You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
The MIS and LAN Managers Guide to Advanced Telecommunications examines the technologies, devices, and equipment commonly used by telecommunications carriers. Discussions include the basics of voice and data communications as well as a wide range of telecommunications topics, particularly wide area networks and digital networks focusing on client server LAN networks. Major issues surrounding LAN interconnection are explained in easy-to-understand language and numerous illustrations. The text provides the MIS or network manager with a comprehensive view of emerging telecommunications technologies, current networking technology for information systems, and detailed information on how to implement useful solutions. Additionally, the author reviews industry standard solutions from a technical perspective giving a detailed treatment of the various protocols and their operation and the applicability of the technology to support organizational data and communications needs for competitive advantage. The book is written for LAN, MIS, and IT managers, computer operations managers, telecom managers, technical service providers, equipment suppliers, network planners, and software engineers.
Addressing the vulnerabilities in today's critical infrastructure to natural disasters and terrorism, this practical book describes what public safety and other officials need to do to protect should be doing to pipelines, power plants, telecommunications, and other essential services before the unthinkable happens. The book explains how to maintain command and control in any disaster, and how to predict the probability of those disasters. Written by two highly regarded experts in the field, this one-of-a-kind guidebook shows how to simplify risk assessments and emergency response procedures to disasters affecting our critical national and local infrastructure.
The Systems Development Handbook provides practical guidance for the range of new applications problems, featuring contributions from many industry experts. The book provides step-by-step charts, tables, schematics, and a comprehensive index for easy access to topics and areas of related interest. Topics include cooperative processing; the transition to object-oriented development; rapid application development tools and graphical user interfaces (GUIs); database architecture in distributed computing; development tools and techniques, including design, measurement, and production; and more.
With automated support systems significantly impacting business productivity and profitability, contingency planning for the advanced telecommunications systems supporting voice and data communications becomes paramount. This book serves as the ultimate reference for designing and implementing a top-notch disaster recovery plan for highly networked businesses and municipalities.
Once considered a luxury, a business continuity plan has become a necessity. Many companies are required to have one by law. Others have implemented them to protect themselves from liability, and some have adopted them after a disaster or after a near miss. Whatever your reason, the right continuity plan is essential to your organization. Business
Just a decade ago, many industry luminaries predicted the collapse of the centralized data center and IT structure. In its place would be a more decentralized client/server model built upon the Open Systems Interconnect (OSI) networking architecture. However, client/server never fully realized all of its promises, and OSI floundered. Now, instead of client/server and OSI, we have the Web-based model and TCP/IP. Together, Web-oriented technologies (i.e., browsers, web servers, HTML, Java) and TCP/IP are completely changing how the enterprise views its network. Instead of serving as primarily an internal utility, the enterprise network is now a vital means of delivering products and services a...
Learn to leverage, manage and protect your messaging infrastructure, and deliver information, products, and services to anyone, anytime, anywhere. Get the expertise you need in Electronic Messaging. Electronic Messaging shows you how to build from the ground up and then get the most out of a messaging infrastructure that will carry your enterprise into the next wave of collaborative computing, as well as into the next century. Packed with clear explanations, no-nonsense solutions and real-world case studies, Electronic Messaging goes far beyond basic terms, concepts, techniques, architectures, and products. While explaining fundamentals, it also provides all the advanced know-how you need to build, maintain and protect a first-class messaging environment. In the final analysis, Electronic Messaging gives you all the information and tools you need to position your enterprise for success in tomorrow's networked world - and to do so efficiently and economically.
Telemedicine has evolved to become an important field of medicine and healthcare, involving everything from simple patient care to actual performance of operations at a distance. This groundbreaking volume addresses the complex technical and clinical development in the management of trauma, disaster, and emergency situations using telemedicine. The book explains how telemedicine and related technologies can be used to effectively handle a wide range of scenarios, from a situation as small as a car crash, to major disasters such as an earthquake. Professionals find critical discussions on the practicality, logistics, and safety of telemedicine from recognized experts in the field. From teleteaching and telemonitoring, to teletrauma and telesurgery, this authoritative book covers all the major aspects that practitioners need to understand in order to engage and utilize this burgeoning area of medicine.
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats at every turn. The Information Security Management Handbook on CD-ROM, 2006 Edition is now available. Containing the complete contents of the Information Security Management Handbook, this is a resource that is portable, linked and searchable by keyword. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information that is not found anywhere else, including chapters from other security and n...