Networking in 2014
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
by
Dacosta, Francis, Henderson, Byron
Soziologie Der Online-Kommunikation
by
Beck, Klaus
A Monogram On Design And Development Of FPGA Based Firewall
by
Shelake V. G., Kamat R. K.
Bystryy poisk vektorov pri szhatii rechevykh signalov
by
Tkachenko Aleksandr, Griyo Tukalo Oksana
Smarthome Computing System Using Mobile Devices
by
Maskat Kamaruzaman, Ismail Mohd Nazri, Shukran Mohd Afizi
SharePoint 2013 Solution Series Volumes 1-5
by
Mann, Steven
SharePoint 2013 Survey Ramp-Up Guide
by
Mann, Steven
Modifying Your Site Navigation in SharePoint 2013
by
Mann, Steven
How To Integrate BCS with Search in SharePoint 2013
by
Mann, Steven
Wireless Sensors in Industrial Time-Critical Environments
by
Cecílio, José, Furtado, Pedro
SharePoint 2013 Solution Series Volumes 6-10
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 1-20
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 1-10
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 11-15
by
Mann, Steven
SharePoint 2013 Solution Series Volumes 16-20
by
Mann, Steven
Collaborative Web Hosting: Challenges and Research Directions
by
Ahmed, Reaz, Boutaba, Raouf
Deep Space Telecommunications Systems Engineering
by
Administration, National Aeronautics and
Troubleshooting with Wireshark: Locate the Source of Performance Problems
by
Chappell, Laura
Packet Tracer Network Simulator
by
A, Jesin
Cooperative Malicious Nodes Detection and Removal Scheme in Manets
by
Sharma Saurabh, Gambhir Sapna
Deployment of a Secure Voip System
by
Chowdhury Amel
IOS and OS X Network Programming Cookbook
by
Hoffman, Jon
Mobile Intention Recognition
by
Kiefer, Peter
Cross-Layer Treatment of Mobility for Manets and Dsrc/Wave Systems
by
Rahman Kazi Atiqur
Teoreticheskie Osnovy Sinteza Diskretnykh Signalov Dlya Dkm Radiokanalov
by
Gaychuk Dmitriy
Authentication Scheme for Dynamic Group Using Threshold Cryptography
by
Prabakar M. Amutha
Resource Discovery: Using Network Traffic to Infer CPU and Memory Load
by
Watkins Lanier
Administering Arcgis for Server
by
Nasser, Hussein
Vmware Vsphere 5.X Datacenter Design Cookbook
by
Cartwright, Hersey
Getting Started with Citrix Provisioning Services 7.0
by
Udayakumar, Puthiyavan
Location Privacy Preservation in Cognitive Radio Networks
by
Zhang, Qian, Wang, Wei
Feature Selection for Intrusion Detection Systems
by
Kumar Krishan, Kumar Gulshan, Kumar Yogesh
How to Do Everything: Icloud, Second Edition
by
Rich, Jason R.
Effective Utilization of Buffers in 802.11 Based Wlan
by
Devana Rajeshwari
Security-Aware Cooperation in Cognitive Radio Networks
by
Zhang, Ning, Mark, Jon W.
Seamless and Secure Communications Over Heterogeneous Wireless Networks
by
Zhang, Chisheng, Cao, Jiannong
Route Optimization in Mobile IP
by
Kamel, Sherif
XML in der NC-Verfahrenskette: Die Optimierung des Informationsflusses im Kontext eines XML-basierten Dateiformates
by
Wagner, Christian
Secure and Anonymous Routing for Mobile Adhoc Networks
by
Jambulingam Vinothkumar
Remote Network Monitoring System
by
Samin, Pakeeza, Riaz, Rabia, Javied, Madiha
Raspberry Pi Server Essentials
by
Kula, Piotr
Recent Advances in Cognitive Radio Networks
by
Kontorovich, Valeri, Primak, Serguei, Filio Rodriguez, Oscar
Encryption System Appling The Dynamic Location Of Mobile Phone
by
Hamad, Hatem, El Kourd, Kaouther, El Kourd, Souhir
Networking Services: QoS, Signaling, Processes
by
Perros, Harry
Energy Detection for Spectrum Sensing in Cognitive Radio
by
Jiang, Hai, Atapattu, Saman, Tellambura, Chintha
Enhanced Congestion Control for Internet Media Traffic
by
Adly, Mohammad
Energy Efficient Schemes for Wireless Sensor Networks
by
Murugan, Ananda
Intrusion Detection Using Artificial Intelligence Based Ensembles
by
Kumar Krishan, Kumar Gulshan, Singh Jabarweer
Wi-Fi Enabled Healthcare
by
Linton, Jon, McDonald, Douglas, II, Youssef, Ali
Communication and Networking
by
Kadhim, Laith
Mobile Video Communications
by
Chen Zhifeng, Wu Dapeng
Cross-Layer Approach for Seamless Vertical Handover in Networks
by
Jambulingam Vinothkumar
Communication Networks for Smart Grids: Making Smart Grid Real
by
Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Penetration Testing with Backbox
by
Umit Uygur, Stefan
Mosh (Mobile Shell): A New Era of Remote Access
by
Raj, Aditya
Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice
by
Zeng, Haibo, Giusto, Paolo, Di Natale, Marco
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
by
Reed, Andy
Design of a Real-Time Tracking System using packet transfer delay
by
Moronkeji Taiwo
Metrics for Intrusion Detection in Wireless Sensor Networks
by
Thies, Daniel
Networked Audiovisual Systems
by
Grimes, Brad, Avixa Inc Na
Quality of Experience: The Case of Voice Over IP
by
Jafarkarimi Hosein, Foroutani Saman, Dalvi Esfahani Mohammad
Design, Implementation and Evaluation of an Energy Rpl Routing Metric
by
Ferrari Gianluigi, Gonizzi Pietro, Demicheli Fabio
Can Delay Based Protocols Survive in Real World?
by
Kotla Kiran
Radio Resource Management Using Geometric Water-Filling
by
He, Peter, Zhao, Lian, Zhou, Sheng
Traffic Engineering Algorithms for IP and MPLS Networks
by
Nakibly, Gabi
Implementation and Evaluation of a Zigbee Network
by
Takpor Temitope
Computación en la Nube
by
Arias, Angel
Modern Security Methods in Applied Computer Science
by
Ch, Rupa, P. S., Avadhani
Highly Consistent and Secured Data Delivery for Mobile Ad-Hoc Networks
by
Jambulingam Vinothkumar
PSTN-IP Telephony Gateway for Ensuring QoS in Heterogeneous Networks
by
Chakraborty, Chinmay
Analysis of VFSO System Integrated With BPLC
by
Sadegh Amiri, Iraj, M. Supa'at, Abu Sahmah, Alavi, Sayed Ehsan
ELSTER - Die elektronische Steuererklärung
by
Dieter, Susanne
Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks
by
Chen, Jiming, Li, Junkun, He, Shibo
Dynamic Provisioning for Community Services
by
Qi, Li, Jin, Hai
Security for Multi-Hop Wireless Networks
by
Shen, Mahmoud, Mohamed M. E. a.
Stable Throughput Regions in Wireless Networks
by
Ephremides, Anthony, Kompella, Sastry
An intelligent vertical handoff decision algorithm
by
V, Sureshkumar, Velusamy, Kaushik, D, Bhuvana
Efficient and Effective Algorithm for Wireless Networks
by
Misra, Rajiv, Das, Debasis, Chaturvedi, Swati
BGP for Cisco Networks: A CCIE v5 guide to the Border Gateway Protocol
by
Fordham, Stuart D.
Learning Nagios 4
by
Kocjan, Wojciech
Running Mainframe Z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform Z Environments
by
Barrett, Kenneth, Norris, Stephen
Implementing Samba 4
by
Leal, Marcelo
Architectures of Small-Cell Networks and Interference Management
by
Le-Ngoc, Tho, Ngo, Duy Trong
Network Hardening: An Automated Approach to Improving Network Security
by
Albanese, Massimiliano, Jajodia, Sushil, Wang, Lingyu
Guide to OSI and TCP/IP Models
by
Alani, Mohammed M.
Building Information Modeling (BIM) in der Planung von Bauleistungen
by
Albrecht, Matthias
Resource Management for Heterogeneous Networks in Lte Systems
by
Qian, Yi, Hu, Rose Qingyang
Linear Network Error Correction Coding
by
Guang, Xuan, Zhang, Zhen
Vmware Horizon Workspace Essentials
by
Bjork, Peter, Lindberg, Joel, Von Oven, Peter
Cloud Computing: Eine kritische Analyse des Cloud Computings im gewerblichen Bereich
by
Burkert, Matthias
Intelligence for Embedded Systems: A Methodological Approach
by
Alippi, Cesare
Attachment Transmission in Wireless Networks
by
Hamdi, Mounir, Wang, Lu, Wu, Kaishun
Cloud Data Management
by
Zhao, Liang, Sakr, Sherif, Liu, Anna
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion
by
Vasquez, Jorge
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion
by
Vasquez, Jorge
Pro Angularjs
by
Freeman, Adam
Digital Libraries Applications
by
Fox, Edward a., Leidig, Jonathan P.
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps: Sicherheitsanalyse von Microsoft Komponenten
by
Szameitat, Daniel
Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education
by
Controller Area Network Prototyping with Arduino
by
Voss, Wilfried
Modeling and Analysis of Voice and Data in Cognitive Radio Networks
by
Gunawardena, Subodha, Zhuang, Weihua
Secure Data Communication in Wireless Sensor Networks
by
Shaila K., Venugopal K. R.
Der DDS Standard im praktischen Einsatz
by
Mayer Viktor
Energy Efficient Data Communication for Resource Constrained Systems
by
Ahsan Rajon S. a.
Digital Library Technologies
by
Da Silva Torres, Ricardo, Fox, Edward a.
Elimination of Security Threats Using Trusted Proactive Routing
by
Jaiswal Shilpa
Cloud Computing: A Hands-On Approach
by
Bahga, Arshdeep, Madisetti, Vijay
Lets VDIfy Our Systems: What is the Virtual Desktop ?
by
Alshafee, Khalid
Mitigating congestion and collision in adhoc networks
by
Natarajan Premalatha
A Computational Model for Adaptive Communication Channel Estimation
by
Solomon Akinboro
The Book on Networks: Everything you need to know about the Internet, Online Security and Cloud Computing.
by
Fisher, Robin
Enabling Content Distribution in Vehicular AD Hoc Networks
by
Luan, Tom H., Bai, Fan, Shen
Applied Optimization Methods for Wireless Networks
by
Hou, Y. Thomas, Shi, Yi, Sherali, Hanif D.
Algoritmy Verifikatsii I Proizvoditel'nosti Setevykh Protokolov
by
Saidakhmedov Shavkat
Autonomic Computing Enabled Cooperative Networked Design
by
Wódczak, Michal
Future Wireless and Optical Networks: Networking Modes and Cross-Layer Design
by
Jiang, Shengming
Elasticsearch Server Second Edition
by
Ku, Rafa, Rogozi Ski, Marek
Localization in GSM Mobile Radio Networks
by
Zahoransky, Richard M.
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications
by
Messier, Ric
Learning Veeam(r) Backup and Replication for Vmware Vsphere
by
Mohn, Christian
Exchange Online Fast Start: A Quick Start Guide for Exchange Online, Office 365 and Windows Azure
by
Training Solutions, Smart Brain
Using Security Patterns in Web -Application
by
Alam, Shahnawaz
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
by
Mason, Andrew, Ackroyd, Richard, Watson, Gavin
Designing a Digital Future: Report to the President and Congress
by
Executive Office of the President
Secure Routing in Wireless Mobile Ad Hoc Network
by
Sharma Govind, Pathak Ram, Mishra Manuj
Evolutionary Algorithms for Mobile AD Hoc Networks
by
Dorronsoro, Bernabé, Ruiz, Patricia, Danoy, Grégoire
XML Fast Start: A Quick Start Guide for XML
by
Training Solutions, Smart Brain
Ethernet: The Definitive Guide: Designing and Managing Local Area Networks
by
Zimmerman, Joann, Spurgeon, Charles
Heroku Cloud Application Development
by
Hanjura, Anubhav
Fundamentals of Diffusion-Based Molecular Communication in Nanonetworks
by
Pierobon, Massimiliano, Akyildiz, Ian F.
Routing Protocols for Mobile Ad-Hoc Network
by
Srivastava Supriya
Windows 7 Fast Start: A Quick Start Guide for Windows 7
by
Training Solutions, Smart Brain
Distributed Context-Aware Systems
by
Ferreira, Paulo, Alves, Pedro
Ranking for Web Data Search Using On-The-Fly Data Integration
by
Herzig, Daniel Markus
Secure and Efficient IP Mobility Support for Aeronautical Communications
by
Bauer, Christian
Security Advancement in ZRP based Wireless Networks
by
Shree, Raj, Pandey, Ravi Prakash
Smart Meter Networks: Intrusion Detection System by Design
by
Beigi-Mohammadi, Nasim
Satellite Network Robust Qos-Aware Routing
by
Long, Fei
Use of JXTA Technology For Network Based Parallel Processing
by
Hirave, Tejas, Surve, Sakshi, Malgaonkar, Saurabh
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach: Security in Cloud Computing
by
Dhivakar, Ashwin
Cloud Computing Basics
by
Srinivasan, S.