Kirjojen hintavertailu. Mukana 12 393 488 kirjaa ja 12 kauppaa.

Kirjailija

Juanita Ellis

Kirjat ja teokset yhdessä paikassa: 6 kirjaa, julkaisuja vuosilta 2001-2022, suosituimpien joukossa Communications Engineering Desk Reference. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

6 kirjaa

Kirjojen julkaisuhaarukka 2001-2022.

Communications Engineering Desk Reference

Communications Engineering Desk Reference

Erik Dahlman; Ed da Silva; Luis M. Correia; Philip A Chou; Mihaela van der Schaar; Ronald Kitchen; Daniel M. Dobkin; Dan Bensky; Juanita Ellis; Charles Pursell; Joy Rahman; Stefan Parkvall; Leonidas Guibas; Feng Zhao; Johan Skold; Per Beming; Alan C. Bovik; Bruce A. Fette; Keith Jack; Farid Dowla; Casimer DeCusatis

Academic Press Inc
2009
sidottu
A one-stop desk reference for R&D engineers involved in communications engineering, this book will not gather dust on the shelf. It brings together the essential professional reference content from leading international contributors in the field. Material covers a wide scope of topics, including voice, computer, facsimile, video, and multimedia data technologies.
The Personal Internet Security Guidebook

The Personal Internet Security Guidebook

Tim Speed; Juanita Ellis; Steffano Korper

Academic Press Inc
2001
nidottu
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network. This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
Voice, Video, and Data Network Convergence

Voice, Video, and Data Network Convergence

Juanita Ellis; Charles Pursell; Joy Rahman

Academic Press Inc
2003
nidottu
Covers the latest standards and those being developed in an ever-evolving field Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions A recent survey of 500 U.S. companies with multiple locations found that 81% are planning to implement IP Telephony on their local area networks (LANs) in 2003, and two-thirds are looking at convergence for their wide area networks (WANs) as well. This includes voice, video and data over hard line and wireless networks. Today, new standards and technologies are being developed to support convergence and voice over IP (VoIP) and Video over IP and wireless. Because convergence covers the voice and data world, it will be critical to understand all of these environments. Voice, Video, and Data Network Convergence provides detailed information on convergence network models, protocol stacks, routing algorithms, gateways and switches required to support these networks.
Internet Security

Internet Security

Tim Speed; Juanita Ellis

Digital Press
2003
nidottu
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
Enterprise Directory and Security Implementation Guide

Enterprise Directory and Security Implementation Guide

Charles Carrington; Tim Speed; Juanita Ellis; Steffano Korper

Academic Press Inc
2002
nidottu
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.