|
|
|
|
|
Building Cisco Remote Access NetworksCitrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's... | | Java Message ServiceThe Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more... | | Cisco AVVID and IP Telephony Design and ImplementationCisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will... |
|
Content Networking in the Mobile InternetA cutting-edge guide to the next generation Mobile Internet architecture and applications
The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is... | | Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... | | Pyrosequencing Protocols (Methods in Molecular Biology)
This book presents detailed protocols for the multidisciplinary application of Pyrosequencing® technology, all written by world-renowned experts. This comprehensive volume enables quick reference by collecting the primary applications for Pyrosequencing®, and supplementing each protocol with troubleshooting tips specific to that... |
|
Breast Cancer Research Protocols (Methods in Molecular Medicine)
A collection of both well-established and cutting-edge methods for investigating breast cancer biology not only in the laboratory, but also in clinical settings. These readily reproducible techniques solve a variety of problems, ranging from how to collect, store, and prepare human breast tumor samples for analysis, to analyzing cells in vivo... | | VPNs Illustrated : Tunnels, VPNs, and IPsecVirtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually... | | SyncML: Synchronizing and Managing Your Mobile DataEffective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a... |
|
|
Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 |