A thorough guide to Java Servlets demonstrates how to use them to develop distributed, Internet-based applications, explaining how o create servlets and integrate them with other Java technologies, s
The past, present, and future of wireless telecom technology -- explained in one volumeThe convergence of current cellular and PC voice networks with the new wireless networks means anyone working in
With thorough explanations from the inner workings of the brain to the intricate networks of muscles and nerves, this fact-packed encyclopedia contains everything kids ages 8 and up need to know about
The former head of the Sante Fe Institute, visionary physicist Geoffrey West is a pioneer in the field of complexity science, the science of emergent systems and networks. The term “complexity” can be
A thrilling Cold War narrative exploring two harrowing attempts to rescue East Germans by tunneling beneath the Berlin Wall, the U.S. television networks who financed and filmed them, and the Kennedy
A thrilling Cold War narrative exploring two harrowing attempts to rescue East Germans by tunneling beneath the Berlin Wall, the U.S. television networks who financed and filmed them, and the Kennedy
GNS3 is open source software that uses emulated router and switch hardware on Windows, OS X, and Linux to create a real world environment of complex networks. GNS3 is an excellent tool for network eng
The first really easy-to-use consumer guide to buying, installing, and using electronic gadgetry including HDTVs and home networks, tablets, smart phones, MP3 players, GPS systems, car electronics and
"In the late 1990s and early 2000s, the landscape of television began an unprecedented transformation. While the networks continued to chase the lowest common denominator, a wave of new shows, first o
Charles H. Ferguson, who electrified the world with his Oscar-winning documentary Inside Job, now explains how a predator elite took over the country, step by step, and he exposes the networks of acad
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing inf
In this groundbreaking book, Adrian Bejan takes the recurring patterns in nature—trees, tributaries, air passages, neural networks, and lightning bolts—and reveals how a single principle of physics, t
Nation and literature are always inherently unstable categories but, in the case of South Africa, this instability is particularly marked. This study considers the effects local and global networks ha
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster
Shipwrecks discovered throughout Southeast Asia and the precious cargoes they contain represent invaluable information for the study of international trade networks. However, these treasure troves of
Cities are hybrid entities based on multilayered and sometimes contradictory organizing principles. As complex networks of geographic, economic, political and cultural segments, they are caught up in
AMERICA’S #1 BESTSELLING TELEVISION BOOK WITH MORE THAN HALF A MILLION COPIES IN PRINT–NOW REVISED AND UPDATED!PROGRAMS FROM ALL SEVEN COMMERCIAL BROADCAST NETWORKS, MORE THAN ONE HUNDRED CABLE NETWOR
Powerful networking tools that drive rapid, sustainable growth. Online social networks such as LinkedIn, blogs, and Meetup have enjoyed phenomenal growth in the past year. They are among m
Phone systems, service, data networks, and the Internet are critical pieces of any company’s communications. And most IT professionals don’t understand the effects of deregulation and parallel technol
The world-wide proliferation of cellular networks has revolutionized telecommunication systems. The transition from Analog to Digital RF technology enabled substantial increase in voice traffic using
Home networks are becoming as common as PCs. Home networking, or popularly known as “when your computers can talk to each other”, offers benefits including sharing printers, an Internet connection and
Secure Your Wireless Networks the Hacking Exposed WayDefend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume
* An indispensable resource for Fedora users who must now work without customer support from Red Hat, Inc., covering critical troubleshooting techniques for networks, internal servers, and external se
The first edition, published in 1973, has become a classic reference in the field. Now with the second edition, readers will find information on key new topics such as neural networks and statistical
Annual Plant Reviews, Volume 10The cytoskeleton is a dynamic filamentous structure composed of at least actin and microtubule networks. Actin and microtubules are no different structurally from their
Wireless data, the high-speed transfer of email, stock information, messages, and even video and audio across wireless networks, is expected to become a$7.5 billion business within the next three year
- VPNs (Virtual Private Networks) are a cheap and secure way for companies to transmit information over the internet- Covers key new VPN protocols, IP Sec (Security) and MPLS (switching)- How to build
Reviews the fundamentals and math of radio frequency theory, and the technologies and tasks required to install, manage, and support wireless LAN networks. Written by Planet3 Wireless employees, the
As telecom engineers struggle with implementing 3G networks, this in-depth guide to advanced methods of transmitting voice and modulated data over 3G ATM/IP backbones is especially timely. Readers wil
Signaling System #7 (SS7) links telephone networks all over the globe, allowing them to share vital signaling and control information--every telecom carrier and manufacturer has to work and develop ar
The rapid rise of e-commerce, data-heavy websites, and globalization has increased the demand for data storage space--and Storage Area Networks (SANs) are the best way to solve the problem. This resou
A technical introduction to streaming media for developers.Streaming technologies, such as HTTP or QuickTime, facilitate the transmission of audio and video data in networks. Businesses are turning to
The proliferation of weapons of mass destruction, in the hands of both states and terrorist networks, is considered by many to be the greatest threat to global security today. Contemporary Nuclear De
Physical health is continually affected by the mind. Positive thinking, learning to deal with anger and malice, and being a part of creative social networks can extend life and lessen our chances of b
Why, despite all the mentoring programs, executive training seminars, working women's networks, and other initiatives, are professional women still not where they want to be? Why are many women stereo
TCP/IP is the de facto protocol of the Internet, and this protocol is supported by every major network operating system. As more organizations and individuals connect networks and computers to the Int
An accessible and step-by-step approach to using VB.NET and XML enterprise application developmentXML is a tool for interacting with, describing, and transporting data between machines across networks
The emergence of network and System Administration, during the latter quarter century, as a discipline of science and engineering, has culminated in a number of paradigms for managing networks of coll
Graphical models use graphs to represent and manipulate joint probability distributions. They have their roots in artificial intelligence, statistics, and neural networks. The clean mathematical forma