Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Communications Design Handbook: Space Interference
Wireless Communications Design Handbook: Space Interference
During the decade of the !970s and even in the early 1980s, satellite communications was basically analog (though digital was already in the drawing board), and most satellites were huge, bulky, and in geosynchronous orbit. Most of the satellites in lower orbits were either military or scientific in nature~ Things have changed within the past five...
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

BusinessObjects XI Release 2 For Dummies (Computer/Tech)
BusinessObjects XI Release 2 For Dummies (Computer/Tech)

Make better decisions with help from BusinessObjects

Find your way around Universes and see how your organization is doing

BusinessObjects may seem like a dauntingly complex topic, but this book makes it a snap. Even if you're new to business intelligence tools, you'll find it's...

Making an Impact Online (Business on a Shoestring)
Making an Impact Online (Business on a Shoestring)
'A brand new series aimed at small businesses, with another four volumes to come later in the year. These cover different subjects to most series and they look great. Ideas, examples, tips and sources of further information add up to a great little package in each.' The Bookseller (March 2007) 'All in all this is an excellent introduction for...
The Unofficial Guide to Windows Vista
The Unofficial Guide to Windows Vista
The inside scoop...for when you want more than the official line!

Microsoft Vista may be the hot new operating system, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Vista in the real world. How can you customize...

2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
HCI Beyond the GUI: Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces
HCI Beyond the GUI: Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces
As technology expands and evolves, one-dimensional, graphical user interface (GUI) design becomes increasingly limiting and simplistic. Designers must meet the challenge of developing new and creative interfaces that adapt to meet human needs and technological trends. HCI Beyond the GUI provides designers with this know how by exploring new ways to...
IP Multimedia Subsystem (IMS) Handbook
IP Multimedia Subsystem (IMS) Handbook
The IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use...
Hacking Cyberspace
Hacking Cyberspace
In Hacking Cyberspace David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical tropes that have been employed to describe and evaluate recent advances in computer technology, telecommunications...
Open Source Systems Security Certification
Open Source Systems Security Certification
Open Source Advances in Computer Applications book series provides timely technological and business information for:

Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;

Inserting OSS in the critical path of complex network development and embedded...

The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy