|
|
|
|
AD HOC NETWORKS: Technologies and ProtocolsWireless mobile networks and devices are becoming increasingly popular as they provide users access to information and communication anytime and anywhere. Conventional wireless mobile communications are usually supported by a wired fixed infrastructure. A mobile device would use a single-hop wireless radio communication to... | | Open-Source ESBs in ActionMost modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code.... | | Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |
|
Internetworking Troubleshooting Handbook (2nd Edition)If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an... | | Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... | | Voice Over IP Crash CourseRecent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also... |
|
The All-New Switch Book: The Complete Guide to LAN Switching TechnologyThe much-anticipated update to the bestselling book on LAN switching
Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer... | | Building Modern Web Applications Using Angular
Key Features
-
Learn about the core building blocks of Angular
-
Build and architect high performance web applications
-
Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
-
Leverage the latest Angular features to get the most out of your web
... | | |
|
Quantum Computing and Communications: An Engineering ApproachQuantum computers will revolutionize the way telecommunications networks function.
Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment.... | | Deploying Cisco Voice over IP SolutionsIf you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in... | | Botnets: The Killer Web AppThis is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world... |
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 |