Redes
Livraria  
HAG Importações Ltda.
 Livros, Periódicos, DVD´s e E-Books
 
 
ISBN Author Title Format Pub'd
 
 
012715051X Vasseur, Jean-Philippe; Pickavet, Mario & Demeester, Piet  Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS This book's coverage ranges from the basics to an in depth analysis and includes: a technology refresher; detailed descriptions of the protocols involved; industry examples and simulation results and theoretical analysis, when appropriate. Providing a working knowledge of the various network protection and restoration techniques and how they can be practically deployed is the main purpose of this book.  Hb Aug-04
 
 
1558609148 Zhao, Feng & Guibas, Leonidas  Wireless Sensor Networks: An Information Processing Approach introduces practitioners to the fundamental issues and technology constraints concerning various aspects of sensor networks such as information organization, querying, routing, and self-organization using concrete examples and does so by using concrete examples from current research and implementation efforts.  Hb Jul-04
           
  0125571895 Pióro, Michal & Medhi, Deepankar  Routing, Flow, and Capacity Design in Communication and Computer Networks explores optimal determination of routing, flow and capacity design for a given traffic load or demand within a network. The authors adopt a traffic load or demand approach to the treatment of real-world design problems as opposed to concentrating solely on graph theory to study structural problems. The book covers new ground in OSPF network design (Open Shortest Path First), fair network design, network protection and restoration design, and multi-layer network design. Hb July-04
 
 
155860913X Farrel, Adrian The Internet and Its Protocols: A Comparative Approach. The aim of this book is to give a broader picture, showing all of the common Internet protocols and how they fit together. The Internet and Its Protocols provides more than an overview of the established protocols, but examines the purpose and function of each, and provides details of the messages used by the protocols, including byte-by-byte descriptions and message flow examples Hb Jun-04
 
  0124287514 Kumar, Anurag; Manjunath, D. & Kuri, Joy
Communication Networking: An Analytical Approach emphasizes analysis and design via mathematical models in discussing the building block concepts of multiplexing, switching and routing, and bandwidth management. It places engineering issues in real-world context by drawing on examples from current technology. This book is divided into three parts: I. Multiplexing; II. Switching and Routing; III. Bandwidth Management. Coverage will be through the lens of modeling and analysis techniques for developing engineering models and gaining insights into relevant technologies. Hb Jun-04
 
         
  0124660517 Makofske, David; Donahoo, Michael J. & Calvert, Kenneth L.  TCP/IP Sockets in C#: Practical Guide for Programmers This book focuses on the underlying sockets class, which is one of the basis for learning about networks in any programming language. By learning to write simple client and server programs that use TCP/IP (the Internet architecture), students and practitioners can then go on to realize key concepts about network routing, framing, error detection and correction, and performance. The authors' goal in this book is to provide a basic tutorial to sockets programming in the C# language. There will be code examples throughout the book and focused discussions on using the application programming interface (API) for sockets.  Pb May-04
           
  1555583172 Rittinghouse, John & Ransome, James F.  Wireless Operational Security addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks.  Pb May-04
 
         
  1555582834 De Clercq, Jan  Windows Server 2003 Security Infrastructures: Core Security Features is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. Pb Apr-04
           
  1555583121 Erbschloe, Michael  Implementing Homeland Security for Enterprise IT This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. Pb Feb-04
 
 
1558608109 Loshin, Pete  IPv6, 2e: Theory, Protocol, and Practice, 2e guides the reader through implemetation and deployment of the newest version of the Internet protocol, IPv6. The author explains why IPv4 needs to be replaced, how IPv6 came into being, and how IPv6 actually works. It offers updated and comprehensive coverage of important topics including router and server configuration, security and IPv6, the impact of IPv6 on mobile networks, and evaluating the impact of IPv6-enabled networks globally. This book covers IPv6 at a fundamental level so that it is accessible to network engineers as well as a large audience of "IPv6 curious" readers. Pb Jan-04
 
  1558608281 Ciciora, Walter; Farmer, James; Large, David & Adams, Michael  "Modern Cable Television Technology, 2e should be in the library of any company contemplating video services. It combines thorough coverage of its subject with a moderate amount of technical detail, resulting in a volume that both engineers and non-engineers alike will find useful. Although the book is clearly intended for readers having technical responsibilities related to networks providing video services, much of the material will be helpful as general background for non-technical personnel. The book is written by four authors, each of whom carries the highest engineering credentials within the cable television industry."  --EZine.com Hb Jan-04
 
  1555583067 Rittinghouse, John & Hancock, William M.  Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment.  Hb 2003
 
         
  1558609342 Kumar, C Bala; Kline, Paul & Thompson, Tim Bluetooth Application Programming with the Java APIs explains how to program to this API, gives details on why it was created, how it will help exploit the power of Java and Bluetooth, and show how to create an implementation of a device. Written by THE experts, all three authors were involved from inception through the design and implementation of the Java API for Bluetooth, and have the first and only (as of today) implementation that is certified. An indispensable resource to all Java programmers interested in Bluetooth technology and creating new business opportunities.  Pb 2003
 
  1558608591 Strassner, John  Policy-Based Network Management: Solutions for the Next Generation cuts through the hype surrounding PBNM and makes it approachable for those who really need to understand what it has to offer. The author, founder of the IETF Policy Framework working group, discusses system requirements, information models, and system components for Policy-Based Management. As network systems become larger and more complex, creating policies for them has become a crucial step in the management of network systems, and this book is a welcome addition to this exciting approach. Hb 2003
           
 
0120421712 Aboelela, Emad  Network Simulation Experiments Manual is written by an instructor who has used OPNET in his classroom for numerous demonstrations and real-world scenarios.It is useful tool to professionals in the workplace who are interested in learning & demonstrating the capability of evaluating different commercial networking products, i.e., Cisco routers. This book covers the core networking topologies and includes assignments on the ethernet, token rings, ATM, Switched LANs, Network Design, RIP, TCP, Queuing Disciplines, QoS, etc. Pb 2003
 
  1558608877 McCabe, James D.  Network Analysis, Architecture and Design, 2e uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers. Hb 2003
 
  1558608338 Peterson, Larry L. & Davie, Bruce S Computer Networks: A Systems Approach (International Student Edition) 3e describes the principles and practical implementation of computer networks as distilled by two authors with over twenty-five years of experience in networking research, development, and teaching. It includes new material on MPLS and switching, wireless technology, and peer-to-peer, overlay, and content networks, as well as expanded discussions of optical networks, VPNS, IP-Telephony, SSH, multimedia communications (SIP, SDP), and more.  Pb 2003
 
 
155860782X Loshin, Pete  TCP/IP Clearly Explained, 4e This comprehensive, accessible, and up-to-date book covers TCP/IP (the protocol suite on which the Internet is based) at a fundamental level so that it is accessible to a large audience made up of networking professions, applications developers, systems administrators and managers, software designers, etc. This market will only grow over the coming years as the pool of educated but networking-naive readers who find themselves grappling with TCP/IP issues increases. Pb 2003
 
  155860751X Nadeau, Thomas D.  MPLS Network Management: MIBs, Tools, and Techniques "This text should be required reading for anyone deploying an MPLS-enabled network. It guides the reader through the body of MPLS MIBs, providing a level of detail that is appropriate for both network operators and developers of network management software."
—Ronald P. Bonica, Co-chairman, IETF CCAMP WG
Hb 2003
 
  1558609334 Foster, Ian & Kesselman, Carl
The Grid 2, 2e: Blueprint for a New Computing Infrastructure is an emerging infrastructure that will fundamentally change the way we think about—and use—computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure — computational capabilities, databases, sensors, and people — to be shared flexibly as true collaborative tools, the Grid will have a similar transforming effect, allowing new classes of applications to emerge  — From the Preface  Hb 2003
 
  155860779X Morrow, Monique & Vijayananda, Kateel  Developing IP-Based Services: Solutions for Service Providers and Vendors The only book of its kind devoted exclusively to IP-based services, it provides a blueprint for all the engineers, managers, and analysts who must come together to build these services and bring them online. Inside, you'll find just the right balance of business and technical coverage, introduced with a lucid discussion of the principles of service development and wrapped up with three case studies illustrating effective provisioning in today's marketplace. Read the chapters relating to your role, and you'll play it more successfully. Have your team read the entire book, and you'll achieve a level of collaboration and shared understanding that will quickly accrue to the bottom line.  Hb 2002
 
  1558606556 Ramaswami, Rajiv & Sivarajan, Kumar  Optical Networks: A Practical Perspective, 2e "This is an excellent book to get you thoroughly up to speed in everything that is important in the hot field of optical networking. It is a must-read for novices but should be in the bookshelf of every optical networking specialist." --Martin Zirngibl, Director, Photonics Network Research, Lucent Technologies, Bell Laboratories. Hb & Web 2001
 
Esses são alguns dos livros com os quais trabalhamos, caso o livro que você procura não esteja nessa listagem, faça um orçamento!