|
|
Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... | | | | |
|
Official (ISC)2 Guide to the CISSP CBKThe Official (ISC)² Guide to the CISSP CBK is ideal not only for information security professionals attempting to achieve CISSP certification but also for those who are trying to decide which, if any, certification to pursue. Executives and organizational managers who want a more complete understanding of all the elements that are required in... | | Energy Management Handbook, Sixth EditionWhen the fi rst introduction to Energy Management Handbook was written in 1982, I was in college, worried more about how to repay student loans than anything else. But this is now.
This book lives to serve its readers. In helping to edit the book, it has been my goal to keep the material fresh, pertinent and useful. My approach has been... | | Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.... |
|
|
|
Result Page: Previous 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 Next |