Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Customizing and Extending SharePoint Online Customizing and Extending SharePoint Online
    Add to Cart The item has been added

    Customizing and Extending SharePoint Online

    Leverage SharePoint Online to enhance workflows and productivity with the help of practical examples from real-world scenariosKey Features- Discover strategies for maximizing the potential and effectiveness of SharePoint features- Explore the synergy...
    $89.00

    Add to Cart The item has been added
  • Industrial IoT for Architects and Engineers Industrial IoT for Architects and Engineers
    Add to Cart The item has been added

    Industrial IoT for Architects and Engineers

    Go beyond connecting services to understand the unique challenges encountered in industrial environments by building Industrial IoT architectures using AWSPurchase of the print or kindle book includes a free eBook in the PDF formatKey Features:Understand...
    $98.00

    Add to Cart The item has been added
  • Bug Bounty from Scratch Bug Bounty from Scratch
    Add to Cart The item has been added

    Bug Bounty from Scratch

    Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key Features- Prepare to participate in a bug bounty program- Discover your first bug and claim your reward upon successful detection- Go through...
    $89.00

    Add to Cart The item has been added
  • Azure Containers Explained Azure Containers Explained
    Add to Cart The item has been added

    Azure Containers Explained

    Apply scenario-based learning to effectively handle the technical and business impact of various services like AKS, ACI, Azure Functions, and Azure Container Apps on AzurePurchase of the print or Kindle book includes a free PDF eBookKey...
    $89.00

    Add to Cart The item has been added
  • Becoming a Rockstar SRE Becoming a Rockstar SRE
    Add to Cart The item has been added

    Becoming a Rockstar SRE

    Excel in site reliability engineering by learning from field-driven lessons on observability and reliability in code, architecture, process, systems management, costs, and people to minimize downtime and enhance developers' outputPurchase of the print or...
    $98.00

    Add to Cart The item has been added
  • DevSecOps in Practice with VMware Tanzu DevSecOps in Practice with VMware Tanzu
    Add to Cart The item has been added

    DevSecOps in Practice with VMware Tanzu

    Modernize your apps, run them in containers on Kubernetes, and understand the business value and the nitty-gritty of the VMware Tanzu portfolio with hands-on instructionsPurchase of the print or kindle book includes a free eBook in the PDF formatKey...
    $89.00

    Add to Cart The item has been added
  • Network Programming and Automation Essentials Network Programming and Automation Essentials
    Add to Cart The item has been added

    Network Programming and Automation Essentials

    Unleash the power of automation by mastering network programming fundamentals using Python and Go best practicesPurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand the fundamentals of network programming and...
    $98.00

    Add to Cart The item has been added
  • Architecting Cloud-Native Serverless Solutions Architecting Cloud-Native Serverless Solutions
    Add to Cart The item has been added

    Architecting Cloud-Native Serverless Solutions

    Get up and running with serverless workloads across AWS, Azure, GCP, Kubernetes, and virtual machines with real-life examples and best practices for design, development, and security of serverless applicationsPurchase of the print or Kindle book includes...
    $98.00

    Add to Cart The item has been added
  • Cybersecurity Sustainability Cybersecurity Sustainability
    Add to Cart The item has been added

    Cybersecurity Sustainability

    Cybersecurity Sustainability: Navigating the Evolving Landscape provides a comprehensive and practical guide to the complex world of cybersecurity, covering topics such as governance, risk management, architecture, threat intelligence, privacy,...
    $140.00

    Add to Cart The item has been added
  • Cybersecurity Governance Cybersecurity Governance
    Add to Cart The item has been added

    Cybersecurity Governance

    Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive committed to enhancing their organization's cybersecurity posture, ensuring a robust, informed response to the omnipresent threat of...
    $88.00

    Add to Cart The item has been added
  • Unit and Ubiquitous Internet of Things Unit and Ubiquitous Internet of Things
    Add to Cart The item has been added

    Unit and Ubiquitous Internet of Things

    Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts. Answering fundamental...
    $154.00

    Add to Cart The item has been added
  • Future Connected Technologies Future Connected Technologies
    Add to Cart The item has been added

    Future Connected Technologies

    This book summarizes the progress in the research and provides step by step guide towards every aspect of cloud and other connected technologies. The book also covers the security aspects in the field of Cloud computing, Fog/Edge computing, IoT, etc.
    $149.00

    Add to Cart The item has been added
  • Cognitive Radio-based Internet of Vehicles Cognitive Radio-based Internet of Vehicles
    Add to Cart The item has been added

    Cognitive Radio-based Internet of Vehicles

    The incorporation of Cognitive Radio (CR) into the Internet of Vehicles (IoV) has emerged as the Intelligent Transportation System (ITS). In CR-IoV, ML and Data Science can be collaboratively used to further enhance road safety through inter-vehicle,...
    $297.00

    Add to Cart The item has been added
  • Introduction to the Cyber Ranges
    Add to Cart The item has been added

    Introduction to the Cyber Ranges

    With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing...
    $116.00

    Add to Cart The item has been added
  • The Data-Driven Blockchain Ecosystem The Data-Driven Blockchain Ecosystem
    Add to Cart The item has been added

    The Data-Driven Blockchain Ecosystem

    This book focuses on the futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools with the models of the data-driven blockchain ecosystem.
    $121.00

    Add to Cart The item has been added
  • Advances in Cyber Security and Intelligent Analytics Advances in Cyber Security and Intelligent Analytics
    Add to Cart The item has been added

    Advances in Cyber Security and Intelligent Analytics

    The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions,...
    $113.00

    Add to Cart The item has been added
  • Digital Twin Digital Twin
    Add to Cart The item has been added

    Digital Twin

    This book introduces the computing, mathematical and engineering background to understand and develop the concept of the digital twin. It provides background in modeling/simulation, computing technology, sensor/actuators, and so forth, needed to develop...
    $121.00

    Add to Cart The item has been added
  • Image Processing and Intelligent Computing Systems
    Add to Cart The item has been added

    Image Processing and Intelligent Computing Systems

    During the Covid-19 pandemic, we observed that the images helped doctors immensely in fast detection of Covid-19 infection in patients. There are many critical applications which use image processing to extract some useful information from raw image data.
    $116.00

    Add to Cart The item has been added
  • VLSI Circuits and Embedded Systems VLSI Circuits and Embedded Systems
    Add to Cart The item has been added

    VLSI Circuits and Embedded Systems

    This book explores the designs of VLSI circuits and embedded systems. As a whole, core researchers, academicians, and students will get the complete picture of VLSI Circuits and Embedded Systems and their applications.
    $135.00

    Add to Cart The item has been added
  • Big Data Analytics in Fog-Enabled IoT Networks Big Data Analytics in Fog-Enabled IoT Networks
    Add to Cart The item has been added

    Big Data Analytics in Fog-Enabled IoT Networks

    This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies like machine/deep learning, federated learning, blockchain, edge computing and the countermeasures to...
    $118.00

    Add to Cart The item has been added
  • 5G Cyber Risks and Mitigation 5G Cyber Risks and Mitigation
    Add to Cart The item has been added

    5G Cyber Risks and Mitigation

    5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key...
    $118.00

    Add to Cart The item has been added
  • Cybersecurity Public Policy Cybersecurity Public Policy
    Add to Cart The item has been added

    Cybersecurity Public Policy

    This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy.
    $154.00

    Add to Cart The item has been added
  • Security Issues for Wireless Sensor Networks Security Issues for Wireless Sensor Networks
    Add to Cart The item has been added

    Security Issues for Wireless Sensor Networks

    This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor network...
    $112.00

    Add to Cart The item has been added
  • Cognitive Computing for Internet of Medical Things Cognitive Computing for Internet of Medical Things
    Add to Cart The item has been added

    Cognitive Computing for Internet of Medical Things

    This book offers a complete assessment of the present scenario, role, challenges, technologies, and impact of IoMT-enabled smart healthcare systems. It contains chapters discussing various biomedical applications under the umbrella of the IoMT.
    $128.00

    Add to Cart The item has been added
  • Bio-Inspired Computational Paradigms Bio-Inspired Computational Paradigms
    Add to Cart The item has been added

    Bio-Inspired Computational Paradigms

    Smart cities with various technological innovations have played an important role and influenced society as well. Due to voluminous data transactions within smart cities, security and privacy concerns need to be dealt with. This book discusses the...
    $385.00

    Add to Cart The item has been added
  • Computer Vision and Internet of Things Computer Vision and Internet of Things
    Add to Cart The item has been added

    Computer Vision and Internet of Things

    This book focuses on providing a detailed description of the utilization of IoT with computer vision and its underlying technologies. It covers important topics like tools and technologies of IoT with computer vision, real-time applications along with...
    $147.00

    Add to Cart The item has been added
  • Networking Technologies in Smart Healthcare Networking Technologies in Smart Healthcare
    Add to Cart The item has been added

    Networking Technologies in Smart Healthcare

    The text discusses smart networking concepts and technologies to improve the healthcare system in a single volume. It will be a useful reference text for senior undergraduate, graduate students, and academic researchers in areas such as electrical...
    $149.00

    Add to Cart The item has been added
  • Electric Oscillations And Electric Waves Electric Oscillations And Electric Waves
    Add to Cart The item has been added

    Electric Oscillations And Electric Waves

    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it.This work is in the "public domain in the United States of America, and possibly other nations. Within the United...
    $70.00

    Add to Cart The item has been added
  • A Research Primer for Technical Communication A Research Primer for Technical Communication
    Add to Cart The item has been added

    A Research Primer for Technical Communication

    This fully revised edition provides a practical introduction to research methods for anyone conducting and critically reading technical communication research.The first section discusses the role of research in technical communication and explains in...
    $359.00

    Add to Cart The item has been added
  • Kali Linux, Ethical Hacking And Pen Testing For Beginners Kali Linux, Ethical Hacking And Pen Testing For Beginners
    Add to Cart The item has been added

    Kali Linux, Ethical Hacking And Pen Testing For Beginners

    At the beginning of this Book, you will get a breakdown of the world of ethical hacking. If you ever wondered what ethical hacking is or what an ethical hacker does, this is for you. This section will be covered by a certified ethical hacker (CEH) and...
    $47.00

    Add to Cart The item has been added
  • Basics of OAuth Securely Connecting Your Applications Basics of OAuth Securely Connecting Your Applications
    Add to Cart The item has been added

    Basics of OAuth Securely Connecting Your Applications

    "Basics of OAuth: Securely Connecting Your Applications" is a concise and informative guide to the OAuth protocol, designed to help web developers, security professionals, and other interested parties understand how OAuth can be used to...
    $30.00

    Add to Cart The item has been added
  • Continuous Modernization Continuous Modernization
    Add to Cart The item has been added

    Continuous Modernization

    DESCRIPTION As an engineer, it can feel like there is never enough time for testing, designing, or delivering quality solutions. Managers often feel overwhelmed by the need to deliver new features to support their teams while managing...
    $93.00

    Add to Cart The item has been added
  • sale
    Integrated system for the treatment of injuries or trauma Integrated system for the treatment of injuries or trauma
    Add to Cart The item has been added

    Integrated system for the treatment of injuries or trauma

    This text describes the realization of a project destined to the treatment of injuries of fractures, Parkinson's disease, carpal tunnel among other syndromes in the cubic-radius joint that affect the life of many people nowadays.For this purpose, it was...
    RRP: $43.20
    $35.00

    Add to Cart The item has been added
  • sale
    Privacy by Design and By Default Privacy by Design and By Default
    Add to Cart The item has been added

    Privacy by Design and By Default

    The book presents an innovative approach to the implementation of the core Privacy Principles of Privacy by Design and by Default as dictated in Article 25 of the General Data Protection Regulation (EU 2016/679) . Analyzing the seven core elements of the...
    RRP: $43.20
    $35.00

    Add to Cart The item has been added
  • LINUX COMMAND LINES AND SHELL SCRIPTING LINUX COMMAND LINES AND SHELL SCRIPTING
    Add to Cart The item has been added

    LINUX COMMAND LINES AND SHELL SCRIPTING

    "Linux Command Lines and Shell Scripting" is your comprehensive guide to unlocking the full potential of Linux for efficient system administration and task automation. Whether you're a novice or an experienced user, this book provides a deep dive into...
    $48.00

    Add to Cart The item has been added
  • Handbook of Big Data Technologies Handbook of Big Data Technologies
    Add to Cart The item has been added

    Handbook of Big Data Technologies

    This handbook offers comprehensive coverage of recent advancements in Big Data technologies and related paradigms.  Chapters are authored by international leading experts in the field, and have been reviewed and revised for maximum reader value. The...
    $671.00

    Add to Cart The item has been added
Computer networking and communications