No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Computer networking & communications category. Presented with a red border are the Computer networking & communications books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer networking & communications books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability - why companies build vulnerable systems and governments look the other way How dozens of industries went online - well or badly How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?
Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies. The text provides a balanced, well-rounded presentation of data communications while highlighting its importance to nearly every aspect of modern business. This fully-updated new edition helps students understand how networks work and what is required to build and manage scalable, mobile, and secure networks. Clear, student-friendly chapters introduce, explain, and summarize fundamental concepts and applications such as server architecture, network and transport layers, network design processes and tools, wired and wireless networking, and network security and management. An array of pedagogical features teaches students how to select the appropriate technologies necessary to build and manage networks that meet organizational needs, maximize competitive advantage, and protect networks and data from cybersecurity threats. Discussions of real-world management and technical issues, from improving device performance to assessing and controlling costs, provide students with insight into the daily networking operations of actual businesses.
The Pentester Blueprint guides readers on how to prepare and enter the cybersecurity filed as a penetration tester aka ethical hacker or white hat hacker. While there are a lot of books about technical tools for penetration testing, The Pentester Blueprint describes the role of a penetration tester, what a pentest entails, and the prerequisite knowledge required to start the educational journey of a pentester. The book goes on to detail learning resources and industry certifications that are helpful in becoming a pentester. The Pentester Blueprint evolved from the author's frequent popular presentations on the same topic at many conferences. Coverage includes: Foundation - Discuss the foundational perquisite knowledge needed to become a pentester. Discuss the IT basic skills such as operating systems, networking and security needed to be a pentester. Hacking skills - Discuss developing hacking skills and the hacker mindset. Education options - Discuss learning options such as college classes, security training providers and self-study. Education resources - Discuss education resources including; books, videos, conferences and community. Certifications and degrees - Discuss credentials useful for gaining employment as a pentester including; degrees and certificates. Getting Experience - Discuss methods for developing hacking/pentesting skills such as labs (third party and home), CTFs, bug bounties, pro bono/volunteer work. Developing a plan - Discuss how to assess current skillset and knowledge to find a starting place and the perform a gap analysis to develop a learning plan. Discuss goal setting and educational milestones to track progress. Getting employed as a pentester - Discuss how to find a job as a pentester through networking, social media and community evolvement.
NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance such as increased area coverage of up to one Kilo-meter, massive number of devices up to 200,000 devices per a single base station area, longer battery lifetime of 10 years, and better indoor and outdoor coverage for area with weak signal such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than +30 projects presented in this book, covering many use cases and scenarios, it provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino, Amazon cloud, Google map, and charts. The book starts by explaining AT commands used to configure the NB-IoT modem, data serialization and deserialization, how to set up the cloud for connecting NB-IoT devices, setting up rules, policy, security certificates, and NoSQL database on the cloud, how to store and read data on cloud, how to use Google map to visualize NB-IoT device geo-location, and how to use charts to visualize sensor datasets. Projects for Arduino are presented into four parts. The first part explains how to connect the device to the mobile operator and cellular network, perform communication using different network protocols such as TCP, HTTP, SSL, or MQTT, how to use GPS for geo-location applications, and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects such as 7-segment display or real time clock. The third part explains how NB-IoT can be used with sensor devices such as ultrasonic and environmental sensors. Finally, the fourth part explains how NB-IoT can be used to control actuators such as stepper motors and relays. This book is a unique resource in understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book serves and can be used by engineers, students, researchers, system integrators, mobile operators' technical staff, electronics enthusiastic.
Ubuntu Linux Bible (version 19.10) addresses the information needed for the complete spectrum of Ubuntu users, from desktop users to server administrators, including those new to Linux who may be setting up Linux servers for the first time. The book provides complete information presented in such a way that new users have all of the information that they need, while experienced Linux users can skip directly to the details that they require. Covering the recently released 19.10, as well as the previous version, this book will cover Getting Started with Ubuntu, Ubuntu for Desktop Users, and Ubuntu for System Administrators This book is organized into four parts: Getting Started with Ubuntu Linux, Ubuntu for Desktop Users, Ubuntu for System Administrators, and Configuring Servers on Ubuntu. Making the most of the wide variety of software that is included with Ubuntu Linux. The Desktop Users' section of the book is task-oriented, explaining how to do user-oriented tasks like read email, surf the web, create and publish documents, work with spreadsheets, create presentations, play games, create and edit graphics, and work with common consumer IoT electronic devices. Managing Ubuntu systems, explaining fundamental Linux system administration topics such as creating and managing users, backing up the system, adding new printers and disks to the system, network configuration, and using Ubuntu wirelessesly. Using Ubuntu to support network servers. Ubuntu is primarily targeted for desktop users but can also be used in an enterprise environment to provide core network services, where it is especially attractive due to its support for a huge number of languages. This part contains chapters explaining how to set up servers for the Web, electronic mail, print services, networked file sharing, DHCP (network address management), and DNS (network name/address resolution).
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Explore the foundations and applications of 5G technology This comprehensive guide contains cutting-edge information from telecommunications experts working at the forefront of 5G innovation. You will learn about the foundations of 5G technology-not just the new standards, but the reasons and stories behind them. The book shows how to get the most out of 5G, including high data rates, ultra-reliability, ultra-low latency, energy saving, cost reduction, higher system capacity, and massive device connectivity. Fundamentals of 5G Communications offers comprehensive coverage of all major vertical domains and applications, with a focus on practical, commercial implications. You will get complete explanations of commercial applications, including eXtended Reality (XR) applications, factory automation, remote/autonomous driving and platooning, sensor sharing, and more. The book serves both as an essential reference for telecom professionals and as a textbook for students learning about 5G. * Presents 5G functionality from an end-to-end perspective * Covers both traditional broadband and new vertical domains along with logistics * Written by recognized experts in the field
Includes one year of FREE access after activation to the online test bank and study tools: Custom practice exam 100 electronic flashcards Searchable key term glossary The Sybex(TM) method for teaching Linux(R) security concepts Understanding Linux Security is essential for administration professionals. Linux Security Fundamentals covers all the IT security basics to help active and aspiring admins respond successfully to the modern threat landscape. You'll improve your ability to combat major security threats against computer systems, networks, and services. You'll discover how to prevent and mitigate attacks against personal devices and how to encrypt secure data transfers through networks, storage devices, or the cloud. Linux Security Fundamentals teaches: Using Digital Resources Responsibly What Vulnerabilities and Threats Are Controlling Access to Your Assets Controlling Network Connections Encrypting Data, Whether at Rest or Moving Risk Assessment Configuring System Backups and Monitoring Resource Isolation Design Patterns Interactive learning environment Take your skills to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access to: Interactive test bank with a practice exam to help you identify areas where you need to expand your knowledge 100 electronic flashcards to reinforce what you've learned Comprehensive glossary in PDF format gives you instant access to key terms you use in your job
Elaborating on the concept of context awareness, this book presents up-to-date research and novel framework designs for context-aware mobile sensing. Generic and Energy-Efficient Context-Aware Mobile Sensing proposes novel context-inferring algorithms and generic framework designs that can help readers enhance existing tradeoffs in mobile sensing, especially between accuracy and power consumption. The book presents solutions that emphasize must-have system characteristics such as energy efficiency, accuracy, robustness, adaptability, time-invariance, and optimal sensor sensing. Numerous application examples guide readers from fundamental concepts to the implementation of context-aware-related algorithms and frameworks. Covering theory and practical strategies for context awareness in mobile sensing, the book will help readers develop the modeling and analysis skills required to build futuristic context-aware framework designs for resource-constrained platforms. Includes best practices for designing and implementing practical context-aware frameworks in ubiquitous/mobile sensing Proposes a lightweight online classification method to detect user-centric postural actions Examines mobile device-based battery modeling under the scope of battery nonlinearities with respect to variant loads Unveils a novel discrete time inhomogeneous hidden semi-Markov model (DT-IHS-MM)-based generic framework to achieve a better realization of HAR-based mobile context awareness Supplying theory and equation derivations for all the concepts discussed, the book includes design tips for the implementation of smartphone programming as well as pointers on how to make the best use of MATLAB (R) for the presentation of performance analysis. Coverage includes lightweight, online, and unsupervised pattern recognition methods; adaptive, time-variant, and optimal sensory sampling strategies; and energy-efficient, robust, and inhomogeneous context-aware framework designs. Researchers will learn the latest modeling and analysis research on mobile sensing. Students will gain access to accessible reference material on mobile sensing theory and practice. Engineers will gain authoritative insights into cutting-edge system designs.
Protect your organization from scandalously easy-to-hack MFA security solutions Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That's right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You'll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions--no matter how secure they seem Identify the strengths and weaknesses in your (or your customers') existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
Virtual, hands-on learning labs allow you to apply your technical skills using live hardware and software hosted in the cloud. So Sybex has bundled CompTIA Linux+ labs from Practice Labs, the IT Competency Hub, with our popular CompTIA Linux+ Study Guide, Fourth Edition. Working in these labs gives you the same experience you need to prepare for the CompTIA Linux+ Exam XK0-004 that you would face in a real-life setting. Used in addition to the book, the labs are a proven way to prepare for the certification and for work in the IT and cybersecurity fields where Linux is fundamental to modern systems and security. This is your one-stop resource for complete coverage of Exam XK0-004, covering 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to superior content including, assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions. Linux is viewed by many organizations and companies as an excellent, low-cost, secure alternative to expensive OSs, such as Microsoft Windows and is crucial to today's server and cloud infrastructure. The CompTIA Linux+ exam tests a candidate's understanding and familiarity with the Linux. As the Linux server market share continues to grow, so too does demand for qualified and certified Linux administrators. Building on the popular Sybex Study Guide approach, this book will provide 100% coverage of the NEW Linux+ Exam XK0-004 objectives. The book contains clear and concise information on all Linux administration topic, and includes practical examples and insights drawn from real-world experience. Hardware and System Configuration Systems Operation and Maintenance Security Linux Troubleshooting and Diagnostics Automation and Scripting You'll also have access to an online test bank, including a bonus practice exam, electronic flashcards, and a searchable PDF of key terms. And with this edition you also get Practice Labs virtual labs that run from your browser. The registration code is included with the book and gives you 6 months unlimited access to Practice Labs CompTIA Linux+ Exam Exam XK0-004 Labs with 65 unique lab modules to practice your skills.
Effective management of a communications network can be a difficult and costly activity, and even more so when the network crosses international borders. International network managers face a number of issues that are crucial to strategic decision-making, including the varying telecommunications regulations, operators, and services found within-as well as between-different countries. Focusing on these issues, Management of International Networks clears the way for network managers to make informed, strategic decisions. The author describes each of these issues in detail and develops models-illustrated by actual case studies-that allow a quantified analysis of each. With the ability to quantitatively assess these factors, managers can forecast the potential of cost-effectively managing a network within a given country and make decisions, such as: Where to place hubs for traffic in an international network In what country to expand the network What services to obtain from which operator to ensure a cost-effective network The strong increase in demand for international network services combined with the rapid changes in the telecommunications environment in many countries necessitate a closer examination of international networks and the development of new models and tools that will facilitate management decisions. Management of International Networks fulfills this demand. Network managers, planners, and operators along with consultants, telecommunications lawyers-virtually anyone working with international networks-will find this book an invaluable tool and guide to this dynamic, evolving arena.