Geier, 2005 - Google Patents
Wireless Networks first-stepGeier, 2005
- Document ID
- 4525984967501473610
- Author
- Geier J
- Publication year
External Links
Snippet
Your First-Step into the World of Wireless Networks No experience required! Gain an understanding of wireless networking basics with this reader friendly guide The first book anyone should read about wireless networks with step-by-step instruction Learn from an …
- 239000010410 layer 0 description 68
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Geier | Wireless Networks first-step | |
| Coleman et al. | Cwna: certified wireless network administrator official study guide: exam Pw0-105 | |
| Schiller | Mobile communications | |
| Stallings | Wireless communications & networks | |
| US8191785B2 (en) | Encoded information reading terminal operating in infrastructure mode and ad-hoc mode | |
| Geier | Designing and deploying 802.11 wireless networks: a practical guide to implementing 802.11 n and 802.11 ac wireless networks for enterprise-based applications | |
| Wheat | Designing a wireless network | |
| Umar | IT infrastructure to enable next generation enterprises | |
| Khan et al. | Building secure wireless networks with 802.11 | |
| Umar | Mobile computing and wireless communications: applications, networks, platforms, architectures, and security | |
| Mínguez et al. | Development of a university networking project | |
| Kolluru et al. | Review on communication technologies in telecommunications from conventional telephones to smart phones | |
| Shinder | Computer networking essentials | |
| Cruz-Cunha et al. | Handbook of research on mobility and computing: evolving technologies and ubiquitous impacts: evolving technologies and ubiquitous impacts | |
| Kumar et al. | Connecting the Internet of Things | |
| Lewis et al. | Wireless Networks for Dummies | |
| Esin | System overview of cyber-technology in a digitally connected global society | |
| CN105306470A (en) | Method for classifying WIFI (Wireless Fidelity) visitors and anti-theft networks by utilizing two-dimension codes or positioning means | |
| Mandioma | Rural Internet Connectivity: A Deployment in Dwesa-Cwebe, Eastern Cape, South Africa | |
| Agrawal | Internet and World Wide Web (Part-I) | |
| Hurley et al. | How to cheat at securing a wireless network | |
| Singh | Mobile Computing | |
| Kytölä | Wireless Technologies in e-Business; Services, Security and Management | |
| Geier | Wireless system architecture: how wireless works | |
| Shaw | Wireless networking made easy: everything you need to know to build your own PANs, LANs, and WANs |