Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources  of end users, the...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Telecom For Dummies (Math & Science)
Telecom For Dummies (Math & Science)
New to telecom? Get the scoop on all the basics

Order, maintain, and troubleshoot telecom services from area codes to VoIP

So you're now in charge of all that telecommunications stuff? Don't panic — here's your secret weapon! This plain-English guide will fill you in on...

Computer Networks ISE: A Systems Approach
Computer Networks ISE: A Systems Approach

I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...

Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)
Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)

One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One
...

Microsoft Office Communications Server 2007 R2 Resource Kit
Microsoft Office Communications Server 2007 R2 Resource Kit

In-depth, comprehensive, and fully revised for R2—this RESOURCE KIT delivers the information you need to deploy, manage, and troubleshoot Microsoft Office Communications Server 2007 R2. Get technical insights, scenarios, and best practices from those who know the technology best—the engineers who designed and developed...

Digital Crossroads: American Telecommunications Policy in the Internet Age
Digital Crossroads: American Telecommunications Policy in the Internet Age

Telecommunications policy profoundly affects the economy and our everyday lives. Yet accounts of important telecommunications issues tend to be either superficial (and inaccurate) or mired in jargon and technical esoterica. In Digital Crossroads, Jonathan Nuechterlein and Philip Weiser offer a clear, balanced, and accessible analysis of...

Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)
Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)

On March 10, 1876, Alexander Graham Bell made the first successful telephone call. As with many things, the test was purely accidental. Graham spilled acid on his leg, and Watson, his assistant, heard his call for help through the telephone. So, what has changed over the last 129 years? It would be easier to discuss what hasn’t...

Telecommunications Essentials
Telecommunications Essentials
Telecommunications Essentials is an in-depth introduction to the rapidly growing world of telecommunications. The book provides a global perspective, which ensures a complete understanding of telecommunications technologies and standards worldwide. Providing a comprehensive, one-stop reference for anybody wanting to get...
VoIP Hacks : Tips & Tools for Internet Telephony (Hacks)
VoIP Hacks : Tips & Tools for Internet Telephony (Hacks)

Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also...

How to Do Everything MacBook
How to Do Everything MacBook

Easy-to-follow coverage of portable Macs, including the MacBook, MacBook Pro, and MacBook Air

How to Do Everything: MacBook strongly emphasizes the portability and other unique features of the laptop versions of the Mac, examining ports and jacks, discussing user accounts and privacy, managing multiple network connections,...

Cisco CallManager Fundamentals, Second Edition
Cisco CallManager Fundamentals, Second Edition

Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution

  • Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy