A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds of resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and securi..
Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. This book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, e..
This book provides extensive coverage of broadband radio frequency (RF) and microwave power amplifier design, including well-known historical and recent novel schematic configurations, theoretical approaches, circuit simulation results, and practical implementation strategies. The text describes the..
Providing a comprehensive introduction to next-generation networks, this book strikes a balance between how and why things work and making them work. It examines Internet architectures and protocols, network management and traffic engineering, embedded systems and sensor networks, web services, clou..
This book presents a comprehensive approach to networking, cable and wireless communications, and networking security. It describes the most important state-of-the-art fundamentals and system details in the field, as well as many key aspects concerning the development and understanding of current an..
This book covers the current communication architectures that are implemented in manufactured systems-on-chip, as well as those that are being proposed to overcome the existing limitations. The text addresses well-established communication buses and less-common networks on chip, along with modern te..
This book provides a solid understanding of the foundations of cognitive radio technology, from spectrum sensing, access, and handoff to routing, trading, and security. Offering a unifying view of the various approaches and methodologies, this comprehensive text addresses all aspects of the spectrum..
This book provides a systematic framework for designing distributed controllers for multi-agent systems with general linear agent dynamics, linear agent dynamics with uncertainties, and Lipschitz nonlinear agent dynamics. The proposed consensus region decouples the design of the feedback gain matric..
This book provides a systematic framework for designing distributed controllers for multi-agent systems with general linear agent dynamics, linear agent dynamics with uncertainties, and Lipschitz nonlinear agent dynamics. The proposed consensus region decouples the design of the feedback gain matric..
Global virtual teams (GVTs) have evolved as a common work structure in multinational corporations due to their efficiency and cost-effectiveness. The cultural differences can produce great benefits in terms of perspective, creativity, and innovation, but can also exacerbate interpersonal tensions, m..
Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detectio..
D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industria..