Flylib.com
References
Previous page
Table of content
Next page
References are included throughout the chapter.
Previous page
Table of content
Next page
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
MySQL Cookbook
Calculating LIMIT Values from Expressions
Using TIMESTAMP Values
Validation by Pattern Matching
Producing Master-Detail Lists and Summaries
Counting and Identifying Duplicates
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 2. Set Up Bluetooth on Windows XP
Hack 35. Check Wi-Fi Network Performance with Qcheck
Hack 37. Get Real-Time Network Stats
Hack 83. Make a Deep Dish Cylindrical Parabolic Reflector
Hack 84. Spider Omni Antenna
Java Concurrency in Practice
Visibility
Thread Confinement
Adding Functionality to Existing Thread-safe Classes
Documenting Synchronization Policies
Cancellation and Shutdown
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Transmission Lines
Political and Regulatory Forces in Telecommunications
Packet-Switched Networks
Next-Generation Networks and Convergence
5G: Enhanced Data Services
Comparing, Designing, and Deploying VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
Implementing Advanced AToM Features
Advantages and Disadvantages of MPLS Layer 3 VPNs
Designing QoS for IPsec VPNs
Understanding Digital Signal Processing (2nd Edition)
ANALYZING LINEAR TIME-INVARIANT SYSTEMS
THE DFT SINGLE-BIN FREQUENCY RESPONSE TO A REAL COSINE INPUT
REFERENCES
Appendix C. Time Reversal and the DFT
Section D.3. THE MEAN AND VARIANCE OF RANDOM FUNCTIONS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies