Computer networking and communications
Sorting
Bestseller Sorting collapsed
Bestseller
Name: A-Z
Name: Z-A
Price ascending
Price descending
Publication Date ascending
Publication Date descending

E-book
Price
0
23.33 £
E-book
0
0
Price
23.33 £
Cisco TelePresence(TM) Systems (CTS) create live, face-to-face meeting experiences, providing a breakthrough virtual conferencing and collaboration experience that transcends anything previously achievable by videoconferencing.
Read more
E-book
Price
0
24.16 £
E-book
0
0
Price
24.16 £
As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
No detailed description available for "e;Ethical Password Cracking"e;.
Read more
E-book
Price
0
61.99 £
E-book
0
0
Price
61.99 £
Performance Analysis of Queuing and Computer Networks develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks.
Read more
E-book
Price
0
24.99 £
E-book
0
0
Price
24.99 £
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here!
Read more
E-book
Price
0
37.08 £
E-book
0
0
Price
37.08 £
Deployments of voice over IP (VoIP) networks continue at a rapid pace.
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
The reader-friendly explanation of how the IP address space works and how it is used A reader-friendly introduction to the complex and confusing topic of IP addressing Thorough and understandable explanations of the binary mathematics behind IP addressing Complete coverage of the IPv4 address space without distractions of routing or transport protocols Detailed explanations of subnetting and supernetting, Variable Length Subnet Masks (VLSMs), CIDR, NAT, portable address spaces, and IPv6 Strategies for managing an address space for enterprise WANs, data centers, and ISPs Numerous examples and an easy-to-read style of writing that imparts a profound understanding of IP addressing The Internet Protocol (IP) is the native protocol suite of the Internet and has become predominant in virtually all networks and internetworks.
Read more
E-book
Price
0
35.99 £
E-book
0
0
Price
35.99 £
No detailed description available for "e;Crafting Secure Software"e;.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
No detailed description available for "e;IT Audit Field Manual"e;.
Read more
E-book
Price
0
28.74 £
E-book
0
0
Price
28.74 £
This is the eBook version of the printed book.
Read more
E-book
Price
0
54.50 £
E-book
0
0
Price
54.50 £
Our physical world is grounded in three dimensions.
Read more
E-book
Price
0
26.99 £
E-book
0
0
Price
26.99 £
Understand the cyber kill chain framework and discover essential tactics and strategies to effectively prevent cyberattacksFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesExplore each stage of the cyberattack process using the cyber kill chain and track threat actor movementsLearn key components of threat intelligence and how they enhance the cyber kill chainApply practical examples and case studies for effective, real-time responses to cyber threatsBook DescriptionGain a strategic edge in cybersecurity by mastering the systematic approach to identifying and responding to cyber threats through a detailed exploration of the cyber kill chain framework.
Read more
E-book
Price
0
24.99 £
E-book
0
0
Price
24.99 £
Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
An introduction to next-generation web technologies This is a comprehensive, candid introduction to Web 2.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
An introduction to network attack mitigation with IPS Where did IPS come from?
Read more
E-book
Price
0
34.58 £
E-book
0
0
Price
34.58 £
A practical guide to hardening MPLS networks Define "e;zones of trust"e; for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services.
Read more
E-book
Price
0
32.08 £
E-book
0
0
Price
32.08 £
As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience.
Read more
E-book
Price
0
50.00 £
E-book
0
0
Price
50.00 £
Power BI Data Analysis and Visualization provides a roadmap to vendor choices and highlights why Microsoft's Power BI is a very viable, cost effective option for data visualization.
Read more
E-book
Price
0
50.00 £
E-book
0
0
Price
50.00 £
Power BI Data Analysis and Visualization provides a roadmap to vendor choices and highlights why Microsoft's Power BI is a very viable, cost effective option for data visualization.
Read more
E-book
Price
0
48.99 £
E-book
0
0
Price
48.99 £
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
Read more
E-book
Price
0
37.08 £
E-book
0
0
Price
37.08 £
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very frequently used by customers to provide secure access to devices and networks AAA solutions are difficult and confusing to implement even though they are almost mandatory Helps IT Pros choose the best identity management protocols and designs for their environments Covers AAA on Cisco routers, switches, access points, and firewalls This is the first complete, authoritative, single-source guide to implementing, configuring, and managing Authentication, Authorization and Accounting (AAA) identity management with CiscoSecure Access Control Server (ACS) 4 and 5.
Read more
E-book
Price
0
25.41 £
E-book
0
0
Price
25.41 £
As the cellular world and the Internet converge, mobile networks are transitioning from circuit to packet and the Internet Protocol (IP) is now recognized as the fundamental building block for all next-generation communication networks.
Read more
E-book
Price
0
37.91 £
E-book
0
0
Price
37.91 £
Objectives The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer's business and technical goals.
Read more
E-book
Price
0
60.99 £
E-book
0
0
Price
60.99 £
A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousands of VPNs Extensive case studies guide you through the design and deployment of real-world MPLS/VPN networks Configuration examples and guidelines assist in configuring MPLS on Cisco(R) devices Design and implementation options help you build various VPN topologies Multiprotocol Label Switching (MPLS) is an innovative technique for high-performance packet forwarding.
Read more
E-book
Price
0
34.58 £
E-book
0
0
Price
34.58 £
Design, build, configure, and support networks based on Version 6 of the Internet Protocol Coverage includes: Overview of history and motivations behind the new protocol, including the limitations of the IPv4 address space, Network Address Translation (NAT), fast growth of the Internet routing table, international issues, mobility, security, and many other topics Header format, addressing, Path MTU Discovery (PMTUD), IPv6 over link-layer technologies, Extended Unique Identifier-64-bit (EUI-64) format, Internet Control Message Protocol Version 6 (ICMPv6), autoconfiguration, neighbor discovery protocol, Duplicate Address Detection (DAD), and use of DNS with IPv6 Comparison with BGP4+, RIPng, IS-IS for IPv6, and OSPFv3 with Cisco IOS(r) Software routing references and examples Transitioning from and co-existing with IPv4 using Dual Stack, configured tunnel, generic routing encapsulation (GRE), 6to4, 6to4 Relay, Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), and Network Address Translation-Protocol Translation (NAT-PT) configurations Enabling, configuring, and operating a Cisco router with IPv6 addresses, prefixes, IPv6 ACLs, IPv6-enabled routing protocols, CEFv6, and several coexistence mechanisms Host-router interaction with Microsoft Windows, Solaris, FreeBSD, Linux, and Tru64 UNIX Preview of Internet IPv6 and address allocation on 6Bone Deploying production IPv6 connectivity in enterprise networks using prefixes allocated by ARIN, RIPE, and APNIC With the proliferation of Internet devices that require a globally unique host address such as handhelds, 3G phones, and other wireless devices, the supply of Internet addresses available will soon be exhausted.
Read more
E-book
Price
0
25.41 £
E-book
0
0
Price
25.41 £
Gain a practical understanding of the underlying concepts of the 802.
Read more
E-book
Price
0
33.74 £
E-book
0
0
Price
33.74 £
A guide to building and modifying Tcl scripts to automate network administration tasks Streamline Cisco network administration and save time with Tcl scripting Cisco networking professionals are under relentless pressure to accomplish more, faster, and with fewer resources.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information.
Read more
E-book
Price
0
34.58 £
E-book
0
0
Price
34.58 £
Contrary to popular belief, Ethernet switches are not inherently secure.
Read more
E-book
Price
0
46.99 £
E-book
0
0
Price
46.99 £
IPv6 Security Protection measures for the next Internet Protocol As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
End-to-end QoS deployment techniques for Cisco Catalyst series switches Examine various QoS components, including congestion management, congestion avoidance, shaping, policing/admission control, signaling, link efficiency mechanisms, and classification and marking Map specified class of service (CoS) values to various queues and maintain CoS values through the use of 802.
Read more
E-book
Price
0
34.58 £
E-book
0
0
Price
34.58 £
The definitive, up-to-date guide to planning, configuring, and administering Cisco call processing and voice messaging.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company's valuable information.
Read more
E-book
Price
0
32.91 £
E-book
0
0
Price
32.91 £
Enterprise Network Testing Testing Throughout the Network Lifecycle to Maximize Availability and Performance Andy Sholomon, CCIE(R) No.
Read more
E-book
Price
0
46.99 £
E-book
0
0
Price
46.99 £
The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives Overcome the challenges of working with NAT and PMTUD Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access Apply fault tolerance methods to IPSec VPN designs Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN) Add services to IPSec VPNs, including voice and multicast Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
Cisco Firewalls Concepts, design and deployment for Cisco Stateful Firewall solutions "e; In this book, Alexandre proposes a totally different approach to the important subject of firewalls: Instead of just presenting configuration models, he uses a set of carefully crafted examples to illustrate the theory in action.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
Fast answers and reliable solutions for all widely-used Cisco router features - all in one time-saving guide Organized for maximum efficiency: describes actual commands and options in the sequence they should be used Helps network pros eliminate time-consuming documentation searches Extensive updates: IPv6, MPLS, AutoQoS, SIP, MGCP, voice troubleshooting, VPNs, security, and more "e;At-a-glance"e; illustrations offer fast answers and easy double-checking Locating reliable Cisco router configuration command information can require extensive, time-consuming research.
Read more
E-book
Price
0
30.83 £
E-book
0
0
Price
30.83 £
Cisco TelePresence(TM) Systems (CTS) create live, face-to-face meeting experiences, providing a breakthrough virtual conferencing and collaboration experience that transcends anything previously achievable by videoconferencing.
Read more
E-book
Price
0
27.49 £
E-book
0
0
Price
27.49 £
Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE(R) No.
Read more
E-book
Price
0
0.01 £
E-book
0
0
Price
0.01 £
Design, configure, and manage MPLS TE to optimize network performance Almost every busy network backbone has some congested links while others remain underutilized.
Read more
E-book
Price
0
195.00 £
E-book
0
0
Price
195.00 £
From the past decade vehicular ad hoc networks got tremendous attention from the industry, academia and research community.
Read more
E-book
Price
0
195.00 £
E-book
0
0
Price
195.00 £
The concept of Industry 4.
Read more
E-book
Price
0
230.00 £
E-book
0
0
Price
230.00 £
Broadband-whether delivered via fiber, cable modem, mobile or fixed wireless, copper wire, or satellite-is increasingly the technology underlying telecommunications services such as voice, video, and data.
Read more
E-book
Price
0
230.00 £
E-book
0
0
Price
230.00 £
The emergence of big data is expected to change business dynamics in different organizations and the value behind big data is evident.
Read more


E-book
Price
0
275.00 £
E-book
0
0
Price
275.00 £
A recent trend in networked control systems is to interconnect the distributed elements by means of a multipoint broadcast network, instead of using the traditional point-to-point links.
Read more
E-book
Price
0
35.56 £
E-book
0
0
Price
35.56 £
IP Telephony Using CallManager Express Lab Portfolio provides a hands-on approach to learning the basic principles of voice over IP (VoIP) to build a voice-enabled network for the small to medium-sized business.
Read more