Take a look at our Computer Networking & Communications books. Shulph carries a great selection of Computer Networking & Communications books, and we are always adding more.
Learn to design the Mobile Ad-hoc Networks Key Features Installing NS2 and running simple examples Creating and incorporating the network module All the built-in NS2 modules are explained in a comprehensive manner Details of Network AniMator (NAM) and Xgraph Simple language, crystal clear approach, and a straightforward comprehensible presentation The concepts are duly supported by several examples Description Network Simulation is the most sought after research field, and it has now become an integral part of many research projects like commercial applications and academic research. The networking and communications domain ranges from finding friends on social networking sites to medical diagnosis to smart cities implementation and even satellite processing. In this book, we have made an honest effort to make the concepts of network simulation easy—all the basics programs are explained in an easy and simple manner in the NS2 simulator, right from the installation part. As the real-time application of networking and communications is endless, the basic concepts and algorithms are discussed using the NS2 simulator so that everyone—from graduate students to researchers—can benefit from this book. What You Will Learn Readers will get to know a conspicuous difference of how NS2 is being utilized as a product device in research and business applications. Today, applying network simulations does not require a PhD. Nonetheless, there are a couple of assets out there that completely cover all the essential parts of actualizing networking and communications, without expecting you to take the advanced math courses. We believe that this book will help any individual who needs to apply network simulation, without studying years of analytics, calculus math, and probability hypothesis. Who this book is for The book is basically meant for all those graduate and research students who find the algorithms and protocols of networking and communications difficult to implement. In this book, all basic protocols of networking and simulation are discussed in detail with a practical approach. Primarily, beginners can find this book more effective as the chapters are sub-divided in such a way that they will find building and implementing algorithms in NS2 interesting and easy. Table of Contents 1. Introduction to Network Simulation 2. Tool Command Language 3. Writing and Executing a TCL Scripting with NS2 4. Practical Examples for Wired Program in NS2 5. Mobile Networking in NS2 About the Author Professor Neeraj Bhargava has done his B.Tech in computer science from the Central University of Hyderabad, India and M.S. in computer science from BITS Pillani, India, and has also completed his PhD in computer science from the University of Rajasthan, Jaipur, India. Pramod Singh Rathore is pursuing his doctorate in computer science and holds a degree in M. Tech in computer science and engineering from Rajasthan Technical University, a government engineering college in Kota, Ajmer. Dr Ritu Bhargava is an assistant professor at the Department of Computer Science, Sophia Girls College, Ajmer. She holds a PhD in computer science from Hemchandracharya North Gujarat University, Patan, Gujarat. She also has more than 15 years of active teaching and research experience and has delivered a series of talks and lectures at reputed universities of India. Abhishek Kumar is holds a doctorate in computer science from the University of Madras and has done his M.Tech in computer science and engineering from Rajasthan Technical University, a government engineering college in Kota, Ajmer.
Learn storage system usage in various solutions to meet enterprise company’s business objectives. Key Features Different type of storage systems and their solutions are discussed. Learn the components of a storage solution, storage disk array, host servers, storage networking components and their communications. Storage performance, fault tolerance and space efficiency and their related features are explained in detailed. Storage management software suite that enables administrator to manage all storage hardware and software components and their features and functionalities that are discussed. Description With advancement of computer, mobile and popularity of internet and social media, digital data is growing exponentially. Current total global data is almost double than what was there two years back. Computer storage technologies have become most important and critical that supports this enormous growth of digital data and stores them more efficiently. Therefore demand for computer storage knowledge increased drastically in recent years. This book explains the basic concept of computer storage and its fundamental features and functionalities. It also includes topics on how the application servers access storage systems through the network. Different storage vendors use different name for physical and logical components of a storage system, but this book primarily focuses on concept of storage systems using simple and commonly understood terminologies. Almost all modern storage systems have virtualization implemented to enhance performance and fault tolerance. This book explains these implementation aspects in simple terms. What Will You Learn Storage System, Storage Infrastructure Storage Disk Array and Communication Protocols Storage Networking, Management and Performance Fault Tolerance and Data Protection Space Efficiency Who This Book Is For IT professionals, undergraduate and postgraduate engineering students, researchers and storage administrators. Table of Contents Storage System and Solutions Storage Infrastructure Storage Disk Array Storage Communication Protocols Storage Networking Storage Performance Fault Tolerance and Data Protection Space Efficiency Storage Management About the Author Susanta Dutta is a senior R&D engineer with two decades of industry working experience in Hewlett-Packard Enterprise Company. He has been working with all types of storage products development and solution implementation with latest storage technologies. He is an engineering graduate in Electronics & Communication from National Institure of technology (NIT), Durgapur, India His LinkedIn Profile: linkedin.com/in/susanta-dutta-684969152
Expert solutions to automate routine IT tasks using Ansible. Key Features - Single handy guide for all IT teams to bring automation throughout the enterprise. - In-depth practical demonstration of various automation use-cases on the IT infrastructure. - Expert-led guidelines and best practices to write Ansible playbooks without any errors. Description This book deals with all aspects of Ansible IT infrastructure automation. While reading this book, you should look for automation opportunities in your current role and automate time-consuming and repetitive tasks using Ansible. This book contains Ansible fundamentals assuming you are totally new to Ansible. Proper instructions for setting up the laboratory environment to implement each concept are explained and covered in detail. This book is equipped with practical examples, use-cases and modules on the network. The system and cloud management are practically demonstrated in the book. You will learn to automate all the common administrative tasks throughout the entire IT infrastructure. This book will help establish and build the proficiency of your automation skills, and you can start making the best use of Ansible in enterprise automation. What you will learn - Install Ansible and learn the fundamentals. - Use practical examples and learn about the loop, conditional statements, and variables. - Understand the Ansible network modules and how to apply them in our day-to-day network management. - Learn to automate the Windows and Linux infrastructure using Ansible. - Automate routine administrative tasks for AWS, Azure, Google Cloud. - Explore how to use Ansible for Docker and Kubernetes. Who this book is for This book is for all IT students and professionals who want to manage or plan to administer the IT infrastructure. Knowing the basic Linux command-line would be good although not mandatory. Table of Contents 1. Up and Running with Ansible 2. Ansible Basics 3. Ansible Advance Concepts 4. Ansible for Network Administration 5. Ansible for System Administration 6. Ansible for Cloud Administration 7. Ansible Tips and Tricks
With Azure security, you can build a prosperous career in IT security. Key Features - In-detail practical steps to fully grasp Azure Security concepts. - Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. - Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series). Description ‘Microsoft Azure Security Technologies (AZ-500) - A Certification Guide’ is a certification guide that helps IT professionals to start their careers as Azure Security Specialists by clearing the AZ-500 certification and proving their knowledge of Azure security services. Authored by an Azure security professional, this book takes readers through a series of steps to gain a deeper insight into Azure security services. This book will help readers to understand key concepts of the Azure AD architecture and various methods of hybrid authentication. It will help readers to use Azure AD security solutions like Azure MFA, Conditional Access, and PIM. It will help readers to maintain various industry standards for an Azure environment through Azure Policies and Azure Blueprints. This book will also help to build a secure Azure network using Azure VPN, Azure Firewall, Azure Front Door, Azure WAF, and other services. It will provide readers with a clear understanding of various security services, including Azure Key vault, Update management, Microsoft Endpoint Protection, Azure Security Center, and Azure Sentinel in detail. This book will facilitate the improvement of readers' abilities with Azure Security services to sprint to a rewarding career. What you will learn - Configuring secure authentication and authorization for Azure AD identities. - Advanced security configuration for Azure compute and network services. - Hosting and authorizing secure applications in Azure. - Best practices to secure Azure SQL and storage services. - Monitoring Azure services through Azure monitor, security center, and Sentinel. - Designing and maintaining a secure Azure IT infrastructure. Who this book is for This book is for security engineers who want to enhance their career growth in implementing security controls, maintaining the security posture, managing identity and access, and protecting data, applications, and networks of Microsoft Azure. Intermediate-level knowledge of Azure terminology, concepts, networking, storage, and virtualization is required. Table of Contents 1. Managing Azure AD Identities and Application Access 2. Configuring Secure Access by Using Azure Active Directory 3. Managing Azure Access Control 4. Implementing Advance Network Security 5. Configuring Advance Security for Compute 6. Configuring Container Security 7. Monitoring Security by Using Azure Monitor 8. Monitoring Security by Using Azure Security Center 9. Monitoring Security by Using Azure Sentinel 10. Configuring Security for Azure Storage 11. Configuring Security for Azure SQL Databases
Effective knowledge work depends on bringing people together to form a team with the right mix of expertise for the project or problem on hand. Increasingly, that mix can only be created by finding people who are geographically dispersed across sites of the company or across several companies. These virtual teams typically work by linking through electronic tools, such as the telephone, fax, email, NetMeeting, Lotus Notes, and other web-based communication systems. Recent research suggests that these teams have all of the challenges of face-to-face teams in addition to others, such as the limitations of technology, cultural differences, and multiple supervisors. The papers included in this volume identify some of the problems and some of the solutions to these kinds of problems, but most importantly, in a dynamic field such as virtual teams, the papers provide a framework for thinking about such problems and a collection of ideas that can form a foundation for advancing both research and practice in the field. Much of the literature on virtual teams focuses on the technology. The technology is an enabler, but it does not seem to have advanced far enough to make electronic communications as effective as face-to-face meetings. Like other teams, virtual teams consist of human beings and they have interpersonal and identity needs that must be met to optimize their ability to work and to collaborate. So, issues such as member solidarity, cooperation and unity of actions and values become special concerns. Such issues are addressed in this volume with the hope that this work will provide a foundation for moving ahead in this field toward more effective virtual teams.