|
|
|
|
| | UNIX: The Complete Reference, Second EditionGet cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second... | | Rolling Out 5G: Use Cases, Applications, and Technology Solutions
Examine the challenges of 4G in the light of impending and crucial future communication needs, and review the lessons learned from an implementation and system operation perspective with an eye towards the next generation – 5G. You'll investigate key changes and additions to 5G in terms of use cases. You'll also learn about the... |
|
| | | | Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... |
|
|
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |