Networking in 2013
Strategisches Projektmanagement im Gesundheitswesen: Wie Stakeholder auf ein Sensitivitätsmodell einwirken - eine Analyse
by
Moser, Hannes
Mobile Ad Hoc Networks
by
Tripathi Rajeev, Balhara Surjeet, Prakash Arun
Die Rolle der IT bei der Realisierung verteilter Unternehmen
by
Gricksch, Oliver
Effective Monitoring and Alerting: For Web Operations
by
Ligus, Slawek
Rapid SharePoint 2013 Collaboration Solution Development and Deployment
by
Pentsarskyy, Yaroslav
Formal Description Techniques and Protocol Specification, Testing and Verification: Forte X / Pstv XVII '97
by
Shiratori, Norio, Togashi, Atsushi, Mizuno, Tadanori
Mobility Models for Mobile Ad Hoc Network by Simulation
by
Diawuo Kwasi, Tengviel John
Communications Architecture in Support of Grid Computing
by
Lavian, Tal
Guide to Voice and Video Over IP: For Fixed and Mobile Networks
by
Jammeh, Emmanuel, Sun, Lingfen, Mkwawa, Is-Haka
Look Smarter Than You Are with Hyperion Planning 11.1.2: Creating Hyperion Planning Applications
by
Roske, Edward, McMullen, Tracy
IPv6 Routing
by
Ashraf Zeeshan
Analysis of Handover Schemes
by
Rashid Syed Zahidur
Windows Server 2012: Up and Running: Upgrading, Installing, and Optimizing Windows Server 2012
by
Lynn, Samara
A Comprehensive Lecture Notes on RSA-1024 Cryptography
by
Kowar Manoj K., Karmakar Sanjeev
Evaluation of Manet Routing Protocols in Realistic Environments
by
Esquius-Morote Marc, Guo Aihuang
Juniper Networks Warrior
by
Southwick, Peter
Intelligent Networks: Proceedings of the Ifip Workshop on Intelligent Networks 1994
by
Martikainen, Olli, Harju, Jarmo, Karttunen, Tapani
Design of Efficient Packet Marking-Based CMM for Cluster Interconnects
by
Ferrer Joan-Lluis
Analisis-Simulacion En MATLAB de Lineas de Cobre Para Alta Frecuencia
by
Iglesia Moner Victor Miguel
Routing for Wireless Multi-Hop Networks
by
Abdel Hamid, Sherin, Hassanein, Hossam S., Takahara, Glen
Efficient and Salable Communication in Wsn Through Xlp
by
Ghouse Mohammad, D. Praveen
Protocol Test Systems: 7th Workshop 7th Ifip Wg 6.1 International Workshop on Protocol Text Systems
by
Motioncast for Mobile Wireless Networks
by
Wang, Xinbing
Routing in Motorway Surveillance System Based on Ad Hoc Camera Network
by
Ahmad R. B., Kabbour Mario, A. Hassnawi Layth
Scalable Computing and Communications: Theory and Practice
by
Wang, Lizhe, Khan, Samee U., Zomaya, Albert Y.
Advancing Cyber Security
by
Thames Lane
Securing the Public Wireless Network
by
Attipoe Elliot
Red Empresarial: Seguridad Convergente
by
Daltabuit Enrique
Efficient Surveillance System Based on Cognitive Radio
by
Zulfiqar, Babar, Ahmed, Anil, Akhtar, Rizwan
Look Smarter Than You Are with Hyperion Planning 11.1.2: Advanced Hyperion Planning
by
McMullen, Tracy, Roske, Edward
Modeling and Analysis of Computer Communications Networks
by
Hayes, Jeremiah F.
Computation and Storage in the Cloud: Understanding the Trade-Offs
by
Yang, Yun, Chen, Jinjun, Yuan, Dong
Customer Returns in E-Commerce
by
Ogheden Pauline, Golletz Marion
Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, Second Edition
by
Sarkar, Subir Kumar, Basavaraju, T. G., Puttamadappa, C.
SS7 - The Quiet Revolution That Changed Your Telephone Service
by
Harvey, Ralph
Ten Steps to ITSM Success
by
Esposito, Angelo, Rogers, Timothy, It Governance
Securing Wbaodv Routing Protocol in Manets
by
Elmasry Wisam
Intrusion Resilient and Real-Time Forensics
by
Liu Tong
Securing Cloud and Mobility: A Practitioner's Guide
by
Coolidge, E. Coleen, Hourani, Paul, Lim, Ian
Intelligent Networks and Intelligence in Networks: Ifip Tc6 Wg6.7 International Conference on Intelligent Networks and Intelligence in Networks, 2-5 S
by
Gaïti, Dominique
Avtomatizatsiya Upravleniya Proizvodstvom
by
Chernov Edgar, Ostroukh Andrey, Tkhan' Nguen Dyk
Wireless Sensor Networks
by
Michaelides Michalis
Short Messaging Service
by
Balasubramanian B. Menaka
Enterprise Secure Wireless Authentication (Eswa)
by
Panch Ankit
Design and Experimentation of Rate Adaptation for IEEE 802.11n WLANs
by
Ben Makhlouf Arafet
GSM Structure and Expanding of Coverage at Hill Tracts Area
by
Harun-Ur-Rashid a. K. M.
Your CCNA Exam Success Strategy: The Non-Technical Guidebook for Routing & Switching
by
Bahizad, Dean, Tiwari, Vivek
Tekhnologii Peredachi Informatsii Na Fizicheskom Urovne Modeli OSI
by
Antonova, Galina
Developing a New Technique for Hiding Information in Images
by
Morsy Hamdy
Performance Analysis of Wimax Networks
by
Alani, Wafa Abduljabar Madallah, Al-Saedi, Firas Abdullah Thweny
El Protocolo Ipv6 Movil
by
Castillo Eraso Juan Carlos, Insuasti P. Jesus H.
Cooperative Communication In Wireless Networks
by
Alam, Mohammad Shah, Shah, A. F. M. Shahen, Islam, MD Shariful
Bridge MODBUS RTU y TCP para el control de la Planta Multiproceso
by
Montaño Arrioja, Gabriel Arturo
Testing of Communicating Systems: Ifip Tc6 10th International Workshop on Testing of Communicating Systems, 8-10 September 1997, Cheju Island, Korea
by
Myungchul Kim, Sungwon Kang, Keesoo Hong
Automated Industrial Processes Control Via WIMAX
by
Azam Bhatti Ayesha
Xarxes socials com a suport a les funcions d'intel-ligència
by
González-Gálvez, Pilar
Seamless Wi-Fi Offloading For Mobile Applications
by
Modi, Shuchi, Joshi, Hardik, Mankad, Prapti
A Comprehensive Study of Performance of MANET in Ricean Channel Model
by
Joshi, Bineet Kumar
Economic Modeling in Networking: A Primer
by
Johari, Ramesh, Berry, Randall a.
Reliable and Energy Efficient Routing Protocol for MANET's
by
Kaliyar, Pallavi
Grid Computing Framework
by
Shanmugasundaram, Suresh
The Testability of Distributed Real-Time Systems
by
Schütz, Werner
Performance Evaluation of Range Free Localization Algorithms in Wsn
by
Khurana Mehak
GSM Security Using Elliptic Curve Cryptography
by
Dhar, Ankana, Chakraborty, Satarupa, Laha, Subarna
Optimierung von Webseiten für Mobilgeräte
by
Knocke, Julian
Instant Citrix Security How-to
by
Jacob, Carmel
Time Variable PDF Presented by Neural Network for Data Compression
by
Farsi Hassan, Etezadifar Pouriya
Qos Management of Web Services
by
Zheng, Zibin, Lyu, Michael R.
Performance Study of Mobile IPv6 Using OPNET Simulator
by
Al-Adhamee, Muhanad Mustafa Asem, Al-Saedi, Firas Abdullah Thweny
Networks: Emerging Topics in Computer Science
by
Bilogrevic, Igor, Rezazadeh, Arshin, Momeni, Ladan
Space Division Multiple Access for Wireless Local Area Networks
by
Vandenameele, Patrick, Van Der Perre, Liesbet, Engels, Marc
A GUI Framework for detecting Intrusions using Bro IDS
by
Kaur, Sanmeet, Gupta, Shaffali
Performance Analysis of Telecommunications and Local Area Networks
by
Wah Chun Chan
Data Communication Principles: For Fixed and Wireless Networks
by
Ahmad, Aftab
Phase-Locked Loops for Wireless Communications: Digital, Analog and Optical Implementations
by
Stephens, Donald R.
Broadband Wireless Access
by
Bing, Benny
Communication Protocol Specification and Verification
by
Lai, Richard, Jirachiefpattana, Ajin
Practical Intranet Security: Overview of the State of the Art and Available Technologies
by
Vandenwauver, M., Ashley, Paul M.
A Secure Routing Protocol for Manets Against Byzantine Attacks
by
Singla Gagan, Kaliyar Pallavi
Embedded Systems
by
Singula, Dana
Distributed Medium Access Control in Wireless Networks
by
Wang, Ping, Zhuang, Weihua
Hash Based Data Text Fusion Using Speech Signal Algorithm
by
Sharma Divya
Salesforce Crm Admin Cookbook
by
Goodey, Paul
Information Systems and Data Compression
by
Seidler, Jerzy A.
Atomicity and Snapshot Isolation on Column Oriented Databases
by
Kumar Chiranjeev, Jain Amit Kumar, Dharavath Ramesh
Diverse Routing in Srlg Networks
by
Juffermans Rob
Intrusion Detection Engine for Adhoc Environment
by
Joshi R. C., Husain Shahnawaz, Gupta S. C.
Wireless Ad-Hoc Networks and Some Location Based Routing Protocols
by
Radwan Ahmed, El-Sayed Hamdy, Zanaty Elnomery
Environmental Monitoring
by
Quidwai Shahmir
Broadband Communications: The Future of Telecommunications
by
Kühn, Paul J., Ulrich, Roya
Windows 8: The Missing Manual
by
Pogue, David
Process Improvement in Practice: A Handbook for It Companies
by
Dybå, Tore, Dingsøyr, Torgeir, Moe, Nils Brede
Unit and Ubiquitous Internet of Things
by
Ning, Huansheng
Implementing Vmware Horizon View 5.2
by
Ventresco, Jason
Android Security: Attacks and Defenses
by
Misra, Anmol, Dubey, Abhishek
Packet Guide to Voice Over IP: A System Administrator's Guide to Voip Technologies
by
Hartpence, Bruce
The Age of You: How to Understand and Benefit from Social Media and the Connected Society
by
Nistad, Stein Arne
The Age of You: How to Understand and Benefit from Social Media and the Connected Society
by
Nistad, Stein Arne
Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren: Einführung Spambekämpfung
by
Mösinger, Alexander
Networking Troubleshooting for Windows
by
Beers LLL, Robert Lee
Wireless Networking in the Developing World: Colour version
by
Authors, Wireless Networking in the Deve
Instant Traffic Analysis with Tshark How-to
by
Merino, Borja
Neural Network Data Analysis Using Simulnet(tm)
by
Rzempoluck, Edward J.
Solarwinds Orion Network Performance Monitor
by
Dissmeyer, Joseph
SharePoint 2013 Enterprise Search Walkthrough Guide
by
Mann, Steven
Data Converters for Wireless Standards
by
Mostafa, Ismail Mohamed, Shi, Chunlei
Earth System Modelling - Volume 4: IO and Postprocessing
by
Redler, René, Budich, Reinhard, Balaji, V.
Distributed Space-Time Coding
by
Jing, Yindi
Mac Hacks: Tips & Tools for Unlocking the Power of OS X
by
Seibold, Chris
Traffic Safety Systems Based on Vehicular Networks
by
Fogue Cortes Manuel
Data Hiding and Applications
by
Abd Alaziz Hanaa
Comprehensive Network Capacity Monitoring Guideline (GSM and UMTS)
by
Baarrij, Syed
Wissensdatenbanken bei IT-Projekten: Projektdokumentation mit Wissensmanagement 2.X
by
Sailer, Gernot
Sistema de administración de servicios en red
by
Carreto, Chadwick, Álvarez, Salvador, Hernández Pérez, Marco Antonio
Secure Service Discovery Protocol for Ad-Hoc Networks Hash Function
by
Elwahsh Haitham
On Designing Energy Conserving Wsn
by
Jaleel Mohammad Uruj
Enhancement of Dsdv Routing Protocol in Vehicular Ad Hoc Network
by
Hassan Poor Aref
Look Smarter Than You Are with Hyperion Planning 11.1.2: An End User's Guide
by
Roske, Edward, McMullen, Tracy
Wireless Location in Cdma Cellular Radio Systems
by
Caffery Jr, James J.
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
by
Jajodia, Sushil, Wang, Xiaoyang Sean, Peng Ning
Smart Antenna Systems and Wireless LANs
by
Okamoto, Garret
Fundamentals of Codes, Graphs, and Iterative Decoding
by
Saejoon Kim, Wicker, Stephen B.
Big Data Analysis
by
Otsuki, Akira
Practical SharePoint 2013 Governance
by
Goodyear, Steve