 |
|
 The Mobile Revolution: The Making of Worldwide Mobile Markets‘We’re moving away from the business of ears to the business of eyes.’
Move over Bill Gates, stand aside Steve Jobs, said the industry pundits after CeBIT 1998, the famous trade conference. They’d just seen Nokia’s Communicator 9110, a mobile phone with dazzling capabilities, but what really... |  |  Multimedia Messaging Service: An Engineering Approach to MMSThe Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for... |  |  The Mezonic Agenda: Hacking the Presidency"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will... |
|
 Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to... |  |  Incident Response and Computer Forensics, Second EditionCompletely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine
"This book is an absolute must-read for anyone who plays a role in... |  |  Location Management and Routing in Mobile Wireless NetworksThis book aims at presenting, in a canonical form, the work done by us in the field of routing in mobile wireless networks. Most of the material contained herein has previously been presented at international conferences or has been accepted for publication in journals.
Mobile wireless networks can be broadly classified into two distinct... |
|
|
 |  |  Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... |  |  |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |