|
|
|
|
|
Google Power Tools BibleThe most thorough and comprehensive guide to Google
Expand your world with the dozens of Google tools, applications, and services you'll find in this comprehensive book. Going well beyond the basics of search, this in-depth resource shows you how to access and apply every one of Google's features-things like Gmail, Google Maps, and... | | Cyber Crime Investigator's Field Guide, Second EditionIn the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we... | | Network Security Hacks: Tips & Tools for Protecting Your PrivacyIn the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and... |
|
Voice Over WLANS: The Complete Guide (Communications Engineering)Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN dont require changes to installed wiring) and greater capacity than... | | Introduction to Embedded Systems: A Cyber-Physical Systems Approach
The most visible use of computers and software is processing information for human
consumption. We use them to write books (like this one), search for information
on the web, communicate via email, and keep track of financial data. The vast
majority of computers in use, however, are much less visible. They run the engine,
brakes,... | | Advanced Analytics with Spark: Patterns for Learning from Data at Scale
In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.
You’ll start with an... |
|
| | Optical Burst Switched NetworksNext-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to be highly bursty in nature. For such traffic,... | | MPLS Network Management: MIBs, Tools, and TechniquesS everal years ago, there were only a handful of deployments of Multi-Protocol Label Switching (MPLS) technology, and those were restricted to researchers or nonproduction networks. Even in practice, MPLS was largely still theory. Over the past several years, MPLS has matured as a technology, and its acceptance and popularity in the marketplace has... |
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |