Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Powerhouse Partners : A Blueprint for Building Organizational Culture for Breakaway Results
Powerhouse Partners : A Blueprint for Building Organizational Culture for Breakaway Results
For any manager or executive committed to achieving business goals through effective strategic partnership, this book gathers successes of some of the world's leading companies to deliver a tool kit for shaping a partnering culture.

From the author who introduced the groundbreaking concept of Partnering Intelligence come the...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
Wireless sensor networks will revolutionise applications such as environmental monitoring, home automation, and logistics.

Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the most important issues and questions that have to be addressed in a wireless sensor network....

Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Before you start your hacking projects, you'll need the right arsenal of tools. For some hacks, you might need only a single screwdriver. For others, you could need a workshop complete with power tools and advanced electronic equipment. For the most part, it isn't necessary to have a world-class laboratory or top-of-the-line computer system to...
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
“a comprehensive overview of both DDS architectures and fractional-N frequency synthesizers.” Microwave Journal said this book “is aimed specifically at practical designers and utilizes many intuitive explanations and design examples.” Microwaves & RF magazine

"Bar-Giora Goldberg should
...
Wireless Broadband Handbook
Wireless Broadband Handbook
Translate broadband wireless mumbo-jumbo into clear business terms

No guide tackles and clarifies the chaotic acronym-ridden world of broadband wireless better than Wireless Broadband Handbook. Best-selling telecom author Regis "Bud" Bates has the formula to give you the "instant expertise" you need to compete and...

SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

unlimited object storage image
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy