|
|
|
|
Voice over IP Fundamentals (2nd Edition)A systematic approach to understanding the basics of Voice over IP
* Understand the basics of PSTN services and IP signaling protocols, including SS7 * Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner * Delve into such VoIP topics as jitter,... | | Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... | | Learning Wireless Java"Learning Wireless Java" is for Java developers who want to quickly come up to speed and create applications for the Micro Edition audience. This book covers the Connected, Limited Device Configuration and the Mobile Information Device Profile (MIDP), both currently available from Javasoft. The CLDC contains APIs for small devices that... |
|
|
|
Building Web, Cloud, and Mobile Solutions with F#
If you were to do a search right now for the hottest technology trends, you would see a
consistent theme of focus on the technical areas of web, cloud, and mobile solutions
combined with big data and economies of scale. With these trends comes a need for
tools that allow technologists, such as you and me, to harness ... | | ASP.NET MVC 4 Mobile App Development
The ASP.NET MVC 4 framework is used to build scalable web applications with the help of design patterns and .NET Framework. The Model-View-Controller (MVC) is a design principle which separates the components of a web application. This separation helps you to modify, develop, and test different components of a web application.
... | | Learning iOS Forensics
A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools
About This Book
-
Perform logical, physical, and file system acquisition along with jailbreaking the device
-
Get acquainted with various case studies on different forensic toolkits...
|
|
|
Result Page: 231 230 229 228 227 226 225 224 223 222 221 220 |