Scene of the Cybercrime, Second Edition
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...
Cisco CallManager Best Practices
Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment
Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more
Android Arcade Game App: A Real World Project - Case Study Approach
Welcome to Android Arcade Game App. In this book, you will learn how to
create an Android arcade-style game “from project to publish.” While I will walk
you through solutions to some gaming development problems, this book is not
necessarily for beginner developers.
You chose this book because you are...
Mobile Telecommunications Protocols for Data Networks Technology has changed our lives and the way we see the world. The growing use of mobile technologies in phones, computers and everyday applications has fuelled the demand for efficient connectivity, irrespective of the location of the device. This connectivity has to be provided by various different networks and protocols that guarantee the smooth... Cisco AVVID and IP Telephony Design and Implementation Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
Microsoft Lync Server 2010 Unleashed
This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...
SyncML: Synchronizing and Managing Your Mobile Data Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a... Palm webOS
Emerging Business Online: Global Markets and the Power of B2B Internet Marketing
We live in an age of information overload, significantly facilitated by the Internet. Anyone from almost anywhere can send, access, and post information across the globe in a matter of seconds. As applications and technologies continue to evolve, our ability to leverage the Internet will continue to impact the way we work and live.
Embedded Software Development with eCos
In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that...
Cryptography: A Very Short Introduction
We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...
|Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |