Networking Communication

80 Results


Subject


Status


Type

Networking Communication

Per Page:
Sort:
PCI Compliance: The Definitive Guide

PCI Compliance: The Definitive Guide

Featured

Abhay Bhargav

May 5, 2014

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explai...

The Influential Project Manager: Winning Over Team Members and Stakeholders

The Influential Project Manager: Winning Over Team Members and Stakeholders

Featured

Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F

July 25, 2014

If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to devel...

Project Leadership: Creating Value with an Adaptive Project Organization

Project Leadership: Creating Value with an Adaptive Project Organization

Featured

Barry L. Cross, M. Kathryn Brohman

July 1, 2014

Look around your organization: can you identify who owns project management? Would that person appreciate that they own responsibility for your projects? Project Leadership: Creating Value with an Adaptive Project Organization highlights the importance of these questions—underlining the importance...

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Featured

Rafay Baloch

July 28, 2014

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking t...

Zen of Cloud: Learning Cloud Computing by Examples on Microsoft Azure

Zen of Cloud: Learning Cloud Computing by Examples on Microsoft Azure

Haishi Bai

August 12, 2014

Zen of Cloud: Learning Cloud Computing by Examples on Microsoft Azure provides comprehensive coverage of the essential theories behind cloud computing and the Windows Azure cloud platform. Sharing the author’s insights gained while working at Microsoft’s headquarters, it presents nearly 70...

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Rafay Baloch

July 28, 2014

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking...

Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle

Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle

Gay Gordon-Byrne

June 25, 2014

Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those...

Security for Multihop Wireless Networks

Security for Multihop Wireless Networks

Shafiullah Khan, Jaime Lloret Mauri

April 15, 2014

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks...

Anonymous Communication Networks: Protecting Privacy on the Web

Anonymous Communication Networks: Protecting Privacy on the Web

Kun Peng

April 10, 2014

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for...

Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications

Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications

Kuan-Ching Li, Qing Li, Timothy K. Shih

March 07, 2014

Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications presents the fundamentals of cloud and media infrastructure, novel technologies that integrate digital media with cloud computing, and real-world applications that exemplify the potential of cloud computing for...

Wi-Fi Enabled Healthcare

Wi-Fi Enabled Healthcare

Ali Youssef, Douglas McDonald II, Jon Linton, Bob Zemke, Aaron Earle

February 19, 2014

Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare...

Network Innovation through OpenFlow and SDN: Principles and Design

Network Innovation through OpenFlow and SDN: Principles and Design

Fei Hu

February 18, 2014

Software-defined networking (SDN) technologies powered by the OpenFlow protocol provide viable options to address the bandwidth needs of next-generation computer networks. And, since many large corporations already produce network devices that support the OpenFlow standard, there are opportunities...

The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection

Al-Sakib Khan Pathan

January 29, 2014

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...

Improving the Performance of Wireless LANs: A Practical Guide

Improving the Performance of Wireless LANs: A Practical Guide

Nurul Sarkar

January 08, 2014

While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide...

PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud

PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud

Bintu Harwani

November 21, 2013

PhoneGap is a standards-based, open-source development framework that can be deployed to any mobile device without losing the features of the native app—allowing for access to device contacts, the local file system, camera, and media on multiple platforms without requiring users to write a single...

Intrusion Detection Networks: A Key to Collaborative Security

Intrusion Detection Networks: A Key to Collaborative Security

Carol Fung, Raouf Boutaba

November 19, 2013

The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your...