Computer Networking & Communications
-
Sold out
Into the Networked Age
James W. Cortada€36.50In this dynamic book, based on the most effective strategies of IBM and other market leaders, managers will learn to successfully transform their o...
View full details€36.50Sold out -
Sold out
Cloud Observability with Azure Monitor
José Ángel Fernández€42.99Implement real-time monitoring, visualization, analytics, and troubleshooting strategies on Azure to ensure optimal performance and reliability in ...
View full details€42.99Sold out -
Sale
SharePoint For Dummies
Ken Withee€28.50Become a SharePoint power user with this quick-and-easy guide to its many features SharePoint For Dummies is your trusted instruction manual as you...
View full details€28.50Sale -
Sale Redefining Information Security
Brian Wagner€129.99Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively ...
View full details€129.99Sale -
Sale AI for Design and Optimization of Cellular Networks
John Wiley & Sons Inc€112.99Vital information on AI, ML, and 5G, and implementing these topics for cellular network design and optimization AI for Design and Optimization of C...
View full details€112.99Sale -
Sale
Redefining Information Security
Brian Wagner€43.99Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively ...
View full details€43.99Sale -
Sold out
Plunkett's Computers, Hardware & Software Industry Almanac 2020
Jack W. Plunkett€390.60Formally Plunkett's InfoTech Industry Almanac, this book presents a complete analysis of the technology business, including hardware, software, net...
View full details€390.60Sold out -
Sale Guardians of Data
Nik Zulkarnaen Khidzir€77.99Guardians of Data: A Comprehensive Guide to Digital Data Protection which helps to reduce risks of data loss by monitoring and controlling the flow...
View full details€77.99Sale -
Sold out
Mechanics of User Identification and Authentication
Dobromir Todorov€132.99User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems a...
View full details€132.99Sold out -
Sold out
Building and Maintaining a Data Warehouse
Fon Silvers€102.99As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed p...
View full details€102.99Sold out -
Sold out
Rhetorical Code Studies
The University of Michigan Press€55.99Winner of the 2017 Sweetland Digital Rhetoric Collaborative Book Prize Software developers work rhetorically to make meaning through the code they ...
View full details€55.99Sold out -
Sold out
Art of Software Modeling
Benjamin A. Lieberman€97.99Modeling complex systems is a difficult challenge and all too often one in which modelers are left to their own devices. Using a multidisciplinary ...
View full details€97.99Sold out -
Sold out
Service-Oriented Architecture
H. Howell-Barber€92.99Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvemen...
View full details€92.99Sold out -
Sold out
Security Architecture � How & Why
Tom Madsen€109.99Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to ma...
View full details€109.99Sold out -
Sold out
Implementing Cybersecurity
Anne Kohnke€52.99The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk manag...
View full details€52.99Sold out -
Sold out
Security De-Engineering
Ian Tibble€77.99As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in informatio...
View full details€77.99Sold out -
Sold out
Optimal Spending on Cybersecurity Measures
Tara Kissoon€132.99Optimal Spending on Cybersecurity Measures: DevOps aims to discuss the integration of risk management methodologies within the DevOps process.This ...
View full details€132.99Sold out -
Sold out
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das€40.99The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used ...
View full details€40.99Sold out -
Sold out
Cognitive Sensors and IoT
Fadi Al-Turjman€52.99This book presents the Cognitive Information Centric Sensor Network (CICSN) framework for the IoT. This framework is built on top of cognitive node...
View full details€52.99Sold out -
Sold out
Security Analytics for the Internet of Everything
Taylor & Francis Ltd€55.99Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes ch...
View full details€55.99Sold out -
Sale
Microcontroller and Smart Home Networks
Dawoud Shenouda Dawoud€52.99Over recent years industries have faced the problem of how to connect devices to ‘speak’ to each other with minimum wiring. Philips Semiconductors ...
View full details€52.99Sale -
Sold out
Digitalization of Higher Education using Cloud Computing
Taylor & Francis Ltd€132.99Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and too...
View full details€132.99Sold out -
Sale
Security within CONASENSE Paragon
River Publishers€52.99Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services...
View full details€52.99Sale -
Sold out
Cryptography and Network Security
Marcelo Sampaio de Alencar€132.99Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and crypto...
View full details€132.99Sold out -
Sold out
Guide to Selecting Software Measures and Metrics
Capers Jones€52.99Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practice...
View full details€52.99Sold out -
Sold out
Culture Matters
Norhayati Zakaria€41.99Global virtual teams (GVTs) have evolved as a common work structure in multinational corporations due to their efficiency and cost-effectiveness. T...
View full details€41.99Sold out -
Sold out
Big Data Concepts, Technologies, and Applications
Mohammad Shahid Husain€122.99With the advent of such advanced technologies as cloud computing, the Internet of Things, the Medical Internet of Things, the Industry Internet of ...
View full details€122.99Sold out -
Sold out
Management of Organizational Culture as a Stabilizer of Changes
Anna Brzozowska€55.99No enterprise today is proud of being unchanged. Stability is understood more as a sign of stagnation than reliability, and enterprises that do not...
View full details€55.99Sold out -
Sale
Social Data Analytics in the Cloud with AI
Xinyue Ye€87.99The rise of cloud computing and Generative artificial intelligence (AI) has revolutionized data analytics pipelines. Analysts can collect, store, a...
View full details€87.99Sale -
Sold out
Practical Security for Agile and DevOps
Mark S. Merkow€72.99This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing o...
View full details€72.99Sold out -
Sold out
Practical Guide to Content Delivery Networks
Gilbert Held€69.99Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and orga...
View full details€69.99Sold out -
Sold out
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin€59.99Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for...
View full details€59.99Sold out -
Sold out
Big Data Concepts, Technologies, and Applications
Mohammad Shahid Husain€59.99With the advent of such advanced technologies as cloud computing, the Internet of Things, the Medical Internet of Things, the Industry Internet of ...
View full details€59.99Sold out -
Sold out
Business Telecom Systems
Kerstin Peterson€44.99For anyone involved in buying and managing telephone systems, this book brings clarity to the confusing array of products and services (like voicem...
View full details€44.99Sold out -
Sold out
Going Wi-Fi
Janice Reynolds€58.99Make informed decisions about planning and installing 802.11 'Wi-Fi' wireless networks. This book helps you tackle the challenge, whether installin...
View full details€58.99Sold out -
Sold out
Cloud Computing Book
Douglas Comer€56.99This latest textbook from bestselling author, Douglas E. Comer, is a class-tested book providing a comprehensive introduction to cloud computing. F...
View full details€56.99Sold out -
Sold out
Effective Methods for Software Engineering
Boyd Summers€52.99Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing...
View full details€52.99Sold out -
Sold out
Practice of Corporate Governance
Bob Tricker€38.99All corporate entities, from the largest multinational conglomerate to the smallest tennis club, need effective governance. Some features of corpor...
View full details€38.99Sold out -
Sold out
Security Risk Management - The Driving Force for Operational Resilience
Jim Seaman€59.99The importance of businesses being ‘operationally resilient’ is becoming increasingly important, and a driving force behind whether an organization...
View full details€59.99Sold out -
Sold out
Handbook of e-Business Security
Taylor & Francis Ltd€52.99There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies t...
View full details€52.99Sold out -
Sold out
ABCs of LDAP
Reinhard E. Voglmaier€186.00This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information av...
View full details€186.00Sold out -
Sold out
Practical Guide to Call Center Technology
Andrew Waite€42.44Get the most out of ACDs (automatic call distributors) and other complex systems in order to boost customer satisfaction and increase sales Include...
View full details€42.44Sold out -
Sold out
Losing the Cybersecurity War
Steve King€34.99This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We...
View full details€34.99Sold out -
Sold out
Losing the Cybersecurity War
Steve King€112.99This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We...
View full details€112.99Sold out -
Sold out
Home Workplace
Brendan Read€52.99Reap the benefits of the home workplace revolution with this practical resource that guides managers and employees through working from home either...
View full details€52.99Sold out -
Sold out
Diffusion of Information and Communication Technologies
Ewa Lechman€49.99In recent decades, the world has witnessed, unprecedented in terms of speed and geographic coverage, diffusion of new information and communication...
View full details€49.99Sold out -
Sold out
Technical Guide to IPSec Virtual Private Networks
James S. Tiller€107.99What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry,...
View full details€107.99Sold out