Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiwavelength Optical Networks: Architectures, Design, and Control
Multiwavelength Optical Networks: Architectures, Design, and Control
"The rationale for the second edition is solid, and the proposed changes are extensive and comprehensive, covering the most important advances in the field since the first edition was published. The authors' credentials are impeccable. I used the first edition extensively, both as a reference for my research and for my graduate course on...
Mobile VPN : Delivering Advanced Services in Next Generation Wireless Systems
Mobile VPN : Delivering Advanced Services in Next Generation Wireless Systems
Expert guidance on how to successfully build and deploy Mobile Virtual Private Networks

Mobile Virtual Private Networks (VPNs) have the potential to dramatically improve business productivity and give service providers new revenue opportunities. This in-depth tutorial will help professionals in the field understand both the technology of Mobile...

UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki, Finland. That event is now regarded as the birthday of the second generation mobile telephony. GSM has been an overwhelming success, which was difficult to predict at that early stage. In the past 10 years GSM has become a truly global...
Absolute OpenBSD: UNIX for the Practical Paranoid
Absolute OpenBSD: UNIX for the Practical Paranoid

The definitive guide to OpenBSD

Foreword by Henning Brauer, OpenBSD PF Developer

OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD...

Policy-Driven Mobile Ad hoc Network Management (Wiley Series in Telecommunications and Signal Processing)
Policy-Driven Mobile Ad hoc Network Management (Wiley Series in Telecommunications and Signal Processing)
This book discusses the management challenges associated with ad hoc networks, and provides an in-depth description of how policy-based network management can be used for increasing automation in the management of mobile ad hoc networks. It describes the required components of a network management solution for such networks, using a policy-based...
Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference
Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference
As Microsoft Windows becomes increasingly network-centric, its TCP/IP services get increasingly important. Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference documents the protocols as they relate to Windows 2000. Odds are high that you'll find the networking solutions you need in this book. Even though it's not...
Inside Cisco IOS Software Architecture (CCIE Professional Development)
Inside Cisco IOS Software Architecture (CCIE Professional Development)
An essential guide to understanding the Cisco IOS architecture

In-depth coverage of Cisco's IOS Software architecture provides crucial information to:

  • Prevent network problems and optimize performance through more efficient design and configuration
  • Isolate and resolve network problems more quickly and...
Configuring Netscreen Firewalls
Configuring Netscreen Firewalls
Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s
security.The risks today have greatly increased, so the call for a stronger breed of
firewall has been made. In the past, simple packet filtering firewalls allowing...
Introduction to CDMA Wireless Communications
Introduction to CDMA Wireless Communications
The book gives an in-depth study of the principles of the spread spectrum techniques and their applications in mobile communications. It starts with solid foundations in the digital communications that are essential to unequivocal understanding of the CDMA technology, and guides the reader through the fundamentals and characteristics of cellular...
Cisco Frame Relay Solutions Guide
Cisco Frame Relay Solutions Guide

Implement Frame Relay solutions on Cisco networks with this definitive resource

  • Design the perfect Frame Relay solution, using the detailed explanation of the Frame Relay implementation process

  • Configure Frame Relay on Cisco routers with...

Network Management Fundamentals
Network Management Fundamentals
Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just...
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy