Utvidet returrett til 31. januar 2025

Bøker i The Morgan Kaufmann Series in Networking-serien

Filter
Filter
Sorter etterSorter Serierekkefølge
  • av Timothy J. (Motorola Inc. Thompson
    663,-

    Explains how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use.

  • - An Interdisciplinary Approach to Designing Fast Networked Devices
    av ca, Santa Clara, USA) Varghese & m.fl.
    819 - 1 126,-

    Provides a methodology for maximizing speed while meeting other design goals. This book examines the implementation bottlenecks that are most often encountered at 4 disparate levels of implementation: protocol, OS, hardware, and architecture. It addresses the bottlenecks found in different kinds of network devices, and offers ways to break them.

  • - A Systems Approach
    av APJ) Davie, Bruce S. (VMware & Larry L. (Open Networking Foundation) Peterson
    1 240,-

    Teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. This book includes coverage of the topics of importance to networking professionals and students, including P2P, wireless, security, and applications.

  • av C Bala (Freescale Semiconductor Inc. Kumar
    1 006,-

    Explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. This book is suitable for Java programmers interested in Bluetooth wireless technology and business managers interested in its potential for creating fresh business opportunities.

  • - Solutions for Service Providers and Vendors
    av Monique (Cisco Systems) Morrow
    1 023,-

    Devoted exclusively to IP-based services, this work focuses on the IP technologies that offer your service and its users the greatest value, including MPLS, Voice Over IP, and multicast. It also provides the technical coverage required for successful implementation, according to the terms of the business model you choose.

  • - Making the Right Connection
    av Dennis Fowler
    766,-

    Explains Virtual Private Network (VPN) concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions. This book covers VPN topics like tunneling, encapsulation, encryption, security, and protocols. It lists and assesses the software and hardware products you may need to implement a VPN.

  • - Concepts, Architectures and their Operational Application
    av Heinz-Gerd Hegering
    1 520,-

    Teaches the principles at work in an integrated approach to systems management. This book covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures. It describes the functionality of management tools used in the real world - and advice on choosing one right for your organization.

  • - A Practical Approach
    av Jan L. (Professor and Department Chair Harrington
    818,-

    Offers a dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. This book provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, and encryption.

  • av Sharon K. (University of Colorado Black
    1 520,-

    Examines the complex interrelationships of laws, technologies, and business practices, and equips you with the practical understanding you need to run your enterprise optimally within legal boundaries. This work also explores telecommunications law in the US, at both the federal and state level.

  • - Solutions for the Next Generation
    av John (Intelliden Corporation) Strassner
    1 237,-

    Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. This work discusses system requirements, information models, and system components for Policy-Based Management. It cuts through the hype surrounding PBNM making it approachable.

  • - Programming Java Services
    av Borja (Administrator of the Globus Documentation Project and<br>author of the popular web-based GT3 and GT4 Programmer's Tutorials) Sotomayor
    775,-

    The Globus Toolkit is a key technology in Grid Computing that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. This book situates Globus application development within the context of Web Services and evolving Grid standards.

  • - An Information Processing Approach
    av Feng (Microsoft Research Zhao
    1 092,-

    Introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.

  • av Peter (Internet-Standard.com Loshin
    1 092,-

    Explores TCP/IP networking that can benefit newcomers and veterans alike. This book reflects technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS).

  • - Architectures and Mechanisms for Quality of Service
    av Zheng Wang
    1 092,-

    Serving as a guide to the Quality of Service (QoS) techniques, this title addresses the Internet's special challenges. It focuses on the four main areas of Internet QoS: integrated services, differentiated services, MPLS (Multiprotocol Label Switching), and traffic engineering.

  • - Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
    av Jean-Philippe (Distinguished Engineer at Cisco Systems) Vasseur, Piet (Ghent University Demeester & Mario (Ghent University Pickavet
    1 194,-

    Presents information on protecting and restoring communication networks. This title helps you learn specific techniques that work at various layers of the networking hierarchy - including optical, SONET-SDH, IP, and MPLS-as well as multi-layer escalation strategies that offer the highest level of protection.

  • - Architecture and Applications
    av Adrian (Founder of Old Dog Consulting Farrel
    955,-

    Suitable for software architects, designers and programmers, hardware developers, system testers and network operators - and also for managers and other decision-makers, this work provides a practical look at GMPLS protocols for signaling, routing, link and resource management and traffic engineering.

  • - Theory, Protocol, and Practice
    av Pete (Internet-Standard.com Loshin
    1 006,-

    Guides readers through implementation and deployment of IPv6. This edition offers comprehensive coverage of important topics including router and server configuration, security, the impact of IPv6 on mobile networks, and evaluating the impact of IPv6-enabled networks globally.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.