eBooks-it.org Logo
eBooks-IT.org Inner Image

Wiley eBooks Page 217

Download free Wiley eBooks Page 217

Internet Communications Using SIP

Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP Image
2nd Edition
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."--Henning Schulzrinne, Professor, Columbia UniversitySince its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust technology, SIP today is fully capable of supporting the communication systems that power our twenty-first century work and life.This second edition handbook has been revamped to cover the newest standards, services, and products. You'll find the latest on SIP usage beyond VoIP, including Presence, instant messaging (IM), mobility, and e...

Internet Addiction

A Handbook and Guide to Evaluation and Treatment
Internet Addiction Image
Internet Addiction: A Handbook and Guide to Evaluation and Treatment"This book provides cutting-edge coverage by expanding the field to include specific problems such as online gaming, cybersex addiction, and gambling addiction. Its extensive attention to dealing with adolescents is essential, given the rapid rise in media and technology use by both Net Generation young adults and iGeneration teenagers. I am thrilled to have this invaluable, comprehensive, well-written resource for my own work and recommend it to people who need to understand this unique form of addiction."Dr. Larry Rosen, Past Chair and Professor of Psychology at California State University, Dominguez Hills, author of Rewired: Understanding the iGeneration and the Way They...

Inside Symbian SQL

A Mobile Developer's Guide to SQLite
Inside Symbian SQL Image
This is the definitive guide for Symbian C++ developers looking to use Symbian SQL in applications or system software.Since Symbian SQL and SQLite are relatively new additions to the Symbian platform, Inside Symbian SQL begins with an introduction to database theory and concepts, including a Structured Query Language (SQL) tutorial.Inside Symbian SQL also provides a detailed overview of the Symbian SQL APIs. From the outset, you will get your hands dirty writing Symbian SQL code. The book includes snippets and examples that application developers can immediately put to use to get started quickly.For device creators and system software developers, Inside Symbian SQL offers a unique view into the internals of the implementation and a wealth of practica...

Information Systems

The State of the Field
Information Systems Image
Discussion of the precise nature of the Information System discipline has raged for more than twenty years and continues fiercely today. The most interesting aspect of recent debate is not only the sharpness and depth of the arguments, but the diverse conclusions arrived at by participants. Whilst very different, these have all been reached with the genuine aim of strengthening IS scholarship, and they all add to our specific understanding of the discipline in the last two decades. Edited by two of the most prominent academics in the field, this book brings together such perspectives along with wider contextual discussion to provide a fertile ground for reflection, learning and further debate....

Information Security

Principles and Practice
Information Security Image
Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:* Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis* Access control: authentication an...



2007 - 2017 © eBooks-IT.org