Author Archives: DEVAVARAN STELLA CRYSTINA

About DEVAVARAN STELLA CRYSTINA

Library Disabled for SPAM sent to internet- Postmaster Sundar Contact CIRT Reenabled Postmaster Sundar

New title for Communication and Information Engineering

[Cover] Privacy solutions and security frameworks in information protection  TK5105.59.P961p, Lee Wee Nam Library

Synopsis:
Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners. [As taken from Amazon]

New title for Communication and Information Engineering

[Cover] The RF in RFID : UHF RFID in practice (2nd Edition)       TK6570.I34D633, Lee Wee Nam Library

Synopsis:
This book explains how UHF tags and readers communicate wirelessly. It gives an understanding of what limits the read range of a tag, how to increase it (and why that might result in breaking the law), and the practical things that need to be addressed when designing and implementing RFID technology. Avoiding heavy math but giving breadth of coverage with the right amount of detail, it is an ideal introduction to radio communications for engineers who need insight into how tags and readers work. [As taken from Amazon]

New title for Communication and Information Engineering

[Cover] UTM security with Fortinet : Mastering FortiOSBy Bartolacci, Michael R., editor of compilation.
TK5105.59.U91, Lee Wee Nam Library

Synopsis:
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet’s FortiGate in the enterprise. [As taken from Amazon]

NTU Confessions, 3-D Films, Confluences and more in Library Xpress Vol. 7 Issue 3!

We present to you useful information, services & resources in this issue with:

New title for Communication and Information Engineering

Title: Guide to networking essentials
Author: Tomsho, Greg
Call number: TK5105.5.T662 2011
Availability: Click here

Synopsis:

GUIDE TO NETWORKING ESSENTIALS provides both the knowledge and hands-on skills necessary to work with network operating systems in a network administration environment. By focusing on troubleshooting and not on an exam, this book offers a comprehensive introduction to Networking and to advances in software, wireless and network security. Labs are directly integrated in each chapter to allow for a hands-on experience in the classroom. Updated content reflects the latest networking technology and operating systems including Windows 7/Server 2008 and Linux. Proven pedagogy and comprehensive, non-exam-focused format provides a compelling introduction to network administration.

 [As taken from Amazon]