نتائج البحث

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
تم إضافة الكتاب إلى الرف الخاص بك!
عرض الكتب الموجودة على الرف الخاص بك .
وجه الفتاة! هناك خطأ ما.
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إضافة العنوان إلى الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
هل أنت متأكد أنك تريد إزالة الكتاب من الرف؟
{{itemTitle}}
{{itemTitle}}
وجه الفتاة! هناك خطأ ما.
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إزالة العنوان من الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
    منجز
    مرشحات
    إعادة تعيين
  • الضبط
      الضبط
      امسح الكل
      الضبط
  • مُحَكَّمة
      مُحَكَّمة
      امسح الكل
      مُحَكَّمة
  • نوع العنصر
      نوع العنصر
      امسح الكل
      نوع العنصر
  • الموضوع
      الموضوع
      امسح الكل
      الموضوع
  • السنة
      السنة
      امسح الكل
      من:
      -
      إلى:
  • المزيد من المرشحات
1,998 نتائج ل "COMPUTERS / Networking / Hardware."
صنف حسب:
Architecting the cloud
An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements. -Guides corporations through key cloud design considerations -Discusses the pros and cons of each cloud service model -Highlights major design considerations in areas such as security, data privacy, logging, data storage, -SLA monitoring, and more -Clearly defines the services cloud providers offer for each service model and the cloud services IT must provide Arming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.
CCENT/CCNA: ICND1 100-105 Certification Guide
Become familiar with ICND1 (100-105) exam objectives, and learn how to get ready for the examKey FeaturesA step by step guide that will build you skills from basic concepts to completely understanding network communicationComprehensive coverage to help you implement the knowledge you've gained in real-world scenariosTake practice questions and mock tests to check how prepared you are for the CCENT examBook DescriptionCCENT is the entry-level certification for those looking to venture into the networking world. This guide will help you stay up-to date with your networking skills. This book starts with the basics and will take you through everything essential to pass the certification exam. It extensively covers IPv4 and IPv6 addressing, IP data networks, switching and routing, network security, and much more-all in some detail. This guide will provide real-world examples with a bunch of hands-on labs to give you immense expertise in important networking tasks, with a practical approach. Each chapter consists of practice questions to help you take up a challenge from what you have procured. This book ends with mock tests with several examples to help you confidently pass the certification. This Certification Guide consists of everything you need to know in order to pass the ICND 1 100-105 Exam, thus obtaining a CCENT certification. However, practicing with real switches and routers or a switch or router simulator will help you succeed.What you will learnGet to grips with the computer network conceptsUnderstand computer network components and learn to create a computer networkUnderstand switching and learn how to configure a switchUnderstand routing and learn how to configure a routerUnderstand network services and the maintenance processLearn how to troubleshoot networking issuesBecome familiar with, and learn how to prepare for, the ICND1 100-105 examWho this book is forIf you are a Network Administrator, Network Technician, Networking professional, or would simply like to prepare for your CCENT certification, then this book is for you. Some basic understanding of networks and how they work would be helpful. Sufficient information will be provided to those new to this field.
Network routing: algorithms, protocols, and architectures
Network Routing: Algorithms, Protocols, and Architectures, Second Edition explores network routing and how it can be broadly categorized into Internet routing, PSTN routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive. Bridges the gap between theory and practice in network routing, including the fine points of implementation and operational experienceRouting in a multitude of technologies discussed in practical detail, including, IP/MPLS, PSTN, and optical networkingPresents routing protocols such as OSPF, IS-IS, BGP in detailDetails various router and switch architecturesDiscusses algorithms on IP-lookup and packet classificationAccessible to a wide audience with a vendor-neutral approach
Software defined networks : a comprehensive approach
This book discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. It provides state of the art knowledge needed for successful deployment of an SDN, including how to explain to the non-technical business decision makers in an organization the potential benefits and risks, in shifting parts of a network to the SDN model; how to make intelligent decisions about when to integrate SDN technologies in a network; how to decide if an organization should be developing its own SDN applications or looking to acquire them from an outside vendor; how to accelerate the ability to develop an SDN application; discusses the evolution of the switch platforms that enable SDN; addresses when to integrate SDN technologies in a network; provides an overview of sample SDN applications relevant to different industries; includes practical examples of how to write SDN applications. --
Enterprise Internet of Things Handbook
Internet of Things is today and now. This \"hand\" book covers almost all the bare essential knowledge that is needed for an architect or a developer to build IoT solution. Right from understanding what IoT is and exploring various off of the shelf IoT platforms, this book has it all. This book also covers Machine Learning IoT at a basic level.
Ansible 2 cloud automation cookbook
Ansible is a powerful and versatile tool used for configuration management and orchestration. Ansible's usefulness is derived from its modules. This book focuses on modules that will help you provision cloud resources by interacting with various APIs exposed by cloud providers. Taking a step further, you will learn how to manage cloud ...
Interconnecting smart objects with IP : the next Internet
Interconnecting Smart Objects with IP: The Next Internet explains why the Internet Protocol (IP) has become the protocol of choice for smart object networks. IP has successfully demonstrated the ability to interconnect billions of digital systems on the global Internet and in private IP networks. Once smart objects can be easily interconnected, a whole new class of smart object systems can begin to evolve. The book discusses how IP-based smart object networks are being designed and deployed. The book is organized into three parts. Part 1 demonstrates why the IP architecture is well suited to smart object networks, in contrast to non-IP based sensor network or other proprietary systems that interconnect to IP networks (e.g. the public Internet of private IP networks) via hard-to-manage and expensive multi-protocol translation gateways that scale poorly. Part 2 examines protocols and algorithms, including smart objects and the low power link layers technologies used in these networks. Part 3 describes the following smart object network applications: smart grid, industrial automation, smart cities and urban networks, home automation, building automation, structural health monitoring, and container tracking. Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services
Fog and Edge Computing
</P> <b>A comprehensive guide to Fog and Edge applications, architectures, and technologies</b> <p>Recent years have seen the explosive growth of the Internet of Things &#40;IoT&#41;: the internet&#45; connected network of devices that includes everything from personal electronics and home appliances to automobiles and industrial machinery. Responding to the ever&#45;increasing bandwidth demands and privacy concerns of the IoT, Fog and Edge computing concepts have developed to collect, analyze, and process data closer to devices and more efficiently than traditional cloud architecture. <p><i>Fog and Edge Computing: Principles and Paradigms</i>provides a comprehensive overview of the state&#45;of&#45;the&#45;art applications and architectures driving this dynamic field of computing while highlighting potential research directions and emerging technologies. <p>Exploring topics such as developing scalable architectures, moving from closed systems to open systems, and ethical issues rising from data sensing, this timely book addresses both the challenges and opportunities that Fog and Edge computing presents. Contributions from leading IoT experts discuss federating Edge resources, middleware design issues, data management and predictive analysis, smart transportation and surveillance applications, and more. A coordinated and integrated presentation of topics helps readers gain thorough knowledge of the foundations, applications, and issues that are central to Fog and Edge computing. This valuable resource: <ul> <li>Discusses IoT and new computing paradigms in the domain such as Fog, Edge and Mist</li> <li>Provides insights on transitioning from current Cloud&#45;centric and 4G/5G wireless environments to Fog computing</li> <li>Examines methods to optimize virtualized, pooled, and shared resources</li> <li>Identifies potential technical challenges and offers suggestions for possible solutions</li> <li>Discusses major components of Fog and Edge computing architectures such as middleware, interaction protocols, and autonomic management</li> <li>Includes access to a website portal for advanced online resources</li> </ul> <p><i>Fog and Edge Computing: Principles and Paradigms</i>is an essential source of up&#45;to&#45;date information for systems architects, developers, researchers, and advanced undergraduate and graduate students in fields of computer science and engineering.
Mastering Wireshark 2
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you.