Computer networking and communications Books

Sidebar Sidebar Sidebar
  • Open Innovation in Firms and Public Administrations Open Innovation in Firms and Public Administrations
    Add to Cart The item has been added

    Open Innovation in Firms and Public Administrations

    Economic globalization and the application of information and communication technologies have offered firms the opportunity to develop and distribute new knowledge. Open Innovation in Firms and Public Administrations: Technologies for Value Creation...
    $418.00

    Add to Cart The item has been added
  • E-Parliament and ICT-Based Legislation E-Parliament and ICT-Based Legislation
    Add to Cart The item has been added

    E-Parliament and ICT-Based Legislation

    Concepts such as e-voting, e-democracy, e-participation, online campaigning, and e-parliament are the most powerful proof of the use of ICTs in political activities, processes, and institutions. E-Parliament and ICT-Based Legislation: Concept,...
    $407.00

    Add to Cart The item has been added
  • Systems Science and Collaborative Information Systems Systems Science and Collaborative Information Systems
    Add to Cart The item has been added

    Systems Science and Collaborative Information Systems

    Recent changes in information science have emerged as a result of challenges faced by the business, social, and scientific worlds, as well as continued progress in information and communication technologies. Organizations have begun to seek collaborative...
    $396.00

    Add to Cart The item has been added
  • Resilient Optical Network Design Resilient Optical Network Design
    Add to Cart The item has been added

    Resilient Optical Network Design

    Dense wavelength division multiplexing (DWDM) optical networks are prone to failure, which can potentially lead to a catastrophic loss of data and revenue. Given this, one of the most important optical network design issues is survivability or the...
    $430.00

    Add to Cart The item has been added
  • Continuous Authentication Using Biometrics Continuous Authentication Using Biometrics
    Add to Cart The item has been added

    Continuous Authentication Using Biometrics

    User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of...
    $441.00

    Add to Cart The item has been added
  • Computational and Data Grids Computational and Data Grids
    Add to Cart The item has been added

    Computational and Data Grids

    Grid computing promises to transform the way organizations and individuals compute, communicate, and collaborate. Computational and Data Grids: Principles, Applications and Design offers critical perspectives on theoretical frameworks, methodologies,...
    $441.00

    Add to Cart The item has been added
  • Networked Sociability and Individualism Networked Sociability and Individualism
    Add to Cart The item has been added

    Networked Sociability and Individualism

    The recent popularity of Social Network Sites (SNS) shows that there is a growing interest in articulating, making visible, and managing personal or professional relationships through technology-enabled environments. Networked Sociability and...
    $396.00

    Add to Cart The item has been added
  • Achieving Real-Time in Distributed Computing Achieving Real-Time in Distributed Computing
    Add to Cart The item has been added

    Achieving Real-Time in Distributed Computing

    Real-time systems are of importance to a large number of university laboratories and research institutes worldwide, and without the proper integration of real-time into distributed computing, institutions simply could not function. Achieving Real-Time in...
    $441.00

    Add to Cart The item has been added
  • Relief Supply Chain Management for Disasters Relief Supply Chain Management for Disasters
    Add to Cart The item has been added

    Relief Supply Chain Management for Disasters

    Relief supply chains are the most agile and dynamic supply chains, yet research in this area of supply chain management (SCM) is limited. Relief Supply Chain Management for Disasters: Humanitarian, Aid and Emergency Logistics furthers the scholarly...
    $441.00

    Add to Cart The item has been added
  • Network Security, Administration and Management Network Security, Administration and Management
    Add to Cart The item has been added

    Network Security, Administration and Management

    The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific...
    $441.00

    Add to Cart The item has been added
  • Cloud, Grid and High Performance Computing Cloud, Grid and High Performance Computing
    Add to Cart The item has been added

    Cloud, Grid and High Performance Computing

    Continuing to stretch the boundaries of computing and the types of problems computers can solve, high performance, cloud, and grid computing have emerged to address increasingly advanced issues by combining resources. Cloud, Grid and High Performance...
    $407.00

    Add to Cart The item has been added
  • ICT Ethics and Security in the 21st Century ICT Ethics and Security in the 21st Century
    Add to Cart The item has been added

    ICT Ethics and Security in the 21st Century

    The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption of and access to new products, tools, and software. ICT Ethics and Security in the 21st Century: New...
    $407.00

    Add to Cart The item has been added
  • New Generation of Portal Software and Engineering New Generation of Portal Software and Engineering
    Add to Cart The item has been added

    New Generation of Portal Software and Engineering

    Portals and Service Oriented Architecture in general are important areas of study given the growing complexity of modern technology systems. A Portal provides a means of presenting information in an on-line environment. Portals today are widely...
    $407.00

    Add to Cart The item has been added
  • New Technologies for Digital Crime and Forensics New Technologies for Digital Crime and Forensics
    Add to Cart The item has been added

    New Technologies for Digital Crime and Forensics

    Central to understanding and combating digital crime is the ability to develop new methods for the collection and analysis of electronic evidence. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories,...
    $407.00

    Add to Cart The item has been added
  • Security and Privacy Assurance in Advancing Technologies Security and Privacy Assurance in Advancing Technologies
    Add to Cart The item has been added

    Security and Privacy Assurance in Advancing Technologies

    Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental...
    $407.00

    Add to Cart The item has been added
  • Actor-Network Theory and Technology Innovation Actor-Network Theory and Technology Innovation
    Add to Cart The item has been added

    Actor-Network Theory and Technology Innovation

    About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn't until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting...
    $407.00

    Add to Cart The item has been added
  • Personal Data Privacy and Protection in a Surveillance Era Personal Data Privacy and Protection in a Surveillance Era
    Add to Cart The item has been added

    Personal Data Privacy and Protection in a Surveillance Era

    In recent years, with rapidly advancing technology and a more globalized culture, the importance of privacy has become paramount. The legal protection of privacy against these new technological threats is a major discussion point in Europe as well as in...
    $407.00

    Add to Cart The item has been added
  • ICT Acceptance, Investment and Organization ICT Acceptance, Investment and Organization
    Add to Cart The item has been added

    ICT Acceptance, Investment and Organization

    The Arab world exhibits its own values and beliefs and poses specific challenges that are reflected on its practices of systems development, implementation and management. ICT is at the forefront of those challenges. ICT Acceptance, Investment and...
    $407.00

    Add to Cart The item has been added
  • Computer Vision for Multimedia Applications Computer Vision for Multimedia Applications
    Add to Cart The item has been added

    Computer Vision for Multimedia Applications

    Although a number of methods for solving computer vision tasks exist, these methods are often task-specific and can seldom be generalized over a wide range of applications. In addition, many computer vision algorithms have not been thoroughly studied...
    $407.00

    Add to Cart The item has been added
  • APPLICATIONS AND TRENDS IN FINTECH II APPLICATIONS AND TRENDS IN FINTECH II
    Add to Cart The item has been added

    APPLICATIONS AND TRENDS IN FINTECH II

    This book is the second part of Applications and Trends in Fintech, which serves as a comprehensive guide to the advanced topics in fintech, including the deep learning and natural language processing algorithms, blockchain design thinking, token...
    $176.00

    Add to Cart The item has been added
  • The Intelligence Pyramid The Intelligence Pyramid
    Add to Cart The item has been added

    The Intelligence Pyramid

    Build a Proactive Cyber Intelligence Team with Real-World Strategies from Military and Corporate Experts.Building an effective cyber intelligence team is more challenging than ever in a world where cyber threats evolve faster than most organizations can...
    $49.00

    Add to Cart The item has been added
  • Hacking for Beginners Hacking for Beginners
    Add to Cart The item has been added

    Hacking for Beginners

    Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need...
    $26.00

    Add to Cart The item has been added
  • Certified Kubernetes Administrator (CKA) Exam Guide Certified Kubernetes Administrator (CKA) Exam Guide
    Add to Cart The item has been added

    Certified Kubernetes Administrator (CKA) Exam Guide

    Conquer the CNCF Certified Kubernetes Administrator (CKA) examDESCRIPTION Kubernetes is the de facto industry-standard for production-grade container orchestration. The CNCF Certified Kubernetes Administrator (CKA) Certification is an in-demand,...
    $96.00

    Add to Cart The item has been added
  • Ethernet Network- to Network Interconnection (E-NNI) Ethernet Network- to Network Interconnection (E-NNI)
    Add to Cart The item has been added

    Ethernet Network- to Network Interconnection (E-NNI)

    ISO/OSI Schichtenmodell entsprechend über verschiedene Techniken übertragen werden. Diese Techniken wurden auf kompatible Features untersucht - mit Blick darauf, wie diese Features für die virtuelle Ethernet Schnittstelle (NNI) genutzt werden könnten...
    $157.00

    Add to Cart The item has been added
  • Militärische Kommunikationstechnik Militärische Kommunikationstechnik
    Add to Cart The item has been added

    Militärische Kommunikationstechnik

    Wer heute von Funknetzen spricht, meint damit meist ein WLAN. Nur wenige denken noch an die Mobilfunknetze UMTS oder GSM. Daß auch im Bereich der Behörden und Organisationen mit Sicherheitsaufgaben ein hoher Bedarf an mobiler Kommunikation besteht und...
    $77.00

    Add to Cart The item has been added
  • Azure und Microsoft 365 Security Azure und Microsoft 365 Security
    Add to Cart The item has been added

    Azure und Microsoft 365 Security

    Dieses Buch liefert eine umfassende Abhandlung der Azure und Microsoft 365 Security Technologien und Features. Es richtet sich an IT-Systemarchitekten, Berater sowie Administratoren und sorgt für ein tiefgreifendes Verständnis über das Zusammenspiel der...
    $161.00

    Add to Cart The item has been added
  • sale
    Security and Privacy in Mobile Ad Hoc Networks Security and Privacy in Mobile Ad Hoc Networks
    Add to Cart The item has been added

    Security and Privacy in Mobile Ad Hoc Networks

    Compared to wired networks, mobile ad hoc networks are much more vulnerable to security attacks. This is mainly due to its features of open medium, dynamic topology, cooperative algorithms, lack of centralized monitoring and management point. In this...
    RRP: $109.21
    $88.00

    Add to Cart The item has been added
  • sale
    Multi-Objective Optimization in Multicast Flows Multi-Objective Optimization in Multicast Flows
    Add to Cart The item has been added

    Multi-Objective Optimization in Multicast Flows

    Many new multicast applications emerging from theInternet, such as TV over theInternet, Radio over the Internet, Video Streamingmulti-point, etc., need the followingresource requirements: bandwidth consumption,end-to-end delay, packet loss ratio,etc. It...
    RRP: $109.21
    $88.00

    Add to Cart The item has been added
  • TCP/IP TCP/IP
    Add to Cart The item has been added

    TCP/IP

    Unleash Your Networking Potential with the TCP/IP Network+ Protocols and Campus LAN Switching Fundamentals Bundle!Are you ready to master the art of networking? Whether you're a beginner looking to kickstart your networking journey or an experienced...
    $92.00

    Add to Cart The item has been added
  • Cyberwatch 101 Cyberwatch 101
    Add to Cart The item has been added

    Cyberwatch 101

    Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your...
    $91.00

    Add to Cart The item has been added
  • OSINT Commando OSINT Commando
    Add to Cart The item has been added

    OSINT Commando

    ����️‍♂️ OSINT COMMANDO Book Bundle ����Are you ready to unlock the secrets of the digital world and become a master of Open-Source Intelligence (OSINT)? Look no further! Introducing the OSINT COMMANDO Book Bundle, your ultimate guide to penetrating...
    $91.00

    Add to Cart The item has been added
  • Microsoft Azure Administrator - Exam Guide AZ-103 Microsoft Azure Administrator - Exam Guide AZ-103
    Add to Cart The item has been added

    Microsoft Azure Administrator - Exam Guide AZ-103

    Manage Microsoft Azure cloud services that span storage, security, networking, and compute cloud capabilities and ace the AZ-103 ExamKey FeaturesLearn features and concepts related to Azure's administration servicesGain an understanding of different...
    $93.00

    Add to Cart The item has been added
  • Building Industrial Digital Twins Building Industrial Digital Twins
    Add to Cart The item has been added

    Building Industrial Digital Twins

    Build your first digital twin MVP and gain first-hand experience of using the technology, the challenges it presents, and its impact on your organizationKey Features:- Create a digital twin prototype using Microsoft Azure Digital Twin- Explore the...
    $137.00

    Add to Cart The item has been added
  • Pentesting APIs Pentesting APIs
    Add to Cart The item has been added

    Pentesting APIs

    Learn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approachKey Features:- Gain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIs- Follow practical advice and...
    $98.00

    Add to Cart The item has been added
  • Enhancing Your Cloud Security with a CNAPP Solution Enhancing Your Cloud Security with a CNAPP Solution
    Add to Cart The item has been added

    Enhancing Your Cloud Security with a CNAPP Solution

    Implement the entire CNAPP lifecycle from designing, planning, adopting, deploying, and operationalizing to enhance your organization's overall cloud security posture.Key Features:- Master the CNAPP lifecycle from planning to operationalization using...
    $109.00

    Add to Cart The item has been added
  • AWS Cloud Projects AWS Cloud Projects
    Add to Cart The item has been added

    AWS Cloud Projects

    Gain a deeper understanding of AWS services by building eight real-world projectsKey Features:- Gain practical skills in architecting, deploying, and managing applications on AWS from seasoned experts- Get hands-on experience by building different...
    $84.00

    Add to Cart The item has been added
  • AWS Security Cookbook - Second Edition AWS Security Cookbook - Second Edition
    Add to Cart The item has been added

    AWS Security Cookbook - Second Edition

    Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, while following cloud security best practicesKey Features:- Explore useful recipes for implementing robust cloud security solutions on...
    $98.00

    Add to Cart The item has been added
  • Modern Network Observability Modern Network Observability
    Add to Cart The item has been added

    Modern Network Observability

    Learn how to use modern monitoring tools for building network observability solutions that enhance operations and promote an effective automation strategy, with step-by-step guidance and practical examples Key Features:- Craft a dynamic observability...
    $109.00

    Add to Cart The item has been added
  • VMware Cloud on AWS Blueprint VMware Cloud on AWS Blueprint
    Add to Cart The item has been added

    VMware Cloud on AWS Blueprint

    Explore use cases and best practices to seamlessly migrate and scale legacy enterprise-grade applications running on on-premises vSphere environments to VMware Cloud SDDCs running on AWS infrastructureKey FeaturesUnderstand data center extension,...
    $98.00

    Add to Cart The item has been added
Computer networking and communications