Home | Amazing | Today | Tags | Publishers | Years | Search 
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Wireless Mesh Networking: Architectures, Protocols and Standards
Wireless Mesh Networking: Architectures, Protocols and Standards

This is the first book to provide readers a comprehensive technical guide covering recent and open issues in wireless mesh networks. Wireless Mesh Networking: Architectures, Protocols and Standards explores the various key challenges in diverse scenarios as well as emerging standards, including capacity and scalability. It focuses on concepts,...

Smart Client Architecture and Design Guide (Patterns & Practices)
Smart Client Architecture and Design Guide (Patterns & Practices)
Get expert, pragmatic guidance on how to design and build smart client solutions that combine the benefits of traditional, rich-client applications with the manageability of thin clients. Software architects and developers will learn how to evaluate whether a smart client solution is appropriate for their client architecture, and get practical...
Signaling in Telecommunication Networks
Signaling in Telecommunication Networks
Guidance to help you grasp even the most complex network structures and signaling protocols

The Second Edition of Signaling in Telecommunication Networks has been thoroughly updated, offering new chapters and sections that cover the most recent developments in signaling systems and procedures. This acclaimed book...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Enterprise Knowledge Infrastructures
Enterprise Knowledge Infrastructures
Success of an organization is increasingly dependent on its capability to create an environment to improve the productivity of knowledge work. This book focuses on the concepts, models and technologies that are used to design and implement such an environment. It develops the vision of a modular, yet highly integrated enterprise knowledge...
Application of Agents and Intelligent Information Technologies
Application of Agents and Intelligent Information Technologies
The Web has sparked renewed interest in developing intelligent information systems that enable users to accomplish complex tasks in Web-centric environments with relative ease. Although artificially intelligent (AI) technologies such as expert systems and neural networks have been successfully used in aerospace, communication, medical, and...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Microsoft Exchange Server 2007 Unleashed
Microsoft Exchange Server 2007 Unleashed
This is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Networks and Telecommunications
Networks and Telecommunications
The second edition of this text is a much larger work than the first edition, having needed to be expanded with extensive new sections on data, broadband and multimedia networks and much extended coverage of modern transmission media, radio and network management. The technology may have moved on since 1990, but the original preface is as relevant...
M-Commerce Crash Course: The Technology and Business of Next Generation Internet Services
M-Commerce Crash Course: The Technology and Business of Next Generation Internet Services
In just a few short years the Internet has evolved from a tool that technologists dabbled with to one that consumers are actively using. This has radically altered the way business is conducted and set off a firestorm of change and growth in wireless telecommunications. In this book network expert P. J. Louis offers a technical insider¿s...
Result Page: 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy