Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Explains how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use.
Provides a methodology for maximizing speed while meeting other design goals. This book examines the implementation bottlenecks that are most often encountered at 4 disparate levels of implementation: protocol, OS, hardware, and architecture. It addresses the bottlenecks found in different kinds of network devices, and offers ways to break them.
Teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. This book includes coverage of the topics of importance to networking professionals and students, including P2P, wireless, security, and applications.
Explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. This book is suitable for Java programmers interested in Bluetooth wireless technology and business managers interested in its potential for creating fresh business opportunities.
Devoted exclusively to IP-based services, this work focuses on the IP technologies that offer your service and its users the greatest value, including MPLS, Voice Over IP, and multicast. It also provides the technical coverage required for successful implementation, according to the terms of the business model you choose.
Explains Virtual Private Network (VPN) concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions. This book covers VPN topics like tunneling, encapsulation, encryption, security, and protocols. It lists and assesses the software and hardware products you may need to implement a VPN.
Teaches the principles at work in an integrated approach to systems management. This book covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures. It describes the functionality of management tools used in the real world - and advice on choosing one right for your organization.
Offers a dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. This book provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, and encryption.
Examines the complex interrelationships of laws, technologies, and business practices, and equips you with the practical understanding you need to run your enterprise optimally within legal boundaries. This work also explores telecommunications law in the US, at both the federal and state level.
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. This work discusses system requirements, information models, and system components for Policy-Based Management. It cuts through the hype surrounding PBNM making it approachable.
The Globus Toolkit is a key technology in Grid Computing that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. This book situates Globus application development within the context of Web Services and evolving Grid standards.
Introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.
Explores TCP/IP networking that can benefit newcomers and veterans alike. This book reflects technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS).
Serving as a guide to the Quality of Service (QoS) techniques, this title addresses the Internet's special challenges. It focuses on the four main areas of Internet QoS: integrated services, differentiated services, MPLS (Multiprotocol Label Switching), and traffic engineering.
Presents information on protecting and restoring communication networks. This title helps you learn specific techniques that work at various layers of the networking hierarchy - including optical, SONET-SDH, IP, and MPLS-as well as multi-layer escalation strategies that offer the highest level of protection.
Suitable for software architects, designers and programmers, hardware developers, system testers and network operators - and also for managers and other decision-makers, this work provides a practical look at GMPLS protocols for signaling, routing, link and resource management and traffic engineering.
Guides readers through implementation and deployment of IPv6. This edition offers comprehensive coverage of important topics including router and server configuration, security, the impact of IPv6 on mobile networks, and evaluating the impact of IPv6-enabled networks globally.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.