Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Telephone networks have come a long ways in the last 100 years. Or have they? If one looks at how a telephone network works, not much has changed. Connections are still made through “dedicated” circuits connected end to end for the duration of a call. While switchboard operators have been replaced by digital switching systems, the...
TCP/IP Essentials: A Lab-Based Approach
TCP/IP Essentials: A Lab-Based Approach
The TCP/IP family of protocols has become the de facto standard in the world of networking. Found in virtually all computer communication systems, they form the basis of today's Internet. Including a series of carefully designed laboratory experiments that span the various elements of protocol definition and behavior, this book is a hands-on guide...
Voice and Audio Compression for Wireless Communications
Voice and Audio Compression for Wireless Communications
"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)

Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This
...
How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Optimal Traffic Control: Urban Intersections
Optimal Traffic Control: Urban Intersections
Despite traffic circles, four-way stop signs, lights regulated by timers or sensors, and other methods, the management of urban intersections remains problematic. Consider that transportation systems have all the features of so-called complex systems: the great number of state and control variables, the presence of uncertainty and indeterminism,...
LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have...

Next Generation IPTV Services and Technologies
Next Generation IPTV Services and Technologies
Detailed coverage of the underlying technologies required to build an end-to-end IPTV system

The television entertainment industry is currently experiencing a major transformation as broadband subscribers and improvements in compression techniques for digital video content continue to grow. This growth is fueling the demand for a new generation...

Asterisk: The Definitive Guide (Definitive Guides)
Asterisk: The Definitive Guide (Definitive Guides)

This is a book for anyone who uses Asterisk.

Asterisk is an open source, converged telephony platform, which is designed primarily to run on Linux. Asterisk combines more than 100 years of telephony knowledge into a robust suite of tightly integrated telecommunications applications. The power of Asterisk lies in its...

Wireless Hacks
Wireless Hacks

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.

...
Wireless Network Hacks & Mods For Dummies
Wireless Network Hacks & Mods For Dummies
Connect the old, the new, the practical, and the fun!

Play multiplayer games, set up home surveillance, or take your network outside

Now that you've got a wireless network going, you're getting the urge to see what else it can do, right? Hook up with this book and find simple, fun ways to expand its possibilities. Add your home...

Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy