Secure Your Wireless Networks the Hacking Exposed WayDefend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume
Now more than ever, success is based on how well firms manage interactions with customers. Short on appropriately skilled labor and flush with new intelligent technologies, visionary managers are not
Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary natu
"Profoundly sad and hopeful at the same time . . . Hachiko Waits shows us the very best in life; loyalty, devotion, our ability to love-all taught by a beloved, intelligent, and heroic dog. I love it.
A hilarious, intelligent-trivia-packed story from a man who read the entire ENCYLOPEDIA BRITANNICA. Early in his career, A. J. Jacobs found himself putting his Ivy League education to work at ENTERTAI
* An indispensable resource for Fedora users who must now work without customer support from Red Hat, Inc., covering critical troubleshooting techniques for networks, internal servers, and external se
This new addition to the American Heritage family offers an intelligent and sensible guide to synonym selection. Organized in an easy-to-use A-to-Z format, The American HeritageR College Thesaurus pro
The first edition, published in 1973, has become a classic reference in the field. Now with the second edition, readers will find information on key new topics such as neural networks and statistical
Annual Plant Reviews, Volume 10The cytoskeleton is a dynamic filamentous structure composed of at least actin and microtubule networks. Actin and microtubules are no different structurally from their
"MORE THAN TOYS OR INTELLIGENT APPLIANCES -- MECHANICAL FRIENDS AND VALUED ASSISTANTS Inside Robot Companions you'll find all the details, plans, and information you need to make a robot partner part
Wireless data, the high-speed transfer of email, stock information, messages, and even video and audio across wireless networks, is expected to become a$7.5 billion business within the next three year
- VPNs (Virtual Private Networks) are a cheap and secure way for companies to transmit information over the internet- Covers key new VPN protocols, IP Sec (Security) and MPLS (switching)- How to build
Reviews the fundamentals and math of radio frequency theory, and the technologies and tasks required to install, manage, and support wireless LAN networks. Written by Planet3 Wireless employees, the
As telecom engineers struggle with implementing 3G networks, this in-depth guide to advanced methods of transmitting voice and modulated data over 3G ATM/IP backbones is especially timely. Readers wil
Signaling System #7 (SS7) links telephone networks all over the globe, allowing them to share vital signaling and control information--every telecom carrier and manufacturer has to work and develop ar
The rapid rise of e-commerce, data-heavy websites, and globalization has increased the demand for data storage space--and Storage Area Networks (SANs) are the best way to solve the problem. This resou
A technical introduction to streaming media for developers.Streaming technologies, such as HTTP or QuickTime, facilitate the transmission of audio and video data in networks. Businesses are turning to
The proliferation of weapons of mass destruction, in the hands of both states and terrorist networks, is considered by many to be the greatest threat to global security today. Contemporary Nuclear De
Using the ways of the best moneymakers to invest wisely "An intelligent and thoughtful guide."BusinessWeek ". . . a welcome addition to the bookshelf of anyone who wants to take control of
Physical health is continually affected by the mind. Positive thinking, learning to deal with anger and malice, and being a part of creative social networks can extend life and lessen our chances of b
Why, despite all the mentoring programs, executive training seminars, working women's networks, and other initiatives, are professional women still not where they want to be? Why are many women stereo
TCP/IP is the de facto protocol of the Internet, and this protocol is supported by every major network operating system. As more organizations and individuals connect networks and computers to the Int
An accessible and step-by-step approach to using VB.NET and XML enterprise application developmentXML is a tool for interacting with, describing, and transporting data between machines across networks
The emergence of network and System Administration, during the latter quarter century, as a discipline of science and engineering, has culminated in a number of paradigms for managing networks of coll
Praise for INDEPENDENTLY WEALTHYSecond Edition"Anyone who has heard Dr. Goodman speak knows he delivers intelligent advice in a clear, forthright manner. His book does the same, helping investors char
Graphical models use graphs to represent and manipulate joint probability distributions. They have their roots in artificial intelligence, statistics, and neural networks. The clean mathematical forma
Asserting that knowledge is a key source of competitive strength and intelligent strategy, Hatten and Rosenthal (business, Boston U. and consultants, both) present a model, test, and review to help fr
-- IP Network Design is a step by step guide to designing IP based networks.-- Covers all the new important areas in IP design; IP over ATM, Voice over IP-- Tips from a network pro that allows you to
This hands-on implementation guide will show you how to implement Cisco-based virtual private networks step-by-step. It not only provides a detailed overview of the various VPN technologies available,
-- This introduction to Nortel Networks is essential to every network professional because it offers hands-on implementation techniques and real world case studies.Key features include: -- An introduc
Internet telephony is the integration and convergence of voice and data networks, services, and applications. The rapidly developing technology can convert analog voice input to digital data, send it
Cyberspace not only exemplifies but spearheads the greater political economy of which it has become such a critical part. The networks that comprise cyberspace were originally created at the behest of
Beautiful, intelligent, and hopelessly addicted to luxury, Lily Bart is the heroine of this Wharton masterpiece. But it is her very taste and moral sensibility that render her unfit for survival in th
What is this book about?ASP is the future of the web. If you're looking for a way to create attractive, intelligent web pages or, if you're just looking for a way to extend your HTML know-how, then AS
Until the mid-1980s, AI researchers assumed that an intelligent system doing high-level reasoning was necessary for the coupling of perception and action. In this traditional model, cognition mediate
Artificial neural networks are nonlinear mapping systems whose structure is loosely based on principles observed in the nervous systems of humans and animals. The basic idea is that massive systems of
Formal learning theory is one of several mathematical approaches to the study of intelligent adaptation to the environment. The analysis developed in this book is based on a number theoretical approac
In a world of huge, interconnected networks that can be completely blacked out by disturbances, POWER SYSTEM PROTECTION offers you an improved understanding of the requirements necessary for prompt an
Reprises the beginning of the Berserker Series in one volume, in which gigantic intelligent machines are set loose to destroy all life, with only one branch of humanity, descended from a world called