The Internet has now become an integral part of everyday life for hundreds of millions of people around the world. However, ...
WeiterlesenThis book includs but not limited to Conceptual and logical models, Data management and retrieval, Geographical search engines, ...
WeiterlesenUnderstand how Wasm can be used for server-side applications / Learn about Wasm memory model and Wasm module layout / Learn ...
WeiterlesenThis open access book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research ...
WeiterlesenWi-Fi™, Bluetooth™, ZigBee™ and WiMax™ will provide a complete and detailed description of the recent wireless technologies ...
WeiterlesenThis second edition includes most of the material from the first edition, plus new discussions about the ultra-fast mobile ...
WeiterlesenWindows Server 2003 Networking Recipes is ideal for network managers and Windows Server 2003 system administrators responsible ...
WeiterlesenWindows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft ...
WeiterlesenThis volume contains the proceedings of the proceedings of the 4th International Conference on Wired/ Wireless Internet Communications ...
WeiterlesenThis book is organized in topical sessions on performance analysis of wireless systems, resource and QoS management, implementation ...
WeiterlesenThe two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
WeiterlesenThe two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
WeiterlesenThis book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless Internet, ...
WeiterlesenWireless Mesh Networks provides a unified view of the state-of-the-art achievements in the area of protocols and architectures ...
WeiterlesenThis timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic ...
WeiterlesenOffers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...
WeiterlesenWireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and ...
WeiterlesenThis book presents the proceedings of the first IFIP WG 6.8 conference on Wireless Sensor and Actor Networks held in Albacete, ...
WeiterlesenThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
WeiterlesenProvides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...
Weiterlesen