Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Critical Information Infrastructures Critical Information Infrastructures
    Add to Cart The item has been added

    Critical Information Infrastructures

    The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various...
    $184.00

    Add to Cart The item has been added
  • The Web Resource Space Model The Web Resource Space Model
    Add to Cart The item has been added

    The Web Resource Space Model

    The author, an internationally cited expert in the knowledge grid field, introduces the Resource Space Model (RSM) to help you effectively organize and manage resources by normalizing classification semantics. After setting...
    $227.00

    Add to Cart The item has been added
  • Machine Learning for Multimedia Content Analysis Machine Learning for Multimedia Content Analysis
    Add to Cart The item has been added

    Machine Learning for Multimedia Content Analysis

    This volume introduces machine learning techniques that are particularly powerful and effective for modeling multimedia data and common tasks of multimedia content analysis. It systematically covers key machine learning...
    $184.00

    Add to Cart The item has been added
  • Sequence Data Mining Sequence Data Mining
    Add to Cart The item has been added

    Sequence Data Mining

    Understanding sequence data, and the ability to utilize this hidden knowledge, will create a significant impact on many aspects of our society. Examples of sequence data include DNA, protein, customer purchase history, web...
    $209.00

    Add to Cart The item has been added
  • Botnet Detection Botnet Detection
    Add to Cart The item has been added

    Botnet Detection

    Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security...
    $220.00

    Add to Cart The item has been added
  • Social Networks and the Semantic Web Social Networks and the Semantic Web
    Add to Cart The item has been added

    Social Networks and the Semantic Web

    Social Networks and the Semantic Web offers valuable information to practitioners developing social-semantic software for the Web. It provides two major case studies. The first case study shows the possibilities of tracking a...
    $220.00

    Add to Cart The item has been added
  • Bandwidth Extension of Speech Signals Bandwidth Extension of Speech Signals
    Add to Cart The item has been added

    Bandwidth Extension of Speech Signals

    Bandwidth Extension of Speech Signals describes the theory and methods for quality enhancement of clean speech signals and distorted speech signals such as those that have undergone a band limitation, for instance, in a...
    $184.00

    Add to Cart The item has been added
  • Cryptanalytic Attacks on RSA Cryptanalytic Attacks on RSA
    Add to Cart The item has been added

    Cryptanalytic Attacks on RSA

    RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks...
    $220.00

    Add to Cart The item has been added
  • Integrated Research in GRID Computing Integrated Research in GRID Computing
    Add to Cart The item has been added

    Integrated Research in GRID Computing

    The aim of CoreGRID is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies in order to overcome the current fragmentation and duplication of effort in this area...
    $220.00

    Add to Cart The item has been added
  • sale
    The Evolution of Grid Computing The Evolution of Grid Computing
    Add to Cart The item has been added

    The Evolution of Grid Computing

    "Divide et impera!" - The concept of subdividing complex monolithic tasks into simpler units of work is neither new nor IT-specific. But the basic idea behind grid computing would well be communicated by this ancient roman strategy. Today's IT-systems...
    RRP: $78.69
    $63.00

    Add to Cart The item has been added
  • sale
    Network Virtualisation Network Virtualisation
    Add to Cart The item has been added

    Network Virtualisation

    Could dynamic Malware analysis be more dynamic by assigning net­work calls an injected result, defined by the analysis process? Yes, but only if the network access was completely virtualised.This book explains how this virtualisation could be achieved...
    RRP: $78.69
    $63.00

    Add to Cart The item has been added
  • sale
    Scheduling and Flow-Related Problems in Networks Scheduling and Flow-Related Problems in Networks
    Add to Cart The item has been added

    Scheduling and Flow-Related Problems in Networks

    Recently the number of applications in the Internet which use data broad­casts, such as pay-per-view services, has increased greatly. In broadcast scheduling one is interested in answering user requests in such services with as little bandwidth as...
    RRP: $78.69
    $63.00

    Add to Cart The item has been added
  • Guide to Data Structures Guide to Data Structures
    Add to Cart The item has been added

    Guide to Data Structures

    This accessible and engaging textbook/guide provides a concise introduction to data structures and associated algorithms. Emphasis is placed on the fundamentals of data structures, enabling the reader to quickly learn the key concepts, and providing a...
    $108.00

    Add to Cart The item has been added
  • IaaS Mastery IaaS Mastery
    Add to Cart The item has been added

    IaaS Mastery

    Unlock the Power of Cloud Infrastructure with "IaaS Mastery" Book Bundle!Are you ready to conquer the dynamic world of cloud infrastructure? Look no further than the "IaaS Mastery: Infrastructure as a Service" book bundle, your comprehensive guide to...
    $92.00

    Add to Cart The item has been added
  • IaC Mastery IaC Mastery
    Add to Cart The item has been added

    IaC Mastery

    Introducing "IaC Mastery: Infrastructure as Code" - Your Ultimate Guide to Terraform, AWS, Azure, and Kubernetes! Are you ready to unlock the full potential of Infrastructure as Code (IaC) and revolutionize your cloud infrastructure management? Look no...
    $73.00

    Add to Cart The item has been added
  • Metasploit Masterclass For Ethical Hackers Metasploit Masterclass For Ethical Hackers
    Add to Cart The item has been added

    Metasploit Masterclass For Ethical Hackers

    Introducing the "Metasploit Masterclass for Ethical Hackers" Book Bundle - Your Path to Becoming a Cybersecurity Expert!���� Are you fascinated by the world of ethical hacking and cybersecurity? ���� Do you want to master the art of securing networks,...
    $136.00

    Add to Cart The item has been added
  • Okta Administration Up and Running - Second Edition Okta Administration Up and Running - Second Edition
    Add to Cart The item has been added

    Okta Administration Up and Running - Second Edition

    Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey FeaturesDiscover how to use Okta for complete identity and...
    $109.00

    Add to Cart The item has been added
  • sale
    The Azure IoT Handbook The Azure IoT Handbook
    Add to Cart The item has been added

    The Azure IoT Handbook

    The essential guide to architecting Azure IoT systems-from provisioning and monitoring IoT sensors to analyzing real-time streaming dataKey FeaturesDevelop a complete IoT system in Azure with the help of hands-on examplesDiscover how to create, secure,...
    RRP: $68.19
    $59.00

    Add to Cart The item has been added
  • The Art of Social Engineering The Art of Social Engineering
    Add to Cart The item has been added

    The Art of Social Engineering

    Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods...
    $98.00

    Add to Cart The item has been added
  • Implementing CI/CD Using Azure Pipelines Implementing CI/CD Using Azure Pipelines
    Add to Cart The item has been added

    Implementing CI/CD Using Azure Pipelines

    Leverage Azure Pipelines to build, test, monitor, and deploy CI/CD solutions on Azure, AWS, and Flutter mobile apps while integrating with tools like Jenkins and SonarQube using best practicesKey Features:Develop automated end-to-end CI/CD solutions with...
    $109.00

    Add to Cart The item has been added
  • Developing IoT Projects with ESP32 - Second Edition Developing IoT Projects with ESP32 - Second Edition
    Add to Cart The item has been added

    Developing IoT Projects with ESP32 - Second Edition

    From smart sensors to cloud integration and the world of TinyML, this book is your comprehensive guide to the IoT ecosystem, using the ESP32 and industry-standard tools and technologiesKey Features:Build IoT projects from scratch using ESP32Customize...
    $104.00

    Add to Cart The item has been added
  • Cyberpocalypse Cyberpocalypse
    Add to Cart The item has been added

    Cyberpocalypse

    Pay up or shut down. You choose. Cybercrime is on the rise and hackers have moved on from targeting individuals to targeting corporations both large and small. In recent memory, many high-profile companies have been the victim of some form of...
    $27.00

    Add to Cart The item has been added
  • Online Learning Methods for Networking Online Learning Methods for Networking
    Add to Cart The item has been added

    Online Learning Methods for Networking

    This monograph provides a tutorial on a family of sequential learning and decision problems known as the multi-armed bandit problems. In such problems, any decision serves the purpose of exploring or exploiting or both. This balancing act between...
    $206.00

    Add to Cart The item has been added
  • Network Coding Applications Network Coding Applications
    Add to Cart The item has been added

    Network Coding Applications

    Network Coding Applications looks at how ideas from network coding can have an impact on a number of new applications. Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and ...
    $216.00

    Add to Cart The item has been added
  • Career Planning and Job Searching in the Information Age Career Planning and Job Searching in the Information Age
    Add to Cart The item has been added

    Career Planning and Job Searching in the Information Age

    Career Planning and Job Searching in the Information Age answers key questions for today's providers of career-planning and job-searching information. Librarians and career development professionals' concerns—such as cost-effective use of the...
    $236.00

    Add to Cart The item has been added
  • Situational Awareness in Computer Network Defense Situational Awareness in Computer Network Defense
    Add to Cart The item has been added

    Situational Awareness in Computer Network Defense

    Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security...
    $441.00

    Add to Cart The item has been added
  • RFID and Sensor Networks RFID and Sensor Networks
    Add to Cart The item has been added

    RFID and Sensor Networks

    The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies...
    $475.00

    Add to Cart The item has been added
  • Cisco ASA for Accidental Administrators Cisco ASA for Accidental Administrators
    Add to Cart The item has been added

    Cisco ASA for Accidental Administrators

    Cisco ASA for Accidental Administrators is a major update to the previous Accidental Administrator ASA book. This new edition is packed with 48 easy-to-follow hands-on exercises to help you build a working firewall configuration from scratch. Based on...
    $79.00

    Add to Cart The item has been added
  • Making Universal Service Policy Making Universal Service Policy
    Add to Cart The item has been added

    Making Universal Service Policy

    This book is the outgrowth of shared interests between the editors and the contributing authors to provide a multidisciplinary perspective in evaluating universal service policy and recommending policy changes to accommodate a more competitive...
    $63.00

    Add to Cart The item has been added
  • Intelligent Broadband Multimedia Networks Intelligent Broadband Multimedia Networks
    Add to Cart The item has been added

    Intelligent Broadband Multimedia Networks

    Intelligent Broadband Multimedia Networks is a non-mathematical, but highly systems oriented, coverage of modern intelligent information networks. This volume focuses on the convergence of computers and communications...
    $482.00

    Add to Cart The item has been added
  • Instruction-Level Parallelism Instruction-Level Parallelism
    Add to Cart The item has been added

    Instruction-Level Parallelism

    Instruction-Level Parallelism presents a collection of papers that attempts to capture the most significant work that took place during the 1980s in the area of instruction-level (ILP) parallel processing. The papers in this...
    $357.00

    Add to Cart The item has been added
  • Bandpass Sigma Delta Modulators Bandpass Sigma Delta Modulators
    Add to Cart The item has been added

    Bandpass Sigma Delta Modulators

    Sigma delta modulation has become a very useful and widely applied technique for high performance Analog-to-Digital (A/D) conversion of narrow band signals. Through the use of oversampling and negative feedback, the...
    $375.00

    Add to Cart The item has been added
  • Protocols for High-Speed Networks VI Protocols for High-Speed Networks VI
    Add to Cart The item has been added

    Protocols for High-Speed Networks VI

    1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem...
    $442.00

    Add to Cart The item has been added
Computer networking and communications