SHARE
Facebook X Pinterest WhatsApp

Lessons in Next-Generation Network Technologies

IT organizations are always looking ahead when creating networks for the enterprise. When it comes to IPv6, WLANs and other next-generation network technologies, IT pros may still need guidance on how to implement the technologies, which standards apply, and how to provide security measures. One book, “Building Next-Generation Converged Networks: Theory and Practice,” provides fundamental […]

Written By
thumbnail
Kim Mays
Kim Mays
Oct 10, 2013

IT organizations are always looking ahead when creating networks for the enterprise. When it comes to IPv6, WLANs and other next-generation network technologies, IT pros may still need guidance on how to implement the technologies, which standards apply, and how to provide security measures.

One book, “Building Next-Generation Converged Networks: Theory and Practice,” provides fundamental information on the latest networking advancements and gives a glimpse as to how these technologies will be realized in future implementations.

The book contains five categorized sections:

  • Multimedia streaming
  • Safety and security in networks
  • Network management and traffic engineering
  • Information infrastructure and cloud computing
  • Wireless networking

Within these sections, the authors cover topics such as P2P video streaming, SQL injection, VoIP and mobile IPv6. The book represents the compilation of detailed research from 56 experts within these industries.

To get a closer look at the level of information included in this book, our IT Downloads includes an excerpt from Chapter 7, “Wireless Network Security: An Overview.” This chapter covers security of wireless networks, cellular telephone networks, WLANs, 802.11, wireless PANs, IEEE 802.15, and best practices for mobile device security. On mobile security, the book offers this advice:

The best practice for mobile device security is to enable device authentication so that lost devices cannot be easily accessed by any person that finds or steals the device… The fact of the matter is that these devices are too easy to lose, and they can be used to enter the network if authentication is not enabled.

IT security professionals and anyone interested or working in wireless networking will benefit from reading this informative text. The excerpt on wireless security can help establish more secure wireless networks for any enterprise.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.