 Wireless Security: Models, Threats, and SolutionsREAL-WORLD WIRELESS SECURITY
This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to... |  |  |  |  Delivering Utility Computing: Business-driven IT OptimizationLearn how to design and deploy utility computing systems to save costs and improve the value that IT delivers.
The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight. By following the principles of utility computing, also known as on-demand computing, real-time... |