Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice Over WLANS: The Complete Guide (Communications Engineering)
Voice Over WLANS: The Complete Guide (Communications Engineering)
Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN dont require changes to installed wiring) and greater capacity than...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Beginning Ubuntu Linux, Fourth Edition
Beginning Ubuntu Linux, Fourth Edition
Beginning Ubuntu Linux, Fourth Edition is the update to the best–selling book on Ubuntu, today’s hottest Linux distribution. Targeting newcomers to Linux and to the Ubuntu distribution alike, readers are presented with an introduction to the world of Linux and open source community, followed by a detailed overview of...
WiMAX Security and Quality of Service: An End-to-End Perspective
WiMAX Security and Quality of Service: An End-to-End Perspective

WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and...

Network Virtualization
Network Virtualization

Share network resources and reduce costs while providing secure network services to diverse user communities

  • Presents the business drivers for network virtualization and the major challenges facing network designers today

  • Shows how to use...

Beginning Ubuntu Linux, Fifth Edition
Beginning Ubuntu Linux, Fifth Edition

Ubuntu Linux is the fastest growing Linux-based operating system, and Beginning Ubuntu Linux, Fifth Edition teaches all of us—including those who have never used Linux—how to use it productively, whether you come from Windows or the Mac or the world of open source.

Beginning Ubuntu Linux, Fifth Edition...

IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Satellite Networking : Principles and Protocols
Satellite Networking : Principles and Protocols
Satellite networking is an exciting and expanding field that has evolved significantly since the launch of the first telecommunications satellite, from telephone and broadcast to broadband ATM and Internet. With increasing bandwidth and mobility demands on the horizon, satellites have become an integral part of the Global Network Infrastructure...
Designing for Cisco Internetwork Solutions (DESGN) (Authorized CCDA Self-Study Guide) (Exam 640-863) (2nd Edition)
Designing for Cisco Internetwork Solutions (DESGN) (Authorized CCDA Self-Study Guide) (Exam 640-863) (2nd Edition)

Whether you are preparing for CCDA certification or simply want to gain a better understanding of network design principles, you will benefit from the foundation information presented in this book.

 

Designing for Cisco Internetwork Solutions (DESGN),...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers,...
IP Telephony: Deploying VoIP Protocols and IMS Infrastructure
IP Telephony: Deploying VoIP Protocols and IMS Infrastructure

All you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructure

This book provides a comprehensive and practical overview of the technology behind Internet Telephony (IP), providing essential information to Network...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy