Networking in 2016
Algorithms and Models for Network Data and Link Analysis
by
Saerens, Marco, Shimbo, Masashi, Fouss, François
Internationaler IT-Sicherheitsmarkt. Zahlen, Fakten, Trends
by
Steinicke, Tobias
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
by
Steinicke, Tobias
Introduction to Wireless Sensor Networks
by
Forster, Anna
Elements of Cloud Computing Security: A Survey of Key Practicalities
by
Alani, Mohammed M.
Mastering Ubuntu Server
by
LaCroix, Jay
Projeto de Rede Com Switch HP
by
Ricci, B. T.
Network Project with HP Switch
by
Ricci, B. T.
Hacking Android
by
Rao Kotipalli, Srinivasa, A. Imran, Mohammed
Mastering FreeSWITCH
by
Minessale, Anthony, II, Maruzzelli, Giovanni
Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures
by
Network Science
by
Barabási, Albert-László
Radio Frequency Modulation Made Easy
by
Faruque, Saleh
Qoe Management in Wireless Networks
by
Zhang, Ping, Wang, Ying, Zhou, Wen'an
Zabbix Network Monitoring Second Edition
by
Olups, Rihards
Communication Networks for Smart Grids: Making Smart Grid Real
by
Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Massive Mimo Meets Small Cell: Backhaul and Cooperation
by
Quek, Tony Q. S., Yang, Howard H.
Mobile Device Management: Mobility Evaluation in Small and Medium-Sized Enterprises
by
Pierer, Markus
Economics of Database-Assisted Spectrum Sharing
by
Huang, Jianwei, Luo, Yuan, Gao, Lin
How To Do Virtualization: Your Step-By-Step Guide To Virtualization
by
Howexpert Press
Network and Data Security for Non-Engineers
by
Groom, Kevin, Groom, Frank M., Jones, Stephan S.
Pro Nagios 2.0
by
Turnbull, James
High-Performance Big-Data Analytics: Computing Systems and Approaches
by
Nagaraj, Dhivya, Raj, Pethuru, Raman, Anupama
Resilient Routing in Communication Networks
by
Rak, Jacek
Performance Analysis of Computer Networks
by
Sadiku, Matthew N. O., Musa, Sarhan M.
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
by
Küsters, Sebastian
Principles of Distributed Database Systems
by
Valduriez, Patrick, Özsu, M. Tamer
Dual Phase Evolution
by
Green, David G., Liu, Jing, Abbass, Hussein A.
Measuring Sip Proxy Server Performance
by
Subramanian, Sureshkumar V., Dutta, Rudra
Security and Privacy for Mobile Healthcare Networks
by
Shen, Zhang, Kuan
Wireless Sensor Networks: Principles, Design and Applications
by
Yang, Shuang-Hua
Fundamentos de Redes Informáticas: 2a Edición
by
Rivera Darin, Jonathan
Ultra-Wideband Radio Frequency Identification Systems
by
Nekoogar, Faranak, Dowla, Farid
Wimax Operator's Manual: Building 802.16 Wireless Networks
by
Sweeney, Daniel
Handbook of Mobile AD Hoc Networks for Mobility Models
by
Roy, Radhika Ranjan
Secure Wireless Sensor Networks: Threats and Solutions
by
Conti, Mauro
Security and the Networked Society
by
Gregory, Mark A., Glance, David
Guide to Flow-Aware Networking: Quality-Of-Service Architectures and Techniques for Traffic Management
by
Jajszczyk, Andrzej, Domżal, Jerzy, Wójcik, Robert
Proyecto de Red Con Switch HP
by
Ricci, B. T.
Spatio-Temporal Data Streams
by
Galic, Zdravko
Cross-Cultural Multimedia Computing: Semantic and Aesthetic Modeling
by
Dubnov, Shlomo, Burns, Kevin, Kiyoki, Yasushi
BeagleBone By Example
by
Prabakar, Jayakarthigeyan
Microsoft Office 365 - Exchange Online Implementation and Migration
by
Strant, Loryan, Waters, Ian, Greve, David
Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition
by
Cardwell, Kevin
Learning Nagios, Third Edition
by
Kocjan, Wojciech, Beltowski, Piotr
Fundamentals of Multimedia
by
Li, Ze-Nian, Drew, Mark S., Liu, Jiangchuan
Dynamic Provisioning for Community Services
by
Qi, Li, Jin, Hai
Intelligence for Embedded Systems: A Methodological Approach
by
Alippi, Cesare
Satellite Network Robust Qos-Aware Routing
by
Long, Fei
Cloud Data Management
by
Sakr, Sherif, Liu, Anna, Zhao, Liang
Wireless Sensors in Industrial Time-Critical Environments
by
Furtado, Pedro, Cecílio, José
How to Speak Emoji
by
Benenson, Fred
Juniper QFX10000 Series: A Comprehensive Guide to Building Next-Generation Data Centers
by
Hanks, Douglas
The Notion of Relevance in Information Science: Everybody Knows What Relevance Is. But, What Is It Really?
by
Saracevic, Tefko
I connect: Netzwerk Erfolg
by
Mantl, Josef
Scriptbasierte Sicherungslösung für Windows Server 2008
by
Schurig, Hannes
Developing Security Tools of Wsn and Wban Networks Applications
by
A. M. El-Bendary, Mohsen
Arm Assembly Language with Hardware Experiments
by
Elahi, Ata, Arjeski, Trevor
Advanced Free Space Optics (Fso): A Systems Approach
by
Majumdar, Arun K.
Automated Firewall Analytics: Design, Configuration and Optimization
by
Al-Shaer, Ehab
Trustworthy Policies for Distributed Repositories
by
Conway, Mike, Moore, Reagan W., Xu, Hao
Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions
by
Shbeeb, Aaron, Bodungen, Clint, Singer, Bryan
Dynamic Sharing of Wireless Spectrum
by
Yu, Quan, Zhou, Haibo, Shen
Implementierung einer Unternehmens-Public-Key-Infrastruktur unter Verwendung der Microsoft Active Directory Zertifikatsdienste
by
Stoppel, Uwe
Crowdsourcing in the Public Sector
by
Brabham, Daren C.
Human Re-Identification
by
Wu, Ziyan
Mobile Device Management Ansätze im Vergleich. Potenzial und Risiken von Corporate Owned, Personally Enabled und Bring your own Device
by
Kamps, Daniel
Sentiment Analysis in Social Networks
by
Fersini, Elisabetta, Messina, Enza, Pozzi, Federico Alberto
Virtualization Techniques for Mobile Systems
by
Furht, Borko, Jaramillo, David, Agarwal, Ankur
Fundamentos de Redes de Voz IP: 2a Edición
by
Gil Dominguez, Oscar
Wireless Sensors in Heterogeneous Networked Systems: Configuration and Operation Middleware
by
Furtado, Pedro, Cecílio, José
Overlapping Coalition Formation Games in Wireless Communication Networks
by
Saad, Walid, Wang, Tianyu, Song, Lingyang
Trust Management in Cloud Services
by
Sheng, Quan Z., Bouguettaya, Athman, Noor, Talal H.
Indoor Location-Based Services: Prerequisites and Foundations
by
Werner, Martin
Multidimensional Queueing Models in Telecommunication Networks
by
Melikov, Agassi, Ponomarenko, Leonid
Analysis and Design of Networked Control Systems
by
You, Keyou, Xiao, Nan, Xie, Lihua
Human Behavior Understanding in Networked Sensing: Theory and Applications of Networks of Sensors
by
Big Data Technologies and Applications
by
Villanustre, Flavio, Furht, Borko
Conversational Informatics: A Data-Intensive Approach with Emphasis on Nonverbal Communication
by
Nakazawa, Atsushi, Ohmoto, Yoshimasa, Nishida, Toyoaki
VMware NSX Network Essentials
by
Sreejith C.
Learning VMware vSphere
by
Fitzhugh, Rebecca, Gb, Abhilash
Practical XMPP
by
Watkin, Lloyd, Koelle, David
Routing and Wavelength Assignment for Wdm-Based Optical Networks: Quality-Of-Service and Fault Resilience
by
Sahu, Partha Pratim, Chatterjee, Bijoy Chand, Sarma, Nityananda
Mastering Microsoft Exchange Server 2016
by
Leonard, Clifton, Svidergol, Brian, Wright, Byron
Communication Networks Economy
by
Battu, Daniel
Multilayer Control of Networked Cyber-Physical Systems: Application to Monitoring, Autonomous and Robot Systems
by
Manfredi, Sabato
Architectural Design: Conception and Specification of Interactive Systems
by
Vissers, Chris A., Quartel, Dick A. C., Pires, Luís Ferreira
Introduction to Cyberdeception
by
Rowe, Neil C., Rrushi, Julian
Analysis of Computer Networks
by
Gebali, Fayez
Guide to High Performance Distributed Computing: Case Studies with Hadoop, Scalding and Spark
by
Muppalla, Anil Kumar, Srinivasa, K. G.
Understanding Network Hacks: Attack and Defense with Python
by
Ballmann, Bastian
Enterprise Governance of Information Technology: Achieving Alignment and Value, Featuring Cobit 5
by
de Haes, Steven, Van Grembergen, Wim
Web Indicators for Research Evaluation: A Practical Guide
by
Thelwall, Michael
The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War
by
Grobman, Steve, Cerra, Allison
Principles of Spread-Spectrum Communication Systems
by
Torrieri, Don
A Digital Phase Locked Loop Based Signal and Symbol Recovery System for Wireless Channel
by
Sarma, Kandarpa Kumar, Purkayastha, Basab Bijoy
Smart Collaborative Identifier Network: A Promising Design for Future Internet
by
Zhang, Hongke, Su, Wei, Quan, Wei
Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices
by
Galibus, Tatiana, De Oliveira Albuquerque, Robson, Krasnoproshin, Viktor V.
Network Storage: Tools and Technologies for Storing Your Company's Data
by
O'Reilly, James
Physical Layer Security in Random Cellular Networks
by
Wang, Hui-Ming, Zheng, Tong-Xing
Networks and New Services: A Complete Story
by
Minerva, Roberto, Crespi, Noel