Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Redes Informáticas Redes Informáticas
    Add to Cart The item has been added

    Redes Informáticas

    Si, como principiante, desea aprender los fundamentos básicos de las redes informáticas sin tener que recurrir a numerosos libros, siga leyendo...Este libro contiene una variedad de temas relacionados con las conexiones de redes, tratados desde una...
    $46.00

    Add to Cart The item has been added
  • Mastering Your Introduction to Cyber Security Mastering Your Introduction to Cyber Security
    Add to Cart The item has been added

    Mastering Your Introduction to Cyber Security

    Cyber-attacks have increased exponentially, making this book essential in areas such as Business Management, Business Continuity and Disaster Recovery, Risk Management, Compliance, and IT. Dr. Michael C. Redmond, PhD takes a complicated subject...
    $36.00

    Add to Cart The item has been added
  • Implementing Cybersecurity Implementing Cybersecurity
    Add to Cart The item has been added

    Implementing Cybersecurity

    The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as...
    $324.00

    Add to Cart The item has been added
  • Active Rules in Database Systems Active Rules in Database Systems
    Add to Cart The item has been added

    Active Rules in Database Systems

    A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules,...
    $335.00

    Add to Cart The item has been added
  • Democratizing Cryptography Democratizing Cryptography
    Add to Cart The item has been added

    Democratizing Cryptography

    In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online...
    $206.00

    Add to Cart The item has been added
  • Wireless Network Design Wireless Network Design
    Add to Cart The item has been added

    Wireless Network Design

    This book surveys state-of-the-art optimization modeling for design, analysis, and management of wireless networks, such as cellular and wireless local area networks (LANs), and the services they deliver. The past two decades have seen a tremendous...
    $335.00

    Add to Cart The item has been added
  • Advanced Verification Techniques Advanced Verification Techniques
    Add to Cart The item has been added

    Advanced Verification Techniques

    "As chip size and complexity continues to grow exponentially, the challenges of functional verification are becoming a critical issue in the electronics industry. It is now commonly heard that logical errors missed during...
    $335.00

    Add to Cart The item has been added
  • Advances in Network-Embedded Management and Applications Advances in Network-Embedded Management and Applications
    Add to Cart The item has been added

    Advances in Network-Embedded Management and Applications

    The general trend of modern network devices towards greater intelligence and programmability is accelerating the development of systems that are increasingly autonomous and to a certain degree self-managing. Examples range from router scripting...
    $324.00

    Add to Cart The item has been added
  • Machine Conversations Machine Conversations
    Add to Cart The item has been added

    Machine Conversations

    Machine Conversationsis a collection of some of the best research available in the practical arts of machine conversation. The book describes various attempts to create practical and flexible machine conversation - ways of...
    $335.00

    Add to Cart The item has been added
  • Custom Memory Management Methodology Custom Memory Management Methodology
    Add to Cart The item has been added

    Custom Memory Management Methodology

    The main intention of this book is to give an impression of the state-of-the-art in system-level memory management (data transfer and storage) related issues for complex data-dominated real-time signal and data processing...
    $270.00

    Add to Cart The item has been added
  • Exploring Virtuality Within and Beyond Organizations Exploring Virtuality Within and Beyond Organizations
    Add to Cart The item has been added

    Exploring Virtuality Within and Beyond Organizations

    In recent years, there has been much interest in the 'virtual' -teams, organizations and communities -in management research and practice. As technology and social practices change we have more opportunity to experience different forms of virtuality, and...
    $122.00

    Add to Cart The item has been added
  • Building the Network of the Future Building the Network of the Future
    Add to Cart The item has been added

    Building the Network of the Future

    From the Foreword:"This book lays out much of what we've learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn't to predict the future but to help...
    $128.00

    Add to Cart The item has been added
  • Let's Get IoT-fied! Let's Get IoT-fied!
    Add to Cart The item has been added

    Let's Get IoT-fied!

    Internet of Things (IoT) stands acclaimed as a widespread area of research and has definitely enticed the interests of almost the entire globe. IoT appears to be the present as well as the future technology. This book attempts to inspire readers to...
    $105.00

    Add to Cart The item has been added
  • Cloud Data Center Network Architectures and Technologies Cloud Data Center Network Architectures and Technologies
    Add to Cart The item has been added

    Cloud Data Center Network Architectures and Technologies

    Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This...
    $282.00

    Add to Cart The item has been added
  • Distributed Denial of Service (DDoS) Attacks Distributed Denial of Service (DDoS) Attacks
    Add to Cart The item has been added

    Distributed Denial of Service (DDoS) Attacks

    The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving...
    $128.00

    Add to Cart The item has been added
  • Online Services and Lab Glass Online Services and Lab Glass
    Add to Cart The item has been added

    Online Services and Lab Glass

    This book presents one of the major challenges of the globalization era, with focus on cloud computing and forensic investigation. The menace posed by cybercriminals to organizations which try to step up their security, from cyber attacks, ransomware and...
    $46.00

    Add to Cart The item has been added
  • IT Resilience IT Resilience
    Add to Cart The item has been added

    IT Resilience

     It is of the utmost importance for businesses in this day and age, in which they are growing more and more dependent on technology, to have the ability to ensure that their operations continue unabated in the face of disruptions and natural...
    $62.00

    Add to Cart The item has been added
  • 5G and Cloud 5G and Cloud
    Add to Cart The item has been added

    5G and Cloud

    In the fast-paced world of telecommunications, two technologies have emerged as the unrivaled powerhouses transforming the industry - 5G and cloud computing. "5G and Cloud: Telecom's Dynamic Duo" delves deep into the remarkable synergy between 5G...
    $52.00

    Add to Cart The item has been added
  • Cloud-First Strategies Cloud-First Strategies
    Add to Cart The item has been added

    Cloud-First Strategies

    "Cloud-First Techniques: The Fate of IT Foundation in India" is a canny and forward-looking investigation into the groundbreaking force of distributed computing in the Indian setting. This exhaustive book analyzes how cloud-first methodologies are...
    $58.00

    Add to Cart The item has been added
  • Einsatzmöglichkeiten des Cloud Computings Einsatzmöglichkeiten des Cloud Computings
    Add to Cart The item has been added

    Einsatzmöglichkeiten des Cloud Computings

    Ein wichtiger IT-Trend der vergangenen und wohl auch der kommenden Jahre ist Cloud-Computing. Nach einer Umfrage des BITKOM in der ITK-Branche belegt Cloud-Computing zum dritten Mal in Folge den Spitzenplatz der wichtigsten Technologie- und Markttrends...
    $113.00

    Add to Cart The item has been added
  • Analyzing Online Voting Systems for Flaw Detection Analyzing Online Voting Systems for Flaw Detection
    Add to Cart The item has been added

    Analyzing Online Voting Systems for Flaw Detection

    Research Paper (postgraduate) from the year 2015 in the subject Computer Science - IT-Security, grade: A, , language: English, abstract: This research paper contains several case studies concerning online voting manipulation. Case studies data are...
    $70.00

    Add to Cart The item has been added
  • sale
    Wireless and Power Line Data Communication Wireless and Power Line Data Communication
    Add to Cart The item has been added

    Wireless and Power Line Data Communication

    In recent times there has been a large growth in the number of small communications networks in the home or office. Cash registers, burglar alarms, computers and their peripherals all rely on small interconnected networks. A number of networking...
    RRP: $94.75
    $76.00

    Add to Cart The item has been added
  • High Performance Computing High Performance Computing
    Add to Cart The item has been added

    High Performance Computing

    This book constitutes the proceedings of the Third Latin American Conference on High Performance Computing, CARLA 2016, held in Mexico City, Mexico, in August/September 2016.The 30 papers presented in this volume were carefully reviewed and selected from...
    $181.00

    Add to Cart The item has been added
  • Konzepte der Betriebssysteme Konzepte der Betriebssysteme
    Add to Cart The item has been added

    Konzepte der Betriebssysteme

    Das Buch präsentiert in vergleichender Darstellung die wesentlichen Funktionen von Betriebssystemen: Prozeßverwaltung, Speicherverwaltung, Ein- und Ausgabe, Dateiverwaltung, Datenschutz und Benutzerschnittstellen. Praktische...
    $92.00

    Add to Cart The item has been added
  • Programmieren von Ziffernrechenanlagen Programmieren von Ziffernrechenanlagen
    Add to Cart The item has been added

    Programmieren von Ziffernrechenanlagen

    Die Absicht, ein Buch iiber Programmieren von Ziffernrechenanlagen zu schreiben, entstand auf Grund einer Vorlesung gleichen Titels, die ich seit nunmehr sieben Jahren an der Technischen Hochschule Wien halte. Ich hatte dabei...
    $122.00

    Add to Cart The item has been added
  • Applied Cryptography and Network Security Applied Cryptography and Network Security
    Add to Cart The item has been added

    Applied Cryptography and Network Security

    This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually...
    $181.00

    Add to Cart The item has been added
  • Algorithmic Aspects of Cloud Computing Algorithmic Aspects of Cloud Computing
    Add to Cart The item has been added

    Algorithmic Aspects of Cloud Computing

    This book constitutes the refereed post-conference proceedings of the 5th International Symposium on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2019, held in Munich, Germany, in September 2019.The 8 revised full papers were carefully reviewed and...
    $129.00

    Add to Cart The item has been added
  • Augmented Reality, Virtual Reality, and Computer Graphics Augmented Reality, Virtual Reality, and Computer Graphics
    Add to Cart The item has been added

    Augmented Reality, Virtual Reality, and Computer Graphics

    The 2-volume set LNCS 12242 and 12243 constitutes the refereed proceedings of the 7th International Conference on Augmented Reality, Virtual Reality, and Computer Graphics, AVR 2020, held in Lecce, Italy, in September 2020.*The 45 full papers and 14...
    $187.00

    Add to Cart The item has been added
  • Parallel Processing and Applied Mathematics Parallel Processing and Applied Mathematics
    Add to Cart The item has been added

    Parallel Processing and Applied Mathematics

    The two-volume set LNCS 12043 and 12044 constitutes revised selected papers from the 13th International Conference on Parallel Processing and Applied Mathematics, PPAM 2019, held in Bialystok, Poland, in September 2019.The 91 regular papers presented in...
    $187.00

    Add to Cart The item has been added
  • Computational Complexity and Property Testing Computational Complexity and Property Testing
    Add to Cart The item has been added

    Computational Complexity and Property Testing

    This volume contains a collection of studies in the areas of complexity theory and property testing. The 21 pieces of scientific work included were conducted at different times, mostly during the last decade. Although most of these works have been cited...
    $187.00

    Add to Cart The item has been added
  • VLSI-SoC VLSI-SoC
    Add to Cart The item has been added

    VLSI-SoC

    This book contains extended and revised versions of the best papers presented at the 25th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2017, held in Abu Dhabi, United Arab Emirates, in August 2017. The 11...
    $98.00

    Add to Cart The item has been added
  • Cybersecurity in Nigeria Cybersecurity in Nigeria
    Add to Cart The item has been added

    Cybersecurity in Nigeria

    This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are...
    $123.00

    Add to Cart The item has been added
  • Real-Time & Stream Data Management Real-Time & Stream Data Management
    Add to Cart The item has been added

    Real-Time & Stream Data Management

    While traditional databases excel at complex queries over historical data, they are inherently pull-based and therefore ill-equipped to push new information to clients. Systems for data stream management and processing, on the other hand, are natively...
    $129.00

    Add to Cart The item has been added
Computer networking and communications