Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User
Whether you are a network manager tasked with providing local wireless access to corporate business systems, or a home-based user, keen to optimize your data communications network, security will be the issue uppermost in your mind.

Wireless LANs are becoming ubiquitous. From hotel lobbies to Starbucks coffee shops, from...

Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
IP Address Management Principles and Practice (IEEE Press Series on Network Management)
IP Address Management Principles and Practice (IEEE Press Series on Network Management)

The practice of IP address management (IPAM) entails the application of network management disciplines to Internet Protocol (IP) address space and associated network services, namely Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS). The linkages among an IP address plan and configurations of DHCP and DNS servers are...

Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking
Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking

Next-generation architectures for survivable networks.

"Always on" information networks must automatically reroute around virtually any problem-but conventional, redundant ring architectures are too inefficient and inflexible. The solution: mesh-based networks that will be just as survivable-and far more...

Building a Cisco Wireless LAN
Building a Cisco Wireless LAN
Wireless LAN (Wi-Fi) technology is significantly more complex than cordless telephony; loss, coverage, and bandwidth requirements are much more stringent and the proliferation of wireless LANs in corporate environments has resulted in interesting security challenges. IEEE 802.11-based products offered by Cisco Systems have quickly become one of the...
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
The promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until...
Fundamentals of Telecommunications, 2nd Edition
Fundamentals of Telecommunications, 2nd Edition
The Second Edition of this popular text is updated with THE latest advances in telecommunications

The standard of excellence set in the critically acclaimed Fundamentals of Telecommunications continues in this Second Edition, by offering a thorough introduction to the fundamentals of telecommunication networks without bogging the reader down in...

Quantum Circuit Simulation
Quantum Circuit Simulation

Quantum Circuit Simulation covers the fundamentals of linear algebra and introduces basic concepts of quantum physics needed to understand quantum circuits and algorithms. It requires only basic familiarity with algebra, graph algorithms and computer engineering. After introducing necessary background, the authors describe key simulation...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
Fundamental data structures in a consistent object-oriented framework

Now revised to reflect the innovations of Java 5.0, Goodrich and Tamassia’s Fourth Edition of Data Structures and Algorithms in Java continues to offer accessible coverage of fundamental data structures, using a consistent...

Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy