Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Radio Network Design in the VHF and UHF Bands: A Practical Approach
Mobile Radio Network Design in the VHF and UHF Bands: A Practical Approach
An essential element of radio technology and propagation is how to use radio technology and knowledge of radio propagation to design a network that meets the needs of customers. Mobile Radio Network Design in the VHF and UHF Bands provides the technical and fundamental knowledge required for advanced mobile radio network design to...
Wireless Communications Design Handbook: Space Interference
Wireless Communications Design Handbook: Space Interference
During the decade of the !970s and even in the early 1980s, satellite communications was basically analog (though digital was already in the drawing board), and most satellites were huge, bulky, and in geosynchronous orbit. Most of the satellites in lower orbits were either military or scientific in nature~ Things have changed within the past five...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Deciding how to invest homeland security resources wisely in the United States can often appear to be an intractable problem because the large, open American society seems to be so vulnerable to so many threats in every corner of the country. This monograph is intended to help bound the problem in order to aid policy and resource decisions about...
Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
Securing Citrix XenApp Server in the Enterprise
Securing Citrix XenApp Server in the Enterprise
Secure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features
...
Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Statistics and Data with R: An applied approach through examples
Statistics and Data with R: An applied approach through examples
R, an Open Source software, has become the de facto statistical computing environment. It has an excellent collection of data manipulation and graphics capabilities. It is extensible and comes with a large number of packages that allow statistical analysis at all levels – from simple to advanced – and in numerous fields...
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy