Voice Over WLANS: The Complete Guide

22 01 2008

The Complete Guide

Voice Over WLANS: The Complete Guide
Michael F. Finneran “Voice Over WLANS: The Complete Guide”

Newnes (November 29, 2007) | ISBN: 075068299X | 400 pages | PDF | 3,2 Mb

Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN dont require changes to installed wiring) and greater capacity than wired networks. This book provides a solid overview of voice over WLANs/VoIP (voice over internet protocol) technology, including voice coding, packet loss, delay and jitter, and echo control. It shows how to combine both WLAN and VoIP technology to create effective voice over WLAN systems.

* Gives complete details on integrating voice and data services on WLANs, including wide area networks
* Explores quality of service (QoS) and security issues
* Step-by-step descriptions of how to plan and implement voice over WLAN networks





Mobility, Data Mining and Privacy: Geographic Knowledge Discovery

22 01 2008

Mobility, Data Mining and Privacy: Geographic Knowledge Discovery

Mobility, Data Mining and Privacy: Geographic Knowledge Discovery

Fosca Giannotti , Dino Pedreschi, “Mobility, Data Mining and Privacy: Geographic Knowledge Discovery”
Springer; 1 edition (January 1, 2008) | ISBN: 3540751769 | 410 pages | PDF | 3,4 Mb

The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and intelligent transportation systems; on the other side, individual privacy is at risk, as the mobility data contain sensitive personal information. A new multidisciplinary research area is emerging at this crossroads of mobility, data mining, and privacy.

This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological issues, open problems, and roadmap. The editors manage a research project called GeoPKDD, Geographic Privacy-Aware Knowledge Discovery and Delivery, funded by the EU Commission and involving 40 researchers from 7 countries, and this book tightly integrates and relates their findings in 13 chapters covering all related subjects, including the concepts of movement data and knowledge discovery from movement data; privacy-aware geographic knowledge discovery; wireless network and next-generation mobile technologies; trajectory data models, systems and warehouses; privacy and security aspects of technologies and related regulations; querying, mining and reasoning on spatiotemporal data; and visual analytics methods for movement data.

This book will benefit researchers and practitioners in the related areas of computer science, geography, social science, statistics, law, telecommunications and transportation engineering.




Hacking: The Art of Exploitation

27 12 2007

The Fundamental Techniques Of Serious Hacking:
This book does an excellent job of explain various techniques that hackers employ. The explainations include examples, source code, breakouts, and descriptions. The book progresses from basic examples to more complex by building upon a project a little at a time.

The book bascially covers 3 broad areas: programming, networking, and cryptogrophy.
Programming covers buffer overflows, stack exploits, heap overflows, polymorphic code, inline loaders and other information. Examples are presented in C and assembly. Networking covers many different exploits generally centered around the modification of packets and/or spoofing. Cryptography generally covers password based attacks.

The author has a careful approach that makes the book enjoyable to read and easy to follow. He does not jump from one step to the next without covering each step in detail. This makes the text both readable and enjoyable.

Most examples are realted to Windows or Linux but the exploits are universal. Several different tools are described and all were open source.

In Hacking: The Art Of Exploitation you will learn how to:
Exploit programs using buffer overflows and format strings
Write your own printable ASCII polymorphic shellcode
Defeat non-executable stacks by returning into libc
Redirect network traffic, conceal open ports, and hijack TCP connections
Crack encrypted 802.11b wireless trafffic using the FMS attack
If you’re serious about hacking, this book is for you, no matter what side of the fence you’re on.

Highly recommended.