Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Handbook of Research on Mobile Multimedia
Handbook of Research on Mobile Multimedia
The demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information...
Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007
Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007
This book constitutes the reviewed proceedings of the Third International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2007, held in Wroclaw, Poland, July 14, 2007, in association with ICALP 2007.

The 11 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 26...

IP Multimedia Subsystem (IMS) Handbook
IP Multimedia Subsystem (IMS) Handbook
The IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use...
The Design of CMOS Radio-Frequency Integrated Circuits, Second Edition
The Design of CMOS Radio-Frequency Integrated Circuits, Second Edition

This expanded and thoroughly revised edition of Thomas H. Lee's acclaimed guide to the design of gigahertz RF integrated circuits features a completely new chapter on the principles of wireless systems. The chapters on low-noise amplifiers, oscillators and phase noise have been significantly expanded as well. The chapter on architectures...

Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu

This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all...

Raspberry Pi 3 Projects for Java Programmers
Raspberry Pi 3 Projects for Java Programmers

Learn the art of building enticing projects by unleashing the potential of Raspberry Pi 3 using Java

About This Book

  • Explore the small yet powerful mini computer in order to run java applications
  • Leverage Java libraries to build exciting projects on home automation, IoT, and Robotics by...
Arduino Robot Bonanza
Arduino Robot Bonanza

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Create high-tech walking, talking, and thinking robots

"McComb hasn’t missed a beat. It’s an absolute...

Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Wireless Communications Security (Artech House Universal Personal Communications)
Wireless Communications Security (Artech House Universal Personal Communications)
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography...
Wireless Home Networking For Dummies
Wireless Home Networking For Dummies
Wireless home networks are better than ever! The emergence of new industry standards has made them easier, more convenient, less expensive to own and operate. Still, you need to know what to look for (and look out for), and the expert guidance you’ll find in Wireless Home Networks For Dummies, 3rd Edition helps you ensure that your...
unlimited object storage image
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy