Computer networking and communications Books

704 products


  • Ebusiness Essentials

    Wiley Ebusiness Essentials

    Out of stock

    Book SynopsisThis 2nd edition explores the increasingly important area of mobile data access. In addition, it shows how eBusiness is evolving and how technology can be progressively used to build more sophisticated solutions.Trade Reviewthis is required reading from anyone who tries to keep up with all the developments in this fast moving world." (Teleworker, March 2001) "...an excellent undergraduate textbook for introductory courses in electronic commerce...the authors deftly juggle in providing technical knowledge to both professional and general audience...I have to applaud their success in maintaining a balance..." (Telematics and Informatics, Vol.19, 2002)Table of ContentsDedication ix Preface xi About the Authors xiv Acknowledgements xv 1 Electronic Trade 1 2 The Electronic Marketplace 17 3 The Electronic Shop 39 4 Payments, Credit and Invoicing 57 5 Trust and Security 97 6 Integration 115 7 Supply Chain 137 8 Setting Up Shop 163 9 Putting the ‘e’ into your business 177 10 Underlying Technologies and Standards 195 11 mBusiness 255 12 Who is going to Make Money out of All of this and How? 277 Appendix 1 Case Studies 289 Appendix 2 The Gods of Technology 295 Appendix 3 Glossary 309 Bibliography 331 Index 333

    Out of stock

    £95.36

  • Computer Networking

    John Wiley & Sons Inc Computer Networking

    10 in stock

    Book SynopsisThis revolutionary text and its accompanying CD replace a whole lab full of computer equipment. They give computer science students realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network. Using the latest version of the open source program Ethereal, the reader opens packet trace files from the CD and follows the text to perform the exercises, gaining a thorough understanding of the material in the best way possibleby seeing it in action. This approach also benefits the instructor, who is spared the time-consuming tasks of maintaining a laboratory and taking traces. It can even relieve the anxiety system administrators have about students collecting traces on campus networks!Table of ContentsPreface iii Acknowledgments viii Section 1: Getting Started 1 Introduction 1 Exercise 1.1 Examining a Quiet Network 2 Introduction 2 Configuration 3 Experiment 3 Using the Capture Options Dialog 6 Examining a Short Trace 9 List, Protocol, and Raw Panes 10 Trace Summary Statistics 12 Questions 14 Discussion and Investigation 14 Resources 15 Exercise 1.2 Protocol Layering 16 Introduction 16 Configuration 19 Experiment 19 Protocol Hierarchy Statistics 20 TCP Connection 20 Frame Layer 22 Ethernet Layer 23 Internet Protocol Layer 25 Transport Control Protocol 26 Packet Overview 27 UDP Packets 27 Questions 27 Discussion and Investigation 28 Resources 29 Exercise 1.3 Examining a Busy Network Using Filters 30 Introduction 30 Configuration 31 Experiment 32 Capture Filters 32 Color Filters 34 Display Filters 38 Searching for Packets 39 Questions 39 Discussion and Investigation 40 Resources 40 Section 2: Application Layer Protocols 42 Introduction 42 Exercise 2.1 Under the Hood of HTTP 44 Introduction 44 Configuration 46 Experiment 47 HTTP Get Request 48 HTTP Response 50 Multiple GET Requests per URL 50 Plain Text Data 51 Multiple TCP Streams 54 Questions 54 Discussion and Investigation 55 Resources 56 Exercise 2.2 HTTP Caching,Authorization and Cookies 57 Introduction 57 Configuration 57 Experiment 58 Cookies 58 Authorization Headers 59 Caching Headers 61 Questions 63 Discussion and Investigation 64 Resources 64 Exercise 2.3 FTP – File Transfer Protocol 65 Introduction 65 Configuration 66 Experiment 67 Control Channel 67 Data Channels 71 Questions 73 Discussion and Investigation 74 Resources 75 Exercise 2.4 Sending and Receiving Email with SMTP and POP 76 Introduction 76 Configuration 77 Experiment 78 Outgoing Mail 78 Incoming Mail 81 E-mail Headers 82 No Mail 84 Questions 85 Discussion and Investigation 86 Resources 86 Section 3: Transport Layer Protocols 88 Introduction 88 Exercise 3.1 Introduction to TCP 90 Introduction 90 Configuration 92 Experiment 93 Local TTCP Connection 93 Connection Establishment 94 One-way Data Flow 96 Closing a Connection 97 Connection Statistics 97 Remote SSH Connection 98 Questions 99 Discussion and Investigation 99 Resources 101 Exercise 3.2 Retransmission in TCP 102 Introduction 102 Configuration 103 Experiment 104 Local TTCP Connection 104 SACK Option Negotiated 105 Missing Packets and Retransmission 107 Impact on Sending Rate 109 Remote TTCP Connection 111 Questions 112 Discussion and Investigation 113 Resources 114 Exercise 3.3 Comparing TCP to UDP 115 Introduction 115 Configuration 117 Experiment 117 Using TTCP To Generate TCP and UDP Traffic 118 Normal Data Transfer In TCP 119 Normal Data Transfer In UDP 120 No Receiver Present for TCP and UDP 122 Questions 123 Discussion and Investigation 124 Resources 125 Exercise 3.4 Competing TCP and UDP Streams 126 Introduction 126 Configuration 127 Experiment 128 Two Competing TCP Streams 128 UDP Competing with TCP 132 Two Competing UDP Streams 133 Questions 135 Discussion and Investigation 136 Resources 136 Section 4: Network Layer Protocols 137 Introduction 137 Exercise 4.1 Joining the Internet: Introduction to IP and DHCP 139 Introduction 139 Configuration 142 Experiment 143 Obtaining an IP Address Via DHCP 143 Fragmentation in IPv4 146 Ping Over IPv6 149 Questions 151 Discussion and Investigation 151 Resources 152 Exercise 4.2 Ping and Traceroute 153 Introduction 153 Configuration 156 Experiment 157 Local and Remote Pings 157 Local Traceroute 159 Remote Traceroute 162 Questions 163 Discussion and Investigation 164 Resources 164 Exercise 4.3 Dynamic Routing with RIP 166 Introduction 166 Configuration 168 Experiment 170 No RIP Enabled 170 RIP Enabled on the Endpoints 170 RIP Enabled on All Machines But One 171 RIP Enabled End-to-End 175 Adding a Loop in the Network Graph 177 Adjusting to a Failed Link 178 Open Shortest Path First 178 Questions 180 Discussion and Investigation 181 Resources 181 Exercise 4.4 Border Gateway Protocol 182 Introduction 182 Configuration 184 Experiment 186 Establishing BGP Peering Sessions 186 Withdrawing a Route 188 Repairing a Connection 191 Questions 193 Discussion and Investigation 193 Resources 194 Section 5: Link Layer Protocols 195 Introduction 195 Exercise 5.1 MAC Addresses and the Address Resolution Protocol 197 Introduction 197 Configuration 200 Experiment 201 Address Resolution Protocol 201 MAC Address Spoofing 203 Questions 207 Discussion and Investigation 208 Resources 208 Exercise 5.2 Ethernet 209 Introduction 209 Configuration 213 Experiment 214 Ethernet Switch 214 Ethernet Hub 216 Questions 217 Discussion and Investigation 219 Resources 219 Exercise 5.3 Wireless LANs 220 Introduction 220 Configuration 226 Experiment 227 Beacon Frames 227 WEP Disabled 229 Contents xi Data Frames 231 WEP Enabled 232 Questions 233 Discussion and Investigation 234 Resources 234 Section 6: Security 235 Introduction 235 Exercise 6.1 Encryption 236 Introduction 236 Configuration 238 Experiment 239 Plain Text Telnet Session 239 Encrypted SSH Session 240 Attacks Against SSH 242 Comparing HTTP and HTTPS 243 Questions 246 Discussion and Investigation 247 Resources 248 Exercise 6.2 IP Spoofing and TCP Session Stealing 249 Introduction 249 Configuration 250 Experiment 251 TCP Session Hijacking 252 TCP Session Termination 256 Questions 257 Discussion and Investigation 257 Resources 258 Exercise 6.3 System Vulnerabilities 259 Introduction 259 Configuration 261 Experiment 262 Port Scans 262 Blaster Worm 265 Questions 267 Discussion and Investigation 268 Resources 268 Index 269

    10 in stock

    £75.95

  • Process Aware Information Systems Bridging People

    John Wiley & Sons Inc Process Aware Information Systems Bridging People

    Out of stock

    Book SynopsisIn the last 10 years, there has been an explosion in the number of technologies, standards, and tools to provide process support. The book provides a unified and comprehensive overview of the principles, techniques and technologies underlying the emerging discipline of process aware information systems engineering.Trade Review"…well-written and edited, and includes a brief appendix and a word index, both useful aids." (Computing Reviews.com, January 9, 2007) "…a comprehensive overview of the technical aspects of building PAIS…it is a recommended starting resource." (Computing Reviews.com, May 17, 2006)Table of ContentsPreface. Contributors. PART I Concepts. 1 Introduction (Marlon Dumas, Wil van der Aalst, and Arthur H. M. ter Hofstede). 1.1 From Programs and Data to Processes. 1.2 PAIS: Definition and Rationale. 1.3 Techniques and Tools. 1.4 Classifications. 1.5 About the Book. References. 2 Person-to-Application Processes: Workflow Management (Andreas Oberweis). 2.1 Introduction. 2.2 Workflow Terminology. 2.3 Workflow Modeling. 2.4 Workflow Management Systems. 2.5 Outlook. 2.6 Exercises. References. 3 Person-to-Person Processes: Computer-Supported Collaborative Work (Clarence A. Ellis, Paulo Barthelmess, Jun Chen, and Jacques Wainer). 3.1 Introduction. 3.2 Characterization of Person-to-Person Interactions. 3.3 Characterization of Person-to-Person Systems. 3.4 Example Systems. 3.5 Summary and Conclusions. 3.6 Exercises. References. 4 Enterprise Application Integration and Business-to-Business Integration Processes (Christoph Bussler). 4.1 Introduction. 4.2 Examples of EAI and B2B Processes. 4.3 Concepts, Architectures, and Tools. 4.4 Future Developments. 4.5 Exercises. References. PART II Modeling Languages. 5 Process Modeling Using UML (Gregor Engels, Alexander Förster, Reiko Heckel, and Sebastian Thöne). 5.1 Introduction. 5.2 Modeling Control Flow with Activity Diagrams. 5.3 Modeling Objects and Object Flow. 5.4 Modeling Organizational Structure. 5.5 Modeling Business Partner Interactions. 5.6 System-Specific Process Models. 5.7 Summary. 5.8 Exercises. References. 6 Process Modeling Using Event-Driven Process Chains (August-Wilhelm Scheer, Oliver Thomas, and Otmar Adam). 6.1 Introduction. 6.2 Overview of EPC. 6.3 The ARIS Business Process Meta-Model. 6.4 How to Correctly Model EPCs. 6.5 The ARIS Architecture. 6.6 Future Extensions. 6.7 Exercises. References. 7 Process Modeling Using Petri Nets (Jörg Desel). 7.1 Introduction. 7.2 Petri Nets. 7.3 Petri Net Classes and Behavior. 7.4 Modeling Single Processes Without Resources. 7.5 Modeling Processes with Resources. 7.6 Behavior and Refinement. 7.7 Analysis. 7.8 Net Classes. Exercises. References. 8 Patterns of Process Modeling (Wil van der Aalst, Arthur H. M. ter Hofstede, and Marlon Dumas). 8.1 Introduction. 8.2 Classification of Patterns. 8.3 Examples of Control-Flow Patterns. 8.4 Conclusion. 8.5 Exercises. Acknowledgments. References. PART III Techniques. 9 Process Design and Redesign (Hajo A. Reijers). 9.1 Introduction. 9.2 Methodologies, Techniques, and Tools. 9.3 Business Process Performance Indicators. 9.4 Redesigning Processes Using Best Practices. 9.5 Information-Based Business Process Design. 9.6 Conclusion. 9.7 Exercises. References. 10 Process Mining (Wil van der Aalst and A.J.M.M. (Ton) Weijters). 10.1 Introduction. 10.2 Process Mining: An Overview. 10.3 Process Mining with the Algorithm. 10.4 Limitations of the Alpha Approach and Possible Solutions. 10.5 Conclusion. 10.6 Exercises. Acknowledgments. References. 11 Transactional Business Processes (Gustavo Alonso). 11.1 Introduction. 11.2 Transactional Consistency. 11.3 Atomicity. 11.4 Infrastructure for Implementing Atomicity. 11.5 Outlook. 11.6 Exercises and Assignments. Acknowledgments. References. PART IV Standards and Tools. 12 Standards for Workflow Definition and Execution (Jan Mendling, Michael zur Muehlen, and Adrian Price). 12.1 Introduction. 12.2 Standardization Bodies Relevant to PAIS. 12.3 WfMC Reference Model and WfMC Glossary. 12.4 Process Definition in XPDL. 12.5 Process Invocation Using WF-XML. 12.6 Trends. 12.7 Exercises. References. 13 The Business Process Execution Language for Web Services (Rania Khalaf, Nirmal Mukhi, Francisco Curbera, and Sanjiva Weerawarana). 13.1 Introduction to Web Services. 13.2 BPEL4WS. 13.3 Summary. 13.4 Exercises. References. 14 Workflow Management in Staffware (Charles Brown). 14.1 Introduction. 14.2 Architecture. 14.3 Integration Tools. 14.4 Methodology. 14.5 Resourcing. 14.6 Conclusion. 14.7 Exercises. References. 15 The FLOWer Case-Handling Approach: Beyond Workflow Management (Paul Berens). 15.1 Outline. 15.2 Overview of Case Handling and FLOWer. 15.3 Conceptual Integrity of FLOWer. 15.4 Golden Rules of Process Management. 15.5 Conclusion. Acknkowledgment. References. Appendix: Readings and Resources. Index.

    Out of stock

    £130.45

  • Managing Projects in Telecommunication Services

    John Wiley & Sons Inc Managing Projects in Telecommunication Services

    Out of stock

    Book SynopsisEffective project management tailored to the needs of the telecommunications industry In our rapidly changing world, the information and communication technologies and services have an immense impact on virtually all aspects of our lives...Table of ContentsForeword xiii Preface xv 1 Projects in Telecommunication Services 1 Introduction 1 Project Management Versus Product Management 1 Virtual Network Operators 3 Contribution of Project Management 4 The Two Facets of Telecommunication Services 5 Categories of Projects in Telecommunication Services 6 Upgrades of Public Networks 7 Establishment of Specialized Business Networks 8 Temporary Networks 10 Characteristics of Telecommunication Service Projects 11 Complex Interfaces 11 External Interfaces 11 Internal Interfaces 12 International Orientation 15 Multidisciplinarity 15 No Mass Production 16 Diverse Users 16 A Relatively Long Planning Stage 17 Summary of Distinctions Between the Development of 17 Telecommunication Services and Equipment Summary 17 2 Standards and Innovation in Telecommunication Services 19 The Two Dimensions of Telecommunication Projects 19 The Technological Dimension 19 The Marketing and Social Dimension 22 Classification of Innovations 23 Innovations and the Technology Life Cycle 25 Innovation in Telecommunication Services 26 Incremental Innovation 27 Architectural Innovation 28 Platform Innovation 30 Radical Innovation 30 Interaction of Innovations in Equipment and Services 30 Phasic Relation Between Equipment and Services 31 Standardization for Telecommunication Services 34 Timing of Standards 35 Marketing Perspective 35 Technological View of Standards 35 Anticipatory Standards 36 Enabling (Participatory) Standards 37 Responsive Standards 38 Lack of Standards 38 Standards Policy and Knowledge Management 39 Summary 40 3 The Project Management Context 43 Organization of the Project Team 43 Functional Organization 44 Examples 45 Advantages 47 Disadvantages 47 Matrix Organization 47 Examples 48 Advantages 50 Disadvantages 50 Projectized Organization 50 Examples 51 Advantages 51 Disadvantages 51 Comparison of Project Organizations 52 Project Organization and Innovation Type 52 Incremental Innovation 52 Architectural Innovation 53 Platform Innovation 54 Radical Innovation 54 The Role of the Project Sponsor 54 Phase Management and Portfolio Management 56 The Rolling Wave Method for Service Development 56 Phase 1: Concept Definition 57 Phase 2: Initiation and Preliminary Planning Phase 58 Phase 3: Implementation 58 Phase 4: Controlled Introduction 58 Phase 5: General Availability and Close-Out 59 Canceling Projects 59 Relation to the Build–Operate–Transfer Model 59 Summary 60 4 Scope Management 61 Scope Initiation 62 Scope Planning 62 Market Service Description (MSD) 62 Scope Definition 63 Work Breakdown Structure 63 Technical Plan 64 The Need for Scope Management 66 Salt Lake City Winter Olympics 66 E-Zpass Toll Collection System 66 Background 66 Gaps in the Definition ITS Scope 67 Scope Creep in New Jersey 68 Sources of Scope Change 68 Customer Profile 69 Vendor’s Effect 69 Basic Principles of Scope Management 69 Change Control Policy 71 Strictness of the Change Control Policy 71 Change Control Board 72 Scope Verification 72 Tracking and Issue Management 72 Project Termination 73 Case Studies 74 Telecommunications Alliances/Joint Ventures 74 Net 1000 76 Background 77 Timeline and Organization Evolution 78 Postmortem Analysis 80 Lessons Learned 84 Lessons Not Learned 84 Summary 85 5 Time and Cost Management 87 Scheduling 87 Delays in Telecommunication Projects 88 Compressing the Schedule 89 Cost Management 90 Project Tracking with Earned Value Analysis 91 Metrics for the Earned Value 92 Discrete Effort Method 92 Apportioned Effort Method 93 Level of Effort Method 93 Budget Types 93 Monitoring Project Progress 93 Measures of Efficiency 94 Prerequisites for Earned Value Analysis 95 Earned Value Analysis in Telecommunication Projects 95 Summary 97 6 Information and Communication Management 99 The Role of Communication Management 99 Dissemination of Information 100 Team Cohesion 100 Historical Database 101 Communication and Outsourcing 101 The Communication Plan 102 Audience 102 Circumstances 103 Nature of Information 103 Content of the Plan 104 Communication Channels 104 One-on-One Communication 105 Meetings 105 Telephony and Teleconferences 107 E-Mail 107 Intranets and Project Portals 107 Evaluation of the Communication Processes 108 Measure of Communication Effectiveness 108 Signs of Communication Problems 108 Barriers to Successful Communications 109 Summary 109 7 Resources Management 111 Formation of the Project Team 111 Team Building 116 Team Building and the Hierarchy of Human Needs 116 Signs of a Jelled Team 117 Enablers of Team Cohesiveness 117 Impediments to Team Consolidation 118 No Self-Actualization 118 No Self-Esteem 118 No Belongingness 119 No Security 119 Team Breakup (Adjourning) 119 Project Leadership 119 Transactional Versus Transformational Leadership 120 Project Manager’s Authority 120 Manipulative Behavior 120 MBTI Classification of Leadership Styles 121 Time-Dependent Leadership 123 Matching Leadership Style with the Project Phase 123 Matching Leadership Style with Innovation Type 124 Matching Leadership with Technology Maturity 125 Conflict Resolution 126 Conflicts Due to Contractual Structures 126 Conflicts Due to Connectual Structures 127 Types of Diversity 127 Examples of Social Diversity 128 Examples of Informational Diversity 128 Examples of Value Diversity 129 Conflicts and Diversity 130 Effects of Conflict on Project Performance 130 Dealing with Conflicts 132 Problem Solving 132 Coercion 132 Compromise 132 Accommodation 132 Withdrawal or Avoidance 132 Summary 133 8 Quality Management 135 Overview 135 Quality and Innovation 136 Service Release Management 137 Quality Plan 138 Categorization of the Defects: Urgency and Criticality 139 Appraisal 141 Schedule Compression 144 Evaluation of Testing Progress 145 When to Stop Testing? 145 Vendor Management During the Testing Program 148 Summary 150 Appendix 151 Poisson Model 151 The Basic Model 152 The Jelinski–Moranda Model 152 Deployability 153 Learning Effect with the Yamada Model 154 9 Vendor Management 157 The Importance of Vendor Management 157 Vendor Management Versus Procurement Management 157 Acquisition Process 158 Evaluation of the Formal Solicitation Process 160 Vendor Selection 160 Contract Type 161 Vendor Types in Telecommunications Services 161 Vendor Evaluation 162 Additional Criteria for Equipment Vendors 164 Additional Criteria for Connectivity Vendors 164 Communications with Technology Vendors 165 Statement of Work 165 Vendor Tracking 166 Partnerships and Virtual Organizations 166 Metrics for Vendor Tracking During Acceptance Testing 168 Vendor’s Handoff 169 Metrics for Vendor Tracking for Problems in the Field 169 Risks in the Management of Technology Vendors 170 The Technology Life Cycle 170 Vendor Type 170 Risk of Supply Disruption 171 Congruence of the Plans for the Vendor and the Service Provider 171 Lack of Standards 172 Intellectual Property and Knowledge Management 172 Inadequate Field Support 173 Risk Mitigation in the Management of Technology Vendor 173 Connectivity Vendors 174 Types of Agreements Among Network Operators 174 Risks Management for Interconnectivity Vendors 174 Summary 175 10 Risk Management 177 Risk Identification 178 Risk Evaluation 178 Risk Mitigation 180 Risk Avoidance 180 Risk Reduction 180 Combined Risk Avoidance and Reduction 181 Risk Deflection 181 Risk Financing 182 Risks Identification Telecommunications Services 183 Project Characteristics 184 Complexity 184 Schedule 184 Novelty 185 Geography 185 Internal Organization 185 Technology 186 Supplier 187 Customer 187 Risk Mitigation in Telecommunications Services 187 Risks Due to Project Characteristics 187 Technological Risks 188 Supplier’s Risks 189 Customer’s Risks 189 Standardization and Risk 189 Innovation and Risk 191 Incremental Innovation 191 Architectural Innovation 192 Platform Innovation 193 Radical Innovation 193 Risk Mitigation and Organizational Culture 193 Risk Mitigation and the Project Manager’s Tolerance for Risk 194 Summary 194 11 Service Development 197 Opportunity Analysis and Concept Definition 197 Product Definition and Project Setup 198 Design and Procurement 199 Architecture Design 199 Supplier Management 200 Technical Definition of the Service 202 Site Selection 202 Service Operations Technical Plan (SOTP) 202 Support Processes 203 Operations, Administration and Maintenance (OA&M) 205 Disaster Recovery 207 Customer Network Management 209 Development 209 Equipment Handoff 210 System and Integration Testing 210 Network Operations Center (NOC) 211 Human Resources 211 Return Maintenance Authorization (RMA) 211 Customer Care 211 Service Turn-Up 212 Installing the Equipment 212 In-Field Tests 212 Pilot Trials 213 Controlled Introduction 214 Management of the Controlled Introduction 214 Marketing and Sales Plans for General Availability 215 Commissioning and Life-Cycle Management 217 Lessons Learned and Closeout 217 Quality-of-Service Metrics 217 Customer Care Performance 219 Network Performance 219 OA&M Quality 219 Business and Network Evolution 219 Summary 221 Appendix 221 12 Some Final Thoughts 223 Continuity and Change 223 Project Success or Service Success? 224 Competition and Government Policies 225 Standardization 227 Outsourcing 228 References 229 Index 239

    Out of stock

    £105.26

  • MDX Solutions

    John Wiley & Sons Inc MDX Solutions

    Out of stock

    Book SynopsisMDX Solutions is both a tutorial and a reference guide to the MDX query language. It shows data warehouse developers what they need to know to build effective multidimensional data warehouses. And it teaches users what they need to know to access and analyze data to make better business decisions.Table of ContentsAcknowledgments. Introduction. Chapter 1: A First Introduction to MDX. Chapter 2: Introduction to MDX Calculated Members and Named Sets. Chapter 3: Common Calculations and Selections in MDX. Chapter 4: MDX Query Context and Execution. Chapter 5: Named Sets and Set Aliases. Chapter 6: Sorting and Ranking in MDX. Chapter 7: Advanced MDX Application Topics. Chapter 8: Using the Attribute Data Model of Microsoft Analysis Services. Chapter 9: Using Attribute Dimensions and Member Properties in Hyperion Essbase. Chapter 10: Extending MDX through External Functions. Chapter 11: Changing the Cube and Dimension Environment through MDX. Chapter 12: The Many Ways to Calculate in Microsoft Analysis Services. Chapter 13: MDX Scripting in Analysis Services 2005. Chapter 14: Enriching the Client Interaction. Chapter 15: Client Programming Basics. Chapter 16: Optimizing MDX. Chapter 17: Working with Local Cubes. Appendix A: MDX Function and Operator Reference. Appendix B: Connection Parameters That Affect MDX. Appendix C: Intrinsic Cell and Member Properties. Appendix D: Format String Codes. Index.

    Out of stock

    £49.50

  • IT Security Interviews Exposed

    John Wiley & Sons Inc IT Security Interviews Exposed

    Out of stock

    Book Synopsis Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job and a security crash course to prepare for the job interview Security is one of today''s fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker''s toolkit, and documenting work The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008 Trade Review"The book is readable and written in a light, witty style". (Info Security, September 2007)Table of ContentsAcknowledgments. Introduction. Chapter 1: Finding, Interviewing for, and Getting the Job. Qualifications. Pursuing a Degree. The Perfect Job. Job Search. Interviewing. Money Talks. Accepting or Rejecting the Offer. Summary. Nontechnical Interview Questions. Chapter 2: Knowing Networks: Fundamentals. Introduction. Questions. Recommended Reading. Chapter 3: Knowing Security: Fundamentals. Adjust Your Thinking. Core Values. Basic Concepts. Managing Risk. Data Classification and Labeling. Ethics in Information Security. Daily Security Responsibilities. Summary. Interview Q&A. Recommended Reading. Chapter 4: Understanding Regulations, Legislation, and Guidance. Regulations, Legislation, and Guidance Defined. Why Does an Employer Care? Why Should You Care? Government- and DoD-Specific Information. Commercial Information Security. Using This Information in the Interview. Summary. Interview Q&A. Recommended Reading. Chapter 5: Knowing Firewalls: Fundamentals. Firewall Technologies. Major Vendors. Device Types. Management. Deployment Strategies. Summary. Interview Q&A. Recommended Reading. Chapter 6: Knowing Virtual Private Networks. Goals and Assumptions. The Cryptography of VPNs. IP Security Review. Implementing IPsec. Alternatives to IPsec. Summary. Interview Q&A. Recommended Reading. Chapter 7: Knowing IDS/IPS/IDP. Introduction. Questions. What Questions Do You Want to Ask Me? Recommended Reading. Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask. The Fundamentals. Wireless Cards and Chipsets. Wireless Drivers for Linux. WLAN Detection (WarDriving). Wireless Security. Rogue Wireless Devices. Summary. Interview Q&A. Recommended Reading. Chapter 9: Finding Your Posture. History of Information Security. Modern Information Security. Security Objectives. Determining the Security Posture. Prioritizing the Vulnerabilities. Vulnerability Management. Summary. Interview Q&A. Recommended Reading. Chapter 10: Tools. Enumeration, Port Scanning, and Banner Grabbing. Wireless Enumeration. Vulnerability Scanning. Password Compliance Testing. Network Sniffing. Penetration Testing. Learning. Summary. Interview Q&A. Recommended Reading. Additional Resources. Index.

    Out of stock

    £16.99

  • OverTheRoad Wireless for Dummies

    John Wiley & Sons Inc OverTheRoad Wireless for Dummies

    Out of stock

    Book SynopsisDo you roam the road making a living, or are you enjoying the nomadic life of a retiree with a motor home? Either way, life goes on no matter where you''re hanging your hat tonight. Bills still need to be paid, grandchildren grow up way too fast, and you''ve gotten pretty dependent on your e-mail. How do you stay connected to the rest of the world while you''re on the road? For a growing number of over-the-road drivers, business travelers, and RV enthusiasts, the answer is a wireless Internet connection. With a laptop and wireless access, you can Pay bills, check accounts, and handle banking online Send and receive e-mail Surf the Web Access your home PC Make inexpensive phone calls with VoIP Watch TV, download movies, and listen to satellite radio So, you say, I see people in movies popping open their laptops and getting online wherever they happen to be. It looks awfully easywhy do I need a book? WeTable of ContentsIntroduction. Part I: The Wonderful World of Wireless Fidelity. Chapter 1: Taking the Wi-Fi Highway. Chapter 2: Selecting a Standard. Chapter 3: Gearing Up. Chapter 4: Putting Your Gear Together. Part II: Surfing the Net Unplugged. Chapter 5: Spotting Hotspots. Chapter 6: Using Truck– and RV–Friendly Hotspots. Part III: Bridging the Wireless Gap. Chapter 7: Cellular Data Services: Can You Connect Me Now? Chapter 8: Reattaching the Wired Tether. Chapter 9: Sky-High Wi-Fi. Part IV: Securing Your Information. Chapter 10: Taking Common–Sense Steps to Security. Chapter 11: Encrypting Data. Chapter 12: Accessing Your Home PC Remotely. Part V: Taking Care of Business. Chapter 13: Talking Cheap with VoIP. Chapter 14: Managing the Over-the-Road Office. Part VI: Entertaining Electronics. Chapter 15: Extra-Terrestrial Radio. Chapter 16: Taking the Show on the Road. Part VII: The Part of Tens. Chapter 17: Ten Must–Have Travel Accessories. Chapter 18: Ten Fantastic Free Applications. Index.

    Out of stock

    £15.29

  • Data Modeling Fundamentals

    John Wiley & Sons Inc Data Modeling Fundamentals

    Out of stock

    Book SynopsisThe purpose of this book is to provide a practical approach for IT professionals to acquire the necessary knowledge and expertise in data modeling to function effectively. It begins with an overview of basic data modeling concepts, introduces the methods and techniques, provides a comprehensive case study to present the details of the data model components, covers the implementation of the data model with emphasis on quality components, and concludes with a presentation of a realistic approach to data modeling. It clearly describes how a generic data model is created to represent truly the enterprise information requirements.Table of ContentsPreface. Acknowledgments. PART I: INTRODUCTION TO DATA MODELING. 1. Data Modeling: An Overview. Chapter Objectives. Data Model Defined. What is a Data Model? Why Data Modeling? Who Performs Data Modeling? Information Levels. Classification of Information Levels. Data Models at Information Levels. Conceptual Data Modeling. Data Model Components. Data Modeling Steps. Data Model Quality. Significance of Data Model Quality. Data Model Characteristics. Ensuring Data Model Quality. Data System Development. Data System Development Life Cycle (DDLC). Roles and Responsibilities. Modeling the Information Requirements. Applying Agile Modeling Principles. Data Modeling Approaches and Trends. Data Modeling Approaches. Modeling for Data Warehouse. Other Modeling Trends. Chapter Summary. Review Questions. 2. Methods, Techniques, and Symbols. Chapter Objectives. Data Modeling Approaches. Semantic Modeling. Relational Modeling. Entity-Relationship Modeling. Binary Modeling. Methods and Techniques. Peter Chen (E-R) Modeling. Information Engineering. IDEF1X. Richard Barker’s. ORM (Object Role Modeling). XML (eXtensible Markup Language). Summary and Comments. Unified Modeling Language (UML). Data Modeling Using UML. UML in the Development Process. Chapter Summary. Review Questions. PART II. DATA MODELING FUNDAMENTALS. 3. Anatomy of a Data Model. Chapter Objectives. Data Model Composition. Models at Different Levels. Conceptual Model: Review Procedure. Conceptual Model: Identifying Components. Case Study. Description. E-R Model. UML Model. Creation of Models. User Views. View Integration. Entity Types. Specialization/Generalization. Relationships. Attributes. Identifiers. Review of the Model Diagram. Logical Model: Overview. Model Components. Transformation Steps. Relational Model. Physical Model: Overview. Model Components. Transformation Steps. Chapter Summary. Review Questions. 4. Objects or Entities in Detail. Chapter Objectives. Entity Types or Object Sets. Comprehensive Definition. Identifying Entity Types. Homonyms and Synonyms. Category of Entity Types. Exploring Dependencies. Dependent or Weak Entity Types. Classifying Dependencies. Representation in the Model. Generalization and Specialization. Why Generalize or Specialize? Super-types and Sub-types. Generalization Hierarchy. Inheritance of Attributes. Inheritance of Relationships. Constraints. Rules Summarized. Special Cases and Exceptions. Recursive Structures. Conceptual and Physical. Assembly Structures. Entity Type Vs Attribute. Entity Type Vs Relationship. Modeling Time Dimension. Categorization. Entity Validation Checklist. Completeness. Correctness. Chapter Summary. Review Questions. 5. Attributes and Identifiers in Detail. Chapter Objectives. Attributes. Properties or Characteristics. Attributes as Data. Attribute Values. Names and Descriptions. Attribute Domains. Definition of a Domain. Domain Information. Attribute Values and Domains. Split Domains. Misrepresented Domains. Resolution of Mixed Domains. Constraints for Attributes. Value Set. Range. Type. Null Values. Types of Attributes. Single-Valued and Multi-Valued Attributes. Simple and Composite Attributes. Attributes with Stored and Derived Values . Optional Attributes. Identifiers or Keys. Need for Identifiers. Definitions of Keys. Guidelines for Identifiers. Key in Generalization Hierarchy. Attribute Validation Checklist. Completeness. Correctness. Chapter Summary. Review Questions. 6. Relationships in Detail. Chapter Objectives. Relationships. Associations. Relationship?Two-sided. Relationship Sets. Double Relationships. Relationship Attributes. Degree of Relationships. Unary Relationship. Binary Relationship. Ternary Relationship. Quaternary Relationship. Structural Constraints. Cardinality Constraint. Participation Constraint. Dependencies. Entity Existence. Relationship Types. Identifying Relationship . Non-identifying Relationship. Maximum and Minimum Cardinalities. Mandatory Conditions - Both Ends. Optional Condition - One End. Optional Condition - Other End. Optional Conditions - Both Ends. Special Cases. Gerund. Aggregation. Access Pathways. Design Issues. Relationship Or Entity Type? Ternary Relationship Or Aggregation? Binary Or N-ary Relationship? One-to-One Relationships. One-to-Many Relationships. Circular Structures. Redundant Relationships. Multiple Relationships. Relationship Validation Checklist. Completeness. Correctness. Chapter Summary. Review Questions. PART III. DATA MODEL IMPLEMENTATION. 7. Data Modeling to Database Design. Chapter Objectives. Relational Model: Fundamentals. Basic Concepts. Structure and Components. Data Integrity Constraints. Transition to Database Design. Design Approaches. Conceptual to Relational Model. Traditional Method. Evaluation of Design Methods. Model Transformation Method. The Approach. Mapping of Components. Entity Types to Relations. Attributes to Columns. Identifiers to Keys. Transformation of Relationships. Transformation Summary . Chapter Summary. Review Questions. 8. Data Normalization. Chapter Objectives. Informal Design. Forming Relations from Requirements. Potential Problems. Update Anomaly. Deletion Anomaly. Addition Anomaly. Normalization Methodology. Strengths of the Method. Application of the Method. Normalization Steps. Fundamental Normal Forms. First Normal Form. Second Normal Form. Third Normal Form. Boyce-Codd Normal Form. Higher Normal Forms. Fourth Normal Form. Fifth Normal Form. Domain-Key Normal Form. Normalization Summary. Review of the Steps. Normalization as Verification. Chapter Summary. Review Questions. 9. Modeling for Decision-Support Systems. Chapter Objectives. Decision-Support Systems. Need for Strategic Information. History of Decision-Support Systems. Operational Vs Informational Systems. System Types and Modeling Methods. Data Warehouse. Data Warehouse Defined. Major Components. Data Warehousing Applications. Modeling: Special Requirements. Dimensional Modeling. Dimensional Modeling Basics. STAR Schema. Snowflake Schema. Families of STARS. Transition to Logical Model. OLAP Systems. Features and Functions of OLAP. Dimensional Analysis. Hypercubes. OLAP Implementation Approaches. Data Modeling for OLAP. Data Mining Systems. Basic Concepts. Data Mining Techniques. Data Preparation and Modeling. Data Preprocessing. Data Modeling. Chapter Summary. Review Questions. PART IV. PRACTICAL APPROACH TO DATA MODELING. 10. Ensuring Quality in the Data Model. Chapter Objectives. Significant of Quality. Why Emphasize Quality? Good and Bad Models. Approach to Good Modeling. Quality of Definitions. Importance of Definitions. Aspects of Quality Definitions. Correctness. Completeness. Clearness. Format. Checklists. High-Quality Data Model. Meaning of Data Model Quality. Quality Dimensions. What is a High-Quality Model? Benefits of High-Quality Models. Quality Assurance Process. Aspects of Quality Assurance. Stages of Quality Assurance Process. Data Model Review. Data Model Assessment. Chapter Summary. Review Questions. 11. Agile Data Modeling in Practice. Chapter Objectives. The Agile Movement. How It Got Started. Principles of Agile Development. Philosophies. Generalizing Specialists. Agile Modeling. What is Agile Modeling? Basic Principles. Auxiliary Principles. Practicing Agile Modeling. Primary Practices. Additional Practices. Role of Agile DBA. Agile Documentation. Recognizing an Agile Model. Feasibility. Evolutionary Data Modeling. Traditional Approach. Need for Flexibility. Nature of Evolutionary Modeling. Benefits. Chapter Summary. Review Questions. 12. Data Modeling: Practical Tips. Chapter Objectives. Tips and Suggestions. Nature of Tips. How Specified. How to Use Them. Requirements Definition. Interviews. Group Sesssions. Geographically Dispersed Groups. Documentation. Change Management. Notes for Modeling. Stakeholder Participation. Organizing Participation. User Liaison. Continuous Interaction. Multiple Sites. Iterative Modeling. Establishing Cycles. Determining Increments. Requirements--Model Interface. Integration of Partial Models. Special Cases. Legal Entities. Locations and Places. Time Periods. Persons. Bill-of-Materials. Conceptual Model Layout. Readability and Usability. Component Arrangement. Adding Texts. Visual Highlights. Logical Data Model. Enhancement Motivation. Easier DB Implementation. Performance Improvement. Storage Management. Enhanced Representation. Chapter Summary. Review Questions. References. Glossary. Index.

    Out of stock

    £121.46

  • Latex Line By Line Second Edition Line by Line

    John Wiley & Sons Inc Latex Line By Line Second Edition Line by Line

    Out of stock

    Book SynopsisA tutorial on the most popular text processing system used in the academic community. It explains formatting fundamentals and the more complex techniques for typesetting mathematical formulas. The text is suitable for people with no previous LATEX experience.Trade Review"...The book is nicely presented, with a useful set of goals at the beginning of each chapter. A good and comprehensive start towards creating a new and important sub-discipline...", , , Times Higher Educational Supplement, 17th September 1999 #"Full review: It does not need me to tell you that we are currently experiencing an explosion of information in an ever increasing number of formats - CD ROM, the Web, online databases and archives come immediately to mind. Moreover this information is found increasingly in a wide variety of different formats - not only text, but still an moving images, sound files and data held in spreadsheets. Hypermedia and the Web is a book which takes on the challenge of considering how to develop hypermedia processes based on sound engineering principles. Interactive information is approached as a structure that requires management, quantification and documentation. The authors describe the goal of the book as one of being a resource that can be used to improve the development of hypermedia data, to engender an awareness that successful development of hypermedia data requires a disciplined approach, and to demonstrate the possible future of this particular field over the next five years. It is divided into three parts. T he first - Hypermedia development fundamentals - gives a definition of hypermedia, describes how it can be modelled and engineered, and discusses how to obtain a quality product and process. The second section covers the development process, methods and techniques. The final section is devoted to research developments, such as research projects, Matilda, Microcosm (an open media system), the Amsterdam Hypermedia Model and Relationship Management Methodology for example. The intended readership of Hypermedia and the Web is anyone involved in the development of hypermedia products, be they application developers, application analysts, Web developers, and content and information experts. Both theoretical concerns and practical issues are dealt with, so it will appeal to anyone with an interest in either aspect. The book is not, however for the faint of heart nor for those with just a passing interest in the subject. It goes into considerable detail and makes valuable use of graphics in order to provide clarity w hen the going gets tough. Having said that, the reader is still faced with a densely packed book full of theory and practical analysis and, although it is written in a friendly and approachable style, it's not exactly the type of book you'd want to read on the beach. This shouldn't be seen as a criticism, since that isn't an intention of the author of course. Nevertheless it is a book that requires considerable concentration in order to get the most out of it. On the other hand, once you can get involved in the book the authors carry you along at a fair pace and make few assumptions, explaining in detail as they go and bringing in examples as needed to illustrate particular points. Indeed, they point out that a technical background is not necessary. I have my doubts as to whether or not Hypermedia and the Web would appeal to the majority of information professionals in their day-to-day work. However, if you have an active interest in the development of hypermedia and really want to get to grips with the subje ct you could do no better than get a hold of a copy. Furthermore, it should be within easy reaching distance of anyone who is producing anything other than the very basic Web pages or databases, and really should be a must in the personal library of anyone seriously developing databases and Websites which combine a variety of types of information in different formats.", Phil Bradley, Internet Consultant, Trainer, Web Designer & Author, #Table of ContentsWhy Use It? Getting Started. Fancy Prose. List-Like Environments. Boxes and Tables. Making Bibliographies. Making Indexes Standard Document Classes. Basic Mathematical Formatting. More Mathematical Formatting. Introducing AMS-LATEX. Simple Diagrams Mathematical Symbols. Useful Notions. Glossary. When Things Go Wrong Differences. Bibliography. Index.

    Out of stock

    £53.06

  • Vidding

    The University of Michigan Press Vidding

    10 in stock

    Book SynopsisTraces the history and development of a previously little-known fan practice

    10 in stock

    £31.38

  • Big Digital Humanities

    The University of Michigan Press Big Digital Humanities

    10 in stock

    Book SynopsisThis collection has its origins in a series of seminal articles Patrik Svensson published in the Digital Humanities Quarterly. Svensson’s articles were informative and knowledgeable and tended to foreground reportage and explanation rather than utopianism or territorial contentiousness. In revising his original work, he has responded to both subsequent feedback and new developments.Trade Review“Big Digital Humanities proposes a comprehensive model of digital humanities that will propel the field forward.”—Tanya Clement, University of Texas–Austin“Drawing on his decade-long experience directing HUMlab at Umeå and the lessons learned through digital humanities projects, infrastructure-building, and interactions with the global DH community, Svensson’s Big Digital Humanities will have a critically important place in the scholarly conversations about what DH is and what it might become.”—Todd Presner, University of California–Los Angeles

    10 in stock

    £52.95

  • Communicating and Mobile Systems

    Cambridge University Press Communicating and Mobile Systems

    15 in stock

    Book SynopsisRobin Milner introduces a new way of modelling communication that reflects its central position in computing. Everything is introduced by means of examples but the aim of the book is to develop the p-calculus, a theory whose scope includes the internet just as much as programs, algorithms and programming languages.Trade Review'… may well become the standard work on the π-calculus.' Martin Hoffman, Zentralblatt MATHTable of ContentsGlossary; Part I. Communicating Systems: 1. Introduction; 2. Behaviour of automata; 3. Sequential processes and bisimulation; 4. Concurrent processes and reaction; 5. Transitions and strong equivalence; 6. Observation equivalence: theory; 7. Observation equivalence: examples; Part II. The π-Calculus: 8. What is mobility? 9. The π-calculus and reaction; 10. Applications of the π-calculus; 11. Sorts, objects and functions; 12. Commitments and strong bisimulation; 13. Observation equivalence and examples; 14. Discussion and related work; Bibliography; Index.

    15 in stock

    £86.44

  • Principles of Embedded Networked Systems Design

    Cambridge University Press Principles of Embedded Networked Systems Design

    15 in stock

    Book SynopsisEmbedded network systems provide a set of technologies that can link the physical world to large-scale networks allowing monitoring and control in many physical processes. This book details the fundamentals for this fast-moving field. It contains extensive examples and problems and is ideal for graduate students and practising engineers.Trade Review"…this volume represents a real mine of information…anyone working in the field would benefit from owning a copy." IEEE Communications EngineerTable of Contents1. Introduction to embedded network systems; 2. Representation of signals; 3. Signal propagation; 4. Sensor principles; 5. Source detection and identification; 6. Digital communications; 7. Multiple source estimation and multiple access communications; 8. Networking; 9. Network position and synchronization services; 10. Energy management; 11. Data management; 12. Articulation, mobility, and infrastructure; 13. Node architecture; 14. Network data integrity; 15. Experimental systems design; 16. Ethical, legal and social implications of ENS; 17. Design principles for ENS; Appendix A. Gaussian Q-function; Appendix B. Optimization; Index.

    15 in stock

    £98.80

  • A First Course in Digital Communications

    Cambridge University Press A First Course in Digital Communications

    15 in stock

    Book SynopsisA concise introduction to the core concepts in digital communication, providing clarity and depth through examples, problems and MATLAB exercises. Its simple structure maps a logical route to understand the most basic principles in digital communication, and also leads students through more in-depth treatment with examples and step-by step instructions.Trade Review'The use of a step-by-step approach to the design of signal transmission and reception techniques with the aid of examples, illustrations, and problem solving linked to practical systems is very useful.' Falah Ali, Senior Lecturer in Electrical Engineering, University of Sussex, UK'What makes this book different from the existing books are elaboration of simple concepts and more examples.' Hsuan-Jung Su, Associate Professor of Electrical Engineering, National Taiwan University'The examples and problems constitute a very strong point in their text - they help to better understand the concepts.' Mónica Bugallo, Professor of Electrical and Computer Engineering, Stony Brook University, New YorkTable of ContentsPreface; Acknowledgements; 1. Introduction; 2. Deterministic signal characterization and analysis; 3. Probability theory, random variables and random processes; 4. Sampling and quantization; 5. Optimum receiver for binary data transmission; 6. Baseband data transmission; 7. Basic digital passband modulation; 8. M-ary signaling techniques; 9. Signaling over bandlimited channels; 10. Signaling over fading channels; 11. Advanced modulation techniques; 12. Synchronization; Index.

    15 in stock

    £66.99

  • Designing Large Scale LANs

    O'Reilly Media Designing Large Scale LANs

    Out of stock

    Book SynopsisThis text offers a vendor-neutral approach for designing large local area networks according to business or organizational needs, rather than from a product perspective. Dooley outlines "top-down network design" for building a technological infrastructure to fit your organization's requirements.Trade Review"A very readable text with good illustration, I would recommend this book to general networking practitioners and those with growing networks of their own who want to be aware of the benefits of good design." - Raza Rizvi, News@UKUUG, October 2002Table of ContentsPreface 1. Networking Objectives Business Requirements OSI Protocol Stack Model Routing Versus Bridging Top-Down Design Philosophy 2. Elements of Reliability Defining Reliability Redundancy Failure Modes 3. Design Types Basic Topologies Reliability Mechanisms VLANs Toward Larger Topologies Hierarchical Design Implementing Reliability Large-Scale LAN Topologies 4. Local Area Network Technologies Selecting Appropriate LAN Technology Ethernet and Fast Ethernet Token Ring Gigabit and 10 Gigabit Ethernet ATM FDDI Wireless Firewalls and Gateways Structured Cabling 5. IP IP-Addressing Basics IP-Address Classes ARP and ICMP Network Address Translation Multiple Subnet Broadcast General IP Design Strategies DNS and DHCP 6. IP Dynamic Routing Static Routing Types of Dynamic Routing Protocols RIP IGRP and EIGRP OSPF BGP 7. IPX Dynamic Routing General IPX Design Strategies 8. Elements of Efficiency Using Equipment Features Effectively Hop Counts MTU Throughout the Network Bottlenecks and Congestion Filtering Quality of Service and Traffic Shaping 9. Network Management Network-Management Components Designing a Manageable Network SNMP Management Problems 10. Special Topics IP Multicast Networks IPv6 Security Appendix: Combining robabilities Glossary Bibliography Index

    Out of stock

    £32.99

  • Hardening Cisco Routers

    O'Reilly Media Hardening Cisco Routers

    Out of stock

    Book SynopsisNetwork administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This text focuses on ways to secure Cisco routers, it is a reference for protecting the protectors.Trade Review"This slim tome is a veritable gem of a book. It is written in a logical and clear style that permits reading from start to finish, but each specific section is complete in it's own right and as such it allows the reader to pick up the book and dip read satisfactorily. I learnt things from this book, and for me that is the best recommendation I can give." - Raza Rizvi, news@UKTable of ContentsPreface 1. Router Security Router Security? Routers: The Foundation of the Internet What Can Go Wrong What Routers Are at Risk? Moving Forward 2. IOS Version Security The Need for a Current IOS Determining the IOS Version IOS Versions and Vulnerabilities IOS Security Checklist 3. Basic Access Control Authentication Versus Authorization Points of Access Basic Access Control Remote Administration Protection with IPSec Basic Access Control Security Checklist 4. Passwords and Privilege Levels Password Encryption Clear-Text Passwords service password-encryption Enable Security Strong Passwords Keeping Configuration Files Secure Privilege Levels Password Checklist 5. AAA Access Control Enabling AAA Local Authentication TACACS+ Authentication RADIUS Authentication Kerberos Authentication Token-Based Access Control AAA Security Checklist 6. Warning Banners Legal Issues Example Banner Adding Login Banners Warning Banner Checklist 7. Unnecessary Protocols and Services ICMP Source Routing Small Services Finger HTTP CDP Proxy ARP Miscellaneous SNMP Unnecessary Protocols and Services Checklist 8. SNMP Security SNMP Versions Securing SNMP v1 and v2c Securing SNMP v3 SNMP Management Servers SNMP Security Checklist 9. Secure Routing and Antispoofing Antispoofing Routing Protocol Security Routing Protocol and Antispoofing Checklist 10. NTP NTP Overview Configuring NTP NTP Checklist 11. Logging Logging in General Router Logging ACL Violation Logging AAA Accounting Logging Checklist A. Checklist Quick Reference B. Physical Security C. Incident Response D. Configuration Examples E. Resources Index

    Out of stock

    £15.99

  • IP Routing

    O'Reilly Media IP Routing

    Out of stock

    Book SynopsisFor network and system administrators, "IP Routing" is a straightforward, jargon-free introduction to the basic concepts of IP routing. Each chapter adds a new concept, building from the simplest to the most complex routing protocol.Trade Review"A useful book for those in the networking field or those wishing to migrate between protocols." Raza Rizvi, News@UKUUG, October 2002Table of ContentsPreface 1. Starting Simple What Is IP Routing? Directly Connected Networks Static Routing Dynamic Routing The Routing Table Underlying Processes Summing Up 2. Routing Information Protocol (RIP) Getting RIP Running How RIP Finds Shortest Paths Convergence Subnet Masks Route Summarization Default Route Fine-Tuning RIP Summing Up 3. Interior Gateway Routing Protocol (IGRP) Getting IGRP Running How IGRP Works Speeding Up Convergence Route Summarization Default Routes Classful Route Lookups Summing Up 4. Enhanced Interior Gateway Routing Protocol (EIGRP) Getting EIGRP Running EIGRP Metric How EIGRP Works Variable Length Subnet Masks Route Summarization Default Routes Troubleshooting EIGRP Summing Up 5. Routing Information Protocol Version 2 (RIP-2) Getting RIP-2 Running RIP-2 Packet Format RIP-1/RIP-2 Compatibility Classful Versus Classless Routing Protocols Classful Versus Classless Route Lookup Authentication Route Summarization Summing Up 6. Open Shortest Path First (OSPF) Getting OSPF Running OSPF Metric Definitions and Concepts How OSPF Works Route Summarization Default Routes Virtual Links Demand Circuits Stub, Totally Stubby, and Not So Stubby Areas NBMA Networks OSPF Design Heuristics Troubleshooting OSPF Summing Up 7. Border Gateway Protocol 4 (BGP-4) Background Getting BGP Running How BGP Works Load Balancing Route-Filtering Connecting to the Internet Choosing an ISP Troubleshooting BGP Summing Up 8. Administrative Controls Filter Routing Information Rate the Trustworthiness of a Routing Information Source Redistribute Routes Maximum Number of Paths Summing Up Index

    Out of stock

    £23.99

  • Radius

    O'Reilly Media Radius

    Out of stock

    Book SynopsisRemote Authentication Dial-In User Radius (RADIUS) is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. This is a detailed guide to the underpinnings of RADIUS protocol.Table of ContentsPreface 1. An Overview of RADIUS An Overview of AAA Key Points About AAA Architecture The Authorization Framework And Now, RADIUS 2. RADIUS Specifics Using UDP versus TCP Packet Formats Packet Types Shared Secrets Attributes and Values Authentication Methods Realms RADIUS Hints 3. Standard RADIUS Attributes Attribute Properties 4. RADIUS Accounting Key Points in RADIUS Accounting Basic Operation The Accounting Packet Format Accounting Packet Types Accounting-specific Attributes 5. Getting Started with FreeRADIUS Introduction to FreeRADIUS Installing FreeRADIUS In-depth Configuration Troubleshooting Common Problems 6. Advanced FreeRADIUS Using PAM Proxying and Realms Using the clients.conf File FreeRADIUS with Some NAS Gear Using MySQL with FreeRADIUS Simultaneous Use Monitoring FreeRADIUS 7. Other RADIUS Applications RADIUS for Web Authentication Using the LDAP Directory Service Parsing RADIUS Accounting Files 8. The Security of RADIUS Vulnerabilities The Extensible Authentication Protocol Compensating for the Deficiencies Modifying the RADIUS Protocol 9. New RADIUS Developments Interim Accounting Updates The Apple Remote Access Protocol The Extensible Authentication Protocol Tunneling Protocols New Extensions Attributes 10. Deployment Techniques Typical Services RADIUS and Availability Other Things RADIUS Appendix:. Attribute Reference Index

    Out of stock

    £20.99

  • Samba Pocket Reference 2e

    O'Reilly Media Samba Pocket Reference 2e

    Out of stock

    Book SynopsisThis text describes all the options for Samba's configuration file in quick-reference format. It also contains command-line options and related information on the use of the Samba daemons (smbd, nmbd, and winbindd)and the utilities in the Samba distribution.Table of ContentsIntroduction Configuration File Options Glossary of Configuration Value Types Configuration File Variables Samba Daemons smbd nmbd winbindd Samba Distribution Programs findsmb make_smbcodepage make_unicodemap net nmblookup pdbedit rpcclient rpcclient commands smbcacls smbclient smbcontrol smbgroupedit smbmnt smbmount smbpasswd smbsh smbspool smbstatus smbtar smbumount testparm testprns wbinfo Example Configuration Files Samba in a Workgroup Samba in a Windows NT Domain Index

    Out of stock

    £7.59

  • IRC Hacks

    O'Reilly Media IRC Hacks

    Out of stock

    Book SynopsisThis is a collection of tips and tools that covers just about everything needed to become a true IRC master, featuring contributions from renowned IRC hackers. The book presents an opportunity to learn how IRC works and how to make best use of some of the features that have made it so successful.Table of ContentsForeword Credits Preface Chapter 1. Connecting to IRC 1. IRC from Windows 2. IRC from Linux 3. IRC from Mac OS X 4. IRC with ChatZilla Chapter 2. Using IRC 5. The IRC Model 6. Common Terms, Abbreviations, and Phrases 7. Common Acronyms and Initialisms 8. Register with NickServ 9. Register Your Channel with ChanServ 10. The QuakeNet L Channel Bot; 11. Fix Channel Problems with CHANFIX Chapter 3. Users and Channels; 12. Find Relevant Channels and Servers 13. Guess the Time Zone of a User 14. Study Channel Statistics with pisg 15. Find Users in Channels 16. Filter Channel Lists Chapter 4. Enhancing IRC Clients 17. Automatic Completion of Nicknames 18. Add Timestamps to mIRC Messages 19. Highlight Lines in mIRC; 20. Automate mIRC with Scripting 21. Format Text 22. Colorize Text 23. Play Sounds 24. Enhance irssi with Perl 25. Connect to Multiple Servers 26. Secure Your IRC Connection with SSL; 27. Tunnel Your IRC Connection with SSH 28. Automate Voice Management 29. Make IRC Talk 30. Add Your IRC Nickname to Your Webcam Chapter 5. Writing IRC Bots 31. IRC Over Telnet; 32. A Simple Perl IRC Client 33. IRC with Perl and Net::IRC; 34. A Simple Java IRC Client 35. IRC with Java and PircBot; 36. A Simple Python IRC Client 37. IRC with Python and IRCLib; 38. Extend the Python IRCLib 39. The Ethics of IRC Bots; Chapter 6. Logging Bots 40. Keep Tabs on People 41. Log URLs People Mention 42. Blog from IRC 43. A Continuity Bot; Chapter 7. Community Bots 44. Infer Social Networks from IRC; 45. Run an Infobot 46. Use PPF for Gaming Clans 47. Write a Plug-in for PPF 48. Getting Friendly with FOAFBot 49. Interrogate Trust Networks with TrustBot 50. Pass Notes to Other Users Chapter 8. Search and Query Bots 51. Search the Web with Google 52. Use the Dictionary 53. Check the Weather; 54. Don't Get Lost in Translation 55. Convert Currency; 56. Find Out When People Are on the Network 57. Search for Books on Amazon Chapter 9. Fun Bots 58. A DiceBot 59. An Egg Timer; 60. A Trivia Bot 61. Perform Feats of Math 62. An Artificial Intelligence Bot 63. Create Comic Strips Chapter 10. Announcement Bots 64. Welcome Visitors Automagically 65. Announce Newsgroup Posts 66. Feed Syndicated RSS News into IRC Channels 67. Watch Online Games with MatchEd Chapter 11. Network Bots 68. Link Channels on Multiple Networks 69. Get a Remote Shell 70. Tail Log Files 71. Bridge Two Infobots; 72. A File-Sharing Bot Chapter 12. Channel Management Bots; 73. Protect the Channel Topic 74. Invite Users into Channels; 75. Maintain Operator Status 76. Set Up an Eggdrop Bot; 77. Manage Channels with an Eggdrop Chapter 13. The IRC Protocol; 78. Understanding the IRC Protocol 79. Text Over Multiple Lines; 80. Fake an Ident Response 81. Strip Formatting from Messages; 82. Remove Color from Messages 83. Encrypt Messages; 84. Timestamp with the TS Protocol 85. Understanding CTCP Messages Chapter 14. Other Ways to Connect to IRC 86. Hypertext Links to IRC Channels 87. IRC from Your Mobile Phone; 88. Enemies of Mobile IRC 89. IRC from a Pocket PC; 90. Access IRC with Java Applets 91. Use IRC from a Web Page Without Java 92. Use IRC Within screen 93. Set Up an IRC Proxy; 94. Use irssi and Its Proxy Chapter 15. Servers and Services; 95. Set Up Your Own IRC Server for Unix/Linux 96. Install Services 97. Set Up Your Own beware ircd Server 98. Link Two IRC Servers Together 99. Use MSN/ICQ/Jabber from IRC 100. Combine BitlBee and CtrlProxy Index

    Out of stock

    £19.19

  • Linux Server Hacks Volume Two

    O'Reilly Media Linux Server Hacks Volume Two

    Out of stock

    Book SynopsisOffers 100 server management tips and techniques that are help to improve your productivity and sharpen your administrative skills. This book includes topics, such as: authentication; Remote GUI connectivity; storage management; file sharing and synchronizing resources; security/lockdown instruction; log files and monitoring; and troubleshooting.Table of ContentsCredits Preface Chapter 1. Linux Authentication 1. Disable User Accounts Instantly 2. Edit Your Password File for Greater Access Control 3. Deny All Access in One Second or Less 4. Customize Authentication with PAMs 5. Authenticate Linux Users with a Windows Domain Controller 6. Centralize Logins with LDAP 7. Secure Your System with Kerberos 8. Authenticate NFS-Lovers with NIS 9. Sync LDAP Data with NIS Chapter 2. Remote GUI Connectivity 10. Access Systems Remotely with VNC 11. Access VNC Servers over the Web 12. Secure VNC via SSH 13. Autostart VNC Servers on Demand 14. Put Your Desktops on a Thin Client Diet 15. Run Windows over the Network 16. Secure, Lightweight X Connections with FreeNX 17. Secure VNC Connections with FreeNX 18. Secure Windows Terminal Connections with FreeNX 19. Remote Administration with Webmin Chapter 3. System Services 20. Quick and Easy DHCP Setup 21. Integrate DHCP and DNS with Dynamic DNS Updates 22. Synchronize Your Watches! 23. Centralize X Window System Font Resources 24. Create a CUPS Print Server 25. Configure Linux Connections to Remote CUPS Printers 26. Integrate Windows Printing with CUPS 27. Centralize Macintosh Printing with CUPS 28. Define a Secure CUPS Printer Chapter 4. Cool Sysadmin Tools and Tips 29. Execute Commands Simultaneously on Multiple Servers 30. Collaborate Safely with a Secured Wiki 31. Edit Your GRUB Configuration with grubby 32. Give Your Tab Key a Workout 33. Keep Processes Running After a Shell Exits 34. Disconnect Your Console Without Ending Your Session 35. Use script to Save Yourself Time and Train Others 36. Install Linux Simply by Booting 37. Turn Your Laptop into a Makeshift Console 38. Usable Documentation for the Inherently Lazy 39. Exploit the Power of Vim 40. Move Your PHP Web Scripting Skills to the Command Line 41. Enable Quick telnet/SSH Connections from the Desktop 42. Speed Up Compiles 43. Avoid Common Junior Mistakes 44. Get Linux Past the Gatekeeper 45. Prioritize Your Work Chapter 5. Storage Management and Backups 46. Create Flexible Storage with LVM 47. Combine LVM and Software RAID 48. Create a Copy-on-Write Snapshot of an LVM Volume 49. Clone Systems Quickly and Easily 50. Make Disk-to-Disk Backups for Large Drives 51. Free Up Disk Space Now 52. Share Files Using Linux Groups 53. Refine Permissions with ACLs 54. Make Files Easier to Find with Extended Attributes 55. Prevent Disk Hogs with Quotas Chapter 6. Standardizing, Sharing, and Synchronizing Resources 56. Centralize Resources Using NFS 57. Automount NFS Home Directories with autofs 58. Keep Filesystems Handy, but Out of Your Way 59. Synchronize root Environments with rsync 60. Share Files Across Platforms Using Samba 61. Quick and Dirty NAS 62. Share Files and Directories over the Web Chapter 7. Security 63. Increase Security by Disabling Unnecessary Services 64. Allow or Deny Access by IP Address 65. Detect Network Intruders with snort 66. Tame Tripwire 67. Verify Fileystem Integrity with Afick 68. Check for Rootkits and Other Attacks Chapter 8. Troubleshooting and Performance 69. Find Resource Hogs with Standard Commands 70. Reduce Restart Times with Journaling Filesystems 71. Grok and Optimize Your System with sysctl 72. Get the Big Picture with Multiple Displays 73. Maximize Resources with a Minimalist Window Manager 74. Profile Your Systems Using /proc 75. Kill Processes the Right Way 76. Use a Serial Console for Centralized Access to Your Systems 77. Clean Up NIS After Users Depart Chapter 9. Logfiles and Monitoring 78. Avoid Catastrophic Disk Failure 79. Monitor Network Traffic with MRTG 80. Keep a Constant Watch on Hosts 81. Remotely Monitor and Configure a Variety of Networked Equipment 82. Force Standalone Apps to Use syslog 83. Monitor Your Logfiles 84. Send Log Messages to Your Jabber Client 85. Monitor Service Availability with Zabbix 86. Fine-Tune the syslog Daemon 87. Centralize System Logs Securely 88. Keep Tabs on Systems and Services Chapter 10. System Rescue, Recovery, and Repair 89. Resolve Common Boot and Startup Problems 90. Rescue Me! 91. Bypass the Standard Init Sequence for Quick Repairs 92. Find Out Why You Can't Unmount a Partition 93. Recover Lost Partitions 94. Recover Data from Crashed Disks 95. Repair and Recover ReiserFS Filesystems 96. Piece Together Data from the lost+found 97. Recover Deleted Files 98. Permanently Delete Files 99. Permanently Erase Hard Disks 100. Recover Lost Files and Perform Forensic Analysis Index

    Out of stock

    £23.99

  • Wireless Hacks

    O'Reilly Media Wireless Hacks

    Out of stock

    Book SynopsisFrom passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond, this book answers real-life networking needs with direct solutions. It includes coverage for important changes in specifications, hardware and software, and delve into cellular and Bluetooth technologies.Table of ContentsForeword Credits Preface Chapter 1. Bluetooth, Mobile Phones, and GPS 1. Set Up Bluetooth on Linux 2. Set Up Bluetooth on Windows XP 3. Connect Mac OS X with a Bluetooth Phone 4. Connect Linux with a Bluetooth Phone 5. Connect Windows XP with a Bluetooth Phone 6. Use Your Treo as a Modem 7. Send SMS from a PowerBook 8. Remote Control Mac OS X with Bluetooth Phones and PDAs 9. Remote Control Linux with a Bluetooth Phone 10. Control XMMS with Bluetooth 11. Liven Up Parties with a Participatory Slideshow 12. Send SMS from Linux 13. Remote Control Windows with Bluetooth Phones and PDAs 14. Control Your Bluetooth Phone with FMA 15. Control Your Computer from Your Palm 16. Control Your Home Theater from Your Palm 17. Choose a Cellular Data Plan 18. Blog from Your Mobile Phone 19. Get Google Maps on Your Mobile Phone 20. Share Your GPS 21. Broadcast Your GPS Position 22. Map Wi-Fi Networks with Kismet and GPSd Chapter 2. Network Discovery and Monitoring 23. Find All Available Wireless Networks 24. Discover Networks with NetStumbler 25. Detect Networks with Handheld PCs 26. Find and Join Wireless Networks with AP Radar 27. Detect Networks on Mac OS X 28. Scan Passively with KisMAC 29. Detect Networks with Kismet 30. Monitor Wireless Links in Linux with Wavemon 31. Analyze Traffic with Ethereal 32. Track 802.11 Frames in Ethereal 33. Watch Network Traffic 34. grep Your Network 35. Check Wi-Fi Network Performance with Qcheck 36. Estimate Network Performance 37. Get Real-Time Network Stats 38. Graph Your Wireless Performance 39. Find Radio Manufacturers by MAC Chapter 3. Wireless Security 40. Stop Moochers from Stealing Your Wi-Fi Bandwidth 41. Visualize a Network 42. Secure Your Linux Network with WPA 43. Control Wireless Access by MAC 44. Authenticate Wireless Users 45. Forward Ports over SSH 46. Proxy Web Traffic over SSH 47. Securely Connect Two Networks 48. Generate a Tunnel Configuration Automatically 49. Poll Wireless Clients 50. Interrogate the Network 51. Track Wireless Users Chapter 4. Hardware Hacks 52. Add an External Antenna 53. Do-It-Yourself Access Point Hardware 54. Boot from a Compact Flash Hard Drive 55. Increase the Range of a PowerBook 56. Send Power over Your Ethernet 57. The NoCat Night Light 58. Upgrade the Linksys WET11 59. Scan for Wireless Networks Automatically 60. Backlight Your Zipit 61. Unwire Your Pistol Mouse 62. Mobilize Your WRT54G with the WiFiCar Chapter 5. Software Hacks 63. Build Your Own Access Point with Linux 64. Bridge Your Linux AP 65. Protect Your Bridge with a Firewall 66. Filter MAC with HostAP and Madwifi 67. Upgrade Your Wireless Router 68. Set Up an OLSR Mesh Network 69. Extend Your Wireless Network with WDS 70. Pebble 71. Wall Off Your Wireless 72. Run Your Mac as an Access Point 73. Run Linux on the Zipit Wireless Messenger 74. Capture Wireless Users with NoCatAuth 75. Capture Wireless Users on a Small Scale 76. Build an Online Community in Your Offline Neighborhood 77. Manage Multiple AirPort Base Stations 78. Advertise Bonjour Services in Linux 79. Advertise Any Service with Bonjour in Mac OS X 80. Redirect "Brought to you by" Bonjour Ads 81. Use a Windows-Only Wireless Card in Linux 82. Use Your Orinoco Card with Hermes AP Chapter 6. Do-It-Yourself Antennas 83. Make a Deep Dish Cylindrical Parabolic Reflector 84. Spider Omni Antenna 85. Pringles Can Waveguide 86. Pirouette Can Waveguide 87. Primestar Dish with Waveguide Feed 88. Primestar Dish with Biquad Feed 89. Cut a Cable Omni Antenna 90. Build a Slotted Waveg Appendix B. Wireless Hardware Guide Index

    Out of stock

    £15.99

  • The Sustainable Network

    O'Reilly Media The Sustainable Network

    Out of stock

    Book SynopsisDemonstrates how we can tackle challenges, ranging from energy conservation to economic and social innovation, using the global network - not just the Web and the Internet, but also the private domains of thousands of companies, government agencies, and institutions, all connected through thousands of different types of devices.

    Out of stock

    £19.19

  • Essential SharePoint 2007

    O'Reilly Media Essential SharePoint 2007

    Out of stock

    Book SynopsisDemonstrates how a business can use SharePoint to control documents, structure workflow, and share information over the Web using the standard tools of Microsoft Office and Internet Explorer. This book provides developers and administrators with the tools to keep company sites running smoothly, and to customize and extend them.

    Out of stock

    £23.99

  • SharePoint 2007

    O'Reilly Media SharePoint 2007

    Out of stock

    Book SynopsisProvides a discussion of Sharepoint features, applications and extensions. This book helps readers learn how to build Sharepoint sites and site collections, along with ways to administrate, secure, and extend Sharepoint. It features a reference section that includes information on compatibility, command line utilities, services, and CSS styles.

    Out of stock

    £29.99

  • Microsoft SharePoint 2003 Unleashed Unleashed S

    Pearson Education Microsoft SharePoint 2003 Unleashed Unleashed S

    1 in stock

    Book SynopsisAs businesses attempt to maximize every employee hour, knowledge management and collaboration tools like SharePoint 2003 have become more popular. Now businesses turn their attention to maximize this tool. Microsoft SharePoint 2003 Unleashed, Second Edition can show you how to do this. Revised based on reader feedback, this new edition delves into the power of SharePoint 2003 by going deep inside topics that include: Migrating to SharePoint 2003 Planning and Implementing a SharePoint 2003 Environment Managing a SharePoint 2003 Environment Extending the SharePoint 2003 Environment SharePoint 2003 technologies are designed to make it easier for everyone on a network to find and manage information. Microsoft SharePoint 2003 Unleashed, Second Edition makes it easier to get there.

    1 in stock

    £55.66

  • Apache Spark in 24 Hours Sams Teach Yourself

    Pearson Education (US) Apache Spark in 24 Hours Sams Teach Yourself

    Out of stock

    Book SynopsisJeffrey Aven is a big data consultant and instructor based in Melbourne, Australia. Jeff has an extensive background in data management and several years of experience consulting and teaching in the areas of Hadoop, HBase, Spark, and other big data ecosystem technologies. Jeff has won accolades as a big data instructor and is also an accomplished consultant who has been involved in several high-profile, enterprise-scale big data implementations across different industries in the region. Table of Contents PART I: GETTING STARTED WITH APACHE SPARK Hour 1: Introducing Apache Spark Hour 2: Understanding Hadoop Hour 3: Installing Spark Hour 4: Understanding the Spark Application Architecture Hour 5: Deploying Spark in the Cloud PART II: PROGRAMMING WITH APACHE SPARK Hour 6: Learning the Basics of Spark Programming with RDDs Hour 7: Understanding MapReduce Concepts Hour 8: Getting Started with Scala Hour 9: Functional Programming with Python Hour 10: Working with the Spark API (Transformations and Actions) Hour 11: Using RDDs: Caching, Persistence, and Output Hour 12: Advanced Spark Programming PART III: EXTENSIONS TO SPARK Hour 13: Using SQL with Spark Hour 14: Stream Processing with Spark Hour 15: Getting Started with Spark and R Hour 16: Machine Learning with Spark Hour 17: Introducing Sparkling Water (H20 and Spark) Hour 18: Graph Processing with Spark Hour 19: Using Spark with NoSQL Systems Hour 20: Using Spark with Messaging Systems PART IV: MANAGING SPARK Hour 21: Administering Spark Hour 22: Monitoring Spark Hour 23: Extending and Securing Spark Hour 24: Improving Spark Performance Index

    Out of stock

    £31.82

  • The Second Media Age

    John Wiley and Sons Ltd The Second Media Age

    Out of stock

    Book SynopsisExamines the implications of new communication technologies. This book evaluates critically the concepts of media and technology in various traditions of cultural theory, with the aim of rethinking the relations of humans to machines. It also examines theories of postmodernity in relation to the new media and the debate over multiculturalism.Table of ContentsPart I: Theoretical Reconsiderations: . 1. Social Theory and the New Media. 2. Postmodern Virtualities. 3. Postmodernity and the Politics of Multiculturalism. 4. The Mode of Information and Postmodernity. 5. Databases as Discourse, or Electronic Interpellations. 6. Critical Theory and TechnoCulture: Habermas and Baudrillard. Part II: Medias: . 7. Politics in the Mode of Information: Spike Lee's Do the Right Thing. . 8. RoboBody. 9. What Does Wotan Want? Ambivalent Feminism in Wagner's Ring. . 10. War in the Mode of Information. Notes. Index.

    Out of stock

    £16.14

  • Virtual Teams v8 Advances in Interdisciplinary

    Emerald Publishing Limited Virtual Teams v8 Advances in Interdisciplinary

    Out of stock

    Book SynopsisThe papers included in this volume identify some of the problems and some of the solutions to the kinds of problems that arise through working as virtual teams. They provide a framework for thinking about such problems and ideas that can form a foundation for advancing practice in the field.Table of ContentsInternational virtual teams - opportunities and issues, D. Windsor; Team identity formation in virtual teams, D. Mansour-Cole; Assessing the climate for creativity in virtual teams, J. Nemiro; Constituting relationships in communication - an interdisciplinary approach to understanding peer relationships in geographically dispersed teams, R.K. Bhalla; One foot in a global team, one foot at the local site - making sense out of living in two worlds simultaneously, J. Klein, B. Barrett; Virtual teams and organizations - a complexity analysis of emerging organizing structures, J.A. Black, S. Edwards; Effects of demographic diversity and virtual work environments of knowledge processing in teams, A.D. Bhappu et al; Cross-functional teams in a concurrent engineering environment - principles, model and methods, R. Durst, D. Kabel; Virtual team fitness - enhancing team performance through team member health, K.J. Lovelace et al; 21st century teamwork - defining competencies for virtual teams, L. Horvath, T. Tobin.

    Out of stock

    £102.99

  • Virtual Private Networks For Dummies

    Wiley Virtual Private Networks For Dummies

    Out of stock

    Book SynopsisVirtual Private Networks (VPN) offer a solution to the problems of security and speed when doing business over the Internet. This solution uses IP Tunnelling - a point-to-point connection. This text introduces the topic, using plain English to explain the complex technology involved.Table of ContentsIntroduction 1 Part I: Unlocking the Mysteries of VPNs 5 Chapter 1: Embracing Virtual Private Networks 7 Chapter 2: Touring the Land of VPNs 17 Chapter 3: Putting Privacy into VPNs 25 Chapter 4: Public Keys, Private Messages 43 Chapter 5: Fighting for the QoS 63 Part II: Applying VPNs in the Real World 73 Chapter 6: Extraordinary Extranets 75 Chapter 7: Remotely Possible 89 Chapter 8: Branching Our All Over 103 Chapter 9: Justify Yourself 115 Chapter 10: Let Your Requirements Be Your Guide 127 Part III: Roadmap for VPN Solutions 143 Chapter 11: Designing Custom VPN Network Solutions 145 Chapter 12: Evaluating and Selecting VPN and PKI Solutions 161 Chapter 13: Implementing Your VPN and PKI 183 Chapter 14: Testing Your VPN 193 Chapter 15: Living in a VPN-Wired World 205 Part IV: The Part of Tens 218 Chapter 16: Ten VPN Online Information Sources 219 Chapter 17: More Than Ten VPN Standards 227 Chapter 18: More Than Ten Steps to an Information Privacy Checklist 239 Chapter 19: Ten Security and Security-Testing Specialists 249 Part V: Appendixes 259 Appendix A: VPN Buyer’s Guide 261 Appendix B: Glossary 285 Appendix C: Inside IPSec 295 Index 303

    Out of stock

    £17.59

  • Professional Networking for Dummies

    John Wiley & Sons Inc Professional Networking for Dummies

    Out of stock

    Book SynopsisAre you putting your best foot forward in meetings? Are you connecting with the right people at functions? Throughout your life, you will find yourself in situations where professional networking will help you get to where you want to go.Table of ContentsIntroduction. PART I: NETWORKING: WHAT IT IS, WHAT IT ISN"T, NAD WHAT IT CAN DO FOR YOU. Chapter q. Networking Defined. Chapter 2. Your Core Network. PART II: BUILDING AND MAINTAINING YOUR NETWORK. Chapter 3. Expanding Your Circle of Influence through Networking Events. Chapter 4. You Are the Source of Your Network. Chapter 5. Let's Talk: Networking Happends through Conversation. Chapter 6. Cultivating Your Network by Making Requests. Chapter 7. Listen Up! Chapter 8. Using Follow-Through to Maintain and Grow Your Network. PART II: USING YOUR NETWORK: NETWORKING OPPORTUNITIES. Chapter 9. Networking Your Way to the Perfect Job. Chapter 10. Networking in the Corporate World. Chapter 11. Networking for Entrepreneurs and Business Owners. Chapter 12. Networking Throughout Life. Chapter 13. Networking in a Charity or in Your Community. PART IV: NETWORKING CHALLENGES. Chapter 14. Personality and Style Differences. Chapter 15. The High-Tech Connection. Chapter 16. Networking Etiquette. PART V: THE PARTS OF TENS. Chapter 17. Ten Ways to Master the Art of Small Talk. Chapter 18. Ten Techniques for Effective Name Recall. Chapter 19. Ten Traits of the Masterful Networker. Chapter 20. Ten Networking Turnoffs and How to Avoid Them. Appendix: Create Your Own Networking Action Plan. Index. Book Registration Information.

