|
|
| | Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... | | |
|
Broadband Internet Deployment in Japan (Advanced Information Technology)Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting... | | The Light Fantastic: A Modern Introduction to Classical and Quantum Optics"Provides a nice mix of elementary physical optics with practical and exciting applications."--Stephen Barnett, University of Strathclyde This book presents a thorough and self-contained introduction to modern optics, covering in full the three components ray optics, wave optics, and quantum optics. The text covers all... | | |
|
Worldwide Wi-Fi: Technological Trends and Business StrategiesYour success guide to the next wireless revolution
The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).
Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by... | | Nmap in the Enterprise: Your Guide to Network ScanningRichard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."
A... | | Reverse Engineering Code with IDA Pro
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and... |
|
| | Africa since 1800This book, the Fifth Revised Edition of a well-known introductory textbook, has remained in steady demand for the past forty years. The new edition covers events up to the middle of 2003, and takes account of the fresh perspectives brought about by the end of the Cold War and the new global situation following the events of September 11, 2001. It... | | Modeling, Sensing and Control of Gas Metal Arc WeldingHardbound. Arc welding is one of the key processes in industrial manufacturing, with welders using two types of processes - gas metal arc welding (GMAW) and gas tungsten arc welding (GTAW). This new book provides a survey-oriented account of the modeling, sensing, and automatic control of the GMAW process. Researchers are presented with the most... |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 |