|
|
|
|
HackNotes(tm) Linux and Unix Security Portable ReferenceHackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and... | | Handbook of Research on Mobile MultimediaThe demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information... | | Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007This book constitutes the reviewed proceedings of the Third International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2007, held in Wroclaw, Poland, July 14, 2007, in association with ICALP 2007.
The 11 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 26... |
|
IP Multimedia Subsystem (IMS) HandbookThe IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use... | | The Design of CMOS Radio-Frequency Integrated Circuits, Second Edition
This expanded and thoroughly revised edition of Thomas H. Lee's acclaimed guide to the design of gigahertz RF integrated circuits features a completely new chapter on the principles of wireless systems. The chapters on low-noise amplifiers, oscillators and phase noise have been significantly expanded as well. The chapter on architectures... | | Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all... |
|
|
Cybersecurity Operations HandbookCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... | | Wireless Communications Security (Artech House Universal Personal Communications)Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography... | | Wireless Home Networking For DummiesWireless home networks are better than ever! The emergence of new industry standards has made them easier, more convenient, less expensive to own and operate. Still, you need to know what to look for (and look out for), and the expert guidance you’ll find in Wireless Home Networks For Dummies, 3rd Edition helps you ensure that your... |
|
|
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 |