Home | Amazing | Today | Tags | Publishers | Years | Search 
UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)
Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)

Managers do not have the luxury of abdicating participation in information systems decisions.Managers who choose to do so risk limiting their future business options. Information systems are at the heart of virtually every business interaction, process, and decision, especially when one considers the vast penetration of the Web in the...

Practical Lock Picking: A Physical Penetration Tester's Training Guide
Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the wonderful time in which you currently find yourself. To be alive and learning right now—when there are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written with passion visible on...
UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki, Finland. That event is now regarded as the birthday of the second generation mobile telephony. GSM has been an overwhelming success, which was difficult to predict at that early stage. In the past 10 years GSM has become a truly global...
802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
Nickel and the Skin: Absorption, Immunology, Epidemiology, and Metallurgy (Dermatology: Clinical & Basic Science)
Nickel and the Skin: Absorption, Immunology, Epidemiology, and Metallurgy (Dermatology: Clinical & Basic Science)
From the viewpoint of immunotoxicology, hazards associated with nickel primarily derive from its type-IV immunogenic properties, as it consistently ranks as the premier anthropogenic allergen among the general population in industrialized countries. Thus, immunology of nickel represents the major part of reviews addressing...
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Practical Lock Picking, Second Edition: A Physical Penetration Tester's Training Guide
Practical Lock Picking, Second Edition: A Physical Penetration Tester's Training Guide

Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and...

Antimicrobial Pharmacodynamics in Theory and Clinical Practice (Infectious Disease and Therapy)
Antimicrobial Pharmacodynamics in Theory and Clinical Practice (Infectious Disease and Therapy)

This up-to-the-minute reference explores the pharmacodynamics of antimicrobials as well as the absorption, distribution, metabolism, and elimination of the major classes of antimicrobials-covering new agents such as ketolide antibiotics and highlighting the pharmacodynamic relationship between drug concentration and antimicrobial activity, as...

Instant Wireshark Starter
Instant Wireshark Starter

Wireshark is by far the most popular network traffic analyzing tool.

It not only provides an interface for traffic capture but also provides a rich platform for an in-depth analysis of the traffic. The GUI provides a very user friendly and interactive media that simplifies the process of network forensics. This concise book...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy