Search

Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts

Monday, August 3, 2009

Telecom For Dummies

Telecom For Dummies

Telecom For Dummies

Stephen P. Olejniczak, «Telecom For Dummies»
For Dummies | ISBN: 047177085X | 2006 | CHM | 358 pages | 2.67 MB

So you're now in charge of all that telecommunications stuff? Don't panic — here's your secret weapon! This plain-English guide will fill you in on the products, services, maintenance procedures, and key players in the telecom world, help you choose the most economical solutions for your business, and make you look good to the boss.


Download link 1
Download link 2
OR
Click Following Button to download!!!
Continue Reading...!

Algorithmic of Large and Complex Networks: Design, Analysis, and Simulation

Algorithmic of Large and Complex Networks: Design, Analysis, and Simulation


Jürgen Lerner, Dorothea Wagner, Katharina Zweig, "Algorithmic of Large and Complex Networks: Design, Analysis, and Simulation"
Springer | 2009-08-01 | ISBN: 3642020933 | 401 pages | PDF | 6,3 MB

Networks play a central role in today’s society, since many sectors employing information technology, such as communication, mobility, and transport - even social interactions and political activities - are based on and rely on networks. In these times of globalization and the current global financial crisis with its complex and nearly incomprehensible entanglements of various structures and its huge effect on seemingly unrelated institutions and organizations, the need to understand large networks, their complex structures, and the processes governing them is becoming more and more important.

This state-of-the-art survey reports on the progress made in selected areas of this important and growing field, thus helping to analyze existing large and complex networks and to design new and more efficient algorithms for solving various problems on these networks since many of them have become so large and complex that classical algorithms are not sufficient anymore. This volume emerged from a research program funded by the German Research Foundation (DFG) consisting of projects focusing on the design of new discrete algorithms for large and complex networks. The 18 papers included in the volume present the results of projects realized within the program and survey related work. They have been grouped into four parts: network algorithms, traffic networks, communication networks, and network analysis and simulation.

Enjoy this great book!
Download link 1
Download link 2

Click Following Button to download!!!
Continue Reading...!

Wireless Networks For Dummies

Wireless Networks For Dummies

Wireless Networks For Dummies

Barry D. Lewis, Peter T. Davis, «Wireless Networks For Dummies»
For Dummies | ISBN: 0764575252 | 2004 | PDF | 408 pages | 8.16 MB

Cut the wires and stay connected almost anywhere. Assess your network needs, set up security, and take your office on the road At last—liberation from that office full of electronic spaghetti is only a few pages away! This fun and friendly guide shows you how to plan and set up a wireless network for your business, install users, provide security, and keep your network healthy. Explore sites, enable roaming, dodge war drivers, and celebrate your freedom!

Download link 1
Download link 2

Click Following Button to download!!!
Continue Reading...!

Advanced Wireless Networks: Cognitive, Cooperative & Opportunistic 4G Technology

Advanced Wireless Networks: Cognitive, Cooperative & Opportunistic 4G Technology

Savo Glisic, Beatriz Lorenzo, "Advanced Wireless Networks: Cognitive, Cooperative & Opportunistic 4G Technology"
Wiley | 2009-08-03 | ISBN: 047074250X | 892 pages | PDF | 11,1 MB

With 40% new material the new edition of Advanced Wireless Networks provides a comprehensive representation of the key issues in 4G wireless networks. Focussing on cognitive, cooperative and opportunistic paradigms to provide further increase in network efficiency, the book explores and addresses issues in wireless internet, mobile cellular and WLAN, as well as sensor, ad hoc, bio-inspired, active and cognitive networks. It examines the problem of cross-layer optimisation and network information theory as well as adaptability and reconfigurability in wireless networks. This book is an integral description of future wireless networks and the interconnection between their elements.

The information is presented in a logical order within each chapter making it ideal for all levels of reader including researchers involved in modelling and analysis of future networks as well as engineers working in the area. Each chapter starts with introductory material and gradually includes more sophisticated models and mathematical tools concluding with a comprehensive list of references.

# Fully updated throughout with five new chapters on Opportunistic Communications; Relaying and Mesh Networks; Topology Control; Network Optimization; and Cognitive Radio Resource Management
# Unifies the latest research on cognitive, cooperative and opportunistic paradigms in wireless communications
# Provides efficient analytical tools for network analysis
# Discusses security issues, an essential element of working with wireless networks
# Supports advanced university and training courses in the field
# Companion website containing extra appendix on Queuing theory

Enjoy this great book!


Download link 1
Download link 2

Click Following Button to download!!!
Continue Reading...!

Towards 4G Technologies: Services with Initiative...

Towards 4G Technologies: Services with Initiative...


Dr. Hendrik Berndt, "Towards 4G Technologies: Services with Initiative"
Wiley | 2008 | ISBN: 0470010312 | 320 pages | PDF | 3,8 MB

Find out how the exciting new developments towards 4G mobile services and technologies will put the user at centre stage.

Towards 4G Technologies provides a comprehensive explanation of future networking and service delivering technologies for next generation mobile systems. The authors explain how personalization, mobile middleware, peer-to-peer services, semantic computing, and content-awareness fit into this new concept and why they will become a necessity for future mobile services. The book presents the latest challenges and opportunities of Next Generation Mobile Systems, explaining new paradigms of service provisioning that include flexible and adaptable services. Towards 4G Technologies:

Gives a comprehensive description of future networking and service delivering technologies.

Covers hot topics such as intelligent user profiling, proactive service selection, context-aware service provisioning and ubiquitous computing.

Introduces seemingly diverse technologies to show how they will play together to create a new user experience.

Includes case studies to illustrate the theory.

This invaluable guide will provide telecoms engineers in R&D departments, CTOs, and telecoms managers as well as academic researchers in electrical, electronic engineering and telecommunications with a comprehensive understanding of next generation mobile system technologies and services.

Download link 1
Download link 2
Download link 3
Click Following Button to download!!!
Continue Reading...!

The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds

The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds


Gonzalo Camarillo, Miguel-Angel Garc?a-Mart?n, "The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds"
Wiley | 2008 | ISBN: 0470516623 | 652 pages | PDF | 13,1 MB

Third edition of this best-selling guide to IMS: fully revised, and updated with brand new material

The IMS (IP Multimedia Subsystem) is the technology that merges the Internet with the cellular world. It makes Internet technologies such as the web, email, instant messaging, presence, and videoconferencing available nearly everywhere at any time.


The third edition of this bestselling book is fully updated and provides comprehensively expanded content, including new chapters on emergency calls and on Voice Call Continuity (VCC). As well as this, The 3G IP Multimedia Subsystem (IMS) presents updated material including a comprehensive picture of Session Initiation Protocol (SIP) as well as its applicability to IMS. As most of the protocols have been designed in the IETF, this book explains how the IETF developed these protocols and describes how these protocols are used in the IMS architecture.


This is an indispensable guide for engineers, programmers, business managers, marketing representatives and technically aware users who want to understand how the IMS works and explore the business model behind it.

New chapters on emergency calls, Voice Call Continuity (VCC), service configuration (XCAP, XDM), and conferencing
Fully updated throughout, including Policy and Charging Control (PCC), QoS, Presence, Instant Messaging, Multimedia Telephony Services, and Push-to-talk over Cellular (PoC)
Describes the IP Multimedia Subsystem from two different perspectives: from the IETF perspective, and from the 3GPP perspective.
Provides details on the latest policy technology and security architecture
Written by experienced professionals in the field.

Download Link 1
http://bitroad.net/download/8d70baf71d2aaa215fcb1f404ca0fe2e5/3GIPMultimediaSubsystem.rar.html


Click Following Button to download!!!
Continue Reading...!

Video Systems in an IT Environment, Second Edition: The Basics of Professional Networked Media and File-based Workflows...

Video Systems in an IT Environment, Second Edition: The Basics of Professional Networked Media and File-based Workflows...


Al Kovalick, "Video Systems in an IT Environment, Second Edition: The Basics of Professional Networked Media and File-based Workflows"
Focal Press | 2009 | ISBN: 0240810422 | 512 pages | PDF | 6,2 MB

Audio/Video (AV) systems and Information Technology (IT) have collided. IT is being leveraged to create compelling networked media and file-based workflows. Video Systems in an IT Environment has helped thousands of professionals in broadcast, post and other media disciplines to understand the key aspects the AV/IT "tapeless" convergence. World-renowned educator and speaker Al Kovalick adds his conversational and witty style to this text making the book an enjoyable learning experience.

Now in its second edition, this book includes: basics of networked media, storage systems for AV, MXF and other file formats, Web services and SOA, software platforms, 14 methods for high availability design, element management, security, AV technology, transition issues, real-world case studies and much more. Each chapter weaves together IT and AV techniques providing the reader with actionable information on the issues, best practices, processes and principles of seamless AV/IT systems integration.

.This updated edition contains: 40 new and updated figures, expanded sections on SOA and Web services, storage systems updates, workflow essentials, data center virtualization, protocol and standards updates, an expanded three plane integration model and much more.
.Packed with over 235 illustrations
.Supported with 13 Appendixes covering interesting and diverse topics and an updated glossary of AV/IT terms..

Download link 1
Download link 2
Download link 3

Click Following Button to download!!!
Continue Reading...!

Sunday, August 2, 2009

Next Generation Wireless Applications-WILEY publications

Next Generation Wireless Applications


Paul Golding, "Next Generation Wireless Applications"
Wiley | 2004-08-13 | ISBN: 0470869860 | 588 pages | PDF | 12,9 MB

In this rapidly developing field, this book explains why the various technologies are needed and will guide the reader to a deeper understanding of their significance and benefits within the industry.  Focussing on the wireless context will give the reader a better understanding of how to use the technologies specifically in the development of wireless applications. Uniquely, Next Generation Wireless Applications shows how the many and various technologies interoperate and can be used in combination to achieve useful results. The book also provides an authoritative view of the market opportunities for 3G enabling the reader to gauge the credibility and value of the many participants active in this market and helping the reader to detect and avoid risky business opportunities.

# Unique coverage of the state-of-the-art software development technologies appropriate in a wireless context
# Brings together software development expertise with an understanding of wireless issues
# Based on author’s extensive experience building wireless applications and training on the topic
# Describes both strengths and weaknesses of particular technologies, short-cuts and potential pit-falls
# Demonstrates how technologies fit together and may be used together to enhance functionality
# Dispells myths and demystifies technologies thanks to author’s extensive knowledge base and tried-and-tested presentation skills
# Numerous case studies (from Lucent, NTT DoCoMo and Vodafone) and anecdotes anchor the book in reality
# Covers SMS, MMS, LBS, billing issues, mobile information device profile specs (MIDP2.0), over-the-air-deployment mechanisms, service delivery platforms (SDP) and security.

Enjoy this great book!

Download link 1
Download link 2

Click Following Button to download!!!
Continue Reading...!

Radar and ARPA Manual: Radar and Target Tracking for Professional Mariners, Yachtsmen and Users of Marine Radar

Radar and ARPA Manual: Radar and Target Tracking for Professional Mariners, Yachtsmen and Users of Marine Radar


A G Bole, W O Dineley, Alan Wall, "Radar and ARPA Manual, Second Edition: Radar and Target Tracking for Professional Mariners, Yachtsmen and Users of Marine Radar"
Butterworth-Heinemann | 2005-06-27 | ISBN: 0750664347 | 544 pages | PDF | 8,9 MB

Radar and ARPA (Automatic Radar Plotting Aids) are standard systems on all commercial vessels and are widely used in the leisure maritime sector. This fully revised new edition covers the complete radar/ARPA installation and serves as the most comprehensive and up-to-date reference on equipment and techniques for radar observers using older and newer systems alike. Suitable for use both as a professional user's reference and as a training text, it covers all aspects of radar, ARPA and integrated bridge system technology, its use and its role in shipboard operations. Reference is made throughout to IMO (International Maritime Organisation) Performance Standards, the role of radar in navigation and in collision avoidance, and to international professional and amateur marine operations qualifications.

* The most up-to-date book available, with full coverage of modern radar and ARPA systems, integrated electronic bridge systems and the 2004 IMO Radar regulations
* The industry authority text, widely-used
* Meets professional, educational and leisure maritime needs, covering both professional and amateur certificate requirements

Enjoy this great book!

Download link 1
Download link 2


Click Following Button to download!!!
Continue Reading...!

Robust Communications Software: Extreme Availability, Reliability and Scalability for Carrier-Grade Systems

Robust Communications Software: Extreme Availability, Reliability and Scalability for Carrier-Grade Systems

Greg Utas, "Robust Communications Software: Extreme Availability, Reliability and Scalability for Carrier-Grade Systems"
Wiley | 2005-02-04 | ISBN: 0470854340 | 352 pages | PDF | 1,6 MB

Learn how to design scalable, robust software for cutting-edge communications productsâ?

Carrier-grade software must satisfy the stringent quality requirements of network operators whose systems provide mission-critical communications services. This book describes proven carrier-grade software techniques used in flagship products designed by industry leaders such as Lucent, Nortel, and Ericsson.

In the age of 24/7, software robustness is a competitive advantage. This authoritative guide for software engineers, managers, and testers of products that face carrier-grade requirements helps you to develop state-of-the-art software that will give you an edge in todayâs marketplace.

Robust Communications Software: Extreme Availability, Reliability and Scalability for Carrier-Grade Systems

# offers advice on choosing the right technologies for building reliable software
# incorporates real-world examples and design rationales when describing how to construct robust, embedded software for communications systems
# presents a comprehensive set of carrier-grade design patterns that help you to meet extreme availability, reliability, scalability, and capacity requirements
# gives advice on how to protect against and recover from software faults
# discusses system installation, operability, maintenance, and on-site debugging

Enjoy this great book!

Download link 1
Download link 2
Click Following Button to download!!!
Continue Reading...!

Friday, July 31, 2009

Red Hat Linux Networking and System Administration

Red Hat Linux Networking and System Administration

Red Hat Linux Networking and System Administration

Author(s): Terry Collings , Kurt Wall
Publisher: Red Hat
Pages : 1000
Format : pdf
Language : English
ISBN : 076453632X

Product Description
This book is the book you need to run your business with Red Hat. It provides comprehensive coverage on how to manage and network the Red Hat Linux OS and step-by-step instructions needed to maintain and/or add to the Red Hat Linux system.

This book features an entire part on security and problem solving that covers detecting intrusions/hacking, implementing local security, firewalls, and Internet security. Other topics include: RAID; TCP/IP networking; connecting to Microsoft networks; connecting to Apple networks; the Red Hat network; upgrading and customizing the kernel; using scripts; backing up and restoring the file system.

From the Back Cover

Your Official Red Hat® Linux® Guide to Networking and System Administration

Reviewed by the experts at Red Hat, this in-depth guide delivers all the know-how you need to set up and manage a state-of-the-art Linux network.

Red Hat Linux experts Terry Collings and Kurt Wall start with the basics?network planning and Red Hat installation and configuration. They then show you in detail how to set up network and Internet services, from establishing a network file system to configuring mail services. Eight chapters give you the lowdown on customizing the kernel, automating tasks with scripting, performing backups, and more?the nuts-and-bolts maintenance information you need to keep your system running smoothly. And last but not least, the authors provide nearly 100 pages of proven strategies and tips for maintaining system security.

Complete with utilities and code on CD-ROM, this official Red Hat Linux guide is the one resource you need for a secure, high-performance Linux network.

Proven Red Hat Linux Networking and Administration Solutions

* Plan your network, install Red Hat Linux, and get a handle on the file system and configuration files


* Configure TCP/IP networking, the Network File System, and the Network Information System


* Set up print services and connections to Windows and Macintosh clients


* Monitor performance, administer users and groups, back up and restore the file system, and install or upgrade software packages


* Design a security plan, implement local security, set up firewalls and proxy servers, and combat system intrusions


* Troubleshoot file system, networking, printing, and e-mail problems

Reviewed by the Experts at Red Hat...


Click Following Button to download!!!

Continue Reading...!

Monday, July 27, 2009

CompTIA Network Certification Study Guide, Fourth Edition-Salahuddin Jokhio-07CS24


CompTIA Network+ Certification Study Guide, Fourth Edition

Product Description

The best fully integrated study system available

With hundreds of practice questions and hands-on exercises, CompTIA Network+ Certification Study Guide, Fourth Edition covers what you need to know-and shows you how to prepare-for this challenging exam.

  • 100% complete coverage of all official objectives for the CompTIA Network+ exam
  • CertCam video training by the author guides you through difficult topics and exercises
  • Inside the Exam sections highlight key exam topics covered
  • Two-Minute Drills provide quick review at the end of every chapter
  • Simulated exam questions match the format, tone, topics, and difficulty of the real exam
Click Following Button to download!!!
Continue Reading...!

CCNA Security Official Exam Certification Guide (Exam 640-553)


CCNA Security Official Exam Certification Guide (Exam 640-553)

Product Description

CCNA Security Official Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNA® Security IINS exam. Senior security instructors Michael Watkins and Kevin Wallace share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

CCNA Security Official Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks sections help drill you on key concepts you must know thoroughly.

The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a topic-by-topic basis, presenting question-by-question remediation to the text and laying out a complete study plan for review.

Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

CCNA Security Official Exam Certification Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

Michael Watkins, CCNA/CCNP®/CCVP®/CCSP®, is a full-time senior technical instructor with SkillSoft Corporation. With 13 years of network management, training, and consulting experience, Michael has worked with organizations such as Kraft Foods, Johnson and Johnson, Raytheon, and the United States Air Force to help them implement and learn the latest network technologies.

Kevin Wallace, CCIE® No. 7945, is a certified Cisco instructor working full time for SkillSoft, where he teaches courses in the Cisco CCSP, CCVP, and CCNP tracks. With 19 years of Cisco networking experience, Kevin has been a network design specialist for the Walt Disney World Resort and a network manager for Eastern Kentucky University. Kevin also is a CCVP, CCSP, CCNP, and CCDP with multiple Cisco security and IP communications specializations.

The official study guide helps you master all the topics on the IINS exam, including

  • Network security threats
  • Security policies
  • Network perimeter defense
  • AAA configuration
  • Router security
  • Switch security
  • Endpoint security
  • SAN security
  • VoIP security
  • IOS firewalls
  • Cisco IOS® IPS
  • Cryptography
  • Digital signatures
  • PKI and asymmetric encryption
  • IPsec VPNs

This volume is part of the Exam Certification Guide Series from Cisco Press®. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears.

Click Following Button to download!!!

Continue Reading...!

Monday, March 16, 2009

Network programming for Microsoft Windows-2nd Edition-Submitted by Jokhio Salahuddin-07CS24

Network programming for Microsoft Windows-2nd Edition-Submitted by Jokhio Salahuddin-07CS24

  • Paperback: 580 pages
  • Publisher: Microsoft Press; 2nd edition (February 13, 2002)
  • Language: English
  • ISBN-10: 0735615799
  • ISBN-13: 978-0735615793
Product Description
This updated edition provides the latest information about how to write applications that take advantage of the advanced networking protocols and technologies that Microsoft Windows XP supports-Internet Protocol (IP) versions 4 and 6, Pragmatic General Multicasting (PGM) protocol, Internet Group Management Protocol 3 (IGMPv3), IPv6 multicasting, the Network Location Awareness (NLA) namespace provider, the Winsock Provider Interface, 64-bit Winsock APIs, and .NET Sockets. The book includes code samples in the Microsoft Visual Basic, Microsoft Visual C++, and Microsoft Visual C# development systems.
Click Following Button to download!!!

Continue Reading...!

Tuesday, March 3, 2009

JAVA 2 Network Security (2nd Edition)-Submitted by Saroop Chand 07CS12

JAVA 2 Network Security (2nd Edition)-Submitted by Saroop Chand 07CS12

  • Paperback: 250 pages
  • Publisher: Prentice Hall PTR; 2 Pap/Dsk edition (August 4, 1999)
  • Language: English
  • ISBN-10: 0130155926
Product Description
Provides the complete insiders guide to securing Java 2 enterprise applications, with comprehensive coverage of the new Java 2 security models. Designed to help you integrate Java 2 into your enterprise security strategies. Softcover. 3 1/2 inch disk included.

From the Inside Flap
Preface

Java is fashionable, but is it reliable? Java is entertaining, but is it secure? Java is useful, but is it safe?

The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposition.

Various groups have different needs and different skills, which this book meets in its different parts.

The first part is aimed at the intelligent non-specialist who oversees system management or application development, or incorporates Java into the security policy. Only a basic understanding of computers and a limited exposure to Java is assumed, but all the themes of Java security are introduced in a context that stresses over and over again how Java security must be seen as an integral part of system security.

The second part goes into more detail on how Java security works, and is aimed more at system and network administrators and programmers, who need to know more of what is going on.

The third part looks at the broader context in which Java operates, including some extensions to Java security and some aspects of its future.

This book explains the evolution of the Java security model, and then focuses on the Java 2 security architecture and its revolutionary domains of protection. It offers a very large number of examples to give you a better understanding of the technology involved.The Team That Wrote This Redbook

This redbook was produced by a team of specialists from around the world working at the International Technical Support Organization Raleigh Center.The leader of this project was Marco Pistoia.

Marco Pistoia is a Network Security Specialist, working as a project leader at the International Technical Support Organization, Raleigh Center. He writes extensively and teaches IBM classes worldwide on all areas of the e-business Application Framework, WebSphere, Java and Internet security. Marco holds a degree with honors in Pure Mathematics from the University of Rome and a masters degree in Computer Science. Before joining the ITSO, he was a System Engineer in IBM Italy. He received an Outstanding Technical Achievement Award in 1996.

Duane F. Reller is a Senior Software Engineer in the System/390 Programming Laboratory in Endicott, New York, USA. He has 25 years of experience in System/390 Hardware and Software development. He has served in technical and management positions. He holds a Bachelor's degree in Electrical Technology and a Master of Science degree in Computer Science from the State University of New York at Binghamton. His areas of expertise include Hardware and Software System's Architecture and Management.

Deepak Gupta is a Senior Software Engineer in IBM, India. He has two and a half years of experience in Internet technologies. He holds a degree in Electronics and Communications from the University of Roorkee, India. His areas of expertise include Internet security and Electronic Commerce. Deepak was involved in IBM India's largest e-Commerce project and in India's first secured e-Commerce site allowing Rupee-based transactions, for which he was conferred the Employee of the Month Award. He has also given several talks on Internet security and e-Commerce.

Milind Nagnur is a Senior Associate in the Operations and Systems Risk Management (OSRM) group of Price Waterhouse Coopers in Mumbai, India. He has a couple of years of exposure in Internet technologies, with emphasis on security and control issues in real business applications. He holds a degree in Mechanical Engineering from the Indian Institute of Technology in Bombay, India, and an MBA from the Indian Institute of Management in Calcutta, India.Ashok K. Ramani is a Senior Software Engineer in IBM India. He has two and a half years of experience in Internet technologies. He holds a degree in MSc.(Tech.) Information Systems from the Birla Institute of Technology and Science, Pilani, India. His areas of expertise include Internet security and Electronic Commerce. Ashok was involved in IBM India's largest e-Commerce project and in India's first secure e-Commerce site allowing Rupee-based transactions for which he was conferred the Employee of the Month Award. He has won special recognition awards at IBM India for his contribution to e-Commerce projects. He has also presented several talks on Internet security and e-Commerce.Comments Welcome

Your comments are important to us!

We want our redbooks to be as helpful as possible. Please send us your comments about this or other redbooks in one of the following ways:

Fax the evaluation form found in "ITSO Redbook Evaluation" on page 713 to the fax number shown on the form.

Use the online evaluation form found at redbooks.ibm/

Send your comments in an internet note to redbook@us.ibm
Click Following Button to download!!!


Continue Reading...!

Tuesday, February 24, 2009

Sams Teach Your Self Network Troubleshooting in 24 Hours

Sams Teach Your Self Network Troubleshooting in 24 Hours

Overview:
"Feldman writes in a readable style, which not only informs, but also encourages the reader. The beginner can easily identify with the author's hypothetical situations and also profit from Feldman's experience and considerable knowledge. SAMS Teach Yourself Network Troubleshooting in 24 Hours by Jonathan Feldman is a superb book, a valuable learning tool, and a superior problem-solving reference." -- Elizabeth ZinkAnn, SysAdmin magazine, May 1999 --This text refers to an out of print or unavailable edition of this title.

Product Description

A practical, hands-on quide to network troubleshooting that emphasizes diagnostic techniques that both professionals and part-time network adminstrators can understand and use in their day-to-day activities. In today's pervasive network environment, many of these people are often responsible for fixing a network if it goes down. This book emphasizes fixing practical networking applications like shared printers, using the Internet, and sharing files. It does not get into the specifics of protocols or specific applications, but provides short, concise overviews of topics like wireless networking, Unix, Windows 2000, Novell Netware, routers, and firewalls.



From the Back Cover
A practical, hands-on guide to network troubleshooting that emphasizes diagnostic techniques that many professionals, including engineers, architects, doctors, scientists, attorneys, etc. can really relate to. In today's pervasive network environment, many of these people are often responsible for "fixing the network" if it goes down. This book will emphasize fixing practical networking applications like shared printers, using the Internet, and sharing files. It does not get into the specifics of protocols or specific applications (i.e. Lotus Notes), but provides "Reader's Digest" overviews of topics like PC's, Unix, NT, Novell, Routers, and Firewalls, that impart the broad principles behind the technologies. Similarly, it allows readers to troubleshoot their specific applications by imparting broad principles at the expense of implementation specifics. --This text refers to an out of print or unavailable edition of this title.

About the Author

Jonathan Feldman is a hands-on network troubleshooting professional who is also a columnist and contributing editor for Network Computing magazine. He is the author of Network+ Exam Guide, and a contributor to Maximum Security, Third Edition. A multi-disciplinary troubleshooting expert, Jonathan has given networking workshops throughout the United States, at venues such as PC Expo/TECHXNY and Certification Expo. Network tools that he's developed have been used by large organizations including American Express, the State of Virginia, the State of Montana, Novell, and NASA.

Enjoy!!!!

Click Following Button to download!!!

Continue Reading...!