 |
|
|
 Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless... |  |  JRuby CookbookIf you're interested in JRuby, you probably don't need a turorial on Ruby, Rails, or Java -- you just need to know how to get things done. This Cookbook offers practical solutions for using the Java implementation of the Ruby language, with targeted recipes for deploying Rails web applications on Java servers, integrating JRuby code with Java... |  |  MCTS 70-640 Exam Cram: Windows Server 2008 Active Directory, ConfiguringWelcome to MCTS 70-640 Exam Cram: Windows Server 2008 Active Directory, Configuring. This book aims to help you get ready to take—and pass—Microsoft Certification Exam 70-640: TS: Windows Server 2008 Active Directory, Configuring. This book contains information to help ensure your success as you pursue this Microsoft exam and... |
|
 Intelligent Network Video: Understanding Modern Video Surveillance SystemsThis is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also... |  |  Deploying Wireless Networksdeployment cycle in cellular and broadband wireless networks, including OFDM-WiMAX/LTE
Wireless operators will find this practical, hands-on guide to network deployment invaluable. Based on their own extensive experience, the authors describe an end-to-end network planning process to deliver the guaranteed Quality of Service... |  |  Implementing 802.1X Security Solutions for Wired and Wireless NetworksWhen deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an... |
|
|
| Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |