|
|
|
|
| | | | Security Sage's Guide to Hardening the Network InfrastructureWith the proliferation of wireless access points (WAPs), virtual private networks (VPNs), and extranets, it’s becoming increasingly difficult to determine where your network begins and ends. Add this complexity to common economic factors, such as company mergers and acquisitions, and now you have a tangled web of... |
|
|
Linux on the Mainframe Linux on the Mainframe is the comprehensive guide to the fastest growing trend in IT. IBM's Linux experts present peerless instruction in the art of planning for and making the most of a Linux mainframe. This book's in-depth coverage includes virtualization, deployment, data management,... | | Advances in Mobile Radio Access NetworksThis book gives a comprehensive overview of the technologies for the advances of mobile radio access networks. The topics covered include linear transmitters, superconducting filters and cryogenic radio frequency (RF) front head, radio over fiber, software radio base stations, mobile terminal positioning, high speed downlink... | | Beginning Apache Struts: From Novice to ProfessionalThis book describes a web application framework called Apache Struts, with which you can easily build robust, maintainable web applications. Now, the three italicized adjectives aren’t just hype:
• Simplicity: Struts is relatively easy to pick up and use effectively. You get a lot out of Struts for the effort... |
|
Enabling Technologies for Mobile Services: The MobiLife BookThis book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that... | | Programming INDIGOMicrosoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.
I wrote my first communication program over 20 years ago and... | | Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... |
|
|
Result Page: 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 |