Kirjojen hintavertailu. Mukana 12 393 488 kirjaa ja 12 kauppaa.
Kirjailija
Juanita Ellis
Kirjat ja teokset yhdessä paikassa: 6 kirjaa, julkaisuja vuosilta 2001-2022, suosituimpien joukossa Communications Engineering Desk Reference. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.
Erik Dahlman; Ed da Silva; Luis M. Correia; Philip A Chou; Mihaela van der Schaar; Ronald Kitchen; Daniel M. Dobkin; Dan Bensky; Juanita Ellis; Charles Pursell; Joy Rahman; Stefan Parkvall; Leonidas Guibas; Feng Zhao; Johan Skold; Per Beming; Alan C. Bovik; Bruce A. Fette; Keith Jack; Farid Dowla; Casimer DeCusatis
A one-stop desk reference for R&D engineers involved in communications engineering, this book will not gather dust on the shelf. It brings together the essential professional reference content from leading international contributors in the field. Material covers a wide scope of topics, including voice, computer, facsimile, video, and multimedia data technologies.
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network. This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A delightful study workbook for children based on the Christian Scripture from the Book of Jeremiah. Great resource for Sunday School and Vacation Bible School. Check out other resource books by Juanita Ellis at parsonsporch.com.
Covers the latest standards and those being developed in an ever-evolving field Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions A recent survey of 500 U.S. companies with multiple locations found that 81% are planning to implement IP Telephony on their local area networks (LANs) in 2003, and two-thirds are looking at convergence for their wide area networks (WANs) as well. This includes voice, video and data over hard line and wireless networks. Today, new standards and technologies are being developed to support convergence and voice over IP (VoIP) and Video over IP and wireless. Because convergence covers the voice and data world, it will be critical to understand all of these environments. Voice, Video, and Data Network Convergence provides detailed information on convergence network models, protocol stacks, routing algorithms, gateways and switches required to support these networks.
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.