Vi bøger
Levering: 1 - 2 hverdage

WAP netværk

Her finder du spændende bøger om WAP netværk. Nedenfor er et flot udvalg af over 9 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Rob Botwright
    432,95 kr.

    Introducing the "Wireless Security Masterclass" Book Bundle - Your Path to Becoming a Wireless Security Expert!¿¿¿¿ Are you concerned about the security of your wireless networks? ¿¿¿¿ Want to learn the ins and outs of penetration testing and ethical hacking? ¿¿¿¿ Seeking a comprehensive resource to master wireless security from beginner to expert level?Look no further! Our "Wireless Security Masterclass" book bundle is your one-stop solution to mastering the art of wireless network security. With four carefully curated books, this bundle caters to beginners, intermediate learners, and seasoned experts alike.¿¿¿¿ Book 1 - Wireless Network Security Essentials: A Beginner's Guide If you're new to wireless security, this book is your starting point. Learn the fundamentals of encryption, authentication, and security protocols. Lay a solid foundation to build your expertise.¿¿¿¿ Book 2 - Hacking Wi-Fi Networks: Intermediate Techniques for Penetration Testers Ready to take your skills to the next level? Explore intermediate-level techniques used by ethical hackers. Crack Wi-Fi passwords, conduct wireless reconnaissance, and understand advanced attacks.¿¿¿¿ Book 3 - Advanced Wireless Exploitation: A Comprehensive Guide to Penetration Testing Ready to delve into the advanced realm? This book equips you with skills to identify hidden SSIDs, exploit Wi-Fi protocol weaknesses, and evade intrusion detection systems.¿¿¿¿ Book 4 - Wireless Network Mastery: Expert-Level Penetration Testing and Defense Reach the pinnacle of wireless security mastery. Explore expert-level penetration testing, advanced network mapping, and the art of exploiting misconfigurations. Learn how to maintain persistent access and employ anti-forensic techniques.¿¿¿¿ Why Choose the "Wireless Security Masterclass" Bundle?¿ Comprehensive Learning: Cover all aspects of wireless security from beginner to expert. ¿ Real-World Techniques: Learn practical skills used by ethical hackers and penetration testers. ¿ Expert Authors: Our books are authored by experts with extensive industry experience. ¿ Ongoing Updates: Stay current with the latest wireless security trends and techniques. ¿ Career Advancement: Boost your career prospects by becoming a certified wireless security professional.¿¿¿¿ Get Started Today! ¿¿¿¿Invest in your future, enhance your skills, and fortify your networks with the "Wireless Security Masterclass" bundle. Click the link below to order now and embark on your journey to wireless security mastery!

  • af Achim Orlikowski
    657,95 kr.

    "Mein MySQL Buch" mit Grundlagen, Fortgeschrittene Techniken und Best Practices ist das ultimative Handbuch für jeden, der seine Kenntnisse im Bereich Datenbankmanagement erweitern möchte. "Mein MySQL Buch" bietet eine umfassende Einführung in mySQL sowie zahlreiche fortgeschrittene Techniken und Best Practices, die von Einsteigern, Auszubildenden, Fortgeschrittenen und Experten gleichermaßen genutzt werden können."Mein MySQL Buch" ist in einer Schritt-für-Schritt-Struktur aufgebaut und bietet detaillierte Anleitungen, zahlreiche kommentierte Beispiele, Übungen, Multple Choise Aufgaben nach jedem Kapitel, Fallbeispiele, sowie ein umfangreiches Stichwortregister mit Erklärungen, um das Verständnis des Lesers zu verbessern. Jedes Kapitel baut auf den vorherigen Kapiteln auf, um eine nahtlose Lernumgebung zu schaffen.

  • af Anita Yadav
    682,95 kr.

    Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Miscellaneous, grade: 16, , language: English, abstract: In this thesis, we have modified AODV routing protocol by incorporating link prediction algorithm using a proposed link prediction model. This algorithm predicts the link availability time and even before the link breaks; either it repairs the route locally or sends information to the source nodes to enable them to initiate a new route search well in time. This algorithm improves the quality of service of the network. Simulation results show that AODV routing algorithm with link availability model performs better than the existing AODV.Advances in wireless technology and hand-held computing devices have brought revolution in the area of mobile communication. The increasing mobility of humans across the globe generated demand for infrastructure-less and quickly deployable mobile networks. Such networks are referred to as Mobile Adhoc Networks (MANET). Usually, nodes in a MANET also act as a router while being is free to roam while communicating each others. Adhoc networks are suited for use in situations where infrastructure is unavailable or to deploy one is not cost-effective.Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes will also causes frequent routes breaks and adversely affects the required performance for the applications.Availability of a route in future mainly depends on the availability of links between the nodes forming the route. Therefore, it is important to predict the future availability of a link that is currently available. We have proposed an analytical model for link prediction using Newton divided difference method. This link availability algorithm is incorporated in AODV routing algorithm (AODVLP) to evaluate the performance of AODV routing protocol using the metrics viz. delivery rate, average end-to-end delay, average RTS collisions per node and route failure. In the existing AODV protocol, packets are routed until a link in the existing path fails. This results in degradation of quality of service of network in terms of end-to-end delay and delivery ratio.

  • af Chao Shen
    1.220,95 kr.

    This book will investigate the service and QoE provisioning in ultra-dense heterogeneous networks. It covers definitions, characteristics, requirements, resource management, mobile management, inference management, enabling factors, integration with enabling technologies and future directions and challenges.

  • af Anonym
    694,95 kr.

    Master's Thesis from the year 2019 in the subject Mathematics - Applied Mathematics, grade: Master Degree, , language: English, abstract: This thesis discusses the performance enhancement of multi-taper spectrum sensing as a powerful technique for cognitive radio networks. In multi-taper spectrum sensing, regular detection of unused spectrum holes is performed to make cognitive radio networks aware of users' ctivities. As a result, more effective spectrum management is expected and unlicensed users could use unused spectrum holes.In this thesis, an analytical study was proposed in which reliable, simple, and computationally efficient mathematical expressions for the mean and variance of the probability density function (PDF) of the multitaper spectrum sensing techniques were derived. The proposed analytical study was evaluated by intensive simulations using MATLAB. The presence of Additive White Gaussian Noise is assumed. Many important aspects of spectrum sensing in cognitive radio networks are included such as, receiver operating characteristics, detection rate versus signal to noise ratio (SNR), and the minimum required sample points for a specific performance. All simulations were performed to include most factors affecting the efficiency of the proposed sensing methodology such as, number of tapers (K), number of sample points (N), and the probability of false alarm (Pf). A comparison with energy detection method was done. All simulation results and comparisons confirm that the proposed model is reliable and robust under all factors considered in the simulation.

  • af Cheeha Kim
    1.666,95 kr.

    Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986, the conference has provided a technical forum for various issues in inf- mation networking. The theme of each conference re?ects the historic events in the computer communication industry. (Please refer to www.icoin2005.or.kr for details.) The theme of ICOIN 2004, "Convergence in Broadband and Mobile Networking," was used again for ICOIN 2005 since we believed it was ongoing. This year we received 427 submissions in total, which came from 22 co- tries. Upon submission, authors were asked to select one of the categories listed in the Call for Papers. The most popular category chosen was network se- rity, followed by mobile networks and wireless LANs. Other areas with strong showings included QoS and resource management, ad hoc and sensor networks, and wireless multimedia systems. From the outset, we could see where recent research interest lay and could make sure that the theme was still going in the right direction.

  • af Stephan Olariu, Enrico Gregori, Marco, mfl.
    1.104,95 kr.

    This book constitutes the refereed proceedings of the IFIP-TC6 Eighth - ternational Conference on Personal Wireless Communications, PWC 2003. PWC 2003 is the ?agship conference of the IFIP Working Group 6.8, Mobile and Wireless Communications, and is the premier international forum for discussions between researchers, practitioners, and students interested in the symbiosis of mobile computing and wireless networks. It is a great pleasure to present the PWC 2003 technical program. This year the conference received 115 submissions from 27 countries indicating that PWC is a reference conference for worldwide researchers from the wireless and mobile community. With so many papers to choose from, the Technical Program Committee's job, to provide a conference program of the highest technical quality, was challenging and time consuming. From the 115 submissions, we ?nally selected 34 full papers and 15 short papers for presentation in the conference technical sessions. The conference technical program was split into three days, and included, in addition to the 49 refereed contributions, 4 invited papers from top-level researchers from the mobile and wireless community. To give researchers the opportunity to present ongoing work, and the novel ideas they are starting to explore, we included in the technical program two work-in-progress sessions and two novel-ideas sessions. The technical program also included a poster session devoted to presenting ongoing research projects on wireless and mobile communications.

  • af Giovanni Giambene, Tomaso de Cola, Alberto Ginesi, mfl.
    1.063,95 kr.

    This monograph reviews the integration of satellite and terrestrial networks, focusing on Multi Path TCP (MPTCP) and Information Centric Networking (ICN). It also extensively reviews content-based networking.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.