 |
|
 Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |  |  Wireless Sensor and Actuator Networks: Technologies, Analysis and DesignWhen choosing the technology options to develop a wireless sensor network (WSN), it is vital that their performance levels can be assessed for the type of application intended. This book describes the different technology options - MAC protocols, routing protocols, localisation and data fusion techniques - and provides the means to numerically... |  |  |
|
|
 |  |  The Recurrent Crisis in Corporate GovernanceIn the late 1990s the American corporation forged ahead in gains in efficiency and earnings performance with strong reflections in stock price appreciation.However, the events of Enron and the bursting of the bubble of unlimited increases in the price of Internet, telecom and energy company shares have caused the authors of this book to take... |  |  |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 |