" "



:






.. 1 2 3 4 5 6 7 8 9 10 ... 70

: High Speed Multimedia for Amateur Radio
: ARRL Inc., Glen Popiel
: ARRL, the national association for Amateur Radio
: 2016
: pdf/azw3 (conv.)
: 256
: 23.5 Mb
: English

Build a High Speed Amateur Radio Microwave Network
Using commercial off-the-shelf equipment and developing their own software, groups of hams have created high speed wireless Amateur Radio digital networks with wide area coverage.
The possible uses for these high speed data networks in the Amateur Radio community are endless. Virtually any service that works on the regular Internet can be adapted to an Amateur Radio high speed multimedia (HSMM) network, including video conferencing, instant messaging, voice over Internet protocol (VoIP), network sensors and cameras, remote station control, and many other services. With the capability to send real-time video and data files, the public service and disaster support aspects of Amateur Radio are expanded tremendously.
: bomboane 15-04-2017, 03:28 | : 0 |
: Magento 2 - Build World-Class online stores
: Fernando J Miguel
: Packt Publishing
: 2017
: PDF
: 14,4
: / English

Magento is the leading e-commerce software trusted by world`s leading organizations. Used by thousands of merchants for their transactions worth billions, it provides the flexibility to customize the content and functionality of your website. Our Magento Course will help you gain knowledge and skills that are required to design & develop world class online stores.
: black 14-04-2017, 20:50 | : 0 |
:
: , ,
: -
: 2011
: djvu
: 253
: 10,9 Mb
:

(VPN). . . VPN VPN. VPN. VPN ( ).
, " " " ", " ".
: oksanavalera 14-04-2017, 11:13 | : 0 |

: CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001
: Michael J. Chapple, David Seidl
: Sybex
: 2017
: 552
: PDF, EPUB, AZW3
: 27 Mb
: English

Prepare yourself for the newest CompTIA certification
The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal of securing and protecting organizations systems.
: bhaer 12-04-2017, 16:09 | : 0 |

: Signal Processing and Networking for Big Data Applications
: Zhu Han, Mingyi Hong, Dan Wang
: Cambridge University Press
: 2017
: 390
: PDF, EPUB, AZW3
: 20 Mb
: English

This unique text helps make sense of big data in engineering applications using tools and techniques from signal processing. It presents fundamental signal processing theories and software implementations, reviews current research trends and challenges, and describes the techniques used for analysis, design and optimization.
: bhaer 12-04-2017, 14:42 | : 0 |

: Risk Thinking for Cloud-Based Application Services
: Eric Bauer
: Auerbach Publications
: 2017
: 511
: PDF, EPUB, AZW3
: 19 Mb
: English

Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regulatory concerns; proactive risk management maximizes the likelihood that an enterprises objectives will be achieved, thereby enabling organizational success.
: bhaer 12-04-2017, 12:58 | : 0 |

: Building a Pentesting Lab for Wireless Networks+code
:PACKT
: Vyacheslav Fadyushin, Andrey Popov
: 2016
:264
: English
: pdf, epud, mobi, code
:16 Mb

Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques Starting with the basics of wireless networking and its associated risks, we will guide you through the stages of creating a penetration testing lab with wireless access and preparing your wireless penetration testing machine.
: decomeron 12-04-2017, 08:53 | : 0 |
: Using Open Data to Detect Organized Crime Threats: Factors Driving Future Crime
: Henrik Legind Larsen and Jos? Mar?a Blanco
: Springer
: 2017
: PDF, EPUB
: 27,4
: / English

This work provides an innovative look at the use of open data for extracting information to detect and prevent crime, and also explores the link between terrorism and organized crime. In counter-terrorism and other forms of crime prevention, foresight about potential threats is vitally important and this information is increasingly available via electronic data sources such as social media communications. However, the amount and quality of these sources is varied, and researchers and law enforcement need guidance about when and how to extract useful information from them.
: black 11-04-2017, 20:34 | : 0 |
: Introduction to Wireless Sensor Networks
: Anna Firster
: Wiley
: 2016
: PDF, EPUB
: 10
: / English

Explores real-world wireless sensor network development, deployment, and applications
Presents state-of-the-art protocols and algorithms
Includes end-of-chapter summaries, exercises, and references
For students, there are hardware overviews, reading links, programming examples, and tests available at [website]
For Instructors, there are PowerPoint slides and solutions available at [website]
: black 11-04-2017, 20:14 | : 0 |
: Performance Evaluation for Network Services, Systems and Protocols
: St?nio Fernandes
: Springer
: 2017
: PDF, EPUB, AZW3
: 10,5
: / English

This book provides a comprehensive view of the methods and approaches for performance evaluation of computer networks. It offers a clear and logical introduction to the topic, covering both fundamental concepts and practical aspects. It enables the reader to answer a series of questions regarding performance evaluation in modern computer networking scenarios, such as What, where, and when to measure?, Which time scale is more appropriate for a particular measurement and analysis?, 'Experimentation, simulation or emulation? Why?, and How do I best design a sound performance evaluation plan?.
: black 11-04-2017, 19:52 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 70

 MirKnig.Su  2017