Within three years, more than 500 million people will be using some form of wireless device. To marketers just learning the rules of online sales, the marketing possibilities of wireless communication
An ideal starting point for anyone wanting to learn about next generation wireless networksGives important insights into the design of wireless IP networksIllustrates the standards and network archite
A comprehensive account of recent algorithms developed in computational number theory and primality testing. Provides a general framework for the theoretical study of public key cryptography and pseud
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically,
- VPNs (Virtual Private Networks) are a cheap and secure way for companies to transmit information over the internet- Covers key new VPN protocols, IP Sec (Security) and MPLS (switching)- How to build
Develop and execute winning wireless strategies for your company Offering the prospect of instantaneous, cable-free Internet connectivity and an array of Web services to cell phones, handheld computer
Based on the author's working experience as a design engineer at the world's top mobile phone and wireless component companies, Das introduces practitioners and students to mobile handset technologie
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
"RF spectrum is the most valuable commodity in the wireless market – the wireless equivalent of real estate. Without the necessary spectrum – and the skills to manage it – companies cannot hope to com
Evidence Based Pediatrics and Child Health is a ground-breaking new text on pediatrics and child care management, using evidence based approach. It covers all the major childhood conditions and contai
You don’t want or need to understand every minute detail of how wireless works; you just want to learn how to effectively use wireless to impact your bottom line. Executive’s Guide to the
Where and how to invest in wirelesstoday's most promising "next big thing" Wireless technologies are among today's major growth industries. By 2003, more than 500 million people will
Safety Health and Security in Wastewater Systems,?Sixth Edition offers comprehensive coverage of critical information necessary for regulatory compliance, reduction of liability, reduction of costs, a
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
The wide popularity of both wireless and fixed telecommunications devices has not necessarily led to a complete understanding of the technologies and designs by non-specialists. Valdar (visiting telec
From the time of the ancient pharaohs to the modern world of Internet banking, civilization has relied on codes and ciphers to keep its secrets. The 4,000-year history of cryptography has been a kind
Global Corporate Identity 2 is the follow-up to the very successful Global Corporate Identity. In 2003, recognizing a need for awareness of global trends in branding and design, David E. Carter create
The world-wide proliferation of cellular networks has revolutionized telecommunication systems. The transition from Analog to Digital RF technology enabled substantial increase in voice traffic using
Smith and Gervelis' experience in industry is in evidence in this thorough and practical text to the wireless network industry. The text emphasizes application and is filled with examples and solution
In recent years there has been a wide interest in non-linear adaptive control using approximate models, either for tracking or regulation, and usually under the banner of neural network based control.
A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and market shareMuch has been written lately about the m
One of the hottest topics in the telecommuncations industry today is the migration of voice traffic from the circuit switched Telco networks to packet switched networks such as IP, ATM, Frame Relay an
Learn to protect your online business using this insightful and practical guide to computer security. Through use of real examples, you'll understand and address the risks associated with using email,
Overviews Internet security for organizations, without getting into micro-level details of implementation. Shows how to analyze a company's systems in terms of security risks, and explains how to des
A bittersweet, comic rendering of everyday office life in miniature, based on the popular Instagram Figuratively Speaking. Using only his iPhone, his desk lamp, and his expansive collection of mi
Using and Understanding Mathematics: A Quantitative Reasoning Approach prepares students for the mathematics they will encounter in college courses, their future career, and life in general. Its quant
Lehtimäki presents readers with a comprehensive examination of the power of intra-organizational social networks, arguing that strategic management has to be embedded in complex social relations.
For courses in Visual Basic Programming From the Beginning: A Comprehensive Introduction to Visual Basic Programming Schneider’s Introduction to Programming Using Visual Basic, Student Va
It’s time to put the “home” back into our homeland. Part prescription and part memoir, this exceptional view of America’s security concerns by a leading government Homeland Security advisor, Pulitzer
This reference and guide for students, researchers, and scholars presents case-based theory, method, and applications and offers guidelines for conducting case study research in 15 genres, includin
The co-founder of HGTV shows how women can achieve their career goals using techniques of gamesmanship. New Rules of the Game provides insights, tips and direction to women in business, based on exp
Michael Barr explores the complex and covert networks of power at work in one of the world's most prosperous countries – the city-state of Singapore. He argues that the contemporary networks of power
Based on the popular column by New York Magazine food editors Rob Patronite and Robin Raisfeld, In Season collects more than 150 recipes from the country’s finest chefs and restaurants, using fresh fa
Updated and streamlined for easier use, TECHNOLOGY INTEGRATION FOR MEANINGFUL CLASSROOM USE: A STANDARDS-BASED APPROACH, Second Edition, equips readers with the knowledge, creative and critical thinki
Praise for Outpacing the Competition Patent-Based Business Strategy "Outpacing the Competition provides a useful IP management framework for rapidly evolving and inherently unpredictable R&D environme
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materi
Written for the design professional, this book offers basic concepts for site security design and risk/threat assessment, and their relationship and integration into the overall design/streetscape pro