Non-Fiction Books:

Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!
$198.99
Available from supplier

The item is brand new and in-stock with one of our preferred suppliers. The item will ship from a Mighty Ape warehouse within the timeframe shown.

Usually ships in 3-4 weeks

Buy Now, Pay Later with:

4 payments of $49.75 with Afterpay Learn more

Availability

Delivering to:

Estimated arrival:

  • Around 7-19 June using International Courier

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Understand and evaluate the delivery of Carrier Ethernet using different technologies Carrier Ethernet is rapidly becoming the de facto platform for offering the next generation of high-bandwidth multimedia applications. Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN provides, for the very first time, an in-depth assessment of the various network solutions that can be used to deliver Carrier Ethernet services. The book is based on extensive real-world deployments and is written by globally renowned experts. A standard solution framework is used consistently throughout to address each underlying technology, its benefits and pitfalls, deployment approaches, ongoing developments, economic assessments, and key vendors promoting the solution. The potential evolution of Carrier Ethernet itself is also considered in detail. Copper HFC (Hybrid Fiber-Coax) PONs (Passive Optical Networks) TDM (Time Division Multiplexing) Fiber and WDM (Wavelength Division Multiplexing) Optical Wireless Mesh Network/Free Space Optics SONET (Synchronous Optical NETworking)/MSPP (Multi-Service Provisioning Platform) RPR (Resilient Packet Ring) Bridging/Switching MPLS (MultiProtocol Label Switching) WiMAX/WiMAC

Author Biography:

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide MICHAEL HOWARD PRINCIPAL CYBERSECURITY ARCHITECT MICROSOFT PUBLIC SECTOR SERVICESMichael Howard is a principal cybersecurity architect in the Public Sector Services group. Prior to that, he was a principal security program manager on the Trustworthy Computing (TwC) Groups Security Engineering team at Microsoft, where he was responsible for managing secure design, programming, and testing techniques across the company.Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsofts software. Howard began his career with Microsoft in 1992 at the companys New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsofts next-generation web server, before moving to his current role in 2000. Howard is an editor of IEEE Security & Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle, Writing Secure Code for Windows Vista and his most recent release 24 Deadly Sins of Software Security. McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA.
Release date Australia
December 16th, 2007
Audience
  • Professional & Vocational
Illustrations
20 Illustrations, unspecified
Pages
550
Dimensions
191x234x36
ISBN-13
9780071487474
Product ID
2044632

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

Filed under...