|
|
|
|
|
Home Networking (Missing Manual)Millions of computers around the world today are connected by the Internet, so why is it still so hard to hook up a few PCs in you own home? Whether you want to share an Internet connection, install WiFi, or maybe just cut down on the number of printers you own, home networks are supposed to help make your life easier. Instead, most aspiring home... | | ARRL's VHF Digital Handbook
Today's Amateur Radio operators are using digital radio applications for fun, technical achievement, and public service. And it s no wonder. Getting started often requires little more than a VHF radio and a computer.
Without complicated owners manual jargon ARRL s VHF Digital Handbook presents the material through a unique how-to... | | Windows 7: The Missing Manual
In early reviews, geeks raved about Windows 7. But if you're an ordinary mortal, learning what this new system is all about will be challenging. Fear not: David Pogue's Windows 7: The Missing Manual comes to the rescue. Like its predecessors, this book illuminates its subject with reader-friendly insight, plenty of... |
|
WiMAX Networks: Techno-Economic Vision and Challenges
Ignited by the mobile phone's huge success at the end of last century, the demand for wireless services is constantly growing. To face this demand, wireless systems have been and are deployed at a large scale. These include mobility-oriented technologies such as GPRS, CDMA or UMTS, and Local Area Network-oriented technologies such as... | | Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... | | Wireless and Mobile Networks Security
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This... |
|
|
|
Result Page: 8 7 6 5 4 3 2 1 |