Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
An implementer’s guide to setting up, configuring, and managing a secure wireless network

Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a...

IP in Wireless Networks
IP in Wireless Networks

The complete network professional's guide to delivering wireless IP.

  • Wireless IP: the professional's guide to understanding data in wireless networks
  • Covers IP in 802.11, Bluetooth(tm), GSM/GPRS, W-CDMA, cdma2000, i-mode, and more
  • Includes expert insights into architecture, mobility models, and...
Wireless and Mobile Data Networks
Wireless and Mobile Data Networks
Connecting to the Future of Wireless Data Technologies

Presenting complex subjects without getting into advanced mathematics, Wireless and Mobile Data Networks gives students and professionals a comprehensive overview of major wireless network architectures and standards.

The opening chapters introduce wireless data network types,...

Telecommunications and Data Communications Handbook
Telecommunications and Data Communications Handbook
A practical, accessible survey of telecommunications and data communications services and technologies

Finally, there is a commonsense guide to telecommunications and data communications that non-engineers can understand. Popular author Ray Horak provides comprehensive, up-to-date information in plain English, instead of confusing technotalk....

Laptops For Dummies Quick Reference (Computer/Tech)
Laptops For Dummies Quick Reference (Computer/Tech)
If you’re a part of the business world, chances are that you need to use a laptop for mobile computing. Newly revised and updated to serve as a valuable guide for anyone who operates a laptop computer, Laptops for Dummies Quick Reference, 2nd Edition is an indispensable guide that’s perfect for when you’re on...
Bluetooth Demystified
Bluetooth Demystified
Understand the Bluetooth standard.

Compare its strengths and weaknesses against other technologies.

Preview coming products and applications.

See the protocols and usage models at work.

BLUETOOTH DEMYSTIFIED

Cut through Bluetooth's complexity with this special tutorial, Bluetooth Demystified. This...

Skype For Dummies (Computer/Tech)
Skype For Dummies (Computer/Tech)
See how to use Skype for secure chats and connect SkypeOut and SkypeIN. Here's the fun and easy way (r) to understand all the hype about Skype and make this cool alternative communication system work for you! You'll get great advice about hardware, directions for downloading and installing Skype, ideas for using Skype in your business, and the...
TCP/IP Embedded Internet Applications
TCP/IP Embedded Internet Applications
Introducing the technology from square one through real-world design applications, this book will significantly reduce R&D time - and spend. Eddie Insam's approach to the internet protocols TCP/IP is to explore their potential as a practical tool for design engineers building web communication and capabilities into embedded systems for the next...
Bluetooth Essentials for Programmers
Bluetooth Essentials for Programmers
This book provides an introduction to Bluetooth programming, with a specific focus on developing real code. The authors discuss the major concepts and techniques involved in Bluetooth programming, with special emphasis on how they relate to other networking technologies. They provide specific descriptions and examples for creating applications in...
Ad Hoc Mobile Wireless Networks: Protocols and Systems
Ad Hoc Mobile Wireless Networks: Protocols and Systems

The authoritative guide to the state of the art in ad hoc wireless networking.

  • Reflects the field's latest breakthroughs

  • Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much...

The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Programming PIC Microcontrollers with XC8
Programming PIC Microcontrollers with XC8
Learn how to use microcontrollers without all the frills and math. This book uses a practical approach to show you how to develop embedded systems with 8 bit PIC microcontrollers using the XC8 compiler. It's your complete guide to understanding modern PIC microcontrollers.

Are you tired of...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy