"This book presents quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies"--Provided by publisher.
"This book reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation"--Provided by publisher.
While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there still remains to be a comprehensive understanding of its various dimensions and environments. Security, Design, and Architecture for Broadband and Wireless Network Technologies provides a discussion on the latest research achievements in wireless networks and broadband technology. Highlighting new trends, applications, developments, and standards, this book is essential for next generation researchers and practitioners in the ICT field.
While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical
"This book presents quality articles focused on key issues concerning the behavioral and social aspects of information technology"--Provided by publisher.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern society’s microelectronic-supported infrastructures.