Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Fiber Optic Data Communication, Second Edition
Handbook of Fiber Optic Data Communication, Second Edition
The datacom industry is evolving very rapidly, and a host of new technologies, services, standards, and types of networks have been introduced since the first edition of the Handbook was published over 3 years ago. Building on the success of the first edition, this Handbook contains revisions and updates to all major chapters plus a new glossary...
Multimedia Wireless Networks: Technologies, Standards and QoS
Multimedia Wireless Networks: Technologies, Standards and QoS
  • Integrating QoS in wireless multimedia network design
  • Delivering QoS in WLANs, WPANs, WMANs, cellular, and satellite networks
  • Covers every leading current and emerging wireless network standard

Integrate QoS into virtually any multimedia wireless network

From...

Cisco Security Architectures
Cisco Security Architectures

Cisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.

In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes...

Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
REAL-WORLD WIRELESS SECURITY

This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to...

Juniper Networks Field Guide and Reference
Juniper Networks Field Guide and Reference

Juniper Networks® creates and deploys high-performance routing platforms used by many of the world's largest service providers. Written by the leading experts and technical writers at Juniper Networks, the Juniper Networks® Field Guide and Reference is the definitive practical guide and reference to Juniper...

Essential XML Quick Reference: A Programmer's Reference to XML,  XPath, XSLT, XML Schema, SOAP, and More
Essential XML Quick Reference: A Programmer's Reference to XML, XPath, XSLT, XML Schema, SOAP, and More

"Finally, a complete and thorough reference book covering all of the most important XML technologies, including the latest addition (XML Schema), in one concise and consistent presentation. I will definitely have this book close at hand."
—Chris Lovett, Product Unit Manager, B2B Web Services, Microsoft

...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)

Telecommunications Essentials, Second Edition, provides a comprehensive overview of the rapidly evolving world of telecommunications. Providing an in-depth, one-stop reference for anyone wanting to get up to speed on the $1.2 trillion telecommunications industry,...

Designing Embedded Communications Software
Designing Embedded Communications Software

Create network communications software with a thorough understanding of the essential system-level design and implementation choices and how they affect the performance and maintainability of your embedded system. An examination of the OSI 7-layer model serves as a starting point for a logical partitioning of software functionality in a...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

The Jini(TM) Specifications, Edited by Ken Arnold (2nd Edition)
The Jini(TM) Specifications, Edited by Ken Arnold (2nd Edition)
Built on top of the Java™ software infrastructure, Jini™ technology enables all types of services and devices to work together in a community--organized without extensive planning, installation, or human intervention. Jini technology allows the lines to blur between what is hardware and what is software by representing all hardware and...
Result Page: 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy