The Definitive Guide to Stellent Content Server Development is the most complete book available for this Enterprise Content Management application. It gives an introduction to Content Management, followed by an in-depth discussion of Stellent's core service-oriented architecture.
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders).
This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly...
'Next Generation' refers to the new technologies and services that telecommunications operators will have at their disposal as they create new 3G networks where voice and data converge and which are based on packet switched rather than circuit switched telephony.
Providing a much needed overview of the latest communication technologies...
Perl has always been a powerful and popular programming language, but with its new object capabilities, it can do even more. Written for anyone with a little Perl experience, Damian Conway's Object Oriented Perl provides an invaluable guide to virtually every aspect of object-oriented programming in Perl.
This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
Flex 2 represents something of a revolution in web applications. It is the next evolutionary step of Flash, which has grown from a web animation tool to a powerful enterprise web design and development tool. with nearly 98% of all web browsers and cellular phones running the Flash player needed to use Flash and Flex applications, knowledge of Flex...
Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies, the NGN is not being planned as the next-generation Internet. In its intention and architecture, it is more accurately described as Broadband-ISDN release 2.0. The NGN is hard to...
The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs. This approach, known as transactional memory, offers an alternative, and hopefully better, way to coordinate concurrent threads. The ACI (atomicity, consistency, isolation) properties of...