Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications
Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...
If you're new to Elements and need a complete overview of each feature and function, you'll find exactly what you're looking for here: step-by-step instructions covering every aspect of Elements, accompanied by helpful screenshots and colorful images. If you're a more experienced user, you'll find Philip's signature...
The Verilog language is a hardware description language that provides a means of specifying a digital system at a wide range of levels of abstraction. The language supports the early conceptual stages of design with its behavioral level of abstraction, and the later implementation stages with its structural abstractions. The language includes...
As a beginning graduate student, I recall being frustrated by a general lack of accessible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my...
This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...
HTML5 and CSS3 are the future of web development, but you don't have to wait to start using them. Even though the specification is still in development, many modern browsers and mobile devices already support HTML5 and CSS3. This book gets you up to speed on the new HTML5 elements and CSS3 features you can use right now, and...
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5
is a very different product from previous versions of the product. What once was a
simple offering that provided secure instant messaging with some web conferencing
capabilities has now evolved into a robust, flexible, sophisticated communications...
Moodle has evolved from an academic project to the world's most popular Virtual
Learning Environment (VLE). During this evolution, its complexity has risen
dramatically and so have the skills that are required to administer the system.
Moodle 2 Administration is a complete, practical guide for administering Moodle...
As both a highly readable tutorial and a definitive reference for over a million Mathematica users worldwide, this book covers every aspect of Mathematica. It is an essential resource for all users of Mathematica from beginners to experts. This expanded fifth edition presents Mathematica Version 5 for the first time and is important for...
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the
two together and write a book? Well, surely there will be some individuals that may make that
assumption as to the motivation behind the publication of this book. The real motivation behind
the development of this book is because...
Current and future mobile terminals become increasingly complex because they have
to deal with a variety of frequency bands and communication standards. Achieving
multi-band/multi-mode functionality is especially challenging for the radio frequency
(RF)-transceiver section, due to limitations in terms of frequency-agile RF components...
Many probability books are written by mathematicians and have the built-in bias that the reader is assumed to be a mathematician coming to the material for its beauty. This textbook is geared towards beginning graduate students from a variety of disciplines whose primary focus is not necessarily mathematics for its own sake. Instead,...