Build a wired or wireless Linksys network in your home or office easily with help from this one-stop guide. Inside, you’ll find details on selecting the right hardware and components for your needs, i
The ultimate guide to next-generation network systems and network design With the explosive growth in RF and wireless technologies, there is a critical shortage of skilled engineers to design and ope
Evidence Based Pediatrics and Child Health is a ground-breaking new text on pediatrics and child care management, using evidence based approach. It covers all the major childhood conditions and contai
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to
With this guide you will be able to understand why wireless messaging is the next communications phenomenon. Great for corporate and individual users alike. Covers: Wide-ranging SMS applications f
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
You don’t want or need to understand every minute detail of how wireless works; you just want to learn how to effectively use wireless to impact your bottom line. Executive’s Guide to the
A practical guide to Cryptography and its use in the Internet and other communication networks.This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels
The proliferation of weapons of mass destruction, in the hands of both states and terrorist networks, is considered by many to be the greatest threat to global security today. Contemporary Nuclear De
Crash course in wireless telecom Need a jargon-free explanation of how wireless telecommunications work, with an emphasis on the design and management of systems? You’ll find it in Paul Bedell’s Wirel
Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written
Now you can get up to speed on the technology all the major wireless players--Palm, Handspring, RIM (Blackberry), Nokia, and Sony--are implementing with this hands-on resource. Ideal for developers, t
* The wireless Internet is unpacked and explained. * Compares and contrasts the strengths and weaknesses of i-mode,WAP,SMS,and Bluetooth. * Existing and potential wireless Internet market are analyz
Where and how to invest in wirelesstoday's most promising "next big thing" Wireless technologies are among today's major growth industries. By 2003, more than 500 million people will
Design and develop Java-based, data-driven applications using Spring and Hibernate technology Spring 4 and Hibernate 4: Agile Java Design and Development covers real-world applications for developing
This is an introduction to the law governing security interests in personal property, which is based on Article 9 of the UCC. This book explains terminology, structure, and methodology of security int
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
The first really easy-to-use consumer guide to buying, installing, and using electronic gadgetry including HDTVs and home networks, tablets, smart phones, MP3 players, GPS systems, car electronics and
Fully revised and updated for the new edition, the Oxford Handbook of Psychiatry provides the most up-to-date information clinically relevant to the doctor on the ground. Using a presentation-based fo
DAVID BUSCH'S NIKON D4 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your best bet for getting great results with your D4. Nikon's new flagship camera, the D4 includes a 16.2 megapixel sensor, advanced HDTV vid
Safety Health and Security in Wastewater Systems,?Sixth Edition offers comprehensive coverage of critical information necessary for regulatory compliance, reduction of liability, reduction of costs, a
DAVID BUSCH'S SONY ALPHA SLT-A65 GUIDE TO DIGITAL PHOTOGRAPHY is your best bet for getting the most out of your Alpha SLT-A65. Built with the same successful "translucent mirror technology" and sensor
Discusses the controversies regarding privacy and surveillance, including the ethical aspects of electronic surveillance of citizens by the government, security of identity over the Internet, and stud
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
《密碼學中的代數》內容簡介:This book is intended as a text for a course on cryptography with emphasis onalgebraic methods. It is written so as to be accessible to graduate or advancedundergraduate students, as wel
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
Cities are hybrid entities based on multilayered and sometimes contradictory organizing principles. As complex networks of geographic, economic, political and cultural segments, they are caught up in
A master kindergarten teacher shares her classroom-tested, inquiry-based lessons for using picture book and concept book favorites to help young learners build skills in number sense, basic operations
The wide popularity of both wireless and fixed telecommunications devices has not necessarily led to a complete understanding of the technologies and designs by non-specialists. Valdar (visiting telec
From the time of the ancient pharaohs to the modern world of Internet banking, civilization has relied on codes and ciphers to keep its secrets. The 4,000-year history of cryptography has been a kind
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresse
Global Corporate Identity 2 is the follow-up to the very successful Global Corporate Identity. In 2003, recognizing a need for awareness of global trends in branding and design, David E. Carter create
The world-wide proliferation of cellular networks has revolutionized telecommunication systems. The transition from Analog to Digital RF technology enabled substantial increase in voice traffic using
Written by the company that created the Certified Wireless Network Administrator program, this official study guide provides all the information you’ll need to help you pass the exam. Get an introduct
This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-sellin
Using musical allusion and metaphor, juxtaposing history and autobiography, Matejka navigates a triracial identity. In these poems, having too many heritages means having no heritage at all. As a resu
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
The 802.11 wireless LAN standard signals breakthrough possibilities in dialing for dollars and technical brilliance. 802.11 DEMYSTIFIED gives anyone in the wireless game--or the enterprise--the lowdow
Smith and Gervelis' experience in industry is in evidence in this thorough and practical text to the wireless network industry. The text emphasizes application and is filled with examples and solution