Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Wireless Local Loop (Artech House Telecommunications Library)
Introduction to Wireless Local Loop (Artech House Telecommunications Library)
Here's a comprehensive, easy-to-understand guide to the underlying technologies, key selection criteria, and design and deployment processes behind wireless local loop (WLL) systems. This one-source reference helps technical professionals develop a sound understanding of WLL system design procedures, and provides practical guidance on choosing the...
The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

Wireless Sensors and Instruments: Networks, Design, and Applications
Wireless Sensors and Instruments: Networks, Design, and Applications

Wireless Sensors and Instruments explains the underlying principles of wireless instruments, which incorporate recent communications technology in instruments and instrumentation systems. This book extensively covers software support at the stand-alone instrument and network levels and includes numerous examples from industrial applications,...

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Geekonomics: The Real Cost of Insecure Software
Geekonomics: The Real Cost of Insecure Software
You may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The...
MCSE 70-293 Training Guide: Planning and Maintaining a Windows Server 2003 Network Infrastructure
MCSE 70-293 Training Guide: Planning and Maintaining a Windows Server 2003 Network Infrastructure
The 70-293 exam is a core exam for the MCSE Windows 2003 certification, and tests professionals on their ability to plan and maintain a Windows 2003 network infrastructure. As of January 2003 there were over 200,000 Microsoft Certified Professionals. Not only will the majority of these be looking to upgrade to their 2003 MCSE, but the exam is...
Using Technology to Sell: Tactics to Ratchet Up Results
Using Technology to Sell: Tactics to Ratchet Up Results

"Using Technology to Sell is filled with practical, effective techniques to sell more by leveraging the plethora of tools and information in today’s world. By applying these principles, you'll open more doors, increase your productivity, speed up decisions, and close more deals."

...

Data Dissemination in Wireless Computing Environments (Advances in Database Systems)
Data Dissemination in Wireless Computing Environments (Advances in Database Systems)
In our increasingly mobile world the ability to access information on demand at any time and place can satisfy people's information needs as well as confer on them a competitive advantage. The emergence of battery-operated, low-cost and portable computers such as palmtops and PDAs, coupled with the availability and exploitation of wireless...
 
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy