|
|
|
|
|
Wideband TDD: WCDMA for the Unpaired SpectrumThe 3rd generation mobile wireless technology standardized by 3GPP has two main components, namely FDD (Frequency Division Duplex) and TDD (Time Division Duplex). While both of these employ WCDMA, the former uses a pair of frequency bands and the latter uses a single unpaired frequency band. Within TDD, two versions have been standardized, namely... | | Handbook of Wireless Local Area Networks: Applications, Technology, Security, and StandardsConsisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a... | | Next Generation Networks: Perspectives and PotentialsNext Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information. NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.
... |
|
|
Network Protocol Handbook (4th Edition)All active network protocols, including the most popular TCP/IP, WAN, LAN technologies are fully explained and well illustrated; Covers the latest and emerging technologies such as VOIP, SAN, MAN, VPN/Security, WLAN, VLAN and more.
About the Author
Javvin Technologies Inc., based at the Silicon... | | Introduction to Bluetooth Technology: Market, Operation, Profiles, and ServicesIf you are involved or getting involved in Bluetooth products, technologies and applications, this book is for you. This book explains what Bluetooth technology is and why it is important for so many types of consumer electronics devices. Since it was first officially standardized in 1999, the Bluetooth market has grown to more than 35 million... | | Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... |
|
|
Result Page: 7 6 5 4 3 2 1 |