Cyberspace and Cybersecurity

Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives. Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how […]

Official (ISC)2 Guide to the CISSP CBK – Fourth Edition

 As an information security professional, it is essential to stay current on the latest advances in technology and the effluence of security threats. Candidates for the CISSP® certification need to demonstrate a thorough understanding of the eight domains of the CISSP Common Body of Knowledge (CBK®), along with the ability to apply this indepth knowledge […]

Wireless Network Security

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, […]

Fundamentals of Resource Allocation in Wireless Networks

Theory and Algorithms

Designing A Wireless Network

Business is on the move – mobile computing must keep up! Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wireless networks. Network engineers and consultants need to create and build cutting-edge wireless networks in both […]

Resource Allocation and Cross-layer Control in Wireless Networks

Information flow in a telecommunication network is accomplished through the interaction of mechanisms at various design layers with the end goal of supporting the information exchange needs of the applications. In wireless networks in particular, the different layers interact in a nontrivial manner in order to support information transfer. Resource Allocation and Cross Layer Control […]

Ad Hoc Wireless Networking

Wireless networking enables two or more computers to communicate using standard network protocols without network cables. Since their emergence in the 1970s, wireless networks have become increasingly pop ular in the computing industry. In the past decade, wireless networks have enabled true mobility. There are currently two versions of mobile wireless networks. An infrastructure network […]

Advanced Video Communications over Wireless Networks

Wireless video communications encompass a broad range of issues and opportunities that serve as the catalyst for technical innovations. To disseminate the most recent advances in this challenging yet exciting field, Advanced Video Communications over Wireless Networks provides an in-depth look at the fundamentals, recent technical achievements, challenges, and emerging trends in mobile and wireless […]

Cognitive Wireless Networks

Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications

Fundamentals of Voice-Quality Engineering in Wireless Networks

Network operators are faced with the challenge of maximizing the quality of voice transmissions in wireless communications without impairing speech or data transmission. This book provides a comprehensive survey of voice quality algorithms, features, interactions, and trade-offs, at the device and system level. Using a practitioner rather than algorithm-designer angle, this book is unique. It […]

Wireless Networking

Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous “WiFi networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to […]

Handbook of Wireless Networks and Mobile Computing

The huge and growing demand for wireless communication systems has spurred a massive effort on the parts of the computer science and electrical engineering communities to formulate ever-more efficient protocols and algorithms. Written by a respected figure in the field, Handbook of Wireless Networks and Mobile Computing is the first book to cover the subject […]

Big Data Computing

Due to market forces and technological evolution, Big Data computing is developing at an increasing rate. A wide variety of novel approaches and tools have emerged to tackle the challenges of Big Data, creating both more opportunities and more challenges for students and professionals in the field of data computation and analysis. Presenting a mix […]

Official (ISC)2 Guide to the CISSP CBK, Second Edition

With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to date with the […]

Official (ISC)2 Guide to the CISSP Exam

Candidates for the CISSP exam can now go directly to the source for study materials that are indispensable in achieving certification. The Official (ISC)2 Guide to the CISSP Exam is derived from the actual CBK review course created and administered by the non-profit security consortium (ISC)2. In addition to being an invaluable study guide, this […]

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

As a result of a rigorous, methodical process that (ISC)2 follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)2 conducts this process on a regular basis to ensure that the examinations and subsequent training […]

Linux+ Guide to Linux Certification

LINUX+ GUIDE TO LINUX CERTIFICATION, THIRD EDITION offers the most up-to-date information to empower users to successfully pass CompTIA’s Linux+ (Powered by LPI) Certification exam, while maintaining a focus on quality, classroom usability, and real-world experience. This complete guide provides not only the conceptual knowledge, but also the hands-on skills necessary to work with the […]

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Second Edition

Essential Skills for a Successful IT Career Written by CompTIA certification and training expert Mike Meyers, this instructive, full-color guide will help you pass the CompTIA Network+ exam and become an expert networking technician. Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Second Edition is completely up-to-date with the new CompTIA Network+ standards. […]

Network+ Guide to Networks

The completely updated NETWORK+ GUIDE TO NETWORKS, 6th Edition gives students the technical skills and industry know-how required to begin an exciting career installing, configuring, and troubleshooting computer networks. The text also prepares students for CompTIA’s Network+ N10-005 certification exam with fundamentals in protocols, topologies, hardware, and network design. After exploring TCP/IP, Ethernet, wireless transmission, […]