Аннотация

The current Symbian Press list focuses very much on the small scale features of Symbian OS in a programming context. The Architecture Sourcebook is different. It's not a how-to book, it's a 'what and why' book. And because it names names as it unwinds the design decisions which have shaped the OS, it is also a 'who' book. It will show where the OS came from, how it has evolved to be what it is, and provide a simple model for understanding what it is, how it is put together, and how to interface to it and work with it. It will also show why design decision were made, and will bring those decisions to life in the words of Symbian's key architects and developers, giving an insider feel to the book as it weaves the «inside story» around the architectural presentation. The book will describe the OS architecture in terms of the Symbian system model. It will show how the model breaks down the system into parts, what role the parts play in the system, how the parts are architected, what motivates their design, and how the design has evolved through the different releases of the system. Key system concepts will be described; design patterns will be explored and related to those from other operating systems. The unique features of Symbian OS will be highlighted and their motivation and evolution traced and described. The book will include a substantial reference section itemising the OS and its toolkit at component level and providing a reference entry for each component.

Аннотация

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of the frameworks and prepares test-beds for testing and evaluating VM migration procedures as well as firewall rule migration. The book demonstrates how cloud computing can produce an effective way of network management, especially from a security perspective.

Аннотация

Clustering is a vital methodology in the data storage world. Its goal is to maximize cost-effectiveness, availability, flexibility, and scalability. Clustering has changed considerably for the better due to Storage Area Networks, which provide access to data from any node in the cluster. Explains how clusters with shared storage work and the components in the cluster that need to work together Reviews where a cluster should be deployed and how to use one for best performance Author is Lead Technical Engineer for VERITAS Cluster File Systems and has worked on clusters and file systems for the past ten years

Аннотация

To be competitive, service providers cannot customize every installation but must simultaneously offer services that meet a wide range of perceived customer needs. This guide shows commercial service providers and equipment vendors how to build competitive service offerings for enterprise-specific needs. Provides vital technical and business guidance to the service provider marketplace Explains how to satisfy the customer's specific needs in data, voice, and/or video Enables readers to gain the upper hand in submitting the most competitive service network bids and service level guarantees to customers

Аннотация

The first how-to guide for online storage management with Windows 2000 In this book, expert Paul Massiglia first provides a clear tutorial on the principles of managed online storage and then walks you through the basics of how to manage your disks and RAID arrays in the Windows 2000 server environment. He provides all the information system administrators need to take advantage of Windows 2000's powerful new capabilities for handling large numbers of disks and RAID subsystems. Using both the embedded capabilities of the Windows 2000 operating system, VERITAS Volume Manager–the de-facto standard for application storage–and other working examples, Massiglia clearly illustrates how to organize disks so that all application data can be given the right balance of availability, I/O performance, and online storage cost. Readers will learn about online storage architectures, failure and non-failure tolerant volumes, RAID, online disks, and creating and managing volumes.

Аннотация

Leading authorities deliver the commandments for designing high-speed networks There are no end of books touting the virtues of one or another high-speed networking technology, but until now, there were none offering networking professionals a framework for choosing and integrating the best ones for their organization's networking needs. Written by two world-renowned experts in the field of high-speed network design, this book outlines a total strategy for designing high-bandwidth, low-latency systems. Using real-world implementation examples to illustrate their points, the authors cover all aspects of network design, including network components, network architectures, topologies, protocols, application interactions, and more.

Аннотация

Examines how risk management security technologies must prevent virus and computer attacks, as well as providing insurance and processes for natural disasters such as fire, floods, tsunamis, terrorist attacks Addresses four main topics: the risk (severity, extent, origins, complications, etc.), current strategies, new strategies and their application to market verticals, and specifics for each vertical business (banks, financial institutions, large and small enterprises) A companion book to Manager's Guide to the Sarbanes-Oxley Act (0-471-56975-5) and How to Comply with Sarbanes-Oxley Section 404 (0-471-65366-7)

Аннотация

Ethernet Networks, Fourth Edition, provides everything you need to know to plan, implement, manage and upgrade Ethernet networks. * Improve your skills in employing Ethernet hubs, switches, and routers. * Learn how to set up and operate a wireless Local Area Network (LAN). * Discover how to extend a wired Ethernet via wireless LANs. * Understand cabling standards and the role of NEXT (Near End Crosstalk), FEXT (Far End Crosstalk) and other transmission parameters. * Profit from Gilbert Held's tips and tricks on enhancing security … and much more. This indispensable resource features up-to-date coverage of: * Wireless Ethernet (IEEE802.11 standards) * 10Gbps Ethernet * Firewalls in both a wired and wireless environment * The operation of new versions of Windows(r) on Ethernet LANs * The use of LAN switches at and above layer 2 in the ISO reference model * Copper and fiber optic cable to transport high speed Ethernet Network planners, administrators, and system engineers working with Ethernet networks will find Ethernet Networks, Fourth Edition, an invaluable tool for implementing, updating, and managing their networks.

Аннотация

The «father of data warehousing» incorporates the latest technologies into his blueprint for integrated decision support systems Today's corporate IT and data warehouse managers are required to make a small army of technologies work together to ensure fast and accurate information for business managers. Bill Inmon created the Corporate Information Factory to solve the needs of these managers. Since the First Edition, the design of the factory has grown and changed dramatically. This Second Edition, revised and expanded by 40% with five new chapters, incorporates these changes. This step-by-step guide will enable readers to connect their legacy systems with the data warehouse and deal with a host of new and changing technologies, including Web access mechanisms, e-commerce systems, ERP (Enterprise Resource Planning) systems. The book also looks closely at exploration and data mining servers for analyzing customer behavior and departmental data marts for finance, sales, and marketing.

Аннотация

This is the first book to focus on IP over WDM optical networks. It not only summarizes the fundamental mechanisms and the recent development and deployment of WDM optical networks but it also details both the network and the software architectures needed to implement WDM enabled optical networks designed to transport IP traffic. The next generation network employing IP over optical networks is quickly emerging not only in the backbone but also in metro and access networks. Fiber optics revolutionizes the telecom and networking industry by offering enormous network capacity to sustain the next generation Internet growth. IP provides the only convergence layer in a global and ubiquitous Internet. So integrating IP and WDM to transport IP traffic over WDM enabled optical networks efficiently and effectively is an urgent yet important task. * Covers hot areas like traffic engineering, MPLS, peer-to-peer computing, IPv6. * Comprehensive overview of history, background and research. * Presents all requirements for a WDM optical network (enabling technologies, optical components, software architecture, management, etc.). * Performance studies and descriptions of experimental WDM optical networks guarantee the practical approach of the book. Technical engineers and network practitioners, designers and analysts, network managers and technical management personnel as well as first year graduate students or senior undergraduate students majoring in networking and/or network control and management will all find this indispensable.