|
|
|
|
Radio Frequency Integrated Circuit Design (Artech House Microwave Library)Radio frequency integrated circuit (RFIC) design is an exciting area for research or product development. Technologies are constantly being improved, and as they are, circuits formerly implemented as discrete solutions can now be integrated onto a single chip. In addition to widely used applications such as cordless phones and... | | Wireless IP and Building the Mobile InternetWireless IP and Building the Mobile Internet is the first book to take a comprehensive look at the convergence of wireless and Internet technologies giving rise to the mobile wireless Internet as we know it. In short, the book endeavors to provide an overview of all the elements required to understand and develop the future... | | CDMA Systems Capacity EngineeringThe code division multiple access (CDMA) communication system is a wellestablished technology in the sense that it is one of technically proven methods to transmit voice information for multiple users via wireless communications during the last decade. Further, CDMA is an emerging technology for next generation multimedia ... |
|
|
802.11 WLANs and IP Networking: Security, QoS, and MobilityEven after all the earthly riches are enjoyed there still remains in the heart a longing for knowledge, true knowledge. It is this longing and the desire to bring the knowledge to others that resulted in the revelation of this book.
“How do IEEE 802.11 wireless local area networks (WLANs) work together with the... | | IT Project Portfolio ManagementWhile consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors... | | Privacy Protection and Computer Forensics, Second EditionThis book deals with security from hostile computer forensics (mostly on one’s computer, but also on one’s digital camera, fax machine, and related computer-like electronics), as distinct from network forensics, which in this context is snooping into users’ online activities. Computer forensics deals with... |
|
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 |