MARC details
000 -LEADER |
fixed length control field |
02088nam a2200217Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520102923.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780134463056 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK 5105.62 .C43 2017 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Chayapathi, Rajendra |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Network functions virtualization (NFV) with a touch of SDN / |
Statement of responsibility, etc. |
Rajendra Chayapathi, Syed Farrukh Hassan, and Paresh Shah. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, Massachusetts : |
Name of publisher, distributor, etc. |
Addision-Wesley Publishing Company, |
Date of publication, distribution, etc. |
c2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiii, 340 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
365 ## - TRADE PRICE |
Price amount |
USD39.99 |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Network Functions Virtualization (NFV) will drive dramatic cost reductions while also accelerating service delivery. Using NFV with SDN, network owners can provision new functions rapidly on demand, improve scalability, and leverage microservices. Benefits like these will make NFV indispensable for service providers, mobile operators, telcos, and enterprises alike. Network Functions Virtualization (NFV) with a Touch of SDN is the first practical introduction to NFV’s fundamental concepts, techniques, and use cases. Written for wide audiences of network engineers, architects, planners, and operators, it assumes no previous knowledge of NFV architecture, deployment, or management. The authors first explain how virtualization, VMs, containers, and related technologies establish the foundation for the NFV transformation. Next, they show how these concepts and technologies can be applied to virtualize network functions in the cloud, data centers, routing, security, and the mobile packet core. You’ll discover new tools and techniques for managing and orchestrating virtualized network devices, and gain new clarity on how SDN and NFV interact and interrelate. By the time you’re done, you’ll be ready to assess vendor claims, evaluate architectures, and plan NFV’s role in your own networks. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER NETWORK ARCHITECTURES |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hassan, Syed Farrukh;Shah, Paresh |
Relator term |
co-author;co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |