krainaksiazek the mobile millionaire making the most of mobile technology 20092025

- znaleziono 15 produktów w 4 sklepach

Building the Mobile Internet - 2826765120

179,66 zł

Building the Mobile Internet CISCO

Książki / Literatura obcojęzyczna

The complete guide to technologies and protocols for delivering seamless mobile Internet experiences In Building the MobileInternet, three leading mobility architects and implementers from Cisco present complete foundational knowledge about tomorrow's mobile Internet. The authors cover everything from market trends and user expectations to the latest technical approaches for making the Internet "mobile by design." Writing for senior technology decision-makers and network design professionals, the authors explain the relatively static nature of the Internet's original protocols and design, discuss the concept of "mobility," and identify evolving mobility requirements. Next, they thoroughly explain each of today's most promising techniques for building mobility into the Internet, from data link layer to application layer. For each layer, the authors cover mechanisms, protocols, relevant Wi-Fi and cellular architectures, and key use cases. Using this book's guidance, mobile network executives can define more effective strategies, network designers can construct more effective architectures, and network engineers can execute more successful migrations. Mark Grayson, Cisco Distinguished Consulting Engineer, leads Cisco's mobile architecture strategy. He has 20+ years of wireless experience ranging from military and satellite systems to the evolution of traditional cellular architectures and the creation of new small cell solutions. He has been granted 50+ patents. Kevin Shatzkamer, Cisco Distinguished Systems Architect, is responsible for long-term strategy and architectural evolution of Cisco mobile wireless networks. His experience ranges from 3G and LTE to security, video distribution, and QoS. He now works with both content providers and service providers to enhance the end-to-end digital media value chain for mobility. Klaas Wierenga, Senior Consulting Engineer in Cisco's Office of the CTO, has 15+ years of experience implementing diverse mobility, security, and identity solutions for enterprises, municipalities, hospitals, and universities. He created the worldwide eduroam service for federated network access in academia. * Understanding key mobility market trends: device proliferation, accelerating consumption, and radio-specific scalability problems * Reviewing the challenges that mobility presents to conventional Internet architectures * Understanding nomadicity, including authentication for users moving across networks and operators * Identifying opportunities to address mobility at the data link layer * Comparing and using network layer solutions to deliver seamless mobility and session continuity * Integrating mobility functionality into the transport/session layer * Adding mobility functionality to the application layer-including support for moving media sessions between devices * Redesigning Internet architecture to enable long-term improvements to mobility This book is part of the Networking Technology Series from Cisco Press(R), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Sklep: Libristo.pl

Making of an Automobilist (Classic Reprint) - 2837507374

48,61 zł

Making of an Automobilist (Classic Reprint) Forgotten Books

Książki / Literatura obcojęzyczna

Excerpt from The Making of an Automobilist The writer feels that he has been most fortunate in securing articles on the following subjects by men recognized in their various lines of manufacture as being the greatest American authorities: "Automobile Material And Construction." By Jonathan D. Maxwell, Vice President and Superintendent, Maxwell-Briscoe Motor Co. "The Cooling Of Explosive Motors." By Frank Briscoe, President Briscoe Manufacturing Co. "Tires And Tire Construction." By Horace DeLisser, President Ajax Standard Rubber Co. "The Importance Of Oiling An Auto- Mobile." By C. W. Kelsey. About the Publisher Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.

Sklep: Libristo.pl

Lifehacker Guide to Working Smarter, Faster, Better - 2826783105

111,65 zł

Lifehacker Guide to Working Smarter, Faster, Better Wiley

Książki / Literatura obcojęzyczna

A new edition, packed with even more clever tricks and methods that make everyday life easier Lifehackers redefine personal productivity with creative and clever methods for making life easier and more enjoyable. This new edition of a perennial bestseller boasts new and exciting tips, tricks, and methods that strike a perfect balance between current technology and common sense solutions for getting things done. Exploring the many ways technology has changed since the previous edition, this new edition has been updated to reflect the latest and greatest in technological and personal productivity. The new "hacks" run the gamut of working with the latest Windows and Mac operating systems for both Windows and Apple, getting more done with smartphones and their operating systems, and dealing with the evolution of the web. Even the most tried-and-true hacks have been updated to reflect the contemporary tech world and the tools it provides us. Hacks include: Hack 1: Empty Your Inbox (and Keep It Empty). Hack 2: Decrease Your Response Time. Hack 3: Craft Effective Messages. Hack 4: Highlight Messages Sent Directly to You. Hack 5: Use Disposable Email Addresses. Hack 6: Master Message Search. Hack 7: Future-Proof Your Email Address. Hack 8: Consolidate Multiple Email Addresses with Gmail. Hack 9: Script and Automate Repetitive Replies. Hack 10: Filter Low-Priority Messages. Hack 11: Organize Your Documents Folder. Hack 12: Instantly Retrieve Files Stored on Your Computer. Hack 13: Overhaul Your Filing Cabinet. Hack 14: Instantly Recall Any Number of Different Passwords. Hack 15: Securely Track Your Passwords. Hack 16: Tag Your Bookmarks. Hack 17: Organize Your Digital Photos. Hack 18: Corral Media Across Folders and Drives. Hack 19: Create Saved Search Folders. Hack 20: Create a Password-Protected Disk on Your PC. Hack 21: Create a Password-Protected Disk on Your Mac. Hack 22: Encrypt Your Entire Windows Operating System. Hack 23: Set Up 2-Step Verification for Your Google Account. Hack 24: Design Your Own Planner. Hack 25: Make Your To-Do List Doable. Hack 26: Set Up a Morning Dash. Hack 27: Map Your Time. Hack 28: Quick-Log Your Workday. Hack 29: Dash Through Tasks with a Timer. Hack 30: Form New Habits with Jerry Seinfeld's Chain. Hack 31: Control Your Workday. Hack 32: Turn Tasks into Game Play. Hack 33: Send Reminders to Your Future Self. Hack 34: Take Great Notes. Hack 35: Organize Your Life with Remember the Milk. Hack 36: Organize Your Life in Text Files. Hack 37: Set Up a Ubiquitous Note-Taking Inbox Across Devices. Hack 38: Off-Load Your Online Reading to a Distraction-Free Environment. Hack 39: Limit Visits to Time-Wasting Websites. Hack 40: Permanently Block Time-Wasting Websites. Hack 41: Reduce Email Interruptions. Hack 42: Split Your Work Among Multiple Desktops. Hack 43: Build a No-Fly Zone. Hack 44: Set Up Communication Quiet Hours. Hack 45: Clear Your Desktop. Hack 46: Make Your House a Usable Home. Hack 47: Sentence Stuff to Death Row. Hack 48: Drown Out Distracting Sounds with Pink Noise. Hack 49: Search the Web in Three Keystrokes. Hack 50: Command Your Windows PC from the Keyboard. Hack 51: Command Your Mac from the Keyboard. Hack 52: Reduce Repetitive Typing with Texter for Windows. Hack 53: Reduce Repetitive Typing with TextExpander for Mac. Hack 54: Automatically Fill in Repetitive Web Forms. Hack 55: Batch-Resize Photos. Hack 56: Bypass Free Site Registration with BugMeNot. Hack 57: Speed Up Web Pages on a Slow Internet Connection. Hack 58: Securely Save Website Passwords. Hack 59: Become a Scheduling Black Belt with Google Calendar. Hack 60: Set Up an Automated, Bulletproof File Back Up Solution. Hack 61: Automatically Back Up Your Files to an External Hard Drive (Mac). Hack 62: Automatically Clean Up Your PC. Hack 63: Automatically Clean Up Your Mac. Hack 64: Automatically Reboot and Launch Applications. Hack 65: Make Google Search Results Automatically Come to You. Hack 66: Automatically Download Music, Movies, and More. Hack 67: Access Your Most Important Files Anywhere with Dropbox. Hack 68: Manage Your Documents in a Web-Based Office Suite. Hack 69: Carry Your Life on a Flash Drive. Hack 70: Create a Virtual Private Network (VPN) with Hamachi. Hack 71: Run a Home Web Server. Hack 72: Run Full-Fledged Webapps from Your Home Computer. Hack 73: Build Your Personal Wikipedia. Hack 74: Remotely Control Your Home Computer. Hack 75: Give Your Home Computer a Web Address. Hack 76: Optimize Your Laptop. Hack 77: Speed Up Your Touchscreen Typing. Hack 78: Break Down the Barrier Between Your Computer and Mobile Phone. Hack 79: Remote Control Your Computer with Your Phone. Hack 80: Automate Android Functions with Tasker. Hack 81: Set Up One Phone Number to Rule Them All. Hack 82: Augment Reality with Your Phone. Hack 83: Remember Where You've Been Using Location Awareness. Hack 84: Command Your Phone with Your Voice. Hack 85: Use Your Camera Phone as a Scanner. Hack 86: Make Your "Dumbphone" Smarter via Text Message. Hack 87: Connect Your Computer to the Internet via Mobile Phone by "Tethering". Hack 88: Develop Your (Digital) Photographic Memory. Hack 89: Send and Receive Money on Your Mobile Phone with PayPal. Hack 90: Google Like a Pro. Hack 91: Subscribe to Websites with RSS. Hack 92: Quickly Search Within Specific Websites from the Address Bar. Hack 93: Extend Your Web Browser. Hack 94: Supercharge Your Firefox Downloads with DownThemAll! Hack 95: Get 10 Useful Bookmarklets. Hack 96: Find Reusable Media Online. Hack 97: Get Your Data on a Map. Hack 98: Set Multiple Sites as Your Home Page. Hack 99: Access Unavailable Websites via Google. Hack 100: Have a Say in What Google Says About You. Hack 101: Clear Your Web Browsing Tracks. Hack 102: Rescue Your PC from Malware. Hack 103: Protect Your PC from Malware. Hack 104: Clean Up Your Startup. Hack 105: Undo System Configuration Changes. Hack 106: Truly Delete Data from Your Hard Drive. Hack 107: Compare and Merge Files and Folders with WinMerge. Hack 108: Firewall Your Windows PC. Hack 109: Firewall Your Mac. Hack 110: Speed Up Windows with a Thumb Drive. Hack 111: Free Up Hard-Drive Space. Hack 112: Resurrect Deleted Files. Hack 113: Hot Image Your PC for Instant Restoration. Hack 114: Hot Image Your Mac for Instant Restoration. Hack 115: Recover Files from an Unbootable PC. Hack 116: Share Windows Files. Hack 117: Share Mac Files. Hack 118: Keep Your Web Browser in Sync Across Computers. Hack 119: Share a Single Printer Between Computers. Hack 120: Optimize Your Dual Monitors. Hack 121: Control Multiple Computers with a Single Keyboard and Mouse. Technology is supposed to make our lives easier by helping us work more efficiently. Lifehacker: The Guide to Working Smarter, Faster, and Better, Third Edition is your guide to making that happen!

Sklep: Libristo.pl

Elcomsoft Phone Breaker (Professional Edition) - 2833104003

954,60 zł

Elcomsoft Phone Breaker (Professional Edition) GSM-Support, Kraków

Oprogramowanie użytkowe > Elcomsoft

Recover Password-Protected BlackBerry and Apple Backups Elcomsoft Phone Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the iPhone 6 Plus and iOS 8. Retrieve Cloud Backups: Apple iCloud and Windows Live Cloud acquisition is an alternative way of retrieving information stored in mobile backups produced by Apple iOS, and the only method to explore Windows Phone 8 devices. Elcomsoft Phone Breaker can retrieve information from Apple iCloud and Windows Live! services provided that original user credentials for that account are known. Online backups can be acquired by forensic specialists without having the original iOS or Windows 8 Phone device in hands. All that

Sklep: GSM-support.pl

Elcomsoft Phone Breaker (Home Edition) - 2833104002

378,96 zł

Elcomsoft Phone Breaker (Home Edition) GSM-Support, Kraków

Oprogramowanie użytkowe > Elcomsoft

Recover Password-Protected BlackBerry and Apple Backups Elcomsoft Phone Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the iPhone 6 Plus and iOS 8. Retrieve Cloud Backups: Apple iCloud and Windows Live Cloud acquisition is an alternative way of retrieving information stored in mobile backups produced by Apple iOS, and the only method to explore Windows Phone 8 devices. Elcomsoft Phone Breaker can retrieve information from Apple iCloud and Windows Live! services provided that original user credentials for that account are known. Online backups can be acquired by forensic specialists without having the original iOS or Windows 8 Phone device in hands. All that

Sklep: GSM-support.pl

Elcomsoft Phone Breaker (Forensic Edition) - 2833104004

3832,80 zł

Elcomsoft Phone Breaker (Forensic Edition) GSM-Support, Kraków

Oprogramowanie użytkowe > Elcomsoft

Recover Password-Protected BlackBerry and Apple Backups Elcomsoft Phone Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the iPhone 6 Plus and iOS 8. Retrieve Cloud Backups: Apple iCloud and Windows Live Cloud acquisition is an alternative way of retrieving information stored in mobile backups produced by Apple iOS, and the only method to explore Windows Phone 8 devices. Elcomsoft Phone Breaker can retrieve information from Apple iCloud and Windows Live! services provided that original user credentials for that account are known. Online backups can be acquired by forensic specialists without having the original iOS or Windows 8 Phone device in hands. All that

Sklep: GSM-support.pl

Loose Wire - 2826977604

101,53 zł

Loose Wire Equinox Publishing (Asia) Pte Ltd

Książki / Literatura obcojęzyczna

EVER GET THE FEELING that technology is taking over your life and not asking you first? When you've mislaid that important file or can't connect your new camera, do you just want to hurl your computer out of the window? When your kids/friends/grandparents start talking about blogging, podcasting and RSS feeds do you nod as wisely as you can while wrestling with the urge to throw them out of the window too? The bad news is that technology isn't going away. The good news is that, by picking up this book, you're halfway to making it work for you - not against you. Loose Wire is a compilation of Jeremy Wagstaff's most popular weekly columns on personal technology from The Wall Street Journal Asia and the Far Eastern Economic Review. An ordinary person's primer on technology, Loose Wire explains - in jargon-free language and real sentences - what has happened over the past few years, from the rise of the mobile phone to phishing, to where we are heading, as well as hands-on, practical advice about how to enjoy the ride. ABOUT THE AUTHOR Jeremy Wagstaff has worked as a journalist since 1986 - for the BBC, Reuters, The Wall Street Journal and the Far Eastern Economic Review. Most of that time has been spent in Asia, covering uprisings, wars, colonial retreats and the odd (sometimes very odd) press conference. No techie, his interest in technology grew out of a realization that it was changing the way journalists - and the world - work, and that following it would probably be a better idea than fighting it. Since 2000 he has been writing a technology column and has since 2004 appeared regularly on the BBC World Service. He also keeps a blog at www.loosewireblog.com.

Sklep: Libristo.pl

CORS in Action - 2827136799

254,48 zł

CORS in Action MANNING

Książki / Literatura obcojęzyczna

DESCRIPTION Most web developers have encountered the "same-origin" policy enforced by all browsers-pages and applications can't access data from domains other than the one that serves them. This limitation means that complex server-side code is needed in order to share data between different domains. CORS, Cross-Origin Resource Sharing, is a new web standard that provides a safe method for cross-domain access. CORS in Action introduces Cross-Origin Resource Sharing from both the server and the client perspective. It starts with the basics: making CORS requests and implementing CORS on the server. It then explores key details such as performance, debugging, and security. API authors learn how CORS opens APIs to a wider range of users. JavaScript developers will find valuable techniques for building rich web apps that can take advantage of APIs hosted anywhere. The techniques described in this book are especially applicable to mobile environments, where browsers are guaranteed to support CORS. RETAIL SELLING POINTS CORS from the ground up Best practices for building CORS APIs Explains different cross-origin technologies CORS security AUDIENCE This book is written for web developers with a working knowledge of JavaScript. No CORS experience is required. ABOUT THE TECHNOLOGY CORS is a good fit for mobile technology and is the cornerstone of building open web APIs. Traditionally, web developers would have to add a server-side component to their web apps in order to access APIs. CORS allows the entire web application, including API access to reside inside JavaScript and the browser.

Sklep: Libristo.pl

ITIL V 3 Foundation Exam Video Mentor - 2842368969

432,32 zł

ITIL V 3 Foundation Exam Video Mentor Pearson IT Certification

Książki / Literatura obcojęzyczna

Duration 6+ Hours of Video Instruction Overview Get all the training you need to earn your ITIL Foundation Certificate in IT Service Management and jump forward in your IT career! Description The ITIL V3 Foundation Exam Video Mentor is a combined book and DVD set which contains hours of instructor-led presentations in an easy-to-follow format, providing both foundational reinforcement of exam topics as well as exam preparation tips, tricks, and sample questions. The DVD video tackles each ITIL V3 Foundation topical area with the key concepts, process activities, roles, and vocabulary necessary to pass the ITIL V3 Foundation Exam based on the newest APMG syllabus, all through a fun and thorough teaching style. This ITIL V3 Foundation Exam Video Mentor set provides a test-preparation learning experience from a leading Certified ITIL Expert based on the latest examination syllabus, ensuring all current exam topics are covered. Don't be left behind by using outdated 2009-edition materials; this ITIL V3 Foundation Exam Video Mentor will help ensure your success! About the Instructor Jill Knapp (Certified ITIL Expert, DPSM) is an IT Service Management consultant and an accredited ITIL trainer for clients worldwide. In June 2007, Jill co-taught the world's first accredited ITIL V3 Foundation course with exam, after serving on a talented international team to develop the accredited courseware. Her fun and accessible teaching style combines her technical experience with her degree in education, and her V3 Foundation students have enjoyed a near-perfect pass rate. Join the ranks of her successful students! Skill Level * All Levels What You Will Learn * ITIL key concepts, vocabulary, models, roles, and relationships * The main processes of ITIL's five core publications: Service Strategy, Service Design, Service Transition, Service Operations, and Continual Service Improvement * How these processes contribute to making an IT organization manageable, efficient, and effective * Memorization tricks to help you retain and recall the most challenging information * Strategies for tacking the exam, including tactics for breaking down questions and spotting keywords * All with Jill's fun and well-appreciated teaching style and approach, tied to real-world examples! Who Should Take This Course * Anyone studying to take the ITIL V3 Foundations exam or who wants to learn more about ITIL. Table of Contents Lesson 1: Laying the ITIL Groundwork 1.1 ITIL:An Overview 1.2 ITSM/ITIL Key Concepts 1.3 Sample Questions Lesson 2: Service Strategy 2.1 Service Strategy Overview 2.2 Service Portfolio Management 2.3 Financial Management 2.4 Demand Management 2.5 Sample Questions Lesson 3: Service Design 3.1 Service Design Overview 3.2 Service Catalogue Management 3.3 Service Level Management 3.4 Capacity Management 3.5 Availability Management 3.6 IT Service Continuity Management 3.7 Information Security Management 3.8 Supplier Management 3.9 Sample Questions Lesson 4: Service Transition 4.1 Service Transition Overview 4.2 Service Asset and Configuration Management (SACM) 4.3 Change Management 4.4 Release and Deployment Management 4.5 Knowledge Management 4.6 Sample Questions Lesson 5: Service Operation 5.1 Service Operation Overview 5.2 ITIL's Four Functions 5.3 Event Management 5.4 Incident Management 5.5 Request Fulfillment 5.6 Problem Management 5.7 Access Management 5.8 Sample Questions Lesson 6: Continual Service Improvement 6.1 Continual Service Improvement Overview 6.2 CSI Approaches: Deming Cycle, CSI Model, and the Seven-Step Improvement Process 6.3 CSI Metrics and Measurement 6.4 CSI Interfaces and Roles 6.5 Sample Questions About LiveLessons Video Training LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at: http://www.pearsonitcertification.com/livelessons

Sklep: Libristo.pl

Database Nation - 2835278266

82,78 zł

Database Nation O´REILLY

Książki / Literatura obcojęzyczna

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours. Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril. Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before? Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

Sklep: Libristo.pl

True Visions - 2827020338

961,84 zł

True Visions Springer, Berlin

Książki / Literatura obcojęzyczna

Ambient intelligence (AI) refers to a developing technology that will increasingly make our everyday environment sensitive and responsive to our presence. The AI vision requires technology invisibly embedded in our everyday surroundings, present whenever we need it that will lead to the seamless integration of lighting, sounds, vision, domestic appliances, and personal healthcare products to enhance our living experience. Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions explains how the devices making up the AI world will operate collectively using information and intelligence hidden in the wireless network connecting them. Expert contributions address key AI components such as smart materials and textiles, system architecture, mobile computing, broadband communication, and underlying issues of human-environment interactions. It seeks to unify the perspectives of scientists from diverse backgrounds ranging from the physics of materials to the aesthetics of industrial design as it describes the emergence of ambient intelligence, one of today s most compelling areas of innovation.

Sklep: Libristo.pl

New Directions in Internet Management - 2212832531

252,60 zł

New Directions in Internet Management CRC Press Inc.

Informatyka

Re-examines the information superhighway, application service providers, management service providers, and E-commerceCovers return on investment in terms of Internet related expenditures, reducing operating costs, understanding Web and language related issuesIdentifies opportunities to integrate different and disparate business applications or Web servicesExplores wireless data networking, wireless impacts on the enterprise network, and mobile database interoperabilityIncludes Web site management before, during, and after development such as Web site design, managing content, and controlling data flow/volume ratesDiscusses creating and managing information with XML, Java-enabled data warehousing, bridging legacy data, content management, publishing data on the Web, and other data management challengesHighlights issues in Internet security including security architecture, risk mitigation strategies, digital signatures, computer virus protection, firewalls, and how to prevent crackingExamines methods for supporting a Web site after it is implemented including operational processes, monitoring, analyzing Web traffic, guaranteeing Internet service levels, auditing procedures, and using intelligent agents to improve the site What is the business model for making money on the Internet and how does it function? The answer to this question will determine the shape of the Internet over the near term. As the Internet business model continues to evolve, so will Internet management. And with the demise of the Internet greatly exaggerated, it will continue to be a driving force for business in the future. Keeping you up-to-date with the latest thinking in this field, New Directions in Internet Management gives you an encyclopedia of Internet management know-how. Most Internet-related books present in-depth coverage of one particular technology or application. Not this one. It provides you with a strategic and tactical view of the entire Internet landscape, what the technologies and applications are, how they work together, and how to plan for them. You get advice from battle-scarred experts on everything from choosing the right Web database to finding a reliable Web consultant, from security to performance management. Detailed and instructive case studies, examples, and hundreds illustrations supplement the coverage. Focusing exclusively on the management aspects of Internet development and maintenance, New Directions in Internet Management shows you how to leverage Internet technology while abiding by time-honored business practices.

Sklep: Albertus.pl

Understanding Augmented Reality - 2835031734

217,15 zł

Understanding Augmented Reality MORGAN KAUFMANN

Książki / Literatura obcojęzyczna

AR is when a physical, real-world environment's elements are augmented by computer-generated sound or graphics. The technology functions by enhancing one's current perception of reality and providing a combination of real-world and computer-generated data. Examples in use today are when related sports scores are shown on TV during a game or when you can learn more about the objects around you at a museum via your smartphone. There is so much potential for making things more deeply engaging using these technologies, particularly as they become more easily available via smartphones. Augmented reality systems can be used in almost any field or industry, providing instant added information that enhances your experience. AR applications have already appeared in areas such as entertainment, education, marketing, advertising, architecture, publishing, museums, and more. All iPhones now come equipped with a video camera, a compass, and GPS the three tools necessary for AR applications. This book provides the necessary background: what AR really is, the lay of the land in terms of hardware, software, interaction techniques, content development, and usability concerns to prepare you to create compelling and appropriate AR applications. Designers will gain a coherent approach to understanding and applying fundamental approaches to AR development. The author, Alan B. Craig, PhD, is a major player in this area, currently working with museums to integrate technology, including augmented reality (AR), to make a better museum experience. This book will include a clear explanation of what AR is including some short "case studies" that detail some AR applications in different fields. This section will also highlight what has worked well and not so well in the example applications. It covers of mobile devices, seen through head mounted displays (optical and video) and other display and interaction systems, so that developers can choose the most appropriate platform for desired applications. Associated website includes sample projects and additional code, cool application examples available for download, and links to interesting applications that support the points being made in the book.

Sklep: Libristo.pl

The Rough Guide To The Iphone - 2839965073

48,99 zł

The Rough Guide To The Iphone

Książki Obcojęzyczne>Angielskie>Computing & information technology>Digital lifestyle>Mobile phones: consumer/user guides

Shows You How To Make The Most Of The IPhone 5's Blend Of Fun And Function. This Title Covers The Basics Such As Synchronizing With ICloud, Facetime And Making The Most Of Siri. It Unlocks Secrets Such As How To Make Free International Calls And Exploring

Sklep: Gigant.pl

Switching to VoIP - 2826926028

195,26 zł

Switching to VoIP O'Reilly Media, Inc, USA

Książki / Literatura obcojęzyczna

More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP. VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm. Developed from real-world experience by a senior developer, O'Reilly's Switching to VoIP provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed and projects presented: * building a softPBX * configuring IP phones * ensuring quality of service * scalability * standards-compliance * topological considerations * coordinating a complete system ?switchover? * migrating applications like voicemail and directory services * retro-interfacing to traditional telephony * supporting mobile users * security and survivability * dealing with the challenges of NAT To help you grasp the core principles at work, Switching to VoIP uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium. You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. Switching to VoIP remains vendor-neutral and advocates standards, not brands. Some of the standards explored include: * SIP * H.323, SCCP, and IAX * Voice codecs *802.3af * Type of Service, IP precedence, DiffServ, and RSVP *802.1a/b/g WLAN If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.

Sklep: Libristo.pl

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z krainaksiazek pl the mobile millionaire making the most of mobile technology 20092025

2. Szukaj na wszystkich stronach serwisu

t1=0.058, t2=0, t3=0, t4=0.023, t=0.058

Dla sprzedawców

copyright © 2005-2016 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER