 |
|
 Wireless Communications Design Handbook: Space InterferenceDuring the decade of the !970s and even in the early 1980s, satellite communications was basically analog (though digital was already in the drawing board), and most satellites were huge, bulky, and in geosynchronous orbit. Most of the satellites in lower orbits were either military or scientific in nature~ Things have changed within the past five... |  |  Architecting Secure Software SystemsThrough the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they... |  |  Cellular Authentication for Mobile and Internet ServicesAn invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks
Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure... |
|
 BusinessObjects XI Release 2 For Dummies (Computer/Tech)Make better decisions with help from BusinessObjects
Find your way around Universes and see how your organization is doing
BusinessObjects may seem like a dauntingly complex topic, but this book makes it a snap. Even if you're new to business intelligence tools, you'll find it's... |  |  Making an Impact Online (Business on a Shoestring)'A brand new series aimed at small businesses, with another four volumes to come later in the year. These cover different subjects to most series and they look great. Ideas, examples, tips and sources of further information add up to a great little package in each.' The Bookseller (March 2007) 'All in all this is an excellent introduction for... |  |  The Unofficial Guide to Windows VistaThe inside scoop...for when you want more than the official line!
Microsoft Vista may be the hot new operating system, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Vista in the real world. How can you customize... |
|
 2600: The Hacker Quarterly, Summer 20022600: The Hacker Quarterly, Summer 2002:
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as... |  |  |  |  IP Multimedia Subsystem (IMS) HandbookThe IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use... |
|
 Hacking CyberspaceIn Hacking Cyberspace David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical tropes that have been employed to describe and evaluate recent advances in computer technology, telecommunications... |  |  Open Source Systems Security CertificationOpen Source Advances in Computer Applications book series provides timely technological and business information for:
Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;
Inserting OSS in the critical path of complex network development and embedded... |  |  The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... |
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 |