Computer networking & communications books

35055 books were found.

Uma rede habilitada para teleconferência usando o Protocolo de Iniciação de Sessão

Uma rede habilitada para teleconferência usando o Protocolo...

Author: Peter Eze
ISBN: 9786209327834
Format: Paperback
$121.44

Este livro é o resultado de uma pesquisa sobre um projeto alternativo de baixo custo para uma Rede de Área de Campus...  Read More >>

Siec z obslugą telekonferencji wykorzystująca protokól SIP

Siec z obslugą telekonferencji wykorzystująca...

Author: Peter Eze
ISBN: 9786209325274
Format: Paperback
$121.44

Niniejsza książka jest wynikiem badań nad alternatywnym, niskokosztowym projektem sieci kampusowej (CAN), która...  Read More >>

Śledzenie ruchomych celów w bezprzewodowych sieciach czujników

Śledzenie ruchomych celów w bezprzewodowych sieciach...

Author: Shereen Ismail
ISBN: 9786209399466
Format: Paperback
$121.44

Sieci bezprzewodowych czujników są wykorzystywane w wielu różnych zastosowaniach, takich jak monitorowanie ataków...  Read More >>

Explainable AI for Healthcare: Real Life Applications and Use Cases for Practitioners

Explainable AI for Healthcare: Real Life Applications...

Author: Aman Kataria (CSIR-Central Scientific Instruments Organization) ,  Sita Rani (GNDEC, Ludhiana)
ISBN: 9781032911120
Format: Hardback
$126.00

This book explores the transformative potential of Explainable AI (XAI) in enhancing healthcare delivery and XAI's...  Read More >>

Microsoft Intune Admin Playbook: Daily Tasks, Policies, Compliance Flows & Troubleshooting Checklists for Modern Endpoint Teams

Microsoft Intune Admin Playbook: Daily Tasks, Policies,...

Author: Reid Harper
ISBN: 9798242299450
Format: Paperback
$44.88

Microsoft Intune Admin Playbook is a practical, checklist-driven guide built for working endpoint administrators...  Read More >>

Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part III

Theory of Cryptography: 23rd International Conference,...

Author: Benny Applebaum ,  Huijia (Rachel) Lin
ISBN: 9783032122957
Format: Paperback
$211.17

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on...  Read More >>

Practical Pentest Commands: A Field Manual for Ethical Hacking and Red Team Ops.

Practical Pentest Commands: A Field Manual for Ethical...

Author: Amit Agarwal
ISBN: 9789375005797
Format: Paperback
$39.60

 Read More >>

Cybersecurity: Cyber Defense, Privacy and Cyber Warfare

Cybersecurity: Cyber Defense, Privacy and Cyber Warfare...

Author: George Dimitoglou ,  Leonidas Deligiannidis
ISBN: 9783111436418
Format: Hardback
$107.22

The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security....  Read More >>

DeFi Investigation Guide: Complete Handbook for Decentralized Finance Intelligence & Cryptocurrency Forensics

DeFi Investigation Guide: Complete Handbook for Decentralized...

Author: Kyranov Belvek
ISBN: 9798277083987
Format: Paperback
$92.37

Welcome to the wild west of finance - where your money rides on smart contracts, villains hide behind pseudonyms,...  Read More >>

Living off the Land: A Comprehensive Guide to Understanding, Detecting, and Mitigating Living-Off-The-Land Attacks in Cybersecurity

Living off the Land: A Comprehensive Guide to Understanding,...

Author: Raúl Renales Agüero
ISBN: 9798277058169
Format: Paperback
$52.80

Living Off The Land Attacks: The Silent War Inside Your Systems is a deep and comprehensive exploration of one of...  Read More >>

Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II

Theory of Cryptography: 23rd International Conference,...

Author: Benny Applebaum ,  Huijia (Rachel) Lin
ISBN: 9783032122926
Format: Paperback
$211.17

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on...  Read More >>

Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part I

Theory of Cryptography: 23rd International Conference,...

Author: Benny Applebaum ,  Huijia (Rachel) Lin
ISBN: 9783032122865
Format: Paperback
$211.17

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on...  Read More >>

Security and Privacy: 4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings

Security and Privacy: 4th International Conference,...

Author: Sihem Mesnager ,  Pantelimon Stănică
ISBN: 9783032128331
Format: Paperback
$211.17

This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP...  Read More >>

Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems: First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11–12, 2025, Proceedings

Advancing Innovative Cybersecurity Solutions and Approaches...

Author: Jabu Mtsweni ,  Modimowabarwa Kanyane
ISBN: 9783032130747
Format: Hardback
$343.17

This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR...  Read More >>

Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities

Securing a Healthcare Facility: A Guide to Implementing...

Author: Derek Sliger
ISBN: 9781041103905
Format: Paperback
$77.99

The need for this book arises from the growing cybersecurity challenges faced by small to medium-sized healthcare...  Read More >>

Ulepszony schemat nadawania probabilistycznego dla routingu w sieciach MANET

Ulepszony schemat nadawania probabilistycznego dla routingu...

Author: Abdalla Musbah Omar Hanashi
ISBN: 9786209335259
Format: Paperback
$219.12

Nadawanie jest podstawową techniką propagacji danych, która ma wiele zastosowań, takich jak wykrywanie tras i rozpoznawanie...  Read More >>

Verbessertes probabilistisches Rundfunkverfahren für das Routing in MANETs

Verbessertes probabilistisches Rundfunkverfahren für...

Author: Abdalla Musbah Omar Hanashi
ISBN: 9786209337819
Format: Paperback
$219.12

Rundfunk ist eine grundlegende Technik zur Datenübertragung, die eine Reihe von Anwendungen wie Routenfindung und...  Read More >>

Bash for Hackers: Creative Shell Scripting for Pentesters & Red-Team Operators

Bash for Hackers: Creative Shell Scripting for Pentesters...

Author: Charles Sprinter
ISBN: 9798276876573
Format: Paperback
$76.56

Bash for Hackers is the definitive, hands-on guide to weaponizing the Bash shell for real-world offensive security...  Read More >>

The Unseen Empire: MI6 and the Secret Shape of Global Power

The Unseen Empire: MI6 and the Secret Shape of Global...

Author: Dr Naeem Chishti
ISBN: 9798276984063
Format: Paperback
$52.77

intelligence service mediate between foreign policy objectives, national security imperatives, and the moral complexities...  Read More >>

Arch Linux Mastery: A Complete Guide to Installation, System Customization, and Maintaining a Rolling Release System

Arch Linux Mastery: A Complete Guide to Installation,...

Author: Fred Klima
ISBN: 9798276917245
Format: Paperback
$71.28

Arch Linux Mastery: A Complete Guide to Installation, System Customization, and Maintaining a Rolling Release System...  Read More >>

Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities

Securing a Healthcare Facility: A Guide to Implementing...

Author: Derek Sliger
ISBN: 9781041103929
Format: Hardback
$77.99

The need for this book arises from the growing cybersecurity challenges faced by small to medium-sized healthcare...  Read More >>

Quantum Technologies: Trends and Implications for Cyber Defense

Quantum Technologies: Trends and Implications for Cyber...

Author: Julian Jang-Jaccard ,  Philippe Caroff
ISBN: 9783031907265
Format: Hardback
$116.41

This open access book invites readers to explore the emerging opportunities and strategic significance of quantum...  Read More >>

Mastering Modern Security: A Smarter Approach to Resilient Building Security Systems and Staying Ahead of Threats

Mastering Modern Security: A Smarter Approach to Resilient...

Author: Rob Jackson
ISBN: 9781966372004
Format: Hardback
$66.00

""Modern threats require modern security."" Mastering Modern Security reveals how to transform your security system...  Read More >>

Zero Trust Security: A Hands-on Guide

Zero Trust Security: A Hands-on Guide

Author: Adam Tilmar Jakobsen (National Cybercrime Centre (NC3), Denmark)
ISBN: 9781394361090
Format: Hardback
$163.95

Principles, applications, and methodologies to help organizations transition from traditional security models to...  Read More >>

Threat Modeling Best Practices: Proven frameworks and practical techniques to secure modern systems

Threat Modeling Best Practices: Proven frameworks and...

Author: Derek Fisher
ISBN: 9781805128250
Format: Paperback
$118.77

Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures,...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List