Conducting a wireless site survey is the final step of a carefully planned journey. Before rushing to the facility to be surveyed
with your laptop and some access points (APs), however, you must collect information about the purpose of the required wireless
coverage. This chapter helps you prepare for this site survey by listing the...
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...
Written by a leading developer and maintainer of the Linux kernel, Linux Kernel in a Nutshell is a comprehensive overview of kernel configuration and building, a critical task for Linux users and administrators.
No distribution can provide a Linux kernel that meets all users' needs. Computers big and small have special...
The book supports the developers of services and applications for mobile phones, PDAs and smart phones. This new emerging domain is characterized by a very fast pace of change in the underlying technology, exposing products and applications to a constant risk of obsolescence. The relative youth of this field means that knowledge is comparatively...
This book for IT professionals and network administrators describes installation, configuration and administration of BlackBerry Enterprise Server for Microsoft Exchange, with detailed information on planning and implementing BlackBerry Enterprise Server deployment. It also provides background information on the BlackBerry architecture, security,...
Loaded with information on the design of work systems, workplaces, and workstations as well as human anthropometics, Ergonomics for Beginners: A Quick Reference Guide, Third Edition provides a useful quick reference and valuable tool for novices and experienced...
In a fast-moving technical and business environment like the Internet only exactitude can guarantee success. An 'almost correct' specification is a wrong specification. Make total accuracy your signature with this invaluable guide.
It offers detailed definitions of the bewildering array of terms and phrases relating to e-Business and the...
For upper level and graduate level Electrical and Computer Engineering courses in Integrated Circuit Design as well as professional circuit designers, engineers and researchers working in portable wireless communications hardware.This book presents the fundamentals of Complementary Metal Oxide Semiconductor (CMOS) and Bipolar compatible...
The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....
Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these...
"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." -Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
* US High Court Refuses to Review RIM Patent Ruling by Reuters * DTV Alliance Takes Mobile TV To The Masses by Bary Alyssa Johnson * Government...