 |
|
 Technologies for Home NetworkingA broad overview of the home networking field, ranging from wireless technologies to practical applications
In the future, it is expected that private networks (e.g., home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP-based services, and possibly becoming service providers... |  |  XML and Java: Developing Web ApplicationsXML and Java: Developing Web Applications is a tutorial that will teach Web developers, programmers, and system engineers how to create robust XML business applications for the Internet using the Java technology. The authors, a team of IBM XML experts, introduce the essentials of XML and Java development, from a review of basic concepts to... |  |  Windows Server 2008 For Dummies (Computer/Tech)If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.
... |
|
|
|
 Cybersecurity Operations HandbookCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... |  |  XML Primer PlusUndoubtedly, you've heard of Extensible Markup Language, commonly known as XML. You may have even seen some of it, though you might not have been aware of it at the time. One thing's fairly certain, however: You'll be seeing a lot more of it in the future.
My certainty is based on the fact that XML is beginning to spread at a pace that... |  |  Handbook of Research on Wireless SecuritySecurity is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to... |
|
Result Page: 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 |