Home | Amazing | Today | Tags | Publishers | Years | Search 
Inhabited Information Spaces: Living with your Data
Inhabited Information Spaces: Living with your Data
In this book you will find some examples of work in particular from the Inhabited Information Spaces Grouping. It is interesting to see how some of these ideas are still “futuristic” and others have started to become part of mainstream thinking and made their way into products.

Some people say that you can find
...
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
ARM System-on-Chip Architecture
ARM System-on-Chip Architecture
information appliances - phones, PDAs, laptops and other devices. The ARM is at the heart of this trend, leading the way in system-on-chip (SoC) development and becoming the processor core of choice for many embedded applications.

System-on-chip technology is changing the way we use computers, but it also sets designers the very...

Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)

This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...

Telecom Crash Course, Second Edition
Telecom Crash Course, Second Edition
THE DEFINITIVE TELECOM RESOURCE -- COMPLETELY REVISED AND UPDATED

Get a thorough introduction to the telecommunications industry -- from the technologies involved to the complex business, market, and regulatory relationships. This new edition of the acclaimed telecom guide provides a framework for understanding the concepts,...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Carrier Grade Voice Over IP (second edition)
Carrier Grade Voice Over IP (second edition)
NEW EDITION OF---CUTTING-EDGE SOLUTIONS CUT-TO-THE-CHASE STYLE

In the race to put carrier-quality voice over IP (VoIP)——those using this book run faster and falter less. International expert Daniel Collins’ greatly enhanced Carrier Grade Voice over IP brings you leading-edge signaling schemes,...

Wireless Internet and Mobile Computing: Interoperability and Performance (Information and Communication Technology Series,)
Wireless Internet and Mobile Computing: Interoperability and Performance (Information and Communication Technology Series,)
This book describes the technologies involved in all aspects of a large networking system and how the various devices can interact and communicate with each other. Using a bottom up approach the authors demonstrate how it is feasible, for instance, for a cellular device user to communicate, via the all-purpose TCP/IP protocols, with a wireless...
UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
Building on the success of the first edition, UMTS Networks second edition allows readers to continue their journey through UMTS up to the latest 3GPP standardization phase, Release 5. Containing revised, updated and brand new material, it provides a comprehensive view on the UMTS network architecture and its latest developments....
Validation of Telecom Systems with SDL
Validation of Telecom Systems with SDL
Validation of Communications Systems with SDL provides a clear practical guide to validating, by simulation, a telecom system modelled in SDL. SDL, the Specification and Description Language standardised by the International Telecommunication Union (ITU-T), is used to specify and develop complex systems such as GSM, GPRS, UMTS, IEEE 802.11...
Next Generation Networks: Perspectives and Potentials
Next Generation Networks: Perspectives and Potentials

Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information.  NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.

...

Content Networking in the Mobile Internet
Content Networking in the Mobile Internet

A cutting-edge guide to the next generation Mobile Internet architecture and applications

The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy