Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Cisco CallManager Best Practices
Cisco CallManager Best Practices

Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment

  • Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more

  • ...
Android Arcade Game App: A Real World Project - Case Study Approach
Android Arcade Game App: A Real World Project - Case Study Approach
Welcome to Android Arcade Game App. In this book, you will learn how to create an Android arcade-style game “from project to publish.” While I will walk you through solutions to some gaming development problems, this book is not necessarily for beginner developers.

You chose this book because you are
...
Mobile Telecommunications Protocols for Data Networks
Mobile Telecommunications Protocols for Data Networks
Technology has changed our lives and the way we see the world. The growing use of mobile technologies in phones, computers and everyday applications has fuelled the demand for efficient connectivity, irrespective of the location of the device. This connectivity has to be provided by various different networks and protocols that guarantee the smooth...
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Microsoft Lync Server 2010 Unleashed
Microsoft Lync Server 2010 Unleashed

This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
Palm webOS
Palm webOS

This is the official guide to building native JavaScript applications for Palm's new mobile operating system, Palm® webOS™. Written by Palm's software chief technology officer along with the Palm webOS development team, Palm webOS provides a complete tutorial on the design principles, architecture, UI, tools, and...

Emerging Business Online: Global Markets and the Power of B2B Internet Marketing
Emerging Business Online: Global Markets and the Power of B2B Internet Marketing

We live in an age of information overload, significantly facilitated by the Internet. Anyone from almost anywhere can send, access, and post information across the globe in a matter of seconds. As applications and technologies continue to evolve, our ability to leverage the Internet will continue to impact the way we work and live.

...

Embedded Software Development with eCos
Embedded Software Development with eCos

In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that...

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy