Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
Ubuntu Kung Fu: Tips, Tricks, Hints, and Hacks
Ubuntu Kung Fu: Tips, Tricks, Hints, and Hacks
This book was born out of an experiment carried out when Ubuntu 6.06 was released in 2006. Back then Ubuntu was rougher around the edges than it is today. Getting MP3 files to play took some effort. Only a handful of wifi cards worked out of the box and the rest had to be wrangled into working.

So I wrote 25 tips to get Ubuntu working
...
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications...
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Platform Interference in Wireless Systems: Models, Measurement, and Mitigation
Platform Interference in Wireless Systems: Models, Measurement, and Mitigation
Intra-system EMC problems are becoming increasingly common in mobile devices, ranging from notebook PCs to cell phones, with RF/wireless capbilities. These issues range from minor annoyances to serious glitches which impede the functioning of the device. This book gives a thourough review of electromagnetic theory (including Maxwell's equations),...
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
LAN Wiring
LAN Wiring
250+ detailed illustrations

The bestselling, state-of-the-art guide to cable installation for voice and data revised and updated to reflect the very latest advances and standards

Packed with essential time- and trouble-saving information, and written by a 25-year cabling veteran, LAN...

Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Mobility has become increasingly important for both business and casual users of computing technology. With the widespread adoption of portable computing devices, such as laptops, PDAs, tablet computers, music players, and cell phones, people can have almost constant access to their personal data as well as to information that is shared with...
Building Telephony Systems with OpenSER
Building Telephony Systems with OpenSER
We are starting a new era in the collaboration area. Voice and Video over IP are starting to dominate the world of telecommunications in a disruptive movement capable of changing the whole industry. The SIP (Session Initiation protocol) technology is at the center of this revolution. I believe, at present, SIP is the most used protocol for Voice...
Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
“Probably the most wide ranging and complete Linux device driver book I’ve read.”

--Alan Cox, Linux Guru and Key Kernel Developer

 

“Very comprehensive and detailed, covering almost every single Linux device driver type.”

...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy