Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Oracle 11g For Dummies (Computer/Tech)
Oracle 11g For Dummies (Computer/Tech)
Are you a seasoned system administrator charged with setting up an Oracle database? Or did you suddenly become a DBA by default? If database administration with Oracle is part of your job, you’ll be glad to have Oracle 11g For Dummies in your cubicle.

This nuts-and-bolts guide walks you through the mysteries of Oracle and...

Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Intelligent Infrastructures (Intelligent Systems, Control and Automation: Science and Engineering)
Intelligent Infrastructures (Intelligent Systems, Control and Automation: Science and Engineering)

Society heavily depends on infrastructure systems, such as road-traffic networks, water networks, electricity networks, etc. Infrastructure systems are hereby considered to be large-scale, networked systems, that almost everybody uses on a daily basis, and that are so vital that their incapacity or destruction would have a debilitating impact on...

Test and Measurement: Know It All (Newnes Know It All)
Test and Measurement: Know It All (Newnes Know It All)

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

Field Application engineers need to master a wide area of
...

Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Business Creativity: Breaking the Invisible Barriers
Business Creativity: Breaking the Invisible Barriers
Many companies and organizations have found it difficult to develop creative skills. The authors argue that while individuals have inherent creativity there are a number of assassins or barriers that block individual creative development. This bold new approach to creativity enhancement will focus upon how to remove barriers and create...
CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World
XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World

In order for a business to thrive in today’s dynamic world, its computing infrastructure must enable the secure flow of information—not only within the business but also with suppliers and customers. However, many of today’s computing infrastructures suffer from “information chaos” and are unable to support this...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy