Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however,...
Photoshop compositing has really blown up over the last few years. You see composites everywhere
from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about
any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop
now and...
This book presents the state-of-the-art in visual media coding and transmission
Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...
Complex environmental problems are often reduced to an inappropriate level of simplicity. While this book does not seek to present a comprehensive scientific and technical coverage of all aspects of the subject matter, it makes the issues, ideas, and language of environmental engineering accessible and understandable to the nontechnical...
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.
Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everythingconnected to the network is a...
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
The much-anticipated update to the bestselling book on LAN switching
Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...
"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...
The IMS (IP Multimedia Subsystem) is the exciting new technology that will merge the Internet with the cellular world. It will make Internet technologies such as the web, email, instant messaging, presence, and...
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist
Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First,
“long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...