Multimedia Messaging Service
UMTS Security
UMTS: The Fundamentals
Hardening Cisco Routers
HTTP: The Definitive Guide
Mobile Communication Systems
Designing Large Scale Lans
Server Load Balancing
Advanced API Security
Android Hacker’s Handbook
Android Security Internals
Black Hat Python
Cyber Threat!
GPRS Networks
GPRS is a packet based wireless communication service that offers data rates from 9.05 up to 171.2 Kbps and continuous connection to the Internet for ...
GSM, GPRS and EDGE Performance: ...
GSM, GPRS and EDGE Performance — Second Edition provides a complete overview of the entire GSM system. GSM (Global System for Mobile Communications) i ...
Multimedia Messaging Service
The “Multimedia Messaging Service” (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to ...
UMTS Security
Can you afford not to read this book?…The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and ...
UMTS: The Fundamentals
UMTS (Universal Mobile Telecommunication System) is the third generation telecommunications system based on WCDMA. WCDMA (Wideband Code Division Multi ...
Wireless Home Networking For Du ...
Thinking of going wireless? It’s not as scary as it sounds! This fast and fun guidebook helps you decide what you need, install it, and get the most f ...
Hardening Cisco Routers
This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The ...
HTTP: The Definitive Guide
Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) – the language of web browsers and servers, of portals and search engines, of ...
Mobile Communication Systems
Mobile communication systems have become one of the hottest areas in the field of telecommunications and it is predicted that within the next decade a ...
Mobile Radio Networks, 2nd Edit ...
This book offers a comprehensive and detailed description of services and protocols of the systems. Particular attention is paid to the radio-related ...
Designing Large Scale Lans
This unique book outlines the advantages of a top-down, vendor-neutral approach to network design. Everything from network reliability, network topolo ...
Network Troubleshooting Tools
Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones ...
Radio Interface System Planning ...
This broadly applicable book introduces radio system planning, emphasizing theoretical and practical details for the planning of GSM, GPRS and UMTS mo ...
Server Load Balancing
Load balancing improves network performance by distributing traffic efficiently so that individual servers are not overwhelmed by sudden fluctuations ...
Building Internet Firewalls, 2n ...
Completely revised and much expanded, the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix, Linux, and ...
Ethernet: The Definitive Guide
Ethernet is a core networking technology used by every high tech business. While the basic protocols have changed little, new options such as Fast Eth ...
Cellular Mobile Radio Systems
Most radio systems have become so popular that the available frequency bands are able to meet only a fraction of the demand. This book gives practical ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
Android Hacker’s Handbook
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by expe ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Anti-Hacker Tool Kit, 4th Editi ...
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...
Black Hat Python
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the mag ...
Building Virtual Pentesting Lab ...
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Cyber Threat!
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of go ...