- Table View
- List View
Network Warrior
by Gary A. DonahueWritten by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers:The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending dataHubs, repeaters, switches, and trunks in practiceAuto negotiation and why it 's a common problem in network slowdownsRoute maps, routing protocols, and switching algorithms in Cisco routersThe resilient Ethernet -- how to make things truly redundantCisco 6500 multi-layer switches and the Catalyst 3750 switchTelecom nomenclature -- why it 's different from the data worldT1 and DS3Firewall theory, designing access lists, authentication in Cisco devicesServer load balancing technologyContent switch module in actionDesigning QOS and what QOS does not doIP design and subnetting made easyThe book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.
Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam (O'reilly Ser.)
by Gary A. DonahuePick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.Topics include:An in-depth view of routers and routingSwitching, using Cisco Catalyst and Nexus switches as examplesSOHO VoIP and SOHO wireless access point design and configurationIntroduction to IPv6 with configuration examplesTelecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLSSecurity, firewall theory, and configuration, as well as ACL and authenticationQuality of Service (QoS), with an emphasis on low-latency queuing (LLQ)IP address allocation, Network Time Protocol (NTP), and device failures
Network Your Computers & Devices Step by Step
by Ciprian Adrian Rusen 7 TutorialsTeach yourself how to use the networking features in Windows 7 to connect your home computers, even if they use different operating systems. With Step by Step, you set the pace -- building and practicing the skills you need, just when you need them! Network your Windows 7-based PCs and set up security Add a Mac or Linux-based computer Share printers, devices, and files with everyone in your home Stream media over your network or to a remote PC Tweak your network and sharing settings Troubleshoot problems and perform easy maintenance Your Step by Step digital content includes: Fully searchable online edition of this book -- with unlimited access on the Web
Network and Communication: Research on the Development of Electronic Information Engineering Technology in China
by Chinese Academy of EngineeringCurrently, there are global endeavors to integrate network information into the natural world and human society. This process will lead to marked improvements in productivity and product quality, and to new production methods and lifestyles. Further, these advances will have significant impacts, similar to those of the agricultural and industrial revolutions. At the same time, it is profoundly changing competition around the globe. Security, economic, social, military and cultural trends generate new opportunities for national development, new living spaces for humans, new fields of social governance, and new momentum for industrial upgrading and international competition. Over the next 20 years, the development of network communication technologies will focus on three-domain human-network-thing interconnections and their systematic integration into various industries and regions. This will be made possible by digitalization, networking and intellectualization, and will result in the extended connection of human societies around the globe, and a continuously enriched and expanded network space.This book summarizes the development of network communication, both globally and in China, as well as its future prospects from the perspectives of academia, technology and industry. Further, in the context of technology and applications, it focuses on mobile communication, data communication, and optical fiber communication. Discussing application services related to the mobile Internet, Internet of Things, edge computing and quantum communication, it highlights the latest technological advances, future trends, technologies and industry development hotspots. Lastly, it explores 15 buzzwords in the field of network communication in technology and industrial development, providing definitions, and describing the state of development of related applications.
Network and Data Security for Non-Engineers (Technology for Non-Engineers)
by Frank M. Groom Stephan S. Jones Kevin GroomLearn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
Network and Parallel Computing
by Barbara Chapman Wenguang Chen Xinbo Gao Guang R. Gao Depei QianThis book constitutes the proceedings of the 13th IFIP WG 10. 3 International Conference on Network and Parallel Computing, NPC 2016, held in Xi'an, China, in October 2016. The 17 full papers presented were carefully reviewed and selected from 99 submissions. They are organized in the following topical sections; memory: non-volatile, solid state drives, hybrid systems; resilience and reliability; scheduling and load-balancing; heterogeneous systems; data processing and big data; and algorithms and computational models.
Network and Parallel Computing
by Hai Jin Xuanhua Shi Hong An Chao Wang Mahmut KandemirThis book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2007. It covers network applications: cluster and grid computing, peer-to-peer computing; network technologies: network algorithms, network reliability and dependability; network and parallel architectures: multicore design issues, performance modeling and evaluation; and parallel and distributed software: data mining, parallel programming tools and compilers.
Network and Parallel Computing: 16th IFIP WG 10.3 International Conference, NPC 2019, Hohhot, China, August 23–24, 2019, Proceedings (Lecture Notes in Computer Science #11783)
by Quan Chen Xiaoxin Tang Pradip Bose Weiming Zheng Jean-Luc GaudiotThis book constitutes the proceedings of the 16th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2019, held in Hohhot, China, in August 2019. The 22 full and 11 short papers presented in this volume were carefully reviewed and selected from 107 submissions. They were organized in topical sections named: graph computing; NOC and networks; neural networks; big data and cloud; HPC; emerging topics; memory and file system.
Network and Parallel Computing: 17th IFIP WG 10.3 International Conference, NPC 2020, Zhengzhou, China, September 28–30, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12639)
by Xin He En Shao Guangming TanThis book constitutes the proceedings of the 17th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2020, held in Zhengzhou, China, in September 2020. The 34 full and 7 short papers presented in this volume were carefully reviewed and selected from 95 submissions. They were organized in topical sections named: accelerator; AI; algorithm; architecture and hardware; big data and cloud; edge computing; emerging; network; and storage.
Network and Parallel Computing: 18th IFIP WG 10.3 International Conference, NPC 2021, Paris, France, November 3–5, 2021, Proceedings (Lecture Notes in Computer Science #13152)
by Depei Qian Christophe Cérin Jean-Luc Gaudiot Guangming Tan Stéphane ZuckermanThis book constitutes the proceedings of the 18th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2021, which was held in Paris, France during November 3-5, 2021.The 20 papers presented in this volume were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: algorithms and applications; system software and resource management; storage; and networks and communications.
Network and Parallel Computing: 19th IFIP WG 10.3 International Conference, NPC 2022, Jinan, China, September 24–25, 2022, Proceedings (Lecture Notes in Computer Science #13615)
by Shaoshan Liu Xiaohui WeiThis book constitutes the proceedings of the 19th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2022, which was held in Jinan, China, during September 24-25, 2022. The 23 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: computer architecture; cloud computing; deep learning; emerging applications; and storage and IO.
Network and Parallel Computing: 20th IFIP WG 10.3 International Conference, NPC 2024, Haikou, China, December 7–8, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15527)
by Xu Chen Xia Xie Geyong Min Deke Guo Lingjun PuThis two part LNCS 15227 and 15528 volumes constitutes the proceedings of the 20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024, which was held in Haikou, China, during December 7–8, 2024. The 76 full papers presented in this volume were carefully reviewed and selected from 200 submissions. They are organized according to the following topics: Part-I : High-performance and Parallel Computing; Novel Memory and Storage Systems; and Emerging Architectures and Systems. Part-II : Edge Computing and Intelligence; Federated Learning Algorithms and Systems; Emerging Networks; and In-network Computing and Processing.
Network and Parallel Computing: 20th IFIP WG 10.3 International Conference, NPC 2024, Haikou, China, December 7–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15528)
by Xu Chen Xia Xie Geyong Min Deke Guo Lingjun PuThis two part LNCS 15227 and 15528 volumes constitutes the proceedings of the 20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024, which was held in Haikou, China, during December 7–8, 2024. The 76 full papers presented in this volume were carefully reviewed and selected from 200 submissions. They are organized according to the following topics: Part-I : High-performance and Parallel Computing; Novel Memory and Storage Systems; and Emerging Architectures and Systems. Part-II : Edge Computing and Intelligence; Federated Learning Algorithms and Systems; Emerging Networks; and In-network Computing and Processing.
Network and Parallel Computing: IFIP International Conference, NPC 2007, Dalian, China, September 18-21, 2007, Proceedings (Lecture Notes in Computer Science #4672)
by Marc Snir Hironori Kasahara Feng Zhang Hai Jin Jidong Zhai Mateo ValeroThis book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018. <P><P>The 22 full and 12 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The papers cover traditional areas of network and parallel computing, including parallel applications, distributed algorithms, parallel architectures, software environments, and distributed tools.
Network and System Security
by Vincenzo Piuri Moti Yung Jiageng Chen Chunhua SuThis book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.
Network and System Security: 12th International Conference, Nss 2018, Hong Kong, China, August 27-29, 2018, Proceedings (Lecture Notes in Computer Science #11058)
by Jin Li Cong Wang Aniello Castiglione Man Ho Au Siu Ming Yiu Xiapu Luo Kamil KluczniakThis book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.
Network and System Security: 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings (Lecture Notes in Computer Science #11928)
by Xinyi Huang Joseph K. LiuThis book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings (Lecture Notes in Computer Science #12570)
by Jun Zhang Chao Chen Mirosław KutyłowskiThis book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems.Due to the Corona pandemic the event was held virtually.
Network and System Security: 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings (Lecture Notes in Computer Science #13041)
by Yang Liu Min Yang Chao ChenThis book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021. The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings (Lecture Notes in Computer Science #13787)
by Cristina Alcaraz Suryadipta Majumdar Xingliang Yuan Guangdong BaiThis book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
Network and System Security: 17th International Conference, NSS 2023, Canterbury, UK, August 14–16, 2023, Proceedings (Lecture Notes in Computer Science #13983)
by Shujun Li Atsuko Miyaji Mark ManulisThis book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14–16, 2023.The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.
Network and System Security: 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20–22, 2024, Proceedings (Lecture Notes in Computer Science #15564)
by Saed Alrabaee Roberto Di Pietro Houbing Herbert Song Mohammad Tubishat Mousa Al-Kfairy Omar AlfandiThis book constitutes the refereed proceedings of the 18th International Conference on Network and System Security, NSS 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024. The 21 full papers presented in this book were carefully reviewed and selected from 62 submissions. They are grouped into these topical sections: authentication and security; privacy and encryption; malware detection and prevention; system security and prevention; network and infrastructure security; blockchain and smart contracts; and data security.
Network of Things Engineering (NoTE) Lab
by Admela Jukan Xavi Masip-Bruin Jasenka Dizdarević Francisco CarpioThis book provides a hands-on experience in software and hardware engineering of IoT devices in edge and cloud computing systems, by putting in practice state-of-the-art concepts of hardware devices, networking and computing software. It proposes a Network of Things Engineering (NoTE) Lab, with seven hands-on lab modules covering topics ranging from “Interfacing sensors and actuators” and “Connecting IoT and Edge with MQTT" to “Data pipelining in cloud computing”. All tools and software used in the NoTE Lab are free and open source, and available to the readers. Specifically, Arduino-based boards that support a variety of low-cost sensors and actuators are used in IoT context. In edge computing, NoTE Lab implements off-the-shelf single board computers, Raspberry Pis with corresponding software and hardware. For cloud, well-known and widely used cloud computing open-source tools (e.g., Kubernetes) are deployed, where readers can learn the basics of monitoring and managing containers in cloud computing. Three communication protocols are used in the end-to-end setup, including MQTT, AMQP and HTTP. This lab book is a "must experiment with" for anybody in academia and industry participating in the fascinating IoT-edge-cloud continuum development.
Network+ Guide to Networks (5th edition)
by Tamara DeanThis book introduces the fundamental building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. It then provides in-depth coverage of the most important concepts in contemporary networking, such as TCP/IP, Ethernet, wireless transmission, and security.
Network+ Guide to Networks 6th Edition
by Tamara DeanThe completely updated NETWORK+ GUIDE TO NETWORKS, 6th Edition gives readers the technical skills and industry know-how required to begin an exciting career installing, configuring, and troubleshooting computer networks. The text also prepares readers for CompTIA's Network+ N10-005 certification exam with fundamentals in protocols, topologies, hardware, and network design. After exploring TCP/IP, Ethernet, wireless transmission, and security concepts, as well as an all-new chapter on virtual networks, readers can increase their knowledge with the practical "On-the Job" stories, Review Questions, Hands-On Projects, and Case Projects