational Database 39 Connections and Transactions 39 Database Clustering 40 Tools and Utilities 41 Repositories 41 Virtual File Systems 42 Parameters and Variables 43 Defining Variables 43 Named Parameters 44 Using Variables 44 Visual Programming 45 Getting Started 46 Creating New Steps 47 Putting It All Together 49 Summary 51 Chapter 3 Installation and Configuration 53 Kettle Software Overview 53 Integrated Development Environment: Spoon 55 Command-Line Launchers: Kitchen and Pan 57 Job Server: Carte 57 Encr.bat and encr.sh 58 Installation 58 Java Environment 58 Installing Java Manually 58 Using Your Linux Package Management System 59 Installing Kettle 59 Versions and Releases 59 Archive Names and Formats 60 Downloading and Uncompressing 60 Running Kettle Programs 61 Creating a Shortcut Icon or Launcher for Spoon 62 Configuration 63 Configuration Files and the .kettle Directory 63 The Kettle Shell Scripts 69 General Structure of the Startup Scripts 70 Adding an Entry to the Classpath 70 Changing the Maximum Heap Size 71 Managing JDBC Drivers 72 Summary 72 Chapter 4 An Example ETL Solution—Sakila 73 Sakila 73 The Sakila Sample Database 74 DVD Rental Business Process 74 Sakila Database Schema Diagram 75 Sakila Database Subject Areas 75 General Design Considerations 77 Installing the Sakila Sample Database 77 The Rental Star Schema 78 Rental Star Schema Diagram 78 Rental Fact Table 79 Dimension Tables 79 Keys and Change Data Capture 80 Installing the Rental Star Schema 81 Prerequisites and Some Basic Spoon Skills 81 Setting Up the ETL Solution 82 Creating Database Accounts 82 Working with Spoon 82 Opening Transformation and Job Files 82 Opening the Step’s Configuration Dialog 83 Examining Streams 83 Running Jobs and Transformations 83 The Sample ETL Solution 84 Static, Generated Dimensions 84 Loading the dim_date Dimension Table 84 Loading the dim_time Dimension Table 86 Recurring Load 87 The load_rentals Job 88 The load_dim_staff Transformation 91 Database Connections 91 The load_dim_customer Transformation 95 The load_dim_store Transformation 98 The fetch_address Subtransformation 99 The load_dim_actor Transformation 101 The load_dim_film Transformation 102 The load_fact_rental Transformation 107 Summary 109 Part II ETL 111 Chapter 5 ETL Subsystems 113 Introduction to the 34 Subsystems 114 Extraction 114 Subsystems 1–3: Data Profiling, Change Data Capture, and Extraction 115 Cleaning and Conforming Data 116 Subsystem 4: Data Cleaning and Quality Screen Handler System 116 Subsystem 5: Error Event Handler 117 Subsystem 6: Audit Dimension Assembler 117 Subsystem 7: Deduplication System 117 Subsystem 8: Data Conformer 118 Data Delivery 118 Subsystem 9: Slowly Changing Dimension Processor 118 Subsystem 10: Surrogate Key Creation System 119 Subsystem 11: Hierarchy Dimension Builder 119 Subsystem 12: Special Dimension Builder 120 Subsystem 13: Fact Table Loader 121 Subsystem 14: Surrogate Key Pipeline 121 Subsystem 15: Multi-Valued Dimension Bridge Table Builder 121 Subsystem 16: Late-Arriving Data Handler 122 Subsystem 17: Dimension Manager System 122 Subsystem 18: Fact Table Provider System 122 Subsystem 19: Aggregate Builder 123 Subsystem 20: Multidimensional (OLAP) Cube Builder 123 Subsystem 21: Data Integration Manager 123 Managing the ETL Environment 123 Summary 126 Chapter 6 Data Extraction 127 Kettle Data Extraction Overview 128 File-Based Extraction 128 Working with Text Files 128 Working with XML files 133 Special File Types 134 Database-Based Extraction 134 Web-Based Extraction 137 Text-Based Web Extraction 137 HTTP Client 137 Using SOAP 138 Stream-Based and Real-Time Extraction 138 Working with ERP and CRM Systems 138 ERP Challenges 139 Kettle ERP Plugins 140 Working with SAP Data 140 ERP and CDC Issues 146 Data Profiling 146 Using eobjects.org DataCleaner 147 Adding Profile Tasks 149 Adding Database Connections 149 Doing an Initial Profile 151 Working with Regular Expressions 151 Profiling and Exploring Results 152 Validating and Comparing Data 153 Using a Dictionary for Column Dependency Checks 153 Alternative Solutions 154 Text Profiling with Kettle 154 CDC: Change Data Capture 154 Source Data–Based CDC 155 Trigger-Based CDC 157 Snapshot-Based CDC 158 Log-Based CDC 162 Which CDC Alternative Should You Choose? 163 Delivering Data 164 Summary 164 Chapter 7 Cleansing and Conforming 167 Data Cleansing 168 Data-Cleansing Steps 169 Using Reference Tables 172 Conforming Data Using Lookup Tables 172 Conforming Data Using Reference Tables 175 Data Validation 179 Applying Validation Rules 180 Validating Dependency Constraints 183 Error Handling 183 Handling Process Errors 184 Transformation Errors 186 Handling Data (Validation) Errors 187 Auditing Data and Process Quality 191 Deduplicating Data 192 Handling Exact Duplicates 193 The Problem of Non-Exact Duplicates 194 Building Deduplication Transforms 195 Step 1: Fuzzy Match 197 Step 2: Select Suspects 198 Step 3: Lookup Validation Value 198 Step 4: Filter Duplicates 199 Scripting 200 Formula 201 JavaScript 202 User-Defined Java Expressions 202 Regular Expressions 203 Summary 205 Chapter 8 Handling Dimension Tables 207 Managing Keys 208 Managing Business Keys 209 Keys in the Source System 209 Keys in the Data Warehouse 209 Business Keys 209 Storing Business Keys 210 Looking Up Keys with Kettle 210 Generating Surrogate Keys 210 The “Add sequence” Step 211 Working with auto_increment or IDENTITY Columns 217 Keys for Slowly Changing Dimensions 217 Loading Dimension Tables 218 Snowflaked Dimension Tables 218 Top-Down Level-Wise Loading 219 Sakila Snowflake Example 219 Sample Transformation 221 Database Lookup Configuration 222 Sample Job 225 Star Schema Dimension Tables 226 Denormalization 226 Denormalizing to 1NF with the “Database lookup” Step 226 Change Data Capture 227 Slowly Changing Dimensions 228 Types of Slowly Changing Dimensions 228 Type 1 Slowly Changing Dimensions 229 The Insert / Update Step 229 Type 2 Slowly Changing Dimensions 232 The “Dimension lookup / update” Step 232 Other Types of Slowly Changing Dimensions 237 Type 3 Slowly Changing Dimensions 237 Hybrid Slowly Changing Dimensions 238 More Dimensions 239 Generated Dimensions 239 Date and Time Dimensions 239 Generated Mini-Dimensions 239 Junk Dimensions 241 Recursive Hierarchies 242 Summary 243 Chapter 9 Loading Fact Tables 245 Loading in Bulk 246 STDIN and FIFO 247 Kettle Bulk Loaders 248 MySQL Bulk Loading 249 LucidDB Bulk Loader 249 Oracle Bulk Loader 249 PostgreSQL Bulk Loader 250 Table Output Step 250 General Bulk Load Considerations 250 Dimension Lookups 251 Maintaining Referential Integrity 251 The Surrogate Key Pipeline 252 Using In-Memory Lookups 253 Stream Lookups 253 Late-Arriving Data 255 Late-Arriving Facts 256 Late-Arriving Dimensions 256 Fact Table Handling 260 Periodic and Accumulating Snapshots 260 Introducing State-Oriented Fact Tables 261 Loading Periodic Snapshots 263 Loading Accumulating Snapshots 264 Loading State-Oriented Fact Tables 265 Loading Aggregate Tables 266 Summary 267 Chapter 10 Working with OLAP Data 269 OLAP Benefits and Challenges 270 OLAP Storage Types 272 Positioning OLAP 272 Kettle OLAP Options 273 Working with Mondrian 274 Working with XML/A Servers 277 Working with Palo 282 Setting Up the Palo Connection 283 Palo Architecture 284 Reading Palo Data 285 Writing Palo Data 289 Summary 291 Part III Management and Deployment 293 Chapter 11 ETL Development Lifecycle 295 Solution Design 295 Best and Bad Practices 296 Data Mapping 297 Naming and Commentary Conventions 298 Common Pitfalls 299 ETL Flow Design 300 Reusability and Maintainability 300 Agile Development 301 Testing and Debugging 306 Test Activities 307 ETL Testing 308 Test Data Requirements 308 Testing for Completeness 309 Testing Data Transformations 311 Test Automation and Continuous Integration 311 Upgrade Tests 312 Debugging 312 Documenting the Solution 315 Why Isn’t There Any Documentation? 316 Myth 1: My Software Is Self-Explanatory 316 Myth 2: Documentation Is Always Outdated 316 Myth 3: Who Reads Documentation Anyway? 317 Kettle Documentation Features 317 Generating Documentation 319 Summary 320 Chapter 12 Scheduling and Monitoring 321 Scheduling 321 Operating System–Level Scheduling 322 Executing Kettle Jobs and Transformations from the Command Line 322 UNIX-Based Systems: cron 326 Windows: The at utility and the Task Scheduler 327 Using Pentaho’s Built-in Scheduler 327 Creating an Action Sequence to Run Kettle Jobs and Transformations 328 Kettle Transformations in Action Sequences 329 Creating and Maintaining Schedules with the Administration Console 330 Attaching an Action Sequence to a Schedule 333 Monitoring 333 Logging 333 Inspecting the Log 333 Logging Levels 335 Writing Custom Messages to the Log 336 E‑mail Notifications 336 Configuring the Mail Job Entry 337 Summary 340 Chapter 13 Versioning and Migration 341 Version Control Systems 341 File-Based Version Control Systems 342 Organization 342 Leading File-Based VCSs 343 Content Management Systems 344 Kettle Metadata 344 Kettle XML Metadata 345 Transformation XML 345 Job XML 346 Global Replace 347 Kettle Repository Metadata 348 The Kettle Database Repository Type 348 The Kettle File Repository Type 349 The Kettle Enterprise Repository Type 350 Managing Repositories 350 Exporting and Importing Repositories 350 Upgrading Your Repository 351 Version Migration System 352 Managing XML Files 352 Managing Repositories 352 Parameterizing Your Solution 353 Summary 356 Chapter 14 Lineage and Auditing 357 Batch-Level Lineage Extraction 358 Lineage 359 Lineage Information 359 Impact Analysis Information 361 Logging and Operational Metadata 363 Logging Basics 363 Logging Architecture 364 Setting a Maximum Buffer Size 365 Setting a Maximum Log Line Age 365 Log Channels 366 Log Text Capturing in a Job 366 Logging Tables 367 Transformation Logging Tables 367 Job Logging Tables 373 Summary 374 Part IV Performance and Scalability 375 Chapter 15 Performance Tuning 377 Transformation Performance: Finding the Weakest Link 377 Finding Bottlenecks by Simplifying 379 Finding Bottlenecks by Measuring 380 Copying Rows of Data 382 Improving Transformation Performance 384 Improving Performance in Reading Text Files 384 Using Lazy Conversion for Reading Text Files 385 Single-File Parallel Reading 385 Multi-File Parallel Reading 386 Configuring the NIO Block Size 386 Changing Disks and Reading Text Files 386 Improving Performance in Writing Text Files 387 Using Lazy Conversion for Writing Text Files 387 Parallel Files Writing 387 Changing Disks and Writing Text Files 387 Improving Database Performance 388 Avoiding Dynamic SQL 388 Handling Roundtrips 388 Handling Relational Databases 390 Sorting Data 392 Sorting on the Database 393 Sorting in Parallel 393 Reducing CPU Usage 394 Optimizing the Use of JavaScript 394 Launching Multiple Copies of a Step 396 Selecting and Removing Values 397 Managing Thread Priorities 397 Adding Static Data to Rows of Data 397 Limiting the Number of Step Copies 398 Avoiding Excessive Logging 398 Improving Job Performance 399 Loops in Jobs 399 Database Connection Pools 400 Summary 401 Chapter 16 Parallelization, Clustering, and Partitioning 403 Multi-Threading 403 Row Distribution 404 Row Merging 405 Row Redistribution 406 Data Pipelining 407 Consequences of Multi-Threading 408 Database Connections 408 Order of Execution 409 Parallel Execution in a Job 411 Using Carte as a Slave Server 411 The Configuration File 411 Defining Slave Servers 412 Remote Execution 413 Monitoring Slave Servers 413 Carte Security 414 Services 414 Clustering Transformations 417 Defining a Cluster Schema 417 Designing Clustered Transformations 418 Execution and Monitoring 420 Metadata Transformations 421 Rules 422 Data Pipelining 425 Partitioning 425 Defining a Partitioning Schema 425 Objectives of Partitioning 427 Implementing Partitioning 428 Internal Variables 428 Database Partitions 429 Partitioning in a Clustered Transformation 430 Summary 430 Chapter 17 Dynamic Clustering in the Cloud 433 Dynamic Clustering 433 Setting Up a Dynamic Cluster 434 Using the Dynamic Cluster 436 Cloud Computing 437 EC2 438 Getting Started with EC2 438 Costs 438 Customizing an AMI 439 Packaging a New AMI 442 Terminating an AMI 442 Running a Master 442 Running the Slaves 443 Using the EC2 Cluster 444 Monitoring 445 The Lightweight Principle and Persistence Options 446 Summary 447 Chapter 18 Real-Time Data Integration 449 Introduction to Real-Time ETL 449 Real-Time Challenges 450 Requirements 451 Transformation Streaming 452 A Practical Example of Transformation Streaming 454 Debugging 457 Third-Party Software and Real-Time Integration 458 Java Message Service 459 Creating a JMS Connection and Session 459 Consuming Messages 460 Producing Messages 460 Closing Shop 460 Summary 461 Part V Advanced Topics 463 Chapter 19 Data Vault Management 465 Introduction to Data Vault Modeling 466 Do You Need a Data Vault? 466 Data Vault Building Blocks 467 Hubs 467 Links 468 Satellites 469 Data Vault Characteristics 471 Building a Data Vault 471 Transforming Sakila to the Data Vault Model 472 Sakila Hubs 472 Sakila Links 473 Sakila Satellites 474 Loading the Data Vault: A Sample ETL Solution 477 Installing the Sakila Data Vault 477 Setting Up the ETL Solution 477 Creating a Database Account 477 The Sample ETL Data Vault Solution 478 Sample Hub: hub_actor 478 Sample Link: link_customer_store 480 Sample Satellite: sat_actor 483 Loading the Data Vault Tables 485 Updating a Data Mart from a Data Vault 486 The Sample ETL Solution 486 The dim_actor Transformation 486 The dim_customer Transformation 488 The dim_film Transformation 492 The dim_film_actor_bridge Transformation 492 The fact_rental Transformation 493 Loading the Star Schema Tables 495 Summary 495 Chapter 20 Handling Complex Data Formats 497 Non-Relational and Non-Tabular Data Formats 498 Non-Relational Tabular Formats 498 Handling Multi-Valued Attributes 498 Using the Split Field to Rows Step 499 Handling Repeating Groups 500 Using the Row Normaliser Step 500 Semi- and Unstructured Data 501 Kettle Regular Expression Example 503 Configuring the Regex Evaluation Step 504 Verifying the Match 507 Key/Value Pairs 508 Kettle Key/Value Pairs Example 509 Text File Input 509 Regex Evaluation 510 Grouping Lines into Records 511 Denormaliser: Turning Rows into Columns 512 Summary 513 Chapter 21 Web Services 515 Web Pages and Web Services 515 Kettle Web Features 516 General HTTP Steps 516 Simple Object Access Protocol 517 Really Simple Syndication 517 Apache Virtual File System Integration 517 Data Formats 517 XML 518 Kettle Steps for Working with XML 518 Kettle Job Entries for XML 519 HTML 520 JavaScript Object Notation 520 Syntax 521 JSON, Kettle, and ETL/DI 522 XML Examples 523 Example XML Document 523 XML Document Structure 523 Mapping to the Sakila Sample Database 524 Extracting Data from XML 525 Overall Design: The import_xml_into_db Transformation 526 Using the XSD Validator Step 528 Using the “Get Data from XML” Step 530 Generating XML Documents 537 Overall Design: The export_xml_from_db Transformation 537 Generating XML with the Add XML Step 538 Using the XML Join Step 541 SOAP Examples 544 Using the “Web services lookup” Step 544 Configuring the “Web services lookup” Step 544 Accessing SOAP Services Directly 546 JSON Example 549 The Freebase Project 549 Freebase Versus Wikipedia 549 Freebase Web Services 550 The Freebase Read Service 550 The Metaweb Query Language 551 Extracting Freebase Data with Kettle 553 Generate Rows 554 Issuing a Freebase Read Request 555 Processing the Freebase Result Envelope 556 Filtering Out the Original Row 557 Storing to File 558 RSS 558 RSS Structure 558 Channel 558 Item 559 RSS Support in Kettle 560 RSS Input 561 RSS Output 562 Summary 567 Chapter 22 Kettle Integration 569 The Kettle API 569 The LGPL License 569 The Kettle Java API 570 Source Code 570 Building Kettle 571 Building javadoc 571 Libraries and the Class Path 571 Executing Existing Transformations and Jobs 571 Executing a Transformation 572 Executing a Job 573 Embedding Kettle 574 Pentaho Reporting 574 Putting Data into a Transformation 576 Dynamic Transformations 580 Dynamic Template 583 Dynamic Jobs 584 Executing Dynamic ETL in Kettle 586 Result 587 Replacing Metadata 588 Direct Changes with the API 589 Using a Shared Objects File 589 OEM Versions and Forks 590 Creating an OEM Version of PDI 590 Forking Kettle 591 Summary 592 Chapter 23 Extending Kettle 593 Plugin Architecture Overview 593 Plugin Types 594 Architecture 595 Prerequisites 596 Kettle API Documentation 596 Libraries 596 Integrated Development Environment 596 Eclipse Project Setup 597 Examples 598 Transformation Step Plugins 599 StepMetaInterface 599 Value Metadata 605 Row Metadata 606 StepDataInterface 607 StepDialogInterface 607 Eclipse SWT 607 Form Layout 607 Kettle UI Elements 609 Hello World Example Dialog 609 StepInterface 614 Reading Rows from Specific Steps 616 Writing Rows to Specific Steps 616 Writing Rows to Error Handling 617 Identifying a Step Copy 617 Result Feedback 618 Variable Substitution 618 Apache VFS 619 Step Plugin Deployment 619 The User-Defined Java Class Step 620 Passing Metadata 620 Accessing Input and Fields 620 Snippets 620 Example 620 Job Entry Plugins 621 JobEntryInterface 622 JobEntryDialogInterface 624 Partitioning Method Plugins 624 Partitioner 625 Repository Type Plugins 626 Database Type Plugins 627 Summary 628 Appendix A The Kettle Ecosystem 629 Kettle Development and Versions 629 The Pentaho Community Wiki 631 Using the Forums 631 Jira 632 ##pentaho 633 Appendix B Kettle Enterprise Edition Features 635 Appendix C Built-in Variables and Properties Reference 637 Internal Variables 637 Kettle Variables 640 Variables for Configuring VFS 641 Noteworthy JRE Variables 642 Index 643
£30.39
John Wiley & Sons Inc Biopolymers
Book SynopsisThis handbook focuses on biopolymers for both environmental and biomedical applications. It shows recent advances in technology in all areas from chemical synthesis or biosynthesis to end use applications. These areas have not been covered in a single book before and they include biopolymers for chemical and biotechnological modifications, material structures, characterization, processing, properties, and applications. After the introduction which summarizes the importance of biopolymer in the market, the book covers almost all the topics related to polysaccharides, biofibers, bioplastics, biocomposites, natural rubber, gums, bacterial and blood compatible polymers, and applications of biopolymers in various fields.Table of ContentsIntroductory Preface. About the Editors. Part I. Polysaccharides. 1. Hyaluronic Acid: A Natural Biopolymer (Juergen Schiller, Nicola Volpi, Eva Hrabárova, and Ladislav Soltes). 2. Polysaccharide Graft Copolymers Synthesis, Properties and Applications (B. S. Kaith, Hemant Mittal, Jaspreet Kaur Bhatia, and Susheel Kalia). 3. Natural Polysaccharides: From Membranes to Active Food Packaging (Keith J. Fahnestock, Marjorie S. Austero, and Caroline L. Schauer). 4. Starch as Source of Polymeric Materials (Antonio A. J. Carvalho). 5. Grafted Polysaccharides: Smart Materials of Future, Synthesis and Applications (Gautam Sen, Ashoke Sharon, and Sagar Pal). 6. Chitosan: The Marine based Biopolymer for Applications (Debasish Sahoo, and P. L. Nayak). Part II. Bioplastics and Biocomposites. 7. Biopolymers Based-on Carboxylic Acids Derived from Renewable Resources (Sushil Kumar, Nikhil Prakash, and Dipaloy Datta). 8. Characteristics and Applications of PLA (Sandra Domenek, Cecile Courgneau, and Violette Ducruet). 9. Biobased Composites & Applications (Smita Mohanty, and Sanjay K. Nayak). Part III. Miscellaneous Biopolymers. 10. Cassia Seed Gums: A Renewable Reservoir for Synthesizing High Performance Materials for Water Remediation (Vandana Singh, and Pramendra Kumar). 11. Bacterial Polymers: Resources, Synthesis and Applications (GVN Rathna, and Sutapa Gosh). 12. Gum Arabica: A Natural Biopolymer (A. Sarkar). 13. Gluten: A Natural Biopolymer (S. Georgiev, and Tereza Dekova). 14. Natural Rubber: Production, Properties, and Applications (Thomas Kurian, and N. M. Mathew). 15. Electronic Structures and Conduction Properties of Biopolymers (Mohsineen Wazir, Vinita Arora, and A. K. Bakhshi). Part IV. Biopolymers for Specific Applications. 16. Applications of Biopolymers in Agriculture with Special Reference to Role of Plant Derived Biopolymers in Crop Protection (S. Niranjan Raj, S. N. Lavanya, J, Sudisha, and H. Shekar Shetty). 17. Modified Cellulose Fibers as a Biosorbent for the Organic Pollutants (Sami Boufi, and Sabrine Alila). 18. Polymers and Biopolymers in Pharmaceutical Technology (István Erös). 19. Biopolymers Employed in Drug Delivery (Betina Giehl Zanetti Ramos). 20. Natural Polymeric Vectors in Gene Therapy (Patit P. Kundu, and Kishor Sarkar).
£170.06
John Wiley & Sons Inc Windows Command Line Administration Instant
Book SynopsisFocusing just on the essentials of command-line interface (CLI), this title shows how to quickly perform day-to-day tasks of Windows administration without ever touching the graphical user interface (GUI). It replaces many tedious GUI steps with just one command at the command-line, while easy to access answers provide solutions on the spot.Table of ContentsIntroduction xix Part I: Command Line Basics 1 Chapter 1: Configuring the Local Machine 3 Configure the Command Window 4 Set the Window Options 4 Change the Font 7 Choose a Window Layout 8 Define the Text Colors 9 Set the Environment 10 Manage Environment Variables with the Set Command 10 Manage Environment Variables with the SetX Utility 13 Perform Common Tasks 16 Clear the Display 16 Determine the Operating System Version 16 Start an Application 16 Work with Services 18 Shut Down the System 19 Obtain Command Line Help 20 Chapter 2: Making Remote Connections 23 Configure the Remote System 24 Change Security and Basic Setup 25 Setup Remote Administrator 28 Use the Remote Desktop Connection Application 30 Create a Connection 30 Use a Saved Connection 35 Set the Display 35 Access Local Resources 36 Run a Configuration Program 38 Optimize Performance 38 Terminate a Session 39 Use the Start Menu 40 Use the Logoff Utility 40 Chapter 3: Automating Tasks 41 View and Manage Tasks Using Scheduled Tasks 42 Configure the Task Scheduler 43 View Tasks 44 Create New Tasks 46 Delete Existing Tasks 50 Manage Tasks Using the SchTasks Command 51 Use the /Create Switch 51 Use the /Delete Switch 53 Use the /Query Switch 53 Use the /Change Switch 54 Use the /Run Switch 54 Use the /End Switch 54 Part II: Managing Data 55 Chapter 4: Working with File and Directory Objects 57 Manage Directory Objects 58 Find Directories 58 Find Directories Using Patterns 59 View the Current Directory 60 Change the Current Directory 60 Create Directories 61 Move Directories 61 Rename Directories 61 Remove a Directory 62 Display a Directory Structure 62 Manage File Objects 63 Find Files 63 Find Files in Sorted Order 64 Find Files by Attribute 65 Find Files Using Patterns 66 Copy Files 68 Perform Bulk File Transfers 69 Remove Files 70 Move Files 71 Rename a File 71 Set File Attributes 71 Work with File Associations and Types 72 Determine File Associations 72 Create File Associations 73 Determine File Types 73 Create File Types 73 Make Data Links 74 Create Simple Hard Links 75 View Simple Hard Links 75 Delete Simple Hard Links 75 Create Hard Links Using the New Technique 76 Create Symbolic Links 76 Create Junctions 77 Chapter 5: Administering File and Directory Content 79 Execute Applications Anywhere 80 View Application Paths 80 Set Application Paths 80 Locate Information in Files 81 Find Simple Strings 81 Find Complex Strings 82 Display Files Containing Strings 82 Perform Case Insensitive Searches 83 Monitor the File System with the FSUtil Command 83 Control File System Behavior 83 Manage the Volume Dirty Bit 86 Obtain the File System Information Using FSInfo 87 Manage Quotas 88 Repair File System Errors 90 Display Data Files 92 Display a Data File on Screen 92 Employ Data Redirection 92 Display Data One Page at a Time 95 Chapter 6: Managing the Hard Drive 99 Save Hard Drive Space 101 Compress Data 101 Uncompress Data 102 View Compression Status 102 Manage the Volume 102 Get Volume Information 103 Manage Volume Labels 103 Format a Disk 103 Mount a Volume 104 Maintain the Volume 106 Determine File and Directory Status 106 Locate Bad Sectors 107 Perform Boot-Time Disk Checks 108 Improve Disk Access Performance 109 Manage Partitions 110 Start DiskPart 110 List the Objects 111 See Object Details 112 Select an Object 113 Rescan a Computer for Objects 114 Create a Partition 114 Create a Volume 116 Clean a Drive 117 Mark a Partition as Active 117 Mark a Partition as Inactive 118 Assign a Drive Letter 118 Remove a Drive Letter 119 Extend a Volume 119 Delete an Object 120 Exit DiskPart 120 Chapter 7: Securing the Data 121 Protect Data 122 Encrypt a File or Directory 122 View Encrypted Files and Directories 123 Encrypt Hidden Files 124 Back Up Recovery Keys and Certificates 125 Add a User to a File or Directory 125 Remove a User from a File or Directory 126 Decrypt a File or Directory 127 Change File and Directory Access 127 Obtain the DACL 127 Find an SID 130 Grant Permission 130 Deny Permission 131 Remove Permission 131 Set the Owner 132 Verify Security 132 Detect Shared Open Files 132 Use the Query Option 132 Use the Disconnect Option 133 Use the Local Option 134 Take Ownership of Files 134 Set Administrator Ownership 134 Set Other User Ownership 135 Part III: Managing the Network 137 Chapter 8: Managing the Network 139 Get the Media Access Control Information 140 Interact with the Network Using the Net Utility 141 Manage Users 141 Manage Accounts 143 Manage Domains and Local Groups 146 Manage Computers 149 View and Close Sessions 149 Perform Server Configuration 151 View Workstation Configuration 153 Manage Services 153 Manage Files 155 Obtain Help for the Net Utility 156 Manage Print Jobs 157 Manage Resources 158 Obtain Statistics 161 Configure Time Synchronization 163 Chapter 9: Working with TCP/IP 165 Manage the Internet Protocol 166 Display the IP Information 166 Renew Addresses for an Adapter 168 Clear the DNS Resolver Cache 168 Renew DHCP Addresses and Register DNS Names 169 Release a Connection 169 Use Basic Diagnostics 170 Check Connections 170 Trace Transmission Paths 171 Track the Network Path 172 Perform Detailed Network Diagnostics 173 Obtain a Copy of NetDiag 174 Perform a Test 175 Understand Diagnostics 175 Locate and Fix Minor Problems 177 Get Network Statistics 177 Display All Connections and Ports 177 Display Application Statistics 178 Display Ethernet Statistics 179 Display Protocol Information 179 Set a Refresh Interval 180 Manipulate the Network Routing Tables 180 Print the Routing Tables 180 Add a New Route 181 Change a Route 182 Delete a Route 183 Chapter 10: Creating System Connections 185 Perform Remote System Management 186 Create Remote Connections 186 Set Up a Telephony Client 190 Perform Remote Windows Management 191 Execute Commands on a Remote System 206 Work with Terminal Server 206 Obtain Process Information 206 Get Session Information 207 Terminate a Session 208 Disconnect an Active Session 208 End Processes 208 Shut Down the Terminal Server 209 Part IV: Interacting with Active Directory 211 Chapter 11: Configuring Directory Services 213 Manage Directory Services Using the WMIC NTDomain Alias 214 List the Objects 215 List Object Properties 215 Get an Object Property 216 Set an Object Property 217 Query an Association 217 Manage Active Directory with the DSQuery Utility 218 Interact with Servers 218 Interact with Users 220 Interact with Computers 223 Interact with Contacts 223 Interact with Groups 223 Interact with Organizational Units 224 Manage the Active Directory Database 225 Issue a Command 225 Use a Stream 226 Chapter 12: Working with Directory Objects 229 Create New Objects 230 Add a Computer 230 Add a Contact 231 Add a Group 233 Add an Organizational Unit 234 Add a User 234 Get Objects 238 List Computers 238 List Contacts 239 List Groups 240 List Organizational Units 241 List Servers 241 List Users 242 Edit Existing Objects 243 Modify Computer Data 244 Modify Contact Data 245 Modify Group Data 246 Modify Organizational Unit Data 246 Modify User Data 246 Move Existing Objects 248 Delete Existing Objects 248 Part V: Performing Diagnostics 251 Chapter 13: Monitoring System Events 253 Create Simple System Events 254 Trigger System Events 257 Create an Event 258 Delete an Event 261 Query an Event 261 Manage Event Information 262 Display a List of Publishers 262 Get a Publisher 262 Enumerate the Logs 263 Query Log Events 264 Get a Log 267 Get Log Status Information 267 Set a Log 267 Export a Log 269 Archive a Log 270 Clear a Log 270 Chapter 14: Monitoring System Performance 271 Add Performance Counters 272 Load a Performance Counter 272 Save Performance Counter Settings 273 Restore Performance Counter Settings 273 Manage Performance Logs and Alerts 274 Create a Performance Log 274 Start Collecting Data 276 Stop Collecting Data 276 Query a Collection 277 Update a Collection 277 Delete a Collection 278 Create New Performance Logs from Existing Logs 278 Remove Performance Counters 281 Convert Event Trace Logs 281 Part VI: Performing Maintenance 283 Chapter 15: Performing Basic Maintenance 285 Configure the Server 286 Understand the SQL Syntax of WMIC 287 Use Aliases in WMIC 290 Get Help in WMIC 302 Format Data in WMIC 306 Translate Data in WMIC 310 Activate Windows 311 Perform an Activation 311 Display the Activation Information 312 Change the Product Key 312 Manage the System Time 312 Update the Time 313 Configure a Time Source 313 Obtain Time Settings Information 314 Manage the Boot Configuration 315 Enumerate the Configurations 315 Get BCDEdit Help 316 Edit an Existing Boot Setting 317 Change the Boot Sequence 318 Set the Default Boot Item 318 Chapter 16: Managing System Users 319 Audit User Access 320 List the Policies 321 Get a Policy 322 Set a Policy 326 Perform a Backup 327 Perform a Restore 327 Clear an Audit Policy 328 Remove an Audit Policy 328 Work with Group Policies 328 Obtain Group Policy Results 328 Manage Group Policies 330 Obtain Session Status Information 331 Get Process Information 331 Get Session Information 331 Get User Information 332 Get Terminal Server Information 332 Get the User’s Identity 332 Obtain User Logon Information 333 Discover User Identity 333 Chapter 17: Securing the System 335 Add Virus and External Intrusion Protection 337 Remove Viruses 337 Detect and Remove Malicious Software 338 Verify System Files 339 Verify Drivers 340 Change the Verifier Settings 342 Configure Local Security Policies 344 Perform an Analysis 344 Configure Security Policies 345 Export Policies 345 Import Policies 346 Validate a Policy File 346 Work with General Applications 347 Use TaskKill and TaskList Filters 347 Terminate Tasks 350 List Applications 350 List Services 351 Chapter 18: Interacting with the Registry 353 Perform Basic Registry Tasks 354 Export a Registry Key 356 Import a Registry Key 357 Delete a Registry Key 357 Save the Registry 358 Restore the Registry 358 Use the SCRegEdit Script 358 Set Automatic Updates 359 Enable Terminal Services 359 Configure the IP Security (IPSec) Monitor 360 Manage the DNS Service Priority and Weight 361 Use the Command Line Reference 361 Manage the Registry 362 Understand the Registry Settings 362 Query a Registry Entry 363 Add a Registry Entry 364 Delete a Registry Entry 365 Copy a Registry Entry 366 Compare Registry Entries 366 Export Registry Entries 367 Import Registry Entries 367 Restore Registry Entries 368 Part VII: Creating Batch Files 369 Chapter 19: Changing the Batch File Environment 371 Use the CMD Switches 372 Configure the Command Interpreter in the Registry 375 Use Command Extensions 377 Modify Config.NT 380 Use ANSI.SYS to Control the Environment 382 Set the Command Interpreter Location 382 Run Character Mode Applications Only 383 Display the Config.NT Commands 383 Control the Expanded Memory EMM Entry 383 Set the Number of Accessible Files 384 Control Extended Memory with HIMEM.SYS 385 Modify AutoExec.NT 387 Set the Code Page Number with the CHCP Utility 387 Add DPMI Support Using the DosX Utility 388 Enable Graphics Character Support with the GrafTabl Utility 389 Save Memory Using the LH Command 389 Install the Network Redirector Using the ReDir Utility 389 Chapter 20: Working at the Command Prompt 391 Redirect Command Line Output to the Clipboard 392 Manage Usernames and Passwords 393 Display Usernames 393 Create Users 394 Delete Users 394 Change Screen Colors 395 Configure the System Date 396 Configure the System Time 396 Change the Command Window Title 397 Chapter 21: Creating and Testing Batch Files 399 Use Batch File Commands 400 Employ the Call Command 401 Employ the Choice Command 403 Employ the Echo Command 406 Employ the Exit Command 406 Employ the ForFiles Utility 407 Employ the For Command 409 Employ the GoTo Command 414 Employ the If Command 414 Employ the Pause Command 418 Employ the Prompt Command 418 Employ the Rem Command 419 Employ the TimeOut Utility 420 Test Batch Files 420 Add Debug Information to Batch Files 421 Identify Batch Files and Their Actions 425 Use a Centralized Data Store 428 Store and Retrieve Directories with the PushD and PopD Commands 430 Part VIII: Creating Scripts 433 Chapter 22: Discovering Scripting Basics 435 Use Scripting Languages 436 Learn the Basics of JavaScript 436 Learn the Basics of VBScript 438 Use the Windows Scripting File 439 Execute Scripts 442 Run Scripts with the CScript and WScript Utilities 442 Configure the Host and Property Page Options 444 Chapter 23: Using the Scripting Objects 447 Use the WScript Object 449 Use the WScript Properties 449 Use the WScript Methods 451 Use the WScript.WshArguments Object 454 Use the WScript.WshShell Object 455 Use the WScript.WshNetwork Object 457 Use the WScript.WshNetwork Properties 457 Use the WScript.WshNetwork Methods 458 Create a Basic Script 462 Script the Command Line and System Environment 463 Script the Registry 466 Create .LNK Files 468 Chapter 24: Creating Advanced Scripting Examples 471 Script Registry Entries 472 Script Networking Solutions 473 Discover the NetSH Helper List 473 Get NetSH Help 474 Execute NetSH Commands 476 Understand the Basic NetSH Contexts 476 Use the Root Context Commands 478 Impersonate a User 480 Change the Environment 481 Change Logons, Ports, and Users 481 Enable or Disable Session Logons Directly 482 List COM Port Mappings 482 Modify the Install Mode 482 Map a Network Drive 483 Create a .CSV File 487 Appendix A: Alphabetical Command List 493 Appendix B: Topical Command List 505 Appendix C: Listing of Best Practices 521 Always Verify the Data 522 Real Administrators Use Help 523 Test Your Theories on a Test System 524 Use Batch Files, Scripts, and Written Procedures 525 Make Backups 526 Perform User-Specific Changes during Downtime 526 Index 529
£22.95
John Wiley & Sons Inc Data Mining Techniques
Book SynopsisThe leading introductory book on data mining, fully updated and revised! When Berry and Linoff wrote the first edition of Data Mining Techniques in the late 1990s, data mining was just starting to move out of the lab and into the office and has since grown to become an indispensable tool of modern business.Table of ContentsIntroduction xxxvii Chapter 1 What Is Data Mining and Why Do It? 1 What Is Data Mining? 2 Data Mining Is a Business Process 2 Large Amounts of Data 3 Meaningful Patterns and Rules 3 Data Mining and Customer Relationship Management 4 Why Now? 6 Data Is Being Produced 6 Data Is Being Warehoused 6 Computing Power Is Affordable 7 Interest in Customer Relationship Management Is Strong 7 Commercial Data Mining Software Products Have Become Available 8 Skills for the Data Miner 9 The Virtuous Cycle of Data Mining 9 A Case Study in Business Data Mining 11 Identifying BofA’s Business Challenge 12 Applying Data Mining 12 Acting on the Results 13 Measuring the Effects of Data Mining 14 Steps of the Virtuous Cycle 15 Identify Business Opportunities 16 Transform Data into Information 17 Act on the Information 19 Measure the Results 20 Data Mining in the Context of the Virtuous Cycle 23 Lessons Learned 26 Chapter 2 Data Mining Applications in Marketing and Customer Relationship Management 27 Two Customer Lifecycles 27 The Customer’s Lifecycle 28 The Customer Lifecycle 28 Subscription Relationships versus Event-Based Relationships 30 Organize Business Processes Around the Customer Lifecycle 32 Customer Acquisition 33 Customer Activation 36 Customer Relationship Management 37 Winback 38 Data Mining Applications for Customer Acquisition 38 Identifying Good Prospects 39 Choosing a Communication Channel 39 Picking Appropriate Messages 40 A Data Mining Example: Choosing the Right Place to Advertise 40 Who Fits the Profile? 41 Measuring Fitness for Groups of Readers 44 Data Mining to Improve Direct Marketing Campaigns 45 Response Modeling 46 Optimizing Response for a Fixed Budget 47 Optimizing Campaign Profitability 49 Reaching the People Most Influenced by the Message 53 Using Current Customers to Learn About Prospects 54 Start Tracking Customers Before They Become “Customers” 55 Gather Information from New Customers 55 Acquisition-Time Variables Can Predict Future Outcomes 56 Data Mining Applications for Customer Relationship Management 56 Matching Campaigns to Customers 56 Reducing Exposure to Credit Risk 58 Determining Customer Value 59 Cross-selling, Up-selling, and Making Recommendations 60 Retention 60 Recognizing Attrition 60 Why Attrition Matters 61 Different Kinds of Attrition 62 Different Kinds of Attrition Model 63 Beyond the Customer Lifecycle 64 Lessons Learned 65 Chapter 3 The Data Mining Process 67 What Can Go Wrong? 68 Learning Things That Aren’t True 68 Learning Things That Are True, but Not Useful 73 Data Mining Styles 74 Hypothesis Testing 75 Directed Data Mining 81 Undirected Data Mining 81 Goals, Tasks, and Techniques 82 Data Mining Business Goals 82 Data Mining Tasks 83 Data Mining Techniques 88 Formulating Data Mining Problems: From Goals to Tasks to Techniques 88 What Techniques for Which Tasks? 95 Is There a Target or Targets? 96 What Is the Target Data Like? 96 What Is the Input Data Like? 96 How Important Is Ease of Use? 97 How Important Is Model Explicability? 97 Lessons Learned 98 Chapter 4 Statistics 101: What You Should Know About Data 101 Occam’s Razor 103 Skepticism and Simpson’s Paradox 103 The Null Hypothesis 104 P-Values 105 Looking At and Measuring Data 106 Categorical Values 106 Numeric Variables 117 A Couple More Statistical Ideas 120 Measuring Response 120 Standard Error of a Proportion 121 Comparing Results Using Confidence Bounds 123 Comparing Results Using Difference of Proportions 124 Size of Sample 125 What the Confidence Interval Really Means 126 Size of Test and Control for an Experiment 127 Multiple Comparisons 129 The Confidence Level with Multiple Comparisons 129 Bonferroni’s Correction 129 Chi-Square Test 130 Expected Values 130 Chi-Square Value 132 Comparison of Chi-Square to Difference of Proportions 134 An Example: Chi-Square for Regions and Starts 134 Case Study: Comparing Two Recommendation Systems with an A/B Test 138 First Metric: Participating Sessions 140 Data Mining and Statistics 144 Lessons Learned 148 Chapter 5 Descriptions and Prediction: Profiling and Predictive Modeling 151 Directed Data Mining Models 152 Defining the Model Structure and Target 152 Incremental Response Modeling 154 Model Stability 156 Time-Frames in the Model Set 157 Directed Data Mining Methodology 159 Step 1: Translate the Business Problem into a Data Mining Problem 161 How Will Results Be Used? 163 How Will Results Be Delivered? 163 The Role of Domain Experts and Information Technology 164 Step 2: Select Appropriate Data 165 What Data Is Available? 166 How Much Data Is Enough? 167 How Much History Is Required? 167 How Many Variables? 168 What Must the Data Contain? 168 Step 3: Get to Know the Data 169 Examine Distributions 169 Compare Values with Descriptions 170 Validate Assumptions 170 Ask Lots of Questions 171 Step 4: Create a Model Set 172 Assembling Customer Signatures 172 Creating a Balanced Sample 172 Including Multiple Timeframes 174 Creating a Model Set for Prediction 174 Creating a Model Set for Profiling 176 Partitioning the Model Set 176 Step 5: Fix Problems with the Data 177 Categorical Variables with Too Many Values 177 Numeric Variables with Skewed Distributions and Outliers 178 Missing Values 178 Values with Meanings That Change over Time 179 Inconsistent Data Encoding 179 Step 6: Transform Data to Bring Information to the Surface 180 Step 7: Build Models 180 Step 8: Assess Models 180 Assessing Binary Response Models and Classifiers 181 Assessing Binary Response Models Using Lift 182 Assessing Binary Response Model Scores Using Lift Charts 184 Assessing Binary Response Model Scores Using Profitability Models 185 Assessing Binary Response Models Using ROC Charts 186 Assessing Estimators 188 Assessing Estimators Using Score Rankings 189 Step 9: Deploy Models 190 Practical Issues in Deploying Models 190 Optimizing Models for Deployment 191 Step 10: Assess Results 191 Step 11: Begin Again 193 Lessons Learned 193 Chapter 6 Data Mining Using Classic Statistical Techniques 195 Similarity Models 196 Similarity and Distance 196 Example: A Similarity Model for Product Penetration 197 Table Lookup Models 203 Choosing Dimensions 204 Partitioning the Dimensions 205 From Training Data to Scores 205 Handling Sparse and Missing Data by Removing Dimensions 205 RFM: A Widely Used Lookup Model 206 RFM Cell Migration 207 RFM and the Test-and-Measure Methodology 208 RFM and Incremental Response Modeling 209 Naïve Bayesian Models 210 Some Ideas from Probability 210 The Naïve Bayesian Calculation 212 Comparison with Table Lookup Models 213 Linear Regression 213 The Best-fit Line 215 Goodness of Fit 217 Multiple Regression 220 The Equation 220 The Range of the Target Variable 221 Interpreting Coefficients of Linear Regression Equations 221 Capturing Local Effects with Linear Regression 223 Additional Considerations with Multiple Regression 224 Variable Selection for Multiple Regression 225 Logistic Regression 227 Modeling Binary Outcomes 227 The Logistic Function 229 Fixed Effects and Hierarchical Effects 231 Hierarchical Effects 232 Within and Between Effects 232 Fixed Effects 233 Lessons Learned 234 Chapter 7 Decision Trees 237 What Is a Decision Tree and How Is It Used? 238 A Typical Decision Tree 238 Using the Tree to Learn About Churn 240 Using the Tree to Learn About Data and Select Variables 241 Using the Tree to Produce Rankings 243 Using the Tree to Estimate Class Probabilities 243 Using the Tree to Classify Records 244 Using the Tree to Estimate Numeric Values 244 Decision Trees Are Local Models 245 Growing Decision Trees 247 Finding the Initial Split 248 Growing the Full Tree 251 Finding the Best Split 252 Gini (Population Diversity) as a Splitting Criterion 253 Entropy Reduction or Information Gain as a Splitting Criterion 254 Information Gain Ratio 256 Chi-Square Test as a Splitting Criterion 256 Incremental Response as a Splitting Criterion 258 Reduction in Variance as a Splitting Criterion for Numeric Targets 259 F Test 262 Pruning 262 The CART Pruning Algorithm 263 Pessimistic Pruning: The C5.0 Pruning Algorithm 267 Stability-Based Pruning 268 Extracting Rules from Trees 269 Decision Tree Variations 270 Multiway Splits 270 Splitting on More Than One Field at a Time 271 Creating Nonrectangular Boxes 271 Assessing the Quality of a Decision Tree 275 When Are Decision Trees Appropriate? 276 Case Study: Process Control in a Coffee Roasting Plant 277 Goals for the Simulator 277 Building a Roaster Simulation 278 Evaluation of the Roaster Simulation 278 Lessons Learned 279 Chapter 8 Artificial Neural Networks 281 A Bit of History 282 The Biological Model 283 The Biological Neuron 285 The Biological Input Layer 286 The Biological Output Layer 287 Neural Networks and Artificial Intelligence 287 Artificial Neural Networks 288 The Artificial Neuron 288 The Multi-Layer Perceptron 291 A Network Example 292 Network Topologies 293 A Sample Application: Real Estate Appraisal 295 Training Neural Networks 299 How Does a Neural Network Learn Using Back Propagation? 299 Pruning a Neural Network 300 Radial Basis Function Networks 303 Overview of RBF Networks 303 Choosing the Locations of the Radial Basis Functions 305 Universal Approximators 305 Neural Networks in Practice 308 Choosing the Training Set 309 Coverage of Values for All Features 309 Number of Features 310 Size of Training Set 310 Number and Range of Outputs 310 Rules of Thumb for Using MLPs 310 Preparing the Data 311 Interpreting the Output from a Neural Network 313 Neural Networks for Time Series 315 Time Series Modeling 315 A Neural Network Time Series Example 316 Can Neural Network Models Be Explained? 317 Sensitivity Analysis 318 Using Rules to Describe the Scores 318 Lessons Learned 319 Chapter 9 Nearest Neighbor Approaches: Memory-Based Reasoning and Collaborative Filtering 321 Memory-Based Reasoning 322 Look-Alike Models 323 Example: Using MBR to Estimate Rents in Tuxedo, New York 324 Challenges of MBR 327 Choosing a Balanced Set of Historical Records 328 Representing the Training Data 328 Determining the Distance Function, Combination Function, and Number of Neighbors 331 Case Study: Using MBR for Classifying Anomalies in Mammograms 331 The Business Problem: Identifying Abnormal Mammograms 332 Applying MBR to the Problem 332 The Total Solution 334 Measuring Distance and Similarity 335 What Is a Distance Function? 335 Building a Distance Function One Field at a Time 337 Distance Functions for Other Data Types 340 When a Distance Metric Already Exists 341 The Combination Function: Asking the Neighbors for Advice 342 The Simplest Approach: One Neighbor 342 The Basic Approach for Categorical Targets: Democracy 342 Weighted Voting for Categorical Targets 344 Numeric Targets 344 Case Study: Shazam — Finding Nearest Neighbors for Audio Files 345 Why This Feat Is Challenging 346 The Audio Signature 347 Measuring Similarity 348 Collaborative Filtering: A Nearest-Neighbor Approach to Making Recommendations 351 Building Profiles 352 Comparing Profiles 352 Making Predictions 353 Lessons Learned 354 Chapter 10 Knowing When to Worry: Using Survival Analysis to Understand Customers 357 Customer Survival 360 What Survival Curves Reveal 360 Finding the Average Tenure from a Survival Curve 362 Customer Retention Using Survival 364 Looking at Survival as Decay 365 Hazard Probabilities 367 The Basic Idea 368 Examples of Hazard Functions 369 Censoring 371 The Hazard Calculation 372 Other Types of Censoring 375 From Hazards to Survival 376 Retention 376 Survival 378 Comparison of Retention and Survival 378 Proportional Hazards 380 Examples of Proportional Hazards 381 Stratification: Measuring Initial Effects on Survival 382 Cox Proportional Hazards 382 Survival Analysis in Practice 385 Handling Different Types of Attrition 385 When Will a Customer Come Back? 387 Understanding Customer Value 389 Forecasting 392 Hazards Changing over Time 393 Lessons Learned 394 Chapter 11 Genetic Algorithms and Swarm Intelligence 397 Optimization 398 What Is an Optimization Problem? 398 An Optimization Problem in Ant World 399 E Pluribus Unum 400 A Smarter Ant 401 Genetic Algorithms 403 A Bit of History 404 Genetics on Computers 404 Representing the Genome 413 Schemata: The Building Blocks of Genetic Algorithms 414 Beyond the Simple Algorithm 417 The Traveling Salesman Problem 418 Exhaustive Search 419 A Simple Greedy Algorithm 419 The Genetic Algorithms Approach 419 The Swarm Intelligence Approach 420 Case Study: Using Genetic Algorithms for Resource Optimization 421 Case Study: Evolving a Solution for Classifying Complaints 423 Business Context 424 Data 425 The Comment Signature 425 The Genomes 426 The Fitness Function 427 The Results 427 Lessons Learned 427 Chapter 12 Tell Me Something New: Pattern Discovery and Data Mining 429 Undirected Techniques, Undirected Data Mining 431 Undirected versus Directed Techniques 431 Undirected versus Directed Data Mining 431 Case Study: Undirected Data Mining Using Directed Techniques 432 What is Undirected Data Mining? 435 Data Exploration 435 Segmentation and Clustering 436 Target Variable Definition, When the Target Is Not Explicit 438 Simulation, Forecasting, and Agent-Based Modeling 443 Methodology for Undirected Data Mining 455 There Is No Methodology 456 Things to Keep in Mind 456 Lessons Learned 457 Chapter 13 Finding Islands of Similarity: Automatic Cluster Detection 459 Searching for Islands of Simplicity 461 Customer Segmentation and Clustering 461 Similarity Clusters 463 Tracking Campaigns by Cluster-Based Segments 464 Clustering Reveals an Overlooked Market Segment 466 Fitting the Troops 467 The K-Means Clustering Algorithm 468 Two Steps of the K-Means Algorithm 468 Voronoi Diagrams and K-Means Clusters 471 Choosing the Cluster Seeds 473Choosing K 473 Using K-Means to Detect Outliers 474 Semi-Directed Clustering 475 Interpreting Clusters 475 Characterizing Clusters by Their Centroids 476 Characterizing Clusters by What Differentiates Them 477 Using Decision Trees to Describe Clusters 478 Evaluating Clusters 479 Cluster Measurements and Terminology 480 Cluster Silhouettes 480 Limiting Cluster Diameter for Scoring 483 Case Study: Clustering Towns 484 Creating Town Signatures 484 Creating Clusters 486 Determining the Right Number of Clusters 486 Evaluating the Clusters 487 Using Demographic Clusters to Adjust Zone Boundaries 488 Business Success 490 Variations on K-Means 490 K-Medians, K-Medoids, and K-Modes 490 The Soft Side of K-Means 494 Data Preparation for Clustering 495 Scaling for Consistency 496 Use Weights to Encode Outside Information 496 Selecting Variables for Clustering 497 Lessons Learned 497 Chapter 14 Alternative Approaches to Cluster Detection 499 Shortcomings of K-Means 500 Reasonableness 500 An Intuitive Example 501 Fixing the Problem by Changing the Scales 503 What This Means in Practice 504 Gaussian Mixture Models 505 Adding “Gaussians” to K-Means 505 Back to Gaussian Mixture Models 508 Scoring GMMs 510 Applying GMMs 511 Divisive Clustering 513 A Decision Tree–Like Method for Clustering 513 Scoring Divisive Clusters 515 Clusters and Trees 515 Agglomerative (Hierarchical) Clustering 516 Overview of Agglomerative Clustering Methods 516 Clustering People by Age: An Example of An Agglomerative Clustering Algorithm 520 Scoring Agglomerative Clusters 522 Limitations of Agglomerative Clustering 523 Agglomerative Clustering in Practice 525 Combining Agglomerative Clustering and K-Means 526 Self-Organizing Maps 527 What Is a Self-Organizing Map? 527 Training an SOM 530 Scoring an SOM 531 The Search Continues for Islands of Simplicity 532 Lessons Learned 533 Chapter 15 Market Basket Analysis and Association Rules 535 Defining Market Basket Analysis 536 Four Levels of Market Basket Data 537 The Foundation of Market Basket Analysis: Basic Measures 539 Order Characteristics 540 Item (Product) Popularity 541 Tracking Marketing Interventions 542 Case Study: Spanish or English 543 The Business Problem 543 The Data 544 Defining “Hispanicity” Preference 545 The Solution 546 Association Analysis 547 Rules Are Not Always Useful 548 Item Sets to Association Rules 551 How Good Is an Association Rule? 553 Building Association Rules 555 Choosing the Right Set of Items 556 Anonymous Versus Identified 561 Generating Rules from All This Data 561 Overcoming Practical Limits 565 The Problem of Big Data 567 Extending the Ideas 569 Different Items on the Right- and Left-Hand Sides 569 Using Association Rules to Compare Stores 570 Association Rules and Cross-Selling 572 A Typical Cross-Sell Model 572 A More Confident Approach to Product Propensities 573 Results from Using Confidence 574 Sequential Pattern Analysis 574 Finding the Sequences 575 Sequential Association Rules 578 Sequential Analysis Using Other Data Mining Techniques 579 Lessons Learned 579 Chapter 16 Link Analysis 581 Basic Graph Theory 582 What Is a Graph? 582 Directed Graphs 584 Weighted Graphs 585 Seven Bridges of Königsberg 585 Detecting Cycles in a Graph 588 The Traveling Salesman Problem Revisited 589 Social Network Analysis 593 Six Degrees of Separation 593 What Your Friends Say About You 595 Finding Childcare Benefits Fraud 596 Who Responds to Whom on Dating Sites 597 Social Marketing 598 Mining Call Graphs 598 Case Study: Tracking Down the Leader of the Pack 601 The Business Goal 601 The Data Processing Challenge 601 Finding Social Networks in Call Data 602 How the Results Are Used for Marketing 602 Estimating Customer Age 603 Case Study: Who Is Using Fax Machines from Home? 604 Why Finding Fax Machines Is Useful 604 How Do Fax Machines Behave? 604 A Graph Coloring Algorithm 605 “Coloring” the Graph to Identify Fax Machines 606 How Google Came to Rule the World 607 Hubs and Authorities 608 The Details 609 Hubs and Authorities in Practice 611 Lessons Learned 612 Chapter 17 Data Warehousing, OLAP, Analytic Sandboxes, and Data Mining 613 The Architecture of Data 615 Transaction Data, the Base Level 616 Operational Summary Data 617 Decision-Support Summary Data 617 Database Schema/Data Models 618 Metadata 623 Business Rules 623 A General Architecture for Data Warehousing 624 Source Systems 624 Extraction, Transformation, and Load 626 Central Repository 627 Metadata Repository 630 Data Marts 630 Operational Feedback 631 Users and Desktop Tools 631 Analytic Sandboxes 633 Why Are Analytic Sandboxes Needed? 634 Technology to Support Analytic Sandboxes 636 Where Does OLAP Fit In? 639 What’s in a Cube? 641 Star Schema 646 OLAP and Data Mining 648 Where Data Mining Fits in with Data Warehousing 650 Lots of Data 651 Consistent, Clean Data 651 Hypothesis Testing and Measurement 652 Scalable Hardware and RDBMS Support 653 Lessons Learned 653 Chapter 18 Building Customer Signatures 655 Finding Customers in Data 656 What Is a Customer? 657 Accounts? Customers? Households? 658 Anonymous Transactions 658 Transactions Linked to a Card 659 Transactions Linked to a Cookie 659 Transactions Linked to an Account 660 Transactions Linked to a Customer 661 Designing Signatures 661 Is a Customer Signature Necessary? 666 What Does a Row Represent? 666 Will the Signature Be Used for Predictive Modeling? 671 Has a Target Been Defined? 672 Are There Constraints Imposed by the Particular Data Mining Techniques to be Employed? 672 Which Customers Will Be Included? 673 What Might Be Interesting to Know About Customers? 673 What a Signature Looks Like 674 Process for Creating Signatures 677 Some Data Is Already at the Right Level of Granularity 678 Pivoting a Regular Time Series 679 Aggregating Time-Stamped Transactions 680 Dealing with Missing Values 685 Missing Values in Source Data 685 Unknown or Non-Existent? 687 What Not to Do 687 Things to Consider 689 Lessons Learned 691 Chapter 19 Derived Variables: Making the Data Mean More 693 Handset Churn Rate as a Predictor of Churn 694 Single-Variable Transformations 696 Standardizing Numeric Variables 696 Turning Numeric Values into Percentiles 697 Turning Counts into Rates 698 Relative Measures 699 Replacing Categorical Variables with Numeric Ones 700 Combining Variables 707 Classic Combinations 707 Combining Highly Correlated Variables 710 Rent to Home Value 712 Extracting Features from Time Series 718 Trend 719 Seasonality 721 Extracting Features from Geography 722 Geocoding 722 Mapping 723 Using Geography to Create Relative Measures 724 Using Past Values of the Target Variable 725 Using Model Scores as Inputs 725 Handling Sparse Data 726 Account Set Patterns 726 Binning Sparse Values 727 Capturing Customer Behavior from Transactions 727 Widening Narrow Data 728 Sphere of Influence as a Predictor of Good Customers 728 An Example: Ratings to Rater Profile 730 Sample Fields from the Rater Signature 730 The Rating Signature and Derived Variables 732 Lessons Learned 733 Chapter 20 Too Much of a Good Thing? Techniques for Reducing the Number of Variables 735 Problems with Too Many Variables 736 Risk of Correlation Among Input Variables 736 Risk of Overfitting 738 The Sparse Data Problem 738 Visualizing Sparseness 739 Independence 740 Exhaustive Feature Selection 743 Flavors of Variable Reduction Techniques 744 Using the Target 744 Original versus New Variables 744 Sequential Selection of Features 745 The Traditional Forward Selection Methodology 745 Forward Selection Using a Validation Set 747 Stepwise Selection 748 Forward Selection Using Non-Regression Techniques 748 Backward Selection 748 Undirected Forward Selection 749 Other Directed Variable Selection Methods 749 Using Decision Trees to Select Variables 750 Variable Reduction Using Neural Networks 752 Principal Components 753 What Are Principal Components? 753 Principal Components Example 758 Principal Component Analysis 763 Factor Analysis 767 Variable Clustering 768 Example of Variable Clusters 768 Using Variable Clusters 770 Hierarchical Variable Clustering 770 Divisive Variable Clustering 773 Lessons Learned 774 Chapter 21 Listen Carefully to What Your Customers Say: Text Mining 775 What Is Text Mining? 776 Text Mining for Derived Columns 776 Beyond Derived Features 777 Text Analysis Applications 778 Working with Text Data 781 Sources of Text 781 Language Effects 782 Basic Approaches to Representing Documents 783 Representing Documents in Practice 784 Documents and the Corpus 786 Case Study: Ad Hoc Text Mining 786 The Boycott 787 Business as Usual 787 Combining Text Mining and Hypothesis Testing 787 The Results 788 Classifying News Stories Using MBR 789 What Are the Codes? 789 Applying MBR 790 The Results 793 From Text to Numbers 794 Starting with a “Bag of Words” 794 Term-Document Matrix 796 Corpus Effects 797 Singular Value Decomposition (SVD) 798 Text Mining and Naïve Bayesian Models 800 Naïve Bayesian in the Text World 801 Identifying Spam Using Naïve Bayesian 801 Sentiment Analysis 806 DIRECTV: A Case Study in Customer Service 809 Background 809 Applying Text Mining 811 Taking the Technical Approach 814 Not an Iterative Process 818 Continuing to Benefit 818 Lessons Learned 819 Index 821
£37.05
John Wiley & Sons Inc Optical CDMA Networks
Book SynopsisThis book focuses heavily on the principles, analysis and applications of code-division multiple-access (CDMA) techniques in optical communication systems and networks. In this book, the authors intimately discuss modern optical networks and their applications in current and emerging communication technologies, evaluating the quality, speed and number of supported services. In particular, principles and fundamentals of optical CDMA techniques from beginner to advanced levels are heavily covered. Furthermore, the authors concentrate on methods and techniques of various encoding and decoding schemes and their structures, as well as analysis of optical CDMA systems with various transceiver models including advanced multi-level incoherent and coherent modulations with the architecture of access/aggregation networks in mind. Moreover, authors examine intriguing topics of optical CDMA networking, compatibility with IP networks, and implementation of optical multi-rate multiTable of ContentsList of Figures xiii List of Tables xxv Preface xxvii Acknowledgements xxxiii 1 Introduction to Optical Communications 1 1.1 Evolution of Lightwave Technology 1 1.2 Laser Technologies 3 1.3 Optical Fibre Communication Systems 4 1.4 Lightwave Technology in Future 7 1.5 Optical Lightwave Spectrum 7 1.6 Optical Fibre Transmission 9 1.7 Multiple Access Techniques 10 1.8 Spread Spectrum Communications Techniques 14 1.9 Motivations for Optical CDMA Communications 21 1.10 Access Networks Challenges 22 1.11 Summary 23 References 24 2 Optical Spreading Codes 29 2.1 Introduction 29 2.2 Bipolar Codes 30 2.3 Unipolar Codes: Optical Orthogonal Codes 37 2.4 Unipolar Codes: Prime Code Families 41 2.5 Codes with Ideal In-Phase Cross-Correlation 62 2.6 Multidimensional Optical Codes 76 2.7 Channel Encoding in OCDMA Systems 84 2.8 Turbo-Coded Optical CDMA 100 2.9 Summary 110 References 111 3 Optical CDMA Review 115 3.1 Introduction 115 3.2 Optical Coding Principles 115 3.3 OCDMA Networking: Users Are Codes 117 3.4 Optical CDMA Techniques 119 3.5 Free-Space and Atmospheric Optical CDMA 126 3.6 Summary 128 References 128 4 Spectrally Encoded OCDMA Networks 133 4.1 Introduction 133 4.2 Spectral-Amplitude-Coding Schemes 134 4.3 System Considerations 141 4.4 Gaussian Approach Analysis 144 4.5 Negative Binomial Approach Analysis 153 4.6 Spectral-Phase-Coding Schemes 164 4.7 Summary 167 References 167 5 Incoherent Temporal OCDMA Networks 171 5.1 Introduction 171 5.2 PPM-OCDMA Signalling 172 5.3 PPM-OCDMA Transceiver Architecture 173 5.4 PPM-OCDMA Performance Analysis 180 5.5 Discussion of Results 183 5.6 Overlapping PPM-OCDMA Signalling 187 5.7 OPPM-OCDMA Transceiver Architecture 188 5.8 OPPM-OCDMA Performance Analysis 196 .9 Discussion of Results 203 5.10 Analysis of Throughput 209 5.11 Summary 211 References 211 6 Coherent Temporal OCDMA Networks 213 6.1 Introduction 213 6.2 Coherent Homodyne BPSK-OCDMA Architecture 214 6.3 Coherent Heterodyne BPSK-OCDMA Architecture 222 6.4 Summary 229 References 230 7 Hybrid Temporal Coherent and Incoherent OCDMA Networks 231 7.1 Introduction 231 7.2 Coherent Transmitter with Incoherent Receiver 232 7.3 Analysis of Transceivers with MAI Cancellation 235 7.4 Results and Throughput Analysis 239 7.5 Summary 244 References 244 8 Optical CDMA with Polarization Modulations 245 8.1 Introduction 245 8.2 Optical Polarization Shift Keying (PolSK) 247 8.3 PolSK-OCDMA Transceiver Architecture 254 8.4 Evaluation of PolSK-OCDMA Transceiver Performance 263 8.5 Transceiver Architecture for Hybrid F-PolSK-OCDMA 265 8.6 Performance of F-PolSK-OCDMA Transceiver 273 8.7 Long-Haul PolSK Transmission 273 8.8 Summary 278 References 278 9 Optical CDMA Networking 281 9.1 Introduction 281 9.2 OCDMA-PON 289 9.3 OCDMA-PON Architecture 290 9.4 IP Traffic over OCDMA Networks 299 9.5 Random Access Protocols 308 9.6 Multi-Protocol Label Switching 330 9.7 Summary 342 References 344 10 Services Differentiation and Quality of Services in Optical CDMA Networks 347 10.1 Introduction 347 10.2 Differentiated Services in Optical CDMA 351 10.3 Variable-Weight Optical Spreading Codes 354 10.4 Variable-Length Optical Spreading Codes 364 10.5 Multirate Differentiated Services in OCDMA Networks 376 10.6 Summary 383 References 384 Index 387
£100.65
John Wiley & Sons Inc Personal Networks
Book SynopsisWritten by experts in the field, this book describes the Personal Network architecture and its various components This book focuses on networking and security aspects of Personal Networks (PNs). Given a single user, the authors propose an architecture for PNs in which devices are divided into one of two types of nodes: personal nodes and foreign nodes. Furthermore, the authors demonstrate the ways in which PNs can be formed in a self-organized and secure way, how they can be interconnected using infrastructure networks, how multiple PNs can be connected, and how their services and resources can be shared. In addition, the book shows how security and ease-of-use can be achieved through automatic configuration and how mobility can be supported through adaptability and self-organization. The motivations for the PN concept, the PN architecture, its functionalities and features, as well as future challenges are covered in depth. Finally, the authors consider the potential applicaTable of ContentsForeword. Preface. List of Abbreviations. 1 The Vision of Personal Networks. 1.1 Past, Present, and Future Telecommunication. 1.2 Personal Networks. 1.3 Some Typical PN Use-Case Scenarios. 1.4 Federations of Personal Networks. 1.5 Early Personal Network Implementations. 1.6 Expected Impact. 1.7 Summary. 2 Personal Networks User Requirements. 2.1 Ubiquitous Networking. 2.2 Heterogeneous Hardware Constraints. 2.3 Quality of Service and Reliability. 2.4 Name, Service, and Content Management. 2.5 Context Awareness. 2.6 Being Cognitive. 2.7 Security and Trust. 2.8 Privacy. 2.9 Usability. 2.10 Other Requirements. 2.11 Jane Revisited. 2.12 Summary. 3 Trends in Personal Networks. 3.1 Wireless Communications. 3.2 Ad Hoc Networking. 3.3 WWRF Book of Visions. 3.4 Ubiquitous and Pervasive Computing and Communication. 3.5 Ambient Networks. 3.6 IST PACWOMAN and SHAMAN. 3.7 Personal Distributed Environment. 3.8 MyNet. 3.9 P2P Universal Computing Consortium. 3.10 More Trends. 3.11 Personal Networks and Current Trends. 3.12 Summary. 4 The Personal Network Architecture. 4.1 Terminology. 4.2 Personal and Foreign Nodes. 4.3 The Three Level Architecture View. 4.4 Personalization of Nodes. 4.5 Cluster Organization. 4.6 Personal Network Organization. 4.7 Foreign Communication. 4.8 Higher Layer Support Systems. 4.9 Federations of Personal Networks. 4.10 Discussion. 4.11 Summary. 5 Cluster Formation and Routing. 5.1 What is a Cluster? 5.2 Mobile Ad Hoc Network Technologies. 5.3 Cluster Formation and Maintenance. 5.4 Intra-Cluster Routing. 5.5 Summary. 6 Inter-Cluster Tunneling and Routing. 6.1 Inter-Cluster Tunneling Requirements. 6.2 IP Mobility. 6.3 PN Addressing. 6.4 Infrastructure Support. 6.5 Inter-Cluster Tunneling. 6.6 Inter-Cluster Routing. 6.7 Summary. 7 Foreign Communication. 7.1 Requirements for Foreign Communication. 7.2 Setting up Communication with Foreign Nodes. 7.3 Bridging Inside and Outside Protocols. 7.4 Mobility and Gateway Node Handover. 7.5 Summary. 8 Personal Network Application Support Systems. 8.1 Required PN Application Support. 8.2 Design of a PN Application Support System. 8.3 Service Discovery and Management Implementation. 8.4 An Implementation of Context Management. 8.5 Summary. 9 Personal Network Security. 9.1 Device Personalization. 9.2 Establishment of Secure Communication. 9.3 Secure Foreign Communication. 9.4 Anonymity. 9.5 Summary. 10 Personal Network Federations. 10.1 Examples. 10.2 Types of Federations. 10.3 Requirements. 10.4 Architecture of a Federation. 10.5 Life Cycle of a Federation. 10.6 Federation Access Control. 10.7 Federation Implementation Approaches. 10.8 Security. 10.9 Summary. 11 Personal Network Prototypes. 11.1 The TU Delft Prototype. 11.2 The PNP2008 Prototypes. 11.3 The MAGNET Prototype. 11.4 Summary. 12 The Future of Personal Networks. 12.1 Are We There Yet? 12.2 Future Directions. Appendix A Terminology. A.1 Connectivity Abstraction Level. A.2 Network Abstraction Level. A.3 Application and Service Abstraction Level. A.4 Personal Network Federations. References. Related Websites. Index.
£85.45
John Wiley & Sons Inc Principles of Wireless Access and Localization
Book SynopsisA comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques. The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking. Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the IEEE 802.11/WiFi wireless local area networks as well as IEEE 802.15 Bluetooth, ZigBee, Ultra Wideband (UWB), RF Microwave and body area networks used for sensor and ad hoc networks. The principles of wireless localization techniques using time-of-arrival and received-signal-strength of the wireless signal used in military and commercial applications in smart devices operating in urTable of ContentsPreface xv 1 Introduction 1 1.1 Introduction 1 1.2 Elements of Information Networks 3 1.3 Evolution of Wireless Access to the PSTN 17 1.4 Evolution of Wireless Access to the Internet 21 1.5 Evolution of Wireless Localization Technologies 27 1.6 Structure of this Book 29 Part I PRINCIPLES OF AIR–INTERFERENCE DESIGN 2 Characteristics of the Wireless Medium 39 2.1 Introduction 39 2.2 Modeling of Large-scale RSS, Path Loss, and Shadow Fading 45 2.3 Modeling of RSS Fluctuations and Doppler Spectrum 60 2.4 Wideband Modeling of Multipath Characteristics 72 2.5 Emerging Channel Models 79 Appendix A2: What Is the Decibel? 84 3 Physical Layer Alternatives forWireless Networks 99 3.1 Introduction 99 3.2 Physical Layer Basics: Data rate, Bandwidth, and Power 100 3.3 Performance in Multipath Wireless Channels 107 3.4 Wireless Transmission Techniques 112 3.5 Multipath Resistant Techniques 120 3.6 Coding Techniques for Wireless Communications 136 3.7 Cognitive Radio and Dynamic Spectrum Access 145 Appendix A3 145 4 Medium Access Methods 153 4.1 Introduction 153 4.2 Centralized Assigned-Access Schemes 155 4.3 Distributed Random Access for Data Oriented Networks 173 4.4 Integration of Voice and Data Traffic 195 Part II PRINCIPLES OF NETWORK INFRASTRUCTURE DESIGN 5 Deployment ofWireless Networks 217 5.1 Introduction 217 5.2 Wireless Network Architectures 218 5.3 Interference in Wireless Networks 224 5.4 Deployment of Wireless LANs 233 5.5 Cellular Topology, Cell Fundamentals, and Frequency Reuse 238 5.6 Capacity Expansion Techniques 248 5.7 Network Planning for CDMA Systems 268 5.8 Femtocells 270 6 Wireless Network Operations 275 6.1 Introduction 275 6.2 Cell Search and Registration 281 6.3 Mobility Management 283 6.4 Radio Resources and Power Management 301 7 Wireless Network Security 321 7.1 Introduction 321 7.2 Security in Wireless Local Networks 324 7.3 Security in Wireless Personal Networks 330 7.4 Security in Wide Area Wireless Networks 334 7.5 Miscellaneous Issues 340 Appendix A7: An Overview of Cryptography and Cryptographic Protocols 341 Part III WIRELESS LOCAL ACCESS 8 Wireless LANs 357 8.1 Introduction 357 8.2 Wireless Local Area Networks and Standards 363 8.3 IEEE 802.11 WLAN Operations 369 9 Low Power Sensor Networks 405 9.1 Introduction 405 9.2 Bluetooth 406 9.3 IEEE 802.15.4 and ZigBee 424 9.4 IEEE 802.15.6 Body Area Networks 434 10 GigabitWireless 447 10.1 Introduction 447 10.2 UWB Communications at 3.1–10.6 GHz 451 10.3 Gigabit Wireless at 60 GHz 467 Part IV WIDE AREA WIRELESS ACCESS 11 TDMA Cellular Systems 479 11.1 Introduction 479 11.2 What is TDMA Cellular? 480 11.3 Mechanisms to Support a Mobile Environment 486 11.4 Communication Protocols 491 11.5 Channel Models for Cellular Networks 501 11.6 Transmission Techniques in TDMA Cellular 508 11.7 Evolution of TDMA for Internet Access 512 12 CDMA Cellular Systems 519 12.1 Introduction 519 12.2 Why CDMA? 520 12.3 CDMA Based Cellular Systems 521 12.4 Direct Sequence Spread Spectrum 522 12.5 Communication Channels and Protocols in Example CDMA Systems 534 12.6 Cell Search, Mobility, and Radio Resource Management in CDMA 546 12.7 High Speed Packet Access 554 13 OFDM and MIMO Cellular Systems 561 13.1 Introduction 561 13.2 Why OFDM? 562 13.3 Multiple Input Multiple Output 572 13.4 WiMax 576 13.5 Long Term Evolution 582 13.6 LTE Advanced 591 Part V WIRELESS LOCALIZATION 14 Geolocation Systems 597 14.1 Introduction 597 14.2 What is Wireless Geolocation? 598 14.3 RF Location Sensing and Positioning Methodologies 602 14.4 Location Services Architecture for Cellular Systems 613 14.5 Positioning in Ad Hoc and Sensor Networks 620 15 Fundamentals of RF Localization 625 15.1 Introduction 625 15.2 Modeling of the Behavior of RF Sensors 626 15.3 Performance Bounds for Ranging 631 15.4 Wireless Positioning Algorithms 639 16 Wireless Localization in Practice 653 16.1 Introduction 653 16.2 Emergence of Wi-Fi Localization 653 16.3 Comparison of Wi-Fi Localization Systems 657 16.4 Practical TOA Measurement 665 16.5 Localization in the Absence of DP 669 16.6 Challenges in Localization inside the Human Body 675 References 687 Index 701
£87.26
John Wiley & Sons Inc LDAP Directories Building an Enterprise Directory
Book SynopsisProvides an introduction to the Lightweight Directory Access Protocol (LDAP) technology. This book offers a detailed overview of the real world applications of the technology. It offers an explanation of the technical details of LDAP and a step-by-step demonstration of how to implement an LDAP directory.Table of ContentsIntroduction. What is the Aim of this Book? Structure of the Book. For Whom is this Book Intended? FAQs. Acknowledgements. PART 1: DIRECTORIES AND THEIR APPLICATIONS. 1. Directories Overview. 2. The History of Directories and an Introduction to LDAP. 3. LDAP Directories and Their Applications. PART 2: THE LDAP STANDARD. 4. LDAP Standard and its Client-Server Model. 5. The LDAP Models. 6. LDAP Interfaces and the Future of the Standard. PART 3: THE DESIGN PHASE. 7. Functional Design. 8. Technical Design. 9. LDAP Tools and Applications. 10. Case Studies. 11. The Life Cycle of a Corporate Directory. PART 4: EXAMPLES OF CODE. 12. Examples of Code in C and C++. 13. Examples of ADSI Implementation. Index.
£30.00
John Wiley & Sons Inc IP Over WDM Electrical Electronics Engr
Book SynopsisFocusing on IP over WDM optical networks, this book summarizes the fundamental mechanisms and the development and deployment of WDM optical networks. It provides information on both the network and the software architectures needed to implement WDM enabled optical networks designed to transport IP traffic.Trade Review"Network engineering and planners...will be interested in this book.... Developers and architects...will also find the book useful." (Journal of Optical Networking, Vol. 2, No. 4, April 2003)Table of ContentsPreface. Acknowledgements. Introduction. Review. Characteristics of the Internet and IP Routing. WDM Optical Networks. IP over WDM. IP/WDM Network Control. IP/WDM Traffic Engineering. Other IP/WDM Specific Issues. Concluding Remarks. Bibliography. Web Site List. Acronym List. Index.
£92.86
John Wiley & Sons Inc Quality of Service in a Cisco Networking
Book SynopsisIn networks, Quality of Service (QoS) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and, to some extent, guaranteed in advance. QoS is of particular concern for the continuous transmission of high--bandwidth video and multimedia information.Table of ContentsPreface. 1. The Meaning of Quality of Service. Why QOS? Defining QOS. Book Preview. 2. Working at Layer 2. The IEEE 802.1p Signalling Technique. Configuring Cisco(r) Equipment. 3. QOS into the WAN. The IP Protocol Stack. Data Delivery. Queuing Addresses. The IPv4 Header. Router Queuing. First-in, First-out Queuing. Priority Queuing. Classifying Traffic Via the Arrival Interface. 4. Diffserv and MPLS. Differentiated Services. Supporting DiffServ in a Cisco Environment. Multi-Protocol Label Switching. Configuring MPLS. 5. The Resource Preservation Protocol. Understanding RSVP. Configuring RSVP. 6. QOS Enhancement Techniques. Enabling Static Routing. Enhancing the Address Resolution Process. Tailor the Access Line. Enabling RTP Header Compression. Enabling Other Compression Methods. Eliminate Directed Broadcasts. Enable Selective Acknowledgements. Enable Link Fragmentaton and Interleaving. 7. Monitoring Your Network. The Show Command. IP-Related Show Commands. Appendix: Testing Tools. Index.
£100.76
Wiley Symbian OS Communications Programming 2 Symbian
Book SynopsisA developera s guide to the Symbian OS (Operating System) Communications Architecture. The Symbian OS Communications Architecture is the cornerstone of Symbian OS -- enabling the combination of voice communications, wireless Internet access and computing functionality.Trade Review"...clear and detailed...the supporting text is lucid and clear..." (www.wirelessdevnet.com, 5 July 2002) "…something useful for everyone…the writing is clear, and the structure makes it easy to learn…" (Forum Nokia, 6 March 12003) "…written in a clear and accessible manner…" (CVu, June 2003)Table of ContentsPreface. Foreword. Section 1: The Basics of Symbian OS Communication. Introduction. Introduction to the Symbian Communication Architecture. Several Introductions to the Architecture Infrastructure. Transport Technologies. Look at Content Technologies. Security and Communication. Section 2: Programming using Symbian OS Communication. Getting Started with Communications Programming. Serial Communications. Communicating via Infrared: Serial Communications. Using Sockets. Communicating via Infrared: Using Sockets. Communicating with TCP/IP. Bluetooth Communications. Telephony. Sending and Receiving Messages. Browsable Content Technologies. Section 3: Miscellaneous Topics. Synchronization: PLP and SyncML. The Communications Database. Looking Ahead. Appendix A Developer Resources and Bibliography. Index.
£27.74
John Wiley & Sons Inc The Wireless Mobile Internet Architectures
Book SynopsisInternet based applications are the emerging major source of traffic for wireless networks. Soon we will all be able to access the Internet from our mobile phones, PDAs, hand--held devices, etc. This book describes the networking technologies that will enable the seamless transmission of data to us, wherever we are.Trade Review"...excellent text book style...essential reading for those interested in or studying the topic..." (TelecomWorldWire, 25 June 2003) "...an excellent addition to the literature on the wireless mobile Internet...a must-read for seasoned professionals and also for those who are new to the subject...." (Computing Reviews) "...easy-to-read reference text is essential reading for those interested in or studying the topic..." (M2 Best Books, 25 June 2003) "...a survival guide that helps introduce us to issues related to providing Internet networking for wireless mobile terminals..." (IEEE Communications Magazine, Dec 2003)Table of ContentsPreface. Acknowledgements. PART I: THE WIRELESS INTERNET. An Introduction to Wireless Mobile Internet. Wireless Cellular Data Networks. Cellular Mobile Networks. Mobile Networks of the Future. PART II: FUNDAMENTAL TOPICS IN WIRELESS IP. Quality of Service in a Mobile Environment. Traffic Modeling for Wireless IP. Traffic Management for Wireless IP. Mobility in Cellular Networks. Transport Protocols for Wireless IP. Internet Protocol for Wireless IP. PART III: ADVANCED TOPICS IN WIRELESS IP. Internet Perspectives on Wireless IP. Mobile Ad Hoc Networks and Future Challenges. Satellites in Wireless IP. Acronyms. Index. About the Author.
£100.76
John Wiley & Sons Inc Ethernet Networks 4e
Book SynopsisProvides the information needed to know to plan, implement, manage and upgrade Ethernet networks. This book helps to: improve your skills in employing Ethernet hubs, switches, and routers; learn how to set up and operate a wireless Local Area Network; discover how to extend a wired Ethernet via wireless LANs; and, understand cabling standards.Table of ContentsPreface. Acknowledgments. Introduction to Networking Concepts. Networking Standards. Ethernet Networks. Frame Operations. Networking Hardware and Software. Bridging and Switching Methods and Performance Issues. Routers. Wireless Ethernet. Security. Managing the Network. The Future of Ethernet. Index.
£88.16
John Wiley & Sons Inc Concept Data Analysis
Book SynopsisOffers a treatment of the full range of algorithms available for conceptual data analysis, spanning creation, maintenance, display and manipulation of concept lattices. The website accompanying this book allows you to gain a better understanding of the principles covered herein through working on the topics discussed.Table of ContentsForeword. Preface. I: THEORY AND ALGORITHMS. 1. Theoretical Foundations. 1.1 Basic Notions of Orders and Lattices. 1.2 Context, Concept, and Concept Lattice. 1.3 Many-valued Contexts. 1.4 Bibliographic Notes. 2. Algorithms. 2.1 Constructing Concept Lattices. 2.2 Incremental Lattice Update. 2.3 Visualization. 2.4 Adding Knowledge to Concept Lattices. 2.5 Bibliographic Notes. II: APPLICATIONS. 3. Information Retrieval. 3.1 Query Modification. 3.2 Document Ranking 4. Text Mining. 4.1 Mining the Content of the ACM Digital Library. 4.2 MiningWeb Retrieval Results with CREDO. 4.3 Bibliographic Notes. 5. Rule Mining. 5.1 Implications. 5.2 Functional Dependencies. 5.3 Association Rules. 5.4 Classification Rules. 5.5 Bibliographic Notes. References. Index.
£95.36
John Wiley & Sons Inc Web Server Programming
Book SynopsisWhen the web transitioned from a publishing to an interactive e--commerce medium, standardised web--browsers entered widespread use and developers were able to rely on a relatively stable client component.Table of ContentsPreface xi 1 Introduction 1 1.1 Servers on the Internet 2 1.2 Serving static hypertext 6 1.3 Serving dynamically generated hypertext 8 1.4 Forms and CGI 11 1.5 A CGI program and examples 18 1.6 Client-side scripting 29 Exercises 32 Practical 32 Short answer questions 32 Explorations 33 2 HTTP 35 2.1 Requests and responses 36 2.1.1 Requests 38 2.1.2 Responses 40 2.2 Authorization 41 2.3 Negotiated content 43 2.4 State in a stateless protocol 44 Exercises 45 Short answer questions 45 Explorations 45 3 Apache 47 3.1 Apache’s processes 48 3.2 Apache’s modules 51 3.3 Access controls 54 3.4 Logs 58 3.5 Generation of dynamic pages 61 3.6 Apache: installation and configuration 64 3.6.1 Basic installation and testing 64 3.6.2 The httpd.conf configuration file 67 Exercises 71 Practical 71 Short answer questions 75 Explorations 76 4 IP and DNS 77 4.1 IP addresses 78 4.2 IP addresses and names 81 4.3 Name resolution 84 4.4 BIND 86 Exercises 89 Practical 89 Short answer questions 90 Explorations 90 5 Perl 91 5.1 Perl’s origins 92 5.2 Running Perl, and the inevitable ‘Hello World’ program 93 5.3 Perl language 94 5.3.1 Scalar variables 95 5.3.2 Control structures 98 5.4 Perl core functions 101 5.5 ’CS1’ revisited: simple Perl programs 103 5.5.1 Burgers 103 5.5.2 ls -l 105 5.6 Beyond CS1: lists and arrays 108 5.6.1 Basics of lists 108 5.6.2 Two simple list examples 112 5.7 Subroutines 118 5.8 Hashes 120 5.9 An example using a hash and a list 122 5.10 Files and formatting 123 5.11 Regular expression matching 126 5.11.1 Basics of regex patterns 128 5.11.2 Finding ‘what matched?’ and other advanced features 131 5.12 Perl and the OS 136 5.12.1 Manipulating files and directories 137 5.12.2 Perl: processes 140 5.12.3 A ‘systems programming’ example 143 5.13 Networking 150 5.14 Modules 153 5.15 Databases 154 5.15.1 Basics 154 5.15.2 Database example 158 5.16 Perl: CGI 163 5.16.1 ’Roll your own’ CGI code 164 5.16.2 Perl: CGI module(s) 171 5.16.3 Security issues and CGI 173 Exercises 174 Practical 174 Short answer questions 180 Explorations 181 6 PHP4 183 6.1 PHP4’s origins 183 6.2 PHP language 187 6.2.1 Simple variables and data types 187 6.2.2 Operators 191 6.2.3 Program structure and flow control 191 6.2.4 Functions 193 6.3 Simple examples 194 6.4 Multi-page forms 198 6.5 File uploads 207 6.6 Databases 216 6.7 GD graphics library 227 6.8 State 238 Exercises 248 Practical 248 Short answer questions 257 Explorations 257 7 Java Servlets 259 7.1 Servlet overview 259 7.2 A first servlet example 261 7.2.1 Form and servlet code 263 7.2.2 Installation, Compilation, Deployment 265 7.2.3 web.xml deployment files 268 7.3 Sun’s servlet-related classes 269 7.4 Web application example: ‘Membership’ 276 7.5 Client state and sessions 290 7.6 Images 304 7.7 Security features 306 Exercises 328 Practical 328 Short answer questions 336 Explorations 336 Contents vii 8 JSP: Java Server Pages 337 8.1 JSP overview 337 8.2 The ‘Guru’ – a JSP example 340 8.2.1 The scriptlet Guru 340 8.2.2 The tagged Guru 343 8.3 Membership example 344 8.4 JSP: page contents 352 8.4.1 JSP directives 354 8.4.2 jsp: tag library 355 8.5 Servlet, bean and JSP examples 356 8.6 Tag libraries 368 8.6.1 Defining a simple customized action tag 369 8.6.2 Using tag libraries 373 Exercises 375 Practical 375 Short answer questions 379 Explorations 380 9 XML 381 9.1 XML overview 381 9.2 XML and friends 384 9.3 XSL, XSLT and XML display 391 9.4 XML and XSL generating WML 403 9.5 Simple API for XML 412 9.6 DOM – the Document Object Model 422 Exercises 428 Practical 428 Short answer questions 432 Explorations 433 10 Enterprise Java 435 10.1 EJB background 437 10.1.1 Smart beans in smarter containers 437 10.1.2 Distributed objects 438 10.2 EJB basics 441 10.2.1 Servers, containers and beans 441 10.2.2 The life of a bean 444 10.2.3 Classes and interfaces 444 10.2.4 EJB clients and EJB deployment 446 10.3 Session bean examples 447 10.3.1 Stateless server 447 10.3.2 Stateful server 453 10.4 An Entity bean 456 10.5 Real-world EJB 470 Exercises 485 Practical 485 Short answer questions 485 Explorations 485 11 Future technologies? 487 11.1 (Lack of) Speed kills 487 11.2 Personal internet presence 489 11.3 Peer-to-peer 490 11.4 ... and on to ‘Web Services’ 492 11.4.1 The existing world of distributed objects 492 11.4.2 Steps towards a future world of distributed objects 495 11.4.3 UDDI, WSDL and SOAP 498 11.4.4 Web service promises 509 Exercises 512 Explorations 512 Appendices A Minimalist guide to HTML and JavaScript 515 B Active Server Pages: ASP (scripting) 549 C .NET 573 Index 601
£39.85
John Wiley & Sons Inc Wireless Personal and Local Area Networks
Book SynopsisWireless Local Area Networks (LANs) represent the revolution occuring in wireless communications. These networks, allow small communities of office workers, industrial workers, hospital employees, technical teams, and others, to communicate via their mobile devices without having to worry about cables. This book covers this area.Table of ContentsPreface xi Structure of the book xii 1 Introduction 1 1.1 Definition and restriction 1 1.2 Overview of advantages and disadvantages 1 1.3 Applications overview 3 1.4 Market events 6 1.5 Organizations and governing bodies 12 2 Basics 17 2.1 History of wireless vs. wired 17 2.2 Technical communication models and classification 20 2.3 Demands on transfer networks 26 2.4 Properties of electromagnetic waves 28 2.5 Digital modulation technology 33 2.6 Channel access 38 2.7 Spread spectrum techniques 39 2.8 Orthogonal frequency division multiplex procedure 43 2.9 Antennae 2.10 Special features of wireless networks 47 2.11 Frequency allocations 48 3 Applications, devices and standards 51 3.1 Application scenarios 51 3.2 Device types 53 3.3 Standards 54 4 IEEE802.11 57 4.1 The standard 57 4.2 Architectures 59 4.3 Channel access 61 4.4 The Physical layer and bit transfer 81 4.5 Other services 86 4.6 Security 86 4.7 Extensions to the standard 88 5 Bluetooth 95 5.1 The standard 95 5.2 Architectures 99 5.3 Channel access 99 5.4 Controlling states 104 5.5 Bit transfer 108 5.6 Security 110 5.7 System implementation 110 6 DECT 113 6.1 The standard 113 6.2 Architectures 113 6.3 Channel access 114 6.4 Bit transfer 115 6.5 Application profiles 115 7 HomeRF 117 7.1 The standard 117 7.2 Architectures 117 7.3 Channel access 119 7.4 Bit transfer 121 8 HiperLAN/2 123 8.1 The standard 123 8.2 Architectures 125 8.3 Channel access 127 8.4 Bit transfer 130 8.5 Other services 132 8.6 The HiperLAN/2 standard versus IEEE802.1 a 132 9 Operating an IEEE802.11b-complaint WLAN 133 9.1 Introduction 133 9.2 Mobile stations 133 9.3 Access points 136 9.4 Extended networks 141 9.5 Network analysis 143 9.6 Examples from real life 148 10 Various aspects of WLAN technology 153 10.1 Security 10.2 Sources of interference 161 10.3 Selecting a spread spectrum technique 163 10.4 Aspects of EMT interference 165 10.5 WLANs and TCP/IP 167 10.6 Deciding factors 167 10.7 Future prospects 169 Appendix 171 A.1 Maxwellian equations 171 A.2 Physical basis of direct sequence spread spectrum process 171 A.3 Directional antennae 174 B Bibliography 179 B.1 English-language publications 179 B.2 German-language publications 182 C Abbreviations 185
£106.35
John Wiley & Sons Inc Convergence Technologies for 3G Networks IP UMTS
Book SynopsisAddresses the application of both IP and ATM technologies to a cellular environment, including IP telephony protocols, the use of ATM/AAL2 and the AAL2 signalling protocol for voice/multimedia and data transport. This book explains the operation and integration of GSM, GPRS, EDGE, UMTS, CDMA2000, IP, and ATM.Trade Review"…this is an excellent volume, a must-have for systems architects…also to be commended for its cohesive and comprehensive assembly of many complex standards." (Computing Reviews.com, October 4, 2005) "This both is very detailed, yet readable. It would be an excellent read for both students and telecommunications professionals…" (Computing Reviews.com, June 8, 2005) "…well-structured…it provides detailed, and carefully selected and prepared, material." (Computing Reviews.com, October 21, 2004) "...very detailed yet readable...an excellent read for both students and professionals..." (The IEE Communications Engineer, June/July 2004)Table of ContentsAbout the Authors. 1. Introduction. 2. Principles of Communications . 3. GSM Fundamentals. 4. General Packet Radio System. 5. IP Applications for GPRS/UMTS. 6. Universal Mobile Telecommunications System. 7. UMTS Transmission Networks. 8. IP Telephony for UMTS Release 4. 9. Release 5 and Beyond (All-IP). Glossary of Terms. Index.
£100.76
John Wiley & Sons Inc Analytical Network and System Administration
Book SynopsisNetwork and system administration usually refers to the skill of keeping computers and networks running properly. But in truth, the skill needed is that of managing complexity. This book describes the science behind these complex systems, independent of the actual operating systems they work on.Table of ContentsForeword xi Preface xiv 1 Introduction 1 1.1 What is system administration? 1 1.2 What is a system? 2 1.3 What is administration? 2 1.4 Studying systems 3 1.5 What’s in a theory? 6 1.6 How to use the text 10 1.7 Some notation used 10 2 Science and its methods 13 2.1 The aim of science 13 2.2 Causality, superposition and dependency 16 2.3 Controversies and philosophies of science 17 2.4 Technology 20 2.5 Hypotheses 20 2.6 The science of technology 21 2.7 Evaluating a system—dependencies 22 2.8 Abuses of science 22 3 Experiment and observation 25 3.1 Data plots and time series 26 3.2 Constancy of environment during measurement 27 3.3 Experimental design 28 3.4 Stochastic (random) variables 29 3.5 Actual values or characteristic values 30 3.6 Observational errors 30 3.7 The mean and standard deviation 31 3.8 Probability distributions and measurement 32 3.8.1 Scatter and jitter 35 3.8.2 The ‘normal’ distribution 35 3.8.3 Standard error of the mean 36 3.8.4 Other distributions 37 3.9 Uncertainty in general formulae 38 3.10 Fourier analysis and periodic behaviour 39 3.11 Local averaging procedures 41 3.12 Reminder 43 4 Simple systems 45 4.1 The concept of a system 45 4.2 Data structures and processes 46 4.3 Representation of variables 47 4.4 The simplest dynamical systems 48 4.5 More complex systems 49 4.6 Freedoms and constraints 50 4.7 Symmetries 51 4.8 Algorithms, protocols and standard ‘methods’ 52 4.9 Currencies and value systems 53 4.9.1 Energy and power 53 4.9.2 Money 54 4.9.3 Social currency and the notion of responsibility 54 4.10 Open and closed systems: the environment 56 4.11 Reliable and unreliable systems 58 5 Sets, states and logic 59 5.1 Sets 59 5.2 A system as a set of sets 61 5.3 Addresses and mappings 61 5.4 Chains and states 62 5.5 Configurations and macrostates 64 5.6 Continuum approximation 65 5.7 Theory of computation and machine language 65 5.7.1 Automata or State Machines 66 5.7.2 Operators and operands 68 5.7.3 Pattern matching and operational grammars 69 5.7.4 Pathway analysis and distributed algorithms 70 5.8 A policy-defined state 71 6 Diagrammatical representations 73 6.1 Diagrams as systems 73 6.2 The concept of a graph 74 6.3 Connectivity 77 6.4 Centrality: maxima and minima in graphs 77 6.5 Ranking in directed graphs 80 6.6 Applied diagrammatical methods 84 7 System variables 91 7.1 Information systems 91 7.2 Addresses, labels, keys and other resource locators 92 7.3 Continuous relationships 94 7.4 Digital comparison 94 8 Change in systems 97 8.1 Renditions of change 97 8.2 Determinism and predictability 98 8.3 Oscillations and fluctuations 99 8.4 Rate of change 102 8.5 Applications of the continuum approximation 103 8.6 Uncertainty in the continuum approximation 105 9 Information 109 9.1 What is information? 109 9.2 Transmission 110 9.3 Informationandcontrol 111 9.4 Classification and resolution 111 9.5 Statistical uncertainty and entropy 114 9.6 Propertiesoftheentropy 118 9.7 Uncertainty in communication 119 9.8 A geometrical interpretation of information 123 9.9 Compressibility and size of information 127 9.10 Information and state 128 9.11 Maximum entropy principle 129 9.12 Fluctuation spectra. 133 10 Stability 135 10.1 Basic notions 135 10.2 Types of stability 135 10.3 Constancy 136 10.4 Convergence of behaviour 137 10.5 Maxima and minima 138 10.6 Regions of stability in a graph 139 10.7 Graph stability under random node removal 141 10.8 Dynamical equilibria: compromise 142 10.9 Statistical stability 143 10.10 Scaling stability 145 10.11 Maximum entropy distributions 148 10.12 Eigenstates 148 10.13 Fixed points of maps 151 10.14 Metastable alternatives and adaptability 155 10.15 Final remarks 156 11 Resource networks 159 11.1 What is a system resource? 159 11.2 Representation of resources 160 11.3 Resource currency relationships 161 11.4 Resource allocation, consumption and conservation 162 11.5 Where to attach resources? 163 11.6 Access to resources 165 11.7 Methods of resource allocation 167 11.7.1 Logical regions of systems 167 11.7.2 Using centrality to identify resource bottlenecks 168 11.8 Directed resources: flow asymmetries 170 12 Task management and services 173 12.1 Task list scheduling 173 12.2 Deterministic and non-deterministic schedules 174 12.3 Human–computer scheduling 176 12.4 Service provision and policy 176 12.5 Queue processing 177 12.6 Models 178 12.7 The prototype queue M/M/ 1 179 12.8 Queue relationships or basic ‘laws’ 181 12.9 Expediting tasks with multiple servers M/M/k 186 12.10 Maximum entropy input events in periodic systems 188 12.11 Miscellaneous issues in scheduling 189 13 System architectures 191 13.1 Policy for organization 191 13.2 Informative and procedural flows 192 13.3 Structured systems and ad hoc systems 193 13.4 Dependence policy 193 13.5 System design strategy 195 13.6 Event-driven systems and functional systems 200 13.7 The organization of human resources 201 13.8 Principle of minimal dependency 202 13.9 Decision-making within a system 202 13.9.1 Layered systems: Managers and workers 202 13.9.2 Efficiency 203 13.10 Prediction, verification and their limitations 204 13.11 Graphical methods 205 14 System normalization 207 14.1 Dependency 207 14.2 The database model 209 14.3 Normalized forms 210 15 System integrity 215 15.1 System administration as communication? 215 15.2 Extensive or strategic instruction 219 15.3 Stochastic semi-groups and martingales 223 15.4 Characterizing probable or average error 224 15.5 Correcting errors of propagation 226 15.6 Gaussian continuum approximation formula 228 16 Policy and maintenance 231 16.1 What is maintenance? 231 16.2 Average changes in configuration 231 16.3 The reason for random fluctuations 234 16.4 Huge fluctuations 235 16.5 Equivalent configurations and policy 236 16.6 Policy 237 16.7 Convergent maintenance 237 16.8 The maintenance theorem 240 16.9 Theory of back-up and error correction 241 17 Knowledge, learning and training 249 17.1 Information and knowledge 250 17.2 Knowledgeasclassification 250 17.3 Bayes’ theorem 252 17.4 Belief versus truth 254 17.5 Decisions based on expert knowledge 255 17.6 Knowledge out of date 259 17.7 Convergence of the learning process 260 18 Policy transgressions and fault modelling 263 18.1 Faults and failures 263 18.2 Deterministic system approximation 265 18.3 Stochasticsystemmodels 269 18.4 Approximate information flow reliability 273 18.5 Fault correction by monitoring and instruction 275 18.6 Policy maintenance architectures 279 18.7 Diagnostic cause trees 286 18.8 Probabilistic fault trees 290 18.8.1 Faults 290 18.8.2 Conditions and set logic 291 18.8.3 Construction 293 19 Decision and strategy 295 19.1 Causal analysis 295 19.2 Decision-making 296 19.3 Game theory 297 19.4 The strategic form of a game 301 19.5 The extensive form of a game 302 19.6 Solving zero-sum games 303 19.7 Dominated strategies 304 19.8 Nash equilibria 305 19.9 A security game 309 19.9.1 Zero-sum approximation 310 19.9.2 Non-zero sum approximation 313 19.10 The garbage collection game 315 19.11 A social engineering game 321 19.12 Human elements of policy decision 328 19.13 Coda: extensive versus strategic configuration management 328 20 Conclusions 331 A Some Boolean formulae 335 A.1 Conditional probability 335 A.2 Boolean algebra and logic 336 B Statistical and scaling properties of time-series data 339 B. 1 Local averaging procedure 339 B. 2 Scaling and self-similarity 343 B. 3 Scaling of continuous functions 344 C Percolation conditions 347 C. 1 Random graph condition 347 C. 2 Bi-partite form 350 C. 3 Small-graph corrections 351 Bibliography 353 Index 359
£95.36
John Wiley & Sons Inc Principles of Network and System Administration
Book SynopsisA comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day-to-day administration, maintenance, and support of computer systems and networks. It shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements.Table of ContentsPreface to Second Edition. 1. Introduction. 2. System Components. 3. Networked Communities. 4. Host Management. 5. User Management 6. Models of Network and System Administration. 7. Configuration and Maintenance. 8. Diagnostics, Fault and Change Management. 9. Application Level Services. 10. Network Level Services. 11. Principles of Security. 12. Security Implications. 13. Analytical System Administration. 14. Summary and Outlook. A. Some Useful Unix Commands. B. Programming and Compiling. C. Example Telnet Session. D. Glossary. E. Recommended Reading. Bibliography. Index.
£55.76
John Wiley & Sons Inc Computer Networks Principles Technologies and
Book SynopsisA computer network is made up of a group of two or more connected machines. In a Local Area Network (or LAN), computers are connected together within a local area, such as an office or home. In a Wide Area Network (or WAN), computers are farther apart and connected via telephone/communication lines, radio waves, or other means of communication.Table of ContentsPreface. Part I: Networking Basics. Chapter 1: Evolution of Computer Networks. Chapter 2: General Principles of Network Design. Chapter 3: Packet and Circuit Switching. Chapter 4: Network Architecture and Standardization. Chapter 5: Examples of Networks. Chapter 6: Network Characteristics. Chapter 7: Methods of Ensuring Quality of Service. Part II: Physical Layer Technologies. Chapter 8: Transmission Links. Chapter 9: Data Encoding and Multiplexing. Chapter 10: Wireless Transmission. Chapter 11: Transmission Networks. Part III: Local Area Networks. Chapter 12: Ethernet. Chapter 13: High-Speed Ethernet. Chapter 14: Shared Media LANs. Chapter 15: Switched LAN Basics. Chapter 16: Advanced Features of Switched LANs. Part IV: TCP/IP Internet-working. Chapter 17: Addressing in TCP/IP Networks. Chapter 18: Internet Protocol. Chapter 19: Core Protocols of the TCP/IP Stack. Chapter 20: Advanced Features of IP Routers. Part V: Wide-Area Networks. Chapter 21: Virtual Circuit WAN. Chapter 22: IP WANs. Chapter 23: Remote Access. Chapter 24: Secure Transport Services. Summary. Review questions. Problems. Conclusion. References and recommended reading. Index.
£56.00
John Wiley & Sons Inc Wireless Home Networking For Dummies
Book SynopsisThe perennial bestseller shows you how share your files and Internet connection across a wireless network Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home. Covers the basics of planning, installing, and using wireless LANs Reviews essential information on the latest security issues Delivers valuable tips on how to stay current with fast-moving technology Discusses how to share resources such as printers, scanners, an Internet connection, files, and more with multiple computers on one network Wireless Home Networking For DTable of ContentsIntroduction 1 Part I: Wireless Networking Fundamentals 7 Chapter 1: Introducing Wireless Home Networking 9 Chapter 2: From a to n and b-yond 27 Chapter 3: Exploring Bluetooth and Other Wireless Networks 51 Part II: Making Plans 67 Chapter 4: Planning a Wireless Home Network 69 Chapter 5: Choosing Wireless Home Networking Equipment 91 Part III: Installing a Wireless Network 107 Chapter 6: Installing Wireless Access Points in Windows 109 Chapter 7: Setting Up a Wireless Windows Network 125 Chapter 8: Setting Up a Wireless Mac Network 143 Chapter 9: Securing Your Home Network 161 Part IV: Using Your Wireless Network 183 Chapter 10: Putting Your Wireless Network to Work 185 Chapter 11: Gaming Over Your Wireless Network 205 Chapter 12: Networking Your Entertainment Center 225 Chapter 13: Extending Your Mobile Network 245 Chapter 14: Other Cool Things You Can Network 257 Chapter 15: Using a Bluetooth Network 273 Chapter 16: Going Wireless Away from Home 285 Part V: The Part of Tens 297 Chapter 17: Ten FAQs about Wireless Home Networks 299 Chapter 18: Ten Ways to Troubleshoot Wireless LAN Performance 309 Chapter 19: Ten Devices to Connect to Your Wireless Network in the Future 319 Chapter 20: Ten Sources for More Information 339 Index 347
£15.29
John Wiley & Sons Inc Algorithms and Parallel Computing
Book SynopsisNew techniques (z-transform, graphic, algebraic) for studying and analyzing parallel algorithms and how to use them Case studies throughout th book Problems at the end of each chapter and available solutions manual A companion website to include lecture notes .Table of ContentsPreface xiii List of Acronyms xix 1 Introduction 1 1.1 Introduction 1 1.2 Toward Automating Parallel Programming 2 1.3 Algorithms 4 1.4 Parallel Computing Design Considerations 12 1.5 Parallel Algorithms and Parallel Architectures 13 1.6 Relating Parallel Algorithm and Parallel Architecture 14 1.7 Implementation of Algorithms: A Two-Sided Problem 14 1.8 Measuring Benefi ts of Parallel Computing 15 1.9 Amdahl’s Law for Multiprocessor Systems 19 1.10 Gustafson–Barsis’s Law 21 1.11 Applications of Parallel Computing 22 2 Enhancing Uniprocessor Performance 29 2.1 Introduction 29 2.2 Increasing Processor Clock Frequency 30 2.3 Parallelizing ALU Structure 30 2.4 Using Memory Hierarchy 33 2.5 Pipelining 39 2.6 Very Long Instruction Word (VLIW) Processors 44 2.7 Instruction-Level Parallelism (ILP) and Superscalar Processors 45 2.8 Multithreaded Processor 49 3 Parallel Computers 53 3.1 Introduction 53 3.2 Parallel Computing 53 3.3 Shared-Memory Multiprocessors (Uniform Memory Access [UMA]) 54 3.4 Distributed-Memory Multiprocessor (Nonuniform Memory Access [NUMA]) 56 3.5 SIMD Processors 57 3.6 Systolic Processors 57 3.7 Cluster Computing 60 3.8 Grid (Cloud) Computing 60 3.9 Multicore Systems 61 3.10 SM 62 3.11 Communication Between Parallel Processors 64 3.12 Summary of Parallel Architectures 67 4 Shared-Memory Multiprocessors 69 4.1 Introduction 69 4.2 Cache Coherence and Memory Consistency 70 4.3 Synchronization and Mutual Exclusion 76 5 Interconnection Networks 83 5.1 Introduction 83 5.2 Classification of Interconnection Networks by Logical Topologies 84 5.3 Interconnection Network Switch Architecture 91 6 Concurrency Platforms 105 6.1 Introduction 105 6.2 Concurrency Platforms 105 6.3 Cilk++ 106 6.4 OpenMP 112 6.5 Compute Unifi ed Device Architecture (CUDA) 122 7 Ad Hoc Techniques for Parallel Algorithms 131 7.1 Introduction 131 7.2 Defining Algorithm Variables 133 7.3 Independent Loop Scheduling 133 7.4 Dependent Loops 134 7.5 Loop Spreading for Simple Dependent Loops 135 7.6 Loop Unrolling 135 7.7 Problem Partitioning 136 7.8 Divide-and-Conquer (Recursive Partitioning) Strategies 137 7.9 Pipelining 139 8 Nonserial–Parallel Algorithms 143 8.1 Introduction 143 8.2 Comparing DAG and DCG Algorithms 143 8.3 Parallelizing NSPA Algorithms Represented by a DAG 145 8.4 Formal Technique for Analyzing NSPAs 147 8.5 Detecting Cycles in the Algorithm 150 8.6 Extracting Serial and Parallel Algorithm Performance Parameters 151 8.7 Useful Theorems 153 8.8 Performance of Serial and Parallel Algorithms on Parallel Computers 156 9 z-Transform Analysis 159 9.1 Introduction 159 9.2 Definition of z-Transform 159 9.3 The 1-D FIR Digital Filter Algorithm 160 9.4 Software and Hardware Implementations of the z-Transform 161 9.5 Design 1: Using Horner’s Rule for Broadcast Input and Pipelined Output 162 9.6 Design 2: Pipelined Input and Broadcast Output 163 9.7 Design 3: Pipelined Input and Output 164 10 Dependence Graph Analysis 167 10.1 Introduction 167 10.2 The 1-D FIR Digital Filter Algorithm 167 10.3 The Dependence Graph of an Algorithm 168 10.4 Deriving the Dependence Graph for an Algorithm 169 10.5 The Scheduling Function for the 1-D FIR Filter 171 10.6 Node Projection Operation 177 10.7 Nonlinear Projection Operation 179 10.8 Software and Hardware Implementations of the DAG Technique 180 11 Computational Geometry Analysis 185 11.1 Introduction 185 11.2 Matrix Multiplication Algorithm 185 11.3 The 3-D Dependence Graph and Computation Domain D 186 11.4 The Facets and Vertices of D 188 11.5 The Dependence Matrices of the Algorithm Variables 188 11.6 Nullspace of Dependence Matrix: The Broadcast Subdomain B 189 11.7 Design Space Exploration: Choice of Broadcasting versus Pipelining Variables 192 11.8 Data Scheduling 195 11.9 Projection Operation Using the Linear Projection Operator 200 11.10 Effect of Projection Operation on Data 205 11.11 The Resulting Multithreaded/Multiprocessor Architecture 206 11.12 Summary of Work Done in this Chapter 207 12 Case Study: One-Dimensional IIR Digital Filters 209 12.1 Introduction 209 12.2 The 1-D IIR Digital Filter Algorithm 209 12.3 The IIR Filter Dependence Graph 209 12.4 z-Domain Analysis of 1-D IIR Digital Filter Algorithm 216 13 Case Study: Two- and Three-Dimensional Digital Filters 219 13.1 Introduction 219 13.2 Line and Frame Wraparound Problems 219 13.3 2-D Recursive Filters 221 13.4 3-D Digital Filters 223 14 Case Study: Multirate Decimators and Interpolators 227 14.1 Introduction 227 14.2 Decimator Structures 227 14.3 Decimator Dependence Graph 228 14.4 Decimator Scheduling 230 14.5 Decimator DAG for s1 = [1 0] 231 14.6 Decimator DAG for s2 = [1 −1] 233 14.7 Decimator DAG for s3 = [1 1] 235 14.8 Polyphase Decimator Implementations 235 14.9 Interpolator Structures 236 14.10 Interpolator Dependence Graph 237 14.11 Interpolator Scheduling 238 14.12 Interpolator DAG for s1 = [1 0] 239 14.13 Interpolator DAG for s2 = [1 −1] 241 14.14 Interpolator DAG for s3 = [1 1] 243 14.15 Polyphase Interpolator Implementations 243 15 Case Study: Pattern Matching 245 15.1 Introduction 245 15.2 Expressing the Algorithm as a Regular Iterative Algorithm (RIA) 245 15.3 Obtaining the Algorithm Dependence Graph 246 15.4 Data Scheduling 247 15.5 DAG Node Projection 248 15.6 DESIGN 1: Design Space Exploration When s n[1 1]t 249 15.7 DESIGN 2: Design Space Exploration When s n[1 −1]t 252 15.8 DESIGN 3: Design Space Exploration When s = [1 0]t 253 16 Case Study: Motion Estimation for Video Compression 255 16.1 Introduction 255 16.2 FBMAs 256 16.3 Data Buffering Requirements 257 16.4 Formulation of the FBMA 258 16.5 Hierarchical Formulation of Motion Estimation 259 16.6 Hardware Design of the Hierarchy Blocks 261 17 Case Study: Multiplication over GF(2m) 267 17.1 Introduction 267 17.2 The Multiplication Algorithm in GF(2m) 268 17.3 Expressing Field Multiplication as an RIA 270 17.4 Field Multiplication Dependence Graph 270 17.5 Data Scheduling 271 17.6 DAG Node Projection 273 17.7 Design 1: Using d1 = [1 0]t 275 17.8 Design 2: Using d2 = [1 1]t 275 17.9 Design 3: Using d3 = [1 −1]t 277 17.10 Applications of Finite Field Multipliers 277 18 Case Study: Polynomial Division over GF(2) 279 18.1 Introduction 279 18.2 The Polynomial Division Algorithm 279 18.3 The LFSR Dependence Graph 281 18.4 Data Scheduling 282 18.5 DAG Node Projection 283 18.6 Design 1: Design Space Exploration When s1 = [1 −1] 284 18.7 Design 2: Design Space Exploration When s2 = [1 0] 286 18.8 Design 3: Design Space Exploration When s3 = [1 −0.5] 289 18.9 Comparing the Three Designs 291 19 The Fast Fourier Transform 293 19.1 Introduction 293 19.2 Decimation-in-Time FFT 295 19.3 Pipeline Radix-2 Decimation-in-Time FFT Processor 298 19.4 Decimation-in-Frequency FFT 299 19.5 Pipeline Radix-2 Decimation-in-Frequency FFT Processor 303 20 Solving Systems of Linear Equations 305 20.1 Introduction 305 20.2 Special Matrix Structures 305 20.3 Forward Substitution (Direct Technique) 309 20.4 Back Substitution 312 20.5 Matrix Triangularization Algorithm 312 20.6 Successive over Relaxation (SOR) (Iterative Technique) 317 20.7 Problems 321 21 Solving Partial Differential Equations Using Finite Difference Method 323 21.1 Introduction 323 21.2 FDM for 1-D Systems 324 References 331 Index 337
£95.36