Computer Networking & Communications
-
Sold out
Into the Networked Age
James W. Cortada€36.50In this dynamic book, based on the most effective strategies of IBM and other market leaders, managers will learn to successfully transform their o...
View full details€36.50Sold out -
Sold out
Cloud Observability with Azure Monitor
José Ángel Fernández€42.99Implement real-time monitoring, visualization, analytics, and troubleshooting strategies on Azure to ensure optimal performance and reliability in ...
View full details€42.99Sold out -
Sale
SharePoint For Dummies
Ken Withee€28.50Become a SharePoint power user with this quick-and-easy guide to its many features SharePoint For Dummies is your trusted instruction manual as you...
View full details€28.50Sale -
Sale Redefining Information Security
Brian Wagner€129.99Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively ...
View full details€129.99Sale -
Sale AI for Design and Optimization of Cellular Networks
John Wiley & Sons Inc€112.99Vital information on AI, ML, and 5G, and implementing these topics for cellular network design and optimization AI for Design and Optimization of C...
View full details€112.99Sale -
Sale
Redefining Information Security
Brian Wagner€43.99Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively ...
View full details€43.99Sale -
Sold out
Plunkett's Computers, Hardware & Software Industry Almanac 2020
Jack W. Plunkett€390.60Formally Plunkett's InfoTech Industry Almanac, this book presents a complete analysis of the technology business, including hardware, software, net...
View full details€390.60Sold out -
Sale Guardians of Data
Nik Zulkarnaen Khidzir€77.99Guardians of Data: A Comprehensive Guide to Digital Data Protection which helps to reduce risks of data loss by monitoring and controlling the flow...
View full details€77.99Sale -
Sold out
Mechanics of User Identification and Authentication
Dobromir Todorov€132.99User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems a...
View full details€132.99Sold out -
Sold out
Building and Maintaining a Data Warehouse
Fon Silvers€102.99As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed p...
View full details€102.99Sold out -
Sold out
Rhetorical Code Studies
The University of Michigan Press€55.99Winner of the 2017 Sweetland Digital Rhetoric Collaborative Book Prize Software developers work rhetorically to make meaning through the code they ...
View full details€55.99Sold out -
Sold out
Art of Software Modeling
Benjamin A. Lieberman€97.99Modeling complex systems is a difficult challenge and all too often one in which modelers are left to their own devices. Using a multidisciplinary ...
View full details€97.99Sold out -
Sold out
Service-Oriented Architecture
H. Howell-Barber€92.99Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvemen...
View full details€92.99Sold out -
Sold out
Security Architecture � How & Why
Tom Madsen€109.99Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to ma...
View full details€109.99Sold out -
Sold out
Implementing Cybersecurity
Anne Kohnke€52.99The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk manag...
View full details€52.99Sold out -
Sold out
Security De-Engineering
Ian Tibble€77.99As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in informatio...
View full details€77.99Sold out -
Sold out
Optimal Spending on Cybersecurity Measures
Tara Kissoon€132.99Optimal Spending on Cybersecurity Measures: DevOps aims to discuss the integration of risk management methodologies within the DevOps process.This ...
View full details€132.99Sold out -
Sold out
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das€40.99The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used ...
View full details€40.99Sold out -
Sold out
Cognitive Sensors and IoT
Fadi Al-Turjman€52.99This book presents the Cognitive Information Centric Sensor Network (CICSN) framework for the IoT. This framework is built on top of cognitive node...
View full details€52.99Sold out -
Sold out
Security Analytics for the Internet of Everything
Taylor & Francis Ltd€55.99Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes ch...
View full details€55.99Sold out -
Sale
Microcontroller and Smart Home Networks
Dawoud Shenouda Dawoud€52.99Over recent years industries have faced the problem of how to connect devices to ‘speak’ to each other with minimum wiring. Philips Semiconductors ...
View full details€52.99Sale -
Sold out
Digitalization of Higher Education using Cloud Computing
Taylor & Francis Ltd€132.99Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and too...
View full details€132.99Sold out -
Sale
Security within CONASENSE Paragon
River Publishers€52.99Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services...
View full details€52.99Sale