IP Multimedia Subsystem (IMS) Handbook The IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use... UMTS Network Planning, Optimization, and Inter-Operation with GSM
The continuing explosive growth in mobile communication is demanding more spectrally
efficient radio access technologies than the prevalent second generation (2G) systems such as
GSM to handle just the voice traffic. We are already witnessing high levels of mobile
penetration exceeding 70% in some countries. It is anticipated that by...
A Practical Guide to Content Delivery Networks A Practical Guide to Content Delivery Networks offers an organized approach to implementing the networks responsible for the distribution of various types of Web traffic, including standard Web pages and streaming audio and video. Because CDN operations are normally performed by independent organizations, the successful use of vendor facilities...
Web Caching (O'Reilly Internet Series) A properly designed cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy and operate an effective web caching service. It also covers the... Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security) David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
Network Infrastructure Security Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... Building a TypePad Blog People Want to Read
Today, it seems everyone—from multinational corporations to your kid’s second-grade teacher—has a blog. They all have one, in part, because they have information they want to share with others—from customers and clients to neighbors and parents. But to actually build a good blog—to create a blog people want to...
Hyper-V Replica Essentials
For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.
A practical step-by-step guide that goes beyond theory and...
|Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 |