|
|
|
|
VoIP Service Quality : Measuring and Evaluating Packet-Switched VoiceVoIP SAVINGS AND FLEXIBILITY! TELEPHONE-LINE QUALITY?
Despite the features that make Voice over IP so attractive from the standpoint of cost and flexibility of telephone services, businesses will only adopt it once they’ve determined whether, and under what circumstances, the quality of VoIP will be satisfactory to... | | Privacy Defended: Protecting Yourself OnlinePrivacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical... | | Knowledge Based Radar Detection, Tracking and ClassificationThis book brings together the key concepts essential for the application of Knowledge Based Systems (KBS) to radar detection, tracking, classification, and scheduling. It highlights the latest advances in the field and forecasts the impact of KB technology on future systems, including civilian, military, and homeland defense applications.... |
|
Encyclopedia of Prisoners of War and InternmentThis invaluable A-to-Z reference work presents nearly 300 entries that survey the history of prisoners of war and interned civilians from the earliest times to the present, with emphasis on the nineteenth and twentieth centuries. It explores such themes as famous prisoners of war throughout history, medical conditions, atrocities, escapes,... | | | | |
|
|
Design Engineering: A Manual for Enhanced CreativityAs with any art, science, or discipline, natural talent is only part of the equation. Consistent success stems from honing your skills, cultivating good techniques, and hard work. Design engineering, a field often considered an intuitive process not amenable to scientific investigation, is no exception. Providing descriptive theory, broad context,... | | Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... | | |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |