Home | Amazing | Today | Tags | Publishers | Years | Search 
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)

This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Telecom Crash Course, Second Edition
Telecom Crash Course, Second Edition
THE DEFINITIVE TELECOM RESOURCE -- COMPLETELY REVISED AND UPDATED

Get a thorough introduction to the telecommunications industry -- from the technologies involved to the complex business, market, and regulatory relationships. This new edition of the acclaimed telecom guide provides a framework for understanding the concepts,...

Mobile Application Development with SMS and the SIM Toolkit
Mobile Application Development with SMS and the SIM Toolkit
Get mobile messaging going on virtually any platform, in any language

Mobile Application Development Using SMS and the SIM Toolkit is just the guide you’ve been looking for if you’re building applications for GSM or 3G networks, wish you had sample code for reality-based applications, or want to add mobile...

ARM System-on-Chip Architecture
ARM System-on-Chip Architecture
information appliances - phones, PDAs, laptops and other devices. The ARM is at the heart of this trend, leading the way in system-on-chip (SoC) development and becoming the processor core of choice for many embedded applications.

System-on-chip technology is changing the way we use computers, but it also sets designers the very...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Inhabited Information Spaces: Living with your Data
Inhabited Information Spaces: Living with your Data
In this book you will find some examples of work in particular from the Inhabited Information Spaces Grouping. It is interesting to see how some of these ideas are still “futuristic” and others have started to become part of mainstream thinking and made their way into products.

Some people say that you can find
...
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

Finally--a single volume guide to really effective security for both voice and data wireless networks!

More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable
...

Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Building on the success of the first edition, Mobile Messaging Technologies and Services offers extensive new and revised material based upon the latest research and industry developments. While early implementations targeted person-to-person messaging, MMS has now evolved to facilitate such requirements as the mass delivery of...
Wireless Technician's Handbook (Artech House Mobile Communications Library)
Wireless Technician's Handbook (Artech House Mobile Communications Library)
I have noticed over my 20-year career in wireless engineering that the most effective technicians and engineers are those who understood the basic fundamentals of radio frequency engineering. Too often, technicians understand how to follow the test procedures or troubleshooting guidelines to make the RF measurements, but does not understand what...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy