Narrow your search

Library

AP (5)

KDG (5)

KU Leuven (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

ULiège (5)

VIVES (5)

More...

Resource type

book (6)

digital (5)


Language

English (11)


Year
From To Submit

2018 (2)

2017 (2)

2016 (2)

2014 (2)

2012 (3)

Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Guide to OSI and TCP/IP Models
Author:
ISBN: 3319051520 3319051512 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This work opens with an accessible introduction to computer networks, providing general definitions of commonly used terms in networking. This is followed by a detailed description of the OSI model, including the concepts of connection-oriented and connectionless communications. The text carefully elaborates the specific functions of each layer, along with what is expected of protocols operating at each layer. Next, the journey of a single packet, from source to destination, is described in detail. The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP, and InARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer, and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3, and Telnet. Important facts and definitions are highlighted in gray boxes found throughout the text.

Keywords

Computer network protocols --- TCP/IP (Computer network protocol) --- OSI (Computer network standard) --- Computer networks --- Open System Interconnect (Computer network standard) --- Open System Interconnection (Computer network standard) --- Open Systems Interconnect (Computer network standard) --- Open Systems Interconnection (Computer network standard) --- Open Systems Interconnections (Computer network standard) --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Protocols, Computer network --- Standards --- Computer Communication Networks. --- Data transmission systems. --- Telecommunication. --- Information Systems Applications (incl. Internet). --- Input/Output and Data Communications. --- Communications Engineering, Networks. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Telecommunication systems --- Computer communication systems. --- Application software. --- Input-output equipment (Computers). --- Electrical engineering. --- Electric engineering --- Engineering --- Computer hardware --- Computer I/O equipment --- Computers --- Electronic analog computers --- Electronic digital computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Computer systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Input-output equipment --- Distributed processing


Book
Elements of Cloud Computing Security : A Survey of Key Practicalities
Author:
ISBN: 3319414100 3319414119 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Data Encryption. --- Data Storage Representation. --- Cloud computing --- Security measures. --- Electronic data processing --- Web services --- Distributed processing --- Cryptology. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers


Book
Guide to Cisco routers configuration : becoming a router geek
Author:
ISBN: 1447142454 9786613934611 1447142462 1283622165 Year: 2012 Publisher: London ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed "how-to" instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs.


Book
Guide to Cisco Routers Configuration : Becoming a Router Geek
Author:
ISBN: 3319546309 3319546295 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios to test the readers’ skills. Topics and features: Presents a uniquely accessible style, addressing router users’ everyday configuration needs without requiring a detailed knowledge of the underlying theory Discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips Explains in detail the steps required to configure different protocols on Cisco routers, outlining when it would be necessary to invoke each procedure Includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW) Provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW) This must-have collection of “how-to” instructions will prove to be an invaluable reference to anyone seeking to learn about Cisco routers configuration, whether they be field network engineers handling Cisco routers, or students working on Cisco routers in their labs. Dr. Mohammed M. Alani is Provost and Associate Professor of Computer Engineering at Al-Khawarizmi International College, Abu Dhabi, UAE. His other publications include the Springer titles Elements of Cloud Computing Security, and Guide to OSI and TCP/IP Models.


Digital
Guide to Cisco Routers Configuration : Becoming a Router Geek
Author:
ISBN: 9781447142461 Year: 2012 Publisher: London Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Guide to OSI and TCP/IP Models
Author:
ISBN: 9783319051529 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This work opens with an accessible introduction to computer networks, providing general definitions of commonly used terms in networking. This is followed by a detailed description of the OSI model, including the concepts of connection-oriented and connectionless communications. The text carefully elaborates the specific functions of each layer, along with what is expected of protocols operating at each layer. Next, the journey of a single packet, from source to destination, is described in detail. The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP, and InARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer, and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3, and Telnet. Important facts and definitions are highlighted in gray boxes found throughout the text.


Digital
Elements of Cloud Computing Security : A Survey of Key Practicalities
Author:
ISBN: 9783319414119 Year: 2016 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.


Digital
Guide to Cisco Routers Configuration : Becoming a Router Geek
Author:
ISBN: 9783319546308 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios to test the readers’ skills. Topics and features: Presents a uniquely accessible style, addressing router users’ everyday configuration needs without requiring a detailed knowledge of the underlying theory Discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips Explains in detail the steps required to configure different protocols on Cisco routers, outlining when it would be necessary to invoke each procedure Includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW) Provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW) This must-have collection of “how-to” instructions will prove to be an invaluable reference to anyone seeking to learn about Cisco routers configuration, whether they be field network engineers handling Cisco routers, or students working on Cisco routers in their labs. Dr. Mohammed M. Alani is Provost and Associate Professor of Computer Engineering at Al-Khawarizmi International College, Abu Dhabi, UAE. His other publications include the Springer titles Elements of Cloud Computing Security, and Guide to OSI and TCP/IP Models.


Book
Guide to Cisco Routers Configuration
Authors: ---
ISBN: 9781447142461 Year: 2012 Publisher: London Springer London

Loading...
Export citation

Choose an application

Bookmark

Abstract

This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed "how-to" instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs.


Book
Applications of Big Data Analytics : Trends, Issues, and Challenges
Authors: --- --- ---
ISBN: 3319764713 3319764721 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This timely text/reference reviews the state of the art of big data analytics, with a particular focus on practical applications. An authoritative selection of leading international researchers present detailed analyses of existing trends for storing and analyzing big data, together with valuable insights into the challenges inherent in current approaches and systems. This is further supported by real-world examples drawn from a broad range of application areas, including healthcare, education, and disaster management. The text also covers, typically from an application-oriented perspective, advances in data science in such areas as big data collection, searching, analysis, and knowledge discovery. Topics and features: Discusses a model for data traffic aggregation in 5G cellular networks, and a novel scheme for resource allocation in 5G networks with network slicing Explores methods that use big data in the assessment of flood risks, and apply neural networks techniques to monitor the safety of nuclear power plants Describes a system which leverages big data analytics and the Internet of Things in the application of drones to aid victims in disaster scenarios Proposes a novel deep learning-based health data analytics application for sleep apnea detection, and a novel pathway for diagnostic models of headache disorders Reviews techniques for educational data mining and learning analytics, and introduces a scalable MapReduce graph partitioning approach for high degree vertices Presents a multivariate and dynamic data representation model for the visualization of healthcare data, and big data analytics methods for software reliability assessment This practically-focused volume is an invaluable resource for all researchers, academics, data scientists and business professionals involved in the planning, designing, and implementation of big data analytics projects. Dr. Mohammed M. Alani is an Associate Professor in Computer Engineering and currently is the Provost at Al Khawarizmi International College, Abu Dhabi, UAE. Dr. Hissam Tawfik is a Professor of Computer Science in the School of Computing, Creative Technologies & Engineering at Leeds Beckett University, UK. Dr. Mohammed Saeed is a Professor in Computing and currently is the Vice President for Academic Affairs and Research at the University of Modern Sciences, Dubai, UAE. Dr. Obinna Anya is a Research Staff Member at IBM Research – Almaden, San Jose, CA, USA.

Keywords

Big data. --- Medical care --- Data processing. --- Data sets, Large --- Large data sets --- Data sets --- Optical pattern recognition. --- Information storage and retrieva. --- Computer Communication Networks. --- Computer software. --- Big Data. --- Pattern Recognition. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Big Data/Analytics. --- Software, Computer --- Computer systems --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Pattern recognition. --- Information storage and retrieval. --- Computer communication systems. --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Foundations --- Distributed processing

Listing 1 - 10 of 11 << page
of 2
>>
Sort by