 |
|
 |  |  Essential MATLAB for Scientists and EngineersBased on a teach-yourself approach, the fundamentals of MATLAB are illustrated throughout with many examples from a number of different scientific and engineering areas, such as simulation, population modelling, and numerical methods, as well as from business and everyday life. Some of the examples draw on first-year university level maths, but... |  |  TCP/IP Professional Reference GuideThe TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP... |
|
|
|
 Network Quality of Service Know It All (Morgan Kaufmann Know It All)This book brings all of the elements of network quality of service (QoS) together in a single volume by the best and brightest experts in the field!
The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different... |  |  Implementing 802.1X Security Solutions for Wired and Wireless NetworksWhen deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an... |  |  Deploying Wireless Networksdeployment cycle in cellular and broadband wireless networks, including OFDM-WiMAX/LTE
Wireless operators will find this practical, hands-on guide to network deployment invaluable. Based on their own extensive experience, the authors describe an end-to-end network planning process to deliver the guaranteed Quality of Service... |
|
Result Page: 1122 1121 1120 1119 1118 1117 1116 1115 1114 1113 1112 1111 1110 1109 1108 1107 1106 1105 1104 |