Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Professional Crystal Reports for Visual Studio .NET, 2nd Edition
Professional Crystal Reports for Visual Studio .NET, 2nd Edition
The addition of Crystal Reports 9.0 to Visual Studio .NET 2003 offers developers a reporting tool that allows you to turn almost any data into interactive, dynamic content through portals, wireless devices, and Microsoft Office documents. This code-intensive guide takes you step by step through developing reports and incorporating them into...
Special Edition Using Java Server Pages and Servlets
Special Edition Using Java Server Pages and Servlets
Special Edition Using JSP and Servlets starts by detailing the evolution of web servers that led to the creation of ASP and JSP. It explains both the limitations of previous technologies and the benefits that JSP provides including platform independence. Includes coverage of: organizing applications with multiple files and client-side objects,...
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Expert .NET Micro Framework
Expert .NET Micro Framework
The Microsoft .NET Micro Framework is a small and efficient .NET runtime environment used to run managed code on devices that are too small and resource constrained for Windows CE and the Compact Framework.

Expert .NET Micro Framework will teach you everything you need to know in order to use the .NET Micro Framework to create effective...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

PCs For Dummies Quick Reference (Computer/Tech)
PCs For Dummies Quick Reference (Computer/Tech)
Fast answers to frequently asked questions

All the PC essentials at your fingertips!

If you like your answers quick and your information up-to-date, look no further. This concise, superbly organized reference walks you through setting up a PC, connecting all the parts, using programs, organizing your stuff, storing things on disk,...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Visual Media Coding and Transmission
Visual Media Coding and Transmission

This book presents the state-of-the-art in visual media coding and transmission

Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
XML in Theory and Practice
XML in Theory and Practice

XML is a powerful cross-platform mark-up language which has been readily adopted as a standard in many spheres of web and software development. Real benefits include its ease of integration into existing systems, the simplicity of using it in object-oriented environments and its wide applicability. Chris Bates shows how to use XML in modern...

Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

unlimited object storage image
Result Page: 129 128 127 126 125 124 123 122 121 120 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy