Computer networking and communications Books

704 products


  • Clio Wired

    Columbia University Press Clio Wired

    1 in stock

    Book SynopsisTrade ReviewFor the archivist, these essays ask provocative questions and point to some interesting opportunities, both for repositories and users. -- Christine D'Arpa Archival Issues teachers esepcially should welcome this collection Journal of American HistoryTable of ContentsIntroduction: Roy Rosenzweig: Scholarship as Community, by Anthony Grafton Note to Readers, by Deborah Kaplan Rethinking History in New Media 1. Scarcity or Abundance? Preserving the Past 2. Web of Lies? Historical Knowledge on the Internet, with Daniel J. Cohen 3. Wikipedia: Can History Be Open Source? Practicing History in New Media: Teaching, Researching, Presenting, Collecting 4. Historians and Hypertext: Is It More Than Hype?, with Steve Brier 5. Rewiring the History and Social Studies Classroom: Needs, Frameworks, Dangers, Proposals, with Randy Bass 6. The Riches of Hypertext for Scholarly Journals 7. Should Historical Scholarship Be Free? 8. Collecting History Online Surveying History in New Media 9. Brave New World or Blind Alley? American History on the World Wide Web, with Michael O'Malley 10. Wizards, Bureaucrats, Warriors, and Hackers: Writing the History of the Internet 11. The Road to Xanadu: Public and Private Pathways on the History Web Acknowledgments Notes Index

    1 in stock

    £70.40

  • The Wired Neighborhood

    Yale University Press The Wired Neighborhood

    15 in stock

    Book SynopsisThis exploration of the nature of cyberspace and increasing virtualization of everyday life argues that electronic neighbourhoods should be less important to us than our geophysical neighbourhoods, speaking in favour of civic networking.

    15 in stock

    £28.19

  • Developing Series 60 Applications

    Pearson Education Developing Series 60 Applications

    1 in stock

    Book SynopsisThe Series 60 Platform is a multi-vendor, open standards-based platform for one-handed smart phone application development. It delivers applications ranging from Web browsing to games to e-mail and messaging services, as well as other PDA functions including synchronization with PC applications such as Outlook. It also allows for video recording and playback. Nokia not only develops its own smart phones using Series 60 but also licenses this development platform to other smart phone manufacturers. The bottomline: Series 60 presents developers with a compelling opportunity to create a new wave of applications and services for global deployment on handsets from multiple manufacturers. Series 60 Software Development, the first book in the Nokia Mobile Developer Series, will be the official guide for developers creating applications for mobile devices based on the feature-rich Series 60 platform. This book covers the complete suite of development tools available for this platform includ

    1 in stock

    £48.76

  • Mathematical Foundations of Computer Networking

    Pearson Education Mathematical Foundations of Computer Networking

    1 in stock

    Book SynopsisSrinivasan Keshav is a Professor and a Canada Research Chair at the David R. Cheriton School of Computer Science, University of Waterloo, Ontario, Canada.Table of ContentsPreface xv Chapter 1: Probability 1 1.1 Introduction 1 1.2 Joint and Conditional Probability 7 1.3 Random Variables 14 1.4 Moments and Moment Generating Functions 21 1.5 Standard Discrete Distributions 25 1.6 Standard Continuous Distributions 29 1.7 Useful Theorems 35 1.8 Jointly Distributed Random Variables 42 1.8.1 Bayesian Networks 44 1.9 Further Reading 47 1.10 Exercises 47 Chapter 2: Statistics 53 2.1 Sampling a Population 53 2.2 Describing a Sample Parsimoniously 57 2.3 Inferring Population Parameters from Sample Parameters 66 2.4 Testing Hypotheses about Outcomes of Experiments 70 2.5 Independence and Dependence: Regression and Correlation 86 2.6 Comparing Multiple Outcomes Simultaneously: Analysis of Variance 95 2.7 Design of Experiments 99 2.8 Dealing with Large Data Sets 100 2.9 Common Mistakes in Statistical Analysis 103 2.10 Further Reading 105 2.11 Exercises 105 Chapter 3: Linear Algebra 109 3.1 Vectors and Matrices 109 3.2 Vector and Matrix Algebra 111 3.3 Linear Combinations, Independence, Basis, and Dimension 114 3.4 Using Matrix Algebra to Solve Linear Equations 117 3.5 Linear Transformations, Eigenvalues, and Eigenvectors 125 3.6 Stochastic Matrices 138 3.7 Exercises 143 Chapter 4: Optimization 147 4.1 System Modeling and Optimization 147 4.2 Introduction to Optimization 149 4.3 Optimizing Linear Systems 152 4.4 Integer Linear Programming 157 4.5 Dynamic Programming 162 4.6 Nonlinear Constrained Optimization 164 4.7 Heuristic Nonlinear Optimization 167 4.8 Exercises 170 Chapter 5: Signals, Systems, and Transforms 173 5.1 Background 173 5.2 Signals 185 5.3 Systems 188 5.4 Analysis of a Linear Time-Invariant System 189 5.5 Transforms 195 5.6 The Fourier Series 196 5.7 The Fourier Transform and Its Properties 200 5.8 The Laplace Transform 209 5.9 The Discrete Fourier Transform and Fast Fourier Transform 216 5.10 The Z Transform 226 5.11 Further Reading 233 5.12 Exercises 234 Chapter 6: Stochastic Processes and Queueing Theory 237 6.1 Overview 237 6.2 Stochastic Processes 240 6.3 Continuous-Time Markov Chains 252 6.4 Birth-Death Processes 255 6.5 The M/M/1 Queue 262 6.6 Two Variations on the M/M/1 Queue 266 6.7 Other Queueing Systems 270 6.8 Further Reading 272 6.9 Exercises 272 Chapter 7: Game Theory 277 7.1 Concepts and Terminology 278 7.2 Solving a Game 291 7.3 Mechanism Design 301 7.4 Limitations of Game Theory 314 7.5 Further Reading 315 7.6 Exercises 316 Chapter 8: Elements of Control Theory 319 8.1 Overview of a Controlled System 320 8.2 Modeling a System 323 8.3 A First-Order System 329 8.4 A Second-Order System 331 8.5 Basics of Feedback Control 336 8.6 PID Control 341 8.7 Advanced Control Concepts 346 8.8 Stability 350 8.9 State Space–Based Modeling and Control 360 8.10 Digital Control 364 8.11 Partial Fraction Expansion 367 8.12 Further Reading 370 8.13 Exercises 370 Chapter 9: Information Theory 373 9.1 Introduction 373 9.2 A Mathematical Model for Communication 374 9.3 From Messages to Symbols 378 9.4 Source Coding 379 9.5 The Capacity of a Communication Channel 386 9.6 The Gaussian Channel 399 9.7 Further Reading 407 9.8 Exercises 407 Solutions to Exercises 411 Index 457

    1 in stock

    £56.69

  • Blockchain Technology Solutions for the Security

    Elsevier Science Blockchain Technology Solutions for the Security

    1 in stock

    Book SynopsisTable of Contents1. IoT: Fundamentals and challenges 2. Security issues of IoT 3. IoT-based Healthcare Systems 4. Emerging e-Health IoT Applications 5. Blockchain: Concept and Emergence 6. Application of Blockchain for security 7. Role of Blockchain in IoT based healthcare systems 8. Decentralized management of healthcare IoT devices 9. Blockchain based insurance and healthcare 10. Blockchain adoption strategies

    1 in stock

    £103.50

  • Microsoft 365 Modern Desktop Administrator Guide

    Cengage Learning, Inc Microsoft 365 Modern Desktop Administrator Guide

    1 in stock

    Book SynopsisWright/Plesniarski's MICROSOFT SPECIALIST GUIDE TO MICROSOFT EXAM MD-100: WINDOWS 10 ensures you are well prepared for the Microsoft exam as well as a successful career in system administration. Completely up to date, this student-friendly guide walks you step by step through all aspects of installing, configuring and maintaining Windows 10 as a client operating system. Engaging exercises throughout enable you to experience the processes involved in Windows 10 configuration and management -- with plenty of troubleshooting tips that offer solutions to common problems. Review Questions help you prepare for the Microsoft certification exam, while Case Projects provide practice in situations that must be managed in a live networking environment. Giving you added flexibility, labs can be completed on physical or virtual machines. Also available: MindTap digital learning solution.Table of Contents1. Introduction to Windows 10. 2. Configuring Windows 10. 3. User Management. 4. Networking. 5. Managing Disks and File Systems. 6. Windows 10 Security Features. 7. User Productivity Tools. 8. Application Support. 9. Performance Tuning and System Recovery. 10. Enterprise Computing. 11. Managing Enterprise Clients. 12. Automating Windows 10 Deployment. Appendix: Exam MD-100. Appendix: Preparing for Exams. Appendix: Client Hyper-V.

    1 in stock

    £66.49

  • Cengage Learning, Inc Comptia Network Guide to Networks LooseLeaf

    Out of stock

    Book Synopsis

    Out of stock

    £96.79

  • CompTIA Cloud Guide to Cloud Computing

    CompTIA Cloud Guide to Cloud Computing

    1 in stock

    Book SynopsisContent maps to the exam objectives from the latest CompTIA Cloud+ Exam, CV0-002. Modules are broken down into multiple modalities such as readings, videos, and hands-on projects that walk learners through various popular Cloud platforms, including AWS, Google Cloud Platform, and Microsoft Azure. The course begins with a pre-assessment and ends with a post-assessment helping learners build confidence and track their progress. Learners will work with OpenStack in the live virtual machine labs to provide hands-on practice and troubleshoot, practice, explore, and try different solutions in a secure, private Cloud sandbox environment.Table of ContentsPart 1: Getting to the Cloud. 1. Introduction to Cloud Computing. 2. Virtual Hardware. 3. Migration to the Cloud. Part 2: What���s in the Cloud. 4. Cloud Infrastructure. 5. Cloud Connectivity and Troubleshooting. 6. Securing Cloud Resources. 7. Identity and Access Management. 8. Cloud Storage. Part 3: Taking Care of Your Cloud. 9. Managing Cloud Capacity and Performance. 10. Cloud Automation.

    1 in stock

    £183.35

  • Power Thermal Noise and Signal Integrity Issues

    Taylor & Francis Ltd Power Thermal Noise and Signal Integrity Issues

    Out of stock

    Book SynopsisAs demand for on-chip functionalities and requirements for low power operation continue to increase as a result of the emergence in mobile, wearable and internet-of-things (IoT) products, 3D/2.5D have been identified as an inevitable path moving forward. As circuits become more and more complex, especially three-dimensional ones, new insights have to be developed in many domains, including electrical, thermal, noise, interconnects, and parasites. It is the entanglement of such domains that begins the very key challenge as we enter in 3D nano-electronics. This book aims to develop this new paradigm, going to a synthesis beginning between many technical aspects.Table of ContentsGeneral Information, Substrate Noise in Mixed-Signal Ic’s in a Silicon Process, Efficient and Simple Compact Modeling of Interconnects, Electro-Thermal Modeling of Substrate, Substrate noise and parasites: towards 3D, General Conclusion, References, Index

    Out of stock

    £108.00

  • Library Networking Current Problems and Future

    Taylor & Francis Library Networking Current Problems and Future

    15 in stock

    Book SynopsisIn this book, first published in 1983, experts in US national, state, and regional network associations provide stimulating discussions of their experiences, problems, and successes. This volume is based on the symposium, âNetworking: Where From Here?â.Table of Contents1. The Honourable Jim Edgar 2. Barbara Markuson 3. Frank P. Grisham 4. Laima Mockus 5. Richard McCoy 6. Rowland Brown 7. Toni Carbo Bearman 8. Panel Discussion

    15 in stock

    £87.39

  • Fieldbus and Networking in Process Automation

    CRC Press Fieldbus and Networking in Process Automation

    1 in stock

    Book SynopsisOver the last two decades, fieldbus has totally revolutionized the way communication takes place in the fields of process control, automation, and manufacturing industries. Recent introduction of real-time fieldbuses has opened up its application in multi-axis motor control and other time-critical applications. Fieldbus is designed to ensure easy interoperability, smarter network designs, increased data availability, and lessened stress on the design aspects of safety protocols.This second edition of Fieldbus and Networking in Process Automation discusses the different facets of fieldbus technology including design, wiring, installation, and commissioning as well as safety aspects in hostile application areas. The book:â Explains basic communication principles and networkingâa must for understanding fieldbusesâ Considers the advantages and shortcomings of individual fieldbusesâ Provides a broad spectrum of different fieldbuses used in both pTable of ContentsChapter 1 Data Communication..............................................................1Chapter 2 Networking...........................................................................25Chapter 3 Network Models...................................................................35Chapter 4 Networks in Process Automation.........................................53Chapter 5 Fieldbuses.............................................................................63Chapter 6 Highway Addressable Remote Transducer (HART)................ 75Chapter 7 Foundation Fieldbus.............................................................89Chapter 8 PROFIBUS......................................................................... 119Chapter 9 Modbus and Modbus Plus.................................................. 145Chapter 10 CAN Bus............................................................................ 157Chapter 11 DeviceNet........................................................................... 163Chapter 12 AS-i.................................................................................... 169Chapter 13 Seriplex............................................................................... 175Chapter 14 Interbus-S........................................................................... 179Chapter 15 ControlNet.......................................................................... 189Chapter 16 Common Industrial Protocol.............................................. 201Chapter 17 Ethernet and Ethernet/IP.................................................... 213Chapter 18 EtherCAT...........................................................................225Chapter 19 Sercos III............................................................................237Chapter 20 Ethernet Powerlink............................................................. 251Chapter 21 Profinet IRT........................................................................257Chapter 22 Intrinsically Safe Fieldbus Systems....................................265Chapter 23 Wiring, Installation, and Commissioning..........................277Chapter 24 Wireless Sensor Networks..................................................303Chapter 25 WirelessHART (WHART)................................................ 317Chapter 26 ISA100.11a..........................................................................343

    1 in stock

    £43.69

  • Introduction to Industrial Internet of Things and

    CRC Press Introduction to Industrial Internet of Things and

    2 in stock

    Book SynopsisIndustrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead authorâs massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT.The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.Table of ContentsPart 1. Prerequisites. Chapter 1. Overview of Internet of Things. Part 2. Introduction. Chapter 2. Introduction to Industry 4.0 and Industrial Internet of Things. Chapter 3. Industry 4.0: Basics. Chapter 4. Industrial Internet of Things: Basics. Chapter 5. Business Models and Reference Architecture of IIoT. Part 3. Technological Aspects of Industry 4.0 and IIoT. Chapter 6. Key Technologies-Part 1. Chapter 7. Key Technologies-Part 2. Part 4. Enabling Technologies of IIoT. Chapter 8. Connectivity. Chapter 9. Communication. Chapter 10. Interoperability. Part 5. IIoT Analytics. Chapter 11. Introduction to Analytics. Chapter 12. Machine Learning and Data Science. Part 6. Applications and Case Studies. Chapter 13. Healthcare. Chapter 14. Inventory Management & Quality Control. Chapter 15. Plant Safety and Security. Chapter 16. Case Studies.

    2 in stock

    £71.24

  • 5G5GAdvanced

    Elsevier Science 5G5GAdvanced

    Out of stock

    Book SynopsisTable of ContentsPreface Acknowledgments Abbreviations and Acronyms 1. What Is 5G? 2. 5G Standardization 3. Spectrum for 5G 4. LTE—An Overview 5. NR Overview 6. Radio-Interface Architecture 7. Overall Transmission Structure 8. Channel Sounding 9. Transport-Channel Processing 10. Physical-Layer Control Signaling 11. Multi-Antenna Transmission 12. Beam Management 13. Retransmission Protocols 14. Scheduling 15. Uplink Power and Timing Control 16. Cell search and system information 17. Random access 18. LTE/NR Interworking and Coexistence 19. Interference handling in TDD networks 20. NR in unlicensed spectrum 21. Industrial IoT and URLLC enhancements 22. RedCap and small data transmission 23. Multicast-Broadcast Services 24. Integrated Access Backhaul 25. Non-terrestrial NR access 26. Sidelink communication 27. Positioning 28. RF Characteristics 29. RF Technologies at mm-Wave Frequencies 30. 5G—Further Evolution References

    Out of stock

    £80.96

  • Internet Measurement

    John Wiley & Sons Inc Internet Measurement

    15 in stock

    Book SynopsisThis book provides all the ingredients necessary for a full understanding of the increasingly important discipline of Internet Measurement ranging from its role in the different layers of architecture to the various applications where it plays a critical role. This book and its subject help to build foundational knowledge for other areas of internet and computing courses particularly in regard to internet security, whose subject matter depend upon information derived from this source. Students studying courses that look at web applications or P2P file-sharingapplications will find this book provides crucial information for their subject areas. The experience of the authors, who are at the heart of the Internet Measurement community, and the emerging importance of the discipline make this the authoratitive and defining book of the field.Trade Review"The book will be a valuable resource for students and researchers starting to work on internet measurements." (IEEE Network Magazine, May/June 2007)Table of ContentsAcknowledgments xxi I Background 1 1 Introduction 3 1.1 Why Measure the Internet? 5 1.2 How to Read this Book 6 1.3 Resources for More Information 10 2 Internet Architecture 13 2.1 The Internet’s Architecture 13 2.1.1 The History of the Internet 14 2.1.2 The Organization of the Internet 17 2.1.3 Design Principles of the Internet 22 2.2 Details of Internet Operation 25 2.2.1 Endsystems, Links, and Routers 25 2.2.2 Autonomous Systems 26 2.2.3 Routing 26 2.3 Protocols 31 2.3.1 IP 32 2.3.2 TCP 33 2.3.3 UDP 34 2.3.4 Routing Protocols 35 2.3.5 ICMP 35 2.3.6 SNMP 36 2.3.7 IP Multicast 37 2.3.8 DNS 37 2.3.9 HTTP 39 2.3.10 P2P 40 2.4 Applications 42 3 Analytic Background 45 3.1 Linear Algebra 45 3.2 Probability 48 3.2.1 Background 49 3.2.2 Special Issues in the Internet 55 3.3 Statistics 58 3.3.1 Background 58 3.3.2 Special Issues in the Internet 61 3.4 Graphs 64 3.4.1 Background 64 3.4.2 Special Issues in the Internet 66 3.5 Metrics 70 3.6 Measurement and Modeling 73 3.6.1 Models in General 73 3.6.2 The Use of Probability Models 76 4 Practical Issues in Internet Measurement 79 4.1 Where can Measurements be Made? 80 4.1.1 Local Area Network 82 4.1.2 Inside a Backbone 82 4.1.3 Entry Points into a Network 84 4.1.4 Mirror Sites/Network Exchange Points 86 4.1.5 Wide Area Network 87 4.2 Role of Time 89 4.2.1 Background 90 4.2.2 Sources of Time Information 91 4.2.3 Synchronized Time 93 4.3 Role of Internet Directories and Databases 94 4.3.1 Internet Address and Routing Registries 95 4.3.2 Domain Name System 97 4.3.3 Measurement-related Issues in Dealing with Databases 98 4.4 Measurements Across Various Protocol Layers 99 4.4.1 Issues in Capturing Data 99 4.4.2 Changes to Infrastructure/Instrumentation 102 4.4.3 Local vs Remote vs Distributed Data Gathering 103 4.4.4 Measurement on Overlays 104 II In Depth 105 5 Infrastructure 107 5.1 Properties 107 5.1.1 Physical Device Properties 107 5.1.2 Topology Properties 111 5.1.3 Interaction of Traffic and Network 112 5.2 Challenges 115 5.2.1 Core Simplicity 115 5.2.2 Hidden Layers 116 5.2.3 Hidden Pieces 116 5.2.4 Administrative Barriers 117 5.3 Tools 117 5.3.1 Active Measurement 118 5.3.2 Passive Measurement 124 5.3.3 Fused Measurements 127 5.3.4 Bandwidth Measurement 127 5.3.5 Latency Measurement and Estimation 136 5.3.6 Geolocation 142 5.3.7 Inference 147 5.3.8 Other Tools 152 5.4 State of the Art 152 5.4.1 Equipment Properties 153 5.4.2 Topology Properties 154 5.4.3 Interaction of Traffic and Network 165 6 Traffic 171 6.1 Properties 172 6.1.1 The Basics: Packets and Bytes 172 6.1.2 Higher-level Structure 173 6.1.3 Flows 175 6.1.4 Semantically Distinct Traffic Types 176 6.2 Challenges 176 6.2.1 Practical Issues 177 6.2.2 Statistical Difficulties 179 6.3 Tools 188 6.3.1 Packet Capture 188 6.3.2 Data Management 191 6.3.3 Data Reduction 192 6.3.4 Inference 212 6.4 State of the Art 215 6.4.1 Packets and Bytes 216 6.4.2 Higher-level Structure 234 6.4.3 Flows 236 6.4.4 Control Traffic 238 6.4.5 Wireless 239 7 Applications 241 7.1 Application Mix 242 7.2 DNS 244 7.2.1 DNS Measurement Properties 245 7.2.2 DNS Measurement Challenges 248 7.2.3 DNS Measurement Tools 251 7.2.4 Use of DNS in Other Applications 256 7.2.5 State of the Art 258 7.3 Web 269 7.3.1 Web Measurement Properties 270 7.3.2 Web Measurement Challenges 273 7.3.3 Web Measurement Tools 278 7.3.4 State of the Art 286 7.4 P2P 309 7.4.1 P2P Measurement Properties 310 7.4.2 P2P Measurement Challenges 314 7.4.3 P2P Measurement Tools 317 7.4.4 State of the Art 321 7.5 Online Games 331 7.5.1 Games and Measurement Properties 332 7.5.2 Networked Games Measurement Challenges 337 7.5.3 State of the Art 340 7.6 Other Applications 346 7.6.1 Streaming Multimedia 346 III In Perspective 353 8 Anonymization 355 8.1 Definitions 356 8.2 General Motivation for Anonymizing Data 357 8.3 Obstacles and Risks in Sharing Data 358 8.4 What Should be Anonymized: Data Categorization 360 8.5 How Data is Anonymized: Process and Techniques 365 8.5.1 Anonymization Process 365 8.5.2 Anonymization Techniques 367 8.6 Anonymization Examples at Different Layers 369 8.6.1 Configuration Data 369 8.6.2 Router-level Data 370 8.6.3 Packet-level Traces 370 8.6.4 Application-level Data 373 8.7 Attacks Against Anonymized Data 374 8.8 Anonymizing Data: Metrics for Success 376 8.9 Alternatives to Anonymization 377 9 Security 379 9.1 Role of Internet Measurement in Security 380 9.2 Intranet Measurements in Aid of Security 382 9.3 Gateway Measurements in Aid of Security 384 9.4 Inter-domain Measurements Impact on Security 386 9.5 Wide-area Measurements in Aid of Security 387 9.6 Application-level Measurements of Attacks 394 10 Case Studies 395 10.1 Low-level Monitoring Tools 395 10.2 Individual Toolsets for Network Measurement 397 10.2.1 Windmill 398 10.2.2 Click 399 10.2.3 dss 400 10.2.4 Gigascope 403 10.3 Large-scale Measurement Projects 404 10.3.1 RIPE 405 10.3.2 High-energy Physics 407 10.3.3 CAIDA 410 10.3.4 PlanetLab 414 11 Conclusions and Prospects 419 11.1 Trends in Internet Measurement 419 11.2 Difficulties 424 11.3 Future Work 426 11.3.1 Research Challenges 426 11.3.2 Emerging Questions 428 Bibliography 431 Index 473

    15 in stock

    £53.19

  • Web Engineering The Discipline of Systematic

    John Wiley & Sons Inc Web Engineering The Discipline of Systematic

    15 in stock

    Book SynopsisThe World Wide Web has a massive and permanent influence on our lives. Economy, industry, education, healthcare, public administration, entertainment - there is hardly any part of our daily lives which has not been pervaded by the Internet.Table of ContentsPreface xv Foreword xvii 1 An Introduction to Web Engineering 1Gerti Kappel, Birgit Pröll, Siegfried Reich, Werner Retschitzegger 1.1 Motivation 1 1.2 Categories of Web Applications 4 1.3 Characteristics of Web Applications 7 1.3.1 Product-related Characteristics 8 1.3.2 Usage-related Characteristics 12 1.3.3 Development-related Characteristics 14 1.3.4 Evolution 16 1.4 Objectives and Structure of the Book 17 2 Requirements Engineering for Web Applications 23Paul Grünbacher 2.1 Introduction 23 2.2 Fundamentals 24 2.2.1 Where Do Requirements Come From? 24 2.2.2 Requirements Engineering Activities 25 2.3 RE Specifics in Web Engineering 26 2.4 Principles for RE of Web Applications 30 2.5 Adapting RE Methods to Web Application Development 32 2.5.1 Requirement Types 32 2.5.2 Notations 34 2.5.3 Tools 36 2.6 Outlook 37 3 Modeling Web Applications 39Wieland Schwinger, Nora Koch 3.1 Introduction 39 3.2 Fundamentals 40 3.3 Modeling Specifics in Web Engineering 41 3.3.1 Levels 41 3.3.2 Aspects 42 3.3.3 Phases 42 3.3.4 Customization 43 3.4 Modeling Requirements 43 3.5 Content Modeling 45 3.5.1 Objectives 45 3.5.2 Concepts 45 3.6 Hypertext Modeling 46 3.6.1 Objectives 47 3.6.2 Hypertext Structure Modeling Concepts 47 3.6.3 Access Modeling Concepts 49 3.6.4 Relation to Content Modeling 50 3.7 Presentation Modeling 51 3.7.1 Objectives 51 3.7.2 Concepts 51 3.7.3 Relation to Hypertext Modeling 52 3.8 Customization Modeling 53 3.8.1 Objectives 54 3.8.2 Concepts 54 3.8.3 Relation to Content, Hypertext, and Presentation Modeling 58 3.9 Methods and Tools 58 3.9.1 Modeling Methods: An Overview 58 3.9.2 Model-Driven Development 61 3.9.3 Tool Support 61 3.10 Outlook 63 4 Web Application Architectures 65Christian Eichinger 4.1 Introduction 65 4.2 Fundamentals 66 4.2.1 What is an Architecture? 66 4.2.2 Developing Architectures 67 4.2.3 Categorizing Architectures 69 4.3 Specifics of Web Application Architectures 70 4.4 Components of a Generic Web Application Architecture 71 4.5 Layered Architectures 72 4.5.1 2-Layer Architectures 72 4.5.2 N-Layer Architectures 73 4.6 Data-aspect Architectures 79 4.6.1 Database-centric Architectures 80 4.6.2 Architectures for Web Document Management 80 4.6.3 Architectures for Multimedia Data 81 4.7 Outlook 84 5 Technology-aware Web Application Design 85Gerhard Austaller, Andreas Hartl, Markus Lauff, Fernando Lyardet, Max Mühlhaüser 5.1 Introduction 86 5.2 Web Design from an Evolutionary Perspective 89 5.2.1 Background 89 5.2.2 Information Design: An Authoring Activity 90 5.2.3 Software Design: A Programming Activity 92 5.2.4 Merging Information Design and Software Design 93 5.2.5 Problems and Restrictions in Integrated Web Design 94 5.2.6 A Proposed Structural Approach 95 5.3 Presentation Design 95 5.3.1 Presentation of Nodes and Meshes 96 5.3.2 Device-independent Development Approaches 97 5.4 Interaction Design 98 5.4.1 User Interaction 98 5.4.2 User Interface Organization 100 5.4.3 Navigation Design 101 5.4.4 Designing a Link Representation: The Anchor 101 5.4.5 Designing Link Internals: The URL 102 5.4.6 Navigation and Orientation 102 5.4.7 Structured Dialog for Complex Activities 103 5.4.8 Interplay with Technology and Architecture 104 5.5 Functional Design 105 5.5.1 Integration 105 5.5.2 Communication Paradigms and Middleware 105 5.5.3 Distributed Cross-corporate Web Applications 106 5.6 Outlook 107 5.6.1 Context-aware Applications 107 5.6.2 Device-independent Applications 108 5.6.3 Reusability 109 5.7 Summary 110 6 Technologies for Web Applications 111Martin Nussbaumer, Martin Gaedke 6.1 Introduction 111 6.2 Fundamentals 112 6.2.1 Markup 112 6.2.2 Hypertext and Hypermedia 112 6.3 Client/Server Communication on the Web 113 6.3.1 SMTP – Simple Mail Transfer Protocol. 113 6.3.2 RTSP – Real Time Streaming Protocol 113 6.3.3 HTTP – HyperText Transfer Protocol 113 6.3.4 Session Tracking 114 6.4 Client-side Technologies 116 6.4.1 Helpers and Plug-ins 116 6.4.2 Java Applets 116 6.4.3 ActiveX Controls 116 6.5 Document-specific Technologies 117 6.5.1 HTML – Hypertext Markup Language 117 6.5.2 SVG – Scalable Vector Graphics 117 6.5.3 SMIL – Synchronized Multimedia Integration Language 118 6.5.4 XML – eXtensible Markup Language 118 6.5.5 XSL – eXtensible Stylesheet Language 122 6.6 Server-side Technologies 126 6.6.1 URI Handlers 126 6.6.2 Web Services 129 6.6.3 Middleware Technologies 130 6.7 Outlook 132 7 Testing Web Applications 133Christoph Steindl, Rudolf Ramler, Josef Altmann 7.1 Introduction 133 7.2 Fundamentals 134 7.2.1 Terminology 134 7.2.2 Quality Characteristics 135 7.2.3 Test Objectives 136 7.2.4 Test Levels 136 7.2.5 Role of the Tester 137 7.3 Test Specifics in Web Engineering 138 7.4 Test Approaches 140 7.4.1 Conventional Approaches 140 7.4.2 Agile Approaches 140 7.5 Test Scheme 142 7.5.1 Three Test Dimensions 142 7.5.2 Applying the Scheme to Web Applications 143 7.5.3 Examples of Using the Test Scheme 145 7.6 Test Methods and Techniques 145 7.6.1 Link Testing 147 7.6.2 Browser Testing 147 7.6.3 Usability Testing 148 7.6.4 Load, Stress, and Continuous Testing 148 7.6.5 Testing Security 149 7.6.6 Test-driven Development 150 7.7 Test Automation 150 7.7.1 Benefits and Drawbacks of Automated Tests 150 7.7.2 Test Tools 151 7.7.3 Selecting Test Tools 152 7.8 Outlook 152 8 Operation and Maintenance of Web Applications 155Arno Ebner, Birgit Pröll, Hannes Werthner 8.1 Introduction 155 8.2 Challenges Following the Launch of a Web Application 156 8.3 Promoting a Web Application 157 8.3.1 Newsletters 158 8.3.2 Affiliate Marketing 158 8.3.3 Search Engine Marketing 159 8.3.4 Content-related Marketing 162 8.3.5 Domain Management 162 8.4 Content Management 163 8.4.1 Content Update Rate and Demand on Currency 164 8.4.2 Content Syndication 165 8.5 Usage Analysis 165 8.5.1 Usage Analysis Techniques 165 8.5.2 Statistical Indicators 167 8.5.3 User Behavior Analysis 168 8.6 Outlook 169 9 Web Project Management 171Herwig Mayr 9.1 From Software Project Management to Web Project Management 171 9.1.1 Objectives of Software Project Management 171 9.1.2 The Tasks of Software Project Management 172 9.1.3 Conflicting Areas in Projects 173 9.1.4 Specifics of Web Project Management 173 9.2 Challenges in Web Project Management 175 9.2.1 General Challenges in Software Development 175 9.2.2 Development-related Challenges in Web Projects 176 9.2.3 Product-related Challenges in Web Projects 179 9.3 Managing Web Teams 182 9.3.1 Software Development: A Human-centered Task 182 9.3.2 The Web Project Team 183 9.3.3 The Web Project Manager 184 9.4 Managing the Development Process of a Web Application 185 9.4.1 Deploying the Tools 185 9.4.2 Measuring Progress 188 9.4.3 Project Risks 190 9.4.4 Risk Management 193 9.5 Outlook 194 10 The Web Application Development Process 197Gregor Engels, Marc Lohmann, Annika Wagner 10.1 Motivation 197 10.2 Fundamentals 198 10.3 Requirements for a Web Application Development Process 201 10.3.1 Handling Short Development Cycles 201 10.3.2 Handling Changing Requirements 201 10.3.3 Releases with Fixed Deadlines and Flexible Contents 203 10.3.4 Parallel Development of Different Releases 203 10.3.5 Reuse and Integration 204 10.3.6 Adapting to Web Application’s Complexity Level 204 10.3.7 Summary 205 10.4 Analysis of the Rational Unified Process 205 10.4.1 Introduction 205 10.4.2 General Suitability for Web Application Development 208 10.4.3 Does RUP meet the Requirements of Web Applications? 209 10.5 Analysis of Extreme Programming 211 10.5.1 Introduction 211 10.5.2 Does XP meet the Requirements of Web Application Development? 214 10.6 Outlook 216 11 Usability of Web Applications 219Martin Hitz, Gerhard Leitner, Rudolf Melcher 11.1 Motivation 219 11.2 What is Usability? 220 11.3 What Characterizes the Usability of Web Applications? 222 11.4 Design Guidelines 225 11.4.1 Response Times 225 11.4.2 Interaction Efficiency 225 11.4.3 Colors 226 11.4.4 Text Layout 227 11.4.5 Page Structure 228 11.4.6 Navigation Structure 228 11.4.7 Multiculturality 230 11.4.8 Confidence-generating Measures 231 11.4.9 Other Design Criteria 232 11.5 Web Usability Engineering Methods 232 11.5.1 Requirements Analysis 234 11.5.2 Design 237 11.5.3 Implementation 238 11.5.4 Operation 238 11.6 Web Usability Engineering Trends 239 11.6.1 Usability Patterns 239 11.6.2 Mobile Usability 241 11.6.3 Accessibility 243 11.7 Outlook 245 12 Performance of Web Applications 247Gabriele Kotsis 12.1 Introduction 247 12.2 What Is Performance? 248 12.3 What Characterizes the Performance of Web Applications? 250 12.4 System Definition and Indicators 251 12.5 Characterizing the Workload 252 12.6 Analytical Techniques 254 12.6.1 Operational Analysis 254 12.6.2 Queuing Networks and Simulation Models 255 12.6.3 Measuring Approaches 257 12.7 Representing and Interpreting Results 258 12.8 Performance Optimization Methods 259 12.8.1 Acceleration Within a Web Application 260 12.8.2 Reducing Transmission Time 261 12.8.3 Server Tuning 263 12.9 Outlook 263 13 Security for Web Applications 265Martin Wimmer, Alfons Kemper, Stefan Seltzsam 13.1 Introduction 265 13.2 Aspects of Security 266 13.3 Encryption, Digital Signatures and Certificates 268 13.3.1 Symmetric Cryptography 268 13.3.2 Asymmetric Cryptography 270 13.3.3 Digital Signatures 271 13.3.4 Certificates and Public Key Infrastructure 272 13.4 Secure Client/Server-Interaction 272 13.4.1 Point-to-Point Security 272 13.4.2 End-to-End Security 274 13.4.3 User Authentication and Authorization 276 13.4.4 Electronic Payment Systems 278 13.5 Client Security Issues 279 13.5.1 Preserving Privacy 279 13.5.2 Mobile Code Security 281 13.5.3 Phishing and Web Spoofing 282 13.5.4 Desktop Security 283 13.6 Service Provider Security Issues 285 13.6.1 Cross-Site Scripting 285 13.6.2 SQL Injection 287 13.6.3 Security of CGI Programs 289 13.6.4 Service Availability 290 13.6.5 Host Security 291 13.7 Outlook 292 14 The Semantic Web – The Network of Meanings in the Network of Documents 293Wernher Behrendt, Nitin Arora 14.1 Fundamentals of the Semantic Web 293 14.1.1 The Role of Software Agents 294 14.1.2 The Role of Semantic Markup 296 14.1.3 The Role of Ontologies 297 14.2 Technological Concepts 298 14.2.1 Agents According to the FIPA Standard 298 14.2.2 Ontologies 300 14.2.3 Semantic Markup on the Web 303 14.3 Specifics of Semantic Web Applications 308 14.3.1 Semantic Markup 308 14.3.2 Agents 309 14.3.3 Ontologies 309 14.3.4 Semantic Web Services 310 14.3.5 Integration into Web Engineering 313 14.4 Tools 314 14.5 Outlook 315 Glossary 317 Author Biographies 329 Bibliography 337 Credits 357 Index 359

    15 in stock

    £48.44

  • Network Congestion Control Managing Internet

    John Wiley & Sons Inc Network Congestion Control Managing Internet

    15 in stock

    Book SynopsisAs the Internet becomes increasingly heterogeneous, the issue of congestion control becomes ever more important. In order to maintain good network performance, mechanisms must be provided to prevent the network from being congested for any significant period of time.Trade Review"…a good supplement to the companion toolbox…" (Computing Reviews.com, May 19, 2006)Table of ContentsForeword. Preface. List of Tables. List of Figures. 1. Introduction . 1.1 Who should read this book? 1.2 Contents. 1.3 Structure. 2. Congestion control principles. 2.1 What is congestion? 2.2 Congestion collapse. 2.3 Controlling congestion: design considerations. 2.4 Implicit feedback. 2.5 Source behaviour with binary feedback. 2.6 Stability. 2.7 Rate-based versus window-based control. 2.8 RTT estimation. 2.9 Traffic phase effects. 2.10 Queue management. 2.11 Scalability. 2.12 Explicit feedback. 2.13 Special environments. 2.14 Congestion control and OSI layers. 2.15 Multicast congestion control. 2.16 Incentive issues. 2.17 Fairness. 2.18 Conclusion. 3. Present technology. 3.1 Introducing TCP. 3.2 TCP window management. 3.3 TCP RTO calculation. 3.4 TCP congestion control and reliability. 3.5 Concluding remarks about TCP. 3.6 The Stream Control Transmission Protocol (SCTP). 3.7 Random Early Detection (RED). 3.8 The ATM‘Available Bit Rate’ service. 4. Experimental enhancements. 4.1 Ensuring appropriate TCP behaviour. 4.2 Maintaining congestion state. 4.3 Transparent TCP improvements. 4.4 Enhancing active queue management. 4.5 Congestion control for multimedia applications. 4.6 Better-than-TCP congestion control. 4.7 Congestion control in special environments. 5. Internet traffic management – the ISP perspective. 5.1 The nature of Internet traffic. 5.2 Traffic engineering. 5.3 Quality of Service (QoS). 5.4 Putting it all together. 6. The future of Internet congestion control. 6.1 Small deltas or big ideas? 6.2 Incentive issues. 6.3 Tailor-made congestion control. Appendix A: Teaching congestion control with tools. A.1 CAVT. A.1.1 Writing script. A.1.2 Teaching with CAVT. A.1.3 Internals. A.2 ns. A.2.1 Using ns for teaching: the problem. A.2.2 Using ns for teaching: the solution. A.2.3 NSBM. A.2.4 Example exercises. Appendix B: Related IETF work. B.1 Overview. B.2 Working groups. B.3 Finding relevant documents. Appendix C: List of abbreviations. Bibliography. Index.

    15 in stock

    £95.36

  • SelfOrganization in Sensor and Actor Networks

    John Wiley & Sons Inc SelfOrganization in Sensor and Actor Networks

    10 in stock

    Book SynopsisSelf-Organization in Sensor and Actor Networks explores self-organization mechanisms and methodologies concerning the efficient coordination between intercommunicating autonomous systems.Self-organization is often referred to as the multitude of algorithms and methods that organise the global behaviour of a system based on inter-system communication. Studies of self-organization in natural systems first took off in the 1960s. In technology, such approaches have become a hot research topic over the last 4-5 years with emphasis upon management and control in communication networks, and especially in resource-constrained sensor and actor networks. In the area of ad hoc networks new solutions have been discovered that imitate the properties of self-organization. Some algorithms for on-demand communication and coordination, including data-centric networking, are well-known examples. Key features include: Detailed treatment of self-organization, mobile sensor and actoTable of ContentsForeword. Preface. About the Author. List of Abbreviations. I Self-Organization. 1 Introduction to Self-Organization. 1.1 Understanding self-organization. 1.2 Application scenarios for self-organization. 2 System Management and Control – A Historical Overview. 2.1 System architecture. 2.2 Management and control. 2.2.1 Centralized control. 2.2.2 Distributed systems. 2.2.3 Self-organizing systems. 3 Self-Organization – Context and Capabilities. 3.1 Complex systems. 3.2 Self-organization and emergence. 3.3 Systems lacking self-organization. 3.3.1 External control. 3.3.2 Blueprints and templates. 3.4 Self-X capabilities. 3.5 Consequences of emergent properties. 3.6 Operating self-organizing systems. 3.6.1 Asimov’s Laws of Robotics. 3.6.2 Attractors. 3.7 Limitations of self-organization. 4 Natural Self-Organization. 4.1 Development of understandings. 4.2 Examples in natural sciences. 4.2.1 Biology. 4.2.2 Chemistry. 4.3 Differentiation self-organization and bio-inspired. 4.3.1 Exploring bio-inspired. 4.3.2 Bio-inspired techniques. 4.3.3 Self-organization vs. bio-inspired. 5 Self-Organization in Technical Systems. 5.1 General applicability. 5.1.1 Autonomous systems. 5.1.2 Multi-robot systems. 5.1.3 Autonomic networking. 5.1.4 Mobile Ad Hoc Networks. 5.1.5 Sensor and Actor Networks. 5.2 Operating Sensor and Actor Networks. 6 Methods and Techniques. 6.1 Basic methods. 6.1.1 Positive and negative feedback. 6.1.2 Interactions among individuals and with the environment. 6.1.3 Probabilistic techniques. 6.2 Design paradigms for self-organization. 6.2.1 Design process. 6.2.2 Discussion of the design paradigms. 6.3 Developing nature-inspired self-organizing systems. 6.4 Modeling self-organizing systems. 6.4.1 Overview to modeling techniques. 6.4.2 Differential equation models. 6.4.3 Monte Carlo simulations. 6.4.4 Choosing the right modeling technique. Appendix I Self-Organization – Further Reading. II Networking Aspects: Ad Hoc and Sensor Networks. 7 Mobile Ad Hoc and Sensor Networks. 7.1 Ad hoc networks. 7.1.1 Basic properties of ad hoc networks. 7.1.2 Mobile Ad Hoc Networks. 7.2 Wireless Sensor Networks. 7.2.1 Basic properties of sensor networks. 7.2.2 Composition of single sensor nodes. 7.2.3 Communication in sensor networks. 7.2.4 Energy aspects. 7.2.5 Coverage and deployment. 7.2.6 Comparison between MANETs and WSNs. 7.2.7 Application examples. 7.3 Challenges and research issues. 7.3.1 Required functionality and constraints. 7.3.2 Research objectives. 8 Self-Organization in Sensor Networks. 8.1 Properties and objectives. 8.2 Categorization in two dimensions. 8.2.1 Horizontal dimension. 8.2.2 Vertical dimension. 8.3 Methods and application examples. 8.3.1 Mapping with primary self-organization methods. 8.3.2 Global state. 8.3.3 Location information. 8.3.4 Neighborhood information. 8.3.5 Local state. 8.3.6 Probabilistic techniques. 9 Medium Access Control. 9.1 Contention-based protocols. 9.2 Sensor MAC. 9.2.1 Synchronized listen/sleep cycles. 9.2.2 Performance aspects. 9.2.3 Performance evaluation. 9.3 Power-Control MAC protocol. 9.4 Conclusion. 10 Ad Hoc Routing. 10.1 Overview and categorization. 10.1.1 Address-based routing vs. data-centric forwarding. 10.1.2 Classification of ad hoc routing protocols. 10.2 Principles of ad hoc routing protocols. 10.2.1 Destination Sequenced Distance Vector. 10.2.2 Dynamic Source Routing. 10.2.3 Ad Hoc on Demand Distance Vector. 10.2.4 Dynamic MANET on Demand. 10.3 Optimized route stability. 10.4 Dynamic address assignment. 10.4.1 Overview and centralized assignment. 10.4.2 Passive Duplicate Address Detection. 10.4.3 Dynamic Address Allocation. 10.5 Conclusion. 11 Data-Centric Networking. 11.1 Overview and classification. 11.1.1 Data dissemination. 11.1.2 Network-centric operation. 11.1.3 Related approaches. 11.2 Flooding, gossiping, and optimizations. 11.2.1 Flooding. 11.2.2 Pure gossiping. 11.2.3 Optimized gossiping. 11.3 Agent-based techniques. 11.4 Directed diffusion. 11.4.1 Basic algorithm. 11.4.2 Mobility support. 11.4.3 Energy efficiency. 11.5 Data aggregation. 11.5.1 Principles and objectives. 11.5.2 Aggregation topologies. 11.6 Conclusion. 12 Clustering. 12.1 Principles of clustering. 12.1.1 Requirements and classification. 12.1.2 k-means. 12.1.3 Hierarchical clustering. 12.2 Clustering for efficient routing. 12.2.1 Low-Energy Adaptive Clustering Hierarchy. 12.2.2 Hybrid Energy-Efficient Distributed Clustering Approach. 12.3 Conclusion. Appendix II Networking Aspects – Further reading. III Coordination and Control: Sensor and Actor Networks. 13 Sensor and Actor Networks. 13.1 Introduction. 13.1.1 Composition of SANETs – an example. 13.1.2 Properties and capabilities. 13.1.3 Components of SANET nodes. 13.1.4 Application examples. 13.2 Challenges and research objectives. 13.2.1 Communication and coordination. 13.2.2 Collaboration and task allocation. 13.3 Limitations. 14 Communication and Coordination. 14.1 Synchronization vs. coordination. 14.1.1 Problem statement. 14.1.2 Logical time. 14.1.3 Coordination. 14.2 Time synchronization in WSNs and SANETs. 14.2.1 Requirements and objectives. 14.2.2 Conventional approaches. 14.2.3 Algorithms for WSNs. 14.3 Distributed coordination. 14.3.1 Scalable coordination. 14.3.2 Selected algorithms. 14.3.3 Integrated sensor-actor and actor-actor coordination. 14.3.4 Problems with selfish nodes. 14.4 In-network operation and control. 14.5 Conclusion. 15 Collaboration and Task Allocation. 15.1 Introduction to MRTA. 15.1.1 Primary objectives. 15.1.2 Classification and taxonomy. 15.2 Intentional cooperation – auction-based task allocation. 15.2.1 Open Agent Architecture. 15.2.2 MURDOCH. 15.2.3 Dynamic negotiation algorithm. 15.3 Emergent cooperation. 15.3.2 Stimulation by state. 15.4 Conclusion. Appendix III Coordination and Control – Further reading. IV Self-Organization Methods in Sensor and Actor Networks. 16 Self-Organization Methods – Revisited. 16.1 Self-organization methods in SANETs. 16.2 Positive and negative feedback. 16.3 Interactions among individuals and with the environment . 16.4 Probabilistic techniques. 17 Evaluation Criteria. 17.1 Scalability. 17.2 Energy considerations. 17.2.1 Energy management. 17.2.2 Transmission power management. 17.3 Network lifetime. 17.3.1 Definition of network lifetime. 17.3.2 Scenario-based comparisons of network lifetime. V Bio-inspired Networking. 18 Bio-inspired Systems. 18.1 Introduction and overview. 18.1.1 Ideas and concepts. 18.1.2 Bio-inspired research fields. 18.2 Swarm Intelligence. 18.2.1 Principles of ant foraging. 18.2.2 Ant-based routing. 18.2.3 Ant-based task allocation. 18.3 Artificial Immune System. 18.3.1 Principles of the immune system. 18.3.2 Application examples. 18.4 Cellular signaling pathways. 18.4.1 Introduction to signaling pathways. 18.4.2 Applicability in SANETs. 18.5 Conclusion. Appendix IV Bio-inspired Networking – Further reading. Bibliography. Index.

    10 in stock

    £93.05

  • Ubiquitous Computing

    John Wiley & Sons Inc Ubiquitous Computing

    Out of stock

    Book SynopsisThis book provides an introduction to the complex field of ubiquitous computing Ubiquitous Computing (also commonly referred to as Pervasive Computing) describes the ways in which current technological models, based upon three base designs: smart (mobile, wireless, service) devices, smart environments (of embedded system devices) and smart interaction (between devices), relate to and support a computing vision for a greater range of computer devices, used in a greater range of (human, ICT and physical) environments and activities. The author details the rich potential of ubiquitous computing, the challenges involved in making it a reality, and the prerequisite technological infrastructure. Additionally, the book discusses the application and convergence of several current major and future computing trends. Key Features: Provides an introduction to the complex field of ubiquitous computing Describes how current technology models based upon six different technology form factors which have varying degrees of mobility wireless connectivity and service volatility: tabs, pads, boards, dust, skins and clay, enable the vision of ubiquitous computing Describes and explores how the three core designs (smart devices, environments and interaction) based upon current technology models can be applied to, and can evolve to, support a vision of ubiquitous computing and computing for the future Covers the principles of the following current technology models, including mobile wireless networks, service-oriented computing, human computer interaction, artificial intelligence, context-awareness, autonomous systems, micro-electromechanical systems, sensors, embedded controllers and robots Covers a range of interactions, between two or more UbiCom devices, between devices and people (HCI), between devices and the physical world. Includes an accompanying website with PowerPoint slides, problems and solutions, exercises, bibliography and further reading Graduate students in computer science, electrical engineering and telecommunications courses will find this a fascinating and useful introduction to the subject. It will also be of interest to ICT professionals, software and network developers and others interested in future trends and models of computing and interaction over the next decades.Table of ContentsList of Figures xix List of Tables xxiii Preface xxv Acknowledgements xxvii 1 Ubiquitous Computing: Basics and Vision 1 1.1 Living in a Digital World 1 1.1.1 Chapter Overview 2 1.1.2 Illustrative Ubiquitous Computing Applications 2 1.1.2.1 Personal Memories 3 1.1.2.2 Adaptive Transport Scheduled Service 5 1.1.2.3 Foodstuff Management 5 1.1.2.4 Utility Regulation 6 1.1.3 Holistic Framework for UbiCom: Smart DEI 7 1.2 Modelling the Key Ubiquitous Computing Properties 8 1.2.1 Core Properties of UbiCom Systems 9 1.2.2 Distributed ICT Systems 9 1.2.2.1 Networked ICT Devices 10 1.2.2.2 Transparency and Openness 10 1.2.3 Implicit Human–Computer Interaction (iHCI) 11 1.2.3.1 The Calm Computer 11 1.2.3.2 Implicit Versus Explicit Human–Computer Interaction 12 1.2.3.3 Embodied Reality versus Virtual, Augmented and Mediated Reality 12 1.2.4 Context-Awareness 13 1.2.4.1 Three Main Types of Environment Context: Physical, User, Virtual 14 1.2.4.2 User-Awareness 14 1.2.4.3 Active Versus Passive Context-Awareness 15 1.2.5 Autonomy 15 1.2.5.1 Reducing Human Interaction 16 1.2.5.2 Easing System Maintenance Versus Self-Maintaining Systems 16 1.2.6 Intelligence 17 1.2.7 Taxonomy of UbiCom Properties 17 1.3 Ubiquitous System Environment Interaction 22 1.3.1 Human–ICT Device Interaction (HCI) 24 1.3.2 ICT Device to Physical World Interaction (CPI) 25 1.4 Architectural Design for UbiCom Systems: Smart DEI Model 26 1.4.1 Smart Devices 27 1.4.1.1 Weiser’s ICT Device Forms: Tabs, Pads and Boards 28 1.4.1.2 Extended Forms for ICT Devices: Dust, Skin and Clay 28 1.4.1.3 Mobility 29 1.4.1.4 Volatile Service Access 29 1.4.1.5 Situated and Self-Aware 30 1.4.2 Smart Environments 30 1.4.2.1 Tagging, Sensing and Controlling Environments 31 1.4.2.2 Embedded Versus Untethered 31 1.4.2.3 Device Sizes 32 1.4.3 Smart Interaction 32 1.4.3.1 Basic Interaction 32 1.4.3.2 Smart Interaction 33 1.5 Discussion 34 1.5.1 Interlinking System Properties, Environments and Designs 34 1.5.2 Common Myths about Ubiquitous Computing 35 1.5.3 Organisation of the Smart DEI Approach 37 Exercises 38 References 39 2 Applications and Requirements 41 2.1 Introduction 41 2.1.1 Overview 41 2.2 Example Early UbiCom Research Projects 41 2.2.1 Smart Devices: cci 42 2.2.1.1 Smart Boards, Pads and Tabs 42 2.2.1.2 Active Badge, Bat and Floor 42 2.2.2 Smart Environments: CPI and cci 43 2.2.2.1 Classroom 2000 43 2.2.2.2 Smart Space and Meeting Room 43 2.2.2.3 Interactive Workspaces and iRoom 44 2.2.2.4 Cooltown 44 2.2.2.5 EasyLiving and SPOT 45 2.2.2.6 HomeLab and Ambient Intelligence 46 2.2.3 Smart Devices: CPI 46 2.2.3.1 Unimate and MH-1 Robots 46 2.2.3.2 Smart Dust and TinyOS 47 2.2.4 Smart Devices: iHCI and HPI 48 2.2.4.1 Calm Computing 48 2.2.4.2 Things That Think and Tangible Bits 48 2.2.4.3 DataTiles 49 2.2.4.4 Ambient Wood 50 2.2.4.5 WearComp and WearCam 50 2.2.4.6 Cyborg 1.0 and 2.0 52 2.2.5 Other UbiCom Projects 52 2.3 Everyday Applications in the Virtual, Human and Physical World 53 2.3.1 Ubiquitous Networks of Devices: cci 53 2.3.2 Human–Computer Interaction 54 2.3.2.1 Ubiquitous Audio-Video Content Access 54 2.3.2.2 Ubiquitous Information Access and Ebooks 55 2.3.2.3 Universal Local Control of ICT Systems 56 2.3.2.4 User-Awareness and Personal Spaces 58 2.3.3 Human-to-Human Interaction (HHI) Applications 58 2.3.3.1 Transaction-based M-Commerce and U-Commerce Services 59 2.3.3.2 Enhancing the Productivity of Mobile Humans 59 2.3.3.3 Care in the Community 60 2.3.4 Human-Physical World-Computer Interaction (HPI) and (CPI) 61 2.3.4.1 Physical Environment Awareness 61 2.3.4.2 (Physical) Environment Control 61 2.3.4.3 Smart Utilities 62 2.3.4.4 Smart Buildings and Home Automation 62 2.3.4.5 Smart Living Environments and Smart Furniture 63 2.3.4.6 Smart Street Furniture 65 2.3.4.7 Smart Vehicles, Transport and Travel 65 2.3.4.8 Pervasive Games and Social Physical Spaces 66 2.4 Discussion 67 2.4.1 Achievements from Early Projects and Status Today 67 2.4.1.1 Smart Devices 67 2.4.1.2 Smart Physical World Environments 68 2.4.1.3 Context-Awareness and Service Discovery 69 2.4.1.4 Wearable Smart Devices and Implants 69 Exercises 71 References 71 3 Smart Devices and Services 75 3.1 Introduction 75 3.1.1 Chapter Overview 75 3.1.2 Smart Device and Service Characteristics 75 3.1.3 Distributed System Viewpoints 77 3.1.4 Abstraction Versus Virtualisation 78 3.2 Service Architecture Models 80 3.2.1 Partitioning and Distribution of Service Components 80 3.2.2 Multi-tier Client Service Models 81 3.2.2.1 Distributed Data Storage 82 3.2.2.2 Distributed Processing 82 3.2.2.3 Client–Server Design 83 3.2.2.4 Proxy-based Service Access 84 3.2.3 Middleware 85 3.2.4 Service Oriented Computing (SOC) 86 3.2.5 Grid Computing 87 3.2.6 Peer-to-Peer Systems 88 3.2.7 Device Models 91 3.3 Service Provision Life-Cycle 91 3.3.1 Network Discovery 92 3.3.2 Service Announcement, Discovery, Selection and Configuration 93 3.3.2.1 Web Service Discovery 95 3.3.2.2 Semantic Web and Semantic Resource Discovery 95 3.3.3 Service Invocation 95 3.3.3.1 Distributed Processes 96 3.3.3.2 Asynchronous (MOM) Versus Synchronous (RPC) Communication Models 97 3.3.3.3 Reliable versus Unreliable Communication 99 3.3.3.4 Caches, Read-Ahead and Delayed Writes 99 3.3.3.5 On-Demand Service Access 100 3.3.3.6 Event-Driven Architectures (EDA) 101 3.3.3.7 Shared Data Repository 103 3.3.3.8 Enterprise Service Bus (ESB) Model 103 3.3.3.9 Volatile Service Invocation 104 3.3.4 Service Composition 105 3.3.4.1 Service Interoperability 106 3.4 Virtual Machines and Operating Systems 106 3.4.1 Virtual Machines 106 3.4.2 Bios 107 3.4.3 Multi-Tasking Operating Systems (MTOS) 108 3.4.4 Process Control 109 3.4.5 Memory Management 110 3.4.6 Input and Output 111 Exercises 111 References 112 4 Smart Mobiles, Cards and Device Networks 115 4.1 Introduction 115 4.1.1 Chapter Overview 115 4.2 Smart Mobile Devices, Users, Resources and Code 115 4.2.1 Mobile Service Design 116 4.2.1.1 SMS and Mobile Web Services 117 4.2.1.2 Java VM and J2ME 119 4.2.1.3 .net Cf 120 4.2.2 Mobile Code 121 4.2.3 Mobile Devices and Mobile Users 122 4.3 Operating Systems for Mobile Computers and Communicator Devices 123 4.3.1 Microkernel Designs 123 4.3.2 Mobility Support 123 4.3.3 Resource-Constrained Devices 124 4.3.4 Power Management 125 4.3.4.1 Low Power CPUs 125 4.3.4.2 Application Support 126 4.4 Smart Card Devices 126 4.4.1 Smart Card OS 127 4.4.2 Smart Card Development 128 4.5 Device Networks 128 4.5.1 HAVi, HES and X 10 129 4.5.2 Device Discovery 129 4.5.3 OSGi 131 Exercises 132 References 133 5 Human–Computer Interaction 135 5.1 Introduction 135 5.1.1 Chapter Overview 135 5.1.2 Explicit HCI: Motivation and Characteristics 136 5.1.3 Complexity of Ubiquitous Explicit HCI 136 5.1.4 Implicit HCI: Motivation and Characteristics 137 5.2 User Interfaces and Interaction for Four Widely Used Devices 138 5.2.1 Diversity of ICT Device Interaction 138 5.2.2 Personal Computer Interface 139 5.2.3 Mobile Hand-Held Device Interfaces 140 5.2.3.1 Handling Limited Key Input: Multi-Tap, T9, Fastap, Soft keys and Soft Keyboard 140 5.2.3.2 Handling Limited Output 141 5.2.4 Games Console Interfaces and Interaction 142 5.2.5 Localised Remote Control: Video Devices 143 5.3 Hidden UI Via Basic Smart Devices 143 5.3.1 Multi-Modal Visual Interfaces 144 5.3.2 Gesture Interfaces 145 5.3.3 Reflective Versus Active Displays 147 5.3.4 Combining Input and Output User Interfaces 148 5.3.4.1 Touchscreens 149 5.3.4.2 Tangible Interfaces 149 5.3.4.3 Organic Interfaces 150 5.3.5 Auditory Interfaces 151 5.3.6 Natural Language Interfaces 151 5.4 Hidden UI Via Wearable and Implanted Devices 152 5.4.1 Posthuman Technology Model 152 5.4.2 Virtual Reality and Augmented Reality 152 5.4.3 Wearable Computer Interaction 153 5.4.3.1 Head(s)-Up Display (HUD) 154 5.4.3.2 Eyetap 154 5.4.3.3 Virtual Retinal Display (VRD) 154 5.4.3.4 Clothes as Computers 155 5.4.4 Computer Implants and Brain Computer Interfaces 155 5.4.5 Sense-of-Presence and Telepresence 157 5.5 Human-Centred Design (HCD) 157 5.5.1 Human-Centred Design Life-Cycle 158 5.5.2 Methods to Acquire User Input and to Build Used Models 159 5.5.3 Defining the Virtual and Physical Environment Use Context 160 5.5.4 Defining the Human Environment Use Context and Requirements 160 5.5.4.1 User Characteristics 160 5.5.5 Interaction Design 161 5.5.5.1 Conceptual Models and Mental Models 162 5.5.6 Evaluation 162 5.6 User Models: Acquisition and Representation 163 5.6.1 Indirect User Input and Modelling 164 5.6.2 Direct User Input and Modelling 164 5.6.3 User Stereotypes 165 5.6.4 Modelling Users’ Planned Tasks and Goals 165 5.6.5 Multiple User Tasks and Activity-Based Computing 166 5.6.6 Situation Action Versus Planned Action Models 167 5.7 iHCI Design 167 5.7.1 iHCI Model Characteristics 167 5.7.2 User Context-Awareness 168 5.7.3 More Intuitive and Customised Interaction 168 5.7.4 Personalisation 169 5.7.5 Affective Computing: Interactions Using Users’ Emotional Context 171 5.7.6 Design Heuristics and Patterns 171 Exercises 175 References 175 6 Tagging, Sensing and Controlling 179 6.1 Introduction 179 6.1.1 Chapter Overview 180 6.2 Tagging the Physical World 180 6.2.1 Life-Cycle for Tagging Physical Objects 181 6.2.2 Tags: Types and Characteristics 181 6.2.3 Physical and Virtual Tag Management 183 6.2.4 RFID Tags 183 6.2.4.1 Active RFID Tags 185 6.2.4.2 Passive RFID Tags 185 6.2.5 Personalised and Social Tags 186 6.2.6 Micro Versus Macro Tags 187 6.3 Sensors and Sensor Networks 187 6.3.1 Overview of Sensor Net Components and Processes 187 6.3.2 Sensor Electronics 189 6.3.3 Physical Network: Environment, Density and Transmission 191 6.3.4 Data Network: Addressing and Routing 192 6.3.4.1 Sensor Networks Versus Ad Hoc Networks 193 6.3.5 Data Processing: Distributed Data Storage and Data Queries 193 6.4 Micro Actuation and Sensing: MEMS 194 6.4.1 Fabrication 195 6.4.2 Micro-Actuators 195 6.4.3 Micro-Sensors 196 6.4.4 Smart Surfaces, Skin, Paint, Matter and Dust 197 6.4.5 Downsizing to Nanotechnology and Quantum Devices 198 6.5 Embedded Systems and Real-Time Systems 199 6.5.1 Application-Specific Operating Systems (ASOS) 200 6.5.2 Real-Time Operating Systems for Embedded Systems 201 6.6 Control Systems (for Physical World Tasks) 202 6.6.1 Programmable Controllers 202 6.6.2 Simple PID-Type Controllers 203 6.6.3 More Complex Controllers 203 6.7 Robots 204 6.7.1 Robot Manipulators 205 6.7.2 Mobile Robots 206 6.7.3 Biologically Inspired Robots 206 6.7.4 Nanobots 207 6.7.5 Developing UbiCom Robot Applications 207 Exercises 209 References 210 7 Context-Aware Systems 213 7.1 Introduction 213 7.1.1 Chapter Overview 214 7.1.2 Context-Aware Applications 214 7.2 Modelling Context-Aware Systems 216 7.2.1 Types of Context 216 7.2.2 Context Creation and Context Composition 218 7.2.3 Context-Aware Adaptation 219 7.2.4 Environment Modelling 221 7.2.5 Context Representation 221 7.2.6 A Basic Architecture 222 7.2.7 Challenges in Context-Awareness 225 7.3 Mobility Awareness 227 7.3.1 Call Routing for Mobile Users 227 7.3.2 Mobile Phone Location Determination 227 7.3.3 Mobile User Awareness as an Example of Composite Context-Awareness 228 7.3.4 Tourism Services for Mobile Users 228 7.4 Spatial Awareness 229 7.4.1 Spatial Context Creation 230 7.4.1.1 Spatial Acquisition 230 7.4.1.2 Location Acquisition 231 7.4.2 Location and Other Spatial Abstractions 233 7.4.3 User Context Creation and Context-Aware Adaptation 233 7.4.3.1 Cartography: Adapting Spatial Viewpoints to Different User Contexts 233 7.4.3.2 Geocoding: Mapping Location Contexts to User Contexts 234 7.4.4 Spatial Context Queries and Management: GIS 234 7.5 Temporal Awareness: Coordinating and Scheduling 235 7.5.1 Clock Synchronization: Temporal Context Creation 235 7.5.2 Temporal Models and Abstractions 236 7.5.3 Temporal Context Management and Adaptation to User Contexts 237 7.6 ICT System Awareness 238 7.6.1 Context-Aware Presentation and Interaction at the UI 238 7.6.1.1 Acquiring the UI Context 238 7.6.1.2 Content Adaptation 239 7.6.2 Network-Aware Service Adaptation 240 Exercises 242 References 242 8 Intelligent Systems (IS) 245 With Patricia Charlton 8.1 Introduction 245 8.1.1 Chapter Overview 246 8.2 Basic Concepts 246 8.2.1 Types of Intelligent Systems 246 8.2.2 Types of Environment for Intelligent Systems 247 8.2.3 Use of Intelligence in Ubiquitous Computing 248 8.3 IS Architectures 249 8.3.1 What a Model Knows Versus How it is Used 249 8.3.1.1 Types of Architecture Model 250 8.3.1.2 Unilateral Versus Bilateral System Environment Models 251 8.3.1.3 Model Representations 252 8.3.1.4 How System Models are Acquired and Adapt 252 8.3.2 Reactive IS Models 252 8.3.3 Environment Model-based IS 254 8.3.4 Goal-based IS 255 8.3.5 Utility-based IS 256 8.3.6 Learning-based IS 256 8.3.6.1 Machine Learning Design 257 8.3.7 Hybrid IS 258 8.3.8 Knowledge-based (KB) IS 260 8.3.8.1 Production or Rule-based KB System 260 8.3.8.2 Blackboard KB System 261 8.3.9 IS Models Applied to UbiCom Systems 261 8.4 Semantic KB IS 263 8.4.1 Knowledge Representation 263 8.4.2 Design Issues 265 8.4.2.1 Open World Versus Closed World Semantics 265 8.4.2.2 Knowledge Life-cycle and Knowledge Management 266 8.4.2.3 Creating Knowledge 266 8.4.2.4 Knowledge Deployment and Maintaining Knowledge 267 8.4.2.5 Design Issues for UbiCom Use 267 8.5 Classical Logic IS 268 8.5.1 Propositional and Predicate Logic 268 8.5.2 Reasoning 269 8.5.3 Design Issues 270 8.6 Soft Computing IS Models 271 8.6.1 Probabilistic Networks 271 8.6.2 Fuzzy Logic 272 8.7 IS System Operations 272 8.7.1 Searching 272 8.7.2 Classical (Deterministic) Planning 274 8.7.3 Non-Deterministic Planning 275 Exercises 276 References 276 9 Intelligent System Interaction 279 With Patricia Charlton 9.1 Introduction 279 9.1.1 Chapter Overview 279 9.2 Interaction Multiplicity 279 9.2.1 P2P Interaction Between Multiple Senders and Receivers 281 9.2.1.1 Unknown Sender and Malicious Senders 281 9.2.1.2 Unknown Receivers 282 9.2.1.3 Too Many Messages 282 9.2.2 Interaction Using Mediators 282 9.2.2.1 Shared Communication Resource Access 283 9.2.2.2 Shared Computation Resource Access 283 9.2.2.3 Mediating Between Requesters and Providers 284 9.2.3 Interaction Using Cooperative Participants 286 9.2.3.1 Coordination 287 9.2.3.2 Coordination Using Norms and Electronic Institutions 289 9.2.3.3 Hierarchical and Role-based Organisational Interaction 290 9.2.4 Interaction with Self-Interested Participants 291 9.2.4.1 Market-based Interaction and Auctions 292 9.2.4.2 Negotiation and Agreements 293 9.2.4.3 Consensus-based Agreements 295 9.3 Is Interaction Design 295 9.3.1 Designing System Interaction to be More Intelligent 296 9.3.2 Designing Interaction Between Individual Intelligent Systems 297 9.3.3 Interaction Protocol Design 297 9.3.3.1 Semantic or Knowledge-Sharing Protocols 298 9.3.3.2 Agent Communication Languages and Linguistic-based Protocols 300 9.3.4 Further Examples of the Use of Interaction Protocols 302 9.3.5 Multi-Agent Systems 303 9.3.5.1 ACL and Agent Platform Design 304 9.3.5.2 Multi-Agent System Application Design 305 9.4 Some Generic Intelligent Interaction Applications 306 9.4.1 Social Networking and Media Exchange 307 9.4.2 Recommender and Referral Systems 308 9.4.2.1 Recommender Systems 308 9.4.2.2 Content-based Recommendations 308 9.4.2.3 Collaborative Filtering 309 9.4.3 Pervasive Work Flow Management for People 309 9.4.4 Trust Management 309 Exercises 311 References 312 10 Autonomous Systems and Artificial Life 317 10.1 Introduction 317 10.1.1 Chapter Overview 317 10.2 Basic Autonomous Intra-Acting Systems 318 10.2.1 Types of Autonomous System 318 10.2.1.1 Autonomous Intelligent Systems 319 10.2.1.2 Limitation of Autonomous Systems 319 10.2.2 Self-* Properties of Intra-Action 320 10.3 Reflective and Self-Aware Systems 322 10.3.1 Self-Awareness 322 10.3.2 Self-Describing and Self-Explaining Systems 323 10.3.3 Self-Modifying Systems Based Upon Reflective Computation 325 10.4 Self-Management and Autonomic Computing 326 10.4.1 Autonomic Computing Design 328 10.4.2 Autonomic Computing Applications 330 10.4.3 Modelling and Management Self-Star Systems 331 10.5 Complex Systems 332 10.5.1 Self-Organization and Interaction 332 10.5.2 Self-Creation and Self-Replication 335 10.6 Artificial Life 336 10.6.1 Finite State Automata Models 336 10.6.2 Evolutionary Computing 337 Exercises 338 References 339 11 Ubiquitous Communication 343 11.1 Introduction 343 11.1.1 Chapter Overview 344 11.2 Audio Networks 344 11.2.1 PSTN Voice Networks 344 11.2.2 Intelligent Networks and IP Multimedia Subsystems 345 11.2.3 ADLS Broadband 346 11.2.4 Wireless Telecoms Networks 346 11.2.5 Audio Broadcast (Radio Entertainment) Networks 347 11.3 Data Networks 347 11.3.1 Network Protocol Suites 348 11.3.2 Addressing 348 11.3.3 Routing and Internetworking 349 11.4 Wireless Data Networks 350 11.4.1 Types of Wireless Network 350 11.4.2 WLAN and WiMAX 352 11.4.3 Bluetooth 353 11.4.4 ZigBee 353 11.4.5 Infrared 354 11.4.6 Uwb 354 11.4.7 Satellite and Microwave Communication 354 11.4.8 Roaming between Local Wireless LANs 355 11.5 Universal and Transparent Audio, Video and Alphanumeric Data Network Access 356 11.5.1 Combined Voice and Data Networks 357 11.5.2 Combined Audio-Video and Data Content Distribution Networks 358 11.5.3 On-demand, Interactive and Distributed Content 360 11.6 Ubiquitous Networks 360 11.6.1 Wireless Networks 360 11.6.2 Power Line Communication (PLC) 361 11.6.3 Personal Area Networks 362 11.6.4 Body Area Networks 362 11.6.5 Mobile Users Networks 363 11.6.5.1 Mobile Addresses 363 11.6.5.2 Single-Path Routing 364 11.6.5.3 Multi-Path Routing in Mobile Ad hoc Networks (MANETs) 364 11.7 Further Network Design Issues 365 11.7.1 Network Access Control 365 11.7.2 Ubiquitous Versus Localised Access 366 11.7.3 Controlling Network Access: Firewalls, NATs and VPNs 367 11.7.4 Group Communication: Transmissions for Multiple Receivers 368 11.7.5 Internetworking Heterogeneous Networks 368 11.7.6 Global Use: Low-Cost Access Networks for Rural Use 369 11.7.7 Separating Management and Control from Usage 369 11.7.8 Service-Oriented Networks 370 11.7.8.1 Service-Orientation at the Network Edge 371 11.7.8.2 Content-based Networks 372 11.7.8.3 Programmable Networks 372 11.7.8.4 Overlay Networks 372 11.7.8.5 Mesh Networks 373 11.7.8.6 Cooperative Networks 375 Exercises 375 References 376 12 Management of Smart Devices 379 12.1 Introduction 379 12.1.1 Chapter Overview 380 12.2 Managing Smart Devices in Virtual Environments 380 12.2.1 Process and Application Management 380 12.2.2 Network-Oriented Management 380 12.2.2.1 Fcaps 382 12.2.3 Monitoring and Accounting 383 12.2.3.1 Icmp 384 12.2.3.2 Snmp 384 12.2.4 Configuration Management 386 12.2.5 Security Management 386 12.2.5.1 Encryption Support for Confidentiality, Authentication and Authorisation 388 12.2.5.2 Securing the System and its Middleware 389 12.2.5.3 Securing Access Devices 391 12.2.5.4 Securing Information 392 12.2.6 Fault Management 393 12.2.7 Performance Management 394 12.2.8 Service-Oriented Computer Management 395 12.2.8.1 Metrics for Evaluating the Use of SOA 395 12.2.8.2 Distributed Resource Management and the Grid 396 12.2.8.3 SLA Management of Services 397 12.2.8.4 Policy-based Service Management 397 12.2.8.5 Pervasive Work Flow Management for Services 398 12.2.9 Information Management 399 12.2.9.1 Information Applications 399 12.2.9.2 Rich Versus Lean and Soft Versus Hard Information 399 12.2.9.3 Managing the Information Explosion 400 12.2.9.4 Managing Multimedia Content 401 12.2.9.5 Managing Lean and Hard Data Using RDBMSs 402 12.2.9.6 Managing Metadata 403 12.3 Managing Smart Devices in Human User-Centred Environments 404 12.3.1 Managing Richer and Softer Data 404 12.3.2 Service Management Models for Human User and Physical Environments 404 12.3.3 User Task and Activity-Based Management 407 12.3.4 Privacy Management 407 12.3.4.1 Biometric User Identification 408 12.3.4.2 Privacy-Invasive Technologies versus Privacy-Enhanced Technologies 410 12.3.4.3 Entrusted Regulation of User Privacy to Service Providers 411 12.3.4.4 Legislative Approaches to Privacy 412 12.4 Managing Smart Devices in Physical Environments 412 12.4.1 Context-Awareness 412 12.4.1.1 Context-Aware Management of Physical and Human Activities 413 12.4.1.2 Management of Contexts and Events 413 12.4.2 Micro and Nano-Sized Devices 415 12.4.3 Unattended Embedded Devices 415 Exercises 416 References 416 13 Ubiquitous System: Challenges and Outlook 421 13.1 Introduction 421 13.1.1 Chapter Overview 421 13.2 Overview of Challenges 422 13.2.1 Key Challenges 422 13.2.2 Multi-Level Support for UbiCom Properties 423 13.2.3 Evolution Versus Revolution 424 13.2.4 Future Technologies 424 13.3 Smart Devices 425 13.3.1 Smaller, More Functional Smart Devices 425 13.3.2 More Fluid Ensembles of Diverse Devices 426 13.3.3 Richer System Interaction and Interoperability 427 13.3.3.1 Migrating from Analogue to Digital Device Interaction 427 13.3.3.2 Richer Digital Device Interaction 428 13.4 Smart Interaction 428 13.4.1 Unexpected Connectivity: Accidentally Smart Environments 428 13.4.2 Impromptu Service Interoperability 429 13.5 Smart Physical Environment Device Interaction 430 13.5.1 Context-Awareness: Ill-Defined Contexts Versus a Context-Free World 430 13.5.2 Lower Power and Sustainable Energy Usage 431 13.5.3 ECO-Friendly UbiCom Devices 433 13.6 Smart Human–Device Interaction 436 13.6.1 More Diverse Human–Device Interaction 437 13.6.2 More Versus Less Natural HCI 439 13.6.3 Analogue to Digital and Digital Analogues 439 13.6.4 Form Follows Function 440 13.6.5 Forms for Multi-Function Devices 441 13.7 Human Intelligence Versus Machine Intelligence 441 13.7.1 Posthuman: ICT Augments Human Abilities Beyond Being Human 443 13.7.2 Blurring of Reality and Mediated Realities 444 13.8 Social Issues: Promise Versus Peril 444 13.8.1 Increased Virtual Social Interaction Versus Local Social Interaction 446 13.8.2 UbiCom Accessible by Everyone 446 13.8.3 UbiCom Affordable by Everyone 447 13.8.4 Legislation in the Digital World and Digitising Legislation 448 13.9 Final Remarks 450 Exercises 451 References 452 Index 455

    Out of stock

    £75.56

  • Wireless Sensor Networks

    John Wiley & Sons Inc Wireless Sensor Networks

    15 in stock

    Book SynopsisThis book presents an in-depth study on recent advances and research in Wireless Sensor Networks (WSNs). Existing WSN applications are described, followed by discussing the ongoing research efforts on some WSNs applications that show the usefulness of sensor networks. Theoretical analysis and factors influencing protocol design are highlighted.Trade Review"It is intended for advanced students but also would be useful for researchers, system and chip designers, and other professionals in related fields." (Booknews, 1 February 2011) "The book is written in an accessible, textbook style, and includes problems and solutions to assist learning." (Dark Fiber, 8 February 2011)Table of ContentsAbout the Series Editor xvii Preface xix 1 Introduction 1 1.1 Sensor Mote Platforms 2 1.2 WSN Architecture and Protocol Stack 10 References 15 2 WSN Applications 17 2.1 Military Applications 17 2.2 Environmental Applications 21 2.3 Health Applications 26 2.4 Home Applications 29 2.5 Industrial Applications 31 References 33 3 Factors Influencing WSN Design 37 3.1 Hardware Constraints 37 3.2 Fault Tolerance 39 3.3 Scalability 40 3.4 Production Costs 40 3.5 WSN Topology 40 3.6 Transmission Media 41 3.7 Power Consumption 43 References 49 4 Physical Layer 53 4.1 Physical Layer Technologies 53 4.2 Overview of RF Wireless Communication 57 4.3 Channel Coding (Error Control Coding) 59 4.4 Modulation 62 4.5 Wireless Channel Effects 66 4.6 PHY Layer Standards 72 References 75 5 Medium Access Control 77 5.1 Challenges for MAC 77 5.2 CSMA Mechanism 80 5.3 Contention-Based Medium Access 83 5.4 Reservation-Based Medium Access 103 5.5 Hybrid Medium Access 110 References 115 6 Error Control 117 6.1 Classification of Error Control Schemes 117 6.2 Error Control in WSNs 120 6.3 Cross-layer Analysis Model 123 6.4 Comparison of Error Control Schemes 131 References 137 7 Network Layer 139 7.1 Challenges for Routing 139 7.2 Data-centric and Flat-Architecture Protocols 141 7.3 Hierarchical Protocols 148 7.4 Geographical Routing Protocols 152 7.5 QoS-Based Protocols 159 References 163 8 Transport Layer 167 8.1 Challenges for Transport Layer 167 8.2 Reliable Multi-Segment Transport (RMST) Protocol 169 8.3 Pump Slowly, Fetch Quickly (PSFQ) Protocol 171 8.4 Congestion Detection and Avoidance (CODA) Protocol 175 8.5 Event-to-Sink Reliable Transport (ESRT) Protocol 177 8.6 GARUDA 180 8.7 Real-Time and Reliable Transport (RT)2 Protocol 185 References 189 9 Application Layer 191 9.1 Source Coding (Data Compression) 191 9.2 Query Processing 195 9.3 Network Management 212 References 218 10 Cross-layer Solutions 221 10.1 Interlayer Effects 222 10.2 Cross-layer Interactions 224 10.3 Cross-layer Module 229 References 240 11 Time Synchronization 243 11.1 Challenges for Time Synchronization 243 11.2 Network Time Protocol 245 11.3 Definitions 246 11.4 Timing-Sync Protocol for Sensor Networks (TPSN) 248 11.5 Reference-Broadcast Synchronization (RBS) 251 11.6 Adaptive Clock Synchronization (ACS) 253 11.7 Time Diffusion Synchronization Protocol (TDP) 254 11.8 Rate-Based Diffusion Protocol (RDP) 257 11.9 Tiny- and Mini-Sync Protocols 258 11.10 Other Protocols 260 References 262 12 Localization 265 12.1 Challenges in Localization 265 12.2 Ranging Techniques 268 12.3 Range-Based Localization Protocols 272 12.4 Range-Free Localization Protocols 280 References 284 13 Topology Management 287 13.1 Deployment 288 13.2 Power Control 289 13.3 Activity Scheduling 296 13.4 Clustering 308 References 317 14 Wireless Sensor and Actor Networks 319 14.1 Characteristics of WSANs 321 14.2 Sensor–Actor Coordination 325 14.3 Actor–Actor Coordination 337 14.4 WSAN Protocol Stack 345 References 348 15 Wireless Multimedia Sensor Networks 349 15.1 Design Challenges 350 15.2 Network Architecture 353 15.3 Multimedia Sensor Hardware 357 15.4 Physical Layer 365 15.5 MAC Layer 367 15.6 Error Control 371 15.7 Network Layer 374 15.8 Transport Layer 379 15.9 Application Layer 383 15.10 Cross-layer Design 388 15.11 Further Research Issues 392 References 394 16 Wireless Underwater Sensor Networks 399 16.1 Design Challenges 401 16.2 Underwater Sensor Network Components 402 16.3 Communication Architecture 405 16.4 Basics of Underwater Acoustic Propagation 409 16.5 Physical Layer 414 16.6 MAC Layer 416 16.7 Network Layer 426 16.8 Transport Layer 435 16.9 Application Layer 437 16.10 Cross-layer Design 437 References 440 17 Wireless Underground Sensor Networks 443 17.1 Applications 445 17.2 Design Challenges 447 17.3 Network Architecture 450 17.4 Underground Wireless Channel for EM Waves 453 17.5 Underground Wireless Channel for Magnetic Induction 463 17.6 Wireless Communication in Mines and Road/Subway Tunnels 466 17.7 Communication Architecture 474 References 480 18 Grand Challenges 483 18.1 Integration of Sensor Networks and the Internet 483 18.2 Real-Time and Multimedia Communication 484 18.3 Protocol Stack 485 18.4 Synchronization and Localization 485 18.5 WSNs in Challenging Environments 486 18.6 Practical Considerations 488 18.7 Wireless Nano-sensor Networks 488 References 489 Index 491

    15 in stock

    £79.16

  • It Disaster Recovery Planning for Dummies

    John Wiley & Sons Inc It Disaster Recovery Planning for Dummies

    1 in stock

    Book SynopsisIf you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off.Table of ContentsForeword xix Introduction 1 About This Book 1 How This Book Is Organized 2 Part I: Getting Started with Disaster Recovery 2 Part II: Building Technology Recovery Plans 2 Part III: Managing Recovery Plans 2 Part IV: The Part of Tens 3 What This Book Is — and What It Isn’t 3 Assumptions about Disasters 3 Icons Used in This Book 4 Where to Go from Here 4 Write to Us! 5 Part I: Getting Started with Disaster Recovery 7 Chapter 1: Understanding Disaster Recovery 9 Disaster Recovery Needs and Benefits 9 The effects of disasters 10 Minor disasters occur more frequently 11 Recovery isn’t accidental 12 Recovery required by regulation 12 The benefits of disaster recovery planning 13 Beginning a Disaster Recovery Plan 13 Starting with an interim plan 14 Beginning the full DR project 15 Managing the DR Project 18 Conducting a Business Impact Analysis 18 Developing recovery procedures 22 Understanding the Entire DR Lifecycle 25 Changes should include DR reviews 26 Periodic review and testing 26 Training response teams 26 Chapter 2: Bootstrapping the DR Plan Effort 29 Starting at Square One 30 How disaster may affect your organization 30 Understanding the role of prevention 31 Understanding the role of planning 31 Resources to Begin Planning 32 Emergency Operations Planning 33 Preparing an Interim DR Plan 34 Staffing your interim DR plan team 35 Looking at an interim DR plan overview 35 Building the Interim Plan 36 Step 1 — Build the Emergency Response Team 37 Step 2 — Define the procedure for declaring a disaster 37 Step 3 — Invoke the interim DR plan 39 Step 4 — Maintain communications during a disaster 39 Step 5 — Identify basic recovery plans 41 Step 6 — Develop processing alternatives 42 Step 7 — Enact preventive measures 44 Step 8 — Document the interim DR plan 46 Step 9 — Train ERT members 48 Testing Interim DR Plans 48 Chapter 3: Developing and Using a Business Impact Analysis 51 Understanding the Purpose of a BIA 52 Scoping the Effort 53 Conducting a BIA: Taking a Common Approach 54 Gathering information through interviews 55 Using consistent forms and worksheets 56 Capturing Data for the BIA 58 Business processes 59 Information systems 60 Assets 61 Personnel 62 Suppliers 62 Statements of impact 62 Criticality assessment 63 Maximum Tolerable Downtime 64 Recovery Time Objective 64 Recovery Point Objective 65 Introducing Threat Modeling and Risk Analysis 66 Disaster scenarios 67 Identifying potential disasters in your region 68 Performing Threat Modeling and Risk Analysis 68 Identifying Critical Components 69 Processes and systems 70 Suppliers 71 Personnel 71 Determining the Maximum Tolerable Downtime 72 Calculating the Recovery Time Objective 72 Calculating the Recovery Point Objective 73 Part II: Building Technology Recovery Plans 75 Chapter 4: Mapping Business Functions to Infrastructure 77 Finding and Using Inventories 78 Using High-Level Architectures 80 Data flow and data storage diagrams 80 Infrastructure diagrams and schematics 84 Identifying Dependencies 90 Inter-system dependencies 91 External dependencies 95 Chapter 5: Planning User Recovery 97 Managing and Recovering End-User Computing 98 Workstations as Web terminals 99 Workstation access to centralized information 102 Workstations as application clients 104 Workstations as local computers 108 Workstation operating systems 113 Managing and Recovering End-User Communications 119 Voice communications 119 E-mail 121 Fax machines 125 Instant messaging 126 Chapter 6: Planning Facilities Protection and Recovery 129 Protecting Processing Facilities 129 Controlling physical access 130 Getting charged up about electric power 140 Detecting and suppressing fire 141 Chemical hazards 144 Keeping your cool 145 Staying dry: Water/flooding detection and prevention 145 Selecting Alternate Processing Sites 146 Hot, cold, and warm sites 147 Other business locations 149 Data center in a box: Mobile sites 150 Colocation facilities 150 Reciprocal facilities 151 Chapter 7: Planning System and Network Recovery 153 Managing and Recovering Server Computing 154 Determining system readiness 154 Server architecture and configuration 155 Developing the ability to build new servers 157 Distributed server computing considerations 159 Application architecture considerations 160 Server consolidation: The double-edged sword 161 Managing and Recovering Network Infrastructure 163 Implementing Standard Interfaces 166 Implementing Server Clustering 167 Understanding cluster modes 168 Geographically distributed clusters 169 Cluster and storage architecture 170 Chapter 8: Planning Data Recovery 173 Protecting and Recovering Application Data 173 Choosing How and Where to Store Data for Recovery 175 Protecting data through backups 176 Protecting data through resilient storage 179 Protecting data through replication and mirroring 180 Protecting data through electronic vaulting 182 Deciding where to keep your recovery data 182 Protecting data in transit 184 Protecting data while in DR mode 185 Protecting and Recovering Applications 185 Application version 186 Application patches and fixes 186 Application configuration 186 Application users and roles 187 Application interfaces 189 Application customizations 189 Applications dependencies with databases,operating systems, and more 190 Applications and client systems 191 Applications and networks 192 Applications and change management 193 Applications and configuration management 193 Off-Site Media and Records Storage 194 Chapter 9: Writing the Disaster Recovery Plan 197 Determining Plan Contents 198 Disaster declaration procedure 198 Emergency contact lists and trees 200 Emergency leadership and role selection 202 Damage assessment procedures 203 System recovery and restart procedures 205 Transition to normal operations 207 Recovery team 209 Structuring the Plan 210 Enterprise-level structure 210 Document-level structure 211 Managing Plan Development 212 Preserving the Plan 213 Taking the Next Steps 213 Part III: Managing Recovery Plans 215 Chapter 10: Testing the Recovery Plan 217 Testing the DR Plan 217 Why test a DR plan? 218 Developing a test strategy 219 Developing and following test procedures 220 Conducting Paper Tests 221 Conducting Walkthrough Tests 222 Walkthrough test participants 223 Walkthrough test procedure 223 Scenarios 224 Walkthrough results 225 Debriefing 225 Next steps 226 Conducting Simulation Testing 226 Conducting Parallel Testing 227 Parallel testing considerations 228 Next steps 229 Conducting Cutover Testing 230 Cutover test procedure 231 Cutover testing considerations 233 Planning Parallel and Cutover Tests 234 Clustering and replication technologies and cutover tests 235 Next steps 236 Establishing Test Frequency 236 Paper test frequency 237 Walkthrough test frequency 238 Parallel test frequency 239 Cutover test frequency 240 Chapter 11: Keeping DR Plans and Staff Current 241 Understanding the Impact of Changes on DR Plans 241 Technology changes 242 Business changes 243 Personnel changes 245 Market changes 247 External changes 248 Changes — some final words 249 Incorporating DR into Business Lifecycle Processes 250 Systems and services acquisition 250 Systems development 251 Business process engineering 252 Establishing DR Requirements and Standards 253 A Multi-Tiered DR Standard Case Study 254 Maintaining DR Documentation 256 Managing DR documents 257 Updating DR documents 258 Publishing and distributing documents 260 Training Response Teams 261 Types of training 261 Indoctrinating new trainees 262 Chapter 12: Understanding the Role of Prevention 263 Preventing Facilities-Related Disasters 264 Site selection 265 Preventing fires 270 HVAC failures 272 Power-related failures 272 Protection from civil unrest and war 273 Avoiding industrial hazards 274 Preventing secondary effects of facilities disasters 275 Preventing Technology-Related Disasters 275 Dealing with system failures 276 Minimizing hardware and software failures 276 Pros and cons of a monoculture 277 Building a resilient architecture 278 Preventing People-Related Disasters 279 Preventing Security Issues and Incidents 280 Prevention Begins at Home 283 Chapter 13: Planning for Various Disaster Scenarios 285 Planning for Natural Disasters 285 Earthquakes 285 Wildfires 287 Volcanoes 288 Floods 289 Wind and ice storms 290 Hurricanes 291 Tornadoes 292 Tsunamis 293 Landslides and avalanches 295 Pandemic 297 Planning for Man-Made Disasters 300 Utility failures 300 Civil disturbances 301 Terrorism and war 302 Security incidents 303 Part IV: The Part of Tens 305 Chapter 14: Ten Disaster Recovery Planning Tools 307 Living Disaster Recovery Planning System (LDRPS) 307 BIA Professional 308 COBRA Risk Analysis 308 BCP Generator 309 DRI Professional Practices Kit 310 Disaster Recovery Plan Template 310 SLA Toolkit 311 LBL ContingencyPro Software 312 Emergency Management Guide for Business and Industry 312 DRJ’s Toolbox 313 Chapter 15: Eleven Disaster Recovery Planning Web Sites 315 DRI International 315 Disaster Recovery Journal 316 Business Continuity Management Institute 316 Disaster Recovery World 317 Disaster Recovery Planning.org 317 The Business Continuity Institute 318 Disaster-Resource.com 319 Computerworld Disaster Recovery 319 CSO Business Continuity and Disaster Recovery 320 Federal Emergency Management Agency (FEMA) 320 Rothstein Associates Inc 321 Chapter 16: Ten Essentials for Disaster Planning Success 323 Executive Sponsorship 323 Well-Defined Scope 324 Committed Resources 325 The Right Experts 325 Time to Develop the Project Plan 326 Support from All Stakeholders 326 Testing, Testing, Testing 327 Full Lifecycle Commitment 327 Integration into Other Processes 328 Luck 329 Chapter 17: Ten Benefits of DR Planning 331 Improved Chances of Surviving “The Big One” 331 A Rung or Two Up the Maturity Ladder 332 Opportunities for Process Improvements 332 Opportunities for Technology Improvements 333 Higher Quality and Availability of Systems 334 Reducing Disruptive Events 334 Reducing Insurance Premiums 335 Finding Out Who Your Leaders Are 336 Complying with Standards and Regulations 336 Competitive Advantage 338 Index 339

    1 in stock

    £17.84

  • Skype For Dummies For Dummies S

    John Wiley & Sons Inc Skype For Dummies For Dummies S

    15 in stock

    Book SynopsisSee how to use Skype for secure chats and connect SkypeOut and SkypeIN.Table of ContentsForeword. Introduction. Part I: Getting Started with Skype. Chapter 1: What’s All the Hoopla about Skype? Chapter 2: Hooking Up with Skype. Chapter 3: Getting Familiar with Skype’s Interface. Part II: As You Like It: Skype Your Way. Chapter 4: Customizing Skype Options to Suit Your Style. Chapter 5: Getting Personal. Chapter 6: The Mad Chatter. Chapter 7: Skyping Eye to Eye: Skype with Video. Chapter 8: The Ins and Outs of SkypeIn and SkypeOut. Part III: Calling All Seasoned Skypers. Chapter 9: Managing Your Messages. Chapter 10: Partying On — On the Conference Line! Chapter 11: Spicing Things Up with Great Gadgets and Add-Ons. Part IV: The Professional Skyper. Chapter 12: “Skypifying” Your Business. Chapter 13: Exploring Skype Communities. Chapter 14: Skypecasting. Part V: The Part of Tens. Chapter 15: Ten Reasons Your Mom (and Other Family) Will Love Skype. Chapter 16: (Almost) Ten Ways to Promote Your Business Using Skype. Chapter 17: Ten Ways to Use Skype at School. Appendix A: Skype Multilanguage Support. Appendix B: Skype Tips and Tricks Guide. Index.

    15 in stock

    £18.39

  • High Performance Switches and Routers Wiley  IEEE

    John Wiley & Sons Inc High Performance Switches and Routers Wiley IEEE

    15 in stock

    Book SynopsisLearn to Design High Performance Switches and Routers for Today's Ever Growing Internet Traffic As Internet traffic continues to grow, and demands for quality of service become more stringent, researchers and engineers can turn to High Performance Switches and Routers for tested and proven solutions.Trade Review"Unique in its approach and scope, and written in an easy-to-follow manner, I strongly recommend it to the interested reading community." (ComputingReviews.com, December 17, 2007)Table of ContentsPreface xv Acknowledgments xvii 1 Introduction 1 1.1 Architecture of the Internet: Present and Future 2 1.1.1 The Present 2 1.1.2 The Future 4 1.2 Router Architectures 5 1.3 Commercial Core Router Examples 9 1.3.1 T640 TX-Matrix 9 1.3.2 Carrier Routing System (CRS-1) 11 1.4 Design of Core Routers 13 1.5 IP Network Management 16 1.5.1 Network Management System Functionalities 16 1.5.2 NMS Architecture 17 1.5.3 Element Management System 18 1.6 Outline of the Book 19 2 IP Address Lookup 25 2.1 Overview 25 2.2 Trie-Based Algorithms 29 2.2.1 Binary Trie 29 2.2.2 Path-Compressed Trie 31 2.2.3 Multi-Bit Trie 33 2.2.4 Level Compression Trie 35 2.2.5 Lulea Algorithm 37 2.2.6 Tree Bitmap Algorithm 42 2.2.7 Tree-Based Pipelined Search 45 2.2.8 Binary Search on Prefix Lengths 47 2.2.9 Binary Search on Prefix Range 48 2.3 Hardware-Based Schemes 51 2.3.1 DIR-24-8-BASIC Scheme 51 2.3.2 DIR-Based Scheme with Bitmap Compression (BC-16-16) 53 2.3.3 Ternary CAM for Route Lookup 57 2.3.4 Two Algorithms for Reducing TCAM Entries 58 2.3.5 Reducing TCAM Power – CoolCAMs 60 2.3.6 TCAM-Based Distributed Parallel Lookup 64 2.4 IPv6 Lookup 67 2.4.1 Characteristics of IPv6 Lookup 67 2.4.2 A Folded Method for Saving TCAM Storage 67 2.4.3 IPv6 Lookup via Variable-Stride Path and Bitmap Compression 69 2.5 Comparison 73 3 Packet Classification 77 3.1 Introduction 77 3.2 Trie-Based Classifications 81 3.2.1 Hierarchical Tries 81 3.2.2 Set-Pruning Trie 82 3.2.3 Grid of Tries 83 3.2.4 Extending Two-Dimensional Schemes 84 3.2.5 Field-Level Trie Classification (FLTC) 85 3.3 Geometric Algorithms 90 3.3.1 Background 90 3.3.2 Cross-Producting Scheme 91 3.3.3 Bitmap-Intersection 92 3.3.4 Parallel Packet Classification (P2C) 93 3.3.5 Area-Based Quadtree 95 3.3.6 Hierarchical Intelligent Cuttings 97 3.3.7 HyperCuts 98 3.4 Heuristic Algorithms 103 3.4.1 Recursive Flow Classification 103 3.4.2 Tuple Space Search 107 3.5 TCAM-Based Algorithms 108 3.5.1 Range Matching in TCAM-Based Packet Classification 108 3.5.2 Range Mapping in TCAMs 110 4 Traffic Management 114 4.1 Quality of Service 114 4.1.1 QoS Parameters 115 4.1.2 Traffic Parameters 116 4.2 Integrated Services 117 4.2.1 Integrated Service Classes 117 4.2.2 IntServ Architecture 117 4.2.3 Resource ReSerVation Protocol (RSVP) 119 4.3 Differentiated Services 121 4.3.1 Service Level Agreement 122 4.3.2 Traffic Conditioning Agreement 123 4.3.3 Differentiated Services Network Architecture 123 4.3.4 Network Boundary Traffic Classification and Conditioning 124 4.3.5 Per Hop Behavior (PHB) 126 4.3.6 Differentiated Services Field 127 4.3.7 PHB Implementation with Packet Schedulers 128 4.4 Traffic Policing and Shaping 129 4.4.1 Location of Policing and Shaping Functions 130 4.4.2 ATM’s Leaky Bucket 131 4.4.3 IP’s Token Bucket 133 4.4.4 Traffic Policing 134 4.4.5 Traffic Shaping 135 4.5 Packet Scheduling 136 4.5.1 Max-Min Scheduling 136 4.5.2 Round-Robin Service 138 4.5.3 Weighted Round-Robin Service 139 4.5.4 Deficit Round-Robin Service 140 4.5.5 Generalized Processor Sharing (GPS) 141 4.5.6 Weighted Fair Queuing (WFQ) 146 4.5.7 Virtual Clock 150 4.5.8 Self-Clocked Fair Queuing 153 4.5.9 Worst-Case Fair Weighted Fair Queuing (WF2Q) 155 4.5.10 WF2Q+ 158 4.5.11 Comparison 159 4.5.12 Priorities Sorting Using a Sequencer 160 4.6 Buffer Management 163 4.6.1 Tail Drop 163 4.6.2 Drop on Full 164 4.6.3 Random Early Detection (RED) 164 4.6.4 Differential Dropping: RIO 167 4.6.5 Fair Random Early Detection (FRED) 168 4.6.6 Stabilized Random Early Detection (SRED) 170 4.6.7 Longest Queue Drop (LQD) 172 5 Basics of Packet Switching 176 5.1 Fundamental Switching Concept 177 5.2 Switch Fabric Classification 181 5.2.1 Time-Division Switching 181 5.2.2 Space-Division Switching 183 5.3 Buffering Strategy in Switching Fabrics 187 5.3.1 Shared-Memory Queuing 188 5.3.2 Output Queuing (OQ) 188 5.3.3 Input Queuing 189 5.3.4 Virtual Output Queuing (VOQ) 189 5.3.5 Combined Input and Output Queuing 190 5.3.6 Crosspoint Queuing 191 5.4 Multiplane Switching and Multistage Switching 191 5.5 Performance of Basic Switches 195 5.5.1 Traffic Model 196 5.5.2 Input-Buffered Switches 197 5.5.3 Output-Buffered Switches 199 5.5.4 Completely Shared-Buffered Switches 201 6 Shared-memory Switches 207 6.1 Linked List Approach 208 6.2 Content Addressable Memory Approach 213 6.3 Space-Time-Space Approach 215 6.4 Scaling the Shared-Memory Switches 217 6.4.1 Washington University Gigabit Switch 217 6.4.2 Concentrator-Based Growable Switch Architecture 218 6.4.3 Parallel Shared-Memory Switches 218 6.5 Multicast Shared-Memory Switches 220 6.5.1 Shared-Memory Switch with a Multicast Logical Queue 220 6.5.2 Shared-Memory Switch with Cell Copy 220 6.5.3 Shared-Memory Switch with Address Copy 222 7 Input-buffered Switches 225 7.1 Scheduling in VOQ-Based Switches 226 7.2 Maximum Matching 229 7.2.1 Maximum Weight Matching 229 7.2.2 Approximate MWM 229 7.2.3 Maximum Size Matching 230 7.3 Maximal Matching 231 7.3.1 Parallel Iterative Matching (PIM) 232 7.3.2 Iterative Round-Robin Matching (iRRM) 233 7.3.3 Iterative Round-Robin with SLIP (iSLIP) 234 7.3.4 Firm 241 7.3.5 Dual Round-Robin Matching (DRRM) 241 7.3.6 Pipelined Maximal Matching 245 7.3.7 Exhaustive Dual Round-Robin Matching (EDRRM) 248 7.4 Randomized Matching Algorithms 249 7.4.1 Randomized Algorithm with Memory 250 7.4.2 A Derandomized Algorithm with Memory 250 7.4.3 Variant Randomize Matching Algorithms 251 7.4.4 Polling Based Matching Algorithms 254 7.4.5 Simulated Performance 258 7.5 Frame-based Matching 262 7.5.1 Reducing the Reconfiguration Frequency 263 7.5.2 Fixed Size Synchronous Frame-Based Matching 267 7.5.3 Asynchronous Variable-Size Frame-Based Matching 270 7.6 Stable Matching with Speedup 273 7.6.1 Output-Queuing Emulation with Speedup of 4 274 7.6.2 Output-Queuing Emulation with Speedup of 2 275 7.6.3 Lowest Output Occupancy Cell First (LOOFA) 278 8 Banyan-based Switches 284 8.1 Banyan Networks 284 8.2 Batcher-Sorting Network 287 8.3 Output Contention Resolution Algorithms 288 8.3.1 Three-Phase Implementation 288 8.3.2 Ring Reservation 288 8.4 The Sunshine Switch 292 8.5 Deflection Routing 294 8.5.1 Tandem Banyan Switch 294 8.5.2 Shuffle-Exchange Network with Deflection Routing 296 8.5.3 Dual Shuffle-Exchange Network with Error-Correcting Routing 297 8.6 Multicast Copy Networks 303 8.6.1 Broadcast Banyan Network 304 8.6.2 Encoding Process 308 8.6.3 Concentration 309 8.6.4 Decoding Process 310 8.6.5 Overflow and Call Splitting 310 8.6.6 Overflow and Input Fairness 311 9 Knockout-based Switches 316 9.1 Single-Stage Knockout Switch 317 9.1.1 Basic Architecture 317 9.1.2 Knockout Concentration Principle 318 9.1.3 Construction of the Concentrator 320 9.2 Channel Grouping Principle 323 9.2.1 Maximum Throughput 324 9.2.2 Generalized Knockout Principle 325 9.3 Two-Stage Multicast Output-Buffered ATM Switch (MOBAS) 327 9.3.1 Two-Stage Configuration 327 9.3.2 Multicast Grouping Network (MGN) 330 9.4 Appendix 333 10 The Abacus Switch 336 10.1 Basic Architecture 337 10.2 Multicast Contention Resolution Algorithm 340 10.3 Implementation of Input Port Controller 342 10.4 Performance 344 10.4.1 Maximum Throughput 344 10.4.2 Average Delay 347 10.4.3 Cell Loss Probability 349 10.5 ATM Routing and Concentration (ARC) Chip 351 10.6 Enhanced Abacus Switch 354 10.6.1 Memoryless Multi-Stage Concentration Network 354 10.6.2 Buffered Multi-Stage Concentration Network 357 10.6.3 Resequencing Cells 359 10.6.4 Complexity Comparison 361 10.7 Abacus Switch for Packet Switching 362 10.7.1 Packet Interleaving 362 10.7.2 Cell Interleaving 364 11 Crosspoint Buffered Switches 367 11.1 Combined Input and Crosspoint Buffered Switches 368 11.2 Combined Input and Crosspoint Buffered Switches with VOQ 370 11.2.1 CIXB with One-Cell Crosspoint Buffers (CIXB-1) 371 11.2.2 Throughput and Delay Performance 371 11.2.3 Non-Negligible Round-Trip Times in CIXB-k 376 11.3 OCF_OCF: Oldest Cell First Scheduling 376 11.4 LQF_RR: Longest Queue First and Round-Robin Scheduling in CIXB-1 378 11.5 MCBF: Most Critical Buffer First Scheduling 379 12 Clos-network Switches 382 12.1 Routing Property of Clos Network Switches 383 12.2 Looping Algorithm 387 12.3 m-Matching Algorithm 388 12.4 Euler Partition Algorithm 388 12.5 Karol’s Algorithm 389 12.6 Frame-Based Matching Algorithm for Clos Network (f-MAC) 391 12.7 Concurrent Matching Algorithm for Clos Network (c-MAC) 392 12.8 Dual-Level Matching Algorithm for Clos Network (d-MAC) 395 12.9 The ATLANTA Switch 398 12.10 Concurrent Round-Robin Dispatching (CRRD) Scheme 400 12.11 The Path Switch 404 12.11.1 Homogeneous Capacity and Route Assignment 406 12.11.2 Heterogeneous Capacity Assignment 408 13 Multi-plane Multi-stage Buffered Switch 413 13.1 TrueWay Switch Architecture 414 13.1.1 Stages of the Switch 415 13.2 Packet Scheduling 417 13.2.1 Partial Packet Interleaving (PPI) 419 13.2.2 Dynamic Packet Interleaving (DPI) 419 13.2.3 Head-of-Line (HOL) Blocking 420 13.3 Stage-To-Stage Flow Control 420 13.3.1 Back-Pressure 421 13.3.2 Credit-Based Flow Control 421 13.3.3 The DQ Scheme 422 13.4 Port-To-Port Flow Control 424 13.4.1 Static Hashing 424 13.4.2 Dynamic Hashing 425 13.4.3 Time-Stamp-Based Resequence 428 13.4.4 Window-Based Resequence 428 13.5 Performance Analysis 431 13.5.1 Random Uniform Traffic 431 13.5.2 Hot-Spot Traffic 432 13.5.3 Bursty Traffic 432 13.5.4 Hashing Schemes 432 13.5.5 Window-Based Resequencing Scheme 434 13.6 Prototype 434 14 Load-balanced Switches 438 14.1 Birkhoff–Von Neumann Switch 438 14.2 Load-Balanced Birkhoff–von Neumann Switches 441 14.2.1 Load-Balanced Birkhoff–von Neumann Switch Architecture 441 14.2.2 Performance of Load-Balanced Birkhoff–von Neumann Switches 442 14.3 Load-Balanced Birkhoff–von Neumann Switches With FIFO Service 444 14.3.1 First Come First Served (FCFS) 446 14.3.2 Earliest Deadline First (EDF) and EDF-3DQ 450 14.3.3 Full Frames First (FFF) 451 14.3.4 Full Ordered Frames First (FOFF) 455 14.3.5 Mailbox Switch 456 14.3.6 Byte-Focal Switch 459 15 Optical Packet Switches 468 15.1 Opto-Electronic Packet Switches 469 15.1.1 Hypass 469 15.1.2 Star-Track 471 15.1.3 Cisneros and Brackett 472 15.1.4 BNR (Bell-North Research) Switch 473 15.1.5 Wave-Mux Switch 474 15.2 Optoelectronic Packet Switch Case Study I 475 15.2.1 Speedup 476 15.2.2 Data Packet Flow 477 15.2.3 Optical Interconnection Network (OIN) 477 15.2.4 Ping-Pong Arbitration Unit 482 15.3 Optoelectronic Packet Switch Case Study II 490 15.3.1 Petabit Photonic Packet Switch Architecture 490 15.3.2 Photonic Switch Fabric (PSF) 495 15.4 All Optical Packet Switches 503 15.4.1 The Staggering Switch 503 15.4.2 Atmos 504 15.4.3 Duan’s Switch 505 15.4.4 3M Switch 506 15.5 Optical Packet Switch with Shared Fiber Delay Lines Single-stage Case 509 15.5.1 Optical Cell Switch Architecture 509 15.5.2 Sequential FDL Assignment (SEFA) Algorithm 512 15.5.3 Multi-Cell FDL Assignment (MUFA) Algorithm 518 15.6 All Optical Packet Switch with Shared Fiber Delay Lines – Three Stage Case 524 15.6.1 Sequential FDL Assignment for Three-Stage OCNS (SEFAC) 526 15.6.2 Multi-Cell FDL Assignment for Three-Stage OCNS (MUFAC) 526 15.6.3 FDL Distribution in Three-Stage OCNS 528 15.6.4 Performance Analysis of SEFAC and MUFAC 530 15.6.5 Complexity Analysis of SEFAC and MUFAC 532 16 High-speed Router Chip Set 538 16.1 Network Processors (NPs) 538 16.1.1 Overview 538 16.1.2 Design Issues for Network Processors 539 16.1.3 Architecture of Network Processors 542 16.1.4 Examples of Network Processors – Dedicated Approach 543 16.2 Co-Processors for Packet Classification 554 16.2.1 LA-1 Bus 554 16.2.2 TCAM-Based Classification Co-Processor 556 16.2.3 Algorithm-Based Classification Co-Processor 562 16.3 Traffic Management Chips 567 16.3.1 Overview 567 16.3.2 Agere’s TM Chip Set 567 16.3.3 IDT TM Chip Set 573 16.3.4 Summary 579 16.4 Switching Fabric Chips 579 16.4.1 Overview 579 16.4.2 Switch Fabric Chip Set from Vitesse 580 16.4.3 Switch Fabric Chip Set from AMCC 589 16.4.4 Switch Fabric Chip Set from IBM (now of AMCC) 593 16.4.5 Switch Fabric Chip Set from Agere 597 Index 606

    15 in stock

    £149.35

  • Security Engineering

    John Wiley and Sons Ltd Security Engineering

    Out of stock

    Book Synopsis"Security engineering is different from any other kind of programming... if you're even thinking of doing any security engineering, you need to read this book. " -- Bruce Schneier "This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work.Trade Review"At over a thousand pages, this is a comprehensive volume." Engineering & Technology Saturday 7 June 2008Table of ContentsPreface to the Second Edition. Foreword by Bruce Schneier. Preface. Acknowledgments. Part I. Chapter 1 What Is Security Engineering? Chapter 2 Usability and Psychology. Chapter 3 Protocols. Chapter 4 Access Control. Chapter 5 Cryptography. Chapter 6 Distributed Systems. Chapter 7 Economics. Part II. Chapter 8 Multilevel Security. Chapter 9 Multilateral Security. Chapter 10 Banking and Bookkeeping. Chapter 11 Physical Protection. Chapter 12 Monitoring and Metering. Chapter 13 Nuclear Command and Control. Chapter 14 Security Printing and Seals. Chapter 15 Biometrics. Chapter 16 Physical Tamper Resistance. Chapter 17 Emission Security. Chapter 18 API Attacks. Chapter 19 Electronic and Information Warfare. Chapter 20 Telecom System Security. Chapter 21 Network Attack and Defense. Chapter 22 Copyright and DRM. Chapter 23 The Bleeding Edge. Part III. Chapter 24 Terror, Justice and Freedom. Chapter 25 Managing the Development of Secure Systems. Chapter 26 System Evaluation and Assurance. Chapter 27 Conclusions. Bibliography. Index.

    Out of stock

    £65.00

  • Asterisk For Dummies

    John Wiley & Sons Inc Asterisk For Dummies

    15 in stock

    Book SynopsisBridge data and voice with Asterisk! Create and maintain an economical Asterisk phone system from scratch Asterisk is the open-source PBX software that offers you the chance to save real money on your voice communications.Table of ContentsForeword. Introduction. Part I: Introducing . . . ASTERISK! Chapter 1: Evaluating the Possibilities with Asterisk. Chapter 2: Installing Asterisk. Chapter 3: Installing AsteriskNOW. Chapter 4: Configuring the Hardware. Part II: Using Dialplans — the Building Blocks of Asterisk. Chapter 5: Comprehending Dialplan Syntax. Chapter 6: Adding Features to Dialplans. Chapter 7: Building Dialplan Infrastructure. Chapter 8: Operating the AsteriskNOW GUI. Chapter 9: Utilizing VoIP Codecs. Part III: Maintaining Your Phone Service with Asterisk. Chapter 10: Troubleshooting VoIP Calls with Packet Captures. Chapter 11: Maintaining Your Telecom Services. Chapter 12: Addressing Call-Quality Concerns and Completion Issues. Chapter 13: Handling Dedicated Digital Troubles. Chapter 14: Managing Asterisk for Peak Capacity. Chapter 15: Providing Long-Term Health for Your Asterisk Switch. Part IV: The Part of Tens. Chapter 16: Ten Things You Should Never Do with Asterisk. Chapter 17: Ten Fun Things to Do with Your Asterisk. Chapter 18: Ten Places to Go for Help. Part V: Appendixes. Appendix A: Visualizing the Dialplan. Appendix B: VoIP Basics. Appendix C: Understanding Basic Linux. Index.

    15 in stock

    £21.59

  • Wiley Pathways Introduction to Database

    John Wiley & Sons Inc Wiley Pathways Introduction to Database

    15 in stock

    Book SynopsisYou can get there Where do you want to go? You might already be working in the information technology field and may be looking to expand your skills. You might be setting out on a new career path. Or, you might want to learn more about exciting opportunities in database management.Table of Contents1 Introducing to Data and Data Management 1 Introduction 2 1.1 Understanding the Role of Data and Databases 2 1.1.1 A Practical Example 3 1.1.2 Understanding Data Management5 1.1.3 The Need for Data Management 5 Self-Check 7 1.2 Understanding Data Sources7 1.2.1 Picking a Starting Point 7 1.2.2 Identifying Primary Processes 8 1.2.3 Specific Data Sources 9 Self-Check 12 1.3 Potential Data Concerns 12 1.3.1 Managing Data Accuracy 13 1.3.2 Managing Data Security 13 1.3.3 Managing Data Organization 16 1.3.4 Managing Data Access 16 Self-Check 18 Summary 19 Key Terms 19 Assess Your Understanding 20 Summary Questions 20 Applying This Chapter 22 You Try It 23 2 Introducing Databases and Database Management Systems 24 Introduction 25 2.1Introduction to Key Database Concepts 25 2.1.1Database Approach to Data 25 2.1.2Understanding Basic Concepts 26 2.1.3Database Use 29 Self-Check31 2.2 Understanding Basic Database Models 31 2.2.1 The Hierarchical Database Model 32 2.2.2 The Network Database Model 33 2.2.3 The Relational Database Model 34 2.2.4 The Object-Oriented Database Model 35 2.2.5 The Object-Relational Database Model 36 Self-Check 37 2.3 Database Components 38 2.3.1 Hardware Components 40 2.3.2 Software Requirements 43 2.3.3 DBMS Components45 2.3.4 Understanding People and Procedures 50 Self-Check 53 Summary 54 Key Terms 54 Assess Your Understanding 55 Summary Questions 55 Applying This Chapter 57 You Try It 59 3 Data Modeling 60 Introduction 61 3.1 Understanding Database Design 61 3.1.1 Understanding the Design Process 61 3.1.2 Determining the Database Type 63 3.1.3 Understanding Modeling Goals 66 3.1.4 Understanding Business Rules 67 Self-Check 70 3.2 Understanding Relational Database Models 70 3.2.1 Entity-Relationship (E-R) Modeling Concepts 71 3.2.2 Introducing Basic Database Objects 75 Self-Check 79 3.3 Understanding Relationships 79 3.3.1 Binary Relationships 80 3.3.2 Unary Relationships 84 3.3.3 Ternary Relationships 86 3.3.4 Breaking Down Many-to-Many Relationships 87 Self-Check91 3.4 Comparing Data Models 91 3.4.1 Choosing a Modeling Tool 92 3.4.2 The General Hardware Company 93 3.4.3 Good Reading Bookstores 95 Self-Check 97 Summary 97 Key Terms 97 Assess Your Understanding 99 Summary Questions 99 Applying This Chapter 101 You Try It103 4 Designing a Database 104 Introduction 105 4.1Designing Relational Tables 105 4.1.1Converting a Single Entity 105 4.1.2Converting Binary Relationships 106 4.1.3Converting Unary Relationships 113 Self-Check 117 4.2 Comparing Relational Designs 117 4.2.1 Designing General Hardware 117 4.2.2 Designing Good Reading Bookstores 120 Self-Check 123 4.3 Normalizing Data 123 4.3.1 Using Normalization Techniques 123 4.3.2 Normalizing Data by the Numbers 125 4.3.3 Shortening the Process 134 4.3.4 Denormalizing Data 134 Self-Check 136 Summary 136 Key Terms 137 Assess Your Understanding 138 Summary Questions 138 Applying This Chapter 140 You Try It 142 5 Implementing a Database 146 Introduction 147 5.1 Physical Design and Implementation 147 5.1.1 Understanding Design Requirements 147 5.1.2 Business Environment Requirements 149 5.1.3 Data Characteristics 149 5.1.4 Application Characteristics 151 5.1.5 Operational Requirements 152 5.1.6 The Hardware and Software Environment 152 5.1.7 Evaluating Implementation Options 154 Self-Check 158 5.2 Adjusting Your Design to the Real World 158 5.2.1 Ensuring Data Integrity 159 5.2.2 Adjusting Factors Related to Performance 162 Self-Check 171 5.3 Implementing Database Objects 171 5.3.1 Implementing Your Final Table Design 171 5.3.2 Implementing Indexes 173 5.3.3 Implementing Views 175 Self-Check 177 Summary 177 Key Terms 177 Assess Your Understanding 178 Summary Questions 178 Applying This Chapter 180 You Try It182 6 Understanding the SQL Language 184 Introduction 185 6.1 Introducing the SQL Language 185 6.1.1 Understanding SQL Features 185 6.1.2 Using SQL 186 6.1.3 Understanding Command Basics 190 Self-Check 192 6.2 Understanding SELECT Fundamentals 192 6.2.1 Working with SELECT 192 6.2.2 Using Simple Data Retrieval 193 6.2.3 Retrieving Other Values 194 Self-Check 196 6.3 Understanding Operators and Functions 196 6.3.1 Arithmetic Operators 196 6.3.2 Comparison and Logical Operators 197 6.3.3 Standard SQL Functions 201 6.3.4 Function Variations 202 Self-Check 208 6.4 Understanding DML Commands 208 6.4.1 Using INSERT 208 6.4.2 Using UPDATE 209 6.4.3 Using DELETE 211 Self-Check213 6.5 Understanding DDL Commands 213 6.5.1 Using CREATE 214 6.5.2 Using ALTER 216 6.5.3 Using DROP 216 Self-Check 216 Summary 217 Key Terms 217 Assess Your Understanding 218 Summary Questions 218 Applying This Chapter 220 You Try It222 7 Data Access and Manipulation 223 Introduction224 7.1 Using SELECT Statement Advanced Syntax 224 7.1.1 Understanding SELECT Statement Syntax 224 7.1.2 Filtering Your Result 226 7.1.3 Managing Your Result Set 229 7.1.4 Sorting, Organizing, and Grouping Data 231 7.1.5 Understanding Operator Precedence 237 7.1.6 Combining Statement Results 239 7.1.7 Using SELECT with Other Commands 240 Self-Check 242 7.2 Using Joins and Subqueries 242 7.2.1 Understanding Joins 242 7.2.2 Using Different Join Syntaxes 244 7.2.3 Using Basic Subqueries 246 Self-Check 250 7.3 Using Batches and Scripts 250 7.3.1 Writing Batches and Scripts 251 7.3.2 Understanding Basic Programming Concepts 252 Self-Check 256 Summary 256 Key Terms 256 Assess Your Understanding 257 Summary Questions 257 Applying This Chapter 259 You Try It262 8 Improving Data Access 263 Introduction 264 8.1 Understanding Performance Roadblocks 264 8.1.1 Recognizing Potential Bottlenecks 265 8.1.2 Understanding Hardware Performance 265 8.1.3 Understanding Database Performance 270 8.1.4 Performance Monitoring 270 8.1.5 Knowing What to Use 274 Self-Check 275 8.2 Using Indexes and Views 275 8.2.1 Working with Indexes 276 8.2.2 Working with Views 280 Self-Check 283 8.3Using Programmable Objects 284 8.3.1Understanding Procedures 284 8.3.2Understanding Functions 287 Self-Check 292 Summary 292 Key Terms 292 Assess Your Understanding 294 Summary Questions 294 Applying This Chapter 296 You Try It298 9 Database Administration 300 Introduction 301 9.1 Understanding the Need for Administration 301 9.1.1 Identifying Administration Roles 302 9.1.2 Justifying the Need for Administration 302 Self-Check 306 9.2 Identifying Administration Responsibilities 307 9.2.1 Understanding Data Administration Responsibilities 308 9.2.2 Understanding Database Administration Responsibilities 313 Self-Check 318 9.3 Understanding Management Tasks 318 9.3.1 Considering “What” and “When” 319 9.3.2 Considering “When” and “How” 319 9.3.3 Ongoing Management Tasks 321 9.3.4 Considering Troubleshooting 324 Self-Check 326 Summary 326 Key Terms 326 Assess Your Understanding 327 Summary Questions 327 Applying This Chapter 329 You Try It 330 10 Transactions and Locking 332 Introduction333 10.1 Understanding Transaction Basics 333 10.1.1 Understanding Transaction Processing 333 10.1.2 Using Transaction Commands 336 10.1.3 Understanding Transaction Properties 341 10.1.4 Understanding Transaction Scope 341 10.1.5 Recognizing and Resolving Potential Problems 345 Self-Check 347 10.2 Managing Concurrency Control 347 10.2.1 The Need for Concurrency Management 348 10.2.2 Recognizing Concurrency Problems 348 10.2.3 Designing for Concurrency 352 10.2.4 Concurrency Methods 352 Self-Check 355 10.3 SQL Server Transaction Management 355 10.3.1 Understanding Transaction Processing 355 10.3.2 Managing Locks, Locking, and Transaction Isolation 356 10.3.3 Recognizing, Clearing, and Preventing Deadlocks 358 Self-Check 362 Summary 362 Key Terms 363 Assess Your Understanding 364 Summary Questions 364 Applying This Chapter 366 You Try It 367 11 Data Access and Security 368 Introduction369 11.1 Understanding Database Connections 369 11.1.1 Understanding Connectivity Concepts 369 11.1.2 Understanding Client/Server Connectivity 376 11.1.3 Understanding Multitier Connectivity 379 Self-Check 382 11.2 Managing Access Control 382 11.2.1 Controlling Server Access 383 11.2.2 Controlling Database Access 386 11.2.3 Understanding the Connection Process 387 Self-Check 392 11.3 Protecting Your Data 392 11.3.1 Implementing Data Permissions 393 11.3.2 Minimizing Table Access 397 11.3.3 Keeping Data Safe 397 11.3.4 Understanding RAID Configurations 397 11.3.5 Using Data Backups 400 11.3.6 Protecting Your Server 404 Self-Check 405 Summary 406 Key Terms 406 Assess Your Understanding 407 Summary Questions 407 Applying This Chapter 409 You Try It 411 12 Supporting Database Applications 412 Introduction 413 12.1 Supporting a Centralized Database 413 12.1.1 Understanding Local Area Networks (LANs) 413 12.1.2 Understanding Data Configurations 414 12.1.3 Understanding Server Configurations 416 12.1.4 Consolidating Data Sources 417 Self-Check 419 12.2 Supporting a Distributed Database 419 12.2.1 Understanding Distributed Data 419 12.2.2 Understanding Replicated Data 423 12.2.3 Understanding Partitioned Data 425 12.2.4 Distributed Data Support Issues 429 Self-Check 434 12.3 Understanding Internet Issues 434 12.3.1 Managing Performance Issues 435 12.3.2 Managing Availability Issues 436 12.3.3 Managing Security and Privacy Issues 438 Self-Check 441 Summary 442 Key Terms 442 Assess Your Understanding 443 Summary Questions 443 Applying This Chapter 445 You Try It 447 Glossary 448 Index 465

    15 in stock

    £80.96

  • Home Networking For Dummies 4th Edition For

    John Wiley & Sons Inc Home Networking For Dummies 4th Edition For

    15 in stock

    Book SynopsisHaving a network in your home increases work efficiency and minimizes confusion. If you want to set up a network in your home but you're not quite sure where to start, then Home Networking for Dummies makes it easy for you to become your household's network administrator.Table of ContentsIntroduction 1 Part I: Network Basics 7 Chapter 1: Planning the Lay of the LAN 9 Chapter 2: Installing Network Adapters 27 Chapter 3: Installing Ethernet Cable 35 Chapter 4: Using Wires That Are Already There 53 Chapter 5: Look Ma, No Wires 69 Part II: Configuring Computers for Networking 85 Chapter 6: Putting It All Together 87 Chapter 7: Configuring Computer Sharing 113 Chapter 8: Setting Up Users 127 Part III: Communicating Across the Network 139 Chapter 9: Printing Across the Network 141 Chapter 10: Getting Around the Neighborhood 165 Chapter 11: Using Files from Other Computers 183 Part IV: Network Security and Maintenance 203 Chapter 12: Making Your Network Secure 205 Chapter 13: Disaster Planning and Recovery 235 Chapter 14: Using Windows Maintenance Tools 257 Part V: The Part of Tens 283 Chapter 15: Ten Clever Things to Do on Your Network 285 Chapter 16: Ten Fun Things to Do on Your Network 301 Chapter 17: Ten Ways to Make the Internet Safe for Children 307 Index 321

    15 in stock

    £16.99

  • Connections

    John Wiley & Sons Inc Connections

    1 in stock

    Book SynopsisIn their fascinating analysis of the recent history of information technology, H. Peter Alesso and Craig F. Smith reveal the patterns in discovery and innovation that have brought us to the present tipping point. . . . A generation from now, every individual will have personally tailored access to the whole of knowledge . . . the sooner we all begin to think about how we got here, and where we''re going, the better. This exciting book is an essential first step. From the Foreword by James Burke Many people envision scientists as dispassionate characters who slavishly repeat experiments until eurekasomething unexpected happens. Actually, there is a great deal more to the story of scientific discovery, but seeing the big picture is not easy. Connections: Patterns of Discovery uses the primary tools of forecasting and three archetypal patterns of discoverySerendipity, Proof of Principle, and 1% Inspiration and 99% Perspirationto discern relationships of past develoTable of ContentsForeword. Introduction. Acknowledgements. Organization of this Book. Chapter 1: Connecting Information. The Google Story. Information Revolution. Defining Information. Looking Good. Google Connects Information. Patterns of Discovery. Forecast for Connecting Information. Chapter 2: Connecting Circuits. The Moore' Law Story. Edison's Electric Light. The Vacuum Tube Diode. The First Programmable Computers. ENIAC. The Transistor. How Transistors Work. The Proof of Principle for the Transistor. The Microprocessor. How Microprocessors Work. Moore's law. Patterns of Discovery. Forecast for Connecting Circuits . Chapter 3: Connecting Chips. The Personal Computer Story. Vannevar Bush. Robert Taylor. J.C.R. Licklider. Alan Kay. Butler Lampson. Charles (Chuck) Thacker. Personal Computing. The Xerox Alto. Apple Computer. IBM PC. Patterns of Discovery. Forecast for Connecting Chips. Chapter 4: Connecting Processes. The Software Story. John Von Neumann. Claude Shannon. The Evolution of Programming Languages. Sir Charles Antony Richard (Tony) Hoare. Software as an Industry. Software Productivity. Fourth Generation Languages. Proprietary versus Open Standards. Emergent Fifth Generation Languages (5GLs). Charles Simonyi. William H. Gates. Linus Torvalds. Patterns of Discovery. Forecast for Connecting Processes. Chapter 5: Connecting Machines. The Ethernet Story. Xerox PARC and Ethernet. Robert Metcalf. Patterns of Discovery. Forecast for Connecting Machines. Chapter 6: Connecting Networks. The Internet Story. Vint Cerf. Transition to the World Wide Web. Berners-Lee. Patterns of Discovery. Forecast for Connecting Machines. Chapter 7: Connecting Devices. The Ubiquitous Computing Story. Ubiquitous Computing. Mark Weiser. Jeff Hawkins. Patterns of Discovery. Forecast for Connecting Devices. Chapter 8: Connecting the Web. The Ubiquitous Web Story. Michael Dertouzos. Project Oxygen. Perfect Search. Berners-Lee and the Semantic Web. Patterns of Discovery. Forecast for Connecting the Web. Chapter 9: Connecting the Intelligence. The Ubiquitous Intelligence Story. Kurt Gödel. Alan Turing. Marvin Minsky. Ubiquitous Intelligence . The Web 'Brain'. What is Web Intelligence? Patterns of Discovery. Forecast for Connecting Intelligence. Chapter 10: Connecting Patterns. Ray Kurzweil. Evolving Complex Intelligence. The Law of Accelerating Returns. Singularities. The Software of Intelligence. Patterns. Connecting Pattern. Patterns of Discovery. Forecasts for Connecting Patterns. Epilog. Bibliography. Glossary. Index.

    1 in stock

    £62.06

  • Wiley Pathways Network Security Fundamentals

    John Wiley & Sons Inc Wiley Pathways Network Security Fundamentals

    1 in stock

    Book SynopsisAs networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.Table of Contents1. Computer and Network Security Principles 1.1. Identifying and Analyzing Risk 2 1.2. Installing Windows XP Professional 6 1.3. Installing Windows Server 2003 9 1.4. Using Microsoft Security Baseline Analyzer 13 1.5. Viewing Local Security Policy 18 1.6. Creating a Written Security Policy 24 2. Network and Server Security 2.1. Managing Server Roles 28 2.2. Managing Services and Ports 34 2.3. Using Network Monitor 38 2.4. Configuring Windows Firewall 42 2.5. Designing Border Security 45 3. Cryptography 3.1. Understanding Cryptography Concepts 48 3.2. Managing Driver Signing 49 3.3. Using Encrypting File System 53 3.4. Installing Certificate Services 57 3.5. Managing Certificate Authority Trusts 63 3.6. Requesting and Issuing Certificates 67 3.7. Revoking Certificates 70 4. Authentication 4.1. Comparing Credentials 75 4.2. Creating User Accounts 76 4.3. Configuring an Active Directory Domain Controller 82 4.4. Joining a Domain 89 4.5. Managing Password and Account Lockout Policies 93 4.6. Managing Authentication Protocols 101 4.7. Managing Logon Restrictions 103 5. Authorization and Access Control 5.1. Comparing Access Control Models 111 5.2. Managing Groups 112 5.3. Assigning Permissions 117 5.4. Troubleshooting Effective Permissions 125 5.5. Viewing User Right Assignments 129 6. Securing Network Transmission 6.1. Designing Network Perimeters 133 6.2. Implementing IP Address Filtering on IIS 135 6.3. Using IPsec Default Policies 139 6.4. Implementing Packet Filtering with IPsec 143 6.5. Implementing IPsec Encryption 150 7. Remote Access and Wireless Security 7.1. Understanding Remote Access Protocols and Wireless Security 156 7.2. Designing Remote Access and Wireless Access 158 7.3. Enabling Routing and Remote Access 160 7.4. Configuring a Dial-up Client 166 7.5. Configuring a VPN Client 171 7.6. Defining Remote Access Policies 176 8. Server Roles and Security 8.1. Using Default Templates 183 8.2. Creating and Applying a Baseline Template 188 8.3. Creating and Applying an Incremental Template 193 8.4. Securing DNS 197 8.5. Securing a File Server 203 8.6. Securing a Web and FTP Server 209 9. Protecting Against Malware 9.1. Identifying Malware 217 9.2. Comparing Antivirus, Anti-Spyware, and Anti-Malware Programs 218 9.3. Creating a Managed Computer 221 9.4. Securing Internet Explorer 224 9.5. Securing Outlook Express 232 10. Ongoing Security Management 10.1. Configuring Automatic Updates 237 10.2. Configuring Auditing 241 10.3. Using Event Viewer 245 10.4. Performing Remote Management with MMC 250 10.5. Using Telnet 256 10.6. Using Remote Desktop for Administration 260 11. Disaster Recovery and Fault Tolerance 11.1. Planning for the Worst 264 11.2. Responding to a Security Incident 270 11.3. Configuring Backups 272 11.4. Planning a RAID Configuration 282 11.5. Eliminating Single Points of Failure 284 12. Intrusion Detection and Forensics 12.1. Understanding Terminology 288 12.2. Comparing Intrusion Detection System Types 290 12.3. Investigating the Honeynet Project 292 12.4. Using Forensics Tools 294 12.5. Investigating an Attack 299

    1 in stock

    £38.25

  • Information Security Governance

    Wiley Information Security Governance

    15 in stock

    Book SynopsisThis book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance.Table of ContentsINTRODUCTION. CHAPTER 1: GOVERNANCE OVERVIEW. 1.1 What Is It? 1.2 Back to Basics. 1.3 Origins of Governance. 1.4 Governance Definition. 1.5 Information Security Governance. 1.6 Six Outcomes of Effective Security Governance. 1.7 Defining Information, Data, Knowledge. 1.8 Value of Information. CHAPTER 2: WHY GOVERNANCE? 2.1 Benefits of Good Governance. 2.1.1 Aligning Security with Business Objectives. 2.1.2 Providing the structure and framework to optimize allocations of limited resources. 2.1.3 Providing assurance that critical decisions are not based on faulty information. 2.1.4 Ensuring accountability for safeguarding critical assets. 2.1.5 Increasing trust of customers and stakeholders. 2.1.6 Increasing the company’s worth. 2.1.7 Reducing liability for information inaccuracy or lack of due care in protection. 2.1.8 Increasing predictability and reducing uncertainty of business operations. 2.2 A Management Problem. CHAPTER 3: LEGAL AND REGULATORY REQUIREMENTS. 3.1 Security Governance and Regulation. CHAPTER 4: ROLES & RESPONSIBILITIES. 4.1 The Board of Directors. 4.2 Executive Management. 4.3 Security Steering Committee. 4.4 The CISCO. CHAPTER: STRATEGIC METRICS. 5.1 Governance Objectives. 5.1.1 Strategic Direction. 5.1.2 Ensuring Objectives are Achieved. 5.1.3. Risks Managed Appropriately. 5.1.4 Verifying Resources are Used Responsibly. CHAPTER 6: INFORMATION SECURITY OUTCOMES. 6.1 Defining Outcomes. 6.1.1 Strategic alignment. 6.1.2 Risk Management. 6.1.3 Business process assurance / convergence. 6.1.4 Value delivery. 6.1.5 Resource management. 6.1.6 Performance measurement. CHAPTER 7: SECURITY GOVERNANCE OBJECTIVES. 7.1 Security Architecture. 7.1.1 Managing Complexity. 7.1.2 Providing a Framework & Road Map. 7.1.3 Simplicity & Clarity through Layering & Modularisation. 7.1.4 Business Focus beyond the Technical Domain. 7.1.5 Objectives of Information Security Architectures. 7.1.6 SABSA Framework for Security Service Management. 7.1.7 SABSA Development Process. 7.1.8 SABSA Lifecycle. 7.1.9 SABSA Attributes. 7.2 COBIT. 7.3 Capability Maturity Model. 7.4 ISO/IEC 27001/ 27002. 7.4.1 ISO 27001. 7.4.2 ISO 27002. 7.5 Other Approaches. 7.5.1 National Cybersecurity Task Force. CHAPTER 8: RISK MANAGEMENT OBJECTIVES. Risk Management Responsibilities. Managing Risk Appropriately. 8.1 Determining Risk Management Objectives. 8.1.1 Recovery Time Objectives. CHAPTER 9: CURRENT STATE. 9.1 Current State of Security. 9.2 Current State of Risk Management. 9.3 Gap Analysis - Unmitigated Risk. 9.3.1 SABSA. 9.3.2 CMM. CHAPTER 10: DEVELOPING A SECURITY STRATEGY. 10.1 Failures of Strategy. 10.2 Attributes of A Good Security Strategy. 10.3 Strategy Resources. 10.3.1 Utilizing Architecture for Strategy Development. 10.3.2 Using Cobit for Strategy Development. 10.3.3 Using CMM for Strategy Development. 10.4 STRATEGY CONSTRAINTS. 10.4.1 Contextual constraints. 10.4.2 Operational constraints. CHAPTER 11: SAMPLE STRATEGY DEVELOPMENT. 11.1 The Process. CHAPTER 12: IMPLEMENTING STRATEGY. Action Plan Intermediate Goals. Action Plan Metrics. Re-engineering. Inadequate Performance. 12.1 Elements Of Strategy. 12.1.1 Policy Development. Attributes of Good Policies. Sample Policy Development. Other Policies. 12.1.2 Standards. Attributes of Good Standards. Sample Standards. Classifications. Standard Statement. CHAPTER 13: SECURITY PROGRAM DEVELOPMENT METRICS. 13.1 Information Security Program Development Metrics. 13.2 Program Development Operational Metrics. CHAPTER 14: INFORMATION SECURITY MANAGEMENT METRICS. 14.1 Management Metrics. 14.2 Security Management Decision Support Metrics. 14.4 CISO Decisions. 14.2.1 Strategic alignment. 14.2.2 Risk Management. 14.2.3 Metrics for Risk Management. 14.2.4 Assurance Process Integration. 14.2.5 Value Delivery. 14.2.6 Resource Management. 14.2.7 Performance Measurement. 14.7 Information Security Operational Metrics. 14.3.1 IT and Information Security Management. 14.3.2 Compliance Metrics. CHAPTER 15: INCIDENT MANAGEMENT AND RESPONSE METRICS. 15.1 Incident Management Decision Support Metrics. Conclusion. Appendix A. SABSA Business Attributes & Metrics. Appendix B. Cultural Worldviews. Heirarchists. Egalitarians. Individualists. Fatalists.

    15 in stock

    £77.36

  • Analysis of DNA Microarrays

    Wiley Analysis of DNA Microarrays

    7 in stock

    Book SynopsisThe rapid uncontrolled growth of classification methods in DNA microarray studies has resulted in a body of information scattered throughout literature, numerous conference proceedings, and others. This book brings together many of the unsupervised and supervised classification methods now dispersed in the literature.

    7 in stock

    £83.66

  • Wireless Broadband Networks

    John Wiley & Sons Inc Wireless Broadband Networks

    10 in stock

    Book SynopsisThis book combines theory with advanced practical applications in wireless broadband networks, presenting the reader with a standard reference that covers all aspects of the technology. It discusses the key theories underlying wireless broadband networks and shows readers how these theories are applied to real-world systems.Table of ContentsPreface xiii I Enabling Technologies for Wireless Broadband Networks 1 1 Orthogonal Frequency-Division Multiplexing and Other Block-Based Transmissions 3 1.1 Introduction 3 1.2 Wireless Communication Systems 3 1.3 Block-Based Transmissions 5 1.4 Orthogonal Frequency-Division Multiplexing Systems 9 1.5 Single-Carrier Cyclic Prefix Systems 11 1.6 Orthogonal Frequency-Division Multiple Access 12 1.7 Interleaved Frequency-Division Multiple Access 13 1.8 Single-Carrier Frequency-Division Multiple Access 16 1.9 CP-Based Code Division Multiple Access 17 1.10 Receiver Design 18 Summary 25 Appendix 26 References 27 2 Multiple-Input, Multiple-Output Antenna Systems 31 2.1 Introduction 31 2.2 MIMO System Model 32 2.3 Channel Capacity 33 2.4 Diversity 42 2.5 Diversity and Spatial Multiplexing Gain 43 2.6 SIMO Systems 44 2.7 MISO Systems 45 2.8 Space–Time Coding 45 2.9 MIMO Transceiver Design 50 2.10 SVD-Based Eigen-Beamforming 52 2.11 MIMO for Frequency-Selective Fading Channels 52 2.12 Transmitting Diversity for Frequency-Selective Fading Channels 56 2.13 Cyclic Delay Diversity 59 Summary 62 References 62 3 Ultrawideband 65 3.1 Introduction 65 3.2 Time-Hopping Ultrawideband 67 3.3 Direct Sequence Ultrawideband 84 3.4 Multiband 94 3.5 Other Types of UWB 97 Summary 107 References 110 4 Medium Access Control 115 4.1 Introduction 115 4.2 Slotted ALOHA MAC 117 4.3 Carrier-Sense Multiple Access with Collision Avoidance MAC 119 4.4 Polling MAC 126 4.5 Reservation MAC 127 4.6 Energy-Efficient MAC 132 4.7 Multichannel MAC 139 4.8 Directional-Antenna MAC 141 4.9 Multihop Saturated Throughput of IEEE 802.11 MAC 147 4.10 Multiple-Access Control 156 Summary 161 References 161 5 Mobility Resource Management 165 5.1 Introduction 165 5.2 Types of Handoffs 167 5.3 Handoff Strategies 169 5.4 Channel Assignment Schemes 170 5.5 Multiclass Channel Assignment Schemes 195 5.6 Location Management 218 5.7 Mobile IP 220 5.8 Cellular IP 221 5.9 HAWAII 222 Summary 223 References 224 6 Routing Protocols for Multihop Wireless Broadband Networks 227 6.1 Introduction 227 6.2 Multihop Wireless Broadband Networks: Mesh Networks 227 6.3 Importance of Routing Protocols 230 6.4 Routing Metrics 239 6.5 Classification of Routing Protocols 245 6.6 MANET Routing Protocols 254 Summary 262 References 262 7 Radio Resource Management for Wireless Broadband Networks 267 7.1 Introduction 267 7.2 Packet Scheduling 268 7.3 Admission Control 295 Summary 303 References 304 8 Quality of Service for Multimedia Services 307 8.1 Introduction 307 8.2 Traffic Models 309 8.3 Quality of Service in Wireless Systems 321 8.4 Outage Probability for Video Services in a Multirate DS-CDMA System 326 Summary 336 References 337 II Systems for Wireless Broadband Networks 339 9 Long-Term-Evolution Cellular Networks 341 9.1 Introduction 341 9.2 Network Architecture 343 9.3 Physical Layer 343 9.4 Medium Access Control Scheduling 354 9.5 Mobility Resource Management 361 9.6 Radio Resource Management 362 9.7 Security 363 9.8 Quality of Service 364 9.9 Applications 365 Summary 365 References 366 10 Wireless Broadband Networking with WiMAX 367 10.1 Introduction 367 10.2 WiMAX Overview 367 10.3 Competing Technologies 370 10.4 Overview of the Physical Layer 371 10.5 PMP Mode 374 10.6 Mesh Mode 378 10.7 Multihop Relay Mode 384 Summary 387 References 387 11 Wireless Local Area Networks 391 11.1 Introduction 391 11.2 Network Architectures 393 11.3 Physical Layer of IEEE 802.11n 393 11.4 Medium Access Control 404 11.5 Mobility Resource Management 422 11.6 Quality of Service 425 11.7 Applications 426 Summary 426 References 427 12 Wireless Personal Area Networks 429 12.1 Introduction 429 12.2 Network Architecture 430 12.3 Physical Layer 431 12.4 Medium Access Control 437 12.5 Mobility Resource Management 459 12.6 Routing 460 12.7 Quality of Service 460 12.8 Applications 460 Summary 461 References 461 13 Convergence of Networks 463 13.1 Introduction 463 13.2 3GPP/WLAN Interworking 464 13.3 IEEE 802.11u Interworking with External Networks 467 13.4 LAN/WLAN/WiMax/3G Interworking Based on IEEE 802.21 Media-Independent Handoff 468 13.5 Future Cellular/WiMax/WLAN/WPAN Interworking 471 13.6 Analytical Model for Cellular/WLAN Interworking 474 Summary 478 References 478 Appendix Basics of Probability, Random Variables, Random Processes, and Queueing Systems 481 A.1 Introduction 481 A.2 Probability 481 A.3 Random Variables 483 A.4 Poisson Random Process 486 A.5 Birth–Death Processes 487 A.6 Basic Queueing Systems 489 References 501 Index 503

    10 in stock

    £128.20

  • Mastering UNIX Shell Scripting 2e Bash Bourne and

    John Wiley & Sons Inc Mastering UNIX Shell Scripting 2e Bash Bourne and

    15 in stock

    Book SynopsisUNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting solution. Covering Bash, Bourne, and Korn shell scripting, this updated edition provides complete shell scripts plus detailed descriptions of each part. UNIX programmers and system administrators can tailor these to build tools that monitor for specific system events and situations, building solid UNIX shell scripting skills to solve real-world system administration problems.Table of ContentsAcknowledgments xxv Introduction xxvii Part One The Basics of Shell Scripting Chapter 1 Scripting Quick Start and Review 3 Chapter 2 24 Ways to Process a File Line-by-Line 67 Chapter 3 Automated Event Notification 131 Chapter 4 Progress Indicators Using a Series of Dots, a Rotating Line, or Elapsed Time 143 Part Two Scripts for Programmers, Testers, and Analysts Chapter 5 Working with Record Files 157 Chapter 6 Automated FTP Stuff 187 Chapter 7 Using rsync to Efficiently Replicate Data 219 Chapter 8 Automating Interactive Programs with Expect and Autoexpect 291 Chapter 9 Finding Large Files and Files of a Specific Type 325 Chapter 10 Process Monitoring and Enabling Pre-Processing, Startup, and Post-Processing Events 335 Chapter 11 Pseudo-Random Number and Data Generation 369 Chapter 12 Creating Pseudo-Random Passwords 401 Chapter 13 Floating-Point Math and the bc Utility 433 Chapter 14 Number Base Conversions 475 Chapter 15 hgrep: Highlighted grep Script 515 Chapter 16 Monitoring Processes and Applications 527 Part Three Scripts for Systems Administrators Chapter 17 Filesystem Monitoring 553 Chapter 18 Monitoring Paging and Swap Space 603 Chapter 19 Monitoring System Load 641 Chapter 20 Monitoring for Stale Disk Partitions (AIX-Specific) 677 Chapter 21 Turning On/Off SSA Identification Lights 697 Chapter 22 Automated Hosts Pinging with Notification of Failure 723 Chapter 23 Creating a System-Configuration Snapshot 741 Chapter 24 Compiling, Installing, Configuring, and Using sudo 777 Chapter 25 Print-Queue Hell: Keeping the Printers Printing 809 Chapter 26 Those Pesky Sarbanes-Oxley (SOX) Audits 851 Chapter 27 Using Dirvish with rsync to Create Snapshot-Type Backups 867 Chapter 28 Monitoring and Auditing User Keystrokes 935 Appendix A What’s on the Web Site 955 Index 977

    15 in stock

    £51.75

  • Technical Writing for Teams

    John Wiley & Sons Inc Technical Writing for Teams

    10 in stock

    Book SynopsisMS Word is the most popular word processing program in the world. Yet, because of its perceived shortcomings when working on technical documents and papers, many researchers must learn the intricacies of a completely different format, LaTek, to publish their research.Table of ContentsPREFACE. ACKNOWLEDGMENTS. CHAPTER 1. INTRODUCTION. 1.1 IN THIS CHAPTER. 1.2 OUR AUDIENCE. 1.2.1 A few horror stories. 1.2.2 Some history. 1.3 THE NEED FOR A GOOD "WRITING SYSTEM". 1.4 INTRODUCING STREAM TOOLS. 1.4.1 What is STREAM Tools? 1.4.2 Why use STREAM Tools? 1.4.3 The software of STREAM Tools. 1.4.3.1 Recommended packages. 1.4.3.2 A brief comparison of Microsoft Word vs. LaTeX: history and myths. 1.5 HOW TO USE THIS BOOK. 1.6 EXERCISES. CHAPTER 2. QUICK START GUIDE FOR STREAM TOOLS. 2.1 IN THIS CHAPTER. 2.2 A GENERAL OVERVIEW OF THE WRITING PROCESS. 2.3 INTRODUCTION TO WRITING QUALITY TOOLS: THE STREAM TOOLS EDITORIAL MARK-UP TABLE. 2.4 INTRODUCTION TO DOCUMENT DESIGN TOOLS. 2.4.1 Important fundamental concepts. 2.4.1.1 Step 1: Use template files to create your new manuscripts. 2.4.1.2 Step 2: Copy existing elements and paste them into a new location. 2.4.1.3 Step 3: Edit the element. 2.4.1.4 Step 4: Cross-referencing elements. 2.4.2 Creating Elements in a Document. 2.4.2.1 Headings. 2.4.2.2 Equations. 2.4.2.3 Figures. 2.4.2.4 Tables. 2.4.2.5 References (literature citations). 2.5 INTRODUCTION TO FILE MANAGEMENT: OPTIMIZING YOUR WORKFLOW. 2.5.1 General principles. 2.5.2 Using a wiki for file management. 2.5.3 Version control. 2.6 CONCLUSIONS. 2.7 EXERCISES. CHAPTER 3. DOCUMENT DESIGN. 3.1 IN THIS CHAPTER. 3.2 CREATING TEMPLATES. 3.2.1 Headings. 3.2.1.1 How to create and cross-reference a heading template. 3.2.1.2 How to alter a heading template. 3.2.1.3 Common formatting mistakes in headings. 3.2.1.4 Common stylistic mistakes for headings. 3.2.1.5 Tips and tricks. 3.2.2 Equations. 3.2.2.1 How to create and cross-reference an equation template. 3.2.2.2 How to alter an equation template. 3.2.2.3 Common formatting mistakes for equations. 3.2.2.4 Common stylistic mistakes for equations. 3.2.2.5 Tips and tricks. 3.2.3 Figures. 3.2.3.1 How to create and cross-reference a figure template. 3.2.3.2 How to alter a figure template. 3.2.3.3 Common formatting mistakes in figures. 3.2.3.4 Common stylistic mistakes in figures. 3.2.3.5 Tips and tricks for figures. 3.2.4 Tables. 3.2.4.1 How to create and cross-reference a table template. 3.2.4.2 How to alter a table template. 3.2.4.3 Common typesetting mistakes. 3.2.4.4 Common stylistic mistakes in tables. 3.2.4.5 Tips and tricks for tables. 3.2.5 Front matter. 3.2.5.1 Controlling page numbers. 3.2.5.2 Table of contents. 3.2.6 Back matter. 3.2.6.1 Appendices. 3.2.6.2 Indices. 3.3 USING MULTIPLE TEMPLATES. 3.3.1 Controlling styles. 3.3.2 Switching between single-column and double-column formats. 3.3.3 Master documents. 3.4 PRACTICE PROBLEMS. 3.4.1 Headings. 3.4.2 Equations. 3.4.3 Figures. 3.4.4 Tables. 3.5 ADDITIONAL RESOURCES. 3.6 EXERCISES. CHAPTER 4. USING BIBLIOGRAPHIC DATABASES. 4.1 IN THIS CHAPTER. 4.2 WHY USE A BIBLIOGRAPHIC DATABASE? 4.3 CHOICE OF SOFTWARE. 4.4 USING ENDNOTE. 4.4.1 Setting up the interface. 4.4.2 Adding references. 4.4.3 Citing references. 4.5 SHARING A DATABASE. 4.5.1 Numbering the database entries. 4.5.2 Compatibility with BiBTeX. 4.6 FORMATTING REFERENCES. 4.7 EXERCISES. CHAPTER 5. PLANNING, DRAFTING, AND EDITING DOCUMENTS. 5.1 IN THIS CHAPTER. 5.2 DEFINITION STAGE. 5.2.1 Select your team members. 5.2.2 Hold a kick-off meeting. 5.2.3 Analyze the audience. 5.2.4 Formulate the purpose. 5.2.4.1 Persuasion. 5.2.4.2 Exposition. 5.2.4.3 Instruction. 5.2.5 Select the optimum combination of STREAM Tools. 5.3 PREPARATION STAGE. 5.3.1 Evaluate historical documents. 5.3.1.1 Journal articles. 5.3.1.2 Proceedings/papers. 5.3.1.3 Theses and dissertations. 5.3.1.4 Proposals. 5.3.1.5 Reports. 5.3.2 Populate the file repository. 5.3.3 Create a comprehensive outline of the document. 5.3.3.1 Using deductive structures. 5.3.3.2 Using Microsoft Word’s Outline feature. 5.3.4 Populate all sections with "yellow text". 5.3.5 Distribute writing tasks among team members. 5.3.5.1 Choose a drafting strategy. 5.3.5.2 Synchronize writing styles. 5.4 WRITING STAGE. 5.4.1 Enter content. 5.4.1.1 Legacy content. 5.4.1.2 New content. 5.4.1.3 Control versions of shared files. 5.4.2 Request that team members submit their drafts. 5.4.3 Verify that each section is headed in the right direction. 5.4.4 Construct the whole document. 5.4.5 Revise for content and distribute additional writing tasks. 5.4.5.1 Comprehensive editing. 5.4.5.2 STREAM Tools Editorial Mark-up table (STEM Table). 5.4.5.3 Strategies for editing electronic copy using Microsoft Word--an overview of Microsoft Word’s commenting, reviewing, and proofing features. 5.4.6 Distribute additional writing tasks. 5.5 COMPLETION STAGE. 5.5.1 Copy edit the document. 5.5.2 Send out for a final review of content and clarity. 5.5.3 Proofread the document. 5.5.4 Submit the document. 5.5.5 Conduct the final process-improvement review session. 5.6 EXERCISES. 5.7 ADDITIONAL RESOURCES. CHAPTER 6. BUILDING HIGH QUALITY WRITING TEAMS. 6.1 IN THIS CHAPTER. 6.2 UNDERSTANDING THE BENEFITS AND CHALLENGES OF TEAMWORK. 6.2.1 The payoff of teamwork. 6.2.2 Some principle challenges of teamwork. 6.3 IDENTIFYING TEAM GOALS AND ASSIGNING MEMBER ROLES. 6.3.1 Define roles and procedures clearly. 6.3.1.1 Define team roles. 6.3.1.2 Define team procedures. 6.4 MANAGING TEAMWORK AT A DISTANCE. 6.4.1 Building trust in virtual teams. 6.4.2 Demonstrating sensitivity to cultural differences. 6.5 SELECTING COMMUNICATION TOOLS TO SUPPORT TEAMWORK. 6.5.1 Wikis. 6.5.1.1 Creating a wiki. 6.5.1.2 Editing. 6.5.1.3 Organizing. 6.5.1.4 Monitoring edits. 6.5.1.5 Other suggestions for wiki use. 6.5.2 SharePoint. 6.5.2.1 Lists. 6.5.2.2 Web pages. 6.5.2.3 Alerts and site management. 6.6 EXERCISES. 6.7 ADDITIONAL RESOURCES. CHAPTER 7. ASSURING QUALITY WRITING. 7.1 IN THIS CHAPTER. 7.2 CHOOSING THE BEST WORDS 278. 7.2.1 Choose strong words. 7.2.1.1 Use strong nouns and verbs. 7.2.1.2 Choose words with the right level of formality. 7.2.2 Avoid weak words. 7.2.2.1 Check for confusing or frequently misused words. 7.2.2.2 Avoid double negatives, and change negatives to affirmatives. 7.2.2.3 Avoid changing verbs to nouns. 7.2.2.4 Delete meaningless words and modifiers. 7.2.2.5 Steer clear of jargon. 7.2.2.6 Avoid sexist or discriminatory language. 7.3 WRITING STRONG SENTENCES. 7.3.1 Write economically. 7.3.2 Include a variety of sentence types. 7.4 AVOIDING WEAK SENTENCE CONSTRUCTION. 7.4.1.1 Comma splices. 7.4.1.2 Fragments. 7.4.1.3 Fused or run-on sentences. 7.4.1.4 Misplaced, dangling, or two-way modifiers. 7.4.1.5 Faulty parallelism. 7.5 PUNCTUATING FOR CLARITY. 7.5.1 End punctuation. 7.5.1.1 Periods. 7.5.1.2 Question marks. 7.5.1.3 Exclamation points. 7.5.2 Commas. 7.5.3 Semicolons. 7.5.4 Colons. 7.5.5 Apostrophes. 7.5.6 Dashes and hyphens. 7.6 FINAL CONSIDERATIONS. 7.6.1 Abbreviations and acronyms. 7.6.2 Capitalization. 7.6.3 Numbers. 7.6.4 Dates. 7.6.5 Fractions and percentages. 7.6.6 Units of measure. 7.7 A FINAL NOTE ON GRAMMAR. 7.8 ADDITIONAL RESOURCES. CHAPTER 8. CONCLUDING REMARKS. 8.1 IN THIS CHAPTER. 8.2 BUSINESS CASE. 8.3 FREQUENTLY ASKED QUESTIONS. 8.4 SUCCESS STORIES. 8.5 ADDITIONAL READING. 8.5.1 Useful books and articles. 8.5.2 Useful weblinks. 8.6 EXERCISES.

    10 in stock

    £66.45

  • Professional Microsoft SQL Server 2008

    John Wiley & Sons Inc Professional Microsoft SQL Server 2008

    Out of stock

    Book SynopsisSQL Server 2008 represents a sizable jump forward in scalability, performance, and usability for the DBA, developer, and business intelligence (BI) developer. It is no longer unheard of to have 20-terabyte databases running on a SQL Server. SQL Server administration used to just be the job of a database administrator (DBA), but as SQL Server proliferates throughout smaller companies, many developers have begun to act as administrators as well. Additionally, some of the new features in SQL Server are more developer-centric, and poor configuration of these features can result in poor performance. SQL Server now enables you to manage the policies on hundreds of SQL Servers in your environment as if you were managing a single instance. We''ve provided a comprehensive, tutorial-based book to get you over the learning curve of how to configure and administer SQL Server 2008. Whether you''re an administrator or developer using SQL Server, you can''t avoid wearing a DBA hat at some point. DTable of ContentsForward. Chapter 1. SQL Server 2005 Architecture. Chapter 2. SQL Server 2005 Installation Best Practices. Chapter 3. Upgrading SQL Server 2008 Best Practices. Chapter 4. Managing and Troubleshooting the Database Engine. Chapter 5. Automating SQL Server. Chapter 6. Integration Services Administration and Performance Tuning. Chapter 7. Analysis Services Administration and Performance Tuning. Chapter 8. Administering the Development Features. Chapter 9. Securing the Database Engine. Chapter 10. Change Management. Chapter 11. Configuring the Server for Optimal Performance. Chapter 12. Optimizing SQL Server 2005. Chapter 13. Monitoring Your SQL Server. Chapter 14. Performance Tuning T-SQL. Chapter 15. Indexing Your Database. Chapter 16. Replication. Chapter 17. Database Mirroring. Chapter 18. Backup and Recovery. Chapter 19. SQL Server 2005 Log Shipping. Chapter 20. Clustering SQL Server 2005.

    Out of stock

    £45.00

  • Mastering Active Directory for Windows Server

    John Wiley & Sons Inc Mastering Active Directory for Windows Server

    15 in stock

    Book SynopsisFind all the information you need to manage and maintain Active Directory in Mastering Active Directory for Windows Server(R) 2008 , an in-depth guide updated with over 300 pages of new material.Trade Review"The authors have compiled an incredibly useful list of web references...how to work effectively to get the maximum out of the new features" (IT Training, March 2009)Table of ContentsIntroduction xxv Part 1 • Active Directory Design 1 Chapter 1 • Active Directory Fundamentals 3 Chapter 2 • Domain Name System Design 17 Chapter 3 • Active Directory Domain Services Forest and Domain Design 43 Chapter 4 • Organizing the Physical and Logical Aspects of AD DS 79 Chapter 5 • Flexible Single Master Operations Design 119 Part 2 • Active Directory Object Management 127 Chapter 6 • Managing Accounts: User, Group, and Computer 129 Chapter 7 • Maintaining Organizational Units 179 Chapter 8 • Managing Group Policy 207 Chapter 9 • Managing Active Directory Security 245 Part 3 • Active Directory Service Management 265 Chapter 10 • Managing Access with Active Directory Services 267 Chapter 11 • Managing Active Directory Rights Management Services 297 Chapter 12 • Managing Active Directory Certificate Services 329 Chapter 13 • Managing the Flexible Single Master Operations Roles 365 Chapter 14 • Maintaining the Active Directory Database 387 Part 4 • Active Directory Best Practices and Troubleshooting 409 Chapter 15 • Microsoft’s Troubleshooting Methodology for Active Directory 411 Chapter 16 • Troubleshooting Problems Related to Network Infrastructure 425 Chapter 17 • Troubleshooting Problems Related to the Active Directory Database 451 Part 5 • Streamlining Management with Scripts 483 Chapter 18 • ADSI Primer 485 Chapter 19 • Active Directory Scripts 541 Chapter 20 • Monitoring Active Directory 615 Chapter 21 • Managing Active Directory with PowerShell 653 Appendix A • The Bottom Line 683 Index 709

    15 in stock

    £49.50

  • Data Mining with Microsoft SQL Server 2008

    John Wiley & Sons Inc Data Mining with Microsoft SQL Server 2008

    15 in stock

    Book SynopsisUnderstand how to use the new features of Microsoft SQL Server 2008 for data mining by using the tools in Data Mining with Microsoft SQL Server 2008 , which will show you how to use the SQL Server Data Mining Toolset with Office 2007 to mine and analyze data.Table of Contents1. Introduction to Data Mining. 2. Applied Data Mining Using Microsoft Excel 2007. 3. DMX and SQL Server Data Mining Concepts. 4. Using SQL Server Data Mining. 5. Implementing a Data Mining Process Using Office 2007. 6. Microsoft Naïve Bayes. 7. Microsoft Decision Trees Algorithm. 8. Microsoft Time Series Algorithm. 9. Microsoft Clustering. 10. Microsoft Sequence Clustering. 11. Microsoft Association Rules. 12. Microsoft Neural Network and Logistic Regression. 13. Mining OLAP Cubes. 14. Data Mining with SQL Server Integration Services. 15. SQL Server Data Mining Architecture. 16. Programming SQL Server Data Mining. 17. Extending SQL Server Data Mining. 18. Implementing a Web Cross-Selling Application. 19. Conclusion and Additional Resources. Appendix A. Datasets. Appendix B. Supported Functions. Index.

    15 in stock

    £36.09

  • Active Directory For Dummies

    John Wiley & Sons Inc Active Directory For Dummies

    2 in stock

    Book SynopsisYour guide to learning Active Directory the quick and easy way Whether you''re new to Active Directory (AD) or a savvy system administrator looking to brush up on your skills,?Active Directory for Dummies will steer you in the right direction. Since its original release, Microsoft''s implementation of the lightweight directory access protocol (LDAP) for the Windows Server line of networking software has become one of the most popular directory service products in the world. If you''re involved with the design and support of Microsoft directory services and/or solutions, you''re in the right place. This comprehensive guide starts by showing you the basics of AD, so you can utilize its structures to simplify your life and secure your digital environment. From there, you''ll discover how to exert fine-grained control over groups, assets, security, permissions, and policies on a Windows network and efficiently configure, manage, and update the network. With coverage of secTable of ContentsIntroduction 1 Part I: Getting Started 5 Chapter 1: Understanding Active Directory 7 Chapter 2: Analyzing Requirements for Active Directory 23 Chapter 3: Designing an Active Directory Implementation Plan 41 Part II: Planning and Deploying with Active Directory Domain Services 53 Chapter 4: Playing the Name Game 55 Chapter 5: Creating a Logical Structure 71 Chapter 6: Getting Physical 83 Chapter 7: Ready to Deploy! 103 Part III: New Active Directory Features 127 Chapter 8: AD LDS: Active Directory on a Diet 129 Chapter 9: Federating Active Directory 141 Chapter 10: AD Certificate Services and Rights Management Services 157 Part IV: Managing Active Directory 173 Chapter 11: Managing Users, Groups, and Other Objects 175 Chapter 12: Managing Active Directory Replication 203 Chapter 13: Schema-ing! 219 Chapter 14: Managing Security with Active Directory Domain Services 233 Chapter 15: Maintaining Active Directory 253 Part V: The Part of Tens 271 Chapter 16: The Ten Most Important Active Directory Design Points 273 Chapter 17: Ten Cool Web Sites for Active Directory Info 279 Chapter 18: Ten Troubleshooting Tips for Active Directory 285 Part VI: Appendixes 291 Appendix A: Windows 2008 AD Command Line Tools 293 Appendix B: Glossary 305 Index 315

    2 in stock

    £22.09

  • Storage Area Networks For Dummies

    John Wiley & Sons Inc Storage Area Networks For Dummies

    15 in stock

    Book SynopsisIf you've been charged with setting up storage area networks for your company, learning how SANs work and managing data storage problems might seem challenging. Storage Area Networks For Dummies, 2nd Edition comes to the rescue with just what you need to know. Whether you already a bit SAN savvy or you're a complete novice, here's the scoop on how SANs save money, how to implement new technologies like data de-duplication, iScsi, and Fibre Channel over Ethernet, how to develop SANs that will aid your company's disaster recovery plan, and much more. For example, you can: Understand what SANs are, whether you need one, and what you need to build one Learn to use loops, switches, and fabric, and design your SAN for peak performance Create a disaster recovery plan with the appropriate guidelines, remote site, and data copy techniques Discover how to connect or extend SANs and how compression can reduce costs CTable of ContentsIntroduction. Part I: SAN 101. Chapter 1: The Storage Area Network. Chapter 2: SAN Building Blocks. Chapter 3: What Makes a SAN Go. Chapter 4: What Makes a SAN Stop. Part II: Designing and Building a SAN. Chapter 5: Designing the SAN. Chapter 6: SANs and Disaster Recovery. Chapter 7: Putting It All Together. Part III: Using Advanced SAN Features. Chapter 8: Networking SANs. Chapter 9: SAN-Based Backup. Chapter 10: Mirror, Mirror: Point-in-Time Copies. Part IV: SAN Management and Troubleshooting. Chapter 11: Approaches to SAN Management. Chapter 12: Troubleshooting SANs. Part V: Understanding the Cool Stuff. Chapter 13: Using Data De-Duplication to Lighten the Load. Chapter 14: Continuous Data Protection. Chapter 15: Everything You Ever Wanted to Know about Virtualization. Part VI: The Par t of Tens. Chapter 16: Ten Reasons to Use a SAN. Chapter 17: Ten Reasons NOT to Use a SAN. Index.

    15 in stock

    £18.39

  • MySQL Administrators Bible

    John Wiley & Sons Inc MySQL Administrators Bible

    15 in stock

    Book SynopsisWith special focus on the next major release of MySQL, this resource provides a solid framework for anyone new to MySQL or transitioning from another database platform, as well as experience MySQL administrators. The high-profile author duo provides essential coverage of the fundamentals of MySQL database managementincluding MySQL's unique approach to basic database features and functionsas well as coverage of SQL queries, data and index types, stores procedure and functions, triggers and views, and transactions. They also present comprehensive coverage of such topics as MySQL server tuning, managing storage engines, caching, backup and recovery, managing users, index tuning, database and performance monitoring, security, and more.Table of ContentsIntroduction xxvii Part I First Steps with MySQL Chapter 1: Introduction to MySQL 3 MySQL Mission — Speed, Reliability, and Ease of Use 3 Company background 4 Community and Enterprise server versions 5 The MySQL Community 6 How to contribute 6 Reasons to contribute 7 Summary 7 Chapter 2: Installing and Upgrading MySQL Server 9 Before Installation 9 Choosing the MySQL version 11 MySQL support 12 Downloads 12 Installation 12 MySQL Server installations on Unix 13 MySQL Server Installation on Windows 20 Installing MySQL from a Noinstall Zip Archive 24 Starting and stopping MySQL from the Windows command line 25 Starting and stopping MySQL as a Windows service 26 Initial Configuration 29 Unix configuration file 31 Windows configuration file 31 MySQL Configuration Wizard on Windows 31 Detailed Configuration 32 The Server Type screen 33 Database Usage screen 33 InnoDB Tablespace screen 34 Concurrent Connections screen 34 Networking Options and Strict Mode Options screen 34 Character Set screen 35 Service Options screen 35 Security Options screen 35 Confirmation screen 36 MySQL Post-Install Configuration on Unix 36 Initializing the system tables 36 Setting initial passwords 37 Root user password assignment 37 Anonymous users 39 Securing Your System 40 Windows PATH Variable Configuration 42 Automated startup 42 Starting and stopping mysqld on System V-based Unix 42 System V run levels 43 Upgrading mysqld 45 The MySQL changelog 45 Upgrading MySQL on Windows 46 Troubleshooting 47 Summary 48 Chapter 3: Accessing MySQL 49 Accessing mysqld with Command-Line Tools 49 Frequently used options 50 Using the command-line mysql client 52 mysqladmin — Client for administering a server 62 GUI Tools 66 SQLyog 66 phpMyAdmin 69 MySQL Query Browser 71 MySQL Administrator 74 MySQL Workbench 80 Summary 83 Part II Developing with MySQL Chapter 4: How MySQL Extends and Deviates from SQL 87 Learning MySQL Language Structure 88 Comments and portability 88 Case-sensitivity 90 Escape characters 91 Naming limitations and quoting 93 Dot notation 95 Time zones 97 Character sets and collations 98 Understanding MySQL Deviations 105 Privileges and permissions 110 Transaction management 110 Check constraints 111 Upsert statements 112 Using MySQL Extensions 114 Aliases 115 Alter Table extensions 115 Create Extensions 118 DML Extensions 119 Drop Extensions 124 The LIMIT Extension 125 SELECT Extensions 126 Select Into Outfile/Select Into Dumpfile 126 Sql_Small_Result/Sql_Big_Result 127 Union Order By 127 Select For Update 127 Select Lock In Share Mode 128 Distinctrow 128 Sql_Buffer_Result 129 High_Priority/Low_Priority 129 Server maintenance extensions 129 The Set extension and user-defined variables 131 The Show extension 135 Table definition extensions 147 Table maintenance extensions 150 Transactional statement extensions 156 Summary 158 Chapter 5: MySQL Data Types 159 Looking at MySQL Data Types 159 Character String Types 160 Length 162 Character string type attributes 164 National Character String Types 166 Binary Large Object String Types 168 Blob values 169 Binary values 169 Binary length 169 Varbinary length 170 Numeric Types 170 Numeric data sizes and ranges 172 Numeric data type attributes 177 Boolean Types 180 Datetime Types 183 Allowed input values 185 Microsecond input 186 Automatic updates 187 Conversion issues 188 Numeric functions and Datetime types 188 Other conversion issues 190 Datetime data type attributes 191 The effect of time zones 192 Interval Types 193 ENUM and SET Types 195 Enumerations 195 ENUM and SET data type attributes 198 Choosing SQL Modes 201 Invalid data 201 SQL modes 203 Using NULL Values 211 Finding an Optimal Data Type for Existing Data 212 Small data samples and Procedure Analyse() 215 Summary 217 Chapter 6: MySQL Index Types 219 Looking at Keys and Indexes 219 Using Indexes to Speed Up Lookups 221 Creating and dropping indexes 223 Index order 225 Index length 226 Index types 228 Redundant indexes 230 Creating and Dropping Key Constraints 231 Creating and dropping unique key constraints 231 Creating and dropping foreign key constraints 232 Foreign key constraints and data changes 234 Requirements for foreign key constraints 235 Using FULLTEXT Indexes 237 Summary 239 Chapter 7: Stored Routines, Triggers, and Events 241 Comparing Stored Routines, Triggers, and Events 241 Using Triggers 242 Creating a trigger 243 Dropping a trigger 244 Multiple SQL statements in triggers 245 Changing a trigger 246 Triggers on views and temporary tables 247 Trigger runtime behavior 248 Finding all triggers 252 Trigger storage and backup 252 Triggers and replication 254 Trigger limitations 254 Using Stored Routines 255 Performance implications of stored routines 256 Stored procedures vs stored functions 256 Creating a stored routine 256 Invoking a stored procedure 259 Dropping a stored routine 261 Multiple SQL statements in stored routines 261 INOUT arguments to a stored procedure 261 Local variables 262 Stored routine runtime behavior 264 Options when creating routines 265 Creating a basic stored function 268 Full Create Function syntax 269 Invoking a stored function 269 Changing a stored routine 270 Naming: stored routines 271 Stored procedure result sets 273 Stored routine errors and warnings 274 Conditions and handlers 275 Stored routine flow control 282 Recursion 284 Stored routines and replication 285 Stored function limitations 285 Stored routine backup and storage 286 Using Cursors 287 Using Events 289 Turning on the event scheduler 289 Creating an event 291 Dropping an event 292 Multiple SQL statements in events 293 Start and end times for periodic events 293 Event status 294 Finding all events 295 Changing an event 295 After the last execution of an event 296 Event logging 297 Event runtime behavior 298 Event limitations 299 Event backup and storage 300 Summary 300 Chapter 8: MySQL Views 301 Defining Views 302 View definition limitations and unexpected behavior 304 Security and privacy 305 Specify a view’s definer 306 Abstraction and simplification 307 Performance 308 Updatable views 313 Changing a View Definition 317 Replication and Views 317 Summary 318 Chapter 9: Transactions in MySQL 319 Understanding ACID Compliance 320 Atomicity 321 Consistency 321 Isolation 321 Durability 321 Using Transactional Statements 322 Begin, Begin Work, and Start Transaction 322 Commit 322 Rollback 322 Savepoints 323 Autocommit 324 Using Isolation Levels 325 Read Uncommited 329 Read Committed 331 Repeatable Read 332 Serializable 334 Multi-version concurrency control 335 Explaining Locking and Deadlocks 336 Table-level locks 338 Page-level locks 341 Row-level locks 341 Recovering MySQL Transactions 343 Summary 344 Part III Core MySQL Administration Chapter 10: MySQL Server Tuning 349 Choosing Optimal Hardware 349 Tuning the Operating System 352 Operating system architecture 352 File systems and partitions 353 Buffers 356 Kernel parameters 357 Linux 357 Other daemons 360 Tuning MySQL Server 360 Status variables 360 System variables 361 Option file 361 Dynamic variables 371 Summary 373 Chapter 11: Storage Engines 375 Understanding Storage Engines 375 Storage engines as plugins 376 Storage engine comparison 376 Using Different Storage Engines 378 MyISAM storage engine 378 InnoDB storage engine 384 Memory storage engine 394 Maria storage engine 396 Falcon storage engine 401 PBXT storage engine 410 Federated storage engine 415 NDB storage engine 417 Archive storage engine 417 Blackhole storage engine 419 CSV storage engine 420 Working with Storage Engines 421 Create Table 421 Alter Table 421 Drop Table 422 Summary 422 Chapter 12: Caching with MySQL 423 Implementing Cache Tables 424 Working with the Query Cache 427 What gets stored in the query cache? 427 Query cache memory usage and tuning 429 Query cache fragmentation 433 Utilizing memcached 434 Summary 438 Chapter 13: Backups and Recovery 439 Backing Up MySQL 439 Uses for backups 441 Backup frequency 443 What to back up 445 Backup locations 445 Backup methods 445 Online backup 460 mysqlhotcopy 462 Commercial options 464 Copying Databases to Another Machine 467 Recovering from Crashes 468 Planning for Disasters 471 Summary 472 Chapter 14: User Management 473 Learning about MySQL Users 473 Access Control Lists 474 Wildcards 475 System tables 476 Managing User Accounts 478 Grant and Revoke commands 481 Show Grants and mk-show-grants 485 Resetting the Root Password 487 Windows server 488 Unix-based server 489 Debugging User Account Problems 490 Bad password 490 Access issues 491 Client does not support authentication protocol 491 Can’t connect to local mysqld through socket ‘/path/to/mysqld.sock’ 492 I do not have the right permissions! 493 Summary 494 Chapter 15: Partitioning 495 Learning about Partitioning 495 Partitioning Tables 496 RANGE partitioning 497 LIST partitioning 502 HASH partitioning 503 KEY partitioning 504 Composite partitioning 504 Partition management commands 507 Restrictions of partitioning 510 Merge Tables 510 Creating a Merge table 511 Changing a Merge table 512 Advantages of Merge tables 513 Partitioning with MySQL Cluster 513 Programmatic Partitioning 514 Summary 514 Chapter 16: Logging and Replication 517 Log Files 517 Error log 517 Binary logs 518 Relay logs 520 General and slow query logs 520 Rotating logs 522 Other methods of rotating 523 Replication 524 Setting up semisynchronous replication 525 Statement-based, row-based, and mixed-based replication 527 Replication Configurations 529 Simple replication 529 Change Master statement 534 More complex setups 534 Additional replication configuration options 539 Correcting Data Drift 540 mk-table-checksum overview 540 mk-table-sync overview 542 Putting this together 542 Summary 543 Chapter 17: Measuring Performance 545 Benchmarking 546 mysqlslap 547 SysBench 552 Benchmarking recommendations 565 Profiling 566 Show Global Status 566 mysqltuner 568 mysqlreport 572 mk-query-profiler 580 mysqldumpslow 583 Capacity Planning 585 Summary 585 Part IV Extending Your Skills Chapter 18: Query Analysis and Index Tuning 589 Using Explain 590 Explain plan basics 590 Data access strategy 596 Explain plan indexes 606 Rows 607 Extra 608 Subqueries and Explain 611 Explain Extended 612 Explain on Non-Select Statements 614 Other Query Analysis Tools 614 Optimizing Queries 615 Factors affecting key usage 615 Optimizer hints 616 Adding an Index 616 Optimizing away Using temporary 620 Using an index by eliminating functions 623 Non-index schema changes 626 Batching expensive operations 628 Optimizing frequent operations 629 Summary 631 Chapter 19: Monitoring Your Systems 633 Deciding What to Monitor 634 Examining Open Source Monitoring 636 Nagios 636 Cacti 637 Hyperic HQ 638 OpenNMS 640 Zenoss Core 641 Munin 642 Monit 643 Examining Commercial Monitoring 644 MySQL enterprise monitor 644 MONyog 645 Summary 646 Chapter 20: Securing MySQL 649 Access Control Lists 649 Wildcards and blank values 650 Privilege and privilege levels 651 Accessing the Operating System 654 Database access 654 Changing MySQL connectivity defaults 654 Operating system login 654 Securing Backups and Logs 656 Data Security 656 Data flow 657 Encrypted connectivity 659 Data security using MySQL objects 664 Creating Security Policies 665 Summary 666 Chapter 21: The MySQL Data Dictionary 667 Object Catalog 668 Schemata 668 Tables 670 Views 674 Columns 676 Statistics 679 Table_Constraints 681 Key_Column_Usage 682 Referential_Constraints 684 Triggers 685 Routines 686 Parameters 690 Events 691 Partitions 693 System Information 695 Character_Sets 695 Collations 696 Collation_Character_Set_Applicability 696 Engines 697 Plugins 697 Processlist 698 Profiling 709 Global_Variables 710 Session_Variables 710 Global_Status 711 Session_Status 711 Displaying Permissions 711 Column_Privileges 712 Table_Privileges 713 Schema_Privileges 714 User_Privileges 715 Storage Engine-Specific Metadata 716 Custom Metadata 716 Defining the plugin 716 Compiling the plugin 722 Installing the plugin 724 Summary 725 Chapter 22: Scaling and High Availability Architectures 727 Replication 728 One read slave 729 Promoting a new master 729 Many read slaves 734 Master/master replication 735 Circular replication 736 SAN 737 DRBD 738 MySQL and DRBD setup 738 MySQL Proxy 739 Scaling read queries 740 Automated failover 740 Read/write splitting 742 Sharding 742 Linux-HA Heartbeat 742 MySQL Cluster 744 Connection Pooling 746 memcached 747 Summary 748 Appendix A: MySQL Proxy 749 Appendix B: Functions and Operators 783 Appendix C: Resources 813 Index 821

    15 in stock

    £45.12

  • Risk Centric Threat Modeling

    John Wiley & Sons Inc Risk Centric Threat Modeling

    15 in stock

    Book SynopsisThis book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the fTable of ContentsForeword ix Preface xv List of Figures xvii List of Tables xxiii 1 Threat Modeling Overview 1 Definitions 1 Origins and Use 3 Summary 8 Rationale and Evolution of Security Analysis 9 Summary 19 Building A Better Risk Model 19 Summary 31 Threat Anatomy 33 Summary 48 Crowdsourcing Risk Analytics 48 2 Objectives and Benefits of Threat Modeling 63 Defining a Risk Mitigation Strategy 63 Improving Application Security 82 Building Security in the Software Development Life Cycle 92 Identifying Application Vulnerabilities and Design Flaws 104 Analyzing Application Security Risks 118 3 Existing Threat Modeling Approaches 137 Security Software Risk-Based Variants 137 4 Threat Modeling Within the SDLC 195 Building Security in SDLC with Threat Modeling 195 Integrating Threat Modeling Within The Different Types of SDLCs 205 5 Threat Modeling and Risk Management 235 Data Breach Incidents and Lessons for Risk Management 235 Threats and Risk Analysis 259 Risk-Based Threat Modeling 282 Threat Modeling in Information Security and Risk Management Processes 289 Threat Modeling Within Security Incident Response Processes 306 6 Intro to PASTA 317 Risk-Centric Threat Modeling 317 7 Diving Deeper into PASTA 343 Exploring the Seven Stages and Embedded Threat Modeling Activities 343 Chapter Summary 478 8 PASTA Use Case 479 PASTA Use Case Example Walk-Through 479 Glossary 633 References 653 Index 657

    15 in stock

    £84.56

  • Network Security Bible

    John Wiley & Sons Inc Network Security Bible

    15 in stock

    Book SynopsisThe comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.Table of ContentsIntroduction xxxv Part I: Network Security Landscape Chapter 1: State of Network Security 3 Cyber Security 3 Summary 7 Chapter 2: New Approaches to Cyber Security 9 General Trends 9 The Changing Face of Cyber Security 16 Summary 17 Chapter 3: Interfacing with the Organization 19 An Enterprise Security Methodology 19 Key Questions to Manage Risk 27 Summary 32 Part II: Security Principles and Practices Chapter 4: Information System Security Principles 35 Key Principles of Network Security 35 Formal Processes 37 Risk Management 60 Calculating and Managing Risk 70 Summary 71 Chapter 5: Information System Security Management 73 Security Policies 73 Security Awareness 77 Managing the Technical Effort 79 Configuration Management 87 Business Continuity and Disaster Recovery Planning 90 Physical Security 98 Legal and Liability Issues 105 Summary 107 Chapter 6: Access Control 109 Control Models 109 Types of Access Control Implementations 112 Identification and Authentication 115 Databases 121 Remote Access 123 Summary 125 Chapter 7: Attacks and Threats 127 Malicious Code 127 Review of Common Attacks 129 External Attack Methodologies Overview 136 Internal Threat Overview 140 Summary 142 Part III: Operating Systems and Applications Chapter 8: Windows Security 145 Windows Security at the Heart of the Defense 147 Out-of-the-Box Operating System Hardening 151 Installing Applications 171 Putting the Workstation on the Network 175 Operating Windows Safely 177 Upgrades and Patches 191 Maintain and Test the Security 194 Attacks Against the Windows Workstation 198 Summary 205 Chapter 9: UNIX and Linux Security 207 The Focus of UNIX/Linux Security 207 Physical Security 212 Controlling the Configuration 217 Operating UNIX Safely 224 Hardening UNIX 245 Summary 253 Chapter 10: Web Browser and Client Security 255 Web Browser and Client Risk 255 How a Web Browser Works 259 Web Browser Attacks 268 Operating Safely 271 Web Browser Configurations 276 Summary 286 Chapter 11: Web Security 287 What Is HTTP? 287 How Does HTTP Work? 289 Server Content 301 Client Content 303 State 309 Attacking Web Servers 315 Web Services 317 Summary 321 Chapter 12: Electronic mail (E-mail) Security 323 The E-mail Risk 323 The E-mail Protocols 340 E-mail Authentication 345 Operating Safely When Using E-mail 348 Summary 355 Chapter 13: Domain Name System 357 DNS Basics 358 Purpose of DNS 364 Setting Up DNS 375 Security Issues with DNS 377 DNS Attacks 384 Designing DNS 386 Master Slave DNS 388 Detailed DNS Architecture 388 DNS SEC 389 Summary 393 Chapter 14: Server Security 395 General Server Risks 395 Security by Design 396 Operating Servers Safely 413 Server Applications 417 Multi-Level Security and Digital Rights Management 421 Summary 427 Part IV: Network Security Fundamentals Chapter 15: Network Protocols 431 Protocols 431 The Open Systems Interconnect Model 432 The OSI Layers 433 The TCP/IP Model 439 TCP/IP Model Layers 441 Internet Protocol 442 VoIP 450 Summary 457 Chapter 16: Wireless Security 459 Electromagnetic Spectrum 459 The Cellular Phone Network 462 Placing a Cellular Telephone Call 464 Wireless Transmission Systems 469 Pervasive Wireless Data Network Technologies 473 IEEE Wireless LAN Specifications 478 IEEE 802.11 480 IEEE 802.11 Wireless Security 485 Bluetooth 503 Wireless Application Protocol 504 Future of Wireless 506 Summary 508 Chapter 17: Network Architecture Fundamentals 509 Network Segments 510 Perimeter Defense 511 Network Address Translation 511 Basic Architecture Issues 513 Subnetting, Switching, and VLANs 516 Address Resolution Protocol and Media Access Control 517 Dynamic Host Configuration Protocol and Addressing Control 518 Zero Configuration Networks 519 System Design and Architecture Against Insider Threats 525 Common Attacks 528 Summary 529 Chapter 18: Firewalls 531 Firewalls 531 Firewall Rules 537 The Use of Personal Firewalls 542 Summary 548 Chapter 19: Intrusion Detection/Prevention 549 Intrusion Detection Systems 549 Responses to Intrusion Detection 556 Emerging Technologies in Intrusion Detection Systems 556 Summary 567 Part V: Communication Chapter 20: Secret Communication 571 What is Cryptography? 572 General Terms 576 Principles of Cryptography 577 The Four Cryptographic Primitives 587 Putting These Primitives Together to Achieve CIA 602 The Difference Between Algorithm and Implementation 603 Proprietary Versus Open Source Algorithms 606 Attacks on Hash Functions 607 Quantum Cryptography 617 Summary 628 Chapter 21: Covert Communication 631 Where Hidden Data Hides 631 Where Did It Come From? 633 Where Is It Going? 633 Overview of Steganography 634 History of Steganography 639 Core Areas of Network Security and Their Relation to Steganography 641 Principles of Steganography 643 Steganography Compared to Cryptography 644 Types of Steganography 646 Products That Implement Steganography 654 Steganography Versus Digital Watermarking 673 Types of Digital Watermarking 675 Goals of Digital Watermarking 676 Digital Watermarking and Stego 676 Summary 679 Chapter 22: Applications of Secure/Covert Communication 681 E-mail 682 Authentication Servers 685 Working Model 686 Public Key Infrastructure 688 Virtual Private Networks 692 Secure Sockets Layer/Transport Layer Security 699 SSL Handshake 700 Summary 704 Part VI: The Security Threat and Response Chapter 23: Intrusion Detection and Response 707 Intrusion Detection Mechanisms 707 Honeypots 712 Incident Handling 716 Summary 727 Chapter 24: Digital Forensics 729 Computer Forensics Defined 730 Traditional Computer Forensics 730 Proactive Forensics 746 Future Research Areas 748 The Forensic Life Cycle 750 Summary 750 Chapter 25: Security Assessments, Testing, and Evaluation 751 Information Assurance Approaches and Methodologies 751 Certification and Accreditation 756 Diacap 760 Federal Information Processing Standard 102 763 OMB Circular A-130 764 The National Institute of Standards and Technology Assessment Guidelines 765 Penetration Testing 770 Auditing and Monitoring 772 Summary 774 Part VII: Integrated Cyber Security Chapter 26: Validating Your Security 777 Overview 777 Current State of Penetration Testing 780 Formal Penetration Testing Methodology 783 Steps to Exploiting a System 787 Summary 795 Chapter 27: Data Protection 797 Endpoint Security 799 Insider Threats and Data Protection 805 Summary 806 Chapter 28: Putting Everything Together 809 Critical Problems Facing Organizations 809 General Tips for Protecting a Site 815 Security Best Practices 819 Summary 834 Chapter 29: The Future 835 Approaching the Problem 835 Mission Resilience 837 Limiting Failure Points 844 Summary 847 Index 849

    15 in stock

    £38.00

  • eDiscovery for Dummies

    John Wiley & Sons Inc eDiscovery for Dummies

    15 in stock

    Book SynopsisDiscover the process of e-discovery and put good practices in place. Electronic information involved in a lawsuit requires a completely different process for management and archiving than paper information.Table of ContentsIntroduction 1 Who Should Read This Book? 1 About This Book 2 What You’re Not to Read 2 Foolish Assumptions 2 How This Book Is Organized 3 Part I: Examining e-Discovery and ESI Essentials 3 Part II: Guidelines for e-Discovery and Professional Competence 3 Part III: Identifying, Preserving, and Collecting ESI 4 Part IV: Processing, Protecting, and Producing ESI 4 Part V: Getting Litigation Ready 4 Part VI: Strategizing for e-Discovery Success 5 Part VII: The Part of Tens 5 Glossary 5 Icons Used in This Book 5 Where to Go from Here 6 Part I: Examining e-Discovery and ESI Essentials 7 Chapter 1: Knowing Why e-Discovery Is a Burning Issue 9 Getting Thrust into the Biggest Change in the Litigation 10 New rules put electronic documents under a microscope 11 New rules and case law expand professional responsibilities 12 Distinguishing Electronic Documents from Paper Documents 14 ESI has more volume 15 ESI is more complex 15 ESI is more fragile 16 ESI is harder to delete 17 ESI is more software and hardware dependent 18 Viewing the Litigation Process from 1,000 Feet 18 Examining e-Discovery Processes 20 Creating and retaining electronic records 20 Identifying, preserving, and collecting data relevant to a legal matter 21 Processing and filtering to remove the excess 22 Reviewing and analyzing for privilege 22 Producing what’s required 23 Clawing back what sneaked out 23 Presenting at trial 24 Chapter 2: Taking a Close Look at Electronically Stored Information (ESI) 25 Spotting the ESI in the Game Plan 26 Viewing the Life of Electronic Information 27 Accounting for age 27 Tracking the rise and fall of an e-mail 29 Understanding Zubulake I 30 Taking the two-tier test 34 Preserving the Digital Landscape 36 Facing Sticker Shock: What ESI Costs 37 Estimating hard and hidden costs 39 Looking at the costs of being surprised by a request 40 Chapter 3: Building e-Discovery Best Practices into Your Company 43 Setting Up a Reasonable Defensive Strategy 44 Heeding judicial advice 45 Keeping ESI intact and in-reach 46 Braking for Litigation Holds 48 Insuring a stronghold 48 Getting others to buy-in 49 Holding on tight to your ESI 50 Putting Best Practices into Place 51 Forming Response Teams 54 Putting Project Management into Practice 55 Tackling the triple constraints 56 Managing the critical path 57 Maintaining Ethical Conduct and Credibility 57 Part II: Guidelines for e-Discovery and Professional Competence 59 Chapter 4: The Playbook: Federal Rules and Advisory Guidelines 61 Knowing the Rules You Must Play By 62 Deciphering the FRCP 63 FRCP 1 63 FRCP 16 63 FRCP 26 65 FRCP 33 and 34 66 Applying the Rules to Criminal Cases 66 F.R. Crim. P. Rule 41 71 F. R. Crim. P. Rule 16 71 F. R. Crim. P. Rule 17 and 17.1 71 Learning about Admissibility 71 Lessening the Need for Judicial Intervention by Cooperation 73 Limiting e-Discovery 74 Finding Out About Sanctions 75 Rulings on Metadata 77 Getting Guidance but Not Authority from Sedona Think Tanks 79 Collecting the Wisdom of the Chief Justices and National Law Conference 79 Minding the e-Discovery Reference Model 80 Following the Federal Rules Advisory Committee 81 Chapter 5: Judging Professional Competence and Conduct 83 Making Sure Your Attorney Gives a Diligent Effort 84 Looking at what constitutes a diligent effort 84 Searching for evidence 85 Producing ESI 86 Providing a certification 86 Avoiding Being Sanctioned 87 FRCP sanctions 87 Inherent power sanctions 89 Knowing the Risks Introduced by Legal Counsel 91 Acting bad: Attorney e-discovery misconduct 91 Relying on the American Bar Association and state rules of professional conduct 93 Learning from Those Who Gambled Their Cases and Lost 94 Policing e-Discovery in Criminal Cases 96 Part III: Identifying, Preserving, and Collecting ESI 99 Chapter 6: Identifying Potentially Relevant ESI 101 Calling an e-Discovery Team into Action 102 Clarifying the Scope of e-Discovery 104 Reducing the Burden with the Proportionality Principle 107 Proportionality of scale 107 Negotiating with proportionality 108 Mapping the Information Architecture 108 Creating a data map 108 Overlooking ESI 111 Describing data retention policies and procedures 112 Proving the reasonable accessibility of ESI sources 113 Taking Lessons from the Mythical Member 113 Chapter 7: Complying with ESI Preservation and a Litigation Hold 115 Distinguishing Duty to Preserve from Preservation 116 Following The Sedona Conference 116 The Sedona Conference WG1 guidelines 117 Seeing the rules in the WG1 decision tree 119 Recognizing a Litigation Hold Order and Obligation 119 Knowing what triggers a litigation hold 120 Knowing when to issue a litigation hold 120 Knowing when a hold delay makes you eligible for sanctions 122 Accounting for downsizing and departing employees 122 Throwing a Wrench into Digital Recycling 123 Suspending destructive processes 123 Where do you put a terabyte? 124 Implementing the Litigation Hold 125 Documenting that custodians are in compliance 127 Rounding up what needs to be collected 127 Judging whether a forensics-level preservation is needed 130 Chapter 8: Managing e-Discovery Conferences and Protocols 133 Complying with the Meet-and-Confer Session 133 Preparing for the Meet-and-Confer Session 136 Preservation of evidence 136 Form of production 137 Privileged or protected ESI 138 Any other issues regarding ESI 139 Agreeing on a Timetable 139 Selecting a Rule 30(b)(6) Witness 140 Finding Out You and the Opposing Party May Have Mutual Interests 141 Part IV: Processing, Protecting, and Producing ESI 143 Chapter 9: Processing, Filtering, and Reviewing ESI 145 Planning, Tagging, and Bagging 146 Taking a finely tuned approach 147 Finding exactly what you need 147 Stop and identify yourself 149 Two wrongs and a right 150 Learning through Trial and Error 151 Doing Early Case Assessment 152 Vetting vendors 153 Breaking Out the ESI 154 Crafting the Hunt 156 Deciding on filters 156 Keyword or phrase searching 157 Deduping 157 Concept searching 158 Heeding the Grimm roadmap 158 Sampling to Validate 159 Testing the validity of the search 159 Documenting sampling efforts 160 Doing the Review 161 Choosing a review platform 161 How to perform a review 163 Chapter 10: Protecting Privilege, Privacy, and Work Product 165 Facing the Rising Tide of Electronic Information 166 Respecting the Rules of the e-Discovery Game 166 Targeting relevant information 167 Seeing where relevance and privilege intersect 168 Managing e-discovery of confidential information 170 Listening to the Masters 172 Getting or Avoiding a Waiver 172 Asserting a claim 173 Preparing a privilege log 173 Responding to ESI disclosure 175 Applying FRE 502 to disclosure 175 Leveling the Playing Field through Agreement 177 Checking out the types of agreements 177 Shoring up your agreements by court order 178 Chapter 11: Producing and Releasing Responsive ESI 181 Producing Data Sets 182 Packing bytes 183 Staging production 184 Being alert to native production motions 185 Redacting prior to disclosure 187 Providing Detailed Documentation 190 Showing an Unbroken Chain of Custody 192 Keeping Metadata Intact 193 Part V: Getting Litigation Ready 199 Chapter 12: Dealing with Evidentiary Issues and Challenges 201 Looking at the Roles of the Judge and Jury 202 Qualifying an Expert 202 Getting Through the Five Hurdles of Admissibility 204 Admitting Relevant ESI 204 Authenticating ESI 205 Self-authenticating ESI 206 Following the chain of custody 206 Authenticating specific types of ESI 207 Analyzing the Hearsay Rule 208 Providing the Best Evidence 210 Probing the Value of the ESI 210 Chapter 13: Bringing In Special Forces: Computer Forensics 211 Powering Up Computer Forensics 212 Knowing when to hire an expert 212 Knowing what to expect from an expert 214 Judging an expert like judges do 214 Doing a Scientific Forensic Search 215 Testing, Sampling, and Refining Searches for ESI 216 Applying C-Forensics to e-Discovery 218 Following procedure 219 Preparing for an investigation 220 Acquiring and preserving the image 222 Authenticating with hash 223 Recovering deleted ESI 224 Analyzing to broaden or limit 225 Expressing in Boolean 226 Producing and documenting in detail 228 Reinforcing E-Discovery 229 Fighting against forensic fishing attempts 229 Fighting with forensics on your team 230 Defending In-Depth 231 Part VI: Strategizing for e-Discovery Success 233 Chapter 14: Managing and Archiving Business Records 235 Ratcheting Up IT’s Role in Prelitigation 236 Laying the cornerstone of ERM 236 Pitching your tent before the storm 237 Telling Documents and Business Records Apart 238 Designing a Defensible ERM Program 240 Designing by committee 240 Starting with the basics 240 Getting management on board with your ERM program 242 Crafting a risk-reducing policy 244 Punching up your e-mail policy 245 Building an ERM Program 246 Kicking the keep-it-all habit 248 Doing what you say you are 248 Getting an A+ in Compliance 249 Chapter 15: Viewing e-Discovery Law from the Bench 251 Examining Unsettled and Unsettling Issues 252 Applying a reasonableness standard 252 Forcing cooperation 253 Looking at what’s reasonably accessible 254 Determining who committed misconduct 254 Exploring the Role of the Judge 258 Actively participating 258 Scheduling conferences 259 Appointing experts 259 Determining the scope of costs 262 Chapter 16: e-Discovery for Large-Scale and Complex Litigation 263 Preparing for Complex Litigation 263 Ensuring quality control 265 Getting a project management process in place 266 Proving the merits of a case by using ESI 266 Educating the Court about Your ESI 267 Using summary judgment and other tools 268 Employing an identification system 268 Form of production 269 Creating document depositories 269 Avoiding Judicial Resolution 270 Determining the Scope of Accessibility 271 Doing a good-cause inquiry 272 Cost-shifting 273 Getting Help 274 Partnering with vendors or service providers 274 Selecting experts or consulting companies 274 Chapter 17: e-Discovery for Small Cases 277 Defining Small Cases that Can Benefit from e-Discovery 278 Theft of proprietary data and breaches of contract 278 Marital matters 278 Defamation and Internet defamation 279 Characterizing Small Matters 280 Keeping ESI out of evidence 280 Shared characteristics with large cases 281 Unique characteristics and dynamics 282 Proceeding in Small Cases 283 Curbing e-Discovery with Proportionality 286 Sleuthing Personal Correspondence and Files 286 Part VII: The Part of Tens 289 Chapter 18: Ten Most Important e-Discovery Rules 291 FRCP 26(b)(2)(B) Specific Limitations on ESI 291 FRCP 26(b)(5)(B) Protecting Trial-Preparation Materials and Clawback 292 FRCP 26(a)(1)(C) Time for Pretrial Disclosures; Objections 293 FRCP 26(f) Conference of the Parties; Planning for Discovery 294 FRCP 26(g) Signing Disclosures and Discovery Requests, Responses, and Objections 294 FRCP 30(b)(6) Designation of a Witness 295 FRCP 34(b) Form of Production 296 FRCP 37(e) Safe Harbor from Sanctions for Loss of ESI 297 Federal Rules of Evidence 502(b) Inadvertent Disclosure 298 Federal Rule of Evidence 901 Requirement of Authentication or Identification 298 Chapter 19: Ten Ways to Keep an Edge on Your e-Discovery Expertise 301 The Sedona Conference and Working Group Series 302 Discovery Resources 303 Law Technology News 303 Electronic Discovery Law 304 E-Discovery Team Blog 304 LexisNexis Applied Discovery Online Law Library 305 American Bar Association Journal 305 Legal Technology’s Electronic Data Discovery 306 Supreme Court of the United States 306 Cornell Law School Legal Information Institute and Wex 307 Chapter 20: Ten e-Discovery Cases with Really Good Lessons 309 Zubulake v. UBS Warburg, 2003–2005; Employment Discrimination 309 Qualcomm v. Broadcom, 2008; Patent Dispute 310 Victor Stanley, Inc. v. Creative Pipe, Inc., 2008; Copyright Infringement 311 Doe v. Norwalk Community College, 2007; the Safe Harbor of FRCP Rule 37(e) 312 United States v. O’keefe, 2008; Criminal Case Involving e-discovery 313 Lorraine v. Markel American Insurance Co., 2007; Insurance Dispute 314 Mancia v. Mayflower Textile Services Co., et al., 2008; the Duty of Cooperate and FRCP Rule 26(g) 315 Mikron Industries Inc. v. Hurd Windows & Doors Inc., 2008; Duty to Confer 316 Gross Construction Associates, Inc., v. American Mfrs. Mutual Ins Co., 2009; Keyword Searches 317 Gutman v. Klein, 2008; Termination Sanction and Spoliation 318 Glossary 321 Index 333

    15 in stock

    £19.19

  • Core and Metro Networks

    John Wiley & Sons Inc Core and Metro Networks

    10 in stock

    Book SynopsisWritten by leading practitioners from such cutting-edge companies as Alcatel, Siemens, Lucent, France Telecom, BT, and Telefonica, Core and Metro Networks provides a comprehensive overview of the status, the challenges, the architectures, and technological solutions for core and metropolitan networks aiming to support broadband services.Table of ContentsPreface 1 The Emerging Core and Metropolitan Networks Andrea Di Giglio, Angel Ferreiro and Marco Schiano 1.1 Introduction 1.2 General Characteristics of Transport Network 1.3 Future Networks Challenges 1.4 New Transport Networks Architectures 1.5 Transport Networks Economics Acronyms References 2 The Advances in Control and Management for Transport Networks Dominique Verchere and Bela Berde 2.1 Drivers Towards More Uniform Management and Control Networks 2.2 Control Plane as Main Enabler to Autonomic Network Integration 2.3 Multilayer Interactions and Network Models 2.4 Evolution of Connection Services and Special Cases of Optical Networks 2.5 Conclusion References 3 Elements from Telecommunications Engineering Chris Matrakidis, John Mitchell and Benn Thomsen 3.1 Digital Optical Communication Systems 3.2 Performance Estimation References 4 Enabling Technologies Stefano Santoni, Roberto Cigliutti, Massimo Giltrelli, Pasquale Donadio, Chris Matrakidis, Andrea Paparella, Tanya Politi, Marcello Potenza, Erwan Pincemin and Alexandros Stavdas 4.1 Introduction 4.2 Transmitters 4.3 Receiver 4.4 The Optical Fiber 4.5 Optical Amplifiers 4.6 Optical Filters and Multiplexers References 5 Assessing Physical Layer Degradations Andrew Lord, Marcello Potenza, Marco Forzati and Erwan Pincemin 5.1 Introduction and Scope 5.2 Optical Power Budgets, Part I 5.3 System Bandwidth 5.4 Comments on Budgets for Nonlinear Effects and Optical Transients 5.5 Semianalytical Models for Penalties 5.6 Translucent or Hybrid Networks 5.7 Appendix References 6 Combating Physical Layer Degradations Herbert Haunstein, Harald Rohde, Marco Forzati, Erwan Pincemin, Jonas Martensson, Anders Djupsj€obacka and Tanya Politi 6.1 Introduction 6.2 Dispersion-Compensating Components and Methods for CD and PMD 6.3 Modulation Formats 6.4 Electronic Equalization of Optical Transmission Impairments 6.5 FEC in Lightwave Systems 6.6 Appendix: Experimental Configuration and Measurement Procedure for Evaluation and Comparison for Different Modulation Formats for 40 Gbit/s Transmission Acknowledgments References Dictionary of Optical Networking Didier Colle, Chris Matrakidis and Josep Sol_e-Pareta Acronyms Index

    10 in stock

    £110.15

  • SIP Security

    John Wiley & Sons Inc SIP Security

    1 in stock

    Book SynopsisInternet Telephony is one of the most important and fastest growing technologies for emerging mobile networks, as it provides a viable technical and economical alternative to current telecommunication networks. SIP is a standard protocol that has become the de-facto standard for VoIP and multimedia services.Table of ContentsForeword. About the Authors. Acknowledgment. 1 Introduction. 2 Introduction to Cryptographic Mechanisms. 2.1 Cryptographic Algorithms. 2.2 Secure Channel Establishment. 2.3 Authentication in 3GPP Networks. 2.4 Security Mechanisms Threats and Vulnerabilities. 3 Introduction to SIP. 3.1 What is SIP, Why Should we Bother About it and What are Competing Technologies? 3.2 SIP: the Common Scenarios. 3.3 Introduction to SIP Operation: the SIP Trapezoid. 3.4 SIP Components. 3.5 Addressing in SIP. 3.6 SIP Message Elements. 3.7 SIP Dialogs and Transactions. 3.8 SIP Request Routing. 3.9 Authentication, Authorization, Accounting. 3.10 SIP and Middleboxes. 3.11 Other Parts of the SIP Eco-system. 3.12 SIP Protocol Design and Lessons Learned. 4 Introduction to IMS. 4.1 SIP in IMS. 4.2 General Architecture. 4.3 Session Control and Establishment in IMS. 5 Secure Access and Interworking in IMS. 5.1 Access Security in IMS. 5.2 Network Security in IMS. 6 User Identity in SIP. 6.1 Identity Theft. 6.2 Identity Authentication using S/MIME. 6.3 Identity Authentication in Trusted Environments. 6.4 Strong Authenticated Identity. 6.5 Identity Theft Despite Strong Identity. 6.6 User Privacy and Anonymity. 6.7 Subscription Theft. 6.8 Fraud and SIP. 7 Media Security. 7.1 The Real-time Transport Protocol. 7.2 Secure RTP. 7.3 Key Exchange. 8 Denial-of-service Attacks on VoIP and IMS Services. 8.1 Introduction. 8.2 General Classification of Denial-of-service Attacks. 8.3 Bandwidth Consumption and Denial-of-service Attacks on SIP Services. 8.4 Bandwidth Depletion Attacks. 8.5 Memory Depletion Attacks. 8.6 CPU Depletion Attacks. 8.7 Misuse Attacks. 8.8 Distributed Denial-of-service Attacks. 8.9 Unintentional Attacks. 8.10 Address Resolution-related Attacks. 8.11 Attacking the VoIP Subscriber Database. 8.12 Denial-of-service Attacks in IMS Networks. 8.13 DoS Detection and Protection Mechanisms. 8.14 Detection of DoS Attacks. 8.15 Reacting to DoS Attacks. 8.16 Preventing DoS Attacks. 8.17 DDoS Signature Specification. 9 SPAM over IP Telephony. 9.1 Introduction. 9.2 Spam Over SIP: Types and Applicability. 9.3 Why is SIP Good for Spam? 9.4 Legal Side of Unsolicited Communication. 9.5 Fighting Unsolicited Communication. 9.6 General Antispam Framework. Bibliography. Index.

    1 in stock

    £80.96

  • Digital Forensics

    John Wiley and Sons Ltd Digital Forensics

    10 in stock

    Book SynopsisThe vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements traditional scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidentTrade Review?This book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations.? (Reviews, May 2009)Table of ContentsPreface. Acknowledgments. 1. Introduction. 1.1 Key developments. 1.2 Digital Devices in Society. 1.3 Technology and Culture. 1.4 Comment. 2. Evidential Potential of Digital Devices. 2.1 Closed vs. Open Systems. 2.2 Evaluating Digital Evidence Potential. 3. Device Handling. 3.1 Seizure Issues. 3.2 Device Identification. 3.3 Networked Devices. 3.4 Contamination. 4. Examination Principles. 4.1 Previewing. 4.2 Imaging. 4.3 Continuity and Hashing. 4.4 Evidence locations. 5. Evidence Creation. 5.1 A 7-element security model. 5.2 A developmental model of digital systems. 5.3 Knowing. 5.4 Unknowing. 5.5 Audit and Logs. 6. Evidence Interpretation. 6.1 Data Content. 6.2 Data Context. 7. Internet Activity. 7.1 A little bit of history. 7.2 The ISO/OSI model. 7.3 The Internet Protocol Suite. 7.4 DNS. 7.5 Internet Applications. 8. Mobile Devices. 8.1 Mobile Phones & PDAs. 8.2 GPS. 8.3 Other Personal Technology. 9. Intelligence. 9.1 Device usage. 9.2 Profiling and Cyberprofiling. 9.3 Evaluating Online Crime: Automating the Model. 9.4 Application of the formula to Case Studies. 9.5 From success estimates to profiling. 9.6 Comments. 10. Case Studies and Examples. 10.1 Introduction. 10.2 Copyright Violation. 10.3 Missing person and Murder. 10.4 The view of a defence witness. A The "Aircraft Carrier" PC. B Additional Resources. C SIM card data report. Index.

    10 in stock

    £158.14

  • Digital Forensics

    John Wiley and Sons Ltd Digital Forensics

    15 in stock

    Book SynopsisThe vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements traditional scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidentTrade Review?This book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations.? (Reviews, May 2009)Table of ContentsPreface vii Acknowledgments xi List of Tables xii List of Figures xiii 1 Introduction 1 1.1 Key developments 1 1.2 Digital devices in society 5 1.3 Technology and culture 6 1.4 Comment 7 2 Evidential Potential of Digital Devices 9 2.1 Closed vs. open systems 10 2.2 Evaluating digital evidence potential 17 3 Device Handling 19 3.1 Seizure issues 21 3.2 Device identification 31 3.3 Networked devices 36 3.4 Contamination 40 4 Examination Principles 43 4.1 Previewing 43 4.2 Imaging 47 4.3 Continuity and hashing 48 4.4 Evidence locations 49 5 Evidence Creation 55 5.1 A seven-element security model 56 5.2 A developmental model of digital systems 60 5.3 Knowing 61 5.4 Unknowing 63 5.5 Audit and logs 68 6 Evidence Interpretation 69 6.1 Data content 69 6.2 Data context 83 7 Internet Activity 85 7.1 A little bit of history 85 7.2 The ISO/OSI model 86 7.3 The internet protocol suite 90 7.4 DNS 94 7.5 Internet applications 96 8 Mobile Devices 109 8.1 Mobile phones and PDAs 109 8.2 GPS 116 8.3 Other personal technology 118 9 Intelligence 119 9.1 Device usage 119 9.2 Profiling and cyberprofiling 121 9.3 Evaluating online crime: automating the model 124 9.4 Application of the formula to case studies 126 9.5 From success estimates to profiling 129 9.6 Comments 129 10 Case Studies and Examples 131 10.1 Introduction 131 10.2 Copyright violation 131 10.3 Missing person and murder 133 10.4 The view of a defence witness 137 Appendix A The “Aircraft Carrier” PC 141 Appendix B Additional Resources 145 B.1 Hard disc and storage laboratory tools 145 B.2 Mobile phone/PDA tools 146 B.3 Live CDs 146 B.4 Recommended reading 146 Appendix C SIM Card Data Report 149 References 157 Index 161

    15 in stock

    £45.86

  • Home Networking DoItYourself for Dummies

    John Wiley & Sons Inc Home Networking DoItYourself for Dummies

    Out of stock

    Book SynopsisStep by step guide to connecting all your electronic devices into one network A home network allows you to share Internet connections, photos, video, music, game consoles, printers, and other electronic gadgets. This do-it-yourself guide shows you step by step how to create a wired or wireless network in your home.Table of ContentsIntroduction. Part I: Doing Your Homework. Chapter 1: Why Do You Need A Home Network? Chapter 2: Understanding Networking Basics. Part II: Installing Your Home Network. Chapter 3: Getting Wired. Chapter 4: Going Wireless. Part III: Setting Up Your Windows 7 Network. Chapter 5: Understanding User Accounts. Chapter 6: Setting Up a HomeGroup. Chapter 7: Sharing With Others. Chapter 8: Connecting to the Internet. Chapter 9: Connecting Remotely. Chapter 10: Having Fun with Your Home Network. Part IV: Keeping Your Network Safe and Healthy. Chapter 11: Inside the Action Center. Chapter 12: Windows Firewall and Windows Defender. Chapter 13: Windows Update. Chapter 14: Backup and Restore. Chapter 15: Building a SOHO Network. Part V: The Part of Tens. Chapter 16: Ten Great Windows 7 Resources. Chapter 17: Ten Reasons You Might Not Be Able to Join a HomeGroup. Chapter 18: Ten Network Troubleshooting Tools. Index.

    Out of stock

    £15.29

  • Malware Analysts Cookbook and DVD

    John Wiley & Sons Inc Malware Analysts Cookbook and DVD

    10 in stock

    Book SynopsisA computer forensics how-to for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C,

    10 in stock

    £45.12

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account