Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Rancher Deep Dive Rancher Deep Dive
    Add to Cart The item has been added

    Rancher Deep Dive

    Effectively build, manage, and secure your Kubernetes workloads to implement CI/CDKey Features:Gain a complete understanding of how Rancher worksDiscover how to design and deploy Kubernetes clusters using RancherUnderstand how to extend Kubernetes and...
    $109.00

    Add to Cart The item has been added
  • OPNsense Beginner to Professional OPNsense Beginner to Professional
    Add to Cart The item has been added

    OPNsense Beginner to Professional

    Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey Features:Learn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party...
    $74.00

    Add to Cart The item has been added
  • Solutions Architect's Handbook - Second Edition Solutions Architect's Handbook - Second Edition
    Add to Cart The item has been added

    Solutions Architect's Handbook - Second Edition

    Third edition out now with coverage on Generative AI, clean architecture, edge computing, and moreKey Features:Turn business needs into end-to-end technical architectures with this practical guideAssess and overcome various challenges while updating or...
    $184.00

    Add to Cart The item has been added
  • Implementing Microsoft SharePoint 2019 Implementing Microsoft SharePoint 2019
    Add to Cart The item has been added

    Implementing Microsoft SharePoint 2019

    Bring on-premise and cloud collaboration features to life with Microsoft's enterprise content management platform - SharePoint ServerKey FeaturesGet up to speed with the latest version of SharePoint and make the most of its featuresSet up and effectively...
    $81.00

    Add to Cart The item has been added
  • Information Security Management Principles Information Security Management Principles
    Add to Cart The item has been added

    Information Security Management Principles

    In today's technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals...
    $125.00

    Add to Cart The item has been added
  • RHCSA Red Hat Enterprise Linux 8 RHCSA Red Hat Enterprise Linux 8
    Add to Cart The item has been added

    RHCSA Red Hat Enterprise Linux 8

    Highlights:> Covers Red Hat Enterprise Linux 8> Covers ALL official exam objectives for the RHCSA exam based on Red Hat Enterprise Linux 8> Equally good for self-study and in-class training> 81 Step-by-Step exercises>...
    $69.00

    Add to Cart The item has been added
  • Perspectives on Ethical Hacking and Penetration Testing Perspectives on Ethical Hacking and Penetration Testing
    Add to Cart The item has been added

    Perspectives on Ethical Hacking and Penetration Testing

    Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This...
    $384.00

    Add to Cart The item has been added
  • RHCSA & RHCE Red Hat Enterprise Linux 7 RHCSA & RHCE Red Hat Enterprise Linux 7
    Add to Cart The item has been added

    RHCSA & RHCE Red Hat Enterprise Linux 7

    RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition.Highlights: > Updated to the latest version of Red Hat Enterprise Linux 7 > Upated to cover ALL official exam objectives for the RHCSA and RHCE...
    $78.00

    Add to Cart The item has been added
  • SC-FDMA for Mobile Communications SC-FDMA for Mobile Communications
    Add to Cart The item has been added

    SC-FDMA for Mobile Communications

    This book examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Exploring the emerging trend of cooperative communication and how it can improve the physical layer security, it considers the design of distributed coding schemes and...
    $365.00

    Add to Cart The item has been added
  • Competition, Regulation, and Convergence Competition, Regulation, and Convergence
    Add to Cart The item has been added

    Competition, Regulation, and Convergence

    The current state of research in telecommunications policy, covering competition, regulation, and integration of media carriers. For scholars, policy makers, and businesspeople involved with future direction and policy decisions in telecommunications
    $85.00

    Add to Cart The item has been added
  • Cyber Frauds, Scams and their Victims Cyber Frauds, Scams and their Victims
    Add to Cart The item has been added

    Cyber Frauds, Scams and their Victims

    Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are...
    $118.00

    Add to Cart The item has been added
  • Self-Organized Lightwave Networks Self-Organized Lightwave Networks
    Add to Cart The item has been added

    Self-Organized Lightwave Networks

    This book gives a solution to the problem of constructing lightwave paths in free spaces by proposing the concept of a Self-Organized Lightwave Network (SOLNET). This concept enables us to form self-aligned coupling optical waveguides automatically...
    $198.00

    Add to Cart The item has been added
  • The ABCs of IP Addressing The ABCs of IP Addressing
    Add to Cart The item has been added

    The ABCs of IP Addressing

    A key issue in the Internet world is Internet Protocol (IP) addressing. This book provides a comprehensive reference to addressing in a TCP/IP environment. It moves from the basics of the binary numbering system to advanced topics in subnetting, network...
    $424.00

    Add to Cart The item has been added
  • Drupal Web Profiles Drupal Web Profiles
    Add to Cart The item has been added

    Drupal Web Profiles

    This book demystifies Drupal, one of the most popular content management systems in use today. With step-by-step instruction and worked examples, this is a crucial guide to the next level in content management. This project-based guide offers a...
    $90.00

    Add to Cart The item has been added
  • ManusCrypt ManusCrypt
    Add to Cart The item has been added

    ManusCrypt

    A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.
    $282.00

    Add to Cart The item has been added
  • Insecure Digital Frontiers Insecure Digital Frontiers
    Add to Cart The item has been added

    Insecure Digital Frontiers

    'Insecure Digital Frontiers' is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize. This book delves into the vulnerabilities that define our...
    $282.00

    Add to Cart The item has been added
  • Spies in the Bits and Bytes Spies in the Bits and Bytes
    Add to Cart The item has been added

    Spies in the Bits and Bytes

    "Spies in the Bits and Bytes" offers in-depth analysis of cyber threats, cutting-edge defense strategies using AI and machine learning, real-world case studies, accessible insights, and forward-looking perspectives on the future of cyber threats and...
    $282.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    The CISO Playbook

    The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow.
    $118.00

    Add to Cart The item has been added
  • The Art of Cyber Defense The Art of Cyber Defense
    Add to Cart The item has been added

    The Art of Cyber Defense

    The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
    $282.00

    Add to Cart The item has been added
  • 5G Edge Computing 5G Edge Computing
    Add to Cart The item has been added

    5G Edge Computing

    Edge computing has been identified as one of the key technologies for 5G networks and beyond due to two prominent advantages: low network latency and reduced core network load. By empowering cloud capabilities and IT service environments at the network...
    $281.00

    Add to Cart The item has been added
  • PRICAI 2024 PRICAI 2024
    Add to Cart The item has been added

    PRICAI 2024

    The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024, held in Kyoto, Japan, in November 18-24, 2024.The 145 full papers...
    $174.00

    Add to Cart The item has been added
  • Communication Technologies and Security Challenges in IoT Communication Technologies and Security Challenges in IoT
    Add to Cart The item has been added

    Communication Technologies and Security Challenges in IoT

    This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance...
    $308.00

    Add to Cart The item has been added
  • Blockchain Technology and Application Blockchain Technology and Application
    Add to Cart The item has been added

    Blockchain Technology and Application

    This book constitutes the refereed proceedings of the Third CCF China Blockchain Conference, CBCC 2020, held in Jinan, China, December 2020. The 8 revised full papers presented were carefully reviewed and selected from 64 submissions. The...
    $116.00

    Add to Cart The item has been added
  • Privacy-Preserving in Mobile Crowdsensing Privacy-Preserving in Mobile Crowdsensing
    Add to Cart The item has been added

    Privacy-Preserving in Mobile Crowdsensing

    Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices. Commonly, individuals are incentivized...
    $270.00

    Add to Cart The item has been added
  • Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
    Add to Cart The item has been added

    Security and Privacy in Social Networks and Big Data

    This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.The 23 papers presented in this volume were carefully...
    $122.00

    Add to Cart The item has been added
  • Information Retrieval in Bioinformatics Information Retrieval in Bioinformatics
    Add to Cart The item has been added

    Information Retrieval in Bioinformatics

    The book presents the results of studies on selected problems (such as predictive model of transcription initiation and termination, protein recognition codes, protein structure prediction, feature selection for disease prediction, information retrieval...
    $281.00

    Add to Cart The item has been added
  • Petri Nets for Modeling of Large Discrete Systems Petri Nets for Modeling of Large Discrete Systems
    Add to Cart The item has been added

    Petri Nets for Modeling of Large Discrete Systems

    This book offers a new Modular Petri Net as a solution to the vast Petri net models. It presents some approaches centering around modules (known as "Petri modules"). The goal of this book is to introduce a methodology in which Petri nets are moved to a...
    $308.00

    Add to Cart The item has been added
  • Localization in Underwater Sensor Networks Localization in Underwater Sensor Networks
    Add to Cart The item has been added

    Localization in Underwater Sensor Networks

    Ocean covers 70.8% of the Earth's surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the ocean's volume remains unmapped, unobserved and unexplored. In this regard, Underwater Sensor Networks (USNs),...
    $249.00

    Add to Cart The item has been added
  • Digital Democracy - IT for Change Digital Democracy - IT for Change
    Add to Cart The item has been added

    Digital Democracy - IT for Change

    This book constitutes the refereed proceedings of the 53rd Annual Convention of the Computer Society of India, CSI 2020, held in Bhubaneswar, India, in January 2020.The 3 revised full and 7 revised short papers, along with 1 poster paper, presented were...
    $122.00

    Add to Cart The item has been added
  • Co-governed Sovereignty Network Co-governed Sovereignty Network
    Add to Cart The item has been added

    Co-governed Sovereignty Network

    This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and...
    $92.00

    Add to Cart The item has been added
  • Recent Trends In Peripheral Security Systems Recent Trends In Peripheral Security Systems
    Add to Cart The item has been added

    Recent Trends In Peripheral Security Systems

    This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It...
    $308.00

    Add to Cart The item has been added
  • Data Communication and Networks Data Communication and Networks
    Add to Cart The item has been added

    Data Communication and Networks

    This book gathers selected high-quality papers presented at the International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 2019. The content is divided into three...
    $324.00

    Add to Cart The item has been added
  • Microservices in Big Data Analytics Microservices in Big Data Analytics
    Add to Cart The item has been added

    Microservices in Big Data Analytics

    These proceedings gather cutting-edge papers exploring the principles, techniques, and applications of Microservices in Big Data Analytics. The ICETCE-2019 is the latest installment in a successful series of annual conferences that began in 2011. Every...
    $92.00

    Add to Cart The item has been added
  • Software Challenges to Exascale Computing Software Challenges to Exascale Computing
    Add to Cart The item has been added

    Software Challenges to Exascale Computing

    This book constitutes the refereed proceedings of the Second Workshop on Software Challenges to Exascale Computing, SCEC 2018, held in Delhi, India, in December 2018.The 10 papers presented in this volume were carefully reviewed and selected from 24...
    $92.00

    Add to Cart The item has been added
  • Information, Communication and Computing Technology Information, Communication and Computing Technology
    Add to Cart The item has been added

    Information, Communication and Computing Technology

    This book constitutes the refereed proceedings of the Third International Conference on Information, Communication and Computing Technology, ICICCT 2018, held in New Delhi, India, in May 2018.The 18 revised full papers  presented in this volume were...
    $92.00

    Add to Cart The item has been added
  • Web Searching and Mining Web Searching and Mining
    Add to Cart The item has been added

    Web Searching and Mining

    This book presents the basics of search engines and their components. It introduces, for the first time, the concept of Cellular Automata in Web technology and discusses the prerequisites of Cellular Automata. In today's world, searching data from the...
    $335.00

    Add to Cart The item has been added
  • Searchable Storage in Cloud Computing Searchable Storage in Cloud Computing
    Add to Cart The item has been added

    Searchable Storage in Cloud Computing

    This book presents the state-of-the-art work in terms of searchable storage in cloud computing. It introduces and presents new schemes for exploring and exploiting the searchable storage via cost-efficient semantic hashing computation. Specifically, the...
    $238.00

    Add to Cart The item has been added
  • Communication, Networks and Computing Communication, Networks and Computing
    Add to Cart The item has been added

    Communication, Networks and Computing

    This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected...
    $92.00

    Add to Cart The item has been added
  • Mobile and Wireless Technology 2018 Mobile and Wireless Technology 2018
    Add to Cart The item has been added

    Mobile and Wireless Technology 2018

    This book presents peer-reviewed contributions from the 5th International Conference on Mobile and Wireless Technology (ICMWT 2018), held June 25-27, 2018 in Hong Kong. This conference provided researchers and practitioners from both academia and...
    $335.00

    Add to Cart The item has been added
Computer networking and communications