Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
Wireless sensor networks will revolutionise applications such as environmental monitoring, home automation, and logistics.

Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the most important issues and questions that have to be addressed in a wireless sensor network....

Marketing to the Social Web: How Digital Customer Communities Build Your Business
Marketing to the Social Web: How Digital Customer Communities Build Your Business

An updated and expanded Second Edition of the popular guide to social media for the business community

Marketers must look to the Web for new ways of finding customers and communicating with them, rather than at them. From Facebook and YouTube to blogs and Twitter-ing, social media on the Internet is the most promising new way to...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Test and Measurement: Know It All (Newnes Know It All)
Test and Measurement: Know It All (Newnes Know It All)

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

Field Application engineers need to master a wide area of
...

Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Symbian OS C++ for Mobile Phones
Symbian OS C++ for Mobile Phones
Programming Symbian OS is a key skill for mass market phone application development. Whether you are developing a
services for shipping mobile phones, or involved in pre-market mobile phone development, this book will help you unde
fundamental theory behind developing Symbian OS C++ code for constrained devices.

• A
...
PC Repair Bench Book
PC Repair Bench Book
Your one-stop guide to
  • Understanding and repairing motherboards, processors, chipsets, BIOS, and system resources
  • Updating and optimizing memory and aging systems
  • Diagnosing common PC problems and performing routine maintenance
  • Installing and configuring system upgrades
  • Working...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
“a comprehensive overview of both DDS architectures and fractional-N frequency synthesizers.” Microwave Journal said this book “is aimed specifically at practical designers and utilizes many intuitive explanations and design examples.” Microwaves & RF magazine

"Bar-Giora Goldberg should
...
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

unlimited object storage image
Result Page: 149 148 147 146 145 144 143 142 141 140 139 138 137 136 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy