Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
You bought your Centrino laptop computer because of its ease-of-use and portability. But are you using your laptop to its maximum potential? Anywhere Computing with Laptops: Making Mobile Easier will show you what to expect when buying and configuring your laptop and how to use built-in features such as digital...
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)
Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)

Ultra-wideband (UWB) radios are expected to play a revolutionary role in the future of wireless communications systems. The great interest in UWB communications was sparked by FCC rulings in February 2002 that authorized the unlicensed commercial deployment of UWB technology under a strict power control in 7500 MHz of spectrum. This...

Information Technology Security: Advice from Experts (IT Solutions)
Information Technology Security: Advice from Experts (IT Solutions)

As the value of the information portfolio has increased, IT security has changed from a product focus to a business management process. Today, IT security is not just about controlling internal access to data and systems but managing a portfolio of services including wireless networks, cyberterrorism protection and business continuity planning...

Grid Computing (On Demand Series)
Grid Computing (On Demand Series)
IBM Business On Demand Series: Your business blueprint for leveraging the grid computing revolution.

When you turn on the light, the power grid delivers exactly what you need, instantly. What if computers and networks could work that way? Now they can...and that will transform the way you do business. Grid Computing is about the "Business...

MCTS Self-Paced Training Kit (Exam 70-536): Microsoft  .NET Framework 2.0 Application Development Foundation (Pro-Developer)
MCTS Self-Paced Training Kit (Exam 70-536): Microsoft .NET Framework 2.0 Application Development Foundation (Pro-Developer)

Announcing an all-new MCTS Training Kit designed to help maximize your performance on Exam 70-536, a core exam for the new Microsoft Technology Specialist and Professional Developer certifications. This kit packs the tools and features that exam candidates want most—including in-depth, self-paced training based on final exam content;...

Networks of Innovation : Change and Meaning in the Age of the Internet
Networks of Innovation : Change and Meaning in the Age of the Internet
Integrating concepts from multiple theoretical disciplines and detailed analyses of the evolution of Internet-related innovations (including computer networking, the World Wide Web and the Linux open source operating system), this book develops foundations for a new theoretical and practical
understanding of innovation. It covers topics
...
Structure and Interpretation of Signals and Systems
Structure and Interpretation of Signals and Systems
This book provides an accessible introduction to signals and systems by beginning with an early introduction to cound and image applications, as opposed to circuits, that motivate readers to learn the theory. The book is accompanied by a robust website with detailed notes and illustrative applets for most every topic. An accessible introduction to...
Practical Firewalls
Practical Firewalls
Practical Firewalls enables you to get a thorough understanding of all of the basic concepts involved in creating and maintaining a firewall. Aimed at beginning to intermediate network administrators, this book presents information in a manner so that you do not need a large background in the networking field. It provides "real world"...
Result Page: 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy