Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Quantum Age of It (The) Quantum Age of It (The)
    Add to Cart The item has been added

    Quantum Age of It (The)

    'IT as we know it is dead.'Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing perceptions of how technology should work and newfound, but very real, competition, IT organizations are...
    $88.00

    Add to Cart The item has been added
  • Measuring Organisational Efficiency Measuring Organisational Efficiency
    Add to Cart The item has been added

    Measuring Organisational Efficiency

    According to many social thinkers it is not possible to quantify the performance of organizations on the basis of the values produced. One initial reply to this critique is that the axiological approach in systems theory aims to fulfil a dual function...
    $31.00

    Add to Cart The item has been added
  • CCSP CCSP
    Add to Cart The item has been added

    CCSP

    ���� Unlock Your Potential with the CCSP: Certified Cloud Security Professional Book Bundle! ����Are you ready to take your career to new heights in the dynamic world of cloud security? Look no further than our exclusive book bundle, designed to guide...
    $65.00

    Add to Cart The item has been added
  • OSINT Hacker's Arsenal OSINT Hacker's Arsenal
    Add to Cart The item has been added

    OSINT Hacker's Arsenal

    Introducing the "OSINT Hacker's Arsenal" Book Bundle!Unlock the Power of Open Source Intelligence (OSINT) with our comprehensive book bundle, carefully crafted to take you from a novice to a seasoned OSINT professional. With a combined wealth of...
    $91.00

    Add to Cart The item has been added
  • Defense In Depth Defense In Depth
    Add to Cart The item has been added

    Defense In Depth

    Introducing the "Defense in Depth" Book BundleAre you concerned about the ever-growing threats to your digital world? Do you want to fortify your network security and bolster your cyber resilience? Look no further - the "Defense in Depth" book bundle is...
    $80.00

    Add to Cart The item has been added
  • Cloud Computing Playbook Cloud Computing Playbook
    Add to Cart The item has been added

    Cloud Computing Playbook

    IF YOU WANT TO PASS THE MICROSOFT AZURE AZ-900 EXAM, OR WANT TO BECOME AN AWS CERTIFIED CLOUD PRACTITIONER, AND/OR WANT TO DISCOVER HOW TO AUTOMATE YOUR INFRASTRUCTURE ON ANY CLOUD WITH TERRAFORM, THIS BOOK IS FOR YOU!10 BOOKS IN 1...
    $131.00

    Add to Cart The item has been added
  • SQL Injection Strategies SQL Injection Strategies
    Add to Cart The item has been added

    SQL Injection Strategies

    Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey FeaturesUnderstand SQL injection and its effects on websites and other systemsGet hands-on with SQL...
    $81.00

    Add to Cart The item has been added
  • The Infinite Retina The Infinite Retina
    Add to Cart The item has been added

    The Infinite Retina

    A compelling and insightful look at the future of Spatial Computing, and how this cutting-edge technology is changing the way we do business across seven primary industries, and what it means for humanity as a whole.Key FeaturesDiscover how Spatial...
    $175.00

    Add to Cart The item has been added
  • Mastering Cloud Security Posture Management (CSPM) Mastering Cloud Security Posture Management (CSPM)
    Add to Cart The item has been added

    Mastering Cloud Security Posture Management (CSPM)

    Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environmentKey FeaturesChoose the...
    $98.00

    Add to Cart The item has been added
  • Mastering Microsoft Defender for Office 365 Mastering Microsoft Defender for Office 365
    Add to Cart The item has been added

    Mastering Microsoft Defender for Office 365

    Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategiesKey Features:- Integrate Microsoft Defender for Office 365 fits into your...
    $98.00

    Add to Cart The item has been added
  • IT Audit Field Manual IT Audit Field Manual
    Add to Cart The item has been added

    IT Audit Field Manual

    Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manualKey Features:- Secure and audit endpoints in Windows environments for robust defense- Gain practical skills in...
    $89.00

    Add to Cart The item has been added
  • Microsoft Unified XDR and SIEM Solution Handbook Microsoft Unified XDR and SIEM Solution Handbook
    Add to Cart The item has been added

    Microsoft Unified XDR and SIEM Solution Handbook

    A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solutionKey Features- Learn how to leverage Microsoft's XDR and SIEM for long-term resilience- Explore ways to elevate your security posture using...
    $109.00

    Add to Cart The item has been added
  • Secure Coding Practices Secure Coding Practices
    Add to Cart The item has been added

    Secure Coding Practices

    Secure Coding Practices: Fortifying Applications Against Cyber Threats is a comprehensive guide that explores the importance of secure coding, the fundamentals of cyber threats, common vulnerabilities, best practices in code development, authentication...
    $70.00

    Add to Cart The item has been added
  • Ed Mastery Ed Mastery
    Add to Cart The item has been added

    Ed Mastery

     “I’m glad someone’s finally giving ed the attention it deserves.”– Ken Thompson, co-creator of Unix Let me be perfectly clear: ed is the standard Unix text editor. If you don’t know ed, you’re not a...
    $18.00

    Add to Cart The item has been added
  • Intelligent System Based on Cloud and Internet Of Things Intelligent System Based on Cloud and Internet Of Things
    Add to Cart The item has been added

    Intelligent System Based on Cloud and Internet Of Things

    本書為一技術報告。主要介紹開源雲端運算平台的建立與物聯網系統整合。透過雲端運算資源在遠端建立虛擬機器,並基於虛擬機器與網際網路,結合位於在地端的物聯網感測元件及組件,經過智慧演算法的計算後,提供不同系統使用者客製化、差異化的服務。本技術報告主題內容分為:1. 前端物聯網IOT元件之設計與改良;2. 開源雲端運算平台建置;以及3...
    $30.00

    Add to Cart The item has been added
  • The Cold War for Information Technology The Cold War for Information Technology
    Add to Cart The item has been added

    The Cold War for Information Technology

    "The Cold War for Information Technology is a captivating new book that uncovers a little-known but vital battle to gain control over IT development that took place in the final two decades of the 20th century. As you might expect, intelligence agencies...
    $27.00

    Add to Cart The item has been added
  • Measuring Itsm Measuring Itsm
    Add to Cart The item has been added

    Measuring Itsm

    How do you measure and report your IT services and processes? Which metrics matter the most to senior executives?Finally, here is a book that shows you how! Not theory, but a practical guide that shows you the operational metrics to use and how these can...
    $44.00

    Add to Cart The item has been added
  • Wi-Fi Enabled Healthcare Wi-Fi Enabled Healthcare
    Add to Cart The item has been added

    Wi-Fi Enabled Healthcare

    Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand...
    $188.00

    Add to Cart The item has been added
  • Building Enterprise Systems with ODP Building Enterprise Systems with ODP
    Add to Cart The item has been added

    Building Enterprise Systems with ODP

    This book presents a systematic approach to the design of large, complex distributed systems using the concepts and mechanisms defined by the Reference Model of Open Distributed Processing (RM-ODP). Focusing on the key choices that make an architectural...
    $203.00

    Add to Cart The item has been added
  • Cloud and Virtual Data Storage Networking Cloud and Virtual Data Storage Networking
    Add to Cart The item has been added

    Cloud and Virtual Data Storage Networking

    The amount of data being generated, processed, and stored has reached unprecedented levels. Even during the recent economic crisis, there has been no slow down or information recession. Instead, the need to process, move, and store data has only...
    $321.00

    Add to Cart The item has been added
  • Server and Data Center Technologies Server and Data Center Technologies
    Add to Cart The item has been added

    Server and Data Center Technologies

    This is the fourth edition of a generalized hardware exercise and study manual for servers and data centers. It is designed to accompany a lecture based component that consists of twenty-eight modules covering material based on principles of a basic...
    $265.00

    Add to Cart The item has been added
  • The Accidental Administrator The Accidental Administrator
    Add to Cart The item has been added

    The Accidental Administrator

    Your easy-to-follow step-by-step guide to configuring a Cisco router from the ground up!The Accidental Administratortm: Cisco Router Step-by-Step Configuration Guide is packed with more than 30 easy-to-follow interactive exercises, loads of screen...
    $71.00

    Add to Cart The item has been added
  • Using Massive Digital Librarise Using Massive Digital Librarise
    Add to Cart The item has been added

    Using Massive Digital Librarise

    Some have viewed sthe ascendance of the digital library as some kind of existential apocalypse, nothing less than the beginning of the end for the traditional library. But Weiss, recognizing the concept of the library as a "big idea" that has been...
    $139.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Solving IT Service Management

    Stress, frustration, disappointment... are these feelings part of your work day? Today's business environment may be quite tough at times; this is especially true in the IT environment. New technologies, new procedures and an incomprehensive bureaucracy...
    $33.00

    Add to Cart The item has been added
  • Shadow Codes Shadow Codes
    Add to Cart The item has been added

    Shadow Codes

    Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Digital Age." Tailored for tech enthusiasts, cybersecurity students, or simply the curious, this book unravels the mysteries of digital spying, making it an...
    $29.00

    Add to Cart The item has been added
  • Códigos De Sombra Códigos De Sombra
    Add to Cart The item has been added

    Códigos De Sombra

    Sumérgete en el enigmático mundo del espionaje cibernético con "Códigos de Sombras: El Maestro Espía de la Era Digital". Adaptado para entusiastas de la tecnología, estudiantes de ciberseguridad o simplemente curiosos, este libro desentraña los misterios...
    $29.00

    Add to Cart The item has been added
  • Ultimate Microservices with Go Ultimate Microservices with Go
    Add to Cart The item has been added

    Ultimate Microservices with Go

    Develop production-ready, high-performance, and scalable microservices with GoBook DescriptionEmbark on a comprehensive journey through microservices architecture with a focus on harnessing the power of Go in modern cloud-based solutions.This book begins...
    $70.00

    Add to Cart The item has been added
  • sale
    Network Architecture with Recursive Addressing Network Architecture with Recursive Addressing
    Add to Cart The item has been added

    Network Architecture with Recursive Addressing

    A network architecture, named NARA, based on recursive addressing is proposed. The Internet is modeled as a network of autonomous sites, each being a collection of nodes. Each site is named by a site address drawn from a global number space while each...
    RRP: $44.33
    $35.00

    Add to Cart The item has been added
  • sale
    Security in MANET'S by using Symmetric Key Cryptography Security in MANET'S by using Symmetric Key Cryptography
    Add to Cart The item has been added

    Security in MANET'S by using Symmetric Key Cryptography

    The current textbook is about the security in mobile ad-hoc networks by using cryptographic secrete key. Now-a-days security is a major challenging problem in mobile ad-hoc networks because the nodes in mobile ad-hoc networks are moving from one place to...
    RRP: $65.75
    $52.00

    Add to Cart The item has been added
  • sale
    Mobility Management in CoAP-Based IoT Networks Mobility Management in CoAP-Based IoT Networks
    Add to Cart The item has been added

    Mobility Management in CoAP-Based IoT Networks

    From recently, the innovative technology named as Constrained Application Protocol (CoAP) has been classified for numerous sensors in the field of IoT. Service discovery should be performed again in CoAP to support handover in mobile device. By this the...
    RRP: $65.75
    $52.00

    Add to Cart The item has been added
  • sale
    Handbook on wireless mesh network Handbook on wireless mesh network
    Add to Cart The item has been added

    Handbook on wireless mesh network

    Wireless Mesh networks are more and more frequently seen as a solution to large-scale tracking and monitoring applications, because of their low-data-rate, low-energy-consumption, and short-range link network which provides an opportunity to monitor and...
    RRP: $65.75
    $52.00

    Add to Cart The item has been added
Computer networking and communications