DNS and BIND on IPv6If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. ...
Home Networking All-in-One Desk Reference For DummiesIf your household harbors more than one computer, you've probably wondered about home networking. Maybe you've gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue!
A network will make your life easier, and Home Networking All-In-One Desk Reference For Dummies makes it easier to create one. It shows you how to choose the right hardware, add user accounts, get different operating systems to work together, secure your network, exchange files, add wireless devices, and even use Wi-Fi out in public ...
Fragile networksA unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions
Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain World presents a comprehensive study of network systems and the roles these systems play in our everyday lives. This book successfully conceptualizes, defines, and constructs mathematically rigorous, computer-based tools for the assessment of network performance and efficiency, along with robustness and vulnerability analysis. The result is a thorough exploration that promotes an understanding of the critical infrastructure of today's network systems, from congested urban transportation networks and supply chain networks under disruption to financial networks and the Internet. ...
Cisco Router Configuration Handbook, 2nd EditionLocating reliable Cisco router configuration command information can require extensive, time-consuming research. Cisco Router Configuration Handbook, 2/e, is the solution: a day-to-day reference to the most widely used Cisco router features and configurations. Straight from Cisco experts, it covers every facet of router configuration, including fundamentals, network protocols, packet processing, voice/telephony, security, and more. This book is organized for maximum efficiency. Related features are covered together, and features and options are covered in the sequence in which they are typically used. Shaded tabs mark each section for quick reference. Information on each feature, technology, or protocol is presented in a concise one- or two-page format, with sections presenting quick facts, configuration information, and step-by-step examples, including both required and optional commands. Simply put, this book brings together all the Cisco routing configuration information most networ ...
Junos Enterprise Routing, 2nd EditionConsidered the go-to study guide for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the services available to Junos administrators - including the most recent set of flow-based security services and design guidelines that incorporate services and features of the MX, SRX, and EX network devices.
Its emphasis on practical solutions also makes this book an ideal on-the-job reference for design, maintenance, and troubleshooting issues in the enterprise. Simply put, this updated edition is the most comprehensive and authoritative resource for Juniper enterprise and edge routing environments you will find. ...
Migrating Applications to IPv6If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It's ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6. ...
Learning AndroidWant to build apps for Android devices? This book is the perfect way to master the fundamentals. Written by an expert who's taught this mobile platform to hundreds of developers in large organizations, this gentle introduction shows experienced object-oriented programmers how to use Android’s basic building blocks to create user interfaces, store data, connect to the network, and more. ...
Building Wireless Sensor NetworksGet ready to create distributed sensor systems and intelligent interactive devices using the ZigBee wireless networking protocol and Series 2 XBee radios. By the time you're halfway through this fast-paced, hands-on guide, you'll have built a series of useful projects, including a complete ZigBee wireless network that delivers remotely sensed data.
Radio networking is creating revolutions in volcano monitoring, performance art, clean energy, and consumer electronics. As you follow the examples in each chapter, you'll learn how to tackle inspiring projects of your own. This practical guide is ideal for inventors, hackers, crafters, students, hobbyists, and scientists. ...
SIP TrunkingMost large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there's a key missing link: most businesses still connect to their service providers via old-fashioned, inflexible TDM trunks. Now, three Cisco experts show how to use Session Initiation Protocol (SIP) trunking to eliminate legacy interconnects and gain the full benefits of end-to-end VoIP.
Written for enterprise decision-makers, network architects, consultants, and service providers, this book demystifies SIP trunking technology and trends and brings unprecedented clarity to the transition from TDM to SIP interconnects. The authors separate the true benefits of SIP trunking from the myths and help you systematically evaluate and compare service provider offerings. You will find detailed cost analyses, including guidance on identifying realistic, achievable savings.
SIP Trunking also introduces essential techniques for optimizing network des ...
Junos SecurityJunos Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.
Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements - including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Junos Security is a clear and detailed roadmap to the SRX product lines. ...