"It is stunningly thorough and takes readers meticulously through the design, con?guration and operation of IPv6-based, low-power, potentially mobile radio-based networking." Vint Cerf, Vice President and Chief Internet Evangelist, Google
This book provides a complete overview of IPv6 over Low Power Wireless...
This book presents the first in-depth introduction to parallel imaging techniques and, in particular, to the application of parallel imaging in clinical MRI. It will provide readers with a broader understanding of the fundamental principles of parallel imaging and of the advantages and disadvantages of specific MR protocols in clinical...
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.
AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...
This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to...
Whats this AOP thing anyway, reallywhen you get right down to itand can someone please explain what an aspect actually is?
Aspect-Oriented Programming with the e Verification Language takes a pragmatic, example based, and fun approach to unraveling the mysteries of AOP. In this book, youll learn how to:
Most Internet applications use sockets to implement network communication protocols. TCP/IP Sockets in Java: Practical Guide for Programmers, with its focused, tutorial-based coverage, helps you master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Later chapters teach you to implement...
Macrophages are an important part of the immune response and are characterized by their ability to phagocytose foreign matter. However the difficulties involved in macrophage isolation mean they are some of the body's least explored cells. Macrophage Methodology describes how to isolate moderate to high yields of viable cells...
Master Wireshark and train it as your network sniffer
Impress your peers and get yourself pronounced as a network doctor
Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network
The Juniper Networks routing platforms are becoming the go-to solution for core, edge, metro and remote office networks, and JUNOS software is behind it all. The operating system is so full of industrial-strength routing protocols and IP innovations that those treading into the world of JUNOS will need clarification,...
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...