 |
|
|
 Open Source: Technology and Policy"Provide[s] a well laid out review of the open source movement, including its technologies, policies, and impact and implications.... Overall, this book ties together the many interlocking pieces within the development and history of the open source movement." -- A. Hollister, State University of Cortland, CHOICE
The open... |  |  |  |  The Telecom HandbookWhether you're an IT professional, a telecom professional, an office administrator, or just starting out in the business world, this book provides you with an organized, easy-to-use introduction to business telecommunications systems and services. It does
The Telecom Handbook helps you get up-to-speed on business telecom systems and... |
|
 |  |  Cyber Crime Investigator's Field Guide, Second EditionIn the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we... |  |  Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |
|
 |  |  |  |  2600: The Hacker Quarterly, Summer 20022600: The Hacker Quarterly, Summer 2002:
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as... |
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |