Technical Textbooks Authored & Co-Authored by our CEO Panos C. Lekkas
     
  NETWORK PROCESSORS
ORDERING DETAILS: "Network Processors: Architectures, Protocols, and Platforms" by Panos C. Lekkas, McGraw-Hill, New York, NY, August 2003. ISBN 0071409866. Hardcover, 456 pages.

From the book's back cover:

NETWORK PROCESSORS UNDER THE HOOD

Written with insight by a leading telecommunications chip industry veteran, Network Processor: Architectures, Protocols, and Platforms delivers an eye-opening whole picture look at the revolution in high-speed network equipment and provides a unique top-to-bottom review of more than 20 network processing platforms (including NP chips and coprocessors). With Network Processors, you will:

* Get a clear detailed look at all NPs commercially available through mid-2003
* Learn how and why NP architectures differ from classical CPUs
* Plan for a new generation of chips used in routers and switches
* Understand the specific design trade-offs entailed by each new NP
* Understand how to evaluate platforms and architectures while being cognizant of inevitable market forces affecting NP vendors
* Understand and prepare for the issues associated with rapidly developing reusable networking software for these new processors
* Save time with a handy down-to-earth reference that, unlike other books on the subject, does not limit itself to only one company's approach or engage in abstract scholarly discussions that are not useful for an engineers or managers everyday reality
* Get wide view coverage of this new technology followed by directions for deeper, more specialized implementation based on your own needs

A PRACTICAL EDUCATION IN NETWORK PROCESSORS:

* Why Network Processors?
* IBM PowerNP(tm) Architecture
* Intel IXA(tm) Architecture
* AMCC nP(tm) Family of Network Processors
* Agere PayloadPlus(R) Family of Network Processors
* Motorola C-Port(R) Family of Network Processors
* Other NPU Architectures
* Alternatives to NPUs: Net ASICs & Designing with IP Cores
* Switch Fabrics
* Search Engines and Content-Addressable Memory (CAM)
* Classification Processors
* Traffic Managers
* Storage Coprocessors and TCP Offload Engines
* Security Coprocessors
* Systems Engineering and Software Development Issues

A MUST READ FOR:

* Hardware engineers who develop networking equipment
* Software engineers who code network software
* Communications chip designers
* Systems Architects or integrators
* Managers who need the facts
* Consultants

TABLE OF CONTENTS

PART 1: FUNDAMENTALS
Chapter 1: The Evolution of Network Technology: Distributed Computing and the Convergence of Networks
Chapter 2: Network Processors: Justification
Chapter 3: Packet Processing
PART 2: NETWORK PROCESSOR ARCHITECTURE
Chapter 4: IBM PowerNP(tm)
Chapter 5: Intel IXA(tm) Network Processors
Chapter 6: AMCC nP(tm) Family of Network Processors
Chapter 7: Agere PayloadPlus(r) Family of Network Processors
Chapter 8: Motorolas C-Port(tm) Family of Network Processors
Chapter 9: Other NPU Architectures
Chapter 10: Alternative Approaches to Network Processing: Net ASICs and Designing with IP Cores
PART 3: PERIPHERAL CHIPS SUPPORTING NETWORK PROCESSORS: STORAGE PROCESSORS, CLASSIFICATION PROCESSORS, SEARCH ENGINES, SWITCH FABRICS, AND TRAFFIC MANAGERS
Chapter 11: Storage Network Processors (SNPs)
Chapter 12: Search Engines
Chapter 13: Classification Processors
Chapter 14: Switch Fabrics
Chapter 15: Traffic Managers
PART 4: PUTTING EVERYTHING TOGETHER
Chapter 16: Systems Engineering Issues
PART 5: SECURITY COPROCESSORS
Chapter 17: Security Coprocessors
LIST OF ACRONYMS
APPENDIX I: OVERVIEW OF NETWORK-PROCESSOR PRODUCTS AND PLATFORMS
APPENDIX II: TYPICAL TRAFFIC LOAD (in Millions of Packets per Second) CORRESPONDENCE AT VARIOUS LINK SPEEDS AND PACKET SIZES
PPENDIX III: STANDARDIZATION EFFORTS IN NETWORK PROCESSING
INDEX





WIRELESS SECURITY
ORDERING DETAILS: "Wireless Security: Models, Threats, and Solutions", by Randall K.Nichols & Panos C. Lekkas, McGraw-Hill, New York, NY, December 2001. ISBN 0071380388. Softcover, 657 pages.(Spanish translation also available, see here below).

The book's foreword is written by the ex-DIRNSA (ex-Director of the U.S. National Security Agency) Admiral Michael McConnell and the book contains contributions from foremost technology experts both in the wireless industry and government.

From the book's back cover:

This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to--

* Recognize new and established threats to wireless systems
* Close gaps that threaten privacy, profits, and customer loyalty
* Replace temporary, fragmented, and partial solutions with more robust and durable answers
* Prepare for the boom in m-business
* Weigh platforms against characteristic attacks and protections
* Apply clear guidelines for the best solutions now and going forward
* Assess today's protocol options and compensate for documented shortcomings

A COMPREHENSIVE GUIDE TO THE STATE OF THE ART

* Encryption algorithms you can use now
* End-to-end hardware solutions and field programmable gate arrays
* Speech cryptology
* Authentication strategies and security protocols for wireless systems
* Infosec and infowar experience
* Adding satellites to your security mix

TABLE OF CONTENTS

Chapter 1 Why is Wireless Different? Chapter 2 Wireless Information Warfare Chapter 3 Telephone System Vulnerabilities
Chapter 4 Satellite Communications Chapter 5 Cryptographic Security
Chapter 6 Speech Cryptology
Chapter 7 The Wireless Local Area Network (WLAN
Chapter 8 Wireless Application Protocol (WAP)
Chapter 9 Wireless Transport Layer Security (WTLS)
Chapter 10 Bluetooth
Chapter 11 Voice Over Internet Protocol Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13 Optimizing Wireless Security with FPGAs and ASICs
Bibliography
Index




SEGURIDAD PARA COMUNICACIONES INALAMBRICAS
ORDERING DETAILS: "Seguridad para comunicaciones inalambricas", por Randall K. Nichols y Panos C. Lekkas, 1-a edicion, McGraw-Hill Interamericana, Division Profesional, ISBN 84-481-3782-5





Contenido:

Introducción
Prefacio
Agradecimientos
Acerca de los autores
Capítulo 1.- ¿Por qué son diferentes las comunicaciones inalámbricas?
Capítulo 2.- La guerra de la información en los entornos inalámbricos
Capítulo 3.- Vulnerabilidad de los sistemas telefónicos
Capítulo 4.- Comunicaciones vía satélite
Capítulo 5.- Seguridad Criptográfica
Capítulo 6.- Criptología de la voz
Capítulo 7.- WLAN: redes inalámbricas de área local
Capítulo 8.- Protocolo de aplicaciones inalámbricas (WAP)
Capítulo 9.- Seguridad en el nivel de transporte inalámbrico (WTLS)
Capítulo 10.- Bluetooth
Capítulo 11.- Voz sobre IP
Capítulo 12.- Perspectivas hardware para la seguridad extremo a extremo en las aplicaciones inalámbricas
Bibliografía
Indice





| Return Home | Portfolio of Services | Contact Us | Technical Publications |
 
     



Copyright © 2013, Xstream Technologies LLC. All rights reserved.