Asterisk: The Future of Telephony
It may be a while before Internet telephony with VoIP (Voice over Internet Protocol) reaches critical mass, but there's already tremendous movement in that direction. A lot of organizations are not only attracted to VoIP's promise of cost savings, but its ability to move data, images, and voice traffic over the same...
WiMAX Handbook (McGraw-Hill Communications) Get a thorough introduction to WiMAX--the revolutionary new 802.16 IEEE standard for point-to-point and point-to-multipoint wireless broadband access. Written by networking expert Frank Ohrtman, this detailed guide annotates the 802.16 specification and explains how to design and build a robust, reliable, and secure WiMAX network that takes full... Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion...
Taking Your iPod touch to the Max
Unleash your iPod touch and take it to the limit using secret tips and techniques from gadget hacker Erica Sadun. Fast and fun to read, Taking Your iPod touch to the Max will help you get the most out of your iPod touch.
You’ll find all the best undocumented tricks as well as the most efficient and enjoyable...
Signaling System #7 The #1 Working Reference on SS7--Revised & Expanded Signaling System #7 is the hands-down choice for engineers and network managers everywhere. Travis Russell's Signaling System #7, Third Edition, gives you a bedrock understanding of the signaling network, its architecture, and the protocols used to communicate through it. Accessible even to... VoIP Handbook: Applications, Technologies, Reliability, and Security The number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is projected to increase to nearly 250 million within the next three years. The future of voice transport has officially arrived.
The VoIP Handbook: Applications, Technologies, Reliability, and...
BackTrack 5 Cookbook
Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5
Learn to perform penetration tests with BackTrack 5
Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...
The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless Broadband wireless networks bring us closer to the Internet's ultimate destiny of interconnecting everyone, everywhere. But wireless networking can be a bit geeky and nerve-wracking without a proper guide. Let's face it: Networking can be hard.
If you're one of the last holdouts still connected to the Internet by a wire, The Book of...
|Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |