Logo

Wireless Networking in the Developing World

Large book cover: Wireless Networking in the Developing World

Wireless Networking in the Developing World
by

Publisher: Lulu.com
ISBN/ASIN: 1411678370
ISBN-13: 9781411678378
Number of pages: 425

Description:
This book was created by a team of individuals who each, in their own field, are actively participating in the ever-expanding Internet by pushing its reach farther than ever before. The massive popularity of wireless networking has caused equipment costs to continually plummet, while equipment capabilities continue to increase. By applying this technology in areas that are badly in need of critical communications infrastructure, more people can be brought online than ever before, in less time, for very little cost.

Home page url

Download or read it online for free here:
Download link
(5.1MB, PDF)

Similar books

Book cover: Communication Network AnalysisCommunication Network Analysis
by
This text describes the most popular analytical techniques for design and analysis of computer communication networks, with an emphasis on performance issues. Written for the graduate course Communication Network Analysis.
(18563 views)
Book cover: Linux Network Administrator's Guide, 2nd EditionLinux Network Administrator's Guide, 2nd Edition
by - O'Reilly
This is a comprehensive reference for Linux network administration for both beginners and experienced network administrators. The book provides enough information to help you get your Linux network up and running and get you ready to learn more.
(16881 views)
Book cover: Computers in CommunicationComputers in Communication
by - McGraw-Hill
The book is focused tightly on matters concerned with communication, it avoids excursions into other areas of computer science. The reader requires no background in computer communications, only a basic familiarity with computers in general.
(14956 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13291 views)