Home | Amazing | Today | Tags | Publishers | Years | Search 
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Embedded DSP Processor Design, Volume 2: Application Specific Instruction Set Processors (Systems on Silicon)
Embedded DSP Processor Design, Volume 2: Application Specific Instruction Set Processors (Systems on Silicon)
This book's "how-to" approach will help engineers design powerful, flexible products, while minimizing cost and power-consumption!

This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience.
...
The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

Microsoft  Windows  XP Professional Resource Kit, Third Edition
Microsoft Windows XP Professional Resource Kit, Third Edition
Definitive resources and tools—now updated for Windows XP Service Pack 2.Install, configure, and support Windows XP Professional with definitive technical guidance from the Microsoft Windows team and two industry veterans. This official RESOURCE KIT has been fully updated and revised—with coverage of...
Network Security: Know It All
Network Security: Know It All
All of the elements of network security together in a single volume written by the best and brightest experts in the field!

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
...
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment

Finally a book on Wireless Sensor Networks that covers real world applications and contains practical advice!

Kuorilehto et al. have written the first  practical guide to wireless sensor networks. The authors draw on their experience in the development and field-testing of autonomous wireless sensor...

2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
Interoperability of Enterprise Software and Applications
Interoperability of Enterprise Software and Applications
Interoperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation....
The ABCs of IP Addressing
The ABCs of IP Addressing
Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to...
Result Page: 99 98 97 96 95 94 93 92 91 90 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy