Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
System-Level Design Methodologies for Telecommunication
System-Level Design Methodologies for Telecommunication
Long-term evolution (LTE) indoor coverage is becoming important day by day due to multilayer design and high traffic-building premises. Nowadays, it is true that user expectations from operator’s indoor high-quality services and capacity availability provides a well-promised opportunity to offer improved LTE services with...
Signaling in Telecommunication Networks
Signaling in Telecommunication Networks
Guidance to help you grasp even the most complex network structures and signaling protocols

The Second Edition of Signaling in Telecommunication Networks has been thoroughly updated, offering new chapters and sections that cover the most recent developments in signaling systems and procedures. This acclaimed book...

Higher Engineering Mathematics, Fifth Edition
Higher Engineering Mathematics, Fifth Edition
Includes: * 1,000 Worked Examples * 1,750 Further Problems * 19 Assignments

John Bird's approach, based on numerous worked examples and interactive problems, is ideal for students from a wide range of academic backgrounds, and can be worked through at the student's own pace. Basic mathematical theories are explained in the simplest of
...
The Semantic Web: Real-World Applications from Industry (Semantic Web and Beyond)
The Semantic Web: Real-World Applications from Industry (Semantic Web and Beyond)
Semantic Web: Real-World Applications from Industry offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications in real business environments.  For quite a while, there has been evidence from academic research and early industrial prototypes that semantic...
Evolved Packet System (EPS): The LTE and SAE Evolution of 3G UMTS
Evolved Packet System (EPS): The LTE and SAE Evolution of 3G UMTS

2G/GSM and 3G/UMTS are key mobile communication technologies, chosen by more than 2 billion people around the world. In order to adapt to new services, increasing demand for user bandwidth, quality of service and requirements for network convergence, major evolutions are introduced in 3G network standard.

Evolved...

Network Routing: Algorithms, Protocols, and Architectures
Network Routing: Algorithms, Protocols, and Architectures
In the span of a quarter-century, network routing in communication networks has evolved tremendously. Just a quarter-century ago, the public switched telephone network (PSTN) was running hierarchical routing, ARPANET routing was operational, and the telecommunication infrastructure had fixed static transport routes. In the 1980s, we saw the first...
Principles of Broadband Switching & Networks
Principles of Broadband Switching & Networks

The past few decades have seen the merging of many computer and communication applications. Enabled by the advancement of optical fiber, wireless communication, and very-large-scale integration (VLSI) technologies, modern telecommunication networks can be regarded as one of the most important inventions of the past century.

Before...

Advances in Enterprise Information Technology Security (Premier Reference)
Advances in Enterprise Information Technology Security (Premier Reference)
In the last decade information and computer security is mainly moving from the confines of academia to the enterprise concerns. As populations become more and more comfortable with the extensive use of networks and the Internet, as our reliance on the knowledge-intensive technology grows, and as progress in the computer software and wireless...
Telecommunication System Engineering
Telecommunication System Engineering
"A ‘must’ for anyone involved in the practical aspects of the telecommunications industry."
—Choice, on the Third Edition

A MAJOR NEW EDITION OF A LEADING REFERENCE ON TELECOMMUNICATION TECHNOLOGY

Through its three previous editions, Roger Freeman’s...

Regulation and the Evolution of the Global Telecommunications Industry
Regulation and the Evolution of the Global Telecommunications Industry

After decades of liberalization of the telecommunications industry around the world and technological convergence that allows for increasing competition, sector-specific regulation of telecommunications has been on the decline. As a result, the telecommunications industry stands in the middle of a debate that calls for either a total...

Intelligent Agents for Telecommunication Environments (Innovative Technology Series)
Intelligent Agents for Telecommunication Environments (Innovative Technology Series)
Mobile agents are program instances (or processes) capable of moving within the network under their own control. They consist of three parts: code, data state, and execution state. Migration of mobile agents takes place between hosts. These hosts execute the agents and provide functionality to them. This functionality includes communication with...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy