Add Wish List Add to Cart The item has been added New Approaches for Security, Privacy and Trust in Complex Environments The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volume includes papers offering research contributions that focus both... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Critical Information Infrastructures The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Web Resource Space Model The author, an internationally cited expert in the knowledge grid field, introduces the Resource Space Model (RSM) to help you effectively organize and manage resources by normalizing classification semantics. After setting... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Precoding Techniques for Digital Communication Systems During the past two decades, many communication techniques have been developed to achieve various goals such as higher data rate, more robust link quality,andmoreusercapacityinmorerigorouschannelconditions.Themost well known... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Machine Learning for Multimedia Content Analysis This volume introduces machine learning techniques that are particularly powerful and effective for modeling multimedia data and common tasks of multimedia content analysis. It systematically covers key machine learning... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Sequence Data Mining Understanding sequence data, and the ability to utilize this hidden knowledge, will create a significant impact on many aspects of our society. Examples of sequence data include DNA, protein, customer purchase history, web... RRP: $209.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Soft Computing for Knowledge Discovery and Data Mining RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Botnet Detection Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Social Networks and the Semantic Web Social Networks and the Semantic Web offers valuable information to practitioners developing social-semantic software for the Web. It provides two major case studies. The first case study shows the possibilities of tracking a... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Bandwidth Extension of Speech Signals Bandwidth Extension of Speech Signals describes the theory and methods for quality enhancement of clean speech signals and distorted speech signals such as those that have undergone a band limitation, for instance, in a... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Network Control and Engineering for QoS, Security and Mobility, IV This volume contains the proceedings of the Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, NETCON 2005. The conference, organized by the International Federation for... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptanalytic Attacks on RSA RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Integrated Research in GRID Computing The aim of CoreGRID is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies in order to overcome the current fragmentation and duplication of effort in this area... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Preserving Privacy in On-Line Analytical Processing (OLAP) This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Internet Security RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CHFI Computer Hacking Forensic Investigator The Ultimate Study Guide to Ace the Exam Unlock the world of digital investigation and fortify your expertise in Computer Hacking Forensic Investigation (CHFI) with this comprehensive guide. Tailored specifically for aspirants aiming to ace the CHFI certification, this book is a roadmap to... RRP: $56.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Shaping the Future of IoT with Edge Intelligence This book presents the technologies that empower edge intelligence, along with their use in novel IoT solutions. RRP: $321.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Peer-to-Peer Collaboration RRP: $94.75 $76.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added The Evolution of Grid Computing "Divide et impera!" - The concept of subdividing complex monolithic tasks into simpler units of work is neither new nor IT-specific. But the basic idea behind grid computing would well be communicated by this ancient roman strategy. Today's IT-systems... RRP: $78.69 $63.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Network Virtualisation Could dynamic Malware analysis be more dynamic by assigning network calls an injected result, defined by the analysis process? Yes, but only if the network access was completely virtualised.This book explains how this virtualisation could be achieved... RRP: $78.69 $63.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Exposing Internet Address Use to EnhanceNetwork Security RRP: $94.75 $76.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Reading Between the Packets - Implicit Feedback in Wireless Multihop Networks RRP: $126.87 $102.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Scheduling and Flow-Related Problems in Networks Recently the number of applications in the Internet which use data broadcasts, such as pay-per-view services, has increased greatly. In broadcast scheduling one is interested in answering user requests in such services with as little bandwidth as... RRP: $78.69 $63.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Web-Customer Satisfaction RRP: $78.69 $63.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Transaction Level Modelling Using SystemC RRP: $78.69 $63.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Utility-based Resource and QoS Optimization in Packet Networks - link and network level optimization Resource Allocation (RA) is used to organize the usage of network's physical resources in such a way that guarantees optimal utilization while providing predictive performance to network flows in terms of inter-flow fairness and guaranteed Quality of... RRP: $126.87 $102.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Statistical Mechanics of Networks RRP: $94.75 $76.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Guide to Data Structures This accessible and engaging textbook/guide provides a concise introduction to data structures and associated algorithms. Emphasis is placed on the fundamentals of data structures, enabling the reader to quickly learn the key concepts, and providing a... RRP: $108.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IaaS Mastery Unlock the Power of Cloud Infrastructure with "IaaS Mastery" Book Bundle!Are you ready to conquer the dynamic world of cloud infrastructure? Look no further than the "IaaS Mastery: Infrastructure as a Service" book bundle, your comprehensive guide to... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IaC Mastery Introducing "IaC Mastery: Infrastructure as Code" - Your Ultimate Guide to Terraform, AWS, Azure, and Kubernetes! Are you ready to unlock the full potential of Infrastructure as Code (IaC) and revolutionize your cloud infrastructure management? Look no... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Metasploit Masterclass For Ethical Hackers Introducing the "Metasploit Masterclass for Ethical Hackers" Book Bundle - Your Path to Becoming a Cybersecurity Expert!���� Are you fascinated by the world of ethical hacking and cybersecurity? ���� Do you want to master the art of securing networks,... RRP: $136.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Okta Administration Up and Running - Second Edition Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey FeaturesDiscover how to use Okta for complete identity and... RRP: $109.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added The Azure IoT Handbook The essential guide to architecting Azure IoT systems-from provisioning and monitoring IoT sensors to analyzing real-time streaming dataKey FeaturesDevelop a complete IoT system in Azure with the help of hands-on examplesDiscover how to create, secure,... RRP: $68.19 $59.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Art of Social Engineering Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Implementing CI/CD Using Azure Pipelines Leverage Azure Pipelines to build, test, monitor, and deploy CI/CD solutions on Azure, AWS, and Flutter mobile apps while integrating with tools like Jenkins and SonarQube using best practicesKey Features:Develop automated end-to-end CI/CD solutions with... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Developing IoT Projects with ESP32 - Second Edition From smart sensors to cloud integration and the world of TinyML, this book is your comprehensive guide to the IoT ecosystem, using the ESP32 and industry-standard tools and technologiesKey Features:Build IoT projects from scratch using ESP32Customize... RRP: $104.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyberpocalypse Pay up or shut down. You choose. Cybercrime is on the rise and hackers have moved on from targeting individuals to targeting corporations both large and small. In recent memory, many high-profile companies have been the victim of some form of... RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Online Learning Methods for Networking This monograph provides a tutorial on a family of sequential learning and decision problems known as the multi-armed bandit problems. In such problems, any decision serves the purpose of exploring or exploiting or both. This balancing act between... RRP: $206.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Network Coding Applications Network Coding Applications looks at how ideas from network coding can have an impact on a number of new applications. Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and ... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Career Planning and Job Searching in the Information Age Career Planning and Job Searching in the Information Age answers key questions for today's providers of career-planning and job-searching information. Librarians and career development professionals' concernssuch as cost-effective use of the... RRP: $236.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Situational Awareness in Computer Network Defense Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added RFID and Sensor Networks The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies... RRP: $475.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cisco ASA for Accidental Administrators Cisco ASA for Accidental Administrators is a major update to the previous Accidental Administrator ASA book. This new edition is packed with 48 easy-to-follow hands-on exercises to help you build a working firewall configuration from scratch. Based on... RRP: $79.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Making Universal Service Policy This book is the outgrowth of shared interests between the editors and the contributing authors to provide a multidisciplinary perspective in evaluating universal service policy and recommending policy changes to accommodate a more competitive... RRP: $63.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Intelligent Broadband Multimedia Networks Intelligent Broadband Multimedia Networks is a non-mathematical, but highly systems oriented, coverage of modern intelligent information networks. This volume focuses on the convergence of computers and communications... RRP: $482.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Instruction-Level Parallelism Instruction-Level Parallelism presents a collection of papers that attempts to capture the most significant work that took place during the 1980s in the area of instruction-level (ILP) parallel processing. The papers in this... RRP: $357.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Bandpass Sigma Delta Modulators Sigma delta modulation has become a very useful and widely applied technique for high performance Analog-to-Digital (A/D) conversion of narrow band signals. Through the use of oversampling and negative feedback, the... RRP: $375.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Protocols for High-Speed Networks VI 1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem... RRP: $442.00 Add to Cart The item has been added