IP Multimedia Subsystem (IMS) technology, which merges the Internet with interactive telecommunications, represents the here and now for today’s packet-switched networks. Consequently, anyone wo
Analyze Key Security Mechanisms and Approaches with this practical primer, the first book on the market to cover critical IPv6 security considerations.Dan Minoli, author of over 50 books on telecommun
Flexible and efficient, VMware ESX is the tool of choice for enterprise data centers looking to make the most of the latest virtualization methods. However, to date, no single manual provides users wi
Rapid deployment and acceptance of broadband networks, including the 802.11 a/b/g, 3G cellular networks, WiMAX, and emerging 4G cellular IP networks, have sparked a growing reliance on voice over IP a
There are many books on project management and many on embedded systems, but few address the project management of embedded products from concept to production. Project Management of Complex and Embed
While 3G has been an outstanding success, the ever-growing demand for higher data rates and higher quality mobile communication services continues to fuel conflict between the rapidly growing number o
Series: Mobile Services and SystemsRoutledge Library Editions: Political Science reprints sixty distinguished texts published in this field over the last century and includes works
Understanding Surveillance Technologies demystifies spy devices and describes how technology is used to observe and record intimate details of people’s lives—often without their knowledge or consent.
A consequence of business specialization is the implementation of weak processes that cross departmental and corporate boundaries. Supply chain management (SCM) addresses this issue by requiring a pro
For those preparing for the Certified Protection ProfessionalR program and designation, The Complete Guide for CPP Examination Preparation provides a thorough foundation of essential security concepts
Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for
Since the last publication of this international bestseller, software testing has seen a renaissance of renewed interest and technology. The biggest change comes in the growing prominence and acceptan
Software engineering requires specialized knowledge of a broad spectrum of topics, including the construction of software and the platforms, applications, and environments in which the software operat
Since its formation in 2002—the largest government reorganization since FDR’s "New Deal"—the Department of Homeland Security (DHS) has focused on a broad range of public policy, safety, and security i
Detailing best practices and trade secrets for private sector security investigations, Private Security and the Investigative Process, Third Edition provides complete coverage of the investigative pro
A complete review and overview of the field, this handbook explores benefits, challenges, and the latest thinking about the major topics of this emerging discipline. It provides, in 40 chapters writte
Organizations waste millions of dollars every year on failed projects. Failure is practically guaranteed by poor or incomplete requirements that do not properly define projects in their initial stages