Computer networking & communications books

34516 books were found.

Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization

Cybersecurity Blue Team Strategies: Uncover the secrets...

Author: Kunal Sehgal ,  Nikolaos Thymianis
ISBN: 9781801072472
Format: Paperback
$92.37

This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn...  Read More >>

Einfache Multiple-Choice-Fragen zu Computernetzwerken

Einfache Multiple-Choice-Fragen zu Computernetzwerken...

Author: R Naveen ,  G Raghul
ISBN: 9786205774953
Format: Paperback
$121.44

Dieses Buch enthält eine breite Palette von Multiple-Choice-Fragen zu Themen wie LAN, WAN, MAN, VPN und drahtlose...  Read More >>

Perguntas simples de Escolha Múltipla sobre Redes de Computadores

Perguntas simples de Escolha Múltipla sobre Redes de...

Author: R Naveen ,  G Raghul
ISBN: 9786205774991
Format: Paperback
$121.44

Este livro contém uma vasta gama de perguntas de escolha múltipla cobrindo tópicos tais como LAN, WAN, MAN, VPN...  Read More >>

Semplici domande a scelta multipla sulle reti di computer

Semplici domande a scelta multipla sulle reti di computer...

Author: R Naveen ,  G Raghul
ISBN: 9786205774984
Format: Paperback
$121.44

Questo libro contiene un'ampia gamma di domande a scelta multipla che coprono argomenti quali LAN, WAN, MAN, VPN...  Read More >>

Questions à choix multiples simples sur les réseaux informatiques

Questions à choix multiples simples sur les réseaux...

Author: R Naveen ,  G Raghul
ISBN: 9786205774977
Format: Paperback
$121.44

Ce livre contient un large éventail de questions à choix multiples couvrant des sujets tels que les réseaux locaux...  Read More >>

Power Systems Cybersecurity: Methods, Concepts, and Best Practices

Power Systems Cybersecurity: Methods, Concepts, and...

Author: Hassan Haes Alhelou ,  Nikos Hatziargyriou
ISBN: 9783031203596
Format: Hardback
$388.10

This book covers power systems cybersecurity. In order to enhance overall stability and security in wide-area cyber-physical...  Read More >>

Introduction to the Command Line (Third Edition): A Fat-Free Guide to Linux, Unix, and BSD Commands

Introduction to the Command Line (Third Edition): A...

Author: Nicholas Marsh
ISBN: 9798372916746
Format: Paperback
$68.61

 Read More >>

Distributed Systems: Theory and Applications

Distributed Systems: Theory and Applications

Author: Ratan K. Ghosh (IIT Kanpur) ,  Hiranmay Ghosh (IIT Delhi; Calcutta University)
ISBN: 9781119825937
Format: Hardback
$182.95

Distributed Systems Comprehensive textbook resource on distributed systems—integrates foundational topics with advanced...  Read More >>

The Gentrification of the Internet: How to Reclaim Our Digital Freedom

The Gentrification of the Internet: How to Reclaim Our...

Author: Jessa Lingel
ISBN: 9780520395565
Format: Paperback
$27.95

How we lost control of the internet—and how to win it back. The internet has become a battleground. Although it...  Read More >>

Data Mesh: Delivering Data-Driven Value at Scale

Data Mesh: Delivering Data-Driven Value at Scale

Author: Zhamak Dehghani ,  Zura Johnson
ISBN: 9798212515863
Format: Audio
$65.97

In this practical book, author Zhamak Dehghani introduces data mesh, a decentralized sociotechnical paradigm drawn...  Read More >>

Fusion of Machine Learning Paradigms: Theory and Applications

Fusion of Machine Learning Paradigms: Theory and Applications...

Author: Ioannis K. Hatzilygeroudis ,  George A. Tsihrintzis
ISBN: 9783031223709
Format: Hardback
$336.35

This book aims at updating the relevant computer science-related research communities, including professors, researchers,...  Read More >>

Access Control Models and Architectures For IoT and Cyber Physical Systems

Access Control Models and Architectures For IoT and...

Author: Maanak Gupta ,  Smriti Bhatt
ISBN: 9783030810917
Format: Paperback
$336.35

This was developed by the authors to provide an overall broader perspective and grounded approach to solve access...  Read More >>

Information Security Applications: 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24–26, 2022, Revised Selected Papers

Information Security Applications: 23rd International...

Author: Ilsun You ,  Taek-Young Youn
ISBN: 9783031256585
Format: Paperback
$168.16

This book constitutes the revised selected papers from the 23rd International Conference on Information Security...  Read More >>

Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Security and Privacy in Communication Networks: 18th...

Author: Fengjun Li ,  Kaitai Liang
ISBN: 9783031255373
Format: Paperback
$284.60

They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain,...  Read More >>

Ощипывание фруктов с помощью робота Firebird V

Ощипывание...

Author: Четан Еравар ,  Аникет Ингол
ISBN: 9786205765470
Format: Paperback
$55.44

"Робот для ощипывания фруктов используется для снижения трудозатрат человека. Робот перемещается по всему фруктовому...  Read More >>

Colheita de fruta usando o robô Firebird V

Colheita de fruta usando o robô Firebird V

Author: Chetan Yerawar ,  Aniket Ingole
ISBN: 9786205765494
Format: Paperback
$110.88

"O robô depenador de fruta é utilizado para reduzir os esforços do poder humano. O robô mover-se-á pelo jardim de...  Read More >>

Obstpflücken mit Firebird V Roboter

Obstpflücken mit Firebird V Roboter

Author: Chetan Yerawar ,  Aniket Ingole
ISBN: 9786205765449
Format: Paperback
$110.88

Der Obstpflückroboter wird eingesetzt, um den Arbeitsaufwand zu verringern. Der Roboter bewegt sich durch den Obstgarten...  Read More >>

Cueillette de fruits à l'aide du robot Firebird V

Cueillette de fruits à l'aide du robot Firebird V

Author: Chetan Yerawar ,  Aniket Ingole
ISBN: 9786205765463
Format: Paperback
$110.88

"Le robot cueilleur de fruits est utilisé pour réduire les efforts de la main d'oeuvre. Le robot se déplace dans...  Read More >>

Current Trends in Web Engineering: ICWE 2022 International Workshops, BECS, SWEET and WALS, Bari, Italy, July 5–8, 2022, Revised Selected Papers

Current Trends in Web Engineering: ICWE 2022 International...

Author: Giuseppe Agapito ,  Anna Bernasconi
ISBN: 9783031253799
Format: Paperback
$142.29

This volume constitutes the papers of several workshops which were held in conjunction with the ICWE 2022 International...  Read More >>

Computer Vision, Imaging and Computer Graphics Theory and Applications: 16th International Joint Conference, VISIGRAPP 2021, Virtual Event, February 8–10, 2021, Revised Selected Papers

Computer Vision, Imaging and Computer Graphics Theory...

Author: A. Augusto de Sousa ,  Vlastimil Havran
ISBN: 9783031254765
Format: Paperback
$181.10

This book constitutes the refereed proceedings of the 16th International Joint Conference on Computer Vision, Imaging...  Read More >>

Hacking With Kali Linux: The Complete Beginner's Guide about Kali Linux for Beginners (Step by Step Guide to Learn Kali Linux for Hackers)

Hacking With Kali Linux: The Complete Beginner's Guide...

Author: Michael Lee
ISBN: 9781998901869
Format: Paperback
$52.67

Are you interested in finding new and effective ways to keep your system safe and secure? Do you want to make sure...  Read More >>

Simple Multiple Choice Questions on Computer Networks

Simple Multiple Choice Questions on Computer Networks...

Author: R Naveen ,  G Raghul
ISBN: 9786204978703
Format: Paperback
$124.08

 Read More >>

Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level

Microsoft Defender for Endpoint in Depth: Take any organization's...

Author: Paul Huijbregts ,  Joe Anich
ISBN: 9781804615461
Format: Paperback
$131.97

Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List