Home | Amazing | Today | Tags | Publishers | Years | Search 
Privacy on the Line: The Politics of Wiretapping and Encryption
Privacy on the Line: The Politics of Wiretapping and Encryption
In the spring of 1993, the White House announced an unprecedented plan for both promoting and
controlling the use of secret codes to keep communications private. The plan, formally called key
escrow but popularly known as "Clipper" after its star component, the Clipper chip, was to adopt a
new federal standard for
...
Numerical Recipes in C: The Art of Scientific Computing, Second Edition
Numerical Recipes in C: The Art of Scientific Computing, Second Edition
Our aim in writing the original edition of Numerical Recipes was to provide a
book that combined general discussion, analytical mathematics, algorithmics, and
actual working programs. The success of the first edition puts us now in a difficult,
though hardly unenviable, position. We wanted, then and now, to write a book
that is
...
The Worldwide History of Telecommunications
The Worldwide History of Telecommunications
The first comprehensive history of the Information Age how we got there and where we are going

The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

Telecommunication System Engineering
Telecommunication System Engineering
"A ‘must’ for anyone involved in the practical aspects of the telecommunications industry."
—Choice, on the Third Edition

A MAJOR NEW EDITION OF A LEADING REFERENCE ON TELECOMMUNICATION TECHNOLOGY

Through its three previous editions, Roger Freeman’s...

Microsoft  Windows  SharePoint  Services Inside Out
Microsoft Windows SharePoint Services Inside Out
Take your Windows SharePoint Services experience to the next level! Designed for advanced users, this supremely organized reference packs all the information you need to master every major tool, task, and enhancement in Windows SharePoint Serviceswithout the fluff. Discover how to simplify information sharing, make team collaboration more...
Que's Official Internet Yellow Pages, 2005 Edition
Que's Official Internet Yellow Pages, 2005 Edition

When you have to make a phone call and you don't know the telephone number, what do you pull out? The yellow pages. When you have to look up something on the Internet and you don't know the Website address, what should you pull out? Que's Official Internet Yellow Pages, 2005 Edition. The only Internet directory to incorporate a rating...

Implementing Voice over IP
Implementing Voice over IP
In general, voice transmission over the Internet protocol (IP), or VoIP, means
transmission of real-time voice signals and associated call control information
over an IP-based (public or private) network. The term IP telephony is commonly
used to specify delivery of a superset of the advanced public switched
telephone network
...
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)

Foundation Learning for CCVP IP Telephony

Jeremy Cioara, CCIEВ® No. 11,727

Cisco IP Telephony (CIPT), Second Edition, is a CiscoВ®-authorized, self-paced learning tool for CCVP IP...

LDAP Programming, Management, and Integration
LDAP Programming, Management, and Integration
Focusing on the practical application of the Lightweight Directory Access Protocol, this tutorial is geared toward IS professionals and software developers who are responsible for getting the maximum potential from their directories by integrating them with existing processes and applications. As the Internet standard for directory services, LDAP...
The SPIN Model Checker: Primer and Reference Manual
The SPIN Model Checker: Primer and Reference Manual
SPIN is the world's most popular, and arguably one of the world's most powerful, tools for detecting software defects
in concurrent system designs. Literally thousands of people have used SPIN since it was first introduced almost fifteen
years ago. The tool has been applied to everything from the verification of complex call processing
...
Foundations of Computer Security
Foundations of Computer Security
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its...
Signaling in Telecommunication Networks
Signaling in Telecommunication Networks
Guidance to help you grasp even the most complex network structures and signaling protocols

The Second Edition of Signaling in Telecommunication Networks has been thoroughly updated, offering new chapters and sections that cover the most recent developments in signaling systems and procedures. This acclaimed book...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy