Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

Carrier Grade Voice Over IP (second edition)
Carrier Grade Voice Over IP (second edition)
NEW EDITION OF---CUTTING-EDGE SOLUTIONS CUT-TO-THE-CHASE STYLE

In the race to put carrier-quality voice over IP (VoIP)——those using this book run faster and falter less. International expert Daniel Collins’ greatly enhanced Carrier Grade Voice over IP brings you leading-edge signaling schemes,...

Deploying Wireless Networks
Deploying Wireless Networks
deployment cycle in cellular and broadband wireless networks, including OFDM-WiMAX/LTE

Wireless operators will find this practical, hands-on guide to network deployment invaluable. Based on their own extensive experience, the authors describe an end-to-end network planning process to deliver the guaranteed Quality of Service
...
Scalable VoIP Mobility: Integration and Deployment
Scalable VoIP Mobility: Integration and Deployment
Today's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets...
Microsoft Dynamics CRM 4 Integration Unleashed
Microsoft Dynamics CRM 4 Integration Unleashed

In Microsoft® Dynamics CRM 4 Integration Unleashed, two leading experts present proven techniques, best practices, and example code for going far beyond the out-of-the-box capabilities of Dynamics CRM 4. Using these solutions and sample applications, you will enhance all of...

CCNA Voice Study Guide: Exam 640-460
CCNA Voice Study Guide: Exam 640-460

The ultimate guide to the new CCNA voice network administrator certification exam

The new CCNA Voice exam tests candidates on their ability to implement a Cisco VoIP solution. Network administrators of voice systems will appreciate that the CCNA Voice Study Guide focuses completely on the information required by the...

FreePBX 2.5 Powerful Telephony Solutions
FreePBX 2.5 Powerful Telephony Solutions
FreePBX is an easy-to-use GUI that controls and manages Asterisk. It gives you pre-programmed functionality accessible through user-friendly web interfaces that allows you to have a fully functional PBX pretty much straight away with no programming. With this book it's easy to master the many features of FreePBX, which will help you to save time...
Internet Phone Services Simplified (VoIP)
Internet Phone Services Simplified (VoIP)

Internet Phone Services Simplified gives you the most basic need-to-know information and then teaches you how to get the most out of your VoIP phone services:

  • Understand how broadband VoIP, Internet VoIP, and VoIP Chat services work

  • ...
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Many new multicast applications emerging from the Internet, such as Voice-over-IP (VoIP), videoconference, TV over the Internet, radio over the Internet, video streaming multipoint, etc., have the following resource requirements: bandwidth consumption, end-to-end delay, delay jitter, packet loss ratio, and so forth. It is therefore necessary to...
Broadband Internet: Access, Regulation and Policy
Broadband Internet: Access, Regulation and Policy
The internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current...
Network Service Investment Guide: Maximizing ROI in Uncertain Times (Networking Council)
Network Service Investment Guide: Maximizing ROI in Uncertain Times (Networking Council)
This book analyzes network-based services using a new framework that links market uncertainty to the choice between distributed management
structure and centralized management structure. It explores communications technology and suggests how investors, managers, service providers,
and consultants can make better decisions about
...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy