Browse Results

Showing 41,701 through 41,725 of 61,361 results

NetSuite for Consultants: A handbook for ERP and CRM consultants to implement NetSuite 2021 quickly and easily

by Peter Ries

Get hands-on with NetSuite implementation, customization, and integration services for automating operations and accelerating business growthKey FeaturesUnderstand how to consult a new client from the kick-off meeting to their go-live and beyond in the fastest possible timeExplore the new features in NetSuite 2021 and learn best practices for ERP and CRM consultantsAvoid the common pitfalls that consultants can run into when implementing NetSuiteBook DescriptionNetSuite For Consultants takes a hands-on approach to help ERP and CRM consultants implement NetSuite quickly and efficiently, as well deepen their understanding of its implementation methodology.During the course of this book, you'll get a clear picture of what NetSuite is, how it works, and how accounts, support, and updates work within its ecosystem.Understanding what a business needs is a critical first step toward completing any software product implementation, so you'll learn how to write business requirements by learning about the various departments, roles, and processes in the client's organization. Once you've developed a solid understanding of NetSuite and your client, you'll be able to apply your knowledge to configure accounts and test everything with the users. You'll also learn how to manage both functional and technical issues that arise post-implementation and handle them like a professional.By the end of this book, you'll have gained the necessary skills and knowledge to implement NetSuite for businesses and get things up and running in the shortest possible time.What you will learnUnderstand the NetSuite ecosystem, including its main modules, the platform, and related featuresExplore the fundamentals of NetSuite and get ready to implement it in any organizationDiscover how to manage gaps, data migration, and integrations with NetSuiteFind out how to minimize disruptions in finance as you migrate to NetSuiteUnderstand the steps to configure your organization's account and how development and testing fit into the implementation scheduleRefine your skills with NetSuite tips and tricks and make each implementation process a successWho this book is forThis book is aimed at consultants, NetSuite users, and partners who are tasked with guiding the organizations to get their business up and running with NetSuite. Basic NetSuite training and a general understanding of its features is required to get the most out of this book.

NetSuite For Dummies

by Julie Kelly Luke Braud Malin Huffman

NetSuite is an easy-to-use, customizable enterprise software for running your business. Part I explains NetSuite basics everyone should know. Part II focuses on tracking money (accounting, AR, AP, and managing inventory). Parts III, IV, and V explain how to sell and market your products, take care of customers, and sell goods online with NetSuite. Part VI describes how to gauge your progress using dashboards and analytics. Bonus chapters provide information about scripting, customization, and setting up your Web site (see the Downloads tab). Table of contents:Part 1: NetSuite BasicsPart II: Using NetSuite's Various ComponentsPart III: How to use NetSuite for your specific businessPart IV: Configuring NetSuitePart V: Getting organized with NetSuite. Bringing it all togetherPart VI: Advanced stuffPart VII: The Part of Tens

NetSuite OneWorld Implementation 2011 R2

by Thomas Foydel

This book is a focused, step-by step tutorial that shows you how to successfully implement NetSuite OneWorld into your organization. It is written in an easy-to-read style, with a strong emphasis on real-world, practical examples with step-by-step explanations. The book focuses on NetSuite OneWorld 2011 R1. If you are an application administrator, business analyst, project team member or business process owner who wants to implement NetSuite OneWorld into your organization, then this book is for you. This book might also be useful if you are a business manager considering a new system for your organization, by providing a real assessment of the current system landscape in relation to NetSuite OneWorld. You should have a basic understanding of business management systems and their implementation. You should also have basic knowledge of NetSuite as an integrated business system and NetSuite OneWorld specifically.

Netty in Action

by Norman Maurer Marvin Wolfthal

SummaryNetty in Action introduces the Netty framework and shows you how to incorporate it into your Java network applications. You'll learn to write highly scalable applications without the need to dive into the low-level non-blocking APIs at the core of Java.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyNetty is a Java-based networking framework that manages complex networking, multithreading, and concurrency for your applications. And Netty hides the boilerplate and low-level code, keeping your business logic separate and easier to reuse. With Netty, you get an easy-to-use API, leaving you free to focus on what's unique to your application.About the BookNetty in Action introduces the Netty framework and shows you how to incorporate it into your Java network applications. You will discover how to write highly scalable applications without getting into low-level APIs. The book teaches you to think in an asynchronous way as you work through its many hands-on examples and helps you master the best practices of building large-scale network apps.What's InsideNetty from the ground upAsynchronous, event-driven programmingImplementing services using different protocolsCovers Netty 4.xAbout the ReaderThis book assumes readers are comfortable with Java and basic network architecture.About the AuthorsNorman Maurer is a senior software engineer at Apple and a core developer of Netty. Marvin Wolfthal is a Dell Services consultant who has implemented mission-critical enterprise systems using Netty.Table of ContentsPART 1 NETTY CONCEPTS AND ARCHITECTURENetty-asynchronous and event-drivenYour first Netty applicationNetty components and designTransportsByteBufChannelHandler and ChannelPipelineEventLoop and threading modelBootstrappingUnit testingPART 2 CODECSThe codec frameworkProvided ChannelHandlers and codecsPART 3 NETWORK PROTOCOLSWebSocketBroadcasting events with UDPPART 4 CASE STUDIESCase studies, part 1Case studies, part 2

The Network: Portrait Conversations

by Lincoln Schatz

As the nation grapples with some of the greatest developments and challenges to date, The Network presents a dynamic portrait of the people who help shape America's current technology, policy, and education. Drawing inspiration from Richard Avedon's 1976 photographic portfolio, The Family, The Network consists of generative video portraits of 100 entrepreneurs, industrialists, politicians, scientists, scholars, inventors, and other influential figures, some of whom may be household names and others who operate behind the scenes, who play pivotal roles shaping the history and daily workings of America. The project builds on aspects of portraitist Lincoln Schatz's earlier project, Esquire's Portrait of the 21st Century (National Portrait Gallery, Smithsonian Institution), taking a closer look at how the touchstones of America are created and preserved.

Network Administration with FreeBSD 7

by Babak Farrokhi

This book first covers the basics on each topic clearly and then gives examples, so that you understand the topic clearly and can work on it independently after you have worked through the book. This book is for Network Administrators who would like to work with FreeBSD and are looking for skills beyond installation and configuration of FreeBSD.

Network Analysis and Architecture (Signals and Communication Technology)

by Yu-Chu Tian Jing Gao

This book covers network analysis and architecture for large-scale computer network planning. Networks and the Internet are essential for modern industries and societies. Building a new network, upgrading an existing network, or planning to use a public network requires integrating various network mechanisms and technologies in a cohesive fashion. This demands a deep understanding of the concepts, principles, processes, approaches, and good practices of advanced network planning. More specifically, emphasizing service-based networking, the book introduces structured processes for network planning, provides systematic approaches for network analysis and architecture, develops network planning specifications, and discusses high-level network architectural models from various perspectives. It also offers detailed discussions on component-based architecture about addressing, routing, performance, management, and security and privacy. Recent developments in data centers, virtualization, and cloud are also embedded into the network architecture. Moreover, the book includes a comprehensive introduction to building practical TCP/IP network communications via sockets with practical examples. The book is suitable for use as a textbook for senior undergraduate and postgraduate students or as a reference book for network practitioners looking to develop or enhance their skills in network planning.

Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

by Yoram Orzach Nagendra Kumar Yogesh Ramdoss

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2Key Features Place Wireshark 2 in your network and configure it for effective network analysis Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease A practical guide with exciting recipes on a widely used network protocol analyzerBook DescriptionThis book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you’ve learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you’ll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them.What you will learn Configure Wireshark 2 for effective network analysis and troubleshooting Set up various display and capture filters Understand networking layers, including IPv4 and IPv6 analysis Explore performance issues in TCP/IP Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs Get information about network phenomena, events, and errors Locate faults in detecting security failures and breaches in networksWho this book is forThis book is for security professionals, network administrators, R&D, engineering and technical support, and communications managers who are using Wireshark for network analysis and troubleshooting. It requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.

Network Analysis Using Wireshark Cookbook

by Yoram Orzach

Network analysis using Wireshark Cookbook contains more than 100 practical recipes for analyzing your network and troubleshooting problems in the network. This book provides you with simple and practical recipes on how to solve networking problems with a step-by-step approach.This book is aimed at research and development professionals, engineering and technical support, and IT and communications managers who are using Wireshark for network analysis and troubleshooting. This book requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.

Network and Communication: Research on the Development of Electronic Information Engineering Technology in China

by Chinese Academy of Engineering

Currently, there are global endeavors to integrate network information into the natural world and human society. This process will lead to marked improvements in productivity and product quality, and to new production methods and lifestyles. Further, these advances will have significant impacts, similar to those of the agricultural and industrial revolutions. At the same time, it is profoundly changing competition around the globe. Security, economic, social, military and cultural trends generate new opportunities for national development, new living spaces for humans, new fields of social governance, and new momentum for industrial upgrading and international competition. Over the next 20 years, the development of network communication technologies will focus on three-domain human-network-thing interconnections and their systematic integration into various industries and regions. This will be made possible by digitalization, networking and intellectualization, and will result in the extended connection of human societies around the globe, and a continuously enriched and expanded network space.This book summarizes the development of network communication, both globally and in China, as well as its future prospects from the perspectives of academia, technology and industry. Further, in the context of technology and applications, it focuses on mobile communication, data communication, and optical fiber communication. Discussing application services related to the mobile Internet, Internet of Things, edge computing and quantum communication, it highlights the latest technological advances, future trends, technologies and industry development hotspots. Lastly, it explores 15 buzzwords in the field of network communication in technology and industrial development, providing definitions, and describing the state of development of related applications.

Network and Data Security for Non-Engineers (Technology for Non-Engineers)

by Frank M. Groom Stephan S. Jones Kevin Groom

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Network and Parallel Computing: 16th IFIP WG 10.3 International Conference, NPC 2019, Hohhot, China, August 23–24, 2019, Proceedings (Lecture Notes in Computer Science #11783)

by Quan Chen Xiaoxin Tang Pradip Bose Weiming Zheng Jean-Luc Gaudiot

This book constitutes the proceedings of the 16th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2019, held in Hohhot, China, in August 2019. The 22 full and 11 short papers presented in this volume were carefully reviewed and selected from 107 submissions. They were organized in topical sections named: graph computing; NOC and networks; neural networks; big data and cloud; HPC; emerging topics; memory and file system.

Network and Parallel Computing: 20th IFIP WG 10.3 International Conference, NPC 2024, Haikou, China, December 7–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15528)

by Xu Chen Geyong Min Deke Guo Xia Xie Lingjun Pu

This two part LNCS 15227 and 15528 volumes constitutes the proceedings of the 20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024, which was held in Haikou, China, during December 7–8, 2024. The 76 full papers presented in this volume were carefully reviewed and selected from 200 submissions. They are organized according to the following topics: Part-I : High-performance and Parallel Computing; Novel Memory and Storage Systems; and Emerging Architectures and Systems. Part-II : Edge Computing and Intelligence; Federated Learning Algorithms and Systems; Emerging Networks; and In-network Computing and Processing.

Network and Parallel Computing: 20th IFIP WG 10.3 International Conference, NPC 2024, Haikou, China, December 7–8, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15527)

by Xu Chen Geyong Min Deke Guo Xia Xie Lingjun Pu

This two part LNCS 15227 and 15528 volumes constitutes the proceedings of the 20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024, which was held in Haikou, China, during December 7–8, 2024. The 76 full papers presented in this volume were carefully reviewed and selected from 200 submissions. They are organized according to the following topics: Part-I : High-performance and Parallel Computing; Novel Memory and Storage Systems; and Emerging Architectures and Systems. Part-II : Edge Computing and Intelligence; Federated Learning Algorithms and Systems; Emerging Networks; and In-network Computing and Processing.

Network and Parallel Computing

by Guang R. Gao Depei Qian Xinbo Gao Barbara Chapman Wenguang Chen

This book constitutes the proceedings of the 13th IFIP WG 10. 3 International Conference on Network and Parallel Computing, NPC 2016, held in Xi'an, China, in October 2016. The 17 full papers presented were carefully reviewed and selected from 99 submissions. They are organized in the following topical sections; memory: non-volatile, solid state drives, hybrid systems; resilience and reliability; scheduling and load-balancing; heterogeneous systems; data processing and big data; and algorithms and computational models.

Network and Parallel Computing: 17th IFIP WG 10.3 International Conference, NPC 2020, Zhengzhou, China, September 28–30, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12639)

by Xin He En Shao Guangming Tan

This book constitutes the proceedings of the 17th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2020, held in Zhengzhou, China, in September 2020. The 34 full and 7 short papers presented in this volume were carefully reviewed and selected from 95 submissions. They were organized in topical sections named: accelerator; AI; algorithm; architecture and hardware; big data and cloud; edge computing; emerging; network; and storage.

Network and Parallel Computing: 19th IFIP WG 10.3 International Conference, NPC 2022, Jinan, China, September 24–25, 2022, Proceedings (Lecture Notes in Computer Science #13615)

by Shaoshan Liu Xiaohui Wei

This book constitutes the proceedings of the 19th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2022, which was held in Jinan, China, during September 24-25, 2022. The 23 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: computer architecture; cloud computing; deep learning; emerging applications; and storage and IO.

Network and Parallel Computing: 18th IFIP WG 10.3 International Conference, NPC 2021, Paris, France, November 3–5, 2021, Proceedings (Lecture Notes in Computer Science #13152)

by Depei Qian Christophe Cérin Jean-Luc Gaudiot Guangming Tan Stéphane Zuckerman

This book constitutes the proceedings of the 18th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2021, which was held in Paris, France during November 3-5, 2021.The 20 papers presented in this volume were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: algorithms and applications; system software and resource management; storage; and networks and communications.

Network and Parallel Computing

by Xuanhua Shi Hong An Chao Wang Mahmut Kandemir Hai Jin

This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2007. It covers network applications: cluster and grid computing, peer-to-peer computing; network technologies: network algorithms, network reliability and dependability; network and parallel architectures: multicore design issues, performance modeling and evaluation; and parallel and distributed software: data mining, parallel programming tools and compilers.

Network and Parallel Computing: IFIP International Conference, NPC 2007, Dalian, China, September 18-21, 2007, Proceedings (Lecture Notes in Computer Science #4672)

by Feng Zhang Jidong Zhai Marc Snir Hai Jin Hironori Kasahara Mateo Valero

This book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018. <P><P>The 22 full and 12 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The papers cover traditional areas of network and parallel computing, including parallel applications, distributed algorithms, parallel architectures, software environments, and distributed tools.

Network and System Security: 12th International Conference, Nss 2018, Hong Kong, China, August 27-29, 2018, Proceedings (Lecture Notes in Computer Science #11058)

by Man Ho Au Siu Ming Yiu Jin Li Xiapu Luo Cong Wang Aniello Castiglione Kamil Kluczniak

This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.

Network and System Security

by Jiageng Chen Vincenzo Piuri Chunhua Su Moti Yung

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Network and System Security: 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings (Lecture Notes in Computer Science #11928)

by Xinyi Huang Joseph K. Liu

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings (Lecture Notes in Computer Science #12570)

by Mirosław Kutyłowski Jun Zhang Chao Chen

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems.Due to the Corona pandemic the event was held virtually.

Network and System Security: 17th International Conference, NSS 2023, Canterbury, UK, August 14–16, 2023, Proceedings (Lecture Notes in Computer Science #13983)

by Shujun Li Mark Manulis Atsuko Miyaji

This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14–16, 2023.The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.

Refine Search

Showing 41,701 through 41,725 of 61,361 results