Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile phones are no longer just a means of calling another person. In several countries, mobile devices are used to pay for merchandise, receive time sensitive information and send e-mail messages. Additionally, corporations use mobile phones to access critical business information and send tasks to field workers, regardless of time or...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n
Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n
The first version of the 802.11 standard was ratified in 1997 after seven long years of development. However, initial adoption of this new technology was slow, partly because of the low penetration of devices that needed the “freedom of wireless.”

The real opportunity for 802.11 came with the increased popularity of laptop
...
Broadband Internet Deployment in Japan (Advanced Information Technology)
Broadband Internet Deployment in Japan (Advanced Information Technology)
Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting...
The Light Fantastic: A Modern Introduction to Classical and Quantum Optics
The Light Fantastic: A Modern Introduction to Classical and Quantum Optics
"Provides a nice mix of elementary physical optics with practical and exciting applications."--Stephen Barnett, University of Strathclyde

This book presents a thorough and self-contained introduction to modern optics, covering in full the three components ray optics, wave optics, and quantum optics. The text covers all
...
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

Worldwide Wi-Fi: Technological Trends and Business Strategies
Worldwide Wi-Fi: Technological Trends and Business Strategies

Your success guide to the next wireless revolution

The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).

Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by...

Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Africa since 1800
Africa since 1800
This book, the Fifth Revised Edition of a well-known introductory textbook, has remained in steady demand for the past forty years. The new edition covers events up to the middle of 2003, and takes account of the fresh perspectives brought about by the end of the Cold War and the new global situation following the events of September 11, 2001. It...
Modeling, Sensing and Control of Gas Metal Arc Welding
Modeling, Sensing and Control of Gas Metal Arc Welding
Hardbound. Arc welding is one of the key processes in industrial manufacturing, with welders using two types of processes - gas metal arc welding (GMAW) and gas tungsten arc welding (GTAW). This new book provides a survey-oriented account of the modeling, sensing, and automatic control of the GMAW process. Researchers are presented with the most...
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy