Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing LINUX Step by Step
Securing LINUX Step by Step
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,...
Computer and Communication Networks
Computer and Communication Networks

As the number and variety of communication services grow, so do the challenges of designing cost-effective networks that meet the requirements of emerging technologies in wireless, sensor, and mesh networks. Computer and Communication Networks is the first book to offer balanced coverage of all these topics using...

Network Convergence: Services, Applications, Transport, and Operations Support
Network Convergence: Services, Applications, Transport, and Operations Support
The present information age is enabled by telecommunications and information technology and the continued convergence of their services, technologies and business models. Within telecommunications, the historic separations between fixed networks, mobile telephone networks and data communications are diminishing. Similarly, information technology...
Voice Over WLANS: The Complete Guide (Communications Engineering)
Voice Over WLANS: The Complete Guide (Communications Engineering)
Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN dont require changes to installed wiring) and greater capacity than...
Building Firewalls with OpenBSD and PF, 2nd Edition
Building Firewalls with OpenBSD and PF, 2nd Edition
Written by Jacek Artymiak, a frequent contributor to ONLamp.com, Building Firewalls with OpenBSD and PF is the first and only print publication devoted solely to the subject of the pf packet filter used in OpenBSD, FreeBSD, and NetBSD operating systems. Topics covered include: firewall design, ruleset syntax, packet normalization (scrubbing),...
Managing Mobile Services: Technologies and Business Practices
Managing Mobile Services: Technologies and Business Practices
New, attractive services for communications systems are versatile and promise to make the next generation of communications a success. Yet, as the systems grow more complex and diverse, so do the challenges of managing them.

Service management derives from technologies used in fixed telephony systems and has evolved towards...

Synchronization in Wireless Sensor Networks: Parameter Estimation, Peformance Benchmarks, and Protocols
Synchronization in Wireless Sensor Networks: Parameter Estimation, Peformance Benchmarks, and Protocols

The clock or time synchronization problem in wireless sensor networks (WSNs) requires a procedure for providing a common notion of time across the nodes of WSNs. In general, clock synchronization is viewed as a critical factor in maintaining the good functioning of WSNs due mainly to their decentralized organization and timing uncertainties...

5G LTE Narrowband Internet of Things (NB-IoT)
5G LTE Narrowband Internet of Things (NB-IoT)

This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and...

Packet Guide to Routing and Switching
Packet Guide to Routing and Switching

For a long time, I was very happy building Ethernet networks, working with switches and then moving to 802.11. It took awhile, but eventually I realized that the world of interconnected networks cannot be reached with Layer 2 alone. In addition, as you spread your wings from the Layer 2 broadcast domains, you encounter the wonders of...

A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

Emerging Wireless Technologies and the Future Mobile Internet
Emerging Wireless Technologies and the Future Mobile Internet
The current Internet is an outgrowth of the ARPANET (Advanced Research Projects Agency Network) that was initiated four decades ago. The TCP/IP (Transmission Control Protocol/Internet Protocol) designed by Vinton Cerf and Robert Kahn in 1973 did not anticipate, quite understandably, such extensive use of wireless channels and...
An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications

An Introduction to LTE explains the technology used by 3GPP Long Term Evolution. The book covers the whole of LTE, both the techniques used for radio communication between the base station and the mobile phone, and the techniques used for signalling communication and data transport in the evolved packet core. It avoids unnecessary...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy