|
|
|
|
|
Secure Roaming in 802.11 Networks (Communications Engineering)WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide... | | Microsoft Windows 7 UnleashedCovers Release Candidate of Windows 7.
With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.
Microsoft® Windows 7 Unleashed... | | Deploying License-Free Wireless Wide-Area NetworksBest practices for planning and deployment of broadband WWANs.
Choose the right network architecture for your wireless network Conduct physical site surveys and radio-frequency (RF) site surveys License-free broadband wireless wide-area networks (WWANs) provide fast deployment of lowcost, high-speed "last-mile"... |
|
Linux Mint System AdministratorA¢a‚¬a„¢s Beginners Guide
Probably the fastest route to becoming a Linux Mint system administrator, this book takes you from A–Z with clear step-by-step instructions, ranging from basic installation, to configuring networks, to troubleshooting. The perfect primer.
Overview
What you will learn from this book
... | | The Lessons of Tragedy: Statecraft and World Order
An eloquent call to draw on the lessons of the past to address current threats to international order
The ancient Greeks hard?wired a tragic sensibility into their culture. By looking disaster squarely in the face, by understanding just how badly things could spiral out of control, they sought to create a ... | | Windows 7 QuickStepsStep-by-Step, Full-Color Graphics!
Get started using Windows 7 right away--the QuickSteps way. Color screenshots with streamlined explanations show you how to use all the new and improved features of this sleek operating system. You'll find tips for customizing your desktop, managing files, connecting to the Internet, using... |
|
Decrypted Secrets: Methods and Maxims of Cryptology"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)
"It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology." ... | | Windows® 7 Inside OutYou re beyond the basics, so dive right in and really put your PC to work! This supremely organized reference is packed with hundreds of timesaving solutions, troubleshooting tips, and workarounds. It s all muscle and no fluff. Discover how the experts tackle Windows 7 and challenge yourself to new levels of mastery! Compare features and... | | Computer and Intrusion Forensics (Artech House Computer Security Series)Computer forensics and intrusion forensics are rapidly becoming mainstream activities in an increasingly online society due to the ubiquity of computers and computer networks. We make daily use of computers either for communication or for personal or work transactions. From our desktops and laptops we access Web servers, e-mail... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |