 |
|
 Mobile Radio Network Design in the VHF and UHF Bands: A Practical ApproachAn essential element of radio technology and propagation is how to use radio technology and knowledge of radio propagation to design a network that meets the needs of customers. Mobile Radio Network Design in the VHF and UHF Bands provides the technical and fundamental knowledge required for advanced mobile radio network design to... |  |  Wireless Communications Design Handbook: Space InterferenceDuring the decade of the !970s and even in the early 1980s, satellite communications was basically analog (though digital was already in the drawing board), and most satellites were huge, bulky, and in geosynchronous orbit. Most of the satellites in lower orbits were either military or scientific in nature~ Things have changed within the past five... |  |  Wireless Security: Know It AllThe latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and... |
|
 2600: The Hacker Quarterly, Spring 20052600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well... |  |  2600: The Hacker Quarterly, Spring 20032600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet... |  |  Network Security Evaluation: Using the NSA IEMAre you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop... |
|
 |  |  Basics of Contemporary Cryptography for IT PractitionersThe aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques... |  |  Securing Citrix XenApp Server in the EnterpriseSecure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features... |
|
 |  |  UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... |  |  Statistics and Data with R: An applied approach through examplesR, an Open Source software, has become the de facto statistical computing environment. It has an excellent collection of data manipulation and graphics capabilities. It is extensible and comes with a large number of packages that allow statistical analysis at all levels – from simple to advanced – and in numerous fields... |
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |