Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Future Trends in 5G and 6G Future Trends in 5G and 6G
    Add to Cart The item has been added

    Future Trends in 5G and 6G

    This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for...
    $257.00

    Add to Cart The item has been added
  • Universal Algebra, Algebraic Logic, and Databases Universal Algebra, Algebraic Logic, and Databases
    Add to Cart The item has been added

    Universal Algebra, Algebraic Logic, and Databases

    Modern algebra, which not long ago seemed to be a science divorced from real life, now has numerous applications. Many fine algebraic structures are endowed with meaningful contents. Now and then practice suggests new and...
    $227.00

    Add to Cart The item has been added
  • Systolic Computations Systolic Computations
    Add to Cart The item has been added

    Systolic Computations

    'Et moi, .. " si j'avait su comment en revenir, je One service mathematics bas rendered the human race. It bas put common sense back n'y serais point aile.' where it belongs, on the topmost shelf next to Jules Verne the dusty...
    $227.00

    Add to Cart The item has been added
  • Telecom Extreme Transformation Telecom Extreme Transformation
    Add to Cart The item has been added

    Telecom Extreme Transformation

    The next wave of telecommunication and service provider transformations will be very different, we call it extreme transformation, in that the communication service providers (CSP) have to become a Digital Service Provider (DSP) to stay relevant...
    $121.00

    Add to Cart The item has been added
  • Vehicular Ad Hoc Networks Vehicular Ad Hoc Networks
    Add to Cart The item has been added

    Vehicular Ad Hoc Networks

    Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction,...
    $140.00

    Add to Cart The item has been added
  • Privacy and Identity in a Networked Society Privacy and Identity in a Networked Society
    Add to Cart The item has been added

    Privacy and Identity in a Networked Society

    This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.Privacy is among the most endangered "species" in our networked society:...
    $116.00

    Add to Cart The item has been added
  • Nanoelectronics for Next-Generation Integrated Circuits Nanoelectronics for Next-Generation Integrated Circuits
    Add to Cart The item has been added

    Nanoelectronics for Next-Generation Integrated Circuits

    This volume addresses the current state-of-the art in nanoelectronic technologies and presents potential options for next-generation ICs. It will be useful reference guide for researchers, engineers, and advanced students working in the frontier areas of...
    $121.00

    Add to Cart The item has been added
  • Cloud IoT Cloud IoT
    Add to Cart The item has been added

    Cloud IoT

    IoT is based on intelligent self-configuring nodes interconnected in a dynamic and global collaborative network infrastructure. In contrast, Cloud computing has virtually unlimited capabilities in terms of storage and processing power, speed. Due to...
    $131.00

    Add to Cart The item has been added
  • Cybersecurity in the COVID-19 Pandemic Cybersecurity in the COVID-19 Pandemic
    Add to Cart The item has been added

    Cybersecurity in the COVID-19 Pandemic

    This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel,...
    $54.00

    Add to Cart The item has been added
  • Green Internet of Things for Smart Cities Green Internet of Things for Smart Cities
    Add to Cart The item has been added

    Green Internet of Things for Smart Cities

    The bright future of green IoT will change our tomorrow environment to become healthier and green, with very high quality of service that is socially, environmentally, and economically sustainable. This book covers the most recent advances in IoT, it...
    $128.00

    Add to Cart The item has been added
  • Security in IoT Security in IoT
    Add to Cart The item has been added

    Security in IoT

    This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such...
    $113.00

    Add to Cart The item has been added
  • Online Social Networks Security Online Social Networks Security
    Add to Cart The item has been added

    Online Social Networks Security

    This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs.
    $54.00

    Add to Cart The item has been added
  • Secure Searchable Encryption and Data Management Secure Searchable Encryption and Data Management
    Add to Cart The item has been added

    Secure Searchable Encryption and Data Management

    This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements...
    $54.00

    Add to Cart The item has been added
  • Cybersecurity Lessons from CoVID-19 Cybersecurity Lessons from CoVID-19
    Add to Cart The item has been added

    Cybersecurity Lessons from CoVID-19

    Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and structured by the domains of information security, this book looks at what the crisis teaches us about security.
    $54.00

    Add to Cart The item has been added
  • Smart Sensor Networks Using AI for Industry 4.0 Smart Sensor Networks Using AI for Industry 4.0
    Add to Cart The item has been added

    Smart Sensor Networks Using AI for Industry 4.0

    Smart Sensor Networks (WSNs) using AI has left a mark on the lives of all by aiding in various sectors such as manufacturing, education, healthcare, and monitoring of the environment and industries. This book covers recent AI applications and explores...
    $129.00

    Add to Cart The item has been added
  • Designing Secure Systems Designing Secure Systems
    Add to Cart The item has been added

    Designing Secure Systems

    Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. 
    $118.00

    Add to Cart The item has been added
  • Journal of Cyber Security and Mobility Journal of Cyber Security and Mobility
    Add to Cart The item has been added

    Journal of Cyber Security and Mobility

    Aim:Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field.Scope:This journal covers security issues in cyber...
    $64.00

    Add to Cart The item has been added
  • Body Sensor Network in Medical Applications Body Sensor Network in Medical Applications
    Add to Cart The item has been added

    Body Sensor Network in Medical Applications

    Body Sensor Networks (BSN) in medical applications represent a paradigm-shifting approach to healthcare through the integration of wearable sensors on the human body. These networks form a seamless connection between technology and medicine, enabling the...
    $56.00

    Add to Cart The item has been added
  • Digital Memory and Storage Digital Memory and Storage
    Add to Cart The item has been added

    Digital Memory and Storage

    Digital memory and storage technologies occupy a dominant position in electronic data processing: They are intimately interwoven with almost all aspects of a data processing system, be it the control processing unit, the...
    $92.00

    Add to Cart The item has been added
  • Mathematische Modellierung Mathematische Modellierung
    Add to Cart The item has been added

    Mathematische Modellierung

    EinfUhrung in die konkreten Probleme In diesem Band sind drei Beriehte Uber Modellierungs­ projekte gesammelt. In allen. drei Fallen werden die Er­ gebnisse einer jeweils einsemestrigen Arbeit studentiseher Gruppen dargestellt...
    $122.00

    Add to Cart The item has been added
  • Protocol engineering Protocol engineering
    Add to Cart The item has been added

    Protocol engineering

    v ------------------ Foreword It is now over twenty years since the first efforts were made to interconnect computers for the exchange of data. In the 1970s proprietary networking architectures, such as IBM's SNA, were...
    $92.00

    Add to Cart The item has been added
  • Parallelism in Logic Parallelism in Logic
    Add to Cart The item has been added

    Parallelism in Logic

    The potential of parallelism in logic reaches far beyond the exploitation of AND- and OR-parallelism usually found in attempts to parallelize PROLOG. This book discusses parallelism in logic and its exploitation on parallel...
    $83.00

    Add to Cart The item has been added
  • Node Cookbook Node Cookbook
    Add to Cart The item has been added

    Node Cookbook

    Discover practical recipes to get to grips with Node.js concepts and programming models for delivering a scalable server-side for your applicationsKey featuresImplement practical solutions for scaling, securing, and testing your Node.js web apps...
    $94.00

    Add to Cart The item has been added
  • Fedora Linux System Administration Fedora Linux System Administration
    Add to Cart The item has been added

    Fedora Linux System Administration

    Configure your Fedora Linux environment as a professional system administration workstation with this comprehensive guideKey FeaturesLeverage best practices and post-installation techniques to optimize your Fedora Linux workstationLearn how to optimize...
    $178.00

    Add to Cart The item has been added
  • Hands-On Microsoft Teams - Second Edition Hands-On Microsoft Teams - Second Edition
    Add to Cart The item has been added

    Hands-On Microsoft Teams - Second Edition

    A comprehensive guide to Teams for users and administrators, filled with real-world scenarios and best practicesKey Features:Updated with new chapters on Teams templates, the special editions of Teams, and Microsoft VivaCustomize Teams for increased...
    $93.00

    Add to Cart The item has been added
  • Certified Information Security Manager Exam Prep Guide Certified Information Security Manager Exam Prep Guide
    Add to Cart The item has been added

    Certified Information Security Manager Exam Prep Guide

    Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey Features:Pass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and...
    $175.00

    Add to Cart The item has been added
  • Wireless Telegraphy and Wireless Telephony Wireless Telegraphy and Wireless Telephony
    Add to Cart The item has been added

    Wireless Telegraphy and Wireless Telephony

    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it.This work is in the "public domain in the United States of America, and possibly other nations. Within the United...
    $57.00

    Add to Cart The item has been added
  • Indexing Techniques for Advanced Database Systems Indexing Techniques for Advanced Database Systems
    Add to Cart The item has been added

    Indexing Techniques for Advanced Database Systems

    Recent years have seen an explosive growth in the use of new database applications such as CAD/CAM systems, spatial information systems, and multimedia information systems. The needs of these applications are far more...
    $324.00

    Add to Cart The item has been added
  • Intelligent Hybrid Systems Intelligent Hybrid Systems
    Add to Cart The item has been added

    Intelligent Hybrid Systems

    Intelligent Hybrid Systems: Fuzzy Logic, Neural Networks, and Genetic Algorithms is an organized edited collection of contributed chapters covering basic principles, methodologies, and applications of fuzzy systems, neural...
    $335.00

    Add to Cart The item has been added
  • Index Data Structures in Object-Oriented Databases Index Data Structures in Object-Oriented Databases
    Add to Cart The item has been added

    Index Data Structures in Object-Oriented Databases

    Object-oriented database management systems (OODBMS) are used to imple­ ment and maintain large object databases on persistent storage. Regardless whether the underlying database model follows the object-oriented, the rela­...
    $324.00

    Add to Cart The item has been added
  • Multimedia Information Retrieval Multimedia Information Retrieval
    Add to Cart The item has been added

    Multimedia Information Retrieval

    Multimedia Information Retrieval: Content-Based Information Retrieval from Large Text and Audio Databases addresses the future need for sophisticated search techniques that will be required to find relevant information in...
    $335.00

    Add to Cart The item has been added
  • Advanced Transaction Models and Architectures Advanced Transaction Models and Architectures
    Add to Cart The item has been added

    Advanced Transaction Models and Architectures

    Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and manage corporate data, which is considered a strategic corporate re­ source. Recently, with the proliferation of personal computers...
    $324.00

    Add to Cart The item has been added
  • Video Database Systems Video Database Systems
    Add to Cart The item has been added

    Video Database Systems

    Great advances have been made in the database field. Relational and object- oriented databases, distributed and client/server databases, and large-scale data warehousing are among the more notable. However, none of these...
    $335.00

    Add to Cart The item has been added
  • Wireless ATM and Ad-Hoc Networks Wireless ATM and Ad-Hoc Networks
    Add to Cart The item has been added

    Wireless ATM and Ad-Hoc Networks

    ATM is regarded as the next high speed multimedia networking paradigm. Mobile computing, which is a confluence of mobile communications, computing and networks, is changing the way people work. Wireless ATM combines wireless...
    $335.00

    Add to Cart The item has been added
  • Searching Multimedia Databases by Content Searching Multimedia Databases by Content
    Add to Cart The item has been added

    Searching Multimedia Databases by Content

    Searching Multimedia Databases by Content bridges the gap between the database and signal processing communities by providing the necessary background information for the reader and presenting it along with the intuition and...
    $335.00

    Add to Cart The item has been added
  • SSL/TLS Under Lock and Key SSL/TLS Under Lock and Key
    Add to Cart The item has been added

    SSL/TLS Under Lock and Key

    This is the Black and White edition.If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the...
    $31.00

    Add to Cart The item has been added
  • The Expert Guide to PeopleSoft Security The Expert Guide to PeopleSoft Security
    Add to Cart The item has been added

    The Expert Guide to PeopleSoft Security

    Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.The Expert Guide to PeopleSoft Security...
    $33.00

    Add to Cart The item has been added
Computer networking and communications