Home | Amazing | Today | Tags | Publishers | Years | Search 
Seven Deadliest Wireless Technologies Attacks
Seven Deadliest Wireless Technologies Attacks

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

A Developer's Guide to Amazon SimpleDB
A Developer's Guide to Amazon SimpleDB

The Complete Guide to Building Cloud Computing Solutions with Amazon SimpleDB

 

Using SimpleDB, any organization can leverage Amazon Web Services (AWS), Amazon’s powerful cloud-based computing platform–and dramatically reduce the cost...

Handbook of Cloud Computing
Handbook of Cloud Computing

Cloud computing has become a significant technology trend. Experts believe cloud computing is currently reshaping information technology and the IT marketplace. The advantages of using cloud computing include cost savings, speed to market, access to greater computing resources, high availability, and scalability.

Handbook of Cloud...

Regulation and the Evolution of the Global Telecommunications Industry
Regulation and the Evolution of the Global Telecommunications Industry

After decades of liberalization of the telecommunications industry around the world and technological convergence that allows for increasing competition, sector-specific regulation of telecommunications has been on the decline. As a result, the telecommunications industry stands in the middle of a debate that calls for either a total...

Load Balancing Servers, Firewalls, and Caches
Load Balancing Servers, Firewalls, and Caches

From an industry insider--a close look at high-performance, end-to-end switching solutions
Load balancers are fast becoming an indispensable solution for handling the huge traffic demands of the Web. Their ability to solve a multitude of network and server bottlenecks in the Internet age ranges from dramatic improvements in server
...

Tcl 8.5 Network Programming
Tcl 8.5 Network Programming

Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...

Building the Realtime User Experience: Creating Immersive and Interactive Websites
Building the Realtime User Experience: Creating Immersive and Interactive Websites

The Web is increasingly happening in realtime. With websites such as Facebook and Twitter leading the way, users are coming to expect that all sites should serve content as it occurs -- on smartphones as well as computers. This book shows you how to build realtime user experiences by adding chat, streaming content, and including more...

Hacking Exposed Wireless, Second Edition
Hacking Exposed Wireless, Second Edition

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily...

Personal Networks: Wireless Networking for Personal Devices
Personal Networks: Wireless Networking for Personal Devices

Written by experts in the field, this book describes the Personal Network architecture and its various components

This book focuses on networking and security aspects of Personal Networks (PNs). Given a single user, the authors propose an architecture for PNs in which devices are divided into one of two types of nodes:...

Capitalism at the Crossroads: Next Generation Business Strategies for a Post-Crisis World (3rd Edition)
Capitalism at the Crossroads: Next Generation Business Strategies for a Post-Crisis World (3rd Edition)

“The central message of Stuart Hart’s book is that global business needs to be caring and be committed to preserving the globe’s ecological integrity. The ongoing economic slowdown brought about by rampant capitalism, the lessons from which this new edition of the book factors in, has only served to...

Ubiquitous Computing
Ubiquitous Computing

Near Field Communication (NFC) technology has become increasingly important for ubiquitous computing. Florian Resatsch investigates the optimal strategies for developing and evaluating ubiquitous computing applications based on NFC. He draws on a variety of current theories on ubiquitous computing, human-computer interaction, and technology...

Result Page: 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy