You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Perlman, a bestselling author and senior consulting engineer for Sun Microsystems, provides insight for building more robust, reliable, secure and manageable networks. Coverage also includes routing and addressing strategies, VLANs, multicasting, IPv6, and more.
The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced ...
For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce.
If you loved Hidden Figures or The Rise of the Rocket Girls, you'll love Claire Evans' breakthrough book on the women who brought you the internet--written out of history, until now. "This is a radically important, timely work," says Miranda July, filmmaker and author of The First Bad Man. The history of technology you probably know is one of men and machines, garages and riches, alpha nerds and brogrammers--but from Ada Lovelace, who wrote the first computer program in the Victorian Age, to the cyberpunk Web designers of the 1990s, female visionaries have always been at the vanguard of technology and innovation. In fact, women turn up at the very beginning of every important wave in technol...
A celebration of the women who furthered computer technology, from the nineteenth century to the present day.
Why is it that, while women in the United States have generally made great strides in establishing parity with their male counterparts in educational attainment, they remain substantially underrepresented in the fields of science, technology, engineering, and mathematics (STEM)? Why is it that, in proportion to the PhDs they obtain in STEM, they attain fewer administrative and managerial positions in academia and industry than their numbers warrant and, moreover, are more likely leave the field once started in their careers? In the culture and context of women’s advancement and satisfaction with careers in STEM, the data show that many challenges and obstacles remain.By showcasing the stor...
Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An in-depth view of routers and routing Switching, using Cisco Catalyst and Nexus switches as examples SOHO VoIP and SOHO wireless access point design and configuration Introduction to IPv6 with configuration examples Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS Security, firewall theory, and configuration, as well as ACL and authentication Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ) IP address allocation, Network Time Protocol (NTP), and device failures
This book describes the experiences and successes of female innovators and entrepreneurs in the still largely male-dominated tech-world in twenty candid interviews. It highlights the varied life and career stories that lead these women to the top positions in the technology industry that they are in now. Interviewees include CEOs, founders, and inventors from a wide spectrum of tech organizations across sectors as varied as mobile technology, e-commerce, online education, and video games. Interviewer Danielle Newnham, a mobile startup and e-commerce entrepreneur herself as well as an online community organizer, presents the insights, instructive anecdotes, and advice shared with her in the interviews, including stories about raising capital for one’s start-up, and about the obstacles these women encountered and how they overcame them. This timely book will be of great interest to anyone working in tech or looking to get into the industry, and more in general: to everyone wanting to learn how they can contribute to leveling the field of occupational opportunity and to strengthening teams and companies through merit and diversity.
This book describes and explains the Internet to communications professionals, and provides the knowledge and insight they need in order to understand and use the Internet. Among topics addressed are the historical evolution of the Internet community, the technologies employed in the Internet's development, management of the technology for a cohesive infrastructure, and future trends.
InThe Practice of Network Security, former UUNet networkarchitect Allan Liska shows how to secure enterprise networks in thereal world - where you're constantly under attack and you don't alwaysget the support you need. Liska addresses every facet of networksecurity, including defining security models, access control,Web/DNS/email security, remote access and VPNs, wireless LAN/WANsecurity, monitoring, logging, attack response, and more. Includes adetailed case study on redesigning an insecure enterprise network formaximum security.