No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
Between the Lines of Men is a work of fiction following Don Freemont, a young psychologist in the 1950s who is obsessed with leaving behind an academic legacy. Don is one of the heads of a project sanctioned by the US government in which chemicals such as LSD are tested as weapons of war. When one of Don's subjects commits suicide, Don begins to feel guilty. With his future and legacy in mind, Don ends up becoming his own guinea pig which results in a hellish vision. His ego still clinging to life, Don sets out with intentions of forging a new legacy.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Diameter Signaling Principles, Techniques, and Best Practices Effectively configure, deploy, and manage Diameter signaling using the practical information contained in this comprehensive guide. Written by an internationally recognized telecommunications expert, LTE Signaling with Diameter thoroughly explains the protocol, how it works, and how it is used in all networks. Find out about Diameter features and capabilities, IETF and 3GPP requirements, setup and migration techniques, and policy, IMS, and location-based services. Real-world examples and messaging samples are provided throughout. You will get an overview of the evolution of mobile networking-from 0G to 5G-and valuable appendices.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. THE MOST COMPLETE, CURRENT GUIDE TO SIGNALING SYSTEM #7 (SS7)Thoroughly updated to cover the latest advances in the telecommunications industry, Signaling System # 7, Sixth Edition, addresses the impact of emerging technologies and applications, such as Long Term Evolution (LTE) and 4G networks, on SS7. An all-new chapter onDiameter discusses how to successfully implement SS7-to-Diameter interfaces to bridge 3G and 4G networks. Real-world examples, protocol message details, call flows, and effective migration strategies are included in this practical guide. Comprehensive coverage includes: The SS7 network--international and national planes The OSI model SS7 protocols and the protocol stack Signal units Message Transfer Part (MTP), including level 3 Signaling Transport (SIGTRAN) ISDN User Part (ISUP) Signaling Connection Control Part (SCCP) Transaction Capabilities Application Part (TCAP) The evolution to Diameter
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Build and maintain a converged multimedia network environment Seamlessly merge the Internet with cellular and wireless networks using next-generation IMS technology and the comprehensive information contained in this authoritative resource. The IP Multimedia Subsystem: Session Control and Other Network Operations details the steps necessary to deliver Web-based content, VoIP, streaming multimedia, conference calls, and text messages across one integrated network. Learn how to transition to IMS architecture, communicate with legacy networks, control sessions using SIP, and connect subscribers to network services. In-depth coverage of the latest IMS security, business intelligence, customer care, and billing procedures is also included. Migrate legacy networks to IMS-based technology Use the Proxy, Interrogating, and Serving Call Session Control Functions Interface with TDM-based, wireless, wireline, and VoIP networks Handle private and public user identities, domain names, and URLs Establish SIP sessions and connect subscribers to network services Deploy reliable network, access, and user-level security Prevent eavesdropping, DoS, message tampering, and amplification exploits Track services rendered and charge subscribers using DIAMETER and CDRs