Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Mobile radio communications are evolving from pure telephony systems to multimedia
platforms offering a variety of services ranging from simple file transfers and audio and
video streaming, to interactive applications and positioning tasks. Naturally, these services
have different constraints concerning data rate, delay, and
...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Windows 2000 Active Directory
Windows 2000 Active Directory
Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. If you are a...
XML, Web Services, and the Data Revolution (Technology Series)
XML, Web Services, and the Data Revolution (Technology Series)

"Frank Coyle's XML,Web Services, and the Data Revolution does a great job of explaining the XML phenomenon by clearly describing where it came from, why it has proved so useful, and where it is likely to take us."—Michael Champion

XML, Web Services, and the Data Revolution presents a...

Microsoft .NET Kick Start
Microsoft .NET Kick Start

What is Microsoft .NET? Because this book is all about Microsoft .NET, it is important to first understand what.NET is. .NET is a technology platform for development and deployment of business applications using a set of technologies—.NET Framework, multiple programming languages, tools (particularly Visual Studio .NET),...

Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
THWART THE LATEST DISASTROUS ATTACKS

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the...

Special Edition Using Java Server Pages and Servlets
Special Edition Using Java Server Pages and Servlets
Special Edition Using JSP and Servlets starts by detailing the evolution of web servers that led to the creation of ASP and JSP. It explains both the limitations of previous technologies and the benefits that JSP provides including platform independence. Includes coverage of: organizing applications with multiple files and client-side objects,...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Embedded Linux: Hardware, Software, and Interfacing
Embedded Linux: Hardware, Software, and Interfacing

Embedded Linux covers the development and implementation of interfacing applications on an embedded Linux platform. It includes a comprehensive discussion of platform selection, crosscompilation, kernel compilation, root filesystem creation, booting, remote debugging, real-world interfacing, application control, data...

Microsoft .NET Server Solutions for the Enterprise
Microsoft .NET Server Solutions for the Enterprise

This book presents a practical guide that enables enterprise customers to take advantage of Microsoft® .NET Enterprise Servers. The focus is on providing solutions to common e-business problems faced by medium to large enterprises. Today, Microsoft .NET Enterprise Servers provide solutions to a broad array of scenarios. To address this large...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy