Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Mobile Media Mobile Media
    Add to Cart The item has been added

    Mobile Media

    The proliferation of mobile media in recent years is an international phenomenon, with billions of devices sold annually. Mobile communications are now moving beyond individualized voice to mass media content--text, voice, sound, images, and even video...
    $97.00

    Add to Cart The item has been added
  • Knitting the Semantic Web Knitting the Semantic Web
    Add to Cart The item has been added

    Knitting the Semantic Web

    The Semantic Web, extends the popular, day-to-day Web, enabling computers and people to effectively work together by giving information well-defined meaning. Knitting the Semantic Web explains the interdisciplinary efforts underway to build a more...
    $126.00

    Add to Cart The item has been added
  • Ubiquitous and Transparent Security Ubiquitous and Transparent Security
    Add to Cart The item has been added

    Ubiquitous and Transparent Security

    In an increasingly interconnected digital realm, "Ubiquitous and Transparent Security: Challenges and Applications" emerges as a guiding beacon through the intricate web of modern cybersecurity.
    $308.00

    Add to Cart The item has been added
  • Optimal Spending on Cybersecurity Measures Optimal Spending on Cybersecurity Measures
    Add to Cart The item has been added

    Optimal Spending on Cybersecurity Measures

    This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the cyber risk investment model and the cybersecurity risk management framework within the DevOps process.
    $308.00

    Add to Cart The item has been added
  • Information Technology Security and Risk Management Information Technology Security and Risk Management
    Add to Cart The item has been added

    Information Technology Security and Risk Management

    Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader...
    $308.00

    Add to Cart The item has been added
  • Networking Argument Networking Argument
    Add to Cart The item has been added

    Networking Argument

    This edited volume presents selected works from the 20th Biennial Alta Argumentation Conference, sponsored by the National Communication Association and the American Forensics Association and held in 2017. The conference brought together scholars from...
    $111.00

    Add to Cart The item has been added
  • Building Enterprise IoT Applications Building Enterprise IoT Applications
    Add to Cart The item has been added

    Building Enterprise IoT Applications

    McKinsey Global Institute predicts Internet of Things (IoT) could generate up to $11.1 trillion a year in economic value by 2025. Gartner Research Company expects 20 billion inter-connected devices by 2020 and, as per Gartner, the IoT will have a...
    $137.00

    Add to Cart The item has been added
  • Electrical Machines and Their Applications Electrical Machines and Their Applications
    Add to Cart The item has been added

    Electrical Machines and Their Applications

    Electric Machines covers an in-depth analysis of machines augmented with ample examples, which makes it suitable both for those who are new to electric machines and for those who want to deepen their knowledge of electric machines.
    $244.00

    Add to Cart The item has been added
  • Nanoelectronic Devices for Hardware and Software Security Nanoelectronic Devices for Hardware and Software Security
    Add to Cart The item has been added

    Nanoelectronic Devices for Hardware and Software Security

    Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future...
    $270.00

    Add to Cart The item has been added
  • Security and Auditing of Smart Devices Security and Auditing of Smart Devices
    Add to Cart The item has been added

    Security and Auditing of Smart Devices

    Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have...
    $114.00

    Add to Cart The item has been added
  • The Insider Threat The Insider Threat
    Add to Cart The item has been added

    The Insider Threat

    This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with...
    $118.00

    Add to Cart The item has been added
  • Blockchain-enabled Fog and Edge Computing Blockchain-enabled Fog and Edge Computing
    Add to Cart The item has been added

    Blockchain-enabled Fog and Edge Computing

    This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also...
    $203.00

    Add to Cart The item has been added
  • Magnetic Core Memory Decoded Magnetic Core Memory Decoded
    Add to Cart The item has been added

    Magnetic Core Memory Decoded

    Magnetic Core Memory Decoded is a detailed work describing the operation and development of a magnetic core memory system of the type originally implemented in the 1940's through to the 1960's.Core memory was a major stepping stone in the development of...
    $72.00

    Add to Cart The item has been added
  • The Internet of Mechanical Things The Internet of Mechanical Things
    Add to Cart The item has been added

    The Internet of Mechanical Things

    This book provides knowledge, skills, and strategies an engineer requires to effectively integrate Internet of Things (IoT) into the field of mechanical engineering. Divided into three sections named IoT Strategies, IoT Foundation topics, and IoT system...
    $231.00

    Add to Cart The item has been added
  • Cloud IoT Systems for Smart Agricultural Engineering Cloud IoT Systems for Smart Agricultural Engineering
    Add to Cart The item has been added

    Cloud IoT Systems for Smart Agricultural Engineering

    Agriculture plays a vital role in a country's growth. Modern-day technologies drive every domain toward smart systems. The use of traditional agricultural procedures to satisfy modern-day requirements is a challenging task. Cloud IoT Systems for Smart...
    $385.00

    Add to Cart The item has been added
  • The Russian Secret Police The Russian Secret Police
    Add to Cart The item has been added

    The Russian Secret Police

    This book, first published in 1970, is an important study of Russia's security services from their earliest years to the mid-twentieth century. Ronald Hingley demonstrates how the secret police acted, both under the Tsars and under Soviet rule, as a key...
    $333.00

    Add to Cart The item has been added
  • Problems of Contemporary Militarism Problems of Contemporary Militarism
    Add to Cart The item has been added

    Problems of Contemporary Militarism

    This book, first published in 1980, presents a comprehensive and detailed look at the problem of international militarisation. It examines the key issues, the meaning of the problem, the international context and the spread of militarism to the Third...
    $373.00

    Add to Cart The item has been added
  • The Security Hippie The Security Hippie
    Add to Cart The item has been added

    The Security Hippie

    The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many...
    $282.00

    Add to Cart The item has been added
  • Green Computing in Network Security Green Computing in Network Security
    Add to Cart The item has been added

    Green Computing in Network Security

    This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security...
    $311.00

    Add to Cart The item has been added
  • Internet of Energy Handbook Internet of Energy Handbook
    Add to Cart The item has been added

    Internet of Energy Handbook

    The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of...
    $296.00

    Add to Cart The item has been added
  • IoT Applications, Security Threats, and Countermeasures IoT Applications, Security Threats, and Countermeasures
    Add to Cart The item has been added

    IoT Applications, Security Threats, and Countermeasures

    The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog...
    $410.00

    Add to Cart The item has been added
  • Innovative Smart Healthcare and Bio-Medical Systems Innovative Smart Healthcare and Bio-Medical Systems
    Add to Cart The item has been added

    Innovative Smart Healthcare and Bio-Medical Systems

    Advances in smart healthcare systems (SHS) and artificial intelligence (AI) domains highlight the need for ICT systems that aim not only to improve human quality of life but improve safety too. SHS bring together concepts and methodologies from various...
    $297.00

    Add to Cart The item has been added
  • Trust and Records in an Open Digital Environment Trust and Records in an Open Digital Environment
    Add to Cart The item has been added

    Trust and Records in an Open Digital Environment

    Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records...
    $373.00

    Add to Cart The item has been added
  • High-Performance and Time-Predictable Embedded Computing High-Performance and Time-Predictable Embedded Computing
    Add to Cart The item has been added

    High-Performance and Time-Predictable Embedded Computing

    Nowadays, the prevalence of computing systems in our lives is so ubiquitous that we live in a cyber-physical world dominated by computer systems, from pacemakers to cars and airplanes. These systems demand for more computational performance to process...
    $224.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Building the Future Internet through FIRE

    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure...
    $224.00

    Add to Cart The item has been added
  • sale
    Cloud Computing and Cyber Security Cloud Computing and Cyber Security
    Add to Cart The item has been added

    Cloud Computing and Cyber Security

    As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. There is no question...
    RRP: $150.80
    $121.00

    Add to Cart The item has been added
  • sale
    Multimedia System Using Wireless Sensor Network Multimedia System Using Wireless Sensor Network
    Add to Cart The item has been added

    Multimedia System Using Wireless Sensor Network

    Wireless sensor networks are now playing an increasingly important role in many applications because of their small packet size, ease of deployment, low power consumption, wireless inter-communication capability, and self-organized dynamic topologies. In...
    RRP: $78.69
    $63.00

    Add to Cart The item has been added
  • sale
    Wireless Sensor Network for Automobile Tire  Health Monitoring Wireless Sensor Network for Automobile Tire  Health Monitoring
    Add to Cart The item has been added

    Wireless Sensor Network for Automobile Tire Health Monitoring

    Structural Health Monitoring of automobile tires has been an active area of research in the last few years. Tire manufacturers are looking to develop a sensor system that can monitor the health of an automobile tire. A sensor system that can measure the...
    RRP: $94.75
    $76.00

    Add to Cart The item has been added
  • Manager's Guide to ISO22301 Manager's Guide to ISO22301
    Add to Cart The item has been added

    Manager's Guide to ISO22301

    Have you ever wondered whether your business continuity plan is any good, or whether you've even got a business continuity plan? Anyone can write a simple document, call it a business continuity plan and hope for the best. But, unless you know that...
    $57.00

    Add to Cart The item has been added
  • THE KUBERNETES BIBLE THE KUBERNETES BIBLE
    Add to Cart The item has been added

    THE KUBERNETES BIBLE

    Get up and running with Kubernetes 1.19 and simplify the way you build, deploy, and maintain scalable distributed systemsKey Features:Design and deploy large clusters on various cloud platformsExplore containerized application deployment, debugging, and...
    $142.00

    Add to Cart The item has been added
  • The Road to Azure Cost Governance The Road to Azure Cost Governance
    Add to Cart The item has been added

    The Road to Azure Cost Governance

    Get to grips with Microsoft Azure cost management and gain complete, reliable, and sustainable control of your cloud spendKey Features:Explore resource rightsizing and cleanup methods and their implementationLearn key resource usage optimization...
    $93.00

    Add to Cart The item has been added
  • Active Directory Administration Cookbook - Second Edition Active Directory Administration Cookbook - Second Edition
    Add to Cart The item has been added

    Active Directory Administration Cookbook - Second Edition

    Simplified actionable recipes for managing Active Directory and Azure AD, as well as Azure AD Connect, for administration on-premise and in the cloud with Windows Server 2022Key Features:Expert solutions for name resolution, federation, certificates, and...
    $109.00

    Add to Cart The item has been added
  • Microsoft 365 Fundamentals Guide Microsoft 365 Fundamentals Guide
    Add to Cart The item has been added

    Microsoft 365 Fundamentals Guide

    Become a Microsoft 365 superuser and overcome challenges using the wide range of features offered by Microsoft 365 apps including SharePoint, Teams, Power Automate, Planner, and To-DoKey Features:Enhance your productivity with this consolidated guide to...
    $58.00

    Add to Cart The item has been added
  • Practical System programming for Rust developers Practical System programming for Rust developers
    Add to Cart The item has been added

    Practical System programming for Rust developers

    Explore various Rust features, data structures, libraries, and toolchain to build modern systems software with the help of hands-on examplesKey Features:Learn techniques to design and build system tools and utilities in RustExplore the different features...
    $93.00

    Add to Cart The item has been added
  • Linux Administration Best Practices Linux Administration Best Practices
    Add to Cart The item has been added

    Linux Administration Best Practices

    Gain an understanding of system administration that will remain applicable throughout your career and understand why tasks are done rather than how to do themKey Features:Deploy, secure, and maintain your Linux system in the best possible wayDiscover...
    $93.00

    Add to Cart The item has been added
  • AWS for Solutions Architects AWS for Solutions Architects
    Add to Cart The item has been added

    AWS for Solutions Architects

    Apply cloud design patterns to overcome real-world challenges by building scalable, secure, highly available, and cost-effective solutionsKey Features:Apply AWS Well-Architected Framework concepts to common real-world use casesUnderstand how to select...
    $142.00

    Add to Cart The item has been added
Computer networking and communications