Cover image for The wireless internet explained
Title:
The wireless internet explained
Personal Author:
Publication Information:
Woburn, Mass. : Digital Press, 2002
ISBN:
9781555582579

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004996025 TK5103.485 R46 2002 Open Access Book Book
Searching...

On Order

Summary

Summary

The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.
Written by an expert on Internet messaging, the author of Digital Press's successful Programmer's Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial field of wireless communications.


Author Notes

John Rhoton is currently a Principal Member of Technical Staff in Hewlett Packard's Consulting and Integration practice. He also has many years of experience as a Technology Consultant and Solution Architect in Compaq's Emerging Technologies and Applied Microsoft Technologies Groups, with a special interest in messaging systems. His other Digital Press books include The Wireless Internet Explained (2002), X.400 and SMTP: Battle of the E-mail Protocols (1997) and Programmer's Guide to Internet Mail (2000).


Table of Contents

Wireless Technology
Air Interfaces
Mobile Devices
Infrastructure
Applications
Security
Implementation
Future Directions