While we are all becoming familiar with the Internet, which uses the Transfer Control Protocol/Internet Protocol (TCP/IP), more and more additions and changes emerge every year, including protocols that support multimedia, encryption,
Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology Authors are Wi-Fi security experts who are able to address the firestorm of
Leading authorities deliver the commandments for designing high-speed networks There are no end of books touting the virtues of one or another high-speed networking technology, but until now, there were none offering
Simon Haykin is a well-known author of books on neural networks. * An authoritative book dealing with cutting edge technology. * This book has no competition.
Asynchronous Transfer Mode (ATM) has revolutionized telecommunications, and has become an integral part of the networking infrastructure. This introductory well-structured text on ATM networks describes their development, architecture, congestion control, deployment,
Comprehensive, authoritative, practical—an essential guide to the design and operation of telecommunication networks The past decade has seen what can only be described as an evolutionary leap in the field of telecommunication
Network synchronization deals with the distribution of time and frequency across a network of clocks often spread over a wide geographical area. The goal is to align (i.e. synchronize) the time and
The emergence of network and System Administration, during the latter quarter century, as a discipline of science and engineering, has culminated in a number of paradigms for managing networks of collaborating machines.
WirelessMAN: Inside the IEEE 802.16? Standard for Wireless Metropolitan Area Networks is the perfect resource for understanding and navigating through the IEEE 802.16 standard, which serves as the basis of all WiMAX
* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective * Packed with real-world tips and practical techniques, this book shows IT and
Today's enterprise cannot effectively function without a network, and today's enterprise network is almost always based on LAN technology. In a few short years, LANs have become an essential element of today's
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced
The Security+ Exam Guide provides exam candidates with the concepts, objectives, and test-taking skills needed to pass on their first attempt. Instead of covering every computer security topic, this book isolates those