No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Computer networking & communications category. Presented with a red border are the Computer networking & communications books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer networking & communications books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
The only official CCSP practice test product endorsed by (ISC)(2) With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by domain allows you to practice only the areas you need to bring you up to par, without wasting precious time on topics you've already mastered. As the only official practice test product for the CCSP exam endorsed by (ISC)(2), this essential resource is your best bet for gaining a thorough understanding of the topic. It also illustrates the relative importance of each domain, helping you plan your remaining study time so you can go into the exam fully confident in your knowledge. When you're ready, two practice exams allow you to simulate the exam day experience and apply your own test-taking strategies with domains given in proportion to the real thing. The online learning environment and practice exams are the perfect way to prepare, and make your progress easy to track.
Cisco's HyperFlex HCI solutions enable exceptional datacenter efficiency, agility, and resiliency by tightly integrating core infrastructure (compute, storage, networking, and system management), increasing automation, and simplifying lifecycle management. In this authoritative and comprehensive guide, Cisco experts bring together all the knowledge, detailed configuration options, and real-world case studies you need to successfully deploy Cisco Hyperflex technologies in your environment. This guide's key features include: Concise, easy-to-understand overviews of underlying concepts and how each Hyperflex technology applies them Detailed reference examples for implementing each key feature, with topologies, configurations, and verifications Thorough Intersight coverage to illuminate operations in cloud-based environments Do's and don'ts for successful, high-efficiency Hyperflex design Best practice recommendations, guidelines, and caveats for avoiding pitfalls, streamlining deployment, and maximizing value
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the IoT environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses state-of-the-art authentication-based security schemes which can secure RFID tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further the academic researchers and industry professionals in the domain of security.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Develop and assemble your own high-tech, inexpensive cybersecurity testing environment This hands-on guide shows how to build a low-cost lab for effective cybersecurity testing using open-source technologies and cloud resources. The book fully explains the languages used for infrastructure-as-code, meaning you can write programs to create your labs quickly, without manual steps that could lead to costly and frustrating mistakes. Build Your Own Cybersecurity Testing Lab: Low-Cost Solutions for Testing in Virtual and Cloud-Based Environments provides a single source for information and guidance needed to build out forensics resources, regardless of where those resources are located. You will get complete coverage of cloud-based and local virtual resources, network builds, and automating system and network builds for repeatability. *All source code in the book is available online*Includes more than two hours of videos that demonstrate the concepts covered*Written by a security expert and experienced educator
ACI Advanced Monitoring and Troubleshooting provides a solid conceptual foundation and in-depth technical knowledge for monitoring and troubleshooting virtually any problem encountered during testing, deployment, or operation of Cisco Application Centric Infrastructure (ACI) infrastructure. Authored by leading ACI support experts at Cisco, it covers all you'll need to keep your ACI deployment working optimally. Coverage includes: Core ACI concepts and components, including Nexus 9000 Series platforms, APIC controllers, and protocols In-depth insight into ACI's policy model ACI fabric design options: single and multiple data centers, stretched vs. multiple fabrics, and multi-pod/multi-site Automation, orchestration, and the cloud in ACI environments ACI topology and hardware/software specifications End host and network connectivity VMM integration Network management configuration, including SNMP, AAA, and SPAN Monitoring ACI fabrics and health Getting immediate results through the NX-OS command line interface Troubleshooting use cases: fabric discovery, APIC, management access, contracts, external connectivity, leaf/spine connectivity, end-host connectivity, VMM problems, ACI multi-pod/multi-site problems, and more
A clear and concise resource on Windows networking, perfect for IT beginners Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network Fundamentals covers everything you need to know about network infrastructures, hardware, protocols, and services. You will learn everything you need to gain the highly in-demand Networking Fundamentals MTA Certification. This entry-level credential could be your first step into a rewarding, stable and lucrative IT career. This new Sybex guide covers the basics of networking starting from the ground level, so no previous IT knowledge is required. Each chapter features approachable discussion of the latest networking technologies and concepts, closing with a quiz so you can test your knowledge before moving to the next section. Even if you are brand new to computers, Network Fundamentals will guide you to confidence and mastery. Understand wired and wireless networks in every detail Learn everything you need to attain the Networking Fundamentals MTA Certification Test your knowledge with end-of-chapter quiz questions Understand internet protocol (IP) and categorize IPv4 addresses Work with networking services and area networks Define network infrastructures and network security, including intranets, extranets, and VPNs Beginning and established IT professionals looking to understand more about networking will gain the knowledge to create a network diagram and confidently explain basic networking concepts. Thanks to the features in this book, you will be able to apply your new networking skills in real world situations and feel confident when taking the certification test.
Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct arguments that are made up of logical procedures and express both implicit and explicit claims as to how a given program operates. Building on current scholarly work in digital rhetoric, software studies, and technical communication, Brock connects and continues ongoing conversations among rhetoricians, technical communicators, software studies scholars, and programming practitioners to demonstrate how software code and its surrounding discourse are highly rhetorical forms of communication. He considers examples ranging from large, well-known projects like Mozilla Firefox to small-scale programs like the FizzBuzz test common in many programming job interviews. Undertaking specific examinations of code texts as well as the contexts surrounding their composition, Brock illuminates the variety and depth of rhetorical activity taking place in and around code, from individual differences in style to changes in large-scale organizational and community norms. Rhetorical Code Studies holds significant implications for digital communication, multimodal composition, and the cultural analysis of software and its creation. It will interest academics and students of writing, rhetoric, and software engineering as well as technical communicators and developers of all types of software.
These proceedings gather cutting-edge papers exploring the principles, techniques, and applications of Microservices in Big Data Analytics. The ICETCE-2019 is the latest installment in a successful series of annual conferences that began in 2011. Every year since, it has significantly contributed to the research community in the form of numerous high-quality research papers. This year, the conference's focus was on the highly relevant area of Microservices in Big Data Analytics.
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications. Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards. In addition, it provides numerous case studies and applications to facilitate understanding. As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.