WCDMARequirements and Practical Design Review

WCDMARequirements and Practical Design
Average Reviews:

(More customer reviews)
Hi,
This is an Excellent book for DSP Engineers and Protocol Stack Developers for WCDMA. It gives very good understanding on WCDMA.I would also recommend another book " WCDMA Design Handbook " by Richardson. Use both of them.

Click Here to see more reviews about: WCDMARequirements and Practical Design

WCDMA (Wideband Code Division Multiple Access), an ITU standard derived from code division multiple access (CDMA) is officially known as IMT-2000 direct spread. WCDMA is a third generation mobile wireless technology offering much higher data speeds to mobile and portable wireless devices than commonly offered in today's market. WCDMA is a relatively new technology and there is little information in the public domain about specific design issues. The proposed book will discuss UMTS/WCDMA from the perspective of a potential development engineer, who may have experience of GSM but none of WCDMA technology. The book will outline the design specifications and potential problems and solutions faced by by an engineer designing a mobile device such as a handset.
WCDMA: Requirements and Practical Design:
Offers in-depth coverage of the critical issues in designing a UMTS handset modem.
Discusses the practical design elements of a UMTS modem.
Authored by leaders in their field, working at Ubinetics.

Highly relevant to professional software engineers, Design engineers, Electrical engineers (RF base-band, DSP software, protocol software), technical managers, postgraduate students and academics.

Buy Now

Click here for more information about WCDMARequirements and Practical Design

Read More...

RTLS For Dummies Review

RTLS For Dummies
Average Reviews:

(More customer reviews)
As an Electronic Engineer moving into the RTLS market, RTLS for Dummies gave me an excellent overview and multiple case studies for RTLS deployments that I will be working on. Now I know the important pros and cons in each RTLS technology in choosing and deploying future RTLS system. Now I am comfortable moving forward with deploying such systems.

Click Here to see more reviews about: RTLS For Dummies


Select, invest in, and deploy a Real Time Location System

Is your business ready for an RTLS? This friendly, hands-on guide shows you how to understand and implement this cutting-edge technology, explaining RTLS methodologies in plain English. From the initial deployment to monitoring to determining Return on Investment, you'll see how to successfully meet your needs, ensure data accuracy, and sustain your system.

Get your bearings - understand what RTLS does and its various methodologies, determine your needs, and select the right system

Prepare for installation - outline your goals, plan your applications, assess your site, select the right tag technology, and conduct a pilot test

Implement RTLS in your world - know how to train your staff, set expectations, set up monitoring, and assess whether the RTLS is working as desired

Deal with design issues - learn the most common pitfalls of RTLS implementation and how to handle them

Take the technology tour - use RTLS to locate at choke points, room level, presence, by association, and precisely

Monitor and secure your RTLS - verify and fine-tune your system, establish performance metrics, and manage security issues and vulnerabilities such as network attacks

Open the book and find:

An overview of RTLS and its uses

Explanations of underlying technologies

How to integrate RTLS into your other business applications

Comparative detail on technologies that enable different types of locating

Tips for evaluating RTLS vendors

Essential RTLS resources and references

Tips for getting the most out of the batteries used in tags

Privacy issues related to RTLS


Buy NowGet 27% OFF

Click here for more information about RTLS For Dummies

Read More...

EDGE for Mobile Internet Review

EDGE for Mobile Internet
Average Reviews:

(More customer reviews)
The reference book for EDGE (see my comments on "GPRS for mobile internet")
Great interest.
S. Larsen

Click Here to see more reviews about: EDGE for Mobile Internet



Buy Now

Click here for more information about EDGE for Mobile Internet

Read More...

J2ME Enterprise Development Review

J2ME Enterprise Development
Average Reviews:

(More customer reviews)
Reading this book helped me understand do's and dont's of J2ME based applications. Very clear explanation of how to develop J2ME based enterprise applications. MSales sample application was the first end-to-end working program I have seen in Mobile Java related books, as a matter of fact anywhere. I would recommend this book to all the Java developers as a must read.
J2ME is such a volatile technology [still in its infancy]. Hopefully there will be a next edition of this book.
-Persh

Click Here to see more reviews about: J2ME Enterprise Development



Buy Now

Click here for more information about J2ME Enterprise Development

Read More...

Voice Over Packet Networks Review

Voice Over Packet Networks
Average Reviews:

(More customer reviews)
It covers how voice can be transported over different technologies - IP. ATM, Frame Relay and Cable. Technically, very well written. It compares these technology very well. It also covers QoS. If you are in Telecom, keep this book on your desk. To the point and accurate discussion.

Click Here to see more reviews about: Voice Over Packet Networks

One of the hottest topics in the telecommuncations industry today is the migration of voice traffic from the circuit switched Telco networks to packet switched networks such as IP, ATM, Frame Relay and access technologies such as DSL (Digital Subscriber Line) and Packet Cable. The sheer volume of voice traffic, together with the efficiencies of packet transport and the opportunity to offer new features on voice calls, has made internetworking, between circuit and packet transport, vital while this migration is in progress.Presents a concise treatment of a complex subject providing up-to-date coverage of all relevant packet voice technologies and an evaluation of how they compareExplains how and why to transport voice over packet networksIncludes MEGACO: Media Gateway ControlProtocol, Voice over Packet Cable and Voice over DSLEnables the reader to obtain information rapidly by featuring numerous bulleted lists and extensive diagramsVoice over Packet Networks is comprehensive and compact and will be welcomed by both engineers and planners in the telecommunications industry, as well as graduate and senior undergraduate students on telecommunication courses.

Buy Now

Click here for more information about Voice Over Packet Networks

Read More...

Mobile Intelligence (Wiley Series on Parallel and Distributed Computing) Review

Mobile Intelligence (Wiley Series on Parallel and Distributed Computing)
Average Reviews:

(More customer reviews)
The Mobile in the book's title refers to 2 large scale cases. Unsurprisingly, one case is the many millions of people who have mobile phones and who use these for wireless communication while moving around some region. The other case is a Wireless Sensor Network [WSN], where nodes (aka. sensors) are deployed in the field. Perhaps a little ironically, the nodes need not be mobile. Imagine for example where we have nodes scattered around a wilderness area, to detect animals and bushfires. While the chapters that consider WSNs also cite some instances of actual mobile nodes, most of the examples are static. This discrepancy with the title does not seem to be explicitly addressed anywhere in the text, but you might want to keep it in mind while reading.
Chapter 4 talks about reducing channel underutilisation in a Mobile Ad Hoc Network [MANET]. While interesting, on page 48, when it describes the exposed terminal problem, the text and the associated figure 3.3 are inconsistent and confusing.
Chapter 5 discusses a cross layer design for improving the performance of a MANET. A suggestion is made that if the alternative network uses TCP/IP, which has 5 layers, then by modifying some of these layers, efficiencies could be achieved. The discussion does include a frank assessment of possible drawbacks, especially increased complexity of code. If you find the chapter intriguing, there is an entire book that argues for the use of the Internet Protocol, and not for its modification,Interconnecting Smart Objects with IP: The Next Internet by Vassuer and Dunkels. Cross layering can be made to work, but you should first contemplate carefully the chapter's arguments and those of the latter book.
Chapter 12 on mobile data mining on small devices uses Web Services. If you already are familiar with using the Sun Java Wireless Toolkit to program a wireless client (like a mobile phone), then this chapter maybe be very germane, and an easy read.
The problem of malicious nodes in a MANET is very difficult to handle. Chapter 16 uses digital signing of messages between the nodes. So that messages can be authenticated. This has a greater computational load, and hence energy drain, than a shared symmetric key between adjacent nodes. But the latter can be subverted by rogue nodes. Hence the tradeoff, which is not cost free.
If you want an instance of a Finite State Machine, see Chapter 20. It has a nice explanation of VoiceXML, which is an XML vocabulary dedicated to using voice recognition in a mobile phone system. Many commercial applications along these lines now exist, because of significant cost savings from being able to automate user queries.
Chapter 21 tackles the semantic gap between easily computable features of a video stream and what humans might perceive as interesting in that stream. Progress is made on reducing this gap, but an active research effort is still needed.
Chapter 22 might be the portion of the book that comes closest to describing a [possible] mass consumer item. In South Korea, the authors built and tested wearable and [hopefully] fashionable computers. This is the only chapter where aesthetics arise. The test examples hint at future products openly worn by people, yet quite different from today's cellphones. But a key commonality is that wireless connectivity is essential, using popular protocols like WiFi, Bluetooth or Zigbee. If you combine this chapter's findings with a few more years of continued miniaturisation and lowered hardware costs, there is potential for a breakout consumer product. As to what that product might be, perhaps that is your job?


Click Here to see more reviews about: Mobile Intelligence (Wiley Series on Parallel and Distributed Computing)



Buy NowGet 17% OFF

Click here for more information about Mobile Intelligence (Wiley Series on Parallel and Distributed Computing)

Read More...

Ultra Wideband Systems: Technologies and Applications (Communications Engineering) Review

Ultra Wideband Systems: Technologies and Applications (Communications Engineering)
Average Reviews:

(More customer reviews)
This book provides a good overall introduction to Ultra Wideband Systems, from signal, modulation and multiple-access to antenna design and standards. Certainly suitable for someone who wants a book on the subject that is not too overwhelming with details and equations but yet is detailed enough to gain some insights into how UWB systems work.

Click Here to see more reviews about: Ultra Wideband Systems: Technologies and Applications (Communications Engineering)



Buy Now

Click here for more information about Ultra Wideband Systems: Technologies and Applications (Communications Engineering)

Read More...

Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology Review

Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology
Average Reviews:

(More customer reviews)
This is a textbook and it seems to me that it's meant to be used in a classroom environment. That being said, it's not as dry as many that I had when I was in school.
After the preface and introduction the book launches into sixteen and a third pages of abbreviations and you need to spend some time with these pages as the abbreviations are used throughout the book.
There are twelve chapters here: Chapter 1: Introduction to Mobile Broadband Wireless Access. Chapter 2: WiMax Network Architecture. Chapter 3: IEEE 802.16m Reference Model and Protocol Structure. Chapter 4: IEEE 802.16m System Operation and State Diagrams. Chapter 5: The IEEE 802.16m Convergence Sub-Layer. Chapter 6: The IEEE 802.16m Medium Access Control Common Part Sub-layer Part 1 and Chapter 7 is Part 2. Chapter 8: The IEEE 802.16m Security Sub-Layer. Chapter 9: The IEEE 802.16m Physical Layer Part 1 and Chapter 10 is Part 2. Chapter 11: Multi-Carrier Operation. And lastly Chapter 12: Performance of IEEE 802.16m and 3GPP LTE-Advanced.
There you have it, a list of the chapters in this book. I'm no expert, not even a novice. I got this book for my nerdy brother who eats this stuff up. But I agreed to review the book and I sincerely hope that if you're interested in it, that the information I gave you above will help you.

Click Here to see more reviews about: Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology


Presenting the new IEEE 802.16m standard, this is the first book to take a systematic, top-down approach to describing Mobile WiMAX and its next generation, giving detailed algorithmic descriptions together with explanations of the principles behind the operation of individual air-interface protocols and network components.

Features:

A systematic and detailed, top-down approach to the design of 4G cellular systems based on IEEE 802.16m and 3GPP LTE/LTE-Advanced technologies
A systematic approach to understanding IEEE 802.16m radio access network and mobile WiMAX network architecture and protocols
The first comprehensive technical reference on the design, development and performance evaluation of IMT-Advanced systems, including the theoretical background and design principles as well as implementation considerations

About the author:

The author, chief architect and technical lead of the IEEE 802.16m project at Intel Corporation, initiated and masterminded the development of the IEEE 802.16m standard and has been one of the leading technical drivers in its standardization process in IEEE. The author was also a leading technical contributor to the definition and development of requirements and evaluation methodology for the IMT-Advanced systems in ITU-R. Reflecting the author's 20+ years expertise and experience, the book provides an in-depth, systematic and structured technical reference for professional engineers, researchers, and graduate students working in cellular communication systems, radio air-interface technologies, cellular communications protocols, advanced radio access technologies for 4G systems, and broadband cellular standards.

A systematic and detailed, top-down approach to the design of 4G cellular systems based on IEEE 802.16m and 3GPP LTE/LTE-Advanced technologies
A systematic approach to understanding IEEE 802.16m radio access network and mobile WiMAX network architecture and protocols
The first comprehensive technical reference on the design, development and performance evaluation of IMT-Advanced systems, including the theoretical background and design principles as well as implementation considerations


Buy NowGet 23% OFF

Click here for more information about Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology

Read More...

Programming Mobile Devices: An Introduction for Practitioners Review

Programming Mobile Devices: An Introduction for Practitioners
Average Reviews:

(More customer reviews)
The biggest feature of this book is how you need to get accustomed to the limited resources on a cellphone, compared to a laptop or personal computer. Many programmers will come to mobile devices from developing on the latter 2 platforms. Still, if you have been programming long enough, the cellphone environments described in the text can be akin to working on the PCs of the 1980s.
It is a pity that there are two programming languages needed for cellphones. The book has examples drawn from Java and Symbian. The Java code is simpler than Java programs written for larger environments. The widget set is very limited. The Symbian examples are likewise easy to follow. What it does mean is that any commercial examples you develop have to be manually coded into both languages, if you are after the largest possible market.

Click Here to see more reviews about: Programming Mobile Devices: An Introduction for Practitioners

With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.
Learn how to programme the mobile devices of the future!
The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of software that runs in a mobile device requires that developers combine the rules applicable in embedded environment; memory-awareness, limited performance, security, and limited resources with features that are needed in workstation environment; modifiability, run-time extensions, and rapid application development.
Programming Mobile Devices is a comprehensive, practical introduction to programming mobile systems. The book is a platform independent approach to programming mobile devices: it does not focus on specific technologies, and devices, instead it evaluates the component areas and issues that are common to all mobile software platforms. This text will enable the designer to programme mobile devices by mastering both hardware-aware and application-level software, as well as the main principles that guide their design.
Programming Mobile Devices:
Provides a complete and authoritative overview of programming mobile systems.
Discusses the major issues surrounding mobile systems programming; such as understanding of embedded systems and workstation programming.
Covers memory management, the concepts of applications, dynamically linked libraries, concurrency, handling local resources, networking and mobile devices as well as security features.
Uses generic examples from JavaTM and Symbian OS to illustrate the principles of mobile device programming.

Programming Mobile Devices is essential reading for graduate and advanced undergraduate students, academic and industrial researchers in the field as well as software developers, and programmers.

Buy NowGet 32% OFF

Click here for more information about Programming Mobile Devices: An Introduction for Practitioners

Read More...

Android Programming Tutorials, 3rd Edition Review

Android Programming Tutorials, 3rd Edition
Average Reviews:

(More customer reviews)
Excellent book. Several chapters will build upon the same sample application and will explain each new piece of code. When later chapters don't fit the current sample application, it will start with a new sample application. One doesn't need to "follow along from chapter to chapter" as each chapter introduces new ideas and also has ability to download the code. I for one didn't code up any of the samples but simply followed along the explanations and applied the concepts and methods to my own application. It would have been nice if it went into depth on database handling and patterns as that seems to be troublesome for me if you don't follow the exact pattern as described. Other than that, great book to get you up and running quickly.

Click Here to see more reviews about: Android Programming Tutorials, 3rd Edition



Buy Now

Click here for more information about Android Programming Tutorials, 3rd Edition

Read More...

Flash Design for Mobile Devices Review

Flash Design for Mobile Devices
Average Reviews:

(More customer reviews)
This really seems like a recycled and rehashed book quickly put together in order to rush a "new topic" to print. I'm pretty sure I recognize this content from other books I've seen on the shelf. Even the paper quality seems recycled! I got this one in the mail, and it already was yellowed - the pages seem like newsprint. I found very little value in this book, content wise. There are definitely better ones out on the market by the gurus on the subject!

Click Here to see more reviews about: Flash Design for Mobile Devices



Buy Now

Click here for more information about Flash Design for Mobile Devices

Read More...

Enterprise Guide to Gaining Business Value from Mobile Technologies Review

Enterprise Guide to Gaining Business Value from Mobile Technologies
Average Reviews:

(More customer reviews)
Superb read, I especially like the 2 chapter Wireless Network overview and the Wirelesee Value for explaining complex issues in a straightforward manner. This book brings you up to speed on the industry, business value and corporate interest in the mobility space. A must buy!!

Click Here to see more reviews about: Enterprise Guide to Gaining Business Value from Mobile Technologies



Buy NowGet 28% OFF

Click here for more information about Enterprise Guide to Gaining Business Value from Mobile Technologies

Read More...

MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition Review

MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition
Average Reviews:

(More customer reviews)
First, a very important note: *this is not a technical book*. If you are already familiar with older versions of MIDP, this book is an overkill and might be a bit boring from time to time. Having said that, the book really does a good job introducing the MIDP GUI concepts and much more. It's a very readable book and contains plenty of clear examples.
In the first four introductory chapters (Introduction, MIDP Characteristics, Designing Applications for MIDP and Screen Layout) the authors briefly go over the most important features of MIDP. A special emphasis is given to the new fearures introduced by the latest MIDP 2.0.
Then they move to the most important MIDP GUI elements. Each element is introduced and its usage is suggested and the next six chapters explain design patterns and rules to be used with the most common GUI elements (Lists, Text, Forms & Form Items, Alerts and Canvas Screens).
The 11th chapter was the most interesting chapter for me - it explains the recommended usage of GUI elements related to game programming. The game package is brand new and introduced in MIDP 2.0. Here the elements such as offscreen buffer, layers and sprites are described. There is even a small subchapter about game performance and resource usage and, at the very end of the chapter, the authors give some general advices related to game creation and programming concluding with a crucial remark: "Always test your games on actual devices".
Chapter 12 explains Abstract Commands and the next three chapters introduce the features that really distinguish MIDP development from other Java applications. These features are, of course, strongly related to mobile devices properties and include Application Discovery, Installation and Mangement, Push Functionality and (many times neglected) Security.
The last chapter (16) goes briefly into some of more advanced topics of MIDP 2.0 (touch input, overall application preformance and multithreading). This chapter is very basic and contains some obvious hints, but, as I said, this is not a technical book and the chapter does a good job presenting the features that might help GUI designers.
The book is intended for beginners in the MIDP application development and, as the name of the book says, is mostly *a style guide* providing plenty of hints and advices. These advices are nicely separated in two classes: "For Developers" and "For MIDP Implementators". Authors use "Recommend", "Strongly Recommend" and "Consider" to mark the importance of these hints.
The book is coming from Sun and takes its place in the fameous "from the source" series which implies a certain level of quality. I can recommend this book for all beginners in MIDP area and, especially, to GUI designers and product managers wanting to became more familiar with the MIDP application look & feel.

Click Here to see more reviews about: MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition

MIDP 2.0 Style Guide for the JavaaA A2 Platform, Micro Edition, is the comprehensive reference for designing and creating interactive JavaaA Aapplications for consumer-oriented mobile devices. Readers learn how to best exploit MIDP 2.0 features, such as the gaming API, multimedia, and security for user-friendly MIDlets. Readers who create MIDP environments (MIDP implementors) also learn how to best support developers and users.This book begins by introducing readers to the unique requirements of the consumer market and to the characteristics of MIDs and the MIDP 2.0 environment. Readers have a first look at the process of designing applications for MIDP in general terms before examining the nuts and bolts of creating usable, predictable applications. The authors provide user interface designers, application developers, and MIDP implementers with clearly illustrated standards for working with screen layouts, lists, text boxes, forms, alerts, canvas screens, and game screens. Visual examples demonstrate both what does and what does not work. The book ends with the authors' strategies for improving usability, security, and performance.Key topic coverage includes: *designing applications for MIDP *working with and displaying lists, text boxes, and alerts *working with and laying out forms and form items *creating and implementing canvases *using the new game package *using and implementing abstract commands *integrating MIDP and MIDlet suites into a device *using push functionality *understanding the MIDP 2.0 security model *using touch input *enhancing performance and using multiple threadsMIDP 2.0 Style Guide for the JavaaA A2 Platform, Micro Edition, is the insider's guide to creating applications and devices that create consumer demand. 0321198018B05302003

Buy Now

Click here for more information about MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition

Read More...

Fundamentals of Mobile and Pervasive Computing Review

Fundamentals of Mobile and Pervasive Computing
Average Reviews:

(More customer reviews)
This book is a good entry point for someone wishing to learn about wireless computing and communication. It provides a broad survey of the various kinds of wireless applications and implementation design patterns, discussing the technology performance limitations and trade-offs that motivate each design decision. The viability and effectiveness of every design choice depends upon the other choices taken, motivating many complex mathematical optimization problems.

I began reading this book with the assumption that wireless application design rested on the same principles as the design of ordinary distributed computer systems, save for a narrower communication bandwidth, and occasional planned disconnections. This book made me realize that things are much more complicated in the wireless world. In ordinary distributed systems, the main challenge is the design of a static scheme for distributing work among communicating components. Once that is done, one can pretty much separate the infrastructure oriented code from the business logic. In the wireless world, the communication bandwidth's variability and lack of reliability requires the distribution of tasks to react to changing network conditions; this radically increases the difficulty of separating infrastructure concerns from business logic. The limitations of typical mobile devices (small memory, limited power, and slow processor speed) only add to the developer's burden. In designing an application for a pre-existing wireless system, traditional methods of program organization may not be appropriate. The need to discover or invent algorithms that take into account a mobile network's unique characteristics creates a challenge somewhat akin to that faced by the early users of novel massively-parallel computer architectures.
One learns that there are no general purpose easy answers to these problems, but the book does an excellent job in laying out the issues, concerns and approaches, while providing ample bibliographies of published research that readers can delve into for their specific problem. The reader comes away with a familiarity in the terms, concepts and acronyms used in the wireless community, providing an excellent foundation for further reading in the literature (which, unfortunately, is not always as well-written or accessible to the newcomer as is this text).


Click Here to see more reviews about: Fundamentals of Mobile and Pervasive Computing

This book details the engineering principles underlying mobile computing, serving as a basic reference as text for graduate and advanced undergraduates. It is the first systematic explanation of mobile communications as a discipline in itself, containing Exercises, projects, and solutions.

Buy Now

Click here for more information about Fundamentals of Mobile and Pervasive Computing

Read More...

Scalable VoIP Mobility: Integration and Deployment Review

Scalable VoIP Mobility: Integration and Deployment
Average Reviews:

(More customer reviews)
This book is a must for anyone involved with implementing voice mobility solutions - system administrations, network architects and even business managers. A great resource that identifies problems of high-scale mobility. Offers a concise introduction to voice mobility and applications.
Good overview and advice on voice mobility networks, from deployment and integration with current standards (3G+, CDMA 2000, HSPA, WCDMA, WiMAX cellular networks using FMC), to end devices.
Solid work covering enterprise-grade Wi-Fi networking, with single- and dual-mode networks, and their impact on voice mobility.
The author delves into various transport networks, including voice quality metrics and testing, high-density enterprise Wi-Fi voice networks, cellular networks, and high-level networking technologies.
I and several colleagues consider this a must-have book - at a minimum for the essential chapters on voice quality, Wi-Fi, and security.


Click Here to see more reviews about: Scalable VoIP Mobility: Integration and Deployment


Provides practical advice on breaking down the implementation and deployment of voice mobility networks within the office, across the campus, and on the road.
Offers a complete primer on enterprise-grade Wi-Fi networking for voice mobility at scale, whether as a single-mode or dual-mode network, including information on the newest 802.11n standard and how these standards directly impact voice mobility.
Includes methods of integrating existing or new VoIP networks with 3G+, CDMA 2000, WCDMA, HSPA, and WiMAX cellular networks using fixed/mobile convergence (FMC).

This book provides a comprehensive examination of IP-based voice mobility, covering every step in deploying multimodal voice mobility networks. Each segment of the entire voice mobility solution is described with an eye towards the inherent problems of high-scale mobility, from wired infrastructure to end device, across multiple networks and technologies.

Voice mobility is introduced and defined at a basic level before the book examines the high-level components of a scalable voice mobility solution. Chapters focus on several types of transport networks in greater depth, including voice quality metrics and testing, high-density enterprise Wi-Fi voice networks, cellular networks, and high-level networking technologies. The security of VoIP networks is also considered.The book explores standalone VoIP networks and finally provides an investigation of the current and upcoming set of fixed/mobile convergence approaches.

This book is an invaluable guide for anyone looking towards voice mobility as a solution to real-world business problems: IT managers and executives looking to understand the potential for converting offices to all-wireless; network designers and architects planning on rolling out a fully-mobile voice network; and administrators operating or troubleshooting voice mobility networks.

Provides practical advice on breaking down the implementation and deployment of voice mobility networks within the office, across the campus, and on the road.
Offers a complete primer on enterprise-grade Wi-Fi networking for voice mobility at scale, whether as a single-mode or dual-mode network, including information on the newest 802.11n standard and how these standards directly impact voice mobility.
Includes methods of integrating existing or new VoIP networks with 3G+, CDMA 2000, WCDMA, HSPA, and WiMAX cellular networks using fixed/mobile convergence (FMC).


Buy Now

Click here for more information about Scalable VoIP Mobility: Integration and Deployment

Read More...

Services for UMTS: Creating Killer Applications in 3G Review

Services for UMTS: Creating Killer Applications in 3G
Average Reviews:

(More customer reviews)
If I had written this book, and were holding myself out as a consultant to the mobile operator industry, I would not list it on my resume.
The content is unremarkable and rehashed; nothing is here that could not be learned in a few hours of online research. There are no unique insights here. Some suggested sites include: Wireless Week; Mobile Commerce World; RCR Wireless; Mobile Burn; the 3G Portal; the 3rd Generation Partnership Project; the UMTS Forum; and Unstrung.
Beyond the content, the presentation is terrible and the editing atrocious. Barely a page goes by without typographical or grammatical errors. It appears to have been rushed out to capture the "3G" hype.

Click Here to see more reviews about: Services for UMTS: Creating Killer Applications in 3G

UMTS is not about Technology, it is about Services...The UMTS or 3G environment is the ultimate convergence of fixed and mobile, voice and data, content and delivery. The result will be the largest and most complex communications system that man has designed. If you want a challenge then this is the industry to be in.Services for UMTS (Universal Mobile Telecommunication System) or 3G (3rd Generation mobile networks) is a book about the near future, where UMTS allows mobile phones and other devices for communication, entertainment, personalised services, utility and fun to be used in new ways. While it is difficult to predict the potential of UMTS in the future in a precise way, broad categories and general service ideas are emerging. This book looks at over 200 of these possible applications and provides more detailed scenarios for over 100 of them. It explores these ideas in depth, with suggestions on how to create exciting and viable services for a new world.This book intends to answer many of the current UMTS service questions as well as introduce new ideas and concepts to enable operators to create a winning UMTS services strategy.* What should the focus of service creation be to ensure early time to profit in UMTS?* What are the key market segments that should be addressed with UMTS services?* Is there a killer application or applications that will revolutionise the industry?* What are the differentiating factors that will separate the leaders from the UMTS pack?* 15 aspects of the business analyzed by value chains and business models* The 5 M's of successful UMTS Service DefinitionWritten for the non-technical reader and with a strong business focus, Services for UMTS is a "must-read" for anybody wanting to enter the UMTS environment, make money in it, or to understand it.

Buy Now

Click here for more information about Services for UMTS: Creating Killer Applications in 3G

Read More...

Mobile Malware Attacks and Defense Review

Mobile Malware Attacks and Defense
Average Reviews:

(More customer reviews)
Security threats on mobile platforms are one of the key topics and main targets for the next couple of years, given the ubiquity and popularity of these devices, plus their advanced capabilities and use of sensitive application: micro payments, online banking and e-commerce, access to "the cloud", etc.
This book is one of the few references, if not the only one (till very recently), focused on the multiple security aspects of the mobile ecosystem. As such, it constitutes a great historical reference about what mobile malware (referred as MM) and threats were until its publication, in late 2008.
The book starts by introducing mobile malware, although it can be a bit confusing for the novice reader, as it mixes up attacks, tools and threats (most them Bluetooth based), and for example, WiFi is not even mentioned (yet). The next chapter (ch 2) provides an interesting overview on how mobile malware shows up in a terminal from a user perspective, including the most common behaviors and the kind of interaction expected from the user. It would be great to have a detailed explanation of the propagation method, as with CommWarrior, for all the samples analyzed in this chapter.
The next three chapters (ch 3-5) are a really valuable historical reference about mobile malware, including its timeline, how it has evolved since 2000 till 2008, the types of threats, categorized by malware families, the most significant or famous specimens, such as Cabir in the Bluetooth side, plus an extensive taxonomy of mobile malware and threats based on the infection strategy, distribution and payload. Although some tables, with more than 400 references, could have been moved to an appendix to facilitate the reading, this set of chapters summarizes how mobile malware seriously started, back in 2004, and evolved over time. The comparison of different pieces of malware, and the extra analysis of the most relevant specimens, together with the technical details they used to survive, makes this section of the book a very good "encyclopedia".
Then, the book reflects the influence of multiple authors, presenting different unconnected and independent chapters. The phishing, SMSishing and Vishing chapter moves out of the mobile space, covering lots of details about these threats on traditional environments, such as common web browser based solutions, and the usage and purpose of the network captures attached is still not clear to me. I still remember my surprise from a technical perspective when I read that the transmitted data between the client and the verification server could not be identified, as they were using an SSL connection: "What about using a HTTP(S) interception proxy?" Finally, it includes an extensive phishing academic research mainly based on Bayesian networks and a distributed framework, which on my opinion, is clearly out of the scope of the book.
The more technical chapters come next; chapter 7 focuses on the core elements for the most widely used mobile platforms, their protection mechanisms and how they have been bypassed in the past, covering mainly Windows Mobile (WM), iPhone, Symbian, BlackBerry and J2ME (Java). It includes a extremely short summary on prevention and exploitation. This is complemented by the techniques, methods and tools available for the analysis of mobile malware (ch 8), the in-depth details for the disassembly and debugging of associated binaries (ch 10), plus the strategy and main constraints to perform a forensic analysis on this type of devices (chapters 8 and 9). This is by far the most relevant technical portion of the book.
The book follows the old and useful Syngress layout tradition of adding a few common sections at the end of each chapter to reinforce the material covered: Summary, Solutions Fast Track, and FAQ.
The first portion of the book (ch 1-5) will be an eye opener for a non-technical audience; highly recommended, together with the last chapter (ch 11) focused on the defensive side and how to mitigate all the threats covered along the book. The second portion for the book (ch 7-10) is focused on security professionals, mainly incident handlers and forensic analyst that need to deal with the technical aspects of mobile attacks and infections.
Due to the new mobile threats and issues that turned up in 2009 for the advanced smartphone platforms (like iPhone or Android), and the trend for new and more dangerous specimens expected in 2010, a second volume or edition would be a must.


Click Here to see more reviews about: Mobile Malware Attacks and Defense



Buy NowGet 19% OFF

Click here for more information about Mobile Malware Attacks and Defense

Read More...