    Out of stock

    £14.02

  • Computer Viruses For Dummies

    John Wiley & Sons Inc Computer Viruses For Dummies

    Out of stock

    Book SynopsisViruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. This work helps you: understand the risks and analyze your PC's condition; select, install, and configure antivirus software; scan your computer and e-mail; rid your computer of viruses it's already caught; and more.Table of ContentsIntroduction 1 Part I: Evaluating Your Virus Situation 9 Chapter 1: Understanding Virus Risks 11 Chapter 2: Does My Computer Have a Virus? 23 Chapter 3: Does Your Computer Have Antivirus Software? 33 Part II: Deploying Your Antivirus Defenses 49 Chapter 4: Obtaining and Installing Antivirus Software 51 Chapter 5: Configuring Antivirus Software 75 Chapter 6: Scanning Your Computer and E-Mail 87 Chapter 7: Ridding Your Computer of Viruses 99 Part III: Maintaining Your Vigilance 115 Chapter 8: Updating Antivirus Software and Signatures 117 Chapter 9: Installing Security Patches 127 Chapter 10: Using Firewalls and Spyware Blockers 153 Chapter 11: Protecting PDAs from Viruses 181 Chapter 12: Incorporating Safe Computing Practices 189 Part IV: Looking at Viruses under the Microscope 207 Chapter 13: Viruses and the Losers Who Write Them 209 Chapter 14: Trojan Horses, Worms, Spam, and Hoaxes 221 Chapter 15: How Viruses Function and Propagate 235 Part V: The Part of Tens 247 Chapter 16: Almost Ten Myths about Computer Viruses 249 Chapter 17: Ten Antivirus Programs 255 Index 265

    Out of stock

    £9.49

  • Building the Data Warehouse

    John Wiley & Sons Inc Building the Data Warehouse

    2 in stock

    Book Synopsis The new edition of the classic bestseller that launched the data warehousing industry covers new approaches and technologies, many of which have been pioneered by Inmon himself In addition to explaining the fundamentals of data warehouse systems, the book covers new topics such as methods for handling unstructured data in a data warehouse and storing data across multiple storage media Discusses the pros and cons of relational versus multidimensional design and how to measure return on investment in planning data warehouse projects Covers advanced topics, including data monitoring and testing Although the book includes an extra 100 pages worth of valuable content, the price has actually been reduced from $65 to $55 Table of ContentsPreface xix Acknowledgments xxvii Chapter 1 Evolution of Decision Support Systems 1 The Evolution 2 The Advent of DASD 4 PC/4GL Technology 4 Enter the Extract Program 5 The Spider Web 6 Problems with the Naturally Evolving Architecture 7 Lack of Data Credibility 7 Problems with Productivity 9 From Data to Information 12 A Change in Approach 14 The Architected Environment 16 Data Integration in the Architected Environment 18 Who Is the User? 20 The Development Life Cycle 20 Patterns of Hardware Utilization 22 Setting the Stage for Re-engineering 23 Monitoring the Data Warehouse Environment 25 Summary 28 Chapter 2 The Data Warehouse Environment 29 The Structure of the Data Warehouse 33 Subject Orientation 34 Day 1 to Day n Phenomenon 39 Granularity 41 The Benefits of Granularity 42 An Example of Granularity 43 Dual Levels of Granularity 46 Exploration and Data Mining 50 Living Sample Database 50 Partitioning as a Design Approach 53 Partitioning of Data 53 Structuring Data in the Data Warehouse 56 Auditing and the Data Warehouse 61 Data Homogeneity and Heterogeneity 61 Purging Warehouse Data 64 Reporting and the Architected Environment 64 The Operational Window of Opportunity 65 Incorrect Data in the Data Warehouse 67 Summary 69 Chapter 3 The Data Warehouse and Design 71 Beginning with Operational Data 71 Process and Data Models and the Architected Environment 78 The Data Warehouse and Data Models 79 The Data Warehouse Data Model 81 The Midlevel Data Model 84 The Physical Data Model 88 The Data Model and Iterative Development 91 Normalization and Denormalization 94 Snapshots in the Data Warehouse 100 Metadata 102 Managing Reference Tables in a Data Warehouse 103 Cyclicity of Data — The Wrinkle of Time 105 Complexity of Transformation and Integration 108 Triggering the Data Warehouse Record 112 Events 112 Components of the Snapshot 113 Some Examples 113 Profile Records 114 Managing Volume 115 Creating Multiple Profile Records 117 Going from the Data Warehouse to the Operational Environment 117 Direct Operational Access of Data Warehouse Data 118 Indirect Access of Data Warehouse Data 119 An Airline Commission Calculation System 119 A Retail Personalization System 121 Credit Scoring 123 Indirect Use of Data Warehouse Data 125 Star Joins 126 Supporting the ODS 133 Requirements and the Zachman Framework 134 Summary 136 Chapter 4 Granularity in the Data Warehouse 139 Raw Estimates 140 Input to the Planning Process 141 Data in Overflow 142 Overflow Storage 144 What the Levels of Granularity Will Be 147 Some Feedback Loop Techniques 148 Levels of Granularity — Banking Environment 150 Feeding the Data Marts 157 Summary 157 Chapter 5 The Data Warehouse and Technology 159 Managing Large Amounts of Data 159 Managing Multiple Media 161 Indexing and Monitoring Data 162 Interfaces to Many Technologies 162 Programmer or Designer Control of Data Placement 163 Parallel Storage and Management of Data 164 Metadata Management 165 Language Interface 166 Efficient Loading of Data 166 Efficient Index Utilization 168 Compaction of Data 169 Compound Keys 169 Variable-Length Data 169 Lock Management 171 Index-Only Processing 171 Fast Restore 171 Other Technological Features 172 DBMS Types and the Data Warehouse 172 Changing DBMS Technology 174 Multidimensional DBMS and the Data Warehouse 175 Data Warehousing across Multiple Storage Media 182 The Role of Metadata in the Data Warehouse Environment 182 Context and Content 185 Three Types of Contextual Information 186 Capturing and Managing Contextual Information 187 Looking at the Past 187 Refreshing the Data Warehouse 188 Testing 190 Summary 191 Chapter 6 The Distributed Data Warehouse 193 Types of Distributed Data Warehouses 193 Local and Global Data Warehouses 194 The Local Data Warehouse 197 The Global Data Warehouse 198 Intersection of Global and Local Data 201 Redundancy 206 Access of Local and Global Data 207 The Technologically Distributed Data Warehouse 211 The Independently Evolving Distributed Data Warehouse 213 The Nature of the Development Efforts 213 Completely Unrelated Warehouses 215 Distributed Data Warehouse Development 217 Coordinating Development across Distributed Locations 218 The Corporate Data Model — Distributed 219 Metadata in the Distributed Warehouse 223 Building the Warehouse on Multiple Levels 223 Multiple Groups Building the Current Level of Detail 226 Different Requirements at Different Levels 228 Other Types of Detailed Data 232 Metadata 234 Multiple Platforms for Common Detail Data 235 Summary 236 Chapter 7 Executive Information Systems and the Data Warehouse 239 EIS — The Promise 240 A Simple Example 240 Drill-Down Analysis 243 Supporting the Drill-Down Process 245 The Data Warehouse as a Basis for EIS 247 Where to Turn 248 Event Mapping 251 Detailed Data and EIS 253 Keeping Only Summary Data in the EIS 254 Summary 255 Chapter 8 External Data and the Data Warehouse 257 External Data in the Data Warehouse 260 Metadata and External Data 261 Storing External Data 263 Different Components of External Data 264 Modeling and External Data 265 Secondary Reports 266 Archiving External Data 267 Comparing Internal Data to External Data 267 Summary 268 Chapter 9 Migration to the Architected Environment 269 A Migration Plan 270 The Feedback Loop 278 Strategic Considerations 280 Methodology and Migration 283 A Data-Driven Development Methodology 283 Data-Driven Methodology 286 System Development Life Cycles 286 A Philosophical Observation 286 Summary 287 Chapter 10 The Data Warehouse and the Web 289 Supporting the eBusiness Environment 299 Moving Data from the Web to the Data Warehouse 300 Moving Data from the Data Warehouse to the Web 301 Web Support 302 Summary 302 Chapter 11 Unstructured Data and the Data Warehouse 305 Integrating the Two Worlds 307 Text — The Common Link 308 A Fundamental Mismatch 310 Matching Text across the Environments 310 A Probabilistic Match 311 Matching All the Information 312 A Themed Match 313 Industrially Recognized Themes 313 Naturally Occurring Themes 316 Linkage through Themes and Themed Words 317 Linkage through Abstraction and Metadata 318 A Two-Tiered Data Warehouse 320 Dividing the Unstructured Data Warehouse 321 Documents in the Unstructured Data Warehouse 322 Visualizing Unstructured Data 323 A Self-Organizing Map (SOM) 324 The Unstructured Data Warehouse 325 Volumes of Data and the Unstructured Data Warehouse 326 Fitting the Two Environments Together 327 Summary 330 Chapter 12 The Really Large Data Warehouse 331 Why the Rapid Growth? 332 The Impact of Large Volumes of Data 333 Basic Data-Management Activities 334 The Cost of Storage 335 The Real Costs of Storage 336 The Usage Pattern of Data in the Face of Large Volumes 336 A Simple Calculation 337 Two Classes of Data 338 Implications of Separating Data into Two Classes 339 Disk Storage in the Face of Data Separation 340 Near-Line Storage 341 Access Speed and Disk Storage 342 Archival Storage 343 Implications of Transparency 345 Moving Data from One Environment to Another 346 The CMSM Approach 347 A Data Warehouse Usage Monitor 348 The Extension of the Data Warehouse across Different Storage Media 349 Inverting the Data Warehouse 350 Total Cost 351 Maximum Capacity 352 Summary 354 Chapter 13 The Relational and the Multidimensional Models as a Basis for Database Design 357 The Relational Model 357 The Multidimensional Model 360 Snowflake Structures 361 Differences between the Models 362 The Roots of the Differences 363 Reshaping Relational Data 364 Indirect Access and Direct Access of Data 365 Servicing Future Unknown Needs 366 Servicing the Need to Change Gracefully 367 Independent Data Marts 370 Building Independent Data Marts 371 Summary 375 Chapter 14 Data Warehouse Advanced Topics 377 End-User Requirements and the Data Warehouse 377 The Data Warehouse and the Data Model 378 The Relational Foundation 378 The Data Warehouse and Statistical Processing 379 Resource Contention in the Data Warehouse 380 The Exploration Warehouse 380 The Data Mining Warehouse 382 Freezing the Exploration Warehouse 383 External Data and the Exploration Warehouse 384 Data Marts and Data Warehouses in the Same Processor 384 The Life Cycle of Data 386 Mapping the Life Cycle to the Data Warehouse Environment 387 Testing and the Data Warehouse 388 Tracing the Flow of Data through the Data Warehouse 390 Data Velocity in the Data Warehouse 391 “Pushing” and “Pulling” Data 393 Data Warehouse and the Web-Based eBusiness Environment 393 The Interface between the Two Environments 394 The Granularity Manager 394 Profile Records 396 The ODS, Profile Records, and Performance 397 The Financial Data Warehouse 397 The System of Record 399 A Brief History of Architecture — Evolving to the Corporate Information Factory 402 Evolving from the CIF 404 Obstacles 406 CIF — Into the Future 406 Analytics 406 Erp/sap 407 Unstructured Data 408 Volumes of Data 409 Summary 410 Chapter 15 Cost-Justification and Return on Investment for a Data Warehouse 413 Copying the Competition 413 The Macro Level of Cost-Justification 414 A Micro Level Cost-Justification 415 Information from the Legacy Environment 418 The Cost of New Information 419 Gathering Information with a Data Warehouse 419 Comparing the Costs 420 Building the Data Warehouse 420 A Complete Picture 421 Information Frustration 422 The Time Value of Data 422 The Speed of Information 423 Integrated Information 424 The Value of Historical Data 425 Historical Data and CRM 426 Summary 426 Chapter 16 The Data Warehouse and the ODS 429 Complementary Structures 430 Updates in the ODS 430 Historical Data and the ODS 431 Profile Records 432 Different Classes of ODS 434 Database Design — A Hybrid Approach 435 Drawn to Proportion 436 Transaction Integrity in the ODS 437 Time Slicing the ODS Day 438 Multiple ODS 439 ODS and the Web Environment 439 An Example of an ODS 440 Summary 441 Chapter 17 Corporate Information Compliance and Data Warehousing 443 Two Basic Activities 445 Financial Compliance 446 The “What” 447 The “Why” 449 Auditing Corporate Communications 452 Summary 454 Chapter 18 The End-User Community 457 The Farmer 458 The Explorer 458 The Miner 459 The Tourist 459 The Community 459 Different Types of Data 460 Cost-Justification and ROI Analysis 461 Summary 462 Chapter 19 Data Warehouse Design Review Checklist 463 When to Do a Design Review 464 Who Should Be in the Design Review? 465 What Should the Agenda Be? 465 The Results 465 Administering the Review 466 A Typical Data Warehouse Design Review 466 Summary 488 Glossary 489 References 507 Articles 507 Books 510 White Papers 512 Index 517

    2 in stock

    £35.15

  • Professional Windows Desktop and Server Hardening

    John Wiley & Sons Inc Professional Windows Desktop and Server Hardening

    Out of stock

    Book SynopsisToday's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers are using the same tricks they always have. With this book, Microsoft MVP Roger Grimes exposes the real threat to Windows computers and offers practical guidance to secure those systems.Table of ContentsAcknowledgments. Introduction. Part I: The Basics in Depth. Chapter 1: Windows Attacks. Chapter 2: Conventional and Unconventional Defenses. Chapter 3: NTFS Permissions 101. Part II: OS Hardening. Chapter 4: Preventing Password Crackers. Chapter 5: Protecting High-Risk Files. Chapter 6: Protecting High-Risk Registry Entries. Chapter 7: Tightening Services. Chapter 8: Using IPSec. Part III: Application Security. Chapter 9: Stopping Unauthorized Execution. Chapter 10: Securing Internet Explorer. Chapter 11: Protecting E-mail. Chapter 12: IIS Security. Chapter 13: Using Encrypting File System. Part IV: Automating Security. Chapter 14: Group Policy Explained. Chapter 15: Designing a Secure Active Directory Infrastructure. Book Summary. Index.

    Out of stock

    £23.99

  • Engineering Networks for Synchronization CCS 7

    John Wiley & Sons Inc Engineering Networks for Synchronization CCS 7

    Out of stock

    Book SynopsisIn view of the extensive development of CCS 7 and fast-paced growth of ISDN in telecommunication networks throughout the world, this valuable resource serves as a timely reference and guide. Practical and up-to-date, Engineering Networks for Synchronization, CCS 7, and ISDN provides in-depth instruction on three important and closely related elements of the modern digital network: network synchronization, CCITT Common Channel Signaling System No. 7 (CCS 7), and Narrowband ISDN.Table of ContentsSeries Editor's Note. Foreword. Preface. Introduction. Digital Network Synchronization: Basic Concepts. Planning, Testing, and Monitoring Network Synchronization. CCS 7: General Description. Introduction to ISDN. Functions of the CCS 7 Signaling Link Level. Signaling Network Functions in CCS 7. ISDN: Services and Protocols. CCS 7 ISDN User Part. CCS 7 Planning and Implementation. Testing in CCS 7. Packet and Frame Mode Services in the ISDN. Planning and Implementation the ISDN. Testing in the ISDN. Timing in SONET and SDH. Appendix 1: Ordering Information. Appendix 2: List of ISUP Messages. Index. About the Author.

    Out of stock

    £187.16

  • Educause Leadership Strategies Preparing Your

    John Wiley & Sons Inc Educause Leadership Strategies Preparing Your

    Out of stock

    Book SynopsisAnyone with a serious interest in the future of education will find this book provocative, prescient, prescriptive, and pivotal. It is a must--read for those responsible for preparing educational institutions at all levels for their new role in our networked society. ----Vinton G.Trade Review"Anyone with a serious interest in the future of education will find this book provocative, prescient, prescriptive, and pivotal. It is a must-read for those responsible for preparing educational institutions at all levels for their new role in our networked society." (Vinton G. Cerf, senior vice president, MCI WORLDCOM, and chairman, Internet Society) "Transformative. That's what networks are; that's the role our institutions must fill for society; and that's what our leadership must be. This book provides valuable insight into networks and the challenges we must address to ensure that higher education thrives in the Knowledge Age." (Molly Corbett Broad, president, University of North Carolina) "The networks of today and tomorrow are not merely collections of wired computers; they are engines of transformation that will affect virtually every aspect of life in the academy. This book will prove essential to presidents and other campus leaders who must plan for, and invest in, the networking infrastructures that will powerfully impact the futures of our institutions." (John Hitt, president, University of Central Florida) "Libraries, classrooms, and pedagogy are already on the short list of targets transformed by networking technologies. All of educational practice will eventually contribute to the creative and fast-paced links that we know through the Internet. The thoughtful essays in this volume can, indeed, help us prepare for that future." (Jane Margaret "Maggie" O'Brien, president, St. Mary's College of Maryland)Table of ContentsAdvanced Networking in Higher Education's Future (M. Luker). Instructional Roles for Advanced Networks (C. Barone & M. Luker). Libraries of the Future (R. Lucier). Inventing the Advanced Internet (D. Van Houweling). Preparing the Campus for Tomorrow's Network (P. Long). Working with Neighboring Campuses (R. Hutchins). National Policy to Broaden Participation in Advanced Networking (G. Strawn & D. Staudt). How to Do More with Less (E. Chaffee). Developing a Campus Vision and Leading the Way to Change (M. Luker).

    Out of stock

    £23.74

  • Networking Essentials A CompTIA Network N10006

    Pearson Education Networking Essentials A CompTIA Network N10006

    Out of stock

    Book Synopsis

    Out of stock

    £52.70

  • Philosophical Perspectives on ComputerMediated

    State University Press of New York (SUNY) Philosophical Perspectives on ComputerMediated

    Out of stock

    Book SynopsisThe rush to the Information Superhighway and the transition to an Information Age have enormous political, ethical, and religious consequences. The essays collected here develop both interdisciplinary and international perspectives on privacy, critical thinking and literacy, democratization, gender, religion, and the very nature of the revolution promised in cyberspace. These essays are essential reading for anyone who wants to better understand and reflect upon these events and issues.

    Out of stock

    £24.27

  • The Illusion of Net Neutrality

    Hoover Institution Press,U.S. The Illusion of Net Neutrality

    15 in stock

    Book Synopsis

    15 in stock

    £18.95

  • Emerging Trends in Database and Knowledge Based

    IEEE Computer Society Press,U.S. Emerging Trends in Database and Knowledge Based

    Out of stock

    Book Synopsis

    Out of stock

    £62.06

  • The Early History of Data Networks

    IEEE Computer Society Press,U.S. The Early History of Data Networks

    Out of stock

    Book Synopsis

    Out of stock

    £73.76

  • Netizens History Impact Usenet Internet

    IEEE Computer Society Press,U.S. Netizens History Impact Usenet Internet

    Out of stock

    Book SynopsisNetizens, one of the first books detailing the Internet, looks at the creation and development of this participatory global computer network. The authors conducted online research to find out what makes the Internet tick. This research results in an informative examination of the pioneering vision and actions that have helped make the Net possible. The book is a detailed description of the Net''s construction and a step-by-step view of the past, present, and future of the Internet, the Usenet and the WWW. The book gives you the needed perspective to understand how the Net can impact the present and the turbulent future. These questions are answered: What is the vision that inspired or guided these people at each step? What was the technical or social problem or need that they were trying to solve? What can be done to help nourish the future extension and development of the Net? How can the Net be made available to a broader set of people?

    Out of stock

    £56.66

  • Parallel Database Techniques

    IEEE Computer Society Press,U.S. Parallel Database Techniques

    Out of stock

    Book Synopsis

    Out of stock

    £72.86

  • Principles of Soil Chemistry Third Edition Books

    Taylor & Francis Inc Principles of Soil Chemistry Third Edition Books

    1 in stock

    Book SynopsisAs we reach the data transmission limits of copper wire and communications experts seek to bring the speed of long-haul fiber optics networks closer to access points, optical interconnects promise to provide efficient, high-speed data transmission for the next generation of networks and systems. They offer higher bit-rates, virtually no crosstalk, lower demands on power requirements and thermal management, and the possibility of two-dimensional channel arrays for chip-to-chip communication.The Handbook of Optical Interconnects introduces the systems and devices that will bring the speed and quality of optical transmission closer to the circuit board. Contributed by active experts, most from leading technology companies in the US and Japan, this outstanding handbook details various low-cost and small-size configurations, illustrates the discussion with more than 300 figures, and offers a look at the applications and future of this exciting and rapidly growing field. The book incTable of ContentsVCSEL: Vertical Cavity Surface-Emitting Laser. Microlens. GRIN Lenses. Development of Diffractive Optics and Future Challenges. Planar Optics. Optical Bus Technology. Fiber Optics. Plastic Optical Fiber. Optical Fiber Jisso Technology. Optical Connectors. Parallel Optical Links. Broadband Networks and Optical Interconnections.

    1 in stock

    £204.25

  • Die Design Fundamentals

    Industrial Press Inc.,U.S. Die Design Fundamentals

    Out of stock

    Book SynopsisRetaining its unique and much praised organization, this leading text has been revised to reflect the most recent developments in design tools. It provides balanced coverage of relevant fundamentals and real-world practices so that students, apprentices and on-the-job professionals can understand the important and often complex interrelationships between die design and the economic factors involved in manufacturing sheet-metal forming products. Following introductory material and a discussion of 20 types of dies in Chapter 2, the design process of a representative die is separated into seventeen distinct chapters. Each chapter is one step which is illustrated in two ways; first, as a portion of an engineering drawing, that is, as the component is actually drawn on the design. Second, the die design is shown pictorially in order to improve the user’s visualization. In successive sections each step is detailed as it is applied to the design of the various types of dies listed

    Out of stock

    £54.00

  • Sending Your Government a Message Email

    Out of stock

    £19.76

  • Management of International Networks

    Taylor & Francis Inc Management of International Networks

    1 in stock

    Book SynopsisEffective management of a communications network can be a difficult and costly activity, and even more so when the network crosses international borders. International network managers face a number of issues that are crucial to strategic decision-making, including the varying telecommunications regulations, operators, and services found within-as well as between-different countries. Focusing on these issues, Management of International Networks clears the way for network managers to make informed, strategic decisions. The author describes each of these issues in detail and develops models-illustrated by actual case studies-that allow a quantified analysis of each. With the ability to quantitatively assess these factors, managers can forecast the potential of cost-effectively managing a network within a given country and make decisions, such as:Where to place hubs for traffic in an international network In what country to expand the network What servTable of ContentsManagement of International Networks. Theoretical Development. Regulatory Environment. Telecommunications Services Offering. Cost-Effective Management. Explorative Case. The Cost-Effective Management Model. Description of the Test Cases. Results of the Statisticall Analysis of the Cases. Conclusions,Practical Recommendations,Cost-Effective Strategies,and Future Steps. NTI/Sales Copy

    1 in stock

    £142.50

  • MPLS for Metropolitan Area Networks

    Taylor & Francis Ltd MPLS for Metropolitan Area Networks

    Out of stock

    Book SynopsisMetro Service Providers are increasingly turning to Multi-Protocol Label Switching (MPLS) to converge disparate networks and services into a unified core, maintain quality, and deliver additional value-added capabilities. MPLS for Metropolitan Area Networks addresses service providers' challenges by demonstrating solutions provided by MPLS features such as traffic engineering (TE), fast reroute, VPNs, virtual private LAN services (VPLS), and QoS. The text opens with an overview of metro networks and MPLS, describing business opportunities and challenges and how mission-critical applications can be deployed within Metropolitan Area Networks (MANs). It then examines traffic engineering issues, focusing on fundamental TE concepts, network control, trunk attributes, constraint-based routing (CBR), Resource Reservation Protocol with TE extensions (RSVP-TE), and resource optimization.Following a discussion on how MPLS can bring increased reliability to MANs, the author theTable of ContentsMetropolitan area networks and MPLS. Traffic engineering aspects of metropolitan area networks. Reliability aspect of metropolitan area networks. Service aspect of metropolitan area networks. Quality of service aspect of metropolitan area networks.

    Out of stock

    £114.00

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account