 |
|
 Contributions to Ubiquitous Computing (Studies in Computational Intelligence)Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.
This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed... |  |  Websphere MQ Security in an Enterprise Environment (IBM Redbooks)This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent... |  |  Ubuntu: The Complete Reference (Complete Reference Series)The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS
Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up... |
|
|
 Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.... |  |  Wireless Security and Cryptography: Specifications and ImplementationsAs the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which... |  |  The Definitive Guide to Linux Network Programming (Expert's Voice)
This book is…one nice and convenient package that I will keep on the shelf as a reference manual.
The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on... |
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |