Author: Radia Perlman
Publisher: Addison-Wesley Professional
Release Date: 2000
Perlman, a bestselling author and senior consulting engineer for Sun Microsystems, provides insight for building more robust, reliable, secure and manageable networks. Coverage also includes routing and addressing strategies, VLANs, multicasting, IPv6, and more.
“As an author, editor, and publisher, I never paid much attention to the competition–except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.” –From the Foreword by Tim O’Reilly, founder of O’Reilly Media “This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems’ history but doesn’t bloviate. It’s just straightfoward information delivered in colorful and memorable fashion.” –Jason A. Nunnelley “This is a comprehensive guide to the care and feeding of UNIX and Linux systems. The authors present the facts along with seasoned advice and real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility.” –Pat Parseghian The twentieth anniversary edition of the world’s best-selling UNIX system administration book has been made even better by adding coverage of the leading Linux distributions: Ubuntu, openSUSE, and RHEL. This book approaches system administration in a practical way and is an invaluable reference for both new administrators and experienced professionals. It details best practices for every facet of system administration, including storage management, network design and administration, email, web hosting, scripting, software configuration management, performance analysis, Windows interoperability, virtualization, DNS, security, management of IT service organizations, and much more. UNIX® and Linux® System Administration Handbook, Fourth Edition, reflects the current versions of these operating systems: Ubuntu® Linux openSUSE® Linux Red Hat® Enterprise Linux® Oracle America® Solaris™ (formerly Sun Solaris) HP HP-UX® IBM AIX®
Author: Charles E. Spurgeon
Publisher: "O'Reilly Media, Inc."
Release Date: 2013-04-01
If you’re ready to build a large network system, this handy excerpt from Ethernet: The Definitive Guide, Second Edition gets you up to speed on a basic building block: Ethernet switches. Whether you’re working on an enterprise or campus network, data center, or Internet service provider network, you’ll learn how Ethernet switches function and how they’re used in network designs. This brief tutorial also provides an overview of the most important features found in switches, from the basics to more advanced features found in higher-cost and specialized switches. Get an overview of basic switch operation, the spanning tree protocol, and switch performance issues Learn about switch management and some of the most widely used switch features Discover how a hierarchical design can help maintain stable network operations Delve into special-purpose switches, such as multi-layer, access, stacking, and wireless access-point switches Learn about advanced switch features designed for specific networking environments Dive deeper into switches, with a list of protocol and package documentation
Author: Allen B. Tucker
Publisher: CRC Press
Release Date: 2004-06-28
When you think about how far and fast computer science has progressed in recent years, it's not hard to conclude that a seven-year old handbook may fall a little short of the kind of reference today's computer scientists, software engineers, and IT professionals need. With a broadened scope, more emphasis on applied computing, and more than 70 chapters either new or significantly revised, the Computer Science Handbook, Second Edition is exactly the kind of reference you need. This rich collection of theory and practice fully characterizes the current state of the field and conveys the modern spirit, accomplishments, and direction of computer science. Highlights of the Second Edition: Coverage that reaches across all 11 subject areas of the discipline as defined in Computing Curricula 2001, now the standard taxonomy More than 70 chapters revised or replaced Emphasis on a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction More than 150 contributing authors--all recognized experts in their respective specialties New chapters on: cryptography computational chemistry computational astrophysics human-centered software development cognitive modeling transaction processing data compression scripting languages event-driven programming software architecture
Multi-Protocol Label Switch (MPLS) and Generalized MPLS (GMPLS) are key technologies for next-generation IP backbone networks. Until now, however, engineers have been forced to search for technical papers on this subject and read them in an ad-hoc manner. At last there is a book that explains both MPLS and GMPLS concepts in a systematic way. GMPLS Technologies: Broadband Backbone Networks and Systems addresses the basic concepts, network architectures, protocols, and traffic engineering needed to operate MPLS and GMPLS networks. The book begins with an introduction of the nature and requirements of broadband networks. It describes the basics of control-oriented networks and Internet Protocol (IP). The text then examines the fundamentals of MPLS, explaining why MPLS is preferable to IP packet-based forwarding. This volume covers MPLS applications, details IP router structures, illustrates GMPLS, and explores important studies on traffic engineering in GMPLS Networks. The text concludes with a description of IP, MPLS, and GMPLS standardization topics. Network equipment design engineers and network service provision engineers can reference this book to understand the crucial techniques for building MPLS/GMPLS-based networks. Features Addresses the basic concepts, network architectures, protocols, and traffic engineering needed to operate MPLS and GMPLS networks Covers the fundamentals of connection-oriented networks including TCP/IP, flow control mechanism, and ATM protocol Analyzes MPLS issues and applications, such as label switched paths (LSPs) and VPNs Highlights IP router structures, examining technologies of data path function - switch architecture, packet scheduling, and forwarding engine Explores multi-layer traffic engineering, survivable networks, and wavelength-routed optical networks Demonstrates GMPLS-based routers
Author: Amjad Umar
Publisher: nge solutions, inc
Release Date: 2003
Genre: Business & Economics
This module discusses the network services and architectures in the Internet World. topics include network architectures, network connectivity, IP-based networks, broadband networks, wireless networks, and Next Generation Internet.
The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.
Author: Kevin Mandia
Publisher: McGraw Hill Professional
Release Date: 2003-07-17
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.
Author: K. Daniel Wong
Publisher: Artech House Publishers
Release Date: 2005-01
This comprehensive book gives you a hands-on understanding of the techniques and architectures being used to provide voice and data services over wireless networks. It serves as a unified "how it works" guide to wireless Internet telecommunications, systematically addressing each of the technological components and how they fit together. You get a clear picture of protocols like RTP for multimedia transport and SIP for session control signaling, and see what's being done to tackle tough challenges in QoS control, mobility management, and security in the wireless environment. The book discusses at length the cutting-edge IP Multimedia Sub-System (IMS) of UMTS to illustrate how each of these crucial components can be successfully implemented in a real-world wireless IP system.
Author: Douglas Comer
Publisher: Prentice Hall
Release Date: 2006
This best-selling, conceptual introduction to TCP/IP internetworking protocols interweaves a clear discussion of fundamentals with the latest technologies. Leading author Doug Comer covers layering and shows how all protocols in the TCP/IP suite fit into the five-layer model. With a new focus on CIDR addressing, this revision addresses MPLS and IP switching technology, traffic scheduling, VOIP, Explicit Congestion Notification (ECN), and Selective ACKnowledgement (SACK). Includes coverage of Voice and Video Over IP (RTP), IP coverage, a discussion of routing architectures, examination of Internet application services such as domain name system (DNS), electronic mail (SMTP, MIME), file transfer and access (FTP, TFTP, NFS), remote login (TELNET, rlogin), and network management (SNMP, MIB, ANS.I), a description of mobile IP, and private network interconnections such as NAT and VPN. The new edition includes updates to every chapter, updated examples, a new chapter on MPLS and IP switching technology and an expanded TCP description that featuers Explicit Congestion Notification (ECN) and Selective ACKnowledgement (SACK). For network and web designers, implementers, and administrators, and for anyone interested in how the Internet works.
Author: Richard E. Smith
Publisher: Addison-Wesley Professional
Release Date: 2002
Authentication is the way computers can confidently associate an identity with a person. This book examines the problem that networking professionals face in choosing and using different techniques for reliably identifying computer users, protecting against attacks, and employing various methods of security.
Explains MIPv6's structure, goals, deployment, operation, optimization, security, and more. This book reflects the IETF Mobile IPv6 standard, and provides an introduction to IPv6. It shows how MIPv6 works and how it's different from earlier Mobile IP standards; covers MIPv6 security; and more.