Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Configuring Cisco Voice Over IP
Configuring Cisco Voice Over IP
Arming network administrators with a thorough understanding of Cisco’s current VoIP solutions and the means to put them to work, Configuring Cisco Voice Over IP, Second Edition demonstrates how to configure all of Cisco’s core VoIP products, among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. Now...
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Telephone networks have come a long ways in the last 100 years. Or have they? If one looks at how a telephone network works, not much has changed. Connections are still made through “dedicated” circuits connected end to end for the duration of a call. While switchboard operators have been replaced by digital switching systems, the...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Internet Protocol-based Emergency Services
Internet Protocol-based Emergency Services

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services

This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to...

Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)
Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)

Media Resource Control Protocol (MRCP) is a new IETF protocol, providing a key enabling technology that eases the integration of speech technologies into network equipment and accelerates their adoption resulting in exciting and compelling interactive services to be delivered over the telephone. MRCP leverages IP telephony and Web technologies...

IP for 3G: Networking Technologies for Mobile Communications
IP for 3G: Networking Technologies for Mobile Communications

What is an 'all-IP' network? What difference will IP networking make to 3G services?

Third Generation (3G) mobile offers access to broadband multimedia services - and in the future most of these, even voice and video, will be IP-based. However 3G networks are not based on IP technologies, rather they are an evolution from existing 2G...

Analog-Baseband Architectures and Circuits: for Multistandard and Low-Voltage Wireless Transceivers
Analog-Baseband Architectures and Circuits: for Multistandard and Low-Voltage Wireless Transceivers
Analog-Baseband Architectures and Circuits reviews the fundamentals and studies the state-of-the-art multistandard transceivers before describing novel architectural and circuit techniques for implementing multimode and wideband (tens of MHz) baseband analog front-ends under low-voltage constraints. Techniques developed on architecture...
Future Generation Information Technology: Second International Conference, FGIT 2010
Future Generation Information Technology: Second International Conference, FGIT 2010

As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one subdiscipline may transmit to another. The presentation of results between different subdisciplines encourages this interchange for the advancement of IT as a whole.

...

Wireless and Mobile Data Networks
Wireless and Mobile Data Networks
Connecting to the Future of Wireless Data Technologies

Presenting complex subjects without getting into advanced mathematics, Wireless and Mobile Data Networks gives students and professionals a comprehensive overview of major wireless network architectures and standards.

The opening chapters introduce wireless data network types,...

Advanced Production Testing of RF, SoC, and SiP Devices
Advanced Production Testing of RF, SoC, and SiP Devices
Featuring invaluable input from industry-leading companies and highly-regarded experts in the field, this first-of-its kind resource offers experienced engineers a comprehensive understanding of the advanced topics in RF, SiP (system-in-package), and SoC (system-on-a-chip) production testing that are critical to their work involving...
Telecommunications and Data Communications Handbook
Telecommunications and Data Communications Handbook
A practical, accessible survey of telecommunications and data communications services and technologies

Finally, there is a commonsense guide to telecommunications and data communications that non-engineers can understand. Popular author Ray Horak provides comprehensive, up-to-date information in plain English, instead of confusing technotalk....

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy