"The rationale for the second edition is solid, and the proposed changes are extensive and comprehensive, covering the most important advances in the field since the first edition was published. The authors' credentials are impeccable. I used the first edition extensively, both as a reference for my research and for my graduate course on...
Expert guidance on how to successfully build and deploy Mobile Virtual Private Networks
Mobile Virtual Private Networks (VPNs) have the potential to dramatically improve business productivity and give service providers new revenue opportunities. This in-depth tutorial will help professionals in the field understand both the technology of Mobile...
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki,
Finland. That event is now regarded as the birthday of the second generation mobile telephony.
GSM has been an overwhelming success, which was difficult to predict at that early
stage. In the past 10 years GSM has become a truly global...
OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD...
This book discusses the management challenges associated with ad hoc networks, and provides an in-depth description of how policy-based network management can be used for increasing automation in the management of mobile ad hoc networks. It describes the required components of a network management solution for such networks, using a policy-based...
As Microsoft Windows becomes increasingly network-centric, its TCP/IP services get increasingly important. Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference documents the protocols as they relate to Windows 2000. Odds are high that you'll find the networking solutions you need in this book. Even though it's not...
Every enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security.The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet filtering firewalls allowing ...
The book gives an in-depth study of the principles of the spread spectrum techniques and their applications in mobile communications. It starts with solid foundations in the digital communications that are essential to unequivocal understanding of the CDMA technology, and guides the reader through the fundamentals and characteristics of cellular...
Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just...
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...