Home | Amazing | Today | Tags | Publishers | Years | Search 
Telecom Crash Course, Second Edition
Telecom Crash Course, Second Edition
THE DEFINITIVE TELECOM RESOURCE -- COMPLETELY REVISED AND UPDATED

Get a thorough introduction to the telecommunications industry -- from the technologies involved to the complex business, market, and regulatory relationships. This new edition of the acclaimed telecom guide provides a framework for understanding the concepts,...

Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Take command of core technologies at the heart of all telecommunications systems with the first book expressly designed to help you apply, reuse, and enhance building-block components from one generation of networks to the next. This unique problem-solver unravels the complexities behind such technologies as synchronization, multiple access,...
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
—John Baichtal (Wired Blog, August, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of...

Content Networking in the Mobile Internet
Content Networking in the Mobile Internet

A cutting-edge guide to the next generation Mobile Internet architecture and applications

The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is...

Next Generation Networks: Perspectives and Potentials
Next Generation Networks: Perspectives and Potentials

Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information.  NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.

...

Validation of Telecom Systems with SDL
Validation of Telecom Systems with SDL
Validation of Communications Systems with SDL provides a clear practical guide to validating, by simulation, a telecom system modelled in SDL. SDL, the Specification and Description Language standardised by the International Telecommunication Union (ITU-T), is used to specify and develop complex systems such as GSM, GPRS, UMTS, IEEE 802.11...
UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
Building on the success of the first edition, UMTS Networks second edition allows readers to continue their journey through UMTS up to the latest 3GPP standardization phase, Release 5. Containing revised, updated and brand new material, it provides a comprehensive view on the UMTS network architecture and its latest developments....
Wireless Internet and Mobile Computing: Interoperability and Performance (Information and Communication Technology Series,)
Wireless Internet and Mobile Computing: Interoperability and Performance (Information and Communication Technology Series,)
This book describes the technologies involved in all aspects of a large networking system and how the various devices can interact and communicate with each other. Using a bottom up approach the authors demonstrate how it is feasible, for instance, for a cellular device user to communicate, via the all-purpose TCP/IP protocols, with a wireless...
Carrier Grade Voice Over IP (second edition)
Carrier Grade Voice Over IP (second edition)
NEW EDITION OF---CUTTING-EDGE SOLUTIONS CUT-TO-THE-CHASE STYLE

In the race to put carrier-quality voice over IP (VoIP)——those using this book run faster and falter less. International expert Daniel Collins’ greatly enhanced Carrier Grade Voice over IP brings you leading-edge signaling schemes,...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Building on the success of the first edition, Mobile Messaging Technologies and Services offers extensive new and revised material based upon the latest research and industry developments. While early implementations targeted person-to-person messaging, MMS has now evolved to facilitate such requirements as the mass delivery of...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy