Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, including both piconets and scatternets, conducted since 2001. The book provides insights into the performance of Bluetooth networks through an analytical approach based upon...
This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...
A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...
If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of each release of Oracle. You need a comprehensive source of information and techniques for using the new technology. You need Oracle Internals: Tips, Tricks, and...
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...
The product of many years of practical experience and research in the software measurement business, Software Engineering Measurement lays the basis for measurement standards so that software engineers and system developers can begin to share experimental results in a more meaningful way. This technical reference helps you select what...
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable...
This text describes how concurrency works, how to more effectively deploy it in program components, and how to reuse these components to improve program design, quality, and performance.
Concurrency is a powerful technique for developing efficient and lightning- fast software. For instance, concurrency can be used in common applications...
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.
With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...
This book describes how to build wireless sensor networks, from the layers of communication protocols through the design of network nodes. It summarizes the multiple applications of wireless sensor networks, then discusses network device design and the requirements that foster the successful performance of these applications. The book discusses...
I gravitated into the process world several years ago after performing almost all roles in the software engineering environment — both as a programmer and in various management positions. That environment covered both the commercial software development world and the government contracting software development world. I...