Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Performance Modeling and Engineering Performance Modeling and Engineering
    Add to Cart The item has been added

    Performance Modeling and Engineering

    Performance Design and Engineering.- Machine Learning Techniques-Reductions Between Prediction Quality Metrics.- Performance Engineering and Management Method - A Holistic Approach to Performance Engineering.- Economic Models of Communication Networks.-...
    $308.00

    Add to Cart The item has been added
  • Advances in Digital Forensics II Advances in Digital Forensics II
    Add to Cart The item has been added

    Advances in Digital Forensics II

    Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Practically every crime now involves some digital evidence; digital forensics provides the techniques...
    $274.00

    Add to Cart The item has been added
  • Challenges in Ad Hoc Networking Challenges in Ad Hoc Networking
    Add to Cart The item has been added

    Challenges in Ad Hoc Networking

    Wireless Transmissions with Combined Gain Relays over Fading Channels.- Adaptive Probabilistic NAV to Increase Fairness in Ad HOC 802.11 MAC Layer.- A Link Layer Protocol for Self-Organizing Ultra Wide Band Impulse Radio Networks.- Power Control and...
    $268.00

    Add to Cart The item has been added
  • Next Generation Transport Networks Next Generation Transport Networks
    Add to Cart The item has been added

    Next Generation Transport Networks

    to Transport Networks.- Switching.- SONET and SDH.- Next Generation Transport Technologies.- Management Architectures.- Management Information Models.- Management Technologies.- Transport Network Survivability.- Control Plane.
    $238.00

    Add to Cart The item has been added
  • Stream Data Management Stream Data Management
    Add to Cart The item has been added

    Stream Data Management

    to Stream Data Management.- Query Execution and Optimization.- Filtering, Punctuation, Windows and Synopses.- XML & Data Streams.- CAPE: A Constraint-Aware Adaptive Stream Processing Engine.- Efficient Support for Time Series Queries in Data Stream...
    $238.00

    Add to Cart The item has been added
  • QoS in Packet Networks QoS in Packet Networks
    Add to Cart The item has been added

    QoS in Packet Networks

    Basic Mathematics for QoS.- QoS Metrics.- IP QoS Generic Functional Requirements.- IP Integrated Services and Differentiated Services.- QoS in ATM Networks.- MPLS.- References.
    $308.00

    Add to Cart The item has been added
  • Nearest Neighbor Search Nearest Neighbor Search
    Add to Cart The item has been added

    Nearest Neighbor Search

    Modern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional (alphanumeric) and nontraditional data sets (images, text, geometric objects, time-series)...
    $250.00

    Add to Cart The item has been added
  • Managing and Mining Uncertain Data Managing and Mining Uncertain Data
    Add to Cart The item has been added

    Managing and Mining Uncertain Data

    Managing and Mining Uncertain Data, a survey with chapters by a variety of well known researchers in the data mining field, presents the most recent models, algorithms, and applications in the uncertain data mining field in a...
    $220.00

    Add to Cart The item has been added
  • Quantifiers in Action Quantifiers in Action
    Add to Cart The item has been added

    Quantifiers in Action

    Basic Concepts.- Generalized Quantifiers.- QLGQ: A Query Language with Generalized Quantifiers.- Implementation and Optimization of Standard GQs.- Quantifier Prefixes.- Cooperative Query Answering.- Generalized Quantifiers and Natural Language.-...
    $294.00

    Add to Cart The item has been added
  • Survey of Text Mining Survey of Text Mining
    Add to Cart The item has been added

    Survey of Text Mining

    Extracting content from text continues to be an important research problem for information processing and management. Approaches to capture the semantics of text-based document collections may be based on Bayesian models,...
    $285.00

    Add to Cart The item has been added
  • The Information Revolution in Military Affairs in Asia The Information Revolution in Military Affairs in Asia
    Add to Cart The item has been added

    The Information Revolution in Military Affairs in Asia

    The contributors to this volume seek to explore the multi-dimensional (institutional, cultural, technological, and political) environments of several Asian states to determine the amenability of those host environments for the adoption/adaptation of the...
    $122.00

    Add to Cart The item has been added
  • Humanities Computing Humanities Computing
    Add to Cart The item has been added

    Humanities Computing

    Humanities Computing provides a rationale for a computing practice that is of and for as well as in the humanities and the interpretative social sciences. It engages philosophical, historical, ethnographic and critical perspectives to show how computing...
    $122.00

    Add to Cart The item has been added
  • Big Data Science & Analytics Big Data Science & Analytics
    Add to Cart The item has been added

    Big Data Science & Analytics

    Data and information are fuel of this new age where powerful analytics algorithms burn this fuel to generate decisions that are expected to create a smarter and more efficient world for all of us to live in. This new area of technology has been defined...
    $96.00

    Add to Cart The item has been added
  • A B C of the Telephone A B C of the Telephone
    Add to Cart The item has been added

    A B C of the Telephone

    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it.This work is in the "public domain in the United States of America, and possibly other nations. Within the United...
    $62.00

    Add to Cart The item has been added
  • Edge Intelligence Edge Intelligence
    Add to Cart The item has been added

    Edge Intelligence

    The book explores edge intelligent techniques and solutions that can be incorporated into IoT-enabled applications. It paves way for researchers and innovators to rethink the application of edge intelligent techniques for their problem domains.
    $275.00

    Add to Cart The item has been added
  • Coding Basics with Microsoft Visual Studio Coding Basics with Microsoft Visual Studio
    Add to Cart The item has been added

    Coding Basics with Microsoft Visual Studio

    A comprehensive guide to kickstart your journey into the world of coding using the powerful tools and features of Microsoft Visual Studio. Whether you're a beginner taking your first steps in programming or an enthusiast looking to enhance your skills,...
    $25.00

    Add to Cart The item has been added
  • Evidence-Based Cybersecurity Evidence-Based Cybersecurity
    Add to Cart The item has been added

    Evidence-Based Cybersecurity

    The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and...
    $163.00

    Add to Cart The item has been added
  • Controlling Privacy and the Use of Data Assets - Volume 1 Controlling Privacy and the Use of Data Assets - Volume 1
    Add to Cart The item has been added

    Controlling Privacy and the Use of Data Assets - Volume 1

    "Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability."Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays out...
    $154.00

    Add to Cart The item has been added
  • Decentralized Systems with Design Constraints Decentralized Systems with Design Constraints
    Add to Cart The item has been added

    Decentralized Systems with Design Constraints

    Decentralized Control and Filtering provides a rigorous framework for examining the analysis, stability and control of large-scale systems, addressing the difficulties that arise because dimensionality, information structure...
    $335.00

    Add to Cart The item has been added
  • Dependability of Networked Computer-Based Systems Dependability of Networked Computer-Based Systems
    Add to Cart The item has been added

    Dependability of Networked Computer-Based Systems

    The measurement of dependability attributes on real systems is a very time-consuming and costly affair, making analytical or simulation modeling the only viable solutions. Dependability of Networked Computer-based Systems...
    $285.00

    Add to Cart The item has been added
  • Databases and Mobile Computing Databases and Mobile Computing
    Add to Cart The item has been added

    Databases and Mobile Computing

    Database and Mobile Computing brings together in one place important contributions and up-to-date research results in this important area. Databases and Mobile Computing serves as an excellent reference, providing insight...
    $184.00

    Add to Cart The item has been added
  • Time-Constrained Transaction Management Time-Constrained Transaction Management
    Add to Cart The item has been added

    Time-Constrained Transaction Management

    Transaction processing is an established technique for the concurrent and fault­ tolerant access of persistent data. While this technique has been successful in standard database systems, factors such as time-critical ...
    $220.00

    Add to Cart The item has been added
  • Information Retrieval and Hypertext Information Retrieval and Hypertext
    Add to Cart The item has been added

    Information Retrieval and Hypertext

    Information Retrieval (IR) has concentrated on the development of information management systems to support user retrieval from large collections of homogeneous textual material. A variety of approaches have been tried and...
    $227.00

    Add to Cart The item has been added
  • Fuzzy Databases Fuzzy Databases
    Add to Cart The item has been added

    Fuzzy Databases

    This volume presents the results of approximately 15 years of work from researchers around the world on the use of fuzzy set theory to represent imprecision in databases. The maturity of the research in the discipline and the...
    $184.00

    Add to Cart The item has been added
  • Rethinking Hypermedia Rethinking Hypermedia
    Add to Cart The item has been added

    Rethinking Hypermedia

    Rethinking Hypermedia: The Microcosm Approach is essentially the story of the Microcosm hypermedia research and development project that started in the late 1980's and from which has emerged a philosophy that re-examines the...
    $227.00

    Add to Cart The item has been added
  • The Testability of Distributed Real-Time Systems The Testability of Distributed Real-Time Systems
    Add to Cart The item has been added

    The Testability of Distributed Real-Time Systems

    BY H. KOPETZ A real-time computer system must provide the intended service in two di­ mensions: the functional (value) dimension and the temporal dimension. The verification of a real-time system implementation is thus...
    $184.00

    Add to Cart The item has been added
  • Parallel Processing on VLSI Arrays Parallel Processing on VLSI Arrays
    Add to Cart The item has been added

    Parallel Processing on VLSI Arrays

    Guest Editor: JOSEF A. NOSSEK This is a special issue of the Journal of VLSI Signal Processing comprising eight contributions invited for publica­ tion on the basis of novel work presented in a special session on "Parallel...
    $227.00

    Add to Cart The item has been added
  • Cyber Crime Investigator's Field Guide Cyber Crime Investigator's Field Guide
    Add to Cart The item has been added

    Cyber Crime Investigator's Field Guide

    Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition...
    $168.00

    Add to Cart The item has been added
  • SaaS - Desktop- und Anwendungsvirtualisierung in der Cloud SaaS - Desktop- und Anwendungsvirtualisierung in der Cloud
    Add to Cart The item has been added

    SaaS - Desktop- und Anwendungsvirtualisierung in der Cloud

    Studienarbeit aus dem Jahr 2014 im Fachbereich Informatik - Internet, neue Technologien, Note: 1,0, FOM Hochschule für Oekonomie & Management gemeinnützige GmbH, Stuttgart, Sprache: Deutsch, Abstract: Cloud Computing ist in aller Munde, doch was steckt...
    $68.00

    Add to Cart The item has been added
  • 8 Steps to Amazing Webinars 8 Steps to Amazing Webinars
    Add to Cart The item has been added

    8 Steps to Amazing Webinars

    Increase qualified leadsGenerate industry buzzDrive people to your brandThis easy-to-read book is full of tips and tricks to improve your lead generation, increase your sales, and engage your audience by running amazing webinars. Written by an industry...
    $43.00

    Add to Cart The item has been added
  • Practical Cybersecurity Architecture Practical Cybersecurity Architecture
    Add to Cart The item has been added

    Practical Cybersecurity Architecture

    Plan and design robust security architectures to secure your organization's technology landscape and the applications you developKey FeaturesLeverage practical use cases to successfully architect complex security structuresLearn risk assessment...
    $131.00

    Add to Cart The item has been added
  • Mastering Python Networking - Third Edition Mastering Python Networking - Third Edition
    Add to Cart The item has been added

    Mastering Python Networking - Third Edition

    New edition of the bestselling guide to mastering Python Networking, updated to Python 3 and including the latest on network data analysis, Cloud Networking, Ansible 2.8, and new librariesKey FeaturesExplore the power of Python libraries to tackle...
    $184.00

    Add to Cart The item has been added
  • Microsoft Azure Architect Technologies Exam Guide AZ-300 Microsoft Azure Architect Technologies Exam Guide AZ-300
    Add to Cart The item has been added

    Microsoft Azure Architect Technologies Exam Guide AZ-300

    Become a certified Azure Architect and learn to design effective solutions that span compute, security, networking, and developmentKey FeaturesLearn to successfully design and architect powerful and cost-effective solutions on Microsoft AzurePrepare to...
    $93.00

    Add to Cart The item has been added
  • Digital Forensics and Incident Response - Second Edition Digital Forensics and Incident Response - Second Edition
    Add to Cart The item has been added

    Digital Forensics and Incident Response - Second Edition

    Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for...
    $131.00

    Add to Cart The item has been added
  • Internet of Things from Scratch Internet of Things from Scratch
    Add to Cart The item has been added

    Internet of Things from Scratch

    Kickstart your IoT design and implementation journey with this comprehensive book, covering basics to advanced concepts through practical examples and industry-standard practicesKey FeaturesMaster the different components that make up an IoT system to...
    $104.00

    Add to Cart The item has been added
  • Salesforce DevOps for Architects Salesforce DevOps for Architects
    Add to Cart The item has been added

    Salesforce DevOps for Architects

    Master Salesforce DevOps while exploring deployment, packages, Git workflows, and organizational monitoring using third-party tools such as Salesforce DX, GitHub, Jenkins, Gearset, and CopadoKey FeaturesLearn how to build a DevOps culture to mitigate...
    $109.00

    Add to Cart The item has been added
  • GitHub Actions Cookbook GitHub Actions Cookbook
    Add to Cart The item has been added

    GitHub Actions Cookbook

    Authored by a Microsoft Regional Director, this book shows you how to leverage the power of the community-driven GitHub Actions workflow platform to automate repetitive engineering tasksKey FeaturesAutomate CI/CD workflows and deploy securely to cloud...
    $85.00

    Add to Cart The item has been added
  • Cryptography Algorithms - Second Edition Cryptography Algorithms - Second Edition
    Add to Cart The item has been added

    Cryptography Algorithms - Second Edition

    Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptographyPurchase of the print or Kindle book includes a free eBook in PDF...
    $104.00

    Add to Cart The item has been added
  • Secure Continuous Delivery on Google Cloud Secure Continuous Delivery on Google Cloud
    Add to Cart The item has been added

    Secure Continuous Delivery on Google Cloud

    Build an end-to-end continuous delivery pipeline on Google Cloud and secure your software supply chain using GCP tools and services including Cloud Code, Cloud Workstations, Cloud Build, Artifact Registry, and Cloud DeployKey FeaturesGain hands-on...
    $109.00

    Add to Cart The item has been added
Computer networking and communications