Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless and Mobile All-IP Networks
Wireless and Mobile All-IP Networks
Here's your all-IP network handbook for 3G and beyond

Experts forecast a future in which all telephone services will be delivered over the economical, efficient IP network. In this follow-up to Wireless and Mobile Network Architecture, the bestselling guide to wireless network engineering, Yi-Bing Lin and Ai-Chun Pang delve...

Broadband Network Architectures: Designing and Deploying Triple-Play Services
Broadband Network Architectures: Designing and Deploying Triple-Play Services
“Network professionals who are looking to deploy triple-play service provider networks will find this book a useful tool.”

–Michael Newbery, IP Architect, TelstraClear Limited

 

“This book provides a wealth of information on current and...

Network Protocol Handbook (4th Edition)
Network Protocol Handbook (4th Edition)
All active network protocols, including the most popular TCP/IP, WAN, LAN technologies are fully explained and well illustrated; Covers the latest and emerging technologies such as VOIP, SAN, MAN, VPN/Security, WLAN, VLAN and more.

About the Author

Javvin Technologies Inc., based at the Silicon
...
Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks
Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks

Algorithmic discrete mathematics plays a key role in the development of information and communication technologies, and methods that arise in computer science, mathematics and operations research – in particular in algorithms, computational complexity, distributed computing and optimization – are vital to modern services such as...

VoIP Service Quality : Measuring and Evaluating Packet-Switched Voice
VoIP Service Quality : Measuring and Evaluating Packet-Switched Voice
VoIP SAVINGS AND FLEXIBILITY! TELEPHONE-LINE QUALITY?

Despite the features that make Voice over IP so attractive from the standpoint of cost and flexibility of telephone services, businesses will only adopt it once they’ve determined whether, and under what circumstances, the quality of VoIP will be satisfactory to...

IP Address Management Principles and Practice (IEEE Press Series on Network Management)
IP Address Management Principles and Practice (IEEE Press Series on Network Management)

The practice of IP address management (IPAM) entails the application of network management disciplines to Internet Protocol (IP) address space and associated network services, namely Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS). The linkages among an IP address plan and configurations of DHCP and DNS servers are...

Networking For Dummies
Networking For Dummies
Company just hooked you up to a network and you’re wondering what the heck you’re supposed to do with it? Tired of burning spreadsheets onto CDs just so you can share them with coworkers, and you’re wondering what it’ll take to set up a network in your organization? Been tasked with setting up a network and you don’t...
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide is an excellent self-study resource for the 642-845 ONT exam. Passing the exam certifies that the successful candidate has important knowledge and skills in optimizing and providing effective QoS techniques for converged networks. Passing the exam is one of the requirements for the Cisco Certified Network...
The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
"This book provides a diverse and solid foundation that will be
immensely beneficial to new network engineers, those looking for a
refresher or developers"
-- Alan Young, Google, Network Surveillance Team

"i haven't had time to read the manuscript
...
Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Nortel Guide to VPN Routing for Security and VoIP
Nortel Guide to VPN Routing for Security and VoIP
Here's your handbook to Nortel VPN Router

If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN Router. Everything is here—hardware, software, laboratory set-ups, real-world examples, and, most importantly, advice gleaned from the...

Fundamentals of Telecommunications, 2nd Edition
Fundamentals of Telecommunications, 2nd Edition
The Second Edition of this popular text is updated with THE latest advances in telecommunications

The standard of excellence set in the critically acclaimed Fundamentals of Telecommunications continues in this Second Edition, by offering a thorough introduction to the fundamentals of telecommunication networks without bogging the reader down in...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy