Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
Regulation and the Evolution of the Global Telecommunications Industry
Regulation and the Evolution of the Global Telecommunications Industry

After decades of liberalization of the telecommunications industry around the world and technological convergence that allows for increasing competition, sector-specific regulation of telecommunications has been on the decline. As a result, the telecommunications industry stands in the middle of a debate that calls for either a total...

Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking
Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking

Next-generation architectures for survivable networks.

"Always on" information networks must automatically reroute around virtually any problem-but conventional, redundant ring architectures are too inefficient and inflexible. The solution: mesh-based networks that will be just as survivable-and far more...

The Art of What Works: How Success Really Happens
The Art of What Works: How Success Really Happens

How to Find Effective Solutions for Any Business Problem--By Recognizing and Building On the Successes of Others

"There is nothing new under the sun."

Though coined more than 2,000 years back, this truism has straight-line relevance to today's business world. Because while every business...

MPLS Network Management: MIBs, Tools, and Techniques
MPLS Network Management: MIBs, Tools, and Techniques
S everal years ago, there were only a handful of deployments of Multi-Protocol Label Switching (MPLS) technology, and those were restricted to researchers or nonproduction networks. Even in practice, MPLS was largely still theory. Over the past several years, MPLS has matured as a technology, and its acceptance and popularity in the marketplace has...
Network Dictionary
Network Dictionary
Networking, Internet, telecom, wireless, computer, hardware and software multiple dictionaries in one. A ""Must have"" reference for IT/Networking professionals and students!

About the Author

Javvin Technologies Inc., based at the Silicon Valley of California USA, is leading
...
Broadband Crash Course
Broadband Crash Course
THE DECISION-MAKER'S SURVIVAL GUIDE TO UNDERSTANDING--AND PROFITTING FROM--BROADBAND!

GET THE ANSWERS TO HELP YOU MAKE ALL NEEDED DECISIONS: FINANCIAL, MANAGEMENT, MARKETING, EQUIPMENT, APPLICATIONS, PROTOCOLS

With savvy from both the technical and business sides of telecom, and a knack for writing in "plainspeak", expert...

Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)
Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)

With all the fantastic Cisco documentation available online, why does the world of UCCE need this book? UCCE is such a big topic that it would be easy to think that it is possible to try and cover absolutely everything. Unfortunately, this would turn this book into nothing more than a product reference manual that could potentially be...

Newton's Telecom Dictionary: Covering Telecommunications, Networking, Information Technology, Computing and the Internet (20th Edition)
Newton's Telecom Dictionary: Covering Telecommunications, Networking, Information Technology, Computing and the Internet (20th Edition)

Newton's Telecom Dictionary helps technology and business professionals stay on top of the ever-changing network, telecom, and IT industry. The tech industry hype has cooled dramatically, but nonetheless new telecom and networking technology and services continue to be adopted at a rapid pace, and new terms and acronyms sprout just as...

IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Information theory lies at the heart of modern technology, underpinning all communications, networking, and data storage systems. This book sets out, for the first time, a complete overview of both classical and quantum information theory. Throughout, the reader is introduced to key results without becoming lost in mathematical details. Opening...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy