 |
|
|
 Computer Telephony Integration, Second EditionSince the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies... |  |  Deploying Wireless Networksdeployment cycle in cellular and broadband wireless networks, including OFDM-WiMAX/LTE
Wireless operators will find this practical, hands-on guide to network deployment invaluable. Based on their own extensive experience, the authors describe an end-to-end network planning process to deliver the guaranteed Quality of Service... |  |  Computer Forensics For Dummies (Computer/Tech)Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master... |
|
 Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -... |  |  Cable Communications TechnologyCable is now as much in the broadband business as it is television. This book explains the fundamentals of coaxial cable technology and the DSP that controls it, along with the cable modem and voice over IP technology now drastically changing the cable operators’ business. Aimed at working engineers and technicians, it can also be used a... |  |  |
|
 Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... |  |  Network Protocol Handbook (4th Edition)All active network protocols, including the most popular TCP/IP, WAN, LAN technologies are fully explained and well illustrated; Covers the latest and emerging technologies such as VOIP, SAN, MAN, VPN/Security, WLAN, VLAN and more.
About the Author
Javvin Technologies Inc., based at the Silicon... |  |  |
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |