
ilość książek w kategorii: 3142
![]() |
Ultra Wideband Demystified Technologies, Applications, and System Design Considerations
ISBN: 9788792329141 / Angielski / Twarda / 2009 / 248 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Ultra Wideband Demystified is a comprehensive text for emerging, high speed short range wireless technology of Ultra Wideband. It provides background concepts and information on evolving standards and their development efforts, radio technology, practical system design/implementation, and real life applications. This book deliberates on the regulatory frameworks, security aspects, and power management techniques essential to Ultra Wideband usage in consumer devices such as portable handheld mobile devices. Important topics such as UWB common radio usage for adapting to different...
Ultra Wideband Demystified is a comprehensive text for emerging, high speed short range wireless technology of Ultra Wideband. It provides bac...
|
cena:
448,71 |
![]() |
A Practical Guide to Content Delivery Networks
ISBN: 9781439835883 / Angielski / Twarda / 2010 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today's always on mobile society. Describing how content delivery networks (CDN) function, it provides an understanding of Web architecture, as well as an overview of the TCP/IP protocol suite.
The book reports on the development of the technologies that have evolved over the past decade as distribution mechanisms for various... Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an acces...
|
cena:
448,71 |
![]() |
Ad Hoc and Sensor Networks: Theory and Applications
ISBN: 9789812566812 / Angielski / Twarda / 2006 / 641 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book introduces a new explanatory cross-layer model specifically designed to understand all aspects of ad hoc and sensor networking, from design through performance issues to application requirements. Future directions, challenges and potential simulation projects are also discussed. The topics included represent a significant portion of what is going on in academia and industry. The vast materials provided will enable readers to not only understand and position themselves in this hot area, but also to develop new capabilities, enhance skills, share expertise, consolidate knowledge and...
This book introduces a new explanatory cross-layer model specifically designed to understand all aspects of ad hoc and sensor networking, from design ...
|
cena:
448,76 |
![]() |
The IP Multimedia Subsystem (Ims): Session Control and Other Network Operations
ISBN: 9780071488532 / Angielski / Twarda / 2008 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Build and maintain a converged multimedia network environment Seamlessly merge the Internet with cellular and wireless networks using next-generation IMS technology and the comprehensive information contained in this authoritative resource. The IP Multimedia Subsystem: Session Control and Other Network Operations details the steps necessary to deliver Web-based content, VoIP, streaming multimedia, conference calls, and text messages across one integrated network. Learn how to transition to IMS architecture, communicate with legacy networks, control sessions... Build and maintain a converged multimedia network environment Seamlessly merge the Internet with cellular and wireless netwo... |
cena:
448,95 |
![]() |
Migrating to SAP S/4hana: Operating Models, Migration Scenarios, Tools, and Implementation
ISBN: 9781493225194 / Angielski Termin realizacji zamówienia: ok. 10-14 dni roboczych. |
cena:
450,63 |
![]() |
Peer-To-Peer Computing: The Evolution of a Disruptive Technology
ISBN: 9781591404293 / Angielski / Twarda / 2004 / 300 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals...
Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. S...
|
cena:
453,47 |
![]() |
Multimedia Networking: Technology, Management and Applications
ISBN: 9781930708143 / Angielski / Twarda / 2014 / 500 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Internet growth has pushed the development of multimedia applications and technologies like voice, data and video, in all aspects of life. This guide addresses the dynamic and efficient use of resources - a fundamental aspect of multimedia networks.
Internet growth has pushed the development of multimedia applications and technologies like voice, data and video, in all aspects of life. This guide ...
|
cena:
453,47 |
![]() |
Enterprise Networking: Multilayer Switching and Applications
ISBN: 9781930708174 / Angielski / Miękka / 2001 / 282 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This guide offers information relevant to the design of corporate networks and the evaluation of networking equipment. It describes the architecture and standards of switching across the protocol layers and issues such as multicast quality of service, high-availability and network policies.
This guide offers information relevant to the design of corporate networks and the evaluation of networking equipment. It describes the architecture a...
|
cena:
453,47 |
![]() |
Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
ISBN: 9781591409380 / Angielski / Twarda / 2005 / 300 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Advanced Topics in Information Technology Standards and Standardization Research is a series of books which features the most current research findings in all aspects of IT standardization research, from a diversity of angles, traversing the traditional boundaries between individual disciplines. Advanced Topics in Information Technology Standards and Standardization Research, Volume 1 is a part of this series. Advanced Topics in Information Technology Standards and Standardization Research, Volume 1 presents a collection of chapters addressing a variety of aspects related to IT standards and...
Advanced Topics in Information Technology Standards and Standardization Research is a series of books which features the most current research finding...
|
cena:
453,47 |
![]() |
Internet Strategy: The Road to Web Services Solutions
ISBN: 9781591407638 / Angielski / Twarda / 2005 Termin realizacji zamówienia: ok. 16-18 dni roboczych. "Internet Strategy: The Road to Web Services Solutions" reminds readers that several attempts have been made to convince the world that DOT.COM was developed to take over businesses, and the traditional way of creating businesses and running organizations would be condemned to the past. One of those attempts led to the Application Service Provision model, from which the current Web Services business model takes its origins. As organizations start to carefully invest again, "Internet Strategy: The Road to Web Services Solutions" shows that the focus is on delivering value and enabling growth....
"Internet Strategy: The Road to Web Services Solutions" reminds readers that several attempts have been made to convince the world that DOT.COM was de...
|
cena:
453,47 |
![]() |
802.1X Port-Based Authentication
ISBN: 9781420044645 / Angielski / Twarda / 2006 / 252 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Port-based authentication is a network access control concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL).
The text presents an introductory overview of... Port-based authentication is a network access control concept in which a particular device is evaluated before being permitted to communicate with oth...
|
cena:
453,59 |
![]() |
MSWiM'19: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
ISBN: 9781450369046 / Angielski / Miękka / 2020 / 342 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
457,37 |
![]() |
Broadband Communications, Networks, and Systems: 15th Eai International Conference, Broadnets 2024, Cardiff, Uk, December 14-15, 2024, Proceedings
ISBN: 9783032143495 / Angielski Termin realizacji zamówienia: ok. 10-14 dni roboczych. |
cena:
458,27 |
![]() |
Application of Network Function Virtualization in Modern Computer Environments
ISBN: 9781638283584 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
462,11 |
![]() |
Japanese Speech Synthesis
ISBN: 9789056990954 / Angielski / Miękka / 2000 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. An introduction to recent results of Japanese research and development in the fields of speech synthesis.
An introduction to recent results of Japanese research and development in the fields of speech synthesis.
|
cena:
463,34 |
![]() |
Security in an Ipv6 Environment
ISBN: 9781420092295 / Angielski / Twarda / 2008 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Analyze Key Security Mechanisms and Approaches with this practical primer, the first book on the market to cover critical IPv6 security considerations. Dan Minoli, author of over 50 books on telecommunications and networks, and Jake Kouns, Chairman, CEO and CFO of the Open Security Foundation, discuss IPv6 security vulnerabilities, considerations, and mechanisms, and survey approaches for ensuring reliable and controlled IPv6 migration. The authors pool knowledge from industry resources, RFCs, and their own considerable security experience,... Analyze Key Security Mechanisms and Approaches with this practical primer, the first book on the market to cover critical IPv6 security... |
cena:
463,34 |
![]() |
Identification and Management of Distributed Data: Ngn, Content-Centric Networks and the Web
ISBN: 9781439879078 / Angielski / Twarda / 2013 / 294 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates and describes the various distributed data management technologies to help readers from various backgrounds understand the common aspects that govern distributed data management. Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software... |
cena:
463,34 |
![]() |
Improving the Performance of Wireless LANs: A Practical Guide
ISBN: 9781466560635 / Angielski / Twarda / 2014 / 472 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical results for the optimum planning and deployment of high performance WLAN systems in different residential and commercial buildings. Useful to students, faculties, researchers, engineers, and network developers, this must-have book not only... While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (W... |
cena:
463,34 |
![]() |
Peer-To-Peer Computing: Applications, Architecture, Protocols, and Challenges
ISBN: 9781439809341 / Angielski / Twarda / 2011 / 216 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges provides comprehensive theoretical and practical coverage of the major features of contemporary P2P systems and examines the obstacles to further success. Setting the stage for understanding important research issues in P2P systems, the book first... While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engin... |
cena:
463,34 |
![]() |
Network Attacks and Defenses: A Hands-On Approach
ISBN: 9781466517943 / Angielski / Twarda / 2012 / 475 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network... The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform at... |
cena:
463,34 